xref: /linux/drivers/target/tcm_fc/tfc_conf.c (revision e3c55d406bd8df1a878546002c93db90c42be10c)
1 /*******************************************************************************
2  * Filename:  tcm_fc.c
3  *
4  * This file contains the configfs implementation for TCM_fc fabric node.
5  * Based on tcm_loop_configfs.c
6  *
7  * Copyright (c) 2010 Cisco Systems, Inc.
8  * Copyright (c) 2009,2010 Rising Tide, Inc.
9  * Copyright (c) 2009,2010 Linux-iSCSI.org
10  *
11  * Copyright (c) 2009,2010 Nicholas A. Bellinger <nab@linux-iscsi.org>
12  *
13  * This program is free software; you can redistribute it and/or modify
14  * it under the terms of the GNU General Public License as published by
15  * the Free Software Foundation; either version 2 of the License, or
16  * (at your option) any later version.
17  *
18  * This program is distributed in the hope that it will be useful,
19  * but WITHOUT ANY WARRANTY; without even the implied warranty of
20  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
21  * GNU General Public License for more details.
22  ****************************************************************************/
23 
24 #include <linux/module.h>
25 #include <linux/moduleparam.h>
26 #include <generated/utsrelease.h>
27 #include <linux/utsname.h>
28 #include <linux/init.h>
29 #include <linux/slab.h>
30 #include <linux/kthread.h>
31 #include <linux/types.h>
32 #include <linux/string.h>
33 #include <linux/configfs.h>
34 #include <linux/kernel.h>
35 #include <linux/ctype.h>
36 #include <asm/unaligned.h>
37 #include <scsi/scsi.h>
38 #include <scsi/scsi_host.h>
39 #include <scsi/scsi_device.h>
40 #include <scsi/scsi_cmnd.h>
41 #include <scsi/libfc.h>
42 
43 #include <target/target_core_base.h>
44 #include <target/target_core_fabric.h>
45 #include <target/target_core_fabric_configfs.h>
46 #include <target/target_core_configfs.h>
47 #include <target/configfs_macros.h>
48 
49 #include "tcm_fc.h"
50 
51 struct target_fabric_configfs *ft_configfs;
52 
53 LIST_HEAD(ft_lport_list);
54 DEFINE_MUTEX(ft_lport_lock);
55 
56 unsigned int ft_debug_logging;
57 module_param_named(debug_logging, ft_debug_logging, int, S_IRUGO|S_IWUSR);
58 MODULE_PARM_DESC(debug_logging, "a bit mask of logging levels");
59 
60 /*
61  * Parse WWN.
62  * If strict, we require lower-case hex and colon separators to be sure
63  * the name is the same as what would be generated by ft_format_wwn()
64  * so the name and wwn are mapped one-to-one.
65  */
66 static ssize_t ft_parse_wwn(const char *name, u64 *wwn, int strict)
67 {
68 	const char *cp;
69 	char c;
70 	u32 byte = 0;
71 	u32 pos = 0;
72 	u32 err;
73 	int val;
74 
75 	*wwn = 0;
76 	for (cp = name; cp < &name[FT_NAMELEN - 1]; cp++) {
77 		c = *cp;
78 		if (c == '\n' && cp[1] == '\0')
79 			continue;
80 		if (strict && pos++ == 2 && byte++ < 7) {
81 			pos = 0;
82 			if (c == ':')
83 				continue;
84 			err = 1;
85 			goto fail;
86 		}
87 		if (c == '\0') {
88 			err = 2;
89 			if (strict && byte != 8)
90 				goto fail;
91 			return cp - name;
92 		}
93 		err = 3;
94 		val = hex_to_bin(c);
95 		if (val < 0 || (strict && isupper(c)))
96 			goto fail;
97 		*wwn = (*wwn << 4) | val;
98 	}
99 	err = 4;
100 fail:
101 	pr_debug("err %u len %zu pos %u byte %u\n",
102 		    err, cp - name, pos, byte);
103 	return -1;
104 }
105 
106 ssize_t ft_format_wwn(char *buf, size_t len, u64 wwn)
107 {
108 	u8 b[8];
109 
110 	put_unaligned_be64(wwn, b);
111 	return snprintf(buf, len,
112 		 "%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x",
113 		 b[0], b[1], b[2], b[3], b[4], b[5], b[6], b[7]);
114 }
115 
116 static ssize_t ft_wwn_show(void *arg, char *buf)
117 {
118 	u64 *wwn = arg;
119 	ssize_t len;
120 
121 	len = ft_format_wwn(buf, PAGE_SIZE - 2, *wwn);
122 	buf[len++] = '\n';
123 	return len;
124 }
125 
126 static ssize_t ft_wwn_store(void *arg, const char *buf, size_t len)
127 {
128 	ssize_t ret;
129 	u64 wwn;
130 
131 	ret = ft_parse_wwn(buf, &wwn, 0);
132 	if (ret > 0)
133 		*(u64 *)arg = wwn;
134 	return ret;
135 }
136 
137 /*
138  * ACL auth ops.
139  */
140 
141 static ssize_t ft_nacl_show_port_name(
142 	struct se_node_acl *se_nacl,
143 	char *page)
144 {
145 	struct ft_node_acl *acl = container_of(se_nacl,
146 			struct ft_node_acl, se_node_acl);
147 
148 	return ft_wwn_show(&acl->node_auth.port_name, page);
149 }
150 
151 static ssize_t ft_nacl_store_port_name(
152 	struct se_node_acl *se_nacl,
153 	const char *page,
154 	size_t count)
155 {
156 	struct ft_node_acl *acl = container_of(se_nacl,
157 			struct ft_node_acl, se_node_acl);
158 
159 	return ft_wwn_store(&acl->node_auth.port_name, page, count);
160 }
161 
162 TF_NACL_BASE_ATTR(ft, port_name, S_IRUGO | S_IWUSR);
163 
164 static ssize_t ft_nacl_show_node_name(
165 	struct se_node_acl *se_nacl,
166 	char *page)
167 {
168 	struct ft_node_acl *acl = container_of(se_nacl,
169 			struct ft_node_acl, se_node_acl);
170 
171 	return ft_wwn_show(&acl->node_auth.node_name, page);
172 }
173 
174 static ssize_t ft_nacl_store_node_name(
175 	struct se_node_acl *se_nacl,
176 	const char *page,
177 	size_t count)
178 {
179 	struct ft_node_acl *acl = container_of(se_nacl,
180 			struct ft_node_acl, se_node_acl);
181 
182 	return ft_wwn_store(&acl->node_auth.node_name, page, count);
183 }
184 
185 TF_NACL_BASE_ATTR(ft, node_name, S_IRUGO | S_IWUSR);
186 
187 static struct configfs_attribute *ft_nacl_base_attrs[] = {
188 	&ft_nacl_port_name.attr,
189 	&ft_nacl_node_name.attr,
190 	NULL,
191 };
192 
193 /*
194  * ACL ops.
195  */
196 
197 /*
198  * Add ACL for an initiator.  The ACL is named arbitrarily.
199  * The port_name and/or node_name are attributes.
200  */
201 static struct se_node_acl *ft_add_acl(
202 	struct se_portal_group *se_tpg,
203 	struct config_group *group,
204 	const char *name)
205 {
206 	struct ft_node_acl *acl;
207 	struct ft_tpg *tpg;
208 	u64 wwpn;
209 	u32 q_depth;
210 
211 	pr_debug("add acl %s\n", name);
212 	tpg = container_of(se_tpg, struct ft_tpg, se_tpg);
213 
214 	if (ft_parse_wwn(name, &wwpn, 1) < 0)
215 		return ERR_PTR(-EINVAL);
216 
217 	acl = kzalloc(sizeof(struct ft_node_acl), GFP_KERNEL);
218 	if (!acl)
219 		return ERR_PTR(-ENOMEM);
220 	acl->node_auth.port_name = wwpn;
221 
222 	q_depth = 32;		/* XXX bogus default - get from tpg? */
223 	return core_tpg_add_initiator_node_acl(&tpg->se_tpg,
224 				&acl->se_node_acl, name, q_depth);
225 }
226 
227 static void ft_del_acl(struct se_node_acl *se_acl)
228 {
229 	struct se_portal_group *se_tpg = se_acl->se_tpg;
230 	struct ft_tpg *tpg;
231 	struct ft_node_acl *acl = container_of(se_acl,
232 				struct ft_node_acl, se_node_acl);
233 
234 	pr_debug("del acl %s\n",
235 		config_item_name(&se_acl->acl_group.cg_item));
236 
237 	tpg = container_of(se_tpg, struct ft_tpg, se_tpg);
238 	pr_debug("del acl %p se_acl %p tpg %p se_tpg %p\n",
239 		    acl, se_acl, tpg, &tpg->se_tpg);
240 
241 	core_tpg_del_initiator_node_acl(&tpg->se_tpg, se_acl, 1);
242 	kfree(acl);
243 }
244 
245 struct ft_node_acl *ft_acl_get(struct ft_tpg *tpg, struct fc_rport_priv *rdata)
246 {
247 	struct ft_node_acl *found = NULL;
248 	struct ft_node_acl *acl;
249 	struct se_portal_group *se_tpg = &tpg->se_tpg;
250 	struct se_node_acl *se_acl;
251 
252 	spin_lock_irq(&se_tpg->acl_node_lock);
253 	list_for_each_entry(se_acl, &se_tpg->acl_node_list, acl_list) {
254 		acl = container_of(se_acl, struct ft_node_acl, se_node_acl);
255 		pr_debug("acl %p port_name %llx\n",
256 			acl, (unsigned long long)acl->node_auth.port_name);
257 		if (acl->node_auth.port_name == rdata->ids.port_name ||
258 		    acl->node_auth.node_name == rdata->ids.node_name) {
259 			pr_debug("acl %p port_name %llx matched\n", acl,
260 				    (unsigned long long)rdata->ids.port_name);
261 			found = acl;
262 			/* XXX need to hold onto ACL */
263 			break;
264 		}
265 	}
266 	spin_unlock_irq(&se_tpg->acl_node_lock);
267 	return found;
268 }
269 
270 struct se_node_acl *ft_tpg_alloc_fabric_acl(struct se_portal_group *se_tpg)
271 {
272 	struct ft_node_acl *acl;
273 
274 	acl = kzalloc(sizeof(*acl), GFP_KERNEL);
275 	if (!acl) {
276 		pr_err("Unable to allocate struct ft_node_acl\n");
277 		return NULL;
278 	}
279 	pr_debug("acl %p\n", acl);
280 	return &acl->se_node_acl;
281 }
282 
283 static void ft_tpg_release_fabric_acl(struct se_portal_group *se_tpg,
284 				      struct se_node_acl *se_acl)
285 {
286 	struct ft_node_acl *acl = container_of(se_acl,
287 				struct ft_node_acl, se_node_acl);
288 
289 	pr_debug("acl %p\n", acl);
290 	kfree(acl);
291 }
292 
293 /*
294  * local_port port_group (tpg) ops.
295  */
296 static struct se_portal_group *ft_add_tpg(
297 	struct se_wwn *wwn,
298 	struct config_group *group,
299 	const char *name)
300 {
301 	struct ft_lport_acl *lacl;
302 	struct ft_tpg *tpg;
303 	struct workqueue_struct *wq;
304 	unsigned long index;
305 	int ret;
306 
307 	pr_debug("tcm_fc: add tpg %s\n", name);
308 
309 	/*
310 	 * Name must be "tpgt_" followed by the index.
311 	 */
312 	if (strstr(name, "tpgt_") != name)
313 		return NULL;
314 
315 	ret = kstrtoul(name + 5, 10, &index);
316 	if (ret)
317 		return NULL;
318 	if (index > UINT_MAX)
319 		return NULL;
320 
321 	lacl = container_of(wwn, struct ft_lport_acl, fc_lport_wwn);
322 	tpg = kzalloc(sizeof(*tpg), GFP_KERNEL);
323 	if (!tpg)
324 		return NULL;
325 	tpg->index = index;
326 	tpg->lport_acl = lacl;
327 	INIT_LIST_HEAD(&tpg->lun_list);
328 
329 	wq = alloc_workqueue("tcm_fc", 0, 1);
330 	if (!wq) {
331 		kfree(tpg);
332 		return NULL;
333 	}
334 
335 	ret = core_tpg_register(&ft_configfs->tf_ops, wwn, &tpg->se_tpg,
336 				tpg, TRANSPORT_TPG_TYPE_NORMAL);
337 	if (ret < 0) {
338 		destroy_workqueue(wq);
339 		kfree(tpg);
340 		return NULL;
341 	}
342 	tpg->workqueue = wq;
343 
344 	mutex_lock(&ft_lport_lock);
345 	list_add_tail(&tpg->list, &lacl->tpg_list);
346 	mutex_unlock(&ft_lport_lock);
347 
348 	return &tpg->se_tpg;
349 }
350 
351 static void ft_del_tpg(struct se_portal_group *se_tpg)
352 {
353 	struct ft_tpg *tpg = container_of(se_tpg, struct ft_tpg, se_tpg);
354 
355 	pr_debug("del tpg %s\n",
356 		    config_item_name(&tpg->se_tpg.tpg_group.cg_item));
357 
358 	destroy_workqueue(tpg->workqueue);
359 
360 	/* Wait for sessions to be freed thru RCU, for BUG_ON below */
361 	synchronize_rcu();
362 
363 	mutex_lock(&ft_lport_lock);
364 	list_del(&tpg->list);
365 	if (tpg->tport) {
366 		tpg->tport->tpg = NULL;
367 		tpg->tport = NULL;
368 	}
369 	mutex_unlock(&ft_lport_lock);
370 
371 	core_tpg_deregister(se_tpg);
372 	kfree(tpg);
373 }
374 
375 /*
376  * Verify that an lport is configured to use the tcm_fc module, and return
377  * the target port group that should be used.
378  *
379  * The caller holds ft_lport_lock.
380  */
381 struct ft_tpg *ft_lport_find_tpg(struct fc_lport *lport)
382 {
383 	struct ft_lport_acl *lacl;
384 	struct ft_tpg *tpg;
385 
386 	list_for_each_entry(lacl, &ft_lport_list, list) {
387 		if (lacl->wwpn == lport->wwpn) {
388 			list_for_each_entry(tpg, &lacl->tpg_list, list)
389 				return tpg; /* XXX for now return first entry */
390 			return NULL;
391 		}
392 	}
393 	return NULL;
394 }
395 
396 /*
397  * target config instance ops.
398  */
399 
400 /*
401  * Add lport to allowed config.
402  * The name is the WWPN in lower-case ASCII, colon-separated bytes.
403  */
404 static struct se_wwn *ft_add_lport(
405 	struct target_fabric_configfs *tf,
406 	struct config_group *group,
407 	const char *name)
408 {
409 	struct ft_lport_acl *lacl;
410 	struct ft_lport_acl *old_lacl;
411 	u64 wwpn;
412 
413 	pr_debug("add lport %s\n", name);
414 	if (ft_parse_wwn(name, &wwpn, 1) < 0)
415 		return NULL;
416 	lacl = kzalloc(sizeof(*lacl), GFP_KERNEL);
417 	if (!lacl)
418 		return NULL;
419 	lacl->wwpn = wwpn;
420 	INIT_LIST_HEAD(&lacl->tpg_list);
421 
422 	mutex_lock(&ft_lport_lock);
423 	list_for_each_entry(old_lacl, &ft_lport_list, list) {
424 		if (old_lacl->wwpn == wwpn) {
425 			mutex_unlock(&ft_lport_lock);
426 			kfree(lacl);
427 			return NULL;
428 		}
429 	}
430 	list_add_tail(&lacl->list, &ft_lport_list);
431 	ft_format_wwn(lacl->name, sizeof(lacl->name), wwpn);
432 	mutex_unlock(&ft_lport_lock);
433 
434 	return &lacl->fc_lport_wwn;
435 }
436 
437 static void ft_del_lport(struct se_wwn *wwn)
438 {
439 	struct ft_lport_acl *lacl = container_of(wwn,
440 				struct ft_lport_acl, fc_lport_wwn);
441 
442 	pr_debug("del lport %s\n", lacl->name);
443 	mutex_lock(&ft_lport_lock);
444 	list_del(&lacl->list);
445 	mutex_unlock(&ft_lport_lock);
446 
447 	kfree(lacl);
448 }
449 
450 static ssize_t ft_wwn_show_attr_version(
451 	struct target_fabric_configfs *tf,
452 	char *page)
453 {
454 	return sprintf(page, "TCM FC " FT_VERSION " on %s/%s on "
455 		""UTS_RELEASE"\n",  utsname()->sysname, utsname()->machine);
456 }
457 
458 TF_WWN_ATTR_RO(ft, version);
459 
460 static struct configfs_attribute *ft_wwn_attrs[] = {
461 	&ft_wwn_version.attr,
462 	NULL,
463 };
464 
465 static char *ft_get_fabric_name(void)
466 {
467 	return "fc";
468 }
469 
470 static char *ft_get_fabric_wwn(struct se_portal_group *se_tpg)
471 {
472 	struct ft_tpg *tpg = se_tpg->se_tpg_fabric_ptr;
473 
474 	return tpg->lport_acl->name;
475 }
476 
477 static u16 ft_get_tag(struct se_portal_group *se_tpg)
478 {
479 	struct ft_tpg *tpg = se_tpg->se_tpg_fabric_ptr;
480 
481 	/*
482 	 * This tag is used when forming SCSI Name identifier in EVPD=1 0x83
483 	 * to represent the SCSI Target Port.
484 	 */
485 	return tpg->index;
486 }
487 
488 static u32 ft_get_default_depth(struct se_portal_group *se_tpg)
489 {
490 	return 1;
491 }
492 
493 static int ft_check_false(struct se_portal_group *se_tpg)
494 {
495 	return 0;
496 }
497 
498 static void ft_set_default_node_attr(struct se_node_acl *se_nacl)
499 {
500 }
501 
502 static u32 ft_tpg_get_inst_index(struct se_portal_group *se_tpg)
503 {
504 	struct ft_tpg *tpg = se_tpg->se_tpg_fabric_ptr;
505 
506 	return tpg->index;
507 }
508 
509 static struct target_core_fabric_ops ft_fabric_ops = {
510 	.get_fabric_name =		ft_get_fabric_name,
511 	.get_fabric_proto_ident =	fc_get_fabric_proto_ident,
512 	.tpg_get_wwn =			ft_get_fabric_wwn,
513 	.tpg_get_tag =			ft_get_tag,
514 	.tpg_get_default_depth =	ft_get_default_depth,
515 	.tpg_get_pr_transport_id =	fc_get_pr_transport_id,
516 	.tpg_get_pr_transport_id_len =	fc_get_pr_transport_id_len,
517 	.tpg_parse_pr_out_transport_id = fc_parse_pr_out_transport_id,
518 	.tpg_check_demo_mode =		ft_check_false,
519 	.tpg_check_demo_mode_cache =	ft_check_false,
520 	.tpg_check_demo_mode_write_protect = ft_check_false,
521 	.tpg_check_prod_mode_write_protect = ft_check_false,
522 	.tpg_alloc_fabric_acl =		ft_tpg_alloc_fabric_acl,
523 	.tpg_release_fabric_acl =	ft_tpg_release_fabric_acl,
524 	.tpg_get_inst_index =		ft_tpg_get_inst_index,
525 	.check_stop_free =		ft_check_stop_free,
526 	.release_cmd =			ft_release_cmd,
527 	.shutdown_session =		ft_sess_shutdown,
528 	.close_session =		ft_sess_close,
529 	.sess_get_index =		ft_sess_get_index,
530 	.sess_get_initiator_sid =	NULL,
531 	.write_pending =		ft_write_pending,
532 	.write_pending_status =		ft_write_pending_status,
533 	.set_default_node_attributes =	ft_set_default_node_attr,
534 	.get_task_tag =			ft_get_task_tag,
535 	.get_cmd_state =		ft_get_cmd_state,
536 	.queue_data_in =		ft_queue_data_in,
537 	.queue_status =			ft_queue_status,
538 	.queue_tm_rsp =			ft_queue_tm_resp,
539 	/*
540 	 * Setup function pointers for generic logic in
541 	 * target_core_fabric_configfs.c
542 	 */
543 	.fabric_make_wwn =		&ft_add_lport,
544 	.fabric_drop_wwn =		&ft_del_lport,
545 	.fabric_make_tpg =		&ft_add_tpg,
546 	.fabric_drop_tpg =		&ft_del_tpg,
547 	.fabric_post_link =		NULL,
548 	.fabric_pre_unlink =		NULL,
549 	.fabric_make_np =		NULL,
550 	.fabric_drop_np =		NULL,
551 	.fabric_make_nodeacl =		&ft_add_acl,
552 	.fabric_drop_nodeacl =		&ft_del_acl,
553 };
554 
555 int ft_register_configfs(void)
556 {
557 	struct target_fabric_configfs *fabric;
558 	int ret;
559 
560 	/*
561 	 * Register the top level struct config_item_type with TCM core
562 	 */
563 	fabric = target_fabric_configfs_init(THIS_MODULE, "fc");
564 	if (IS_ERR(fabric)) {
565 		pr_err("%s: target_fabric_configfs_init() failed!\n",
566 		       __func__);
567 		return PTR_ERR(fabric);
568 	}
569 	fabric->tf_ops = ft_fabric_ops;
570 
571 	/*
572 	 * Setup default attribute lists for various fabric->tf_cit_tmpl
573 	 */
574 	TF_CIT_TMPL(fabric)->tfc_wwn_cit.ct_attrs = ft_wwn_attrs;
575 	TF_CIT_TMPL(fabric)->tfc_tpg_base_cit.ct_attrs = NULL;
576 	TF_CIT_TMPL(fabric)->tfc_tpg_attrib_cit.ct_attrs = NULL;
577 	TF_CIT_TMPL(fabric)->tfc_tpg_param_cit.ct_attrs = NULL;
578 	TF_CIT_TMPL(fabric)->tfc_tpg_np_base_cit.ct_attrs = NULL;
579 	TF_CIT_TMPL(fabric)->tfc_tpg_nacl_base_cit.ct_attrs =
580 						    ft_nacl_base_attrs;
581 	TF_CIT_TMPL(fabric)->tfc_tpg_nacl_attrib_cit.ct_attrs = NULL;
582 	TF_CIT_TMPL(fabric)->tfc_tpg_nacl_auth_cit.ct_attrs = NULL;
583 	TF_CIT_TMPL(fabric)->tfc_tpg_nacl_param_cit.ct_attrs = NULL;
584 	/*
585 	 * register the fabric for use within TCM
586 	 */
587 	ret = target_fabric_configfs_register(fabric);
588 	if (ret < 0) {
589 		pr_debug("target_fabric_configfs_register() for"
590 			    " FC Target failed!\n");
591 		target_fabric_configfs_free(fabric);
592 		return -1;
593 	}
594 
595 	/*
596 	 * Setup our local pointer to *fabric.
597 	 */
598 	ft_configfs = fabric;
599 	return 0;
600 }
601 
602 void ft_deregister_configfs(void)
603 {
604 	if (!ft_configfs)
605 		return;
606 	target_fabric_configfs_deregister(ft_configfs);
607 	ft_configfs = NULL;
608 }
609 
610 static struct notifier_block ft_notifier = {
611 	.notifier_call = ft_lport_notify
612 };
613 
614 static int __init ft_init(void)
615 {
616 	if (ft_register_configfs())
617 		return -1;
618 	if (fc_fc4_register_provider(FC_TYPE_FCP, &ft_prov)) {
619 		ft_deregister_configfs();
620 		return -1;
621 	}
622 	blocking_notifier_chain_register(&fc_lport_notifier_head, &ft_notifier);
623 	fc_lport_iterate(ft_lport_add, NULL);
624 	return 0;
625 }
626 
627 static void __exit ft_exit(void)
628 {
629 	blocking_notifier_chain_unregister(&fc_lport_notifier_head,
630 					   &ft_notifier);
631 	fc_fc4_deregister_provider(FC_TYPE_FCP, &ft_prov);
632 	fc_lport_iterate(ft_lport_del, NULL);
633 	ft_deregister_configfs();
634 	synchronize_rcu();
635 }
636 
637 MODULE_DESCRIPTION("FC TCM fabric driver " FT_VERSION);
638 MODULE_LICENSE("GPL");
639 module_init(ft_init);
640 module_exit(ft_exit);
641