1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * Common code for the NVMe target.
4 * Copyright (c) 2015-2016 HGST, a Western Digital Company.
5 */
6 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
7 #include <linux/hex.h>
8 #include <linux/module.h>
9 #include <linux/random.h>
10 #include <linux/rculist.h>
11 #include <linux/pci-p2pdma.h>
12 #include <linux/scatterlist.h>
13
14 #include <generated/utsrelease.h>
15
16 #define CREATE_TRACE_POINTS
17 #include "trace.h"
18
19 #include "nvmet.h"
20 #include "debugfs.h"
21
22 struct kmem_cache *nvmet_bvec_cache;
23 struct workqueue_struct *buffered_io_wq;
24 struct workqueue_struct *zbd_wq;
25 static const struct nvmet_fabrics_ops *nvmet_transports[NVMF_TRTYPE_MAX];
26 static DEFINE_IDA(cntlid_ida);
27
28 struct workqueue_struct *nvmet_wq;
29 EXPORT_SYMBOL_GPL(nvmet_wq);
30
31 /*
32 * This read/write semaphore is used to synchronize access to configuration
33 * information on a target system that will result in discovery log page
34 * information change for at least one host.
35 * The full list of resources to protected by this semaphore is:
36 *
37 * - subsystems list
38 * - per-subsystem allowed hosts list
39 * - allow_any_host subsystem attribute
40 * - nvmet_genctr
41 * - the nvmet_transports array
42 *
43 * When updating any of those lists/structures write lock should be obtained,
44 * while when reading (populating discovery log page or checking host-subsystem
45 * link) read lock is obtained to allow concurrent reads.
46 */
47 DECLARE_RWSEM(nvmet_config_sem);
48
49 u32 nvmet_ana_group_enabled[NVMET_MAX_ANAGRPS + 1];
50 u64 nvmet_ana_chgcnt;
51 DECLARE_RWSEM(nvmet_ana_sem);
52
errno_to_nvme_status(struct nvmet_req * req,int errno)53 inline u16 errno_to_nvme_status(struct nvmet_req *req, int errno)
54 {
55 switch (errno) {
56 case 0:
57 return NVME_SC_SUCCESS;
58 case -ENOSPC:
59 req->error_loc = offsetof(struct nvme_rw_command, length);
60 return NVME_SC_CAP_EXCEEDED | NVME_STATUS_DNR;
61 case -EREMOTEIO:
62 req->error_loc = offsetof(struct nvme_rw_command, slba);
63 return NVME_SC_LBA_RANGE | NVME_STATUS_DNR;
64 case -EOPNOTSUPP:
65 req->error_loc = offsetof(struct nvme_common_command, opcode);
66 return NVME_SC_INVALID_OPCODE | NVME_STATUS_DNR;
67 case -ENODATA:
68 req->error_loc = offsetof(struct nvme_rw_command, nsid);
69 return NVME_SC_ACCESS_DENIED;
70 case -EIO:
71 fallthrough;
72 default:
73 req->error_loc = offsetof(struct nvme_common_command, opcode);
74 return NVME_SC_INTERNAL | NVME_STATUS_DNR;
75 }
76 }
77
nvmet_report_invalid_opcode(struct nvmet_req * req)78 u16 nvmet_report_invalid_opcode(struct nvmet_req *req)
79 {
80 pr_debug("unhandled cmd %d on qid %d\n", req->cmd->common.opcode,
81 req->sq->qid);
82
83 req->error_loc = offsetof(struct nvme_common_command, opcode);
84 return NVME_SC_INVALID_OPCODE | NVME_STATUS_DNR;
85 }
86
87 static struct nvmet_subsys *nvmet_find_get_subsys(struct nvmet_port *port,
88 const char *subsysnqn);
89
nvmet_copy_to_sgl(struct nvmet_req * req,off_t off,const void * buf,size_t len)90 u16 nvmet_copy_to_sgl(struct nvmet_req *req, off_t off, const void *buf,
91 size_t len)
92 {
93 if (sg_pcopy_from_buffer(req->sg, req->sg_cnt, buf, len, off) != len) {
94 req->error_loc = offsetof(struct nvme_common_command, dptr);
95 return NVME_SC_SGL_INVALID_DATA | NVME_STATUS_DNR;
96 }
97 return 0;
98 }
99
nvmet_copy_from_sgl(struct nvmet_req * req,off_t off,void * buf,size_t len)100 u16 nvmet_copy_from_sgl(struct nvmet_req *req, off_t off, void *buf, size_t len)
101 {
102 if (sg_pcopy_to_buffer(req->sg, req->sg_cnt, buf, len, off) != len) {
103 req->error_loc = offsetof(struct nvme_common_command, dptr);
104 return NVME_SC_SGL_INVALID_DATA | NVME_STATUS_DNR;
105 }
106 return 0;
107 }
108
nvmet_zero_sgl(struct nvmet_req * req,off_t off,size_t len)109 u16 nvmet_zero_sgl(struct nvmet_req *req, off_t off, size_t len)
110 {
111 if (sg_zero_buffer(req->sg, req->sg_cnt, len, off) != len) {
112 req->error_loc = offsetof(struct nvme_common_command, dptr);
113 return NVME_SC_SGL_INVALID_DATA | NVME_STATUS_DNR;
114 }
115 return 0;
116 }
117
nvmet_max_nsid(struct nvmet_subsys * subsys)118 static u32 nvmet_max_nsid(struct nvmet_subsys *subsys)
119 {
120 struct nvmet_ns *cur;
121 unsigned long idx;
122 u32 nsid = 0;
123
124 nvmet_for_each_enabled_ns(&subsys->namespaces, idx, cur)
125 nsid = cur->nsid;
126
127 return nsid;
128 }
129
nvmet_async_event_result(struct nvmet_async_event * aen)130 static u32 nvmet_async_event_result(struct nvmet_async_event *aen)
131 {
132 return aen->event_type | (aen->event_info << 8) | (aen->log_page << 16);
133 }
134
nvmet_async_events_failall(struct nvmet_ctrl * ctrl)135 static void nvmet_async_events_failall(struct nvmet_ctrl *ctrl)
136 {
137 struct nvmet_req *req;
138
139 mutex_lock(&ctrl->lock);
140 while (ctrl->nr_async_event_cmds) {
141 req = ctrl->async_event_cmds[--ctrl->nr_async_event_cmds];
142 mutex_unlock(&ctrl->lock);
143 nvmet_req_complete(req, NVME_SC_INTERNAL | NVME_STATUS_DNR);
144 mutex_lock(&ctrl->lock);
145 }
146 mutex_unlock(&ctrl->lock);
147 }
148
nvmet_async_events_process(struct nvmet_ctrl * ctrl)149 static void nvmet_async_events_process(struct nvmet_ctrl *ctrl)
150 {
151 struct nvmet_async_event *aen;
152 struct nvmet_req *req;
153
154 mutex_lock(&ctrl->lock);
155 while (ctrl->nr_async_event_cmds && !list_empty(&ctrl->async_events)) {
156 aen = list_first_entry(&ctrl->async_events,
157 struct nvmet_async_event, entry);
158 req = ctrl->async_event_cmds[--ctrl->nr_async_event_cmds];
159 nvmet_set_result(req, nvmet_async_event_result(aen));
160
161 list_del(&aen->entry);
162 kfree(aen);
163
164 mutex_unlock(&ctrl->lock);
165 trace_nvmet_async_event(ctrl, req->cqe->result.u32);
166 nvmet_req_complete(req, 0);
167 mutex_lock(&ctrl->lock);
168 }
169 mutex_unlock(&ctrl->lock);
170 }
171
nvmet_async_events_free(struct nvmet_ctrl * ctrl)172 static void nvmet_async_events_free(struct nvmet_ctrl *ctrl)
173 {
174 struct nvmet_async_event *aen, *tmp;
175
176 mutex_lock(&ctrl->lock);
177 list_for_each_entry_safe(aen, tmp, &ctrl->async_events, entry) {
178 list_del(&aen->entry);
179 kfree(aen);
180 }
181 mutex_unlock(&ctrl->lock);
182 }
183
nvmet_async_event_work(struct work_struct * work)184 static void nvmet_async_event_work(struct work_struct *work)
185 {
186 struct nvmet_ctrl *ctrl =
187 container_of(work, struct nvmet_ctrl, async_event_work);
188
189 nvmet_async_events_process(ctrl);
190 }
191
nvmet_add_async_event(struct nvmet_ctrl * ctrl,u8 event_type,u8 event_info,u8 log_page)192 void nvmet_add_async_event(struct nvmet_ctrl *ctrl, u8 event_type,
193 u8 event_info, u8 log_page)
194 {
195 struct nvmet_async_event *aen;
196
197 aen = kmalloc_obj(*aen);
198 if (!aen)
199 return;
200
201 aen->event_type = event_type;
202 aen->event_info = event_info;
203 aen->log_page = log_page;
204
205 mutex_lock(&ctrl->lock);
206 list_add_tail(&aen->entry, &ctrl->async_events);
207 mutex_unlock(&ctrl->lock);
208
209 queue_work(nvmet_wq, &ctrl->async_event_work);
210 }
211
nvmet_add_to_changed_ns_log(struct nvmet_ctrl * ctrl,__le32 nsid)212 static void nvmet_add_to_changed_ns_log(struct nvmet_ctrl *ctrl, __le32 nsid)
213 {
214 u32 i;
215
216 mutex_lock(&ctrl->lock);
217 if (ctrl->nr_changed_ns > NVME_MAX_CHANGED_NAMESPACES)
218 goto out_unlock;
219
220 for (i = 0; i < ctrl->nr_changed_ns; i++) {
221 if (ctrl->changed_ns_list[i] == nsid)
222 goto out_unlock;
223 }
224
225 if (ctrl->nr_changed_ns == NVME_MAX_CHANGED_NAMESPACES) {
226 ctrl->changed_ns_list[0] = cpu_to_le32(0xffffffff);
227 ctrl->nr_changed_ns = U32_MAX;
228 goto out_unlock;
229 }
230
231 ctrl->changed_ns_list[ctrl->nr_changed_ns++] = nsid;
232 out_unlock:
233 mutex_unlock(&ctrl->lock);
234 }
235
nvmet_ns_changed(struct nvmet_subsys * subsys,u32 nsid)236 void nvmet_ns_changed(struct nvmet_subsys *subsys, u32 nsid)
237 {
238 struct nvmet_ctrl *ctrl;
239
240 lockdep_assert_held(&subsys->lock);
241
242 list_for_each_entry(ctrl, &subsys->ctrls, subsys_entry) {
243 nvmet_add_to_changed_ns_log(ctrl, cpu_to_le32(nsid));
244 if (nvmet_aen_bit_disabled(ctrl, NVME_AEN_BIT_NS_ATTR))
245 continue;
246 nvmet_add_async_event(ctrl, NVME_AER_NOTICE,
247 NVME_AER_NOTICE_NS_CHANGED,
248 NVME_LOG_CHANGED_NS);
249 }
250 }
251
nvmet_send_ana_event(struct nvmet_subsys * subsys,struct nvmet_port * port)252 void nvmet_send_ana_event(struct nvmet_subsys *subsys,
253 struct nvmet_port *port)
254 {
255 struct nvmet_ctrl *ctrl;
256
257 mutex_lock(&subsys->lock);
258 list_for_each_entry(ctrl, &subsys->ctrls, subsys_entry) {
259 if (port && ctrl->port != port)
260 continue;
261 if (nvmet_aen_bit_disabled(ctrl, NVME_AEN_BIT_ANA_CHANGE))
262 continue;
263 nvmet_add_async_event(ctrl, NVME_AER_NOTICE,
264 NVME_AER_NOTICE_ANA, NVME_LOG_ANA);
265 }
266 mutex_unlock(&subsys->lock);
267 }
268
nvmet_port_send_ana_event(struct nvmet_port * port)269 void nvmet_port_send_ana_event(struct nvmet_port *port)
270 {
271 struct nvmet_subsys_link *p;
272
273 down_read(&nvmet_config_sem);
274 list_for_each_entry(p, &port->subsystems, entry)
275 nvmet_send_ana_event(p->subsys, port);
276 up_read(&nvmet_config_sem);
277 }
278
nvmet_register_transport(const struct nvmet_fabrics_ops * ops)279 int nvmet_register_transport(const struct nvmet_fabrics_ops *ops)
280 {
281 int ret = 0;
282
283 down_write(&nvmet_config_sem);
284 if (nvmet_transports[ops->type])
285 ret = -EINVAL;
286 else
287 nvmet_transports[ops->type] = ops;
288 up_write(&nvmet_config_sem);
289
290 return ret;
291 }
292 EXPORT_SYMBOL_GPL(nvmet_register_transport);
293
nvmet_unregister_transport(const struct nvmet_fabrics_ops * ops)294 void nvmet_unregister_transport(const struct nvmet_fabrics_ops *ops)
295 {
296 down_write(&nvmet_config_sem);
297 nvmet_transports[ops->type] = NULL;
298 up_write(&nvmet_config_sem);
299 }
300 EXPORT_SYMBOL_GPL(nvmet_unregister_transport);
301
nvmet_port_del_ctrls(struct nvmet_port * port,struct nvmet_subsys * subsys)302 void nvmet_port_del_ctrls(struct nvmet_port *port, struct nvmet_subsys *subsys)
303 {
304 struct nvmet_ctrl *ctrl;
305
306 mutex_lock(&subsys->lock);
307 list_for_each_entry(ctrl, &subsys->ctrls, subsys_entry) {
308 if (ctrl->port == port)
309 ctrl->ops->delete_ctrl(ctrl);
310 }
311 mutex_unlock(&subsys->lock);
312 }
313
nvmet_enable_port(struct nvmet_port * port)314 int nvmet_enable_port(struct nvmet_port *port)
315 {
316 const struct nvmet_fabrics_ops *ops;
317 int ret;
318
319 lockdep_assert_held(&nvmet_config_sem);
320
321 if (port->disc_addr.trtype == NVMF_TRTYPE_MAX)
322 return -EINVAL;
323
324 ops = nvmet_transports[port->disc_addr.trtype];
325 if (!ops) {
326 up_write(&nvmet_config_sem);
327 request_module("nvmet-transport-%d", port->disc_addr.trtype);
328 down_write(&nvmet_config_sem);
329 ops = nvmet_transports[port->disc_addr.trtype];
330 if (!ops) {
331 pr_err("transport type %d not supported\n",
332 port->disc_addr.trtype);
333 return -EINVAL;
334 }
335 }
336
337 if (!try_module_get(ops->owner))
338 return -EINVAL;
339
340 /*
341 * If the user requested PI support and the transport isn't pi capable,
342 * don't enable the port.
343 */
344 if (port->pi_enable && !(ops->flags & NVMF_METADATA_SUPPORTED)) {
345 pr_err("T10-PI is not supported by transport type %d\n",
346 port->disc_addr.trtype);
347 ret = -EINVAL;
348 goto out_put;
349 }
350
351 ret = ops->add_port(port);
352 if (ret)
353 goto out_put;
354
355 /* If the transport didn't set inline_data_size, then disable it. */
356 if (port->inline_data_size < 0)
357 port->inline_data_size = 0;
358
359 /*
360 * If the transport didn't set the max_queue_size properly, then clamp
361 * it to the target limits. Also set default values in case the
362 * transport didn't set it at all.
363 */
364 if (port->max_queue_size < 0)
365 port->max_queue_size = NVMET_MAX_QUEUE_SIZE;
366 else
367 port->max_queue_size = clamp_t(int, port->max_queue_size,
368 NVMET_MIN_QUEUE_SIZE,
369 NVMET_MAX_QUEUE_SIZE);
370
371 port->enabled = true;
372 port->tr_ops = ops;
373 return 0;
374
375 out_put:
376 module_put(ops->owner);
377 return ret;
378 }
379
nvmet_disable_port(struct nvmet_port * port)380 void nvmet_disable_port(struct nvmet_port *port)
381 {
382 const struct nvmet_fabrics_ops *ops;
383
384 lockdep_assert_held(&nvmet_config_sem);
385
386 port->enabled = false;
387 port->tr_ops = NULL;
388
389 ops = nvmet_transports[port->disc_addr.trtype];
390 ops->remove_port(port);
391 module_put(ops->owner);
392 }
393
nvmet_keep_alive_timer(struct work_struct * work)394 static void nvmet_keep_alive_timer(struct work_struct *work)
395 {
396 struct nvmet_ctrl *ctrl = container_of(to_delayed_work(work),
397 struct nvmet_ctrl, ka_work);
398 bool reset_tbkas = ctrl->reset_tbkas;
399
400 ctrl->reset_tbkas = false;
401 if (reset_tbkas) {
402 pr_debug("ctrl %d reschedule traffic based keep-alive timer\n",
403 ctrl->cntlid);
404 queue_delayed_work(nvmet_wq, &ctrl->ka_work, ctrl->kato * HZ);
405 return;
406 }
407
408 pr_err("ctrl %d keep-alive timer (%d seconds) expired!\n",
409 ctrl->cntlid, ctrl->kato);
410
411 nvmet_ctrl_fatal_error(ctrl);
412 }
413
nvmet_start_keep_alive_timer(struct nvmet_ctrl * ctrl)414 void nvmet_start_keep_alive_timer(struct nvmet_ctrl *ctrl)
415 {
416 if (unlikely(ctrl->kato == 0))
417 return;
418
419 pr_debug("ctrl %d start keep-alive timer for %d secs\n",
420 ctrl->cntlid, ctrl->kato);
421
422 queue_delayed_work(nvmet_wq, &ctrl->ka_work, ctrl->kato * HZ);
423 }
424
nvmet_stop_keep_alive_timer(struct nvmet_ctrl * ctrl)425 void nvmet_stop_keep_alive_timer(struct nvmet_ctrl *ctrl)
426 {
427 if (unlikely(ctrl->kato == 0))
428 return;
429
430 pr_debug("ctrl %d stop keep-alive\n", ctrl->cntlid);
431
432 cancel_delayed_work_sync(&ctrl->ka_work);
433 }
434
nvmet_req_find_ns(struct nvmet_req * req)435 u16 nvmet_req_find_ns(struct nvmet_req *req)
436 {
437 u32 nsid = le32_to_cpu(req->cmd->common.nsid);
438 struct nvmet_subsys *subsys = nvmet_req_subsys(req);
439
440 req->ns = xa_load(&subsys->namespaces, nsid);
441 if (unlikely(!req->ns || !req->ns->enabled)) {
442 req->error_loc = offsetof(struct nvme_common_command, nsid);
443 if (!req->ns) /* ns doesn't exist! */
444 return NVME_SC_INVALID_NS | NVME_STATUS_DNR;
445
446 /* ns exists but it's disabled */
447 req->ns = NULL;
448 return NVME_SC_INTERNAL_PATH_ERROR;
449 }
450
451 percpu_ref_get(&req->ns->ref);
452 return NVME_SC_SUCCESS;
453 }
454
nvmet_destroy_namespace(struct percpu_ref * ref)455 static void nvmet_destroy_namespace(struct percpu_ref *ref)
456 {
457 struct nvmet_ns *ns = container_of(ref, struct nvmet_ns, ref);
458
459 complete(&ns->disable_done);
460 }
461
nvmet_put_namespace(struct nvmet_ns * ns)462 void nvmet_put_namespace(struct nvmet_ns *ns)
463 {
464 percpu_ref_put(&ns->ref);
465 }
466
nvmet_ns_dev_disable(struct nvmet_ns * ns)467 static void nvmet_ns_dev_disable(struct nvmet_ns *ns)
468 {
469 nvmet_bdev_ns_disable(ns);
470 nvmet_file_ns_disable(ns);
471 }
472
nvmet_p2pmem_ns_enable(struct nvmet_ns * ns)473 static int nvmet_p2pmem_ns_enable(struct nvmet_ns *ns)
474 {
475 int ret;
476 struct pci_dev *p2p_dev;
477
478 if (!ns->use_p2pmem)
479 return 0;
480
481 if (!ns->bdev) {
482 pr_err("peer-to-peer DMA is not supported by non-block device namespaces\n");
483 return -EINVAL;
484 }
485
486 if (!blk_queue_pci_p2pdma(ns->bdev->bd_disk->queue)) {
487 pr_err("peer-to-peer DMA is not supported by the driver of %s\n",
488 ns->device_path);
489 return -EINVAL;
490 }
491
492 if (ns->p2p_dev) {
493 ret = pci_p2pdma_distance(ns->p2p_dev, nvmet_ns_dev(ns), true);
494 if (ret < 0)
495 return -EINVAL;
496 } else {
497 /*
498 * Right now we just check that there is p2pmem available so
499 * we can report an error to the user right away if there
500 * is not. We'll find the actual device to use once we
501 * setup the controller when the port's device is available.
502 */
503
504 p2p_dev = pci_p2pmem_find(nvmet_ns_dev(ns));
505 if (!p2p_dev) {
506 pr_err("no peer-to-peer memory is available for %s\n",
507 ns->device_path);
508 return -EINVAL;
509 }
510
511 pci_dev_put(p2p_dev);
512 }
513
514 return 0;
515 }
516
nvmet_p2pmem_ns_add_p2p(struct nvmet_ctrl * ctrl,struct nvmet_ns * ns)517 static void nvmet_p2pmem_ns_add_p2p(struct nvmet_ctrl *ctrl,
518 struct nvmet_ns *ns)
519 {
520 struct device *clients[2];
521 struct pci_dev *p2p_dev;
522 int ret;
523
524 lockdep_assert_held(&ctrl->subsys->lock);
525
526 if (!ctrl->p2p_client || !ns->use_p2pmem)
527 return;
528
529 if (ns->p2p_dev) {
530 ret = pci_p2pdma_distance(ns->p2p_dev, ctrl->p2p_client, true);
531 if (ret < 0)
532 return;
533
534 p2p_dev = pci_dev_get(ns->p2p_dev);
535 } else {
536 clients[0] = ctrl->p2p_client;
537 clients[1] = nvmet_ns_dev(ns);
538
539 p2p_dev = pci_p2pmem_find_many(clients, ARRAY_SIZE(clients));
540 if (!p2p_dev) {
541 pr_err("no peer-to-peer memory is available that's supported by %s and %s\n",
542 dev_name(ctrl->p2p_client), ns->device_path);
543 return;
544 }
545 }
546
547 ret = radix_tree_insert(&ctrl->p2p_ns_map, ns->nsid, p2p_dev);
548 if (ret < 0)
549 pci_dev_put(p2p_dev);
550
551 pr_info("using p2pmem on %s for nsid %d\n", pci_name(p2p_dev),
552 ns->nsid);
553 }
554
nvmet_ns_revalidate(struct nvmet_ns * ns)555 bool nvmet_ns_revalidate(struct nvmet_ns *ns)
556 {
557 loff_t oldsize = ns->size;
558
559 if (ns->bdev)
560 nvmet_bdev_ns_revalidate(ns);
561 else
562 nvmet_file_ns_revalidate(ns);
563
564 return oldsize != ns->size;
565 }
566
nvmet_ns_enable(struct nvmet_ns * ns)567 int nvmet_ns_enable(struct nvmet_ns *ns)
568 {
569 struct nvmet_subsys *subsys = ns->subsys;
570 struct nvmet_ctrl *ctrl;
571 int ret;
572
573 mutex_lock(&subsys->lock);
574 ret = 0;
575
576 if (nvmet_is_passthru_subsys(subsys)) {
577 pr_info("cannot enable both passthru and regular namespaces for a single subsystem");
578 goto out_unlock;
579 }
580
581 if (ns->enabled)
582 goto out_unlock;
583
584 ret = nvmet_bdev_ns_enable(ns);
585 if (ret == -ENOTBLK)
586 ret = nvmet_file_ns_enable(ns);
587 if (ret)
588 goto out_unlock;
589
590 ret = nvmet_p2pmem_ns_enable(ns);
591 if (ret)
592 goto out_dev_disable;
593
594 list_for_each_entry(ctrl, &subsys->ctrls, subsys_entry)
595 nvmet_p2pmem_ns_add_p2p(ctrl, ns);
596
597 if (ns->pr.enable) {
598 ret = nvmet_pr_init_ns(ns);
599 if (ret)
600 goto out_dev_put;
601 }
602
603 if (percpu_ref_init(&ns->ref, nvmet_destroy_namespace, 0, GFP_KERNEL))
604 goto out_pr_exit;
605
606 nvmet_ns_changed(subsys, ns->nsid);
607 ns->enabled = true;
608 xa_set_mark(&subsys->namespaces, ns->nsid, NVMET_NS_ENABLED);
609 ret = 0;
610 out_unlock:
611 mutex_unlock(&subsys->lock);
612 return ret;
613 out_pr_exit:
614 if (ns->pr.enable)
615 nvmet_pr_exit_ns(ns);
616 out_dev_put:
617 list_for_each_entry(ctrl, &subsys->ctrls, subsys_entry)
618 pci_dev_put(radix_tree_delete(&ctrl->p2p_ns_map, ns->nsid));
619 out_dev_disable:
620 nvmet_ns_dev_disable(ns);
621 goto out_unlock;
622 }
623
nvmet_ns_disable(struct nvmet_ns * ns)624 void nvmet_ns_disable(struct nvmet_ns *ns)
625 {
626 struct nvmet_subsys *subsys = ns->subsys;
627 struct nvmet_ctrl *ctrl;
628
629 mutex_lock(&subsys->lock);
630 if (!ns->enabled)
631 goto out_unlock;
632
633 ns->enabled = false;
634 xa_clear_mark(&subsys->namespaces, ns->nsid, NVMET_NS_ENABLED);
635
636 list_for_each_entry(ctrl, &subsys->ctrls, subsys_entry)
637 pci_dev_put(radix_tree_delete(&ctrl->p2p_ns_map, ns->nsid));
638
639 mutex_unlock(&subsys->lock);
640
641 /*
642 * Now that we removed the namespaces from the lookup list, we
643 * can kill the per_cpu ref and wait for any remaining references
644 * to be dropped, as well as a RCU grace period for anyone only
645 * using the namespace under rcu_read_lock(). Note that we can't
646 * use call_rcu here as we need to ensure the namespaces have
647 * been fully destroyed before unloading the module.
648 */
649 percpu_ref_kill(&ns->ref);
650 synchronize_rcu();
651 wait_for_completion(&ns->disable_done);
652 percpu_ref_exit(&ns->ref);
653
654 if (ns->pr.enable)
655 nvmet_pr_exit_ns(ns);
656
657 mutex_lock(&subsys->lock);
658 nvmet_ns_changed(subsys, ns->nsid);
659 nvmet_ns_dev_disable(ns);
660 out_unlock:
661 mutex_unlock(&subsys->lock);
662 }
663
nvmet_ns_free(struct nvmet_ns * ns)664 void nvmet_ns_free(struct nvmet_ns *ns)
665 {
666 struct nvmet_subsys *subsys = ns->subsys;
667
668 nvmet_ns_disable(ns);
669
670 mutex_lock(&subsys->lock);
671
672 xa_erase(&subsys->namespaces, ns->nsid);
673 if (ns->nsid == subsys->max_nsid)
674 subsys->max_nsid = nvmet_max_nsid(subsys);
675
676 subsys->nr_namespaces--;
677 mutex_unlock(&subsys->lock);
678
679 down_write(&nvmet_ana_sem);
680 nvmet_ana_group_enabled[ns->anagrpid]--;
681 up_write(&nvmet_ana_sem);
682
683 kfree(ns->device_path);
684 kfree(ns);
685 }
686
nvmet_ns_alloc(struct nvmet_subsys * subsys,u32 nsid)687 struct nvmet_ns *nvmet_ns_alloc(struct nvmet_subsys *subsys, u32 nsid)
688 {
689 struct nvmet_ns *ns;
690
691 mutex_lock(&subsys->lock);
692
693 if (subsys->nr_namespaces == NVMET_MAX_NAMESPACES)
694 goto out_unlock;
695
696 ns = kzalloc_obj(*ns);
697 if (!ns)
698 goto out_unlock;
699
700 init_completion(&ns->disable_done);
701
702 ns->nsid = nsid;
703 ns->subsys = subsys;
704
705 if (ns->nsid > subsys->max_nsid)
706 subsys->max_nsid = nsid;
707
708 if (xa_insert(&subsys->namespaces, ns->nsid, ns, GFP_KERNEL))
709 goto out_exit;
710
711 subsys->nr_namespaces++;
712
713 mutex_unlock(&subsys->lock);
714
715 down_write(&nvmet_ana_sem);
716 ns->anagrpid = NVMET_DEFAULT_ANA_GRPID;
717 nvmet_ana_group_enabled[ns->anagrpid]++;
718 up_write(&nvmet_ana_sem);
719
720 uuid_gen(&ns->uuid);
721 ns->buffered_io = false;
722 ns->csi = NVME_CSI_NVM;
723
724 return ns;
725 out_exit:
726 subsys->max_nsid = nvmet_max_nsid(subsys);
727 kfree(ns);
728 out_unlock:
729 mutex_unlock(&subsys->lock);
730 return NULL;
731 }
732
nvmet_update_sq_head(struct nvmet_req * req)733 static void nvmet_update_sq_head(struct nvmet_req *req)
734 {
735 if (req->sq->size) {
736 u32 old_sqhd, new_sqhd;
737
738 old_sqhd = READ_ONCE(req->sq->sqhd);
739 do {
740 new_sqhd = (old_sqhd + 1) % req->sq->size;
741 } while (!try_cmpxchg(&req->sq->sqhd, &old_sqhd, new_sqhd));
742 }
743 req->cqe->sq_head = cpu_to_le16(req->sq->sqhd & 0x0000FFFF);
744 }
745
nvmet_set_error(struct nvmet_req * req,u16 status)746 static void nvmet_set_error(struct nvmet_req *req, u16 status)
747 {
748 struct nvmet_ctrl *ctrl = req->sq->ctrl;
749 struct nvme_error_slot *new_error_slot;
750 unsigned long flags;
751
752 req->cqe->status = cpu_to_le16(status << 1);
753
754 if (!ctrl || req->error_loc == NVMET_NO_ERROR_LOC)
755 return;
756
757 spin_lock_irqsave(&ctrl->error_lock, flags);
758 ctrl->err_counter++;
759 new_error_slot =
760 &ctrl->slots[ctrl->err_counter % NVMET_ERROR_LOG_SLOTS];
761
762 new_error_slot->error_count = cpu_to_le64(ctrl->err_counter);
763 new_error_slot->sqid = cpu_to_le16(req->sq->qid);
764 new_error_slot->cmdid = cpu_to_le16(req->cmd->common.command_id);
765 new_error_slot->status_field = cpu_to_le16(status << 1);
766 new_error_slot->param_error_location = cpu_to_le16(req->error_loc);
767 new_error_slot->lba = cpu_to_le64(req->error_slba);
768 new_error_slot->nsid = req->cmd->common.nsid;
769 spin_unlock_irqrestore(&ctrl->error_lock, flags);
770
771 /* set the more bit for this request */
772 req->cqe->status |= cpu_to_le16(1 << 14);
773 }
774
__nvmet_req_complete(struct nvmet_req * req,u16 status)775 static void __nvmet_req_complete(struct nvmet_req *req, u16 status)
776 {
777 struct nvmet_ns *ns = req->ns;
778 struct nvmet_pr_per_ctrl_ref *pc_ref = req->pc_ref;
779
780 if (!req->sq->sqhd_disabled)
781 nvmet_update_sq_head(req);
782 req->cqe->sq_id = cpu_to_le16(req->sq->qid);
783 req->cqe->command_id = req->cmd->common.command_id;
784
785 if (unlikely(status))
786 nvmet_set_error(req, status);
787
788 trace_nvmet_req_complete(req);
789
790 req->ops->queue_response(req);
791
792 if (pc_ref)
793 nvmet_pr_put_ns_pc_ref(pc_ref);
794 if (ns)
795 nvmet_put_namespace(ns);
796 }
797
nvmet_req_complete(struct nvmet_req * req,u16 status)798 void nvmet_req_complete(struct nvmet_req *req, u16 status)
799 {
800 struct nvmet_sq *sq = req->sq;
801
802 __nvmet_req_complete(req, status);
803 percpu_ref_put(&sq->ref);
804 }
805 EXPORT_SYMBOL_GPL(nvmet_req_complete);
806
nvmet_cq_init(struct nvmet_cq * cq)807 void nvmet_cq_init(struct nvmet_cq *cq)
808 {
809 refcount_set(&cq->ref, 1);
810 }
811 EXPORT_SYMBOL_GPL(nvmet_cq_init);
812
nvmet_cq_get(struct nvmet_cq * cq)813 bool nvmet_cq_get(struct nvmet_cq *cq)
814 {
815 return refcount_inc_not_zero(&cq->ref);
816 }
817 EXPORT_SYMBOL_GPL(nvmet_cq_get);
818
nvmet_cq_put(struct nvmet_cq * cq)819 void nvmet_cq_put(struct nvmet_cq *cq)
820 {
821 if (refcount_dec_and_test(&cq->ref))
822 nvmet_cq_destroy(cq);
823 }
824 EXPORT_SYMBOL_GPL(nvmet_cq_put);
825
nvmet_cq_setup(struct nvmet_ctrl * ctrl,struct nvmet_cq * cq,u16 qid,u16 size)826 void nvmet_cq_setup(struct nvmet_ctrl *ctrl, struct nvmet_cq *cq,
827 u16 qid, u16 size)
828 {
829 cq->qid = qid;
830 cq->size = size;
831
832 ctrl->cqs[qid] = cq;
833 }
834
nvmet_cq_destroy(struct nvmet_cq * cq)835 void nvmet_cq_destroy(struct nvmet_cq *cq)
836 {
837 struct nvmet_ctrl *ctrl = cq->ctrl;
838
839 if (ctrl) {
840 ctrl->cqs[cq->qid] = NULL;
841 nvmet_ctrl_put(cq->ctrl);
842 cq->ctrl = NULL;
843 }
844 }
845
nvmet_sq_setup(struct nvmet_ctrl * ctrl,struct nvmet_sq * sq,u16 qid,u16 size)846 void nvmet_sq_setup(struct nvmet_ctrl *ctrl, struct nvmet_sq *sq,
847 u16 qid, u16 size)
848 {
849 sq->sqhd = 0;
850 sq->qid = qid;
851 sq->size = size;
852
853 ctrl->sqs[qid] = sq;
854 }
855
nvmet_confirm_sq(struct percpu_ref * ref)856 static void nvmet_confirm_sq(struct percpu_ref *ref)
857 {
858 struct nvmet_sq *sq = container_of(ref, struct nvmet_sq, ref);
859
860 complete(&sq->confirm_done);
861 }
862
nvmet_check_cqid(struct nvmet_ctrl * ctrl,u16 cqid,bool create)863 u16 nvmet_check_cqid(struct nvmet_ctrl *ctrl, u16 cqid, bool create)
864 {
865 if (!ctrl->cqs)
866 return NVME_SC_INTERNAL | NVME_STATUS_DNR;
867
868 if (cqid > ctrl->subsys->max_qid)
869 return NVME_SC_QID_INVALID | NVME_STATUS_DNR;
870
871 if ((create && ctrl->cqs[cqid]) || (!create && !ctrl->cqs[cqid]))
872 return NVME_SC_QID_INVALID | NVME_STATUS_DNR;
873
874 return NVME_SC_SUCCESS;
875 }
876
nvmet_check_io_cqid(struct nvmet_ctrl * ctrl,u16 cqid,bool create)877 u16 nvmet_check_io_cqid(struct nvmet_ctrl *ctrl, u16 cqid, bool create)
878 {
879 if (!cqid)
880 return NVME_SC_QID_INVALID | NVME_STATUS_DNR;
881 return nvmet_check_cqid(ctrl, cqid, create);
882 }
883
nvmet_cq_in_use(struct nvmet_cq * cq)884 bool nvmet_cq_in_use(struct nvmet_cq *cq)
885 {
886 return refcount_read(&cq->ref) > 1;
887 }
888 EXPORT_SYMBOL_GPL(nvmet_cq_in_use);
889
nvmet_cq_create(struct nvmet_ctrl * ctrl,struct nvmet_cq * cq,u16 qid,u16 size)890 u16 nvmet_cq_create(struct nvmet_ctrl *ctrl, struct nvmet_cq *cq,
891 u16 qid, u16 size)
892 {
893 u16 status;
894
895 status = nvmet_check_cqid(ctrl, qid, true);
896 if (status != NVME_SC_SUCCESS)
897 return status;
898
899 if (!kref_get_unless_zero(&ctrl->ref))
900 return NVME_SC_INTERNAL | NVME_STATUS_DNR;
901 cq->ctrl = ctrl;
902
903 nvmet_cq_init(cq);
904 nvmet_cq_setup(ctrl, cq, qid, size);
905
906 return NVME_SC_SUCCESS;
907 }
908 EXPORT_SYMBOL_GPL(nvmet_cq_create);
909
nvmet_check_sqid(struct nvmet_ctrl * ctrl,u16 sqid,bool create)910 u16 nvmet_check_sqid(struct nvmet_ctrl *ctrl, u16 sqid,
911 bool create)
912 {
913 if (!ctrl->sqs)
914 return NVME_SC_INTERNAL | NVME_STATUS_DNR;
915
916 if (sqid > ctrl->subsys->max_qid)
917 return NVME_SC_QID_INVALID | NVME_STATUS_DNR;
918
919 if ((create && ctrl->sqs[sqid]) ||
920 (!create && !ctrl->sqs[sqid]))
921 return NVME_SC_QID_INVALID | NVME_STATUS_DNR;
922
923 return NVME_SC_SUCCESS;
924 }
925
nvmet_sq_create(struct nvmet_ctrl * ctrl,struct nvmet_sq * sq,struct nvmet_cq * cq,u16 sqid,u16 size)926 u16 nvmet_sq_create(struct nvmet_ctrl *ctrl, struct nvmet_sq *sq,
927 struct nvmet_cq *cq, u16 sqid, u16 size)
928 {
929 u16 status;
930 int ret;
931
932 if (!kref_get_unless_zero(&ctrl->ref))
933 return NVME_SC_INTERNAL | NVME_STATUS_DNR;
934
935 status = nvmet_check_sqid(ctrl, sqid, true);
936 if (status != NVME_SC_SUCCESS)
937 return status;
938
939 ret = nvmet_sq_init(sq, cq);
940 if (ret) {
941 status = NVME_SC_INTERNAL | NVME_STATUS_DNR;
942 goto ctrl_put;
943 }
944
945 nvmet_sq_setup(ctrl, sq, sqid, size);
946 sq->ctrl = ctrl;
947
948 return NVME_SC_SUCCESS;
949
950 ctrl_put:
951 nvmet_ctrl_put(ctrl);
952 return status;
953 }
954 EXPORT_SYMBOL_GPL(nvmet_sq_create);
955
nvmet_sq_destroy(struct nvmet_sq * sq)956 void nvmet_sq_destroy(struct nvmet_sq *sq)
957 {
958 struct nvmet_ctrl *ctrl = sq->ctrl;
959
960 /*
961 * If this is the admin queue, complete all AERs so that our
962 * queue doesn't have outstanding requests on it.
963 */
964 if (ctrl && ctrl->sqs && ctrl->sqs[0] == sq)
965 nvmet_async_events_failall(ctrl);
966 percpu_ref_kill_and_confirm(&sq->ref, nvmet_confirm_sq);
967 wait_for_completion(&sq->confirm_done);
968 wait_for_completion(&sq->free_done);
969 percpu_ref_exit(&sq->ref);
970 nvmet_auth_sq_free(sq);
971 nvmet_cq_put(sq->cq);
972
973 /*
974 * we must reference the ctrl again after waiting for inflight IO
975 * to complete. Because admin connect may have sneaked in after we
976 * store sq->ctrl locally, but before we killed the percpu_ref. the
977 * admin connect allocates and assigns sq->ctrl, which now needs a
978 * final ref put, as this ctrl is going away.
979 */
980 ctrl = sq->ctrl;
981
982 if (ctrl) {
983 /*
984 * The teardown flow may take some time, and the host may not
985 * send us keep-alive during this period, hence reset the
986 * traffic based keep-alive timer so we don't trigger a
987 * controller teardown as a result of a keep-alive expiration.
988 */
989 ctrl->reset_tbkas = true;
990 sq->ctrl->sqs[sq->qid] = NULL;
991 nvmet_ctrl_put(ctrl);
992 sq->ctrl = NULL; /* allows reusing the queue later */
993 }
994 }
995 EXPORT_SYMBOL_GPL(nvmet_sq_destroy);
996
nvmet_sq_free(struct percpu_ref * ref)997 static void nvmet_sq_free(struct percpu_ref *ref)
998 {
999 struct nvmet_sq *sq = container_of(ref, struct nvmet_sq, ref);
1000
1001 complete(&sq->free_done);
1002 }
1003
nvmet_sq_init(struct nvmet_sq * sq,struct nvmet_cq * cq)1004 int nvmet_sq_init(struct nvmet_sq *sq, struct nvmet_cq *cq)
1005 {
1006 int ret;
1007
1008 if (!nvmet_cq_get(cq))
1009 return -EINVAL;
1010
1011 ret = percpu_ref_init(&sq->ref, nvmet_sq_free, 0, GFP_KERNEL);
1012 if (ret) {
1013 pr_err("percpu_ref init failed!\n");
1014 nvmet_cq_put(cq);
1015 return ret;
1016 }
1017 init_completion(&sq->free_done);
1018 init_completion(&sq->confirm_done);
1019 nvmet_auth_sq_init(sq);
1020 sq->cq = cq;
1021
1022 return 0;
1023 }
1024 EXPORT_SYMBOL_GPL(nvmet_sq_init);
1025
nvmet_check_ana_state(struct nvmet_port * port,struct nvmet_ns * ns)1026 static inline u16 nvmet_check_ana_state(struct nvmet_port *port,
1027 struct nvmet_ns *ns)
1028 {
1029 enum nvme_ana_state state = port->ana_state[ns->anagrpid];
1030
1031 if (unlikely(state == NVME_ANA_INACCESSIBLE))
1032 return NVME_SC_ANA_INACCESSIBLE;
1033 if (unlikely(state == NVME_ANA_PERSISTENT_LOSS))
1034 return NVME_SC_ANA_PERSISTENT_LOSS;
1035 if (unlikely(state == NVME_ANA_CHANGE))
1036 return NVME_SC_ANA_TRANSITION;
1037 return 0;
1038 }
1039
nvmet_io_cmd_check_access(struct nvmet_req * req)1040 static inline u16 nvmet_io_cmd_check_access(struct nvmet_req *req)
1041 {
1042 if (unlikely(req->ns->readonly)) {
1043 switch (req->cmd->common.opcode) {
1044 case nvme_cmd_read:
1045 case nvme_cmd_flush:
1046 break;
1047 default:
1048 return NVME_SC_NS_WRITE_PROTECTED;
1049 }
1050 }
1051
1052 return 0;
1053 }
1054
nvmet_io_cmd_transfer_len(struct nvmet_req * req)1055 static u32 nvmet_io_cmd_transfer_len(struct nvmet_req *req)
1056 {
1057 struct nvme_command *cmd = req->cmd;
1058 u32 metadata_len = 0;
1059
1060 if (nvme_is_fabrics(cmd))
1061 return nvmet_fabrics_io_cmd_data_len(req);
1062
1063 if (!req->ns)
1064 return 0;
1065
1066 switch (req->cmd->common.opcode) {
1067 case nvme_cmd_read:
1068 case nvme_cmd_write:
1069 case nvme_cmd_zone_append:
1070 if (req->sq->ctrl->pi_support && nvmet_ns_has_pi(req->ns))
1071 metadata_len = nvmet_rw_metadata_len(req);
1072 return nvmet_rw_data_len(req) + metadata_len;
1073 case nvme_cmd_dsm:
1074 return nvmet_dsm_len(req);
1075 case nvme_cmd_zone_mgmt_recv:
1076 return (le32_to_cpu(req->cmd->zmr.numd) + 1) << 2;
1077 default:
1078 return 0;
1079 }
1080 }
1081
nvmet_parse_io_cmd(struct nvmet_req * req)1082 static u16 nvmet_parse_io_cmd(struct nvmet_req *req)
1083 {
1084 struct nvme_command *cmd = req->cmd;
1085 u16 ret;
1086
1087 if (nvme_is_fabrics(cmd))
1088 return nvmet_parse_fabrics_io_cmd(req);
1089
1090 if (unlikely(!nvmet_check_auth_status(req)))
1091 return NVME_SC_AUTH_REQUIRED | NVME_STATUS_DNR;
1092
1093 ret = nvmet_check_ctrl_status(req);
1094 if (unlikely(ret))
1095 return ret;
1096
1097 if (nvmet_is_passthru_req(req))
1098 return nvmet_parse_passthru_io_cmd(req);
1099
1100 ret = nvmet_req_find_ns(req);
1101 if (unlikely(ret))
1102 return ret;
1103
1104 ret = nvmet_check_ana_state(req->port, req->ns);
1105 if (unlikely(ret)) {
1106 req->error_loc = offsetof(struct nvme_common_command, nsid);
1107 return ret;
1108 }
1109 ret = nvmet_io_cmd_check_access(req);
1110 if (unlikely(ret)) {
1111 req->error_loc = offsetof(struct nvme_common_command, nsid);
1112 return ret;
1113 }
1114
1115 if (req->ns->pr.enable) {
1116 ret = nvmet_parse_pr_cmd(req);
1117 if (!ret)
1118 return ret;
1119 }
1120
1121 switch (req->ns->csi) {
1122 case NVME_CSI_NVM:
1123 if (req->ns->file)
1124 ret = nvmet_file_parse_io_cmd(req);
1125 else
1126 ret = nvmet_bdev_parse_io_cmd(req);
1127 break;
1128 case NVME_CSI_ZNS:
1129 if (IS_ENABLED(CONFIG_BLK_DEV_ZONED))
1130 ret = nvmet_bdev_zns_parse_io_cmd(req);
1131 else
1132 ret = NVME_SC_INVALID_IO_CMD_SET;
1133 break;
1134 default:
1135 ret = NVME_SC_INVALID_IO_CMD_SET;
1136 }
1137 if (ret)
1138 return ret;
1139
1140 if (req->ns->pr.enable) {
1141 ret = nvmet_pr_check_cmd_access(req);
1142 if (ret)
1143 return ret;
1144
1145 ret = nvmet_pr_get_ns_pc_ref(req);
1146 }
1147 return ret;
1148 }
1149
nvmet_req_init(struct nvmet_req * req,struct nvmet_sq * sq,const struct nvmet_fabrics_ops * ops)1150 bool nvmet_req_init(struct nvmet_req *req, struct nvmet_sq *sq,
1151 const struct nvmet_fabrics_ops *ops)
1152 {
1153 u8 flags = req->cmd->common.flags;
1154 u16 status;
1155
1156 req->cq = sq->cq;
1157 req->sq = sq;
1158 req->ops = ops;
1159 req->sg = NULL;
1160 req->metadata_sg = NULL;
1161 req->sg_cnt = 0;
1162 req->metadata_sg_cnt = 0;
1163 req->transfer_len = 0;
1164 req->metadata_len = 0;
1165 req->cqe->result.u64 = 0;
1166 req->cqe->status = 0;
1167 req->cqe->sq_head = 0;
1168 req->ns = NULL;
1169 req->error_loc = NVMET_NO_ERROR_LOC;
1170 req->error_slba = 0;
1171 req->pc_ref = NULL;
1172
1173 /* no support for fused commands yet */
1174 if (unlikely(flags & (NVME_CMD_FUSE_FIRST | NVME_CMD_FUSE_SECOND))) {
1175 req->error_loc = offsetof(struct nvme_common_command, flags);
1176 status = NVME_SC_INVALID_FIELD | NVME_STATUS_DNR;
1177 goto fail;
1178 }
1179
1180 /*
1181 * For fabrics, PSDT field shall describe metadata pointer (MPTR) that
1182 * contains an address of a single contiguous physical buffer that is
1183 * byte aligned. For PCI controllers, this is optional so not enforced.
1184 */
1185 if (unlikely((flags & NVME_CMD_SGL_ALL) != NVME_CMD_SGL_METABUF)) {
1186 if (!req->sq->ctrl || !nvmet_is_pci_ctrl(req->sq->ctrl)) {
1187 req->error_loc =
1188 offsetof(struct nvme_common_command, flags);
1189 status = NVME_SC_INVALID_FIELD | NVME_STATUS_DNR;
1190 goto fail;
1191 }
1192 }
1193
1194 if (unlikely(!req->sq->ctrl))
1195 /* will return an error for any non-connect command: */
1196 status = nvmet_parse_connect_cmd(req);
1197 else if (likely(req->sq->qid != 0))
1198 status = nvmet_parse_io_cmd(req);
1199 else
1200 status = nvmet_parse_admin_cmd(req);
1201
1202 if (status)
1203 goto fail;
1204
1205 trace_nvmet_req_init(req, req->cmd);
1206
1207 if (unlikely(!percpu_ref_tryget_live(&sq->ref))) {
1208 status = NVME_SC_INVALID_FIELD | NVME_STATUS_DNR;
1209 goto fail;
1210 }
1211
1212 if (sq->ctrl)
1213 sq->ctrl->reset_tbkas = true;
1214
1215 return true;
1216
1217 fail:
1218 __nvmet_req_complete(req, status);
1219 return false;
1220 }
1221 EXPORT_SYMBOL_GPL(nvmet_req_init);
1222
nvmet_req_uninit(struct nvmet_req * req)1223 void nvmet_req_uninit(struct nvmet_req *req)
1224 {
1225 percpu_ref_put(&req->sq->ref);
1226 if (req->pc_ref)
1227 nvmet_pr_put_ns_pc_ref(req->pc_ref);
1228 if (req->ns)
1229 nvmet_put_namespace(req->ns);
1230 }
1231 EXPORT_SYMBOL_GPL(nvmet_req_uninit);
1232
nvmet_req_transfer_len(struct nvmet_req * req)1233 size_t nvmet_req_transfer_len(struct nvmet_req *req)
1234 {
1235 if (likely(req->sq->qid != 0))
1236 return nvmet_io_cmd_transfer_len(req);
1237 if (unlikely(!req->sq->ctrl))
1238 return nvmet_connect_cmd_data_len(req);
1239 return nvmet_admin_cmd_data_len(req);
1240 }
1241 EXPORT_SYMBOL_GPL(nvmet_req_transfer_len);
1242
nvmet_check_transfer_len(struct nvmet_req * req,size_t len)1243 bool nvmet_check_transfer_len(struct nvmet_req *req, size_t len)
1244 {
1245 if (unlikely(len != req->transfer_len)) {
1246 u16 status;
1247
1248 req->error_loc = offsetof(struct nvme_common_command, dptr);
1249 if (req->cmd->common.flags & NVME_CMD_SGL_ALL)
1250 status = NVME_SC_SGL_INVALID_DATA;
1251 else
1252 status = NVME_SC_INVALID_FIELD;
1253 nvmet_req_complete(req, status | NVME_STATUS_DNR);
1254 return false;
1255 }
1256
1257 return true;
1258 }
1259 EXPORT_SYMBOL_GPL(nvmet_check_transfer_len);
1260
nvmet_check_data_len_lte(struct nvmet_req * req,size_t data_len)1261 bool nvmet_check_data_len_lte(struct nvmet_req *req, size_t data_len)
1262 {
1263 if (unlikely(data_len > req->transfer_len)) {
1264 u16 status;
1265
1266 req->error_loc = offsetof(struct nvme_common_command, dptr);
1267 if (req->cmd->common.flags & NVME_CMD_SGL_ALL)
1268 status = NVME_SC_SGL_INVALID_DATA;
1269 else
1270 status = NVME_SC_INVALID_FIELD;
1271 nvmet_req_complete(req, status | NVME_STATUS_DNR);
1272 return false;
1273 }
1274
1275 return true;
1276 }
1277
nvmet_data_transfer_len(struct nvmet_req * req)1278 static unsigned int nvmet_data_transfer_len(struct nvmet_req *req)
1279 {
1280 return req->transfer_len - req->metadata_len;
1281 }
1282
nvmet_req_alloc_p2pmem_sgls(struct pci_dev * p2p_dev,struct nvmet_req * req)1283 static int nvmet_req_alloc_p2pmem_sgls(struct pci_dev *p2p_dev,
1284 struct nvmet_req *req)
1285 {
1286 req->sg = pci_p2pmem_alloc_sgl(p2p_dev, &req->sg_cnt,
1287 nvmet_data_transfer_len(req));
1288 if (!req->sg)
1289 goto out_err;
1290
1291 if (req->metadata_len) {
1292 req->metadata_sg = pci_p2pmem_alloc_sgl(p2p_dev,
1293 &req->metadata_sg_cnt, req->metadata_len);
1294 if (!req->metadata_sg)
1295 goto out_free_sg;
1296 }
1297
1298 req->p2p_dev = p2p_dev;
1299
1300 return 0;
1301 out_free_sg:
1302 pci_p2pmem_free_sgl(req->p2p_dev, req->sg);
1303 out_err:
1304 return -ENOMEM;
1305 }
1306
nvmet_req_find_p2p_dev(struct nvmet_req * req)1307 static struct pci_dev *nvmet_req_find_p2p_dev(struct nvmet_req *req)
1308 {
1309 if (!IS_ENABLED(CONFIG_PCI_P2PDMA) ||
1310 !req->sq->ctrl || !req->sq->qid || !req->ns)
1311 return NULL;
1312 return radix_tree_lookup(&req->sq->ctrl->p2p_ns_map, req->ns->nsid);
1313 }
1314
nvmet_req_alloc_sgls(struct nvmet_req * req)1315 int nvmet_req_alloc_sgls(struct nvmet_req *req)
1316 {
1317 struct pci_dev *p2p_dev = nvmet_req_find_p2p_dev(req);
1318
1319 if (p2p_dev && !nvmet_req_alloc_p2pmem_sgls(p2p_dev, req))
1320 return 0;
1321
1322 req->sg = sgl_alloc(nvmet_data_transfer_len(req), GFP_KERNEL,
1323 &req->sg_cnt);
1324 if (unlikely(!req->sg))
1325 goto out;
1326
1327 if (req->metadata_len) {
1328 req->metadata_sg = sgl_alloc(req->metadata_len, GFP_KERNEL,
1329 &req->metadata_sg_cnt);
1330 if (unlikely(!req->metadata_sg))
1331 goto out_free;
1332 }
1333
1334 return 0;
1335 out_free:
1336 sgl_free(req->sg);
1337 out:
1338 return -ENOMEM;
1339 }
1340 EXPORT_SYMBOL_GPL(nvmet_req_alloc_sgls);
1341
nvmet_req_free_sgls(struct nvmet_req * req)1342 void nvmet_req_free_sgls(struct nvmet_req *req)
1343 {
1344 if (req->p2p_dev) {
1345 pci_p2pmem_free_sgl(req->p2p_dev, req->sg);
1346 if (req->metadata_sg)
1347 pci_p2pmem_free_sgl(req->p2p_dev, req->metadata_sg);
1348 req->p2p_dev = NULL;
1349 } else {
1350 sgl_free(req->sg);
1351 if (req->metadata_sg)
1352 sgl_free(req->metadata_sg);
1353 }
1354
1355 req->sg = NULL;
1356 req->metadata_sg = NULL;
1357 req->sg_cnt = 0;
1358 req->metadata_sg_cnt = 0;
1359 }
1360 EXPORT_SYMBOL_GPL(nvmet_req_free_sgls);
1361
nvmet_css_supported(u8 cc_css)1362 static inline bool nvmet_css_supported(u8 cc_css)
1363 {
1364 switch (cc_css << NVME_CC_CSS_SHIFT) {
1365 case NVME_CC_CSS_NVM:
1366 case NVME_CC_CSS_CSI:
1367 return true;
1368 default:
1369 return false;
1370 }
1371 }
1372
nvmet_start_ctrl(struct nvmet_ctrl * ctrl)1373 static void nvmet_start_ctrl(struct nvmet_ctrl *ctrl)
1374 {
1375 lockdep_assert_held(&ctrl->lock);
1376
1377 /*
1378 * Only I/O controllers should verify iosqes,iocqes.
1379 * Strictly speaking, the spec says a discovery controller
1380 * should verify iosqes,iocqes are zeroed, however that
1381 * would break backwards compatibility, so don't enforce it.
1382 */
1383 if (!nvmet_is_disc_subsys(ctrl->subsys) &&
1384 (nvmet_cc_iosqes(ctrl->cc) != NVME_NVM_IOSQES ||
1385 nvmet_cc_iocqes(ctrl->cc) != NVME_NVM_IOCQES)) {
1386 ctrl->csts = NVME_CSTS_CFS;
1387 return;
1388 }
1389
1390 if (nvmet_cc_mps(ctrl->cc) != 0 ||
1391 nvmet_cc_ams(ctrl->cc) != 0 ||
1392 !nvmet_css_supported(nvmet_cc_css(ctrl->cc))) {
1393 ctrl->csts = NVME_CSTS_CFS;
1394 return;
1395 }
1396
1397 ctrl->csts = NVME_CSTS_RDY;
1398
1399 /*
1400 * Controllers that are not yet enabled should not really enforce the
1401 * keep alive timeout, but we still want to track a timeout and cleanup
1402 * in case a host died before it enabled the controller. Hence, simply
1403 * reset the keep alive timer when the controller is enabled.
1404 */
1405 if (ctrl->kato)
1406 mod_delayed_work(nvmet_wq, &ctrl->ka_work, ctrl->kato * HZ);
1407 }
1408
nvmet_clear_ctrl(struct nvmet_ctrl * ctrl)1409 static void nvmet_clear_ctrl(struct nvmet_ctrl *ctrl)
1410 {
1411 lockdep_assert_held(&ctrl->lock);
1412
1413 /* XXX: tear down queues? */
1414 ctrl->csts &= ~NVME_CSTS_RDY;
1415 ctrl->cc = 0;
1416 }
1417
nvmet_update_cc(struct nvmet_ctrl * ctrl,u32 new)1418 void nvmet_update_cc(struct nvmet_ctrl *ctrl, u32 new)
1419 {
1420 u32 old;
1421
1422 mutex_lock(&ctrl->lock);
1423 old = ctrl->cc;
1424 ctrl->cc = new;
1425
1426 if (nvmet_cc_en(new) && !nvmet_cc_en(old))
1427 nvmet_start_ctrl(ctrl);
1428 if (!nvmet_cc_en(new) && nvmet_cc_en(old))
1429 nvmet_clear_ctrl(ctrl);
1430 if (nvmet_cc_shn(new) && !nvmet_cc_shn(old)) {
1431 nvmet_clear_ctrl(ctrl);
1432 ctrl->csts |= NVME_CSTS_SHST_CMPLT;
1433 }
1434 if (!nvmet_cc_shn(new) && nvmet_cc_shn(old))
1435 ctrl->csts &= ~NVME_CSTS_SHST_CMPLT;
1436 mutex_unlock(&ctrl->lock);
1437 }
1438 EXPORT_SYMBOL_GPL(nvmet_update_cc);
1439
nvmet_init_cap(struct nvmet_ctrl * ctrl)1440 static void nvmet_init_cap(struct nvmet_ctrl *ctrl)
1441 {
1442 /* command sets supported: NVMe command set: */
1443 ctrl->cap = (1ULL << 37);
1444 /* Controller supports one or more I/O Command Sets */
1445 ctrl->cap |= (1ULL << 43);
1446 /* CC.EN timeout in 500msec units: */
1447 ctrl->cap |= (15ULL << 24);
1448 /* maximum queue entries supported: */
1449 if (ctrl->ops->get_max_queue_size)
1450 ctrl->cap |= min_t(u16, ctrl->ops->get_max_queue_size(ctrl),
1451 ctrl->port->max_queue_size) - 1;
1452 else
1453 ctrl->cap |= ctrl->port->max_queue_size - 1;
1454
1455 if (nvmet_is_passthru_subsys(ctrl->subsys))
1456 nvmet_passthrough_override_cap(ctrl);
1457 }
1458
nvmet_ctrl_find_get(const char * subsysnqn,const char * hostnqn,u16 cntlid,struct nvmet_req * req)1459 struct nvmet_ctrl *nvmet_ctrl_find_get(const char *subsysnqn,
1460 const char *hostnqn, u16 cntlid,
1461 struct nvmet_req *req)
1462 {
1463 struct nvmet_ctrl *ctrl = NULL;
1464 struct nvmet_subsys *subsys;
1465
1466 subsys = nvmet_find_get_subsys(req->port, subsysnqn);
1467 if (!subsys) {
1468 pr_warn("connect request for invalid subsystem %s!\n",
1469 subsysnqn);
1470 req->cqe->result.u32 = IPO_IATTR_CONNECT_DATA(subsysnqn);
1471 goto out;
1472 }
1473
1474 mutex_lock(&subsys->lock);
1475 list_for_each_entry(ctrl, &subsys->ctrls, subsys_entry) {
1476 if (ctrl->cntlid == cntlid) {
1477 if (strncmp(hostnqn, ctrl->hostnqn, NVMF_NQN_SIZE)) {
1478 pr_warn("hostnqn mismatch.\n");
1479 continue;
1480 }
1481 if (!kref_get_unless_zero(&ctrl->ref))
1482 continue;
1483
1484 /* ctrl found */
1485 goto found;
1486 }
1487 }
1488
1489 ctrl = NULL; /* ctrl not found */
1490 pr_warn("could not find controller %d for subsys %s / host %s\n",
1491 cntlid, subsysnqn, hostnqn);
1492 req->cqe->result.u32 = IPO_IATTR_CONNECT_DATA(cntlid);
1493
1494 found:
1495 mutex_unlock(&subsys->lock);
1496 nvmet_subsys_put(subsys);
1497 out:
1498 return ctrl;
1499 }
1500
nvmet_check_ctrl_status(struct nvmet_req * req)1501 u16 nvmet_check_ctrl_status(struct nvmet_req *req)
1502 {
1503 if (unlikely(!(req->sq->ctrl->cc & NVME_CC_ENABLE))) {
1504 pr_err("got cmd %d while CC.EN == 0 on qid = %d\n",
1505 req->cmd->common.opcode, req->sq->qid);
1506 return NVME_SC_CMD_SEQ_ERROR | NVME_STATUS_DNR;
1507 }
1508
1509 if (unlikely(!(req->sq->ctrl->csts & NVME_CSTS_RDY))) {
1510 pr_err("got cmd %d while CSTS.RDY == 0 on qid = %d\n",
1511 req->cmd->common.opcode, req->sq->qid);
1512 return NVME_SC_CMD_SEQ_ERROR | NVME_STATUS_DNR;
1513 }
1514
1515 if (unlikely(!nvmet_check_auth_status(req))) {
1516 pr_warn("qid %d not authenticated\n", req->sq->qid);
1517 return NVME_SC_AUTH_REQUIRED | NVME_STATUS_DNR;
1518 }
1519 return 0;
1520 }
1521
nvmet_host_allowed(struct nvmet_subsys * subsys,const char * hostnqn)1522 bool nvmet_host_allowed(struct nvmet_subsys *subsys, const char *hostnqn)
1523 {
1524 struct nvmet_host_link *p;
1525
1526 lockdep_assert_held(&nvmet_config_sem);
1527
1528 if (subsys->allow_any_host)
1529 return true;
1530
1531 if (nvmet_is_disc_subsys(subsys)) /* allow all access to disc subsys */
1532 return true;
1533
1534 list_for_each_entry(p, &subsys->hosts, entry) {
1535 if (!strcmp(nvmet_host_name(p->host), hostnqn))
1536 return true;
1537 }
1538
1539 return false;
1540 }
1541
nvmet_setup_p2p_ns_map(struct nvmet_ctrl * ctrl,struct device * p2p_client)1542 static void nvmet_setup_p2p_ns_map(struct nvmet_ctrl *ctrl,
1543 struct device *p2p_client)
1544 {
1545 struct nvmet_ns *ns;
1546 unsigned long idx;
1547
1548 lockdep_assert_held(&ctrl->subsys->lock);
1549
1550 if (!p2p_client)
1551 return;
1552
1553 ctrl->p2p_client = get_device(p2p_client);
1554
1555 nvmet_for_each_enabled_ns(&ctrl->subsys->namespaces, idx, ns)
1556 nvmet_p2pmem_ns_add_p2p(ctrl, ns);
1557 }
1558
nvmet_release_p2p_ns_map(struct nvmet_ctrl * ctrl)1559 static void nvmet_release_p2p_ns_map(struct nvmet_ctrl *ctrl)
1560 {
1561 struct radix_tree_iter iter;
1562 void __rcu **slot;
1563
1564 lockdep_assert_held(&ctrl->subsys->lock);
1565
1566 radix_tree_for_each_slot(slot, &ctrl->p2p_ns_map, &iter, 0)
1567 pci_dev_put(radix_tree_deref_slot(slot));
1568
1569 put_device(ctrl->p2p_client);
1570 }
1571
nvmet_fatal_error_handler(struct work_struct * work)1572 static void nvmet_fatal_error_handler(struct work_struct *work)
1573 {
1574 struct nvmet_ctrl *ctrl =
1575 container_of(work, struct nvmet_ctrl, fatal_err_work);
1576
1577 pr_err("ctrl %d fatal error occurred!\n", ctrl->cntlid);
1578 ctrl->ops->delete_ctrl(ctrl);
1579 }
1580
nvmet_alloc_ctrl(struct nvmet_alloc_ctrl_args * args)1581 struct nvmet_ctrl *nvmet_alloc_ctrl(struct nvmet_alloc_ctrl_args *args)
1582 {
1583 struct nvmet_subsys *subsys;
1584 struct nvmet_ctrl *ctrl;
1585 u32 kato = args->kato;
1586 u8 dhchap_status;
1587 int ret;
1588
1589 args->status = NVME_SC_CONNECT_INVALID_PARAM | NVME_STATUS_DNR;
1590 subsys = nvmet_find_get_subsys(args->port, args->subsysnqn);
1591 if (!subsys) {
1592 pr_warn("connect request for invalid subsystem %s!\n",
1593 args->subsysnqn);
1594 args->result = IPO_IATTR_CONNECT_DATA(subsysnqn);
1595 args->error_loc = offsetof(struct nvme_common_command, dptr);
1596 return NULL;
1597 }
1598
1599 down_read(&nvmet_config_sem);
1600 if (!nvmet_host_allowed(subsys, args->hostnqn)) {
1601 pr_info("connect by host %s for subsystem %s not allowed\n",
1602 args->hostnqn, args->subsysnqn);
1603 args->result = IPO_IATTR_CONNECT_DATA(hostnqn);
1604 up_read(&nvmet_config_sem);
1605 args->status = NVME_SC_CONNECT_INVALID_HOST | NVME_STATUS_DNR;
1606 args->error_loc = offsetof(struct nvme_common_command, dptr);
1607 goto out_put_subsystem;
1608 }
1609 up_read(&nvmet_config_sem);
1610
1611 args->status = NVME_SC_INTERNAL;
1612 ctrl = kzalloc_obj(*ctrl);
1613 if (!ctrl)
1614 goto out_put_subsystem;
1615 mutex_init(&ctrl->lock);
1616
1617 ctrl->port = args->port;
1618 ctrl->ops = args->ops;
1619
1620 #ifdef CONFIG_NVME_TARGET_PASSTHRU
1621 /* By default, set loop targets to clear IDS by default */
1622 if (ctrl->port->disc_addr.trtype == NVMF_TRTYPE_LOOP)
1623 subsys->clear_ids = 1;
1624 #endif
1625
1626 INIT_WORK(&ctrl->async_event_work, nvmet_async_event_work);
1627 INIT_LIST_HEAD(&ctrl->async_events);
1628 INIT_RADIX_TREE(&ctrl->p2p_ns_map, GFP_KERNEL);
1629 INIT_WORK(&ctrl->fatal_err_work, nvmet_fatal_error_handler);
1630 INIT_DELAYED_WORK(&ctrl->ka_work, nvmet_keep_alive_timer);
1631
1632 memcpy(ctrl->hostnqn, args->hostnqn, NVMF_NQN_SIZE);
1633
1634 kref_init(&ctrl->ref);
1635 ctrl->subsys = subsys;
1636 ctrl->pi_support = ctrl->port->pi_enable && ctrl->subsys->pi_support;
1637 nvmet_init_cap(ctrl);
1638 WRITE_ONCE(ctrl->aen_enabled, NVMET_AEN_CFG_OPTIONAL);
1639
1640 ctrl->changed_ns_list = kmalloc_array(NVME_MAX_CHANGED_NAMESPACES,
1641 sizeof(__le32), GFP_KERNEL);
1642 if (!ctrl->changed_ns_list)
1643 goto out_free_ctrl;
1644
1645 ctrl->sqs = kzalloc_objs(struct nvmet_sq *, subsys->max_qid + 1);
1646 if (!ctrl->sqs)
1647 goto out_free_changed_ns_list;
1648
1649 ctrl->cqs = kzalloc_objs(struct nvmet_cq *, subsys->max_qid + 1);
1650 if (!ctrl->cqs)
1651 goto out_free_sqs;
1652
1653 ret = ida_alloc_range(&cntlid_ida,
1654 subsys->cntlid_min, subsys->cntlid_max,
1655 GFP_KERNEL);
1656 if (ret < 0) {
1657 args->status = NVME_SC_CONNECT_CTRL_BUSY | NVME_STATUS_DNR;
1658 goto out_free_cqs;
1659 }
1660 ctrl->cntlid = ret;
1661
1662 /*
1663 * Discovery controllers may use some arbitrary high value
1664 * in order to cleanup stale discovery sessions
1665 */
1666 if (nvmet_is_disc_subsys(ctrl->subsys) && !kato)
1667 kato = NVMET_DISC_KATO_MS;
1668
1669 /* keep-alive timeout in seconds */
1670 ctrl->kato = DIV_ROUND_UP(kato, 1000);
1671
1672 ctrl->err_counter = 0;
1673 spin_lock_init(&ctrl->error_lock);
1674
1675 nvmet_start_keep_alive_timer(ctrl);
1676
1677 mutex_lock(&subsys->lock);
1678 ret = nvmet_ctrl_init_pr(ctrl);
1679 if (ret)
1680 goto init_pr_fail;
1681 list_add_tail(&ctrl->subsys_entry, &subsys->ctrls);
1682 nvmet_setup_p2p_ns_map(ctrl, args->p2p_client);
1683 nvmet_debugfs_ctrl_setup(ctrl);
1684 mutex_unlock(&subsys->lock);
1685
1686 if (args->hostid)
1687 uuid_copy(&ctrl->hostid, args->hostid);
1688
1689 dhchap_status = nvmet_setup_auth(ctrl, args->sq);
1690 if (dhchap_status) {
1691 pr_err("Failed to setup authentication, dhchap status %u\n",
1692 dhchap_status);
1693 nvmet_ctrl_put(ctrl);
1694 if (dhchap_status == NVME_AUTH_DHCHAP_FAILURE_FAILED)
1695 args->status =
1696 NVME_SC_CONNECT_INVALID_HOST | NVME_STATUS_DNR;
1697 else
1698 args->status = NVME_SC_INTERNAL;
1699 return NULL;
1700 }
1701
1702 args->status = NVME_SC_SUCCESS;
1703
1704 pr_info("Created %s controller %d for subsystem %s for NQN %s%s%s%s.\n",
1705 nvmet_is_disc_subsys(ctrl->subsys) ? "discovery" : "nvm",
1706 ctrl->cntlid, ctrl->subsys->subsysnqn, ctrl->hostnqn,
1707 ctrl->pi_support ? " T10-PI is enabled" : "",
1708 nvmet_has_auth(ctrl, args->sq) ? " with DH-HMAC-CHAP" : "",
1709 nvmet_queue_tls_keyid(args->sq) ? ", TLS" : "");
1710
1711 return ctrl;
1712
1713 init_pr_fail:
1714 mutex_unlock(&subsys->lock);
1715 nvmet_stop_keep_alive_timer(ctrl);
1716 ida_free(&cntlid_ida, ctrl->cntlid);
1717 out_free_cqs:
1718 kfree(ctrl->cqs);
1719 out_free_sqs:
1720 kfree(ctrl->sqs);
1721 out_free_changed_ns_list:
1722 kfree(ctrl->changed_ns_list);
1723 out_free_ctrl:
1724 kfree(ctrl);
1725 out_put_subsystem:
1726 nvmet_subsys_put(subsys);
1727 return NULL;
1728 }
1729 EXPORT_SYMBOL_GPL(nvmet_alloc_ctrl);
1730
nvmet_ctrl_free(struct kref * ref)1731 static void nvmet_ctrl_free(struct kref *ref)
1732 {
1733 struct nvmet_ctrl *ctrl = container_of(ref, struct nvmet_ctrl, ref);
1734 struct nvmet_subsys *subsys = ctrl->subsys;
1735
1736 mutex_lock(&subsys->lock);
1737 nvmet_ctrl_destroy_pr(ctrl);
1738 nvmet_release_p2p_ns_map(ctrl);
1739 list_del(&ctrl->subsys_entry);
1740 mutex_unlock(&subsys->lock);
1741
1742 nvmet_stop_keep_alive_timer(ctrl);
1743
1744 flush_work(&ctrl->async_event_work);
1745 cancel_work_sync(&ctrl->fatal_err_work);
1746
1747 nvmet_destroy_auth(ctrl);
1748
1749 nvmet_debugfs_ctrl_free(ctrl);
1750
1751 ida_free(&cntlid_ida, ctrl->cntlid);
1752
1753 nvmet_async_events_free(ctrl);
1754 kfree(ctrl->sqs);
1755 kfree(ctrl->cqs);
1756 kfree(ctrl->changed_ns_list);
1757 kfree(ctrl);
1758
1759 nvmet_subsys_put(subsys);
1760 }
1761
nvmet_ctrl_put(struct nvmet_ctrl * ctrl)1762 void nvmet_ctrl_put(struct nvmet_ctrl *ctrl)
1763 {
1764 kref_put(&ctrl->ref, nvmet_ctrl_free);
1765 }
1766 EXPORT_SYMBOL_GPL(nvmet_ctrl_put);
1767
nvmet_ctrl_fatal_error(struct nvmet_ctrl * ctrl)1768 void nvmet_ctrl_fatal_error(struct nvmet_ctrl *ctrl)
1769 {
1770 mutex_lock(&ctrl->lock);
1771 if (!(ctrl->csts & NVME_CSTS_CFS)) {
1772 ctrl->csts |= NVME_CSTS_CFS;
1773 queue_work(nvmet_wq, &ctrl->fatal_err_work);
1774 }
1775 mutex_unlock(&ctrl->lock);
1776 }
1777 EXPORT_SYMBOL_GPL(nvmet_ctrl_fatal_error);
1778
nvmet_ctrl_host_traddr(struct nvmet_ctrl * ctrl,char * traddr,size_t traddr_len)1779 ssize_t nvmet_ctrl_host_traddr(struct nvmet_ctrl *ctrl,
1780 char *traddr, size_t traddr_len)
1781 {
1782 if (!ctrl->ops->host_traddr)
1783 return -EOPNOTSUPP;
1784 return ctrl->ops->host_traddr(ctrl, traddr, traddr_len);
1785 }
1786
nvmet_find_get_subsys(struct nvmet_port * port,const char * subsysnqn)1787 static struct nvmet_subsys *nvmet_find_get_subsys(struct nvmet_port *port,
1788 const char *subsysnqn)
1789 {
1790 struct nvmet_subsys_link *p;
1791
1792 if (!port)
1793 return NULL;
1794
1795 if (!strcmp(NVME_DISC_SUBSYS_NAME, subsysnqn)) {
1796 if (!kref_get_unless_zero(&nvmet_disc_subsys->ref))
1797 return NULL;
1798 return nvmet_disc_subsys;
1799 }
1800
1801 down_read(&nvmet_config_sem);
1802 if (!strncmp(nvmet_disc_subsys->subsysnqn, subsysnqn,
1803 NVMF_NQN_SIZE)) {
1804 if (kref_get_unless_zero(&nvmet_disc_subsys->ref)) {
1805 up_read(&nvmet_config_sem);
1806 return nvmet_disc_subsys;
1807 }
1808 }
1809 list_for_each_entry(p, &port->subsystems, entry) {
1810 if (!strncmp(p->subsys->subsysnqn, subsysnqn,
1811 NVMF_NQN_SIZE)) {
1812 if (!kref_get_unless_zero(&p->subsys->ref))
1813 break;
1814 up_read(&nvmet_config_sem);
1815 return p->subsys;
1816 }
1817 }
1818 up_read(&nvmet_config_sem);
1819 return NULL;
1820 }
1821
nvmet_subsys_alloc(const char * subsysnqn,enum nvme_subsys_type type)1822 struct nvmet_subsys *nvmet_subsys_alloc(const char *subsysnqn,
1823 enum nvme_subsys_type type)
1824 {
1825 struct nvmet_subsys *subsys;
1826 char serial[NVMET_SN_MAX_SIZE / 2];
1827 int ret;
1828
1829 subsys = kzalloc_obj(*subsys);
1830 if (!subsys)
1831 return ERR_PTR(-ENOMEM);
1832
1833 subsys->ver = NVMET_DEFAULT_VS;
1834 /* generate a random serial number as our controllers are ephemeral: */
1835 get_random_bytes(&serial, sizeof(serial));
1836 bin2hex(subsys->serial, &serial, sizeof(serial));
1837
1838 subsys->model_number = kstrdup(NVMET_DEFAULT_CTRL_MODEL, GFP_KERNEL);
1839 if (!subsys->model_number) {
1840 ret = -ENOMEM;
1841 goto free_subsys;
1842 }
1843
1844 subsys->ieee_oui = 0;
1845
1846 subsys->firmware_rev = kstrndup(UTS_RELEASE, NVMET_FR_MAX_SIZE, GFP_KERNEL);
1847 if (!subsys->firmware_rev) {
1848 ret = -ENOMEM;
1849 goto free_mn;
1850 }
1851
1852 switch (type) {
1853 case NVME_NQN_NVME:
1854 subsys->max_qid = NVMET_NR_QUEUES;
1855 break;
1856 case NVME_NQN_DISC:
1857 case NVME_NQN_CURR:
1858 subsys->max_qid = 0;
1859 break;
1860 default:
1861 pr_err("%s: Unknown Subsystem type - %d\n", __func__, type);
1862 ret = -EINVAL;
1863 goto free_fr;
1864 }
1865 subsys->type = type;
1866 subsys->subsysnqn = kstrndup(subsysnqn, NVMF_NQN_SIZE,
1867 GFP_KERNEL);
1868 if (!subsys->subsysnqn) {
1869 ret = -ENOMEM;
1870 goto free_fr;
1871 }
1872 subsys->cntlid_min = NVME_CNTLID_MIN;
1873 subsys->cntlid_max = NVME_CNTLID_MAX;
1874 kref_init(&subsys->ref);
1875
1876 mutex_init(&subsys->lock);
1877 xa_init(&subsys->namespaces);
1878 INIT_LIST_HEAD(&subsys->ctrls);
1879 INIT_LIST_HEAD(&subsys->hosts);
1880
1881 ret = nvmet_debugfs_subsys_setup(subsys);
1882 if (ret)
1883 goto free_subsysnqn;
1884
1885 return subsys;
1886
1887 free_subsysnqn:
1888 kfree(subsys->subsysnqn);
1889 free_fr:
1890 kfree(subsys->firmware_rev);
1891 free_mn:
1892 kfree(subsys->model_number);
1893 free_subsys:
1894 kfree(subsys);
1895 return ERR_PTR(ret);
1896 }
1897
nvmet_subsys_free(struct kref * ref)1898 static void nvmet_subsys_free(struct kref *ref)
1899 {
1900 struct nvmet_subsys *subsys =
1901 container_of(ref, struct nvmet_subsys, ref);
1902
1903 WARN_ON_ONCE(!list_empty(&subsys->ctrls));
1904 WARN_ON_ONCE(!list_empty(&subsys->hosts));
1905 WARN_ON_ONCE(!xa_empty(&subsys->namespaces));
1906
1907 nvmet_debugfs_subsys_free(subsys);
1908
1909 xa_destroy(&subsys->namespaces);
1910 nvmet_passthru_subsys_free(subsys);
1911
1912 kfree(subsys->subsysnqn);
1913 kfree(subsys->model_number);
1914 kfree(subsys->firmware_rev);
1915 kfree(subsys);
1916 }
1917
nvmet_subsys_del_ctrls(struct nvmet_subsys * subsys)1918 void nvmet_subsys_del_ctrls(struct nvmet_subsys *subsys)
1919 {
1920 struct nvmet_ctrl *ctrl;
1921
1922 mutex_lock(&subsys->lock);
1923 list_for_each_entry(ctrl, &subsys->ctrls, subsys_entry)
1924 ctrl->ops->delete_ctrl(ctrl);
1925 mutex_unlock(&subsys->lock);
1926 }
1927
nvmet_subsys_put(struct nvmet_subsys * subsys)1928 void nvmet_subsys_put(struct nvmet_subsys *subsys)
1929 {
1930 kref_put(&subsys->ref, nvmet_subsys_free);
1931 }
1932
nvmet_init(void)1933 static int __init nvmet_init(void)
1934 {
1935 int error = -ENOMEM;
1936
1937 nvmet_ana_group_enabled[NVMET_DEFAULT_ANA_GRPID] = 1;
1938
1939 nvmet_bvec_cache = kmem_cache_create("nvmet-bvec",
1940 NVMET_MAX_MPOOL_BVEC * sizeof(struct bio_vec), 0,
1941 SLAB_HWCACHE_ALIGN, NULL);
1942 if (!nvmet_bvec_cache)
1943 return -ENOMEM;
1944
1945 zbd_wq = alloc_workqueue("nvmet-zbd-wq", WQ_MEM_RECLAIM, 0);
1946 if (!zbd_wq)
1947 goto out_destroy_bvec_cache;
1948
1949 buffered_io_wq = alloc_workqueue("nvmet-buffered-io-wq",
1950 WQ_MEM_RECLAIM, 0);
1951 if (!buffered_io_wq)
1952 goto out_free_zbd_work_queue;
1953
1954 nvmet_wq = alloc_workqueue("nvmet-wq",
1955 WQ_MEM_RECLAIM | WQ_UNBOUND | WQ_SYSFS, 0);
1956 if (!nvmet_wq)
1957 goto out_free_buffered_work_queue;
1958
1959 error = nvmet_init_debugfs();
1960 if (error)
1961 goto out_free_nvmet_work_queue;
1962
1963 error = nvmet_init_discovery();
1964 if (error)
1965 goto out_exit_debugfs;
1966
1967 error = nvmet_init_configfs();
1968 if (error)
1969 goto out_exit_discovery;
1970
1971 return 0;
1972
1973 out_exit_discovery:
1974 nvmet_exit_discovery();
1975 out_exit_debugfs:
1976 nvmet_exit_debugfs();
1977 out_free_nvmet_work_queue:
1978 destroy_workqueue(nvmet_wq);
1979 out_free_buffered_work_queue:
1980 destroy_workqueue(buffered_io_wq);
1981 out_free_zbd_work_queue:
1982 destroy_workqueue(zbd_wq);
1983 out_destroy_bvec_cache:
1984 kmem_cache_destroy(nvmet_bvec_cache);
1985 return error;
1986 }
1987
nvmet_exit(void)1988 static void __exit nvmet_exit(void)
1989 {
1990 nvmet_exit_configfs();
1991 nvmet_exit_discovery();
1992 nvmet_exit_debugfs();
1993 ida_destroy(&cntlid_ida);
1994 destroy_workqueue(nvmet_wq);
1995 destroy_workqueue(buffered_io_wq);
1996 destroy_workqueue(zbd_wq);
1997 kmem_cache_destroy(nvmet_bvec_cache);
1998
1999 BUILD_BUG_ON(sizeof(struct nvmf_disc_rsp_page_entry) != 1024);
2000 BUILD_BUG_ON(sizeof(struct nvmf_disc_rsp_page_hdr) != 1024);
2001 }
2002
2003 module_init(nvmet_init);
2004 module_exit(nvmet_exit);
2005
2006 MODULE_DESCRIPTION("NVMe target core framework");
2007 MODULE_LICENSE("GPL v2");
2008