1 /* 2 * Copyright (c) 2010 Cisco Systems, Inc. 3 * 4 * This program is free software; you can redistribute it and/or modify it 5 * under the terms and conditions of the GNU General Public License, 6 * version 2, as published by the Free Software Foundation. 7 * 8 * This program is distributed in the hope it will be useful, but WITHOUT 9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for 11 * more details. 12 * 13 * You should have received a copy of the GNU General Public License along with 14 * this program; if not, write to the Free Software Foundation, Inc., 15 * 51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA. 16 */ 17 18 /* XXX TBD some includes may be extraneous */ 19 20 #include <linux/module.h> 21 #include <linux/moduleparam.h> 22 #include <linux/utsname.h> 23 #include <linux/init.h> 24 #include <linux/slab.h> 25 #include <linux/kthread.h> 26 #include <linux/types.h> 27 #include <linux/string.h> 28 #include <linux/configfs.h> 29 #include <linux/ctype.h> 30 #include <linux/hash.h> 31 #include <linux/rcupdate.h> 32 #include <linux/rculist.h> 33 #include <linux/kref.h> 34 #include <asm/unaligned.h> 35 #include <scsi/scsi.h> 36 #include <scsi/scsi_host.h> 37 #include <scsi/scsi_device.h> 38 #include <scsi/scsi_cmnd.h> 39 #include <scsi/libfc.h> 40 41 #include <target/target_core_base.h> 42 #include <target/target_core_fabric.h> 43 #include <target/target_core_configfs.h> 44 #include <target/configfs_macros.h> 45 46 #include "tcm_fc.h" 47 48 static void ft_sess_delete_all(struct ft_tport *); 49 50 /* 51 * Lookup or allocate target local port. 52 * Caller holds ft_lport_lock. 53 */ 54 static struct ft_tport *ft_tport_create(struct fc_lport *lport) 55 { 56 struct ft_tpg *tpg; 57 struct ft_tport *tport; 58 int i; 59 60 tport = rcu_dereference_protected(lport->prov[FC_TYPE_FCP], 61 lockdep_is_held(&ft_lport_lock)); 62 if (tport && tport->tpg) 63 return tport; 64 65 tpg = ft_lport_find_tpg(lport); 66 if (!tpg) 67 return NULL; 68 69 if (tport) { 70 tport->tpg = tpg; 71 return tport; 72 } 73 74 tport = kzalloc(sizeof(*tport), GFP_KERNEL); 75 if (!tport) 76 return NULL; 77 78 tport->lport = lport; 79 tport->tpg = tpg; 80 tpg->tport = tport; 81 for (i = 0; i < FT_SESS_HASH_SIZE; i++) 82 INIT_HLIST_HEAD(&tport->hash[i]); 83 84 rcu_assign_pointer(lport->prov[FC_TYPE_FCP], tport); 85 return tport; 86 } 87 88 /* 89 * Delete a target local port. 90 * Caller holds ft_lport_lock. 91 */ 92 static void ft_tport_delete(struct ft_tport *tport) 93 { 94 struct fc_lport *lport; 95 struct ft_tpg *tpg; 96 97 ft_sess_delete_all(tport); 98 lport = tport->lport; 99 BUG_ON(tport != lport->prov[FC_TYPE_FCP]); 100 rcu_assign_pointer(lport->prov[FC_TYPE_FCP], NULL); 101 102 tpg = tport->tpg; 103 if (tpg) { 104 tpg->tport = NULL; 105 tport->tpg = NULL; 106 } 107 kfree_rcu(tport, rcu); 108 } 109 110 /* 111 * Add local port. 112 * Called thru fc_lport_iterate(). 113 */ 114 void ft_lport_add(struct fc_lport *lport, void *arg) 115 { 116 mutex_lock(&ft_lport_lock); 117 ft_tport_create(lport); 118 mutex_unlock(&ft_lport_lock); 119 } 120 121 /* 122 * Delete local port. 123 * Called thru fc_lport_iterate(). 124 */ 125 void ft_lport_del(struct fc_lport *lport, void *arg) 126 { 127 struct ft_tport *tport; 128 129 mutex_lock(&ft_lport_lock); 130 tport = lport->prov[FC_TYPE_FCP]; 131 if (tport) 132 ft_tport_delete(tport); 133 mutex_unlock(&ft_lport_lock); 134 } 135 136 /* 137 * Notification of local port change from libfc. 138 * Create or delete local port and associated tport. 139 */ 140 int ft_lport_notify(struct notifier_block *nb, unsigned long event, void *arg) 141 { 142 struct fc_lport *lport = arg; 143 144 switch (event) { 145 case FC_LPORT_EV_ADD: 146 ft_lport_add(lport, NULL); 147 break; 148 case FC_LPORT_EV_DEL: 149 ft_lport_del(lport, NULL); 150 break; 151 } 152 return NOTIFY_DONE; 153 } 154 155 /* 156 * Hash function for FC_IDs. 157 */ 158 static u32 ft_sess_hash(u32 port_id) 159 { 160 return hash_32(port_id, FT_SESS_HASH_BITS); 161 } 162 163 /* 164 * Find session in local port. 165 * Sessions and hash lists are RCU-protected. 166 * A reference is taken which must be eventually freed. 167 */ 168 static struct ft_sess *ft_sess_get(struct fc_lport *lport, u32 port_id) 169 { 170 struct ft_tport *tport; 171 struct hlist_head *head; 172 struct ft_sess *sess; 173 174 rcu_read_lock(); 175 tport = rcu_dereference(lport->prov[FC_TYPE_FCP]); 176 if (!tport) 177 goto out; 178 179 head = &tport->hash[ft_sess_hash(port_id)]; 180 hlist_for_each_entry_rcu(sess, head, hash) { 181 if (sess->port_id == port_id) { 182 kref_get(&sess->kref); 183 rcu_read_unlock(); 184 pr_debug("port_id %x found %p\n", port_id, sess); 185 return sess; 186 } 187 } 188 out: 189 rcu_read_unlock(); 190 pr_debug("port_id %x not found\n", port_id); 191 return NULL; 192 } 193 194 /* 195 * Allocate session and enter it in the hash for the local port. 196 * Caller holds ft_lport_lock. 197 */ 198 static struct ft_sess *ft_sess_create(struct ft_tport *tport, u32 port_id, 199 struct ft_node_acl *acl) 200 { 201 struct ft_sess *sess; 202 struct hlist_head *head; 203 204 head = &tport->hash[ft_sess_hash(port_id)]; 205 hlist_for_each_entry_rcu(sess, head, hash) 206 if (sess->port_id == port_id) 207 return sess; 208 209 sess = kzalloc(sizeof(*sess), GFP_KERNEL); 210 if (!sess) 211 return NULL; 212 213 sess->se_sess = transport_init_session_tags(TCM_FC_DEFAULT_TAGS, 214 sizeof(struct ft_cmd)); 215 if (IS_ERR(sess->se_sess)) { 216 kfree(sess); 217 return NULL; 218 } 219 sess->se_sess->se_node_acl = &acl->se_node_acl; 220 sess->tport = tport; 221 sess->port_id = port_id; 222 kref_init(&sess->kref); /* ref for table entry */ 223 hlist_add_head_rcu(&sess->hash, head); 224 tport->sess_count++; 225 226 pr_debug("port_id %x sess %p\n", port_id, sess); 227 228 transport_register_session(&tport->tpg->se_tpg, &acl->se_node_acl, 229 sess->se_sess, sess); 230 return sess; 231 } 232 233 /* 234 * Unhash the session. 235 * Caller holds ft_lport_lock. 236 */ 237 static void ft_sess_unhash(struct ft_sess *sess) 238 { 239 struct ft_tport *tport = sess->tport; 240 241 hlist_del_rcu(&sess->hash); 242 BUG_ON(!tport->sess_count); 243 tport->sess_count--; 244 sess->port_id = -1; 245 sess->params = 0; 246 } 247 248 /* 249 * Delete session from hash. 250 * Caller holds ft_lport_lock. 251 */ 252 static struct ft_sess *ft_sess_delete(struct ft_tport *tport, u32 port_id) 253 { 254 struct hlist_head *head; 255 struct ft_sess *sess; 256 257 head = &tport->hash[ft_sess_hash(port_id)]; 258 hlist_for_each_entry_rcu(sess, head, hash) { 259 if (sess->port_id == port_id) { 260 ft_sess_unhash(sess); 261 return sess; 262 } 263 } 264 return NULL; 265 } 266 267 /* 268 * Delete all sessions from tport. 269 * Caller holds ft_lport_lock. 270 */ 271 static void ft_sess_delete_all(struct ft_tport *tport) 272 { 273 struct hlist_head *head; 274 struct ft_sess *sess; 275 276 for (head = tport->hash; 277 head < &tport->hash[FT_SESS_HASH_SIZE]; head++) { 278 hlist_for_each_entry_rcu(sess, head, hash) { 279 ft_sess_unhash(sess); 280 transport_deregister_session_configfs(sess->se_sess); 281 ft_sess_put(sess); /* release from table */ 282 } 283 } 284 } 285 286 /* 287 * TCM ops for sessions. 288 */ 289 290 /* 291 * Determine whether session is allowed to be shutdown in the current context. 292 * Returns non-zero if the session should be shutdown. 293 */ 294 int ft_sess_shutdown(struct se_session *se_sess) 295 { 296 struct ft_sess *sess = se_sess->fabric_sess_ptr; 297 298 pr_debug("port_id %x\n", sess->port_id); 299 return 1; 300 } 301 302 /* 303 * Remove session and send PRLO. 304 * This is called when the ACL is being deleted or queue depth is changing. 305 */ 306 void ft_sess_close(struct se_session *se_sess) 307 { 308 struct ft_sess *sess = se_sess->fabric_sess_ptr; 309 u32 port_id; 310 311 mutex_lock(&ft_lport_lock); 312 port_id = sess->port_id; 313 if (port_id == -1) { 314 mutex_unlock(&ft_lport_lock); 315 return; 316 } 317 pr_debug("port_id %x\n", port_id); 318 ft_sess_unhash(sess); 319 mutex_unlock(&ft_lport_lock); 320 transport_deregister_session_configfs(se_sess); 321 ft_sess_put(sess); 322 /* XXX Send LOGO or PRLO */ 323 synchronize_rcu(); /* let transport deregister happen */ 324 } 325 326 u32 ft_sess_get_index(struct se_session *se_sess) 327 { 328 struct ft_sess *sess = se_sess->fabric_sess_ptr; 329 330 return sess->port_id; /* XXX TBD probably not what is needed */ 331 } 332 333 u32 ft_sess_get_port_name(struct se_session *se_sess, 334 unsigned char *buf, u32 len) 335 { 336 struct ft_sess *sess = se_sess->fabric_sess_ptr; 337 338 return ft_format_wwn(buf, len, sess->port_name); 339 } 340 341 /* 342 * libfc ops involving sessions. 343 */ 344 345 static int ft_prli_locked(struct fc_rport_priv *rdata, u32 spp_len, 346 const struct fc_els_spp *rspp, struct fc_els_spp *spp) 347 { 348 struct ft_tport *tport; 349 struct ft_sess *sess; 350 struct ft_node_acl *acl; 351 u32 fcp_parm; 352 353 tport = ft_tport_create(rdata->local_port); 354 if (!tport) 355 goto not_target; /* not a target for this local port */ 356 357 acl = ft_acl_get(tport->tpg, rdata); 358 if (!acl) 359 goto not_target; /* no target for this remote */ 360 361 if (!rspp) 362 goto fill; 363 364 if (rspp->spp_flags & (FC_SPP_OPA_VAL | FC_SPP_RPA_VAL)) 365 return FC_SPP_RESP_NO_PA; 366 367 /* 368 * If both target and initiator bits are off, the SPP is invalid. 369 */ 370 fcp_parm = ntohl(rspp->spp_params); 371 if (!(fcp_parm & (FCP_SPPF_INIT_FCN | FCP_SPPF_TARG_FCN))) 372 return FC_SPP_RESP_INVL; 373 374 /* 375 * Create session (image pair) only if requested by 376 * EST_IMG_PAIR flag and if the requestor is an initiator. 377 */ 378 if (rspp->spp_flags & FC_SPP_EST_IMG_PAIR) { 379 spp->spp_flags |= FC_SPP_EST_IMG_PAIR; 380 if (!(fcp_parm & FCP_SPPF_INIT_FCN)) 381 return FC_SPP_RESP_CONF; 382 sess = ft_sess_create(tport, rdata->ids.port_id, acl); 383 if (!sess) 384 return FC_SPP_RESP_RES; 385 if (!sess->params) 386 rdata->prli_count++; 387 sess->params = fcp_parm; 388 sess->port_name = rdata->ids.port_name; 389 sess->max_frame = rdata->maxframe_size; 390 391 /* XXX TBD - clearing actions. unit attn, see 4.10 */ 392 } 393 394 /* 395 * OR in our service parameters with other provider (initiator), if any. 396 */ 397 fill: 398 fcp_parm = ntohl(spp->spp_params); 399 fcp_parm &= ~FCP_SPPF_RETRY; 400 spp->spp_params = htonl(fcp_parm | FCP_SPPF_TARG_FCN); 401 return FC_SPP_RESP_ACK; 402 403 not_target: 404 fcp_parm = ntohl(spp->spp_params); 405 fcp_parm &= ~FCP_SPPF_TARG_FCN; 406 spp->spp_params = htonl(fcp_parm); 407 return 0; 408 } 409 410 /** 411 * tcm_fcp_prli() - Handle incoming or outgoing PRLI for the FCP target 412 * @rdata: remote port private 413 * @spp_len: service parameter page length 414 * @rspp: received service parameter page (NULL for outgoing PRLI) 415 * @spp: response service parameter page 416 * 417 * Returns spp response code. 418 */ 419 static int ft_prli(struct fc_rport_priv *rdata, u32 spp_len, 420 const struct fc_els_spp *rspp, struct fc_els_spp *spp) 421 { 422 int ret; 423 424 mutex_lock(&ft_lport_lock); 425 ret = ft_prli_locked(rdata, spp_len, rspp, spp); 426 mutex_unlock(&ft_lport_lock); 427 pr_debug("port_id %x flags %x ret %x\n", 428 rdata->ids.port_id, rspp ? rspp->spp_flags : 0, ret); 429 return ret; 430 } 431 432 static void ft_sess_free(struct kref *kref) 433 { 434 struct ft_sess *sess = container_of(kref, struct ft_sess, kref); 435 436 transport_deregister_session(sess->se_sess); 437 kfree_rcu(sess, rcu); 438 } 439 440 void ft_sess_put(struct ft_sess *sess) 441 { 442 int sess_held = atomic_read(&sess->kref.refcount); 443 444 BUG_ON(!sess_held); 445 kref_put(&sess->kref, ft_sess_free); 446 } 447 448 static void ft_prlo(struct fc_rport_priv *rdata) 449 { 450 struct ft_sess *sess; 451 struct ft_tport *tport; 452 453 mutex_lock(&ft_lport_lock); 454 tport = rcu_dereference_protected(rdata->local_port->prov[FC_TYPE_FCP], 455 lockdep_is_held(&ft_lport_lock)); 456 457 if (!tport) { 458 mutex_unlock(&ft_lport_lock); 459 return; 460 } 461 sess = ft_sess_delete(tport, rdata->ids.port_id); 462 if (!sess) { 463 mutex_unlock(&ft_lport_lock); 464 return; 465 } 466 mutex_unlock(&ft_lport_lock); 467 transport_deregister_session_configfs(sess->se_sess); 468 ft_sess_put(sess); /* release from table */ 469 rdata->prli_count--; 470 /* XXX TBD - clearing actions. unit attn, see 4.10 */ 471 } 472 473 /* 474 * Handle incoming FCP request. 475 * Caller has verified that the frame is type FCP. 476 */ 477 static void ft_recv(struct fc_lport *lport, struct fc_frame *fp) 478 { 479 struct ft_sess *sess; 480 u32 sid = fc_frame_sid(fp); 481 482 pr_debug("sid %x\n", sid); 483 484 sess = ft_sess_get(lport, sid); 485 if (!sess) { 486 pr_debug("sid %x sess lookup failed\n", sid); 487 /* TBD XXX - if FCP_CMND, send PRLO */ 488 fc_frame_free(fp); 489 return; 490 } 491 ft_recv_req(sess, fp); /* must do ft_sess_put() */ 492 } 493 494 /* 495 * Provider ops for libfc. 496 */ 497 struct fc4_prov ft_prov = { 498 .prli = ft_prli, 499 .prlo = ft_prlo, 500 .recv = ft_recv, 501 .module = THIS_MODULE, 502 }; 503