target: Update copyright ownership/year information to 2013
[deliverable/linux.git] / drivers / target / iscsi / iscsi_target_configfs.c
1 /*******************************************************************************
2 * This file contains the configfs implementation for iSCSI Target mode
3 * from the LIO-Target Project.
4 *
5 * (c) Copyright 2007-2013 Datera, Inc.
6 *
7 * Author: Nicholas A. Bellinger <nab@linux-iscsi.org>
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 ****************************************************************************/
19
20 #include <linux/configfs.h>
21 #include <linux/ctype.h>
22 #include <linux/export.h>
23 #include <linux/inet.h>
24 #include <target/target_core_base.h>
25 #include <target/target_core_fabric.h>
26 #include <target/target_core_fabric_configfs.h>
27 #include <target/target_core_configfs.h>
28 #include <target/configfs_macros.h>
29 #include <target/iscsi/iscsi_transport.h>
30
31 #include "iscsi_target_core.h"
32 #include "iscsi_target_parameters.h"
33 #include "iscsi_target_device.h"
34 #include "iscsi_target_erl0.h"
35 #include "iscsi_target_nodeattrib.h"
36 #include "iscsi_target_tpg.h"
37 #include "iscsi_target_util.h"
38 #include "iscsi_target.h"
39 #include "iscsi_target_stat.h"
40 #include "iscsi_target_configfs.h"
41
42 struct target_fabric_configfs *lio_target_fabric_configfs;
43
44 struct lio_target_configfs_attribute {
45 struct configfs_attribute attr;
46 ssize_t (*show)(void *, char *);
47 ssize_t (*store)(void *, const char *, size_t);
48 };
49
50 /* Start items for lio_target_portal_cit */
51
52 static ssize_t lio_target_np_show_sctp(
53 struct se_tpg_np *se_tpg_np,
54 char *page)
55 {
56 struct iscsi_tpg_np *tpg_np = container_of(se_tpg_np,
57 struct iscsi_tpg_np, se_tpg_np);
58 struct iscsi_tpg_np *tpg_np_sctp;
59 ssize_t rb;
60
61 tpg_np_sctp = iscsit_tpg_locate_child_np(tpg_np, ISCSI_SCTP_TCP);
62 if (tpg_np_sctp)
63 rb = sprintf(page, "1\n");
64 else
65 rb = sprintf(page, "0\n");
66
67 return rb;
68 }
69
70 static ssize_t lio_target_np_store_sctp(
71 struct se_tpg_np *se_tpg_np,
72 const char *page,
73 size_t count)
74 {
75 struct iscsi_np *np;
76 struct iscsi_portal_group *tpg;
77 struct iscsi_tpg_np *tpg_np = container_of(se_tpg_np,
78 struct iscsi_tpg_np, se_tpg_np);
79 struct iscsi_tpg_np *tpg_np_sctp = NULL;
80 u32 op;
81 int ret;
82
83 ret = kstrtou32(page, 0, &op);
84 if (ret)
85 return ret;
86 if ((op != 1) && (op != 0)) {
87 pr_err("Illegal value for tpg_enable: %u\n", op);
88 return -EINVAL;
89 }
90 np = tpg_np->tpg_np;
91 if (!np) {
92 pr_err("Unable to locate struct iscsi_np from"
93 " struct iscsi_tpg_np\n");
94 return -EINVAL;
95 }
96
97 tpg = tpg_np->tpg;
98 if (iscsit_get_tpg(tpg) < 0)
99 return -EINVAL;
100
101 if (op) {
102 /*
103 * Use existing np->np_sockaddr for SCTP network portal reference
104 */
105 tpg_np_sctp = iscsit_tpg_add_network_portal(tpg, &np->np_sockaddr,
106 np->np_ip, tpg_np, ISCSI_SCTP_TCP);
107 if (!tpg_np_sctp || IS_ERR(tpg_np_sctp))
108 goto out;
109 } else {
110 tpg_np_sctp = iscsit_tpg_locate_child_np(tpg_np, ISCSI_SCTP_TCP);
111 if (!tpg_np_sctp)
112 goto out;
113
114 ret = iscsit_tpg_del_network_portal(tpg, tpg_np_sctp);
115 if (ret < 0)
116 goto out;
117 }
118
119 iscsit_put_tpg(tpg);
120 return count;
121 out:
122 iscsit_put_tpg(tpg);
123 return -EINVAL;
124 }
125
126 TF_NP_BASE_ATTR(lio_target, sctp, S_IRUGO | S_IWUSR);
127
128 static ssize_t lio_target_np_show_iser(
129 struct se_tpg_np *se_tpg_np,
130 char *page)
131 {
132 struct iscsi_tpg_np *tpg_np = container_of(se_tpg_np,
133 struct iscsi_tpg_np, se_tpg_np);
134 struct iscsi_tpg_np *tpg_np_iser;
135 ssize_t rb;
136
137 tpg_np_iser = iscsit_tpg_locate_child_np(tpg_np, ISCSI_INFINIBAND);
138 if (tpg_np_iser)
139 rb = sprintf(page, "1\n");
140 else
141 rb = sprintf(page, "0\n");
142
143 return rb;
144 }
145
146 static ssize_t lio_target_np_store_iser(
147 struct se_tpg_np *se_tpg_np,
148 const char *page,
149 size_t count)
150 {
151 struct iscsi_np *np;
152 struct iscsi_portal_group *tpg;
153 struct iscsi_tpg_np *tpg_np = container_of(se_tpg_np,
154 struct iscsi_tpg_np, se_tpg_np);
155 struct iscsi_tpg_np *tpg_np_iser = NULL;
156 char *endptr;
157 u32 op;
158 int rc = 0;
159
160 op = simple_strtoul(page, &endptr, 0);
161 if ((op != 1) && (op != 0)) {
162 pr_err("Illegal value for tpg_enable: %u\n", op);
163 return -EINVAL;
164 }
165 np = tpg_np->tpg_np;
166 if (!np) {
167 pr_err("Unable to locate struct iscsi_np from"
168 " struct iscsi_tpg_np\n");
169 return -EINVAL;
170 }
171
172 tpg = tpg_np->tpg;
173 if (iscsit_get_tpg(tpg) < 0)
174 return -EINVAL;
175
176 if (op) {
177 rc = request_module("ib_isert");
178 if (rc != 0) {
179 pr_warn("Unable to request_module for ib_isert\n");
180 rc = 0;
181 }
182
183 tpg_np_iser = iscsit_tpg_add_network_portal(tpg, &np->np_sockaddr,
184 np->np_ip, tpg_np, ISCSI_INFINIBAND);
185 if (IS_ERR(tpg_np_iser)) {
186 rc = PTR_ERR(tpg_np_iser);
187 goto out;
188 }
189 } else {
190 tpg_np_iser = iscsit_tpg_locate_child_np(tpg_np, ISCSI_INFINIBAND);
191 if (tpg_np_iser) {
192 rc = iscsit_tpg_del_network_portal(tpg, tpg_np_iser);
193 if (rc < 0)
194 goto out;
195 }
196 }
197
198 iscsit_put_tpg(tpg);
199 return count;
200 out:
201 iscsit_put_tpg(tpg);
202 return rc;
203 }
204
205 TF_NP_BASE_ATTR(lio_target, iser, S_IRUGO | S_IWUSR);
206
207 static struct configfs_attribute *lio_target_portal_attrs[] = {
208 &lio_target_np_sctp.attr,
209 &lio_target_np_iser.attr,
210 NULL,
211 };
212
213 /* Stop items for lio_target_portal_cit */
214
215 /* Start items for lio_target_np_cit */
216
217 #define MAX_PORTAL_LEN 256
218
219 static struct se_tpg_np *lio_target_call_addnptotpg(
220 struct se_portal_group *se_tpg,
221 struct config_group *group,
222 const char *name)
223 {
224 struct iscsi_portal_group *tpg;
225 struct iscsi_tpg_np *tpg_np;
226 char *str, *str2, *ip_str, *port_str;
227 struct __kernel_sockaddr_storage sockaddr;
228 struct sockaddr_in *sock_in;
229 struct sockaddr_in6 *sock_in6;
230 unsigned long port;
231 int ret;
232 char buf[MAX_PORTAL_LEN + 1];
233
234 if (strlen(name) > MAX_PORTAL_LEN) {
235 pr_err("strlen(name): %d exceeds MAX_PORTAL_LEN: %d\n",
236 (int)strlen(name), MAX_PORTAL_LEN);
237 return ERR_PTR(-EOVERFLOW);
238 }
239 memset(buf, 0, MAX_PORTAL_LEN + 1);
240 snprintf(buf, MAX_PORTAL_LEN + 1, "%s", name);
241
242 memset(&sockaddr, 0, sizeof(struct __kernel_sockaddr_storage));
243
244 str = strstr(buf, "[");
245 if (str) {
246 const char *end;
247
248 str2 = strstr(str, "]");
249 if (!str2) {
250 pr_err("Unable to locate trailing \"]\""
251 " in IPv6 iSCSI network portal address\n");
252 return ERR_PTR(-EINVAL);
253 }
254 str++; /* Skip over leading "[" */
255 *str2 = '\0'; /* Terminate the IPv6 address */
256 str2++; /* Skip over the "]" */
257 port_str = strstr(str2, ":");
258 if (!port_str) {
259 pr_err("Unable to locate \":port\""
260 " in IPv6 iSCSI network portal address\n");
261 return ERR_PTR(-EINVAL);
262 }
263 *port_str = '\0'; /* Terminate string for IP */
264 port_str++; /* Skip over ":" */
265
266 ret = kstrtoul(port_str, 0, &port);
267 if (ret < 0) {
268 pr_err("kstrtoul() failed for port_str: %d\n", ret);
269 return ERR_PTR(ret);
270 }
271 sock_in6 = (struct sockaddr_in6 *)&sockaddr;
272 sock_in6->sin6_family = AF_INET6;
273 sock_in6->sin6_port = htons((unsigned short)port);
274 ret = in6_pton(str, IPV6_ADDRESS_SPACE,
275 (void *)&sock_in6->sin6_addr.in6_u, -1, &end);
276 if (ret <= 0) {
277 pr_err("in6_pton returned: %d\n", ret);
278 return ERR_PTR(-EINVAL);
279 }
280 } else {
281 str = ip_str = &buf[0];
282 port_str = strstr(ip_str, ":");
283 if (!port_str) {
284 pr_err("Unable to locate \":port\""
285 " in IPv4 iSCSI network portal address\n");
286 return ERR_PTR(-EINVAL);
287 }
288 *port_str = '\0'; /* Terminate string for IP */
289 port_str++; /* Skip over ":" */
290
291 ret = kstrtoul(port_str, 0, &port);
292 if (ret < 0) {
293 pr_err("kstrtoul() failed for port_str: %d\n", ret);
294 return ERR_PTR(ret);
295 }
296 sock_in = (struct sockaddr_in *)&sockaddr;
297 sock_in->sin_family = AF_INET;
298 sock_in->sin_port = htons((unsigned short)port);
299 sock_in->sin_addr.s_addr = in_aton(ip_str);
300 }
301 tpg = container_of(se_tpg, struct iscsi_portal_group, tpg_se_tpg);
302 ret = iscsit_get_tpg(tpg);
303 if (ret < 0)
304 return ERR_PTR(-EINVAL);
305
306 pr_debug("LIO_Target_ConfigFS: REGISTER -> %s TPGT: %hu"
307 " PORTAL: %s\n",
308 config_item_name(&se_tpg->se_tpg_wwn->wwn_group.cg_item),
309 tpg->tpgt, name);
310 /*
311 * Assume ISCSI_TCP by default. Other network portals for other
312 * iSCSI fabrics:
313 *
314 * Traditional iSCSI over SCTP (initial support)
315 * iSER/TCP (TODO, hardware available)
316 * iSER/SCTP (TODO, software emulation with osc-iwarp)
317 * iSER/IB (TODO, hardware available)
318 *
319 * can be enabled with attributes under
320 * sys/kernel/config/iscsi/$IQN/$TPG/np/$IP:$PORT/
321 *
322 */
323 tpg_np = iscsit_tpg_add_network_portal(tpg, &sockaddr, str, NULL,
324 ISCSI_TCP);
325 if (IS_ERR(tpg_np)) {
326 iscsit_put_tpg(tpg);
327 return ERR_CAST(tpg_np);
328 }
329 pr_debug("LIO_Target_ConfigFS: addnptotpg done!\n");
330
331 iscsit_put_tpg(tpg);
332 return &tpg_np->se_tpg_np;
333 }
334
335 static void lio_target_call_delnpfromtpg(
336 struct se_tpg_np *se_tpg_np)
337 {
338 struct iscsi_portal_group *tpg;
339 struct iscsi_tpg_np *tpg_np;
340 struct se_portal_group *se_tpg;
341 int ret;
342
343 tpg_np = container_of(se_tpg_np, struct iscsi_tpg_np, se_tpg_np);
344 tpg = tpg_np->tpg;
345 ret = iscsit_get_tpg(tpg);
346 if (ret < 0)
347 return;
348
349 se_tpg = &tpg->tpg_se_tpg;
350 pr_debug("LIO_Target_ConfigFS: DEREGISTER -> %s TPGT: %hu"
351 " PORTAL: %s:%hu\n", config_item_name(&se_tpg->se_tpg_wwn->wwn_group.cg_item),
352 tpg->tpgt, tpg_np->tpg_np->np_ip, tpg_np->tpg_np->np_port);
353
354 ret = iscsit_tpg_del_network_portal(tpg, tpg_np);
355 if (ret < 0)
356 goto out;
357
358 pr_debug("LIO_Target_ConfigFS: delnpfromtpg done!\n");
359 out:
360 iscsit_put_tpg(tpg);
361 }
362
363 /* End items for lio_target_np_cit */
364
365 /* Start items for lio_target_nacl_attrib_cit */
366
367 #define DEF_NACL_ATTRIB(name) \
368 static ssize_t iscsi_nacl_attrib_show_##name( \
369 struct se_node_acl *se_nacl, \
370 char *page) \
371 { \
372 struct iscsi_node_acl *nacl = container_of(se_nacl, struct iscsi_node_acl, \
373 se_node_acl); \
374 \
375 return sprintf(page, "%u\n", ISCSI_NODE_ATTRIB(nacl)->name); \
376 } \
377 \
378 static ssize_t iscsi_nacl_attrib_store_##name( \
379 struct se_node_acl *se_nacl, \
380 const char *page, \
381 size_t count) \
382 { \
383 struct iscsi_node_acl *nacl = container_of(se_nacl, struct iscsi_node_acl, \
384 se_node_acl); \
385 u32 val; \
386 int ret; \
387 \
388 ret = kstrtou32(page, 0, &val); \
389 if (ret) \
390 return ret; \
391 ret = iscsit_na_##name(nacl, val); \
392 if (ret < 0) \
393 return ret; \
394 \
395 return count; \
396 }
397
398 #define NACL_ATTR(_name, _mode) TF_NACL_ATTRIB_ATTR(iscsi, _name, _mode);
399 /*
400 * Define iscsi_node_attrib_s_dataout_timeout
401 */
402 DEF_NACL_ATTRIB(dataout_timeout);
403 NACL_ATTR(dataout_timeout, S_IRUGO | S_IWUSR);
404 /*
405 * Define iscsi_node_attrib_s_dataout_timeout_retries
406 */
407 DEF_NACL_ATTRIB(dataout_timeout_retries);
408 NACL_ATTR(dataout_timeout_retries, S_IRUGO | S_IWUSR);
409 /*
410 * Define iscsi_node_attrib_s_default_erl
411 */
412 DEF_NACL_ATTRIB(default_erl);
413 NACL_ATTR(default_erl, S_IRUGO | S_IWUSR);
414 /*
415 * Define iscsi_node_attrib_s_nopin_timeout
416 */
417 DEF_NACL_ATTRIB(nopin_timeout);
418 NACL_ATTR(nopin_timeout, S_IRUGO | S_IWUSR);
419 /*
420 * Define iscsi_node_attrib_s_nopin_response_timeout
421 */
422 DEF_NACL_ATTRIB(nopin_response_timeout);
423 NACL_ATTR(nopin_response_timeout, S_IRUGO | S_IWUSR);
424 /*
425 * Define iscsi_node_attrib_s_random_datain_pdu_offsets
426 */
427 DEF_NACL_ATTRIB(random_datain_pdu_offsets);
428 NACL_ATTR(random_datain_pdu_offsets, S_IRUGO | S_IWUSR);
429 /*
430 * Define iscsi_node_attrib_s_random_datain_seq_offsets
431 */
432 DEF_NACL_ATTRIB(random_datain_seq_offsets);
433 NACL_ATTR(random_datain_seq_offsets, S_IRUGO | S_IWUSR);
434 /*
435 * Define iscsi_node_attrib_s_random_r2t_offsets
436 */
437 DEF_NACL_ATTRIB(random_r2t_offsets);
438 NACL_ATTR(random_r2t_offsets, S_IRUGO | S_IWUSR);
439
440 static struct configfs_attribute *lio_target_nacl_attrib_attrs[] = {
441 &iscsi_nacl_attrib_dataout_timeout.attr,
442 &iscsi_nacl_attrib_dataout_timeout_retries.attr,
443 &iscsi_nacl_attrib_default_erl.attr,
444 &iscsi_nacl_attrib_nopin_timeout.attr,
445 &iscsi_nacl_attrib_nopin_response_timeout.attr,
446 &iscsi_nacl_attrib_random_datain_pdu_offsets.attr,
447 &iscsi_nacl_attrib_random_datain_seq_offsets.attr,
448 &iscsi_nacl_attrib_random_r2t_offsets.attr,
449 NULL,
450 };
451
452 /* End items for lio_target_nacl_attrib_cit */
453
454 /* Start items for lio_target_nacl_auth_cit */
455
456 #define __DEF_NACL_AUTH_STR(prefix, name, flags) \
457 static ssize_t __iscsi_##prefix##_show_##name( \
458 struct iscsi_node_acl *nacl, \
459 char *page) \
460 { \
461 struct iscsi_node_auth *auth = &nacl->node_auth; \
462 \
463 if (!capable(CAP_SYS_ADMIN)) \
464 return -EPERM; \
465 return snprintf(page, PAGE_SIZE, "%s\n", auth->name); \
466 } \
467 \
468 static ssize_t __iscsi_##prefix##_store_##name( \
469 struct iscsi_node_acl *nacl, \
470 const char *page, \
471 size_t count) \
472 { \
473 struct iscsi_node_auth *auth = &nacl->node_auth; \
474 \
475 if (!capable(CAP_SYS_ADMIN)) \
476 return -EPERM; \
477 \
478 snprintf(auth->name, sizeof(auth->name), "%s", page); \
479 if (!strncmp("NULL", auth->name, 4)) \
480 auth->naf_flags &= ~flags; \
481 else \
482 auth->naf_flags |= flags; \
483 \
484 if ((auth->naf_flags & NAF_USERID_IN_SET) && \
485 (auth->naf_flags & NAF_PASSWORD_IN_SET)) \
486 auth->authenticate_target = 1; \
487 else \
488 auth->authenticate_target = 0; \
489 \
490 return count; \
491 }
492
493 #define __DEF_NACL_AUTH_INT(prefix, name) \
494 static ssize_t __iscsi_##prefix##_show_##name( \
495 struct iscsi_node_acl *nacl, \
496 char *page) \
497 { \
498 struct iscsi_node_auth *auth = &nacl->node_auth; \
499 \
500 if (!capable(CAP_SYS_ADMIN)) \
501 return -EPERM; \
502 \
503 return snprintf(page, PAGE_SIZE, "%d\n", auth->name); \
504 }
505
506 #define DEF_NACL_AUTH_STR(name, flags) \
507 __DEF_NACL_AUTH_STR(nacl_auth, name, flags) \
508 static ssize_t iscsi_nacl_auth_show_##name( \
509 struct se_node_acl *nacl, \
510 char *page) \
511 { \
512 return __iscsi_nacl_auth_show_##name(container_of(nacl, \
513 struct iscsi_node_acl, se_node_acl), page); \
514 } \
515 static ssize_t iscsi_nacl_auth_store_##name( \
516 struct se_node_acl *nacl, \
517 const char *page, \
518 size_t count) \
519 { \
520 return __iscsi_nacl_auth_store_##name(container_of(nacl, \
521 struct iscsi_node_acl, se_node_acl), page, count); \
522 }
523
524 #define DEF_NACL_AUTH_INT(name) \
525 __DEF_NACL_AUTH_INT(nacl_auth, name) \
526 static ssize_t iscsi_nacl_auth_show_##name( \
527 struct se_node_acl *nacl, \
528 char *page) \
529 { \
530 return __iscsi_nacl_auth_show_##name(container_of(nacl, \
531 struct iscsi_node_acl, se_node_acl), page); \
532 }
533
534 #define AUTH_ATTR(_name, _mode) TF_NACL_AUTH_ATTR(iscsi, _name, _mode);
535 #define AUTH_ATTR_RO(_name) TF_NACL_AUTH_ATTR_RO(iscsi, _name);
536
537 /*
538 * One-way authentication userid
539 */
540 DEF_NACL_AUTH_STR(userid, NAF_USERID_SET);
541 AUTH_ATTR(userid, S_IRUGO | S_IWUSR);
542 /*
543 * One-way authentication password
544 */
545 DEF_NACL_AUTH_STR(password, NAF_PASSWORD_SET);
546 AUTH_ATTR(password, S_IRUGO | S_IWUSR);
547 /*
548 * Enforce mutual authentication
549 */
550 DEF_NACL_AUTH_INT(authenticate_target);
551 AUTH_ATTR_RO(authenticate_target);
552 /*
553 * Mutual authentication userid
554 */
555 DEF_NACL_AUTH_STR(userid_mutual, NAF_USERID_IN_SET);
556 AUTH_ATTR(userid_mutual, S_IRUGO | S_IWUSR);
557 /*
558 * Mutual authentication password
559 */
560 DEF_NACL_AUTH_STR(password_mutual, NAF_PASSWORD_IN_SET);
561 AUTH_ATTR(password_mutual, S_IRUGO | S_IWUSR);
562
563 static struct configfs_attribute *lio_target_nacl_auth_attrs[] = {
564 &iscsi_nacl_auth_userid.attr,
565 &iscsi_nacl_auth_password.attr,
566 &iscsi_nacl_auth_authenticate_target.attr,
567 &iscsi_nacl_auth_userid_mutual.attr,
568 &iscsi_nacl_auth_password_mutual.attr,
569 NULL,
570 };
571
572 /* End items for lio_target_nacl_auth_cit */
573
574 /* Start items for lio_target_nacl_param_cit */
575
576 #define DEF_NACL_PARAM(name) \
577 static ssize_t iscsi_nacl_param_show_##name( \
578 struct se_node_acl *se_nacl, \
579 char *page) \
580 { \
581 struct iscsi_session *sess; \
582 struct se_session *se_sess; \
583 ssize_t rb; \
584 \
585 spin_lock_bh(&se_nacl->nacl_sess_lock); \
586 se_sess = se_nacl->nacl_sess; \
587 if (!se_sess) { \
588 rb = snprintf(page, PAGE_SIZE, \
589 "No Active iSCSI Session\n"); \
590 } else { \
591 sess = se_sess->fabric_sess_ptr; \
592 rb = snprintf(page, PAGE_SIZE, "%u\n", \
593 (u32)sess->sess_ops->name); \
594 } \
595 spin_unlock_bh(&se_nacl->nacl_sess_lock); \
596 \
597 return rb; \
598 }
599
600 #define NACL_PARAM_ATTR(_name) TF_NACL_PARAM_ATTR_RO(iscsi, _name);
601
602 DEF_NACL_PARAM(MaxConnections);
603 NACL_PARAM_ATTR(MaxConnections);
604
605 DEF_NACL_PARAM(InitialR2T);
606 NACL_PARAM_ATTR(InitialR2T);
607
608 DEF_NACL_PARAM(ImmediateData);
609 NACL_PARAM_ATTR(ImmediateData);
610
611 DEF_NACL_PARAM(MaxBurstLength);
612 NACL_PARAM_ATTR(MaxBurstLength);
613
614 DEF_NACL_PARAM(FirstBurstLength);
615 NACL_PARAM_ATTR(FirstBurstLength);
616
617 DEF_NACL_PARAM(DefaultTime2Wait);
618 NACL_PARAM_ATTR(DefaultTime2Wait);
619
620 DEF_NACL_PARAM(DefaultTime2Retain);
621 NACL_PARAM_ATTR(DefaultTime2Retain);
622
623 DEF_NACL_PARAM(MaxOutstandingR2T);
624 NACL_PARAM_ATTR(MaxOutstandingR2T);
625
626 DEF_NACL_PARAM(DataPDUInOrder);
627 NACL_PARAM_ATTR(DataPDUInOrder);
628
629 DEF_NACL_PARAM(DataSequenceInOrder);
630 NACL_PARAM_ATTR(DataSequenceInOrder);
631
632 DEF_NACL_PARAM(ErrorRecoveryLevel);
633 NACL_PARAM_ATTR(ErrorRecoveryLevel);
634
635 static struct configfs_attribute *lio_target_nacl_param_attrs[] = {
636 &iscsi_nacl_param_MaxConnections.attr,
637 &iscsi_nacl_param_InitialR2T.attr,
638 &iscsi_nacl_param_ImmediateData.attr,
639 &iscsi_nacl_param_MaxBurstLength.attr,
640 &iscsi_nacl_param_FirstBurstLength.attr,
641 &iscsi_nacl_param_DefaultTime2Wait.attr,
642 &iscsi_nacl_param_DefaultTime2Retain.attr,
643 &iscsi_nacl_param_MaxOutstandingR2T.attr,
644 &iscsi_nacl_param_DataPDUInOrder.attr,
645 &iscsi_nacl_param_DataSequenceInOrder.attr,
646 &iscsi_nacl_param_ErrorRecoveryLevel.attr,
647 NULL,
648 };
649
650 /* End items for lio_target_nacl_param_cit */
651
652 /* Start items for lio_target_acl_cit */
653
654 static ssize_t lio_target_nacl_show_info(
655 struct se_node_acl *se_nacl,
656 char *page)
657 {
658 struct iscsi_session *sess;
659 struct iscsi_conn *conn;
660 struct se_session *se_sess;
661 ssize_t rb = 0;
662
663 spin_lock_bh(&se_nacl->nacl_sess_lock);
664 se_sess = se_nacl->nacl_sess;
665 if (!se_sess) {
666 rb += sprintf(page+rb, "No active iSCSI Session for Initiator"
667 " Endpoint: %s\n", se_nacl->initiatorname);
668 } else {
669 sess = se_sess->fabric_sess_ptr;
670
671 if (sess->sess_ops->InitiatorName)
672 rb += sprintf(page+rb, "InitiatorName: %s\n",
673 sess->sess_ops->InitiatorName);
674 if (sess->sess_ops->InitiatorAlias)
675 rb += sprintf(page+rb, "InitiatorAlias: %s\n",
676 sess->sess_ops->InitiatorAlias);
677
678 rb += sprintf(page+rb, "LIO Session ID: %u "
679 "ISID: 0x%02x %02x %02x %02x %02x %02x "
680 "TSIH: %hu ", sess->sid,
681 sess->isid[0], sess->isid[1], sess->isid[2],
682 sess->isid[3], sess->isid[4], sess->isid[5],
683 sess->tsih);
684 rb += sprintf(page+rb, "SessionType: %s\n",
685 (sess->sess_ops->SessionType) ?
686 "Discovery" : "Normal");
687 rb += sprintf(page+rb, "Session State: ");
688 switch (sess->session_state) {
689 case TARG_SESS_STATE_FREE:
690 rb += sprintf(page+rb, "TARG_SESS_FREE\n");
691 break;
692 case TARG_SESS_STATE_ACTIVE:
693 rb += sprintf(page+rb, "TARG_SESS_STATE_ACTIVE\n");
694 break;
695 case TARG_SESS_STATE_LOGGED_IN:
696 rb += sprintf(page+rb, "TARG_SESS_STATE_LOGGED_IN\n");
697 break;
698 case TARG_SESS_STATE_FAILED:
699 rb += sprintf(page+rb, "TARG_SESS_STATE_FAILED\n");
700 break;
701 case TARG_SESS_STATE_IN_CONTINUE:
702 rb += sprintf(page+rb, "TARG_SESS_STATE_IN_CONTINUE\n");
703 break;
704 default:
705 rb += sprintf(page+rb, "ERROR: Unknown Session"
706 " State!\n");
707 break;
708 }
709
710 rb += sprintf(page+rb, "---------------------[iSCSI Session"
711 " Values]-----------------------\n");
712 rb += sprintf(page+rb, " CmdSN/WR : CmdSN/WC : ExpCmdSN"
713 " : MaxCmdSN : ITT : TTT\n");
714 rb += sprintf(page+rb, " 0x%08x 0x%08x 0x%08x 0x%08x"
715 " 0x%08x 0x%08x\n",
716 sess->cmdsn_window,
717 (sess->max_cmd_sn - sess->exp_cmd_sn) + 1,
718 sess->exp_cmd_sn, sess->max_cmd_sn,
719 sess->init_task_tag, sess->targ_xfer_tag);
720 rb += sprintf(page+rb, "----------------------[iSCSI"
721 " Connections]-------------------------\n");
722
723 spin_lock(&sess->conn_lock);
724 list_for_each_entry(conn, &sess->sess_conn_list, conn_list) {
725 rb += sprintf(page+rb, "CID: %hu Connection"
726 " State: ", conn->cid);
727 switch (conn->conn_state) {
728 case TARG_CONN_STATE_FREE:
729 rb += sprintf(page+rb,
730 "TARG_CONN_STATE_FREE\n");
731 break;
732 case TARG_CONN_STATE_XPT_UP:
733 rb += sprintf(page+rb,
734 "TARG_CONN_STATE_XPT_UP\n");
735 break;
736 case TARG_CONN_STATE_IN_LOGIN:
737 rb += sprintf(page+rb,
738 "TARG_CONN_STATE_IN_LOGIN\n");
739 break;
740 case TARG_CONN_STATE_LOGGED_IN:
741 rb += sprintf(page+rb,
742 "TARG_CONN_STATE_LOGGED_IN\n");
743 break;
744 case TARG_CONN_STATE_IN_LOGOUT:
745 rb += sprintf(page+rb,
746 "TARG_CONN_STATE_IN_LOGOUT\n");
747 break;
748 case TARG_CONN_STATE_LOGOUT_REQUESTED:
749 rb += sprintf(page+rb,
750 "TARG_CONN_STATE_LOGOUT_REQUESTED\n");
751 break;
752 case TARG_CONN_STATE_CLEANUP_WAIT:
753 rb += sprintf(page+rb,
754 "TARG_CONN_STATE_CLEANUP_WAIT\n");
755 break;
756 default:
757 rb += sprintf(page+rb,
758 "ERROR: Unknown Connection State!\n");
759 break;
760 }
761
762 rb += sprintf(page+rb, " Address %s %s", conn->login_ip,
763 (conn->network_transport == ISCSI_TCP) ?
764 "TCP" : "SCTP");
765 rb += sprintf(page+rb, " StatSN: 0x%08x\n",
766 conn->stat_sn);
767 }
768 spin_unlock(&sess->conn_lock);
769 }
770 spin_unlock_bh(&se_nacl->nacl_sess_lock);
771
772 return rb;
773 }
774
775 TF_NACL_BASE_ATTR_RO(lio_target, info);
776
777 static ssize_t lio_target_nacl_show_cmdsn_depth(
778 struct se_node_acl *se_nacl,
779 char *page)
780 {
781 return sprintf(page, "%u\n", se_nacl->queue_depth);
782 }
783
784 static ssize_t lio_target_nacl_store_cmdsn_depth(
785 struct se_node_acl *se_nacl,
786 const char *page,
787 size_t count)
788 {
789 struct se_portal_group *se_tpg = se_nacl->se_tpg;
790 struct iscsi_portal_group *tpg = container_of(se_tpg,
791 struct iscsi_portal_group, tpg_se_tpg);
792 struct config_item *acl_ci, *tpg_ci, *wwn_ci;
793 u32 cmdsn_depth = 0;
794 int ret;
795
796 ret = kstrtou32(page, 0, &cmdsn_depth);
797 if (ret)
798 return ret;
799 if (cmdsn_depth > TA_DEFAULT_CMDSN_DEPTH_MAX) {
800 pr_err("Passed cmdsn_depth: %u exceeds"
801 " TA_DEFAULT_CMDSN_DEPTH_MAX: %u\n", cmdsn_depth,
802 TA_DEFAULT_CMDSN_DEPTH_MAX);
803 return -EINVAL;
804 }
805 acl_ci = &se_nacl->acl_group.cg_item;
806 if (!acl_ci) {
807 pr_err("Unable to locatel acl_ci\n");
808 return -EINVAL;
809 }
810 tpg_ci = &acl_ci->ci_parent->ci_group->cg_item;
811 if (!tpg_ci) {
812 pr_err("Unable to locate tpg_ci\n");
813 return -EINVAL;
814 }
815 wwn_ci = &tpg_ci->ci_group->cg_item;
816 if (!wwn_ci) {
817 pr_err("Unable to locate config_item wwn_ci\n");
818 return -EINVAL;
819 }
820
821 if (iscsit_get_tpg(tpg) < 0)
822 return -EINVAL;
823 /*
824 * iscsit_tpg_set_initiator_node_queue_depth() assumes force=1
825 */
826 ret = iscsit_tpg_set_initiator_node_queue_depth(tpg,
827 config_item_name(acl_ci), cmdsn_depth, 1);
828
829 pr_debug("LIO_Target_ConfigFS: %s/%s Set CmdSN Window: %u for"
830 "InitiatorName: %s\n", config_item_name(wwn_ci),
831 config_item_name(tpg_ci), cmdsn_depth,
832 config_item_name(acl_ci));
833
834 iscsit_put_tpg(tpg);
835 return (!ret) ? count : (ssize_t)ret;
836 }
837
838 TF_NACL_BASE_ATTR(lio_target, cmdsn_depth, S_IRUGO | S_IWUSR);
839
840 static ssize_t lio_target_nacl_show_tag(
841 struct se_node_acl *se_nacl,
842 char *page)
843 {
844 return snprintf(page, PAGE_SIZE, "%s", se_nacl->acl_tag);
845 }
846
847 static ssize_t lio_target_nacl_store_tag(
848 struct se_node_acl *se_nacl,
849 const char *page,
850 size_t count)
851 {
852 int ret;
853
854 ret = core_tpg_set_initiator_node_tag(se_nacl->se_tpg, se_nacl, page);
855
856 if (ret < 0)
857 return ret;
858 return count;
859 }
860
861 TF_NACL_BASE_ATTR(lio_target, tag, S_IRUGO | S_IWUSR);
862
863 static struct configfs_attribute *lio_target_initiator_attrs[] = {
864 &lio_target_nacl_info.attr,
865 &lio_target_nacl_cmdsn_depth.attr,
866 &lio_target_nacl_tag.attr,
867 NULL,
868 };
869
870 static struct se_node_acl *lio_tpg_alloc_fabric_acl(
871 struct se_portal_group *se_tpg)
872 {
873 struct iscsi_node_acl *acl;
874
875 acl = kzalloc(sizeof(struct iscsi_node_acl), GFP_KERNEL);
876 if (!acl) {
877 pr_err("Unable to allocate memory for struct iscsi_node_acl\n");
878 return NULL;
879 }
880
881 return &acl->se_node_acl;
882 }
883
884 static struct se_node_acl *lio_target_make_nodeacl(
885 struct se_portal_group *se_tpg,
886 struct config_group *group,
887 const char *name)
888 {
889 struct config_group *stats_cg;
890 struct iscsi_node_acl *acl;
891 struct se_node_acl *se_nacl_new, *se_nacl;
892 struct iscsi_portal_group *tpg = container_of(se_tpg,
893 struct iscsi_portal_group, tpg_se_tpg);
894 u32 cmdsn_depth;
895
896 se_nacl_new = lio_tpg_alloc_fabric_acl(se_tpg);
897 if (!se_nacl_new)
898 return ERR_PTR(-ENOMEM);
899
900 cmdsn_depth = ISCSI_TPG_ATTRIB(tpg)->default_cmdsn_depth;
901 /*
902 * se_nacl_new may be released by core_tpg_add_initiator_node_acl()
903 * when converting a NdoeACL from demo mode -> explict
904 */
905 se_nacl = core_tpg_add_initiator_node_acl(se_tpg, se_nacl_new,
906 name, cmdsn_depth);
907 if (IS_ERR(se_nacl))
908 return se_nacl;
909
910 acl = container_of(se_nacl, struct iscsi_node_acl, se_node_acl);
911 stats_cg = &se_nacl->acl_fabric_stat_group;
912
913 stats_cg->default_groups = kmalloc(sizeof(struct config_group *) * 2,
914 GFP_KERNEL);
915 if (!stats_cg->default_groups) {
916 pr_err("Unable to allocate memory for"
917 " stats_cg->default_groups\n");
918 core_tpg_del_initiator_node_acl(se_tpg, se_nacl, 1);
919 kfree(acl);
920 return ERR_PTR(-ENOMEM);
921 }
922
923 stats_cg->default_groups[0] = &NODE_STAT_GRPS(acl)->iscsi_sess_stats_group;
924 stats_cg->default_groups[1] = NULL;
925 config_group_init_type_name(&NODE_STAT_GRPS(acl)->iscsi_sess_stats_group,
926 "iscsi_sess_stats", &iscsi_stat_sess_cit);
927
928 return se_nacl;
929 }
930
931 static void lio_target_drop_nodeacl(
932 struct se_node_acl *se_nacl)
933 {
934 struct se_portal_group *se_tpg = se_nacl->se_tpg;
935 struct iscsi_node_acl *acl = container_of(se_nacl,
936 struct iscsi_node_acl, se_node_acl);
937 struct config_item *df_item;
938 struct config_group *stats_cg;
939 int i;
940
941 stats_cg = &acl->se_node_acl.acl_fabric_stat_group;
942 for (i = 0; stats_cg->default_groups[i]; i++) {
943 df_item = &stats_cg->default_groups[i]->cg_item;
944 stats_cg->default_groups[i] = NULL;
945 config_item_put(df_item);
946 }
947 kfree(stats_cg->default_groups);
948
949 core_tpg_del_initiator_node_acl(se_tpg, se_nacl, 1);
950 kfree(acl);
951 }
952
953 /* End items for lio_target_acl_cit */
954
955 /* Start items for lio_target_tpg_attrib_cit */
956
957 #define DEF_TPG_ATTRIB(name) \
958 \
959 static ssize_t iscsi_tpg_attrib_show_##name( \
960 struct se_portal_group *se_tpg, \
961 char *page) \
962 { \
963 struct iscsi_portal_group *tpg = container_of(se_tpg, \
964 struct iscsi_portal_group, tpg_se_tpg); \
965 ssize_t rb; \
966 \
967 if (iscsit_get_tpg(tpg) < 0) \
968 return -EINVAL; \
969 \
970 rb = sprintf(page, "%u\n", ISCSI_TPG_ATTRIB(tpg)->name); \
971 iscsit_put_tpg(tpg); \
972 return rb; \
973 } \
974 \
975 static ssize_t iscsi_tpg_attrib_store_##name( \
976 struct se_portal_group *se_tpg, \
977 const char *page, \
978 size_t count) \
979 { \
980 struct iscsi_portal_group *tpg = container_of(se_tpg, \
981 struct iscsi_portal_group, tpg_se_tpg); \
982 u32 val; \
983 int ret; \
984 \
985 if (iscsit_get_tpg(tpg) < 0) \
986 return -EINVAL; \
987 \
988 ret = kstrtou32(page, 0, &val); \
989 if (ret) \
990 goto out; \
991 ret = iscsit_ta_##name(tpg, val); \
992 if (ret < 0) \
993 goto out; \
994 \
995 iscsit_put_tpg(tpg); \
996 return count; \
997 out: \
998 iscsit_put_tpg(tpg); \
999 return ret; \
1000 }
1001
1002 #define TPG_ATTR(_name, _mode) TF_TPG_ATTRIB_ATTR(iscsi, _name, _mode);
1003
1004 /*
1005 * Define iscsi_tpg_attrib_s_authentication
1006 */
1007 DEF_TPG_ATTRIB(authentication);
1008 TPG_ATTR(authentication, S_IRUGO | S_IWUSR);
1009 /*
1010 * Define iscsi_tpg_attrib_s_login_timeout
1011 */
1012 DEF_TPG_ATTRIB(login_timeout);
1013 TPG_ATTR(login_timeout, S_IRUGO | S_IWUSR);
1014 /*
1015 * Define iscsi_tpg_attrib_s_netif_timeout
1016 */
1017 DEF_TPG_ATTRIB(netif_timeout);
1018 TPG_ATTR(netif_timeout, S_IRUGO | S_IWUSR);
1019 /*
1020 * Define iscsi_tpg_attrib_s_generate_node_acls
1021 */
1022 DEF_TPG_ATTRIB(generate_node_acls);
1023 TPG_ATTR(generate_node_acls, S_IRUGO | S_IWUSR);
1024 /*
1025 * Define iscsi_tpg_attrib_s_default_cmdsn_depth
1026 */
1027 DEF_TPG_ATTRIB(default_cmdsn_depth);
1028 TPG_ATTR(default_cmdsn_depth, S_IRUGO | S_IWUSR);
1029 /*
1030 Define iscsi_tpg_attrib_s_cache_dynamic_acls
1031 */
1032 DEF_TPG_ATTRIB(cache_dynamic_acls);
1033 TPG_ATTR(cache_dynamic_acls, S_IRUGO | S_IWUSR);
1034 /*
1035 * Define iscsi_tpg_attrib_s_demo_mode_write_protect
1036 */
1037 DEF_TPG_ATTRIB(demo_mode_write_protect);
1038 TPG_ATTR(demo_mode_write_protect, S_IRUGO | S_IWUSR);
1039 /*
1040 * Define iscsi_tpg_attrib_s_prod_mode_write_protect
1041 */
1042 DEF_TPG_ATTRIB(prod_mode_write_protect);
1043 TPG_ATTR(prod_mode_write_protect, S_IRUGO | S_IWUSR);
1044
1045 static struct configfs_attribute *lio_target_tpg_attrib_attrs[] = {
1046 &iscsi_tpg_attrib_authentication.attr,
1047 &iscsi_tpg_attrib_login_timeout.attr,
1048 &iscsi_tpg_attrib_netif_timeout.attr,
1049 &iscsi_tpg_attrib_generate_node_acls.attr,
1050 &iscsi_tpg_attrib_default_cmdsn_depth.attr,
1051 &iscsi_tpg_attrib_cache_dynamic_acls.attr,
1052 &iscsi_tpg_attrib_demo_mode_write_protect.attr,
1053 &iscsi_tpg_attrib_prod_mode_write_protect.attr,
1054 NULL,
1055 };
1056
1057 /* End items for lio_target_tpg_attrib_cit */
1058
1059 /* Start items for lio_target_tpg_auth_cit */
1060
1061 #define __DEF_TPG_AUTH_STR(prefix, name, flags) \
1062 static ssize_t __iscsi_##prefix##_show_##name( \
1063 struct se_portal_group *se_tpg, \
1064 char *page) \
1065 { \
1066 struct iscsi_portal_group *tpg = container_of(se_tpg, \
1067 struct iscsi_portal_group, tpg_se_tpg); \
1068 struct iscsi_node_auth *auth = &tpg->tpg_demo_auth; \
1069 \
1070 if (!capable(CAP_SYS_ADMIN)) \
1071 return -EPERM; \
1072 \
1073 return snprintf(page, PAGE_SIZE, "%s\n", auth->name); \
1074 } \
1075 \
1076 static ssize_t __iscsi_##prefix##_store_##name( \
1077 struct se_portal_group *se_tpg, \
1078 const char *page, \
1079 size_t count) \
1080 { \
1081 struct iscsi_portal_group *tpg = container_of(se_tpg, \
1082 struct iscsi_portal_group, tpg_se_tpg); \
1083 struct iscsi_node_auth *auth = &tpg->tpg_demo_auth; \
1084 \
1085 if (!capable(CAP_SYS_ADMIN)) \
1086 return -EPERM; \
1087 \
1088 snprintf(auth->name, sizeof(auth->name), "%s", page); \
1089 if (!(strncmp("NULL", auth->name, 4))) \
1090 auth->naf_flags &= ~flags; \
1091 else \
1092 auth->naf_flags |= flags; \
1093 \
1094 if ((auth->naf_flags & NAF_USERID_IN_SET) && \
1095 (auth->naf_flags & NAF_PASSWORD_IN_SET)) \
1096 auth->authenticate_target = 1; \
1097 else \
1098 auth->authenticate_target = 0; \
1099 \
1100 return count; \
1101 }
1102
1103 #define __DEF_TPG_AUTH_INT(prefix, name) \
1104 static ssize_t __iscsi_##prefix##_show_##name( \
1105 struct se_portal_group *se_tpg, \
1106 char *page) \
1107 { \
1108 struct iscsi_portal_group *tpg = container_of(se_tpg, \
1109 struct iscsi_portal_group, tpg_se_tpg); \
1110 struct iscsi_node_auth *auth = &tpg->tpg_demo_auth; \
1111 \
1112 if (!capable(CAP_SYS_ADMIN)) \
1113 return -EPERM; \
1114 \
1115 return snprintf(page, PAGE_SIZE, "%d\n", auth->name); \
1116 }
1117
1118 #define DEF_TPG_AUTH_STR(name, flags) \
1119 __DEF_TPG_AUTH_STR(tpg_auth, name, flags) \
1120 static ssize_t iscsi_tpg_auth_show_##name( \
1121 struct se_portal_group *se_tpg, \
1122 char *page) \
1123 { \
1124 return __iscsi_tpg_auth_show_##name(se_tpg, page); \
1125 } \
1126 \
1127 static ssize_t iscsi_tpg_auth_store_##name( \
1128 struct se_portal_group *se_tpg, \
1129 const char *page, \
1130 size_t count) \
1131 { \
1132 return __iscsi_tpg_auth_store_##name(se_tpg, page, count); \
1133 }
1134
1135 #define DEF_TPG_AUTH_INT(name) \
1136 __DEF_TPG_AUTH_INT(tpg_auth, name) \
1137 static ssize_t iscsi_tpg_auth_show_##name( \
1138 struct se_portal_group *se_tpg, \
1139 char *page) \
1140 { \
1141 return __iscsi_tpg_auth_show_##name(se_tpg, page); \
1142 }
1143
1144 #define TPG_AUTH_ATTR(_name, _mode) TF_TPG_AUTH_ATTR(iscsi, _name, _mode);
1145 #define TPG_AUTH_ATTR_RO(_name) TF_TPG_AUTH_ATTR_RO(iscsi, _name);
1146
1147 /*
1148 * * One-way authentication userid
1149 * */
1150 DEF_TPG_AUTH_STR(userid, NAF_USERID_SET);
1151 TPG_AUTH_ATTR(userid, S_IRUGO | S_IWUSR);
1152 /*
1153 * * One-way authentication password
1154 * */
1155 DEF_TPG_AUTH_STR(password, NAF_PASSWORD_SET);
1156 TPG_AUTH_ATTR(password, S_IRUGO | S_IWUSR);
1157 /*
1158 * * Enforce mutual authentication
1159 * */
1160 DEF_TPG_AUTH_INT(authenticate_target);
1161 TPG_AUTH_ATTR_RO(authenticate_target);
1162 /*
1163 * * Mutual authentication userid
1164 * */
1165 DEF_TPG_AUTH_STR(userid_mutual, NAF_USERID_IN_SET);
1166 TPG_AUTH_ATTR(userid_mutual, S_IRUGO | S_IWUSR);
1167 /*
1168 * * Mutual authentication password
1169 * */
1170 DEF_TPG_AUTH_STR(password_mutual, NAF_PASSWORD_IN_SET);
1171 TPG_AUTH_ATTR(password_mutual, S_IRUGO | S_IWUSR);
1172
1173 static struct configfs_attribute *lio_target_tpg_auth_attrs[] = {
1174 &iscsi_tpg_auth_userid.attr,
1175 &iscsi_tpg_auth_password.attr,
1176 &iscsi_tpg_auth_authenticate_target.attr,
1177 &iscsi_tpg_auth_userid_mutual.attr,
1178 &iscsi_tpg_auth_password_mutual.attr,
1179 NULL,
1180 };
1181
1182 /* End items for lio_target_tpg_auth_cit */
1183
1184 /* Start items for lio_target_tpg_param_cit */
1185
1186 #define DEF_TPG_PARAM(name) \
1187 static ssize_t iscsi_tpg_param_show_##name( \
1188 struct se_portal_group *se_tpg, \
1189 char *page) \
1190 { \
1191 struct iscsi_portal_group *tpg = container_of(se_tpg, \
1192 struct iscsi_portal_group, tpg_se_tpg); \
1193 struct iscsi_param *param; \
1194 ssize_t rb; \
1195 \
1196 if (iscsit_get_tpg(tpg) < 0) \
1197 return -EINVAL; \
1198 \
1199 param = iscsi_find_param_from_key(__stringify(name), \
1200 tpg->param_list); \
1201 if (!param) { \
1202 iscsit_put_tpg(tpg); \
1203 return -EINVAL; \
1204 } \
1205 rb = snprintf(page, PAGE_SIZE, "%s\n", param->value); \
1206 \
1207 iscsit_put_tpg(tpg); \
1208 return rb; \
1209 } \
1210 static ssize_t iscsi_tpg_param_store_##name( \
1211 struct se_portal_group *se_tpg, \
1212 const char *page, \
1213 size_t count) \
1214 { \
1215 struct iscsi_portal_group *tpg = container_of(se_tpg, \
1216 struct iscsi_portal_group, tpg_se_tpg); \
1217 char *buf; \
1218 int ret, len; \
1219 \
1220 buf = kzalloc(PAGE_SIZE, GFP_KERNEL); \
1221 if (!buf) \
1222 return -ENOMEM; \
1223 len = snprintf(buf, PAGE_SIZE, "%s=%s", __stringify(name), page); \
1224 if (isspace(buf[len-1])) \
1225 buf[len-1] = '\0'; /* Kill newline */ \
1226 \
1227 if (iscsit_get_tpg(tpg) < 0) { \
1228 kfree(buf); \
1229 return -EINVAL; \
1230 } \
1231 \
1232 ret = iscsi_change_param_value(buf, tpg->param_list, 1); \
1233 if (ret < 0) \
1234 goto out; \
1235 \
1236 kfree(buf); \
1237 iscsit_put_tpg(tpg); \
1238 return count; \
1239 out: \
1240 kfree(buf); \
1241 iscsit_put_tpg(tpg); \
1242 return -EINVAL; \
1243 }
1244
1245 #define TPG_PARAM_ATTR(_name, _mode) TF_TPG_PARAM_ATTR(iscsi, _name, _mode);
1246
1247 DEF_TPG_PARAM(AuthMethod);
1248 TPG_PARAM_ATTR(AuthMethod, S_IRUGO | S_IWUSR);
1249
1250 DEF_TPG_PARAM(HeaderDigest);
1251 TPG_PARAM_ATTR(HeaderDigest, S_IRUGO | S_IWUSR);
1252
1253 DEF_TPG_PARAM(DataDigest);
1254 TPG_PARAM_ATTR(DataDigest, S_IRUGO | S_IWUSR);
1255
1256 DEF_TPG_PARAM(MaxConnections);
1257 TPG_PARAM_ATTR(MaxConnections, S_IRUGO | S_IWUSR);
1258
1259 DEF_TPG_PARAM(TargetAlias);
1260 TPG_PARAM_ATTR(TargetAlias, S_IRUGO | S_IWUSR);
1261
1262 DEF_TPG_PARAM(InitialR2T);
1263 TPG_PARAM_ATTR(InitialR2T, S_IRUGO | S_IWUSR);
1264
1265 DEF_TPG_PARAM(ImmediateData);
1266 TPG_PARAM_ATTR(ImmediateData, S_IRUGO | S_IWUSR);
1267
1268 DEF_TPG_PARAM(MaxRecvDataSegmentLength);
1269 TPG_PARAM_ATTR(MaxRecvDataSegmentLength, S_IRUGO | S_IWUSR);
1270
1271 DEF_TPG_PARAM(MaxXmitDataSegmentLength);
1272 TPG_PARAM_ATTR(MaxXmitDataSegmentLength, S_IRUGO | S_IWUSR);
1273
1274 DEF_TPG_PARAM(MaxBurstLength);
1275 TPG_PARAM_ATTR(MaxBurstLength, S_IRUGO | S_IWUSR);
1276
1277 DEF_TPG_PARAM(FirstBurstLength);
1278 TPG_PARAM_ATTR(FirstBurstLength, S_IRUGO | S_IWUSR);
1279
1280 DEF_TPG_PARAM(DefaultTime2Wait);
1281 TPG_PARAM_ATTR(DefaultTime2Wait, S_IRUGO | S_IWUSR);
1282
1283 DEF_TPG_PARAM(DefaultTime2Retain);
1284 TPG_PARAM_ATTR(DefaultTime2Retain, S_IRUGO | S_IWUSR);
1285
1286 DEF_TPG_PARAM(MaxOutstandingR2T);
1287 TPG_PARAM_ATTR(MaxOutstandingR2T, S_IRUGO | S_IWUSR);
1288
1289 DEF_TPG_PARAM(DataPDUInOrder);
1290 TPG_PARAM_ATTR(DataPDUInOrder, S_IRUGO | S_IWUSR);
1291
1292 DEF_TPG_PARAM(DataSequenceInOrder);
1293 TPG_PARAM_ATTR(DataSequenceInOrder, S_IRUGO | S_IWUSR);
1294
1295 DEF_TPG_PARAM(ErrorRecoveryLevel);
1296 TPG_PARAM_ATTR(ErrorRecoveryLevel, S_IRUGO | S_IWUSR);
1297
1298 DEF_TPG_PARAM(IFMarker);
1299 TPG_PARAM_ATTR(IFMarker, S_IRUGO | S_IWUSR);
1300
1301 DEF_TPG_PARAM(OFMarker);
1302 TPG_PARAM_ATTR(OFMarker, S_IRUGO | S_IWUSR);
1303
1304 DEF_TPG_PARAM(IFMarkInt);
1305 TPG_PARAM_ATTR(IFMarkInt, S_IRUGO | S_IWUSR);
1306
1307 DEF_TPG_PARAM(OFMarkInt);
1308 TPG_PARAM_ATTR(OFMarkInt, S_IRUGO | S_IWUSR);
1309
1310 static struct configfs_attribute *lio_target_tpg_param_attrs[] = {
1311 &iscsi_tpg_param_AuthMethod.attr,
1312 &iscsi_tpg_param_HeaderDigest.attr,
1313 &iscsi_tpg_param_DataDigest.attr,
1314 &iscsi_tpg_param_MaxConnections.attr,
1315 &iscsi_tpg_param_TargetAlias.attr,
1316 &iscsi_tpg_param_InitialR2T.attr,
1317 &iscsi_tpg_param_ImmediateData.attr,
1318 &iscsi_tpg_param_MaxRecvDataSegmentLength.attr,
1319 &iscsi_tpg_param_MaxXmitDataSegmentLength.attr,
1320 &iscsi_tpg_param_MaxBurstLength.attr,
1321 &iscsi_tpg_param_FirstBurstLength.attr,
1322 &iscsi_tpg_param_DefaultTime2Wait.attr,
1323 &iscsi_tpg_param_DefaultTime2Retain.attr,
1324 &iscsi_tpg_param_MaxOutstandingR2T.attr,
1325 &iscsi_tpg_param_DataPDUInOrder.attr,
1326 &iscsi_tpg_param_DataSequenceInOrder.attr,
1327 &iscsi_tpg_param_ErrorRecoveryLevel.attr,
1328 &iscsi_tpg_param_IFMarker.attr,
1329 &iscsi_tpg_param_OFMarker.attr,
1330 &iscsi_tpg_param_IFMarkInt.attr,
1331 &iscsi_tpg_param_OFMarkInt.attr,
1332 NULL,
1333 };
1334
1335 /* End items for lio_target_tpg_param_cit */
1336
1337 /* Start items for lio_target_tpg_cit */
1338
1339 static ssize_t lio_target_tpg_show_enable(
1340 struct se_portal_group *se_tpg,
1341 char *page)
1342 {
1343 struct iscsi_portal_group *tpg = container_of(se_tpg,
1344 struct iscsi_portal_group, tpg_se_tpg);
1345 ssize_t len;
1346
1347 spin_lock(&tpg->tpg_state_lock);
1348 len = sprintf(page, "%d\n",
1349 (tpg->tpg_state == TPG_STATE_ACTIVE) ? 1 : 0);
1350 spin_unlock(&tpg->tpg_state_lock);
1351
1352 return len;
1353 }
1354
1355 static ssize_t lio_target_tpg_store_enable(
1356 struct se_portal_group *se_tpg,
1357 const char *page,
1358 size_t count)
1359 {
1360 struct iscsi_portal_group *tpg = container_of(se_tpg,
1361 struct iscsi_portal_group, tpg_se_tpg);
1362 u32 op;
1363 int ret;
1364
1365 ret = kstrtou32(page, 0, &op);
1366 if (ret)
1367 return ret;
1368 if ((op != 1) && (op != 0)) {
1369 pr_err("Illegal value for tpg_enable: %u\n", op);
1370 return -EINVAL;
1371 }
1372
1373 ret = iscsit_get_tpg(tpg);
1374 if (ret < 0)
1375 return -EINVAL;
1376
1377 if (op) {
1378 ret = iscsit_tpg_enable_portal_group(tpg);
1379 if (ret < 0)
1380 goto out;
1381 } else {
1382 /*
1383 * iscsit_tpg_disable_portal_group() assumes force=1
1384 */
1385 ret = iscsit_tpg_disable_portal_group(tpg, 1);
1386 if (ret < 0)
1387 goto out;
1388 }
1389
1390 iscsit_put_tpg(tpg);
1391 return count;
1392 out:
1393 iscsit_put_tpg(tpg);
1394 return -EINVAL;
1395 }
1396
1397 TF_TPG_BASE_ATTR(lio_target, enable, S_IRUGO | S_IWUSR);
1398
1399 static struct configfs_attribute *lio_target_tpg_attrs[] = {
1400 &lio_target_tpg_enable.attr,
1401 NULL,
1402 };
1403
1404 /* End items for lio_target_tpg_cit */
1405
1406 /* Start items for lio_target_tiqn_cit */
1407
1408 static struct se_portal_group *lio_target_tiqn_addtpg(
1409 struct se_wwn *wwn,
1410 struct config_group *group,
1411 const char *name)
1412 {
1413 struct iscsi_portal_group *tpg;
1414 struct iscsi_tiqn *tiqn;
1415 char *tpgt_str;
1416 int ret;
1417 u16 tpgt;
1418
1419 tiqn = container_of(wwn, struct iscsi_tiqn, tiqn_wwn);
1420 /*
1421 * Only tpgt_# directory groups can be created below
1422 * target/iscsi/iqn.superturodiskarry/
1423 */
1424 tpgt_str = strstr(name, "tpgt_");
1425 if (!tpgt_str) {
1426 pr_err("Unable to locate \"tpgt_#\" directory"
1427 " group\n");
1428 return NULL;
1429 }
1430 tpgt_str += 5; /* Skip ahead of "tpgt_" */
1431 ret = kstrtou16(tpgt_str, 0, &tpgt);
1432 if (ret)
1433 return NULL;
1434
1435 tpg = iscsit_alloc_portal_group(tiqn, tpgt);
1436 if (!tpg)
1437 return NULL;
1438
1439 ret = core_tpg_register(
1440 &lio_target_fabric_configfs->tf_ops,
1441 wwn, &tpg->tpg_se_tpg, tpg,
1442 TRANSPORT_TPG_TYPE_NORMAL);
1443 if (ret < 0)
1444 return NULL;
1445
1446 ret = iscsit_tpg_add_portal_group(tiqn, tpg);
1447 if (ret != 0)
1448 goto out;
1449
1450 pr_debug("LIO_Target_ConfigFS: REGISTER -> %s\n", tiqn->tiqn);
1451 pr_debug("LIO_Target_ConfigFS: REGISTER -> Allocated TPG: %s\n",
1452 name);
1453 return &tpg->tpg_se_tpg;
1454 out:
1455 core_tpg_deregister(&tpg->tpg_se_tpg);
1456 kfree(tpg);
1457 return NULL;
1458 }
1459
1460 static void lio_target_tiqn_deltpg(struct se_portal_group *se_tpg)
1461 {
1462 struct iscsi_portal_group *tpg;
1463 struct iscsi_tiqn *tiqn;
1464
1465 tpg = container_of(se_tpg, struct iscsi_portal_group, tpg_se_tpg);
1466 tiqn = tpg->tpg_tiqn;
1467 /*
1468 * iscsit_tpg_del_portal_group() assumes force=1
1469 */
1470 pr_debug("LIO_Target_ConfigFS: DEREGISTER -> Releasing TPG\n");
1471 iscsit_tpg_del_portal_group(tiqn, tpg, 1);
1472 }
1473
1474 /* End items for lio_target_tiqn_cit */
1475
1476 /* Start LIO-Target TIQN struct contig_item lio_target_cit */
1477
1478 static ssize_t lio_target_wwn_show_attr_lio_version(
1479 struct target_fabric_configfs *tf,
1480 char *page)
1481 {
1482 return sprintf(page, "Datera Inc. iSCSI Target "ISCSIT_VERSION"\n");
1483 }
1484
1485 TF_WWN_ATTR_RO(lio_target, lio_version);
1486
1487 static struct configfs_attribute *lio_target_wwn_attrs[] = {
1488 &lio_target_wwn_lio_version.attr,
1489 NULL,
1490 };
1491
1492 static struct se_wwn *lio_target_call_coreaddtiqn(
1493 struct target_fabric_configfs *tf,
1494 struct config_group *group,
1495 const char *name)
1496 {
1497 struct config_group *stats_cg;
1498 struct iscsi_tiqn *tiqn;
1499
1500 tiqn = iscsit_add_tiqn((unsigned char *)name);
1501 if (IS_ERR(tiqn))
1502 return ERR_CAST(tiqn);
1503 /*
1504 * Setup struct iscsi_wwn_stat_grps for se_wwn->fabric_stat_group.
1505 */
1506 stats_cg = &tiqn->tiqn_wwn.fabric_stat_group;
1507
1508 stats_cg->default_groups = kmalloc(sizeof(struct config_group *) * 6,
1509 GFP_KERNEL);
1510 if (!stats_cg->default_groups) {
1511 pr_err("Unable to allocate memory for"
1512 " stats_cg->default_groups\n");
1513 iscsit_del_tiqn(tiqn);
1514 return ERR_PTR(-ENOMEM);
1515 }
1516
1517 stats_cg->default_groups[0] = &WWN_STAT_GRPS(tiqn)->iscsi_instance_group;
1518 stats_cg->default_groups[1] = &WWN_STAT_GRPS(tiqn)->iscsi_sess_err_group;
1519 stats_cg->default_groups[2] = &WWN_STAT_GRPS(tiqn)->iscsi_tgt_attr_group;
1520 stats_cg->default_groups[3] = &WWN_STAT_GRPS(tiqn)->iscsi_login_stats_group;
1521 stats_cg->default_groups[4] = &WWN_STAT_GRPS(tiqn)->iscsi_logout_stats_group;
1522 stats_cg->default_groups[5] = NULL;
1523 config_group_init_type_name(&WWN_STAT_GRPS(tiqn)->iscsi_instance_group,
1524 "iscsi_instance", &iscsi_stat_instance_cit);
1525 config_group_init_type_name(&WWN_STAT_GRPS(tiqn)->iscsi_sess_err_group,
1526 "iscsi_sess_err", &iscsi_stat_sess_err_cit);
1527 config_group_init_type_name(&WWN_STAT_GRPS(tiqn)->iscsi_tgt_attr_group,
1528 "iscsi_tgt_attr", &iscsi_stat_tgt_attr_cit);
1529 config_group_init_type_name(&WWN_STAT_GRPS(tiqn)->iscsi_login_stats_group,
1530 "iscsi_login_stats", &iscsi_stat_login_cit);
1531 config_group_init_type_name(&WWN_STAT_GRPS(tiqn)->iscsi_logout_stats_group,
1532 "iscsi_logout_stats", &iscsi_stat_logout_cit);
1533
1534 pr_debug("LIO_Target_ConfigFS: REGISTER -> %s\n", tiqn->tiqn);
1535 pr_debug("LIO_Target_ConfigFS: REGISTER -> Allocated Node:"
1536 " %s\n", name);
1537 return &tiqn->tiqn_wwn;
1538 }
1539
1540 static void lio_target_call_coredeltiqn(
1541 struct se_wwn *wwn)
1542 {
1543 struct iscsi_tiqn *tiqn = container_of(wwn, struct iscsi_tiqn, tiqn_wwn);
1544 struct config_item *df_item;
1545 struct config_group *stats_cg;
1546 int i;
1547
1548 stats_cg = &tiqn->tiqn_wwn.fabric_stat_group;
1549 for (i = 0; stats_cg->default_groups[i]; i++) {
1550 df_item = &stats_cg->default_groups[i]->cg_item;
1551 stats_cg->default_groups[i] = NULL;
1552 config_item_put(df_item);
1553 }
1554 kfree(stats_cg->default_groups);
1555
1556 pr_debug("LIO_Target_ConfigFS: DEREGISTER -> %s\n",
1557 tiqn->tiqn);
1558 iscsit_del_tiqn(tiqn);
1559 }
1560
1561 /* End LIO-Target TIQN struct contig_lio_target_cit */
1562
1563 /* Start lio_target_discovery_auth_cit */
1564
1565 #define DEF_DISC_AUTH_STR(name, flags) \
1566 __DEF_NACL_AUTH_STR(disc, name, flags) \
1567 static ssize_t iscsi_disc_show_##name( \
1568 struct target_fabric_configfs *tf, \
1569 char *page) \
1570 { \
1571 return __iscsi_disc_show_##name(&iscsit_global->discovery_acl, \
1572 page); \
1573 } \
1574 static ssize_t iscsi_disc_store_##name( \
1575 struct target_fabric_configfs *tf, \
1576 const char *page, \
1577 size_t count) \
1578 { \
1579 return __iscsi_disc_store_##name(&iscsit_global->discovery_acl, \
1580 page, count); \
1581 }
1582
1583 #define DEF_DISC_AUTH_INT(name) \
1584 __DEF_NACL_AUTH_INT(disc, name) \
1585 static ssize_t iscsi_disc_show_##name( \
1586 struct target_fabric_configfs *tf, \
1587 char *page) \
1588 { \
1589 return __iscsi_disc_show_##name(&iscsit_global->discovery_acl, \
1590 page); \
1591 }
1592
1593 #define DISC_AUTH_ATTR(_name, _mode) TF_DISC_ATTR(iscsi, _name, _mode)
1594 #define DISC_AUTH_ATTR_RO(_name) TF_DISC_ATTR_RO(iscsi, _name)
1595
1596 /*
1597 * One-way authentication userid
1598 */
1599 DEF_DISC_AUTH_STR(userid, NAF_USERID_SET);
1600 DISC_AUTH_ATTR(userid, S_IRUGO | S_IWUSR);
1601 /*
1602 * One-way authentication password
1603 */
1604 DEF_DISC_AUTH_STR(password, NAF_PASSWORD_SET);
1605 DISC_AUTH_ATTR(password, S_IRUGO | S_IWUSR);
1606 /*
1607 * Enforce mutual authentication
1608 */
1609 DEF_DISC_AUTH_INT(authenticate_target);
1610 DISC_AUTH_ATTR_RO(authenticate_target);
1611 /*
1612 * Mutual authentication userid
1613 */
1614 DEF_DISC_AUTH_STR(userid_mutual, NAF_USERID_IN_SET);
1615 DISC_AUTH_ATTR(userid_mutual, S_IRUGO | S_IWUSR);
1616 /*
1617 * Mutual authentication password
1618 */
1619 DEF_DISC_AUTH_STR(password_mutual, NAF_PASSWORD_IN_SET);
1620 DISC_AUTH_ATTR(password_mutual, S_IRUGO | S_IWUSR);
1621
1622 /*
1623 * enforce_discovery_auth
1624 */
1625 static ssize_t iscsi_disc_show_enforce_discovery_auth(
1626 struct target_fabric_configfs *tf,
1627 char *page)
1628 {
1629 struct iscsi_node_auth *discovery_auth = &iscsit_global->discovery_acl.node_auth;
1630
1631 return sprintf(page, "%d\n", discovery_auth->enforce_discovery_auth);
1632 }
1633
1634 static ssize_t iscsi_disc_store_enforce_discovery_auth(
1635 struct target_fabric_configfs *tf,
1636 const char *page,
1637 size_t count)
1638 {
1639 struct iscsi_param *param;
1640 struct iscsi_portal_group *discovery_tpg = iscsit_global->discovery_tpg;
1641 u32 op;
1642 int err;
1643
1644 err = kstrtou32(page, 0, &op);
1645 if (err)
1646 return -EINVAL;
1647 if ((op != 1) && (op != 0)) {
1648 pr_err("Illegal value for enforce_discovery_auth:"
1649 " %u\n", op);
1650 return -EINVAL;
1651 }
1652
1653 if (!discovery_tpg) {
1654 pr_err("iscsit_global->discovery_tpg is NULL\n");
1655 return -EINVAL;
1656 }
1657
1658 param = iscsi_find_param_from_key(AUTHMETHOD,
1659 discovery_tpg->param_list);
1660 if (!param)
1661 return -EINVAL;
1662
1663 if (op) {
1664 /*
1665 * Reset the AuthMethod key to CHAP.
1666 */
1667 if (iscsi_update_param_value(param, CHAP) < 0)
1668 return -EINVAL;
1669
1670 discovery_tpg->tpg_attrib.authentication = 1;
1671 iscsit_global->discovery_acl.node_auth.enforce_discovery_auth = 1;
1672 pr_debug("LIO-CORE[0] Successfully enabled"
1673 " authentication enforcement for iSCSI"
1674 " Discovery TPG\n");
1675 } else {
1676 /*
1677 * Reset the AuthMethod key to CHAP,None
1678 */
1679 if (iscsi_update_param_value(param, "CHAP,None") < 0)
1680 return -EINVAL;
1681
1682 discovery_tpg->tpg_attrib.authentication = 0;
1683 iscsit_global->discovery_acl.node_auth.enforce_discovery_auth = 0;
1684 pr_debug("LIO-CORE[0] Successfully disabled"
1685 " authentication enforcement for iSCSI"
1686 " Discovery TPG\n");
1687 }
1688
1689 return count;
1690 }
1691
1692 DISC_AUTH_ATTR(enforce_discovery_auth, S_IRUGO | S_IWUSR);
1693
1694 static struct configfs_attribute *lio_target_discovery_auth_attrs[] = {
1695 &iscsi_disc_userid.attr,
1696 &iscsi_disc_password.attr,
1697 &iscsi_disc_authenticate_target.attr,
1698 &iscsi_disc_userid_mutual.attr,
1699 &iscsi_disc_password_mutual.attr,
1700 &iscsi_disc_enforce_discovery_auth.attr,
1701 NULL,
1702 };
1703
1704 /* End lio_target_discovery_auth_cit */
1705
1706 /* Start functions for target_core_fabric_ops */
1707
1708 static char *iscsi_get_fabric_name(void)
1709 {
1710 return "iSCSI";
1711 }
1712
1713 static u32 iscsi_get_task_tag(struct se_cmd *se_cmd)
1714 {
1715 struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
1716
1717 /* only used for printks or comparism with ->ref_task_tag */
1718 return (__force u32)cmd->init_task_tag;
1719 }
1720
1721 static int iscsi_get_cmd_state(struct se_cmd *se_cmd)
1722 {
1723 struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
1724
1725 return cmd->i_state;
1726 }
1727
1728 static u32 lio_sess_get_index(struct se_session *se_sess)
1729 {
1730 struct iscsi_session *sess = se_sess->fabric_sess_ptr;
1731
1732 return sess->session_index;
1733 }
1734
1735 static u32 lio_sess_get_initiator_sid(
1736 struct se_session *se_sess,
1737 unsigned char *buf,
1738 u32 size)
1739 {
1740 struct iscsi_session *sess = se_sess->fabric_sess_ptr;
1741 /*
1742 * iSCSI Initiator Session Identifier from RFC-3720.
1743 */
1744 return snprintf(buf, size, "%02x%02x%02x%02x%02x%02x",
1745 sess->isid[0], sess->isid[1], sess->isid[2],
1746 sess->isid[3], sess->isid[4], sess->isid[5]);
1747 }
1748
1749 static int lio_queue_data_in(struct se_cmd *se_cmd)
1750 {
1751 struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
1752
1753 cmd->i_state = ISTATE_SEND_DATAIN;
1754 cmd->conn->conn_transport->iscsit_queue_data_in(cmd->conn, cmd);
1755
1756 return 0;
1757 }
1758
1759 static int lio_write_pending(struct se_cmd *se_cmd)
1760 {
1761 struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
1762 struct iscsi_conn *conn = cmd->conn;
1763
1764 if (!cmd->immediate_data && !cmd->unsolicited_data)
1765 return conn->conn_transport->iscsit_get_dataout(conn, cmd, false);
1766
1767 return 0;
1768 }
1769
1770 static int lio_write_pending_status(struct se_cmd *se_cmd)
1771 {
1772 struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
1773 int ret;
1774
1775 spin_lock_bh(&cmd->istate_lock);
1776 ret = !(cmd->cmd_flags & ICF_GOT_LAST_DATAOUT);
1777 spin_unlock_bh(&cmd->istate_lock);
1778
1779 return ret;
1780 }
1781
1782 static int lio_queue_status(struct se_cmd *se_cmd)
1783 {
1784 struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
1785
1786 cmd->i_state = ISTATE_SEND_STATUS;
1787 cmd->conn->conn_transport->iscsit_queue_status(cmd->conn, cmd);
1788
1789 return 0;
1790 }
1791
1792 static void lio_queue_tm_rsp(struct se_cmd *se_cmd)
1793 {
1794 struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
1795
1796 cmd->i_state = ISTATE_SEND_TASKMGTRSP;
1797 iscsit_add_cmd_to_response_queue(cmd, cmd->conn, cmd->i_state);
1798 }
1799
1800 static char *lio_tpg_get_endpoint_wwn(struct se_portal_group *se_tpg)
1801 {
1802 struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
1803
1804 return &tpg->tpg_tiqn->tiqn[0];
1805 }
1806
1807 static u16 lio_tpg_get_tag(struct se_portal_group *se_tpg)
1808 {
1809 struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
1810
1811 return tpg->tpgt;
1812 }
1813
1814 static u32 lio_tpg_get_default_depth(struct se_portal_group *se_tpg)
1815 {
1816 struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
1817
1818 return ISCSI_TPG_ATTRIB(tpg)->default_cmdsn_depth;
1819 }
1820
1821 static int lio_tpg_check_demo_mode(struct se_portal_group *se_tpg)
1822 {
1823 struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
1824
1825 return ISCSI_TPG_ATTRIB(tpg)->generate_node_acls;
1826 }
1827
1828 static int lio_tpg_check_demo_mode_cache(struct se_portal_group *se_tpg)
1829 {
1830 struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
1831
1832 return ISCSI_TPG_ATTRIB(tpg)->cache_dynamic_acls;
1833 }
1834
1835 static int lio_tpg_check_demo_mode_write_protect(
1836 struct se_portal_group *se_tpg)
1837 {
1838 struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
1839
1840 return ISCSI_TPG_ATTRIB(tpg)->demo_mode_write_protect;
1841 }
1842
1843 static int lio_tpg_check_prod_mode_write_protect(
1844 struct se_portal_group *se_tpg)
1845 {
1846 struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
1847
1848 return ISCSI_TPG_ATTRIB(tpg)->prod_mode_write_protect;
1849 }
1850
1851 static void lio_tpg_release_fabric_acl(
1852 struct se_portal_group *se_tpg,
1853 struct se_node_acl *se_acl)
1854 {
1855 struct iscsi_node_acl *acl = container_of(se_acl,
1856 struct iscsi_node_acl, se_node_acl);
1857 kfree(acl);
1858 }
1859
1860 /*
1861 * Called with spin_lock_bh(struct se_portal_group->session_lock) held..
1862 *
1863 * Also, this function calls iscsit_inc_session_usage_count() on the
1864 * struct iscsi_session in question.
1865 */
1866 static int lio_tpg_shutdown_session(struct se_session *se_sess)
1867 {
1868 struct iscsi_session *sess = se_sess->fabric_sess_ptr;
1869
1870 spin_lock(&sess->conn_lock);
1871 if (atomic_read(&sess->session_fall_back_to_erl0) ||
1872 atomic_read(&sess->session_logout) ||
1873 (sess->time2retain_timer_flags & ISCSI_TF_EXPIRED)) {
1874 spin_unlock(&sess->conn_lock);
1875 return 0;
1876 }
1877 atomic_set(&sess->session_reinstatement, 1);
1878 spin_unlock(&sess->conn_lock);
1879
1880 iscsit_stop_time2retain_timer(sess);
1881 iscsit_stop_session(sess, 1, 1);
1882
1883 return 1;
1884 }
1885
1886 /*
1887 * Calls iscsit_dec_session_usage_count() as inverse of
1888 * lio_tpg_shutdown_session()
1889 */
1890 static void lio_tpg_close_session(struct se_session *se_sess)
1891 {
1892 struct iscsi_session *sess = se_sess->fabric_sess_ptr;
1893 /*
1894 * If the iSCSI Session for the iSCSI Initiator Node exists,
1895 * forcefully shutdown the iSCSI NEXUS.
1896 */
1897 iscsit_close_session(sess);
1898 }
1899
1900 static u32 lio_tpg_get_inst_index(struct se_portal_group *se_tpg)
1901 {
1902 struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
1903
1904 return tpg->tpg_tiqn->tiqn_index;
1905 }
1906
1907 static void lio_set_default_node_attributes(struct se_node_acl *se_acl)
1908 {
1909 struct iscsi_node_acl *acl = container_of(se_acl, struct iscsi_node_acl,
1910 se_node_acl);
1911
1912 ISCSI_NODE_ATTRIB(acl)->nacl = acl;
1913 iscsit_set_default_node_attribues(acl);
1914 }
1915
1916 static int lio_check_stop_free(struct se_cmd *se_cmd)
1917 {
1918 return target_put_sess_cmd(se_cmd->se_sess, se_cmd);
1919 }
1920
1921 static void lio_release_cmd(struct se_cmd *se_cmd)
1922 {
1923 struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
1924
1925 pr_debug("Entering lio_release_cmd for se_cmd: %p\n", se_cmd);
1926 iscsit_release_cmd(cmd);
1927 }
1928
1929 /* End functions for target_core_fabric_ops */
1930
1931 int iscsi_target_register_configfs(void)
1932 {
1933 struct target_fabric_configfs *fabric;
1934 int ret;
1935
1936 lio_target_fabric_configfs = NULL;
1937 fabric = target_fabric_configfs_init(THIS_MODULE, "iscsi");
1938 if (IS_ERR(fabric)) {
1939 pr_err("target_fabric_configfs_init() for"
1940 " LIO-Target failed!\n");
1941 return PTR_ERR(fabric);
1942 }
1943 /*
1944 * Setup the fabric API of function pointers used by target_core_mod..
1945 */
1946 fabric->tf_ops.get_fabric_name = &iscsi_get_fabric_name;
1947 fabric->tf_ops.get_fabric_proto_ident = &iscsi_get_fabric_proto_ident;
1948 fabric->tf_ops.tpg_get_wwn = &lio_tpg_get_endpoint_wwn;
1949 fabric->tf_ops.tpg_get_tag = &lio_tpg_get_tag;
1950 fabric->tf_ops.tpg_get_default_depth = &lio_tpg_get_default_depth;
1951 fabric->tf_ops.tpg_get_pr_transport_id = &iscsi_get_pr_transport_id;
1952 fabric->tf_ops.tpg_get_pr_transport_id_len =
1953 &iscsi_get_pr_transport_id_len;
1954 fabric->tf_ops.tpg_parse_pr_out_transport_id =
1955 &iscsi_parse_pr_out_transport_id;
1956 fabric->tf_ops.tpg_check_demo_mode = &lio_tpg_check_demo_mode;
1957 fabric->tf_ops.tpg_check_demo_mode_cache =
1958 &lio_tpg_check_demo_mode_cache;
1959 fabric->tf_ops.tpg_check_demo_mode_write_protect =
1960 &lio_tpg_check_demo_mode_write_protect;
1961 fabric->tf_ops.tpg_check_prod_mode_write_protect =
1962 &lio_tpg_check_prod_mode_write_protect;
1963 fabric->tf_ops.tpg_alloc_fabric_acl = &lio_tpg_alloc_fabric_acl;
1964 fabric->tf_ops.tpg_release_fabric_acl = &lio_tpg_release_fabric_acl;
1965 fabric->tf_ops.tpg_get_inst_index = &lio_tpg_get_inst_index;
1966 fabric->tf_ops.check_stop_free = &lio_check_stop_free,
1967 fabric->tf_ops.release_cmd = &lio_release_cmd;
1968 fabric->tf_ops.shutdown_session = &lio_tpg_shutdown_session;
1969 fabric->tf_ops.close_session = &lio_tpg_close_session;
1970 fabric->tf_ops.sess_get_index = &lio_sess_get_index;
1971 fabric->tf_ops.sess_get_initiator_sid = &lio_sess_get_initiator_sid;
1972 fabric->tf_ops.write_pending = &lio_write_pending;
1973 fabric->tf_ops.write_pending_status = &lio_write_pending_status;
1974 fabric->tf_ops.set_default_node_attributes =
1975 &lio_set_default_node_attributes;
1976 fabric->tf_ops.get_task_tag = &iscsi_get_task_tag;
1977 fabric->tf_ops.get_cmd_state = &iscsi_get_cmd_state;
1978 fabric->tf_ops.queue_data_in = &lio_queue_data_in;
1979 fabric->tf_ops.queue_status = &lio_queue_status;
1980 fabric->tf_ops.queue_tm_rsp = &lio_queue_tm_rsp;
1981 /*
1982 * Setup function pointers for generic logic in target_core_fabric_configfs.c
1983 */
1984 fabric->tf_ops.fabric_make_wwn = &lio_target_call_coreaddtiqn;
1985 fabric->tf_ops.fabric_drop_wwn = &lio_target_call_coredeltiqn;
1986 fabric->tf_ops.fabric_make_tpg = &lio_target_tiqn_addtpg;
1987 fabric->tf_ops.fabric_drop_tpg = &lio_target_tiqn_deltpg;
1988 fabric->tf_ops.fabric_post_link = NULL;
1989 fabric->tf_ops.fabric_pre_unlink = NULL;
1990 fabric->tf_ops.fabric_make_np = &lio_target_call_addnptotpg;
1991 fabric->tf_ops.fabric_drop_np = &lio_target_call_delnpfromtpg;
1992 fabric->tf_ops.fabric_make_nodeacl = &lio_target_make_nodeacl;
1993 fabric->tf_ops.fabric_drop_nodeacl = &lio_target_drop_nodeacl;
1994 /*
1995 * Setup default attribute lists for various fabric->tf_cit_tmpl
1996 * sturct config_item_type's
1997 */
1998 TF_CIT_TMPL(fabric)->tfc_discovery_cit.ct_attrs = lio_target_discovery_auth_attrs;
1999 TF_CIT_TMPL(fabric)->tfc_wwn_cit.ct_attrs = lio_target_wwn_attrs;
2000 TF_CIT_TMPL(fabric)->tfc_tpg_base_cit.ct_attrs = lio_target_tpg_attrs;
2001 TF_CIT_TMPL(fabric)->tfc_tpg_attrib_cit.ct_attrs = lio_target_tpg_attrib_attrs;
2002 TF_CIT_TMPL(fabric)->tfc_tpg_auth_cit.ct_attrs = lio_target_tpg_auth_attrs;
2003 TF_CIT_TMPL(fabric)->tfc_tpg_param_cit.ct_attrs = lio_target_tpg_param_attrs;
2004 TF_CIT_TMPL(fabric)->tfc_tpg_np_base_cit.ct_attrs = lio_target_portal_attrs;
2005 TF_CIT_TMPL(fabric)->tfc_tpg_nacl_base_cit.ct_attrs = lio_target_initiator_attrs;
2006 TF_CIT_TMPL(fabric)->tfc_tpg_nacl_attrib_cit.ct_attrs = lio_target_nacl_attrib_attrs;
2007 TF_CIT_TMPL(fabric)->tfc_tpg_nacl_auth_cit.ct_attrs = lio_target_nacl_auth_attrs;
2008 TF_CIT_TMPL(fabric)->tfc_tpg_nacl_param_cit.ct_attrs = lio_target_nacl_param_attrs;
2009
2010 ret = target_fabric_configfs_register(fabric);
2011 if (ret < 0) {
2012 pr_err("target_fabric_configfs_register() for"
2013 " LIO-Target failed!\n");
2014 target_fabric_configfs_free(fabric);
2015 return ret;
2016 }
2017
2018 lio_target_fabric_configfs = fabric;
2019 pr_debug("LIO_TARGET[0] - Set fabric ->"
2020 " lio_target_fabric_configfs\n");
2021 return 0;
2022 }
2023
2024
2025 void iscsi_target_deregister_configfs(void)
2026 {
2027 if (!lio_target_fabric_configfs)
2028 return;
2029 /*
2030 * Shutdown discovery sessions and disable discovery TPG
2031 */
2032 if (iscsit_global->discovery_tpg)
2033 iscsit_tpg_disable_portal_group(iscsit_global->discovery_tpg, 1);
2034
2035 target_fabric_configfs_deregister(lio_target_fabric_configfs);
2036 lio_target_fabric_configfs = NULL;
2037 pr_debug("LIO_TARGET[0] - Cleared"
2038 " lio_target_fabric_configfs\n");
2039 }
This page took 0.074092 seconds and 5 git commands to generate.