mirror of
				https://github.com/physwizz/a155-U-u1.git
				synced 2025-10-28 16:15:46 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			504 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			504 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0-only
 | 
						|
/*
 | 
						|
 * Copyright (c) 2010 Cisco Systems, Inc.
 | 
						|
 */
 | 
						|
 | 
						|
/* XXX TBD some includes may be extraneous */
 | 
						|
 | 
						|
#include <linux/module.h>
 | 
						|
#include <linux/moduleparam.h>
 | 
						|
#include <linux/utsname.h>
 | 
						|
#include <linux/init.h>
 | 
						|
#include <linux/slab.h>
 | 
						|
#include <linux/kthread.h>
 | 
						|
#include <linux/types.h>
 | 
						|
#include <linux/string.h>
 | 
						|
#include <linux/configfs.h>
 | 
						|
#include <linux/ctype.h>
 | 
						|
#include <linux/hash.h>
 | 
						|
#include <linux/rcupdate.h>
 | 
						|
#include <linux/rculist.h>
 | 
						|
#include <linux/kref.h>
 | 
						|
#include <asm/unaligned.h>
 | 
						|
#include <scsi/libfc.h>
 | 
						|
 | 
						|
#include <target/target_core_base.h>
 | 
						|
#include <target/target_core_fabric.h>
 | 
						|
 | 
						|
#include "tcm_fc.h"
 | 
						|
 | 
						|
#define TFC_SESS_DBG(lport, fmt, args...) \
 | 
						|
	pr_debug("host%u: rport %6.6x: " fmt,	   \
 | 
						|
		 (lport)->host->host_no,	   \
 | 
						|
		 (lport)->port_id, ##args )
 | 
						|
 | 
						|
static void ft_sess_delete_all(struct ft_tport *);
 | 
						|
 | 
						|
/*
 | 
						|
 * Lookup or allocate target local port.
 | 
						|
 * Caller holds ft_lport_lock.
 | 
						|
 */
 | 
						|
static struct ft_tport *ft_tport_get(struct fc_lport *lport)
 | 
						|
{
 | 
						|
	struct ft_tpg *tpg;
 | 
						|
	struct ft_tport *tport;
 | 
						|
	int i;
 | 
						|
 | 
						|
	tport = rcu_dereference_protected(lport->prov[FC_TYPE_FCP],
 | 
						|
					  lockdep_is_held(&ft_lport_lock));
 | 
						|
	if (tport && tport->tpg)
 | 
						|
		return tport;
 | 
						|
 | 
						|
	tpg = ft_lport_find_tpg(lport);
 | 
						|
	if (!tpg)
 | 
						|
		return NULL;
 | 
						|
 | 
						|
	if (tport) {
 | 
						|
		tport->tpg = tpg;
 | 
						|
		tpg->tport = tport;
 | 
						|
		return tport;
 | 
						|
	}
 | 
						|
 | 
						|
	tport = kzalloc(sizeof(*tport), GFP_KERNEL);
 | 
						|
	if (!tport)
 | 
						|
		return NULL;
 | 
						|
 | 
						|
	tport->lport = lport;
 | 
						|
	tport->tpg = tpg;
 | 
						|
	tpg->tport = tport;
 | 
						|
	for (i = 0; i < FT_SESS_HASH_SIZE; i++)
 | 
						|
		INIT_HLIST_HEAD(&tport->hash[i]);
 | 
						|
 | 
						|
	rcu_assign_pointer(lport->prov[FC_TYPE_FCP], tport);
 | 
						|
	return tport;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Delete a target local port.
 | 
						|
 * Caller holds ft_lport_lock.
 | 
						|
 */
 | 
						|
static void ft_tport_delete(struct ft_tport *tport)
 | 
						|
{
 | 
						|
	struct fc_lport *lport;
 | 
						|
	struct ft_tpg *tpg;
 | 
						|
 | 
						|
	ft_sess_delete_all(tport);
 | 
						|
	lport = tport->lport;
 | 
						|
	lport->service_params &= ~FCP_SPPF_TARG_FCN;
 | 
						|
	BUG_ON(tport != lport->prov[FC_TYPE_FCP]);
 | 
						|
	RCU_INIT_POINTER(lport->prov[FC_TYPE_FCP], NULL);
 | 
						|
 | 
						|
	tpg = tport->tpg;
 | 
						|
	if (tpg) {
 | 
						|
		tpg->tport = NULL;
 | 
						|
		tport->tpg = NULL;
 | 
						|
	}
 | 
						|
	kfree_rcu(tport, rcu);
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Add local port.
 | 
						|
 * Called thru fc_lport_iterate().
 | 
						|
 */
 | 
						|
void ft_lport_add(struct fc_lport *lport, void *arg)
 | 
						|
{
 | 
						|
	mutex_lock(&ft_lport_lock);
 | 
						|
	ft_tport_get(lport);
 | 
						|
	lport->service_params |= FCP_SPPF_TARG_FCN;
 | 
						|
	mutex_unlock(&ft_lport_lock);
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Delete local port.
 | 
						|
 * Called thru fc_lport_iterate().
 | 
						|
 */
 | 
						|
void ft_lport_del(struct fc_lport *lport, void *arg)
 | 
						|
{
 | 
						|
	struct ft_tport *tport;
 | 
						|
 | 
						|
	mutex_lock(&ft_lport_lock);
 | 
						|
	tport = lport->prov[FC_TYPE_FCP];
 | 
						|
	if (tport)
 | 
						|
		ft_tport_delete(tport);
 | 
						|
	mutex_unlock(&ft_lport_lock);
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Notification of local port change from libfc.
 | 
						|
 * Create or delete local port and associated tport.
 | 
						|
 */
 | 
						|
int ft_lport_notify(struct notifier_block *nb, unsigned long event, void *arg)
 | 
						|
{
 | 
						|
	struct fc_lport *lport = arg;
 | 
						|
 | 
						|
	switch (event) {
 | 
						|
	case FC_LPORT_EV_ADD:
 | 
						|
		ft_lport_add(lport, NULL);
 | 
						|
		break;
 | 
						|
	case FC_LPORT_EV_DEL:
 | 
						|
		ft_lport_del(lport, NULL);
 | 
						|
		break;
 | 
						|
	}
 | 
						|
	return NOTIFY_DONE;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Hash function for FC_IDs.
 | 
						|
 */
 | 
						|
static u32 ft_sess_hash(u32 port_id)
 | 
						|
{
 | 
						|
	return hash_32(port_id, FT_SESS_HASH_BITS);
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Find session in local port.
 | 
						|
 * Sessions and hash lists are RCU-protected.
 | 
						|
 * A reference is taken which must be eventually freed.
 | 
						|
 */
 | 
						|
static struct ft_sess *ft_sess_get(struct fc_lport *lport, u32 port_id)
 | 
						|
{
 | 
						|
	struct ft_tport *tport;
 | 
						|
	struct hlist_head *head;
 | 
						|
	struct ft_sess *sess;
 | 
						|
	char *reason = "no session created";
 | 
						|
 | 
						|
	rcu_read_lock();
 | 
						|
	tport = rcu_dereference(lport->prov[FC_TYPE_FCP]);
 | 
						|
	if (!tport) {
 | 
						|
		reason = "not an FCP port";
 | 
						|
		goto out;
 | 
						|
	}
 | 
						|
 | 
						|
	head = &tport->hash[ft_sess_hash(port_id)];
 | 
						|
	hlist_for_each_entry_rcu(sess, head, hash) {
 | 
						|
		if (sess->port_id == port_id) {
 | 
						|
			kref_get(&sess->kref);
 | 
						|
			rcu_read_unlock();
 | 
						|
			TFC_SESS_DBG(lport, "port_id %x found %p\n",
 | 
						|
				     port_id, sess);
 | 
						|
			return sess;
 | 
						|
		}
 | 
						|
	}
 | 
						|
out:
 | 
						|
	rcu_read_unlock();
 | 
						|
	TFC_SESS_DBG(lport, "port_id %x not found, %s\n",
 | 
						|
		     port_id, reason);
 | 
						|
	return NULL;
 | 
						|
}
 | 
						|
 | 
						|
static int ft_sess_alloc_cb(struct se_portal_group *se_tpg,
 | 
						|
			    struct se_session *se_sess, void *p)
 | 
						|
{
 | 
						|
	struct ft_sess *sess = p;
 | 
						|
	struct ft_tport *tport = sess->tport;
 | 
						|
	struct hlist_head *head = &tport->hash[ft_sess_hash(sess->port_id)];
 | 
						|
 | 
						|
	TFC_SESS_DBG(tport->lport, "port_id %x sess %p\n", sess->port_id, sess);
 | 
						|
	hlist_add_head_rcu(&sess->hash, head);
 | 
						|
	tport->sess_count++;
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Allocate session and enter it in the hash for the local port.
 | 
						|
 * Caller holds ft_lport_lock.
 | 
						|
 */
 | 
						|
static struct ft_sess *ft_sess_create(struct ft_tport *tport, u32 port_id,
 | 
						|
				      struct fc_rport_priv *rdata)
 | 
						|
{
 | 
						|
	struct se_portal_group *se_tpg = &tport->tpg->se_tpg;
 | 
						|
	struct ft_sess *sess;
 | 
						|
	struct hlist_head *head;
 | 
						|
	unsigned char initiatorname[TRANSPORT_IQN_LEN];
 | 
						|
 | 
						|
	ft_format_wwn(&initiatorname[0], TRANSPORT_IQN_LEN, rdata->ids.port_name);
 | 
						|
 | 
						|
	head = &tport->hash[ft_sess_hash(port_id)];
 | 
						|
	hlist_for_each_entry_rcu(sess, head, hash)
 | 
						|
		if (sess->port_id == port_id)
 | 
						|
			return sess;
 | 
						|
 | 
						|
	sess = kzalloc(sizeof(*sess), GFP_KERNEL);
 | 
						|
	if (!sess)
 | 
						|
		return ERR_PTR(-ENOMEM);
 | 
						|
 | 
						|
	kref_init(&sess->kref); /* ref for table entry */
 | 
						|
	sess->tport = tport;
 | 
						|
	sess->port_id = port_id;
 | 
						|
 | 
						|
	sess->se_sess = target_setup_session(se_tpg, TCM_FC_DEFAULT_TAGS,
 | 
						|
					     sizeof(struct ft_cmd),
 | 
						|
					     TARGET_PROT_NORMAL, &initiatorname[0],
 | 
						|
					     sess, ft_sess_alloc_cb);
 | 
						|
	if (IS_ERR(sess->se_sess)) {
 | 
						|
		int rc = PTR_ERR(sess->se_sess);
 | 
						|
		kfree(sess);
 | 
						|
		sess = ERR_PTR(rc);
 | 
						|
	}
 | 
						|
	return sess;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Unhash the session.
 | 
						|
 * Caller holds ft_lport_lock.
 | 
						|
 */
 | 
						|
static void ft_sess_unhash(struct ft_sess *sess)
 | 
						|
{
 | 
						|
	struct ft_tport *tport = sess->tport;
 | 
						|
 | 
						|
	hlist_del_rcu(&sess->hash);
 | 
						|
	BUG_ON(!tport->sess_count);
 | 
						|
	tport->sess_count--;
 | 
						|
	sess->port_id = -1;
 | 
						|
	sess->params = 0;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Delete session from hash.
 | 
						|
 * Caller holds ft_lport_lock.
 | 
						|
 */
 | 
						|
static struct ft_sess *ft_sess_delete(struct ft_tport *tport, u32 port_id)
 | 
						|
{
 | 
						|
	struct hlist_head *head;
 | 
						|
	struct ft_sess *sess;
 | 
						|
 | 
						|
	head = &tport->hash[ft_sess_hash(port_id)];
 | 
						|
	hlist_for_each_entry_rcu(sess, head, hash) {
 | 
						|
		if (sess->port_id == port_id) {
 | 
						|
			ft_sess_unhash(sess);
 | 
						|
			return sess;
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return NULL;
 | 
						|
}
 | 
						|
 | 
						|
static void ft_close_sess(struct ft_sess *sess)
 | 
						|
{
 | 
						|
	target_sess_cmd_list_set_waiting(sess->se_sess);
 | 
						|
	target_wait_for_sess_cmds(sess->se_sess);
 | 
						|
	ft_sess_put(sess);
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Delete all sessions from tport.
 | 
						|
 * Caller holds ft_lport_lock.
 | 
						|
 */
 | 
						|
static void ft_sess_delete_all(struct ft_tport *tport)
 | 
						|
{
 | 
						|
	struct hlist_head *head;
 | 
						|
	struct ft_sess *sess;
 | 
						|
 | 
						|
	for (head = tport->hash;
 | 
						|
	     head < &tport->hash[FT_SESS_HASH_SIZE]; head++) {
 | 
						|
		hlist_for_each_entry_rcu(sess, head, hash) {
 | 
						|
			ft_sess_unhash(sess);
 | 
						|
			ft_close_sess(sess);	/* release from table */
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * TCM ops for sessions.
 | 
						|
 */
 | 
						|
 | 
						|
/*
 | 
						|
 * Remove session and send PRLO.
 | 
						|
 * This is called when the ACL is being deleted or queue depth is changing.
 | 
						|
 */
 | 
						|
void ft_sess_close(struct se_session *se_sess)
 | 
						|
{
 | 
						|
	struct ft_sess *sess = se_sess->fabric_sess_ptr;
 | 
						|
	u32 port_id;
 | 
						|
 | 
						|
	mutex_lock(&ft_lport_lock);
 | 
						|
	port_id = sess->port_id;
 | 
						|
	if (port_id == -1) {
 | 
						|
		mutex_unlock(&ft_lport_lock);
 | 
						|
		return;
 | 
						|
	}
 | 
						|
	TFC_SESS_DBG(sess->tport->lport, "port_id %x close session\n", port_id);
 | 
						|
	ft_sess_unhash(sess);
 | 
						|
	mutex_unlock(&ft_lport_lock);
 | 
						|
	ft_close_sess(sess);
 | 
						|
	/* XXX Send LOGO or PRLO */
 | 
						|
	synchronize_rcu();		/* let transport deregister happen */
 | 
						|
}
 | 
						|
 | 
						|
u32 ft_sess_get_index(struct se_session *se_sess)
 | 
						|
{
 | 
						|
	struct ft_sess *sess = se_sess->fabric_sess_ptr;
 | 
						|
 | 
						|
	return sess->port_id;	/* XXX TBD probably not what is needed */
 | 
						|
}
 | 
						|
 | 
						|
u32 ft_sess_get_port_name(struct se_session *se_sess,
 | 
						|
			  unsigned char *buf, u32 len)
 | 
						|
{
 | 
						|
	struct ft_sess *sess = se_sess->fabric_sess_ptr;
 | 
						|
 | 
						|
	return ft_format_wwn(buf, len, sess->port_name);
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * libfc ops involving sessions.
 | 
						|
 */
 | 
						|
 | 
						|
static int ft_prli_locked(struct fc_rport_priv *rdata, u32 spp_len,
 | 
						|
			  const struct fc_els_spp *rspp, struct fc_els_spp *spp)
 | 
						|
{
 | 
						|
	struct ft_tport *tport;
 | 
						|
	struct ft_sess *sess;
 | 
						|
	u32 fcp_parm;
 | 
						|
 | 
						|
	tport = ft_tport_get(rdata->local_port);
 | 
						|
	if (!tport)
 | 
						|
		goto not_target;	/* not a target for this local port */
 | 
						|
 | 
						|
	if (!rspp)
 | 
						|
		goto fill;
 | 
						|
 | 
						|
	if (rspp->spp_flags & (FC_SPP_OPA_VAL | FC_SPP_RPA_VAL))
 | 
						|
		return FC_SPP_RESP_NO_PA;
 | 
						|
 | 
						|
	/*
 | 
						|
	 * If both target and initiator bits are off, the SPP is invalid.
 | 
						|
	 */
 | 
						|
	fcp_parm = ntohl(rspp->spp_params);
 | 
						|
	if (!(fcp_parm & (FCP_SPPF_INIT_FCN | FCP_SPPF_TARG_FCN)))
 | 
						|
		return FC_SPP_RESP_INVL;
 | 
						|
 | 
						|
	/*
 | 
						|
	 * Create session (image pair) only if requested by
 | 
						|
	 * EST_IMG_PAIR flag and if the requestor is an initiator.
 | 
						|
	 */
 | 
						|
	if (rspp->spp_flags & FC_SPP_EST_IMG_PAIR) {
 | 
						|
		spp->spp_flags |= FC_SPP_EST_IMG_PAIR;
 | 
						|
		if (!(fcp_parm & FCP_SPPF_INIT_FCN))
 | 
						|
			return FC_SPP_RESP_CONF;
 | 
						|
		sess = ft_sess_create(tport, rdata->ids.port_id, rdata);
 | 
						|
		if (IS_ERR(sess)) {
 | 
						|
			if (PTR_ERR(sess) == -EACCES) {
 | 
						|
				spp->spp_flags &= ~FC_SPP_EST_IMG_PAIR;
 | 
						|
				return FC_SPP_RESP_CONF;
 | 
						|
			} else
 | 
						|
				return FC_SPP_RESP_RES;
 | 
						|
		}
 | 
						|
		if (!sess->params)
 | 
						|
			rdata->prli_count++;
 | 
						|
		sess->params = fcp_parm;
 | 
						|
		sess->port_name = rdata->ids.port_name;
 | 
						|
		sess->max_frame = rdata->maxframe_size;
 | 
						|
 | 
						|
		/* XXX TBD - clearing actions.  unit attn, see 4.10 */
 | 
						|
	}
 | 
						|
 | 
						|
	/*
 | 
						|
	 * OR in our service parameters with other provider (initiator), if any.
 | 
						|
	 */
 | 
						|
fill:
 | 
						|
	fcp_parm = ntohl(spp->spp_params);
 | 
						|
	fcp_parm &= ~FCP_SPPF_RETRY;
 | 
						|
	spp->spp_params = htonl(fcp_parm | FCP_SPPF_TARG_FCN);
 | 
						|
	return FC_SPP_RESP_ACK;
 | 
						|
 | 
						|
not_target:
 | 
						|
	fcp_parm = ntohl(spp->spp_params);
 | 
						|
	fcp_parm &= ~FCP_SPPF_TARG_FCN;
 | 
						|
	spp->spp_params = htonl(fcp_parm);
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * tcm_fcp_prli() - Handle incoming or outgoing PRLI for the FCP target
 | 
						|
 * @rdata: remote port private
 | 
						|
 * @spp_len: service parameter page length
 | 
						|
 * @rspp: received service parameter page (NULL for outgoing PRLI)
 | 
						|
 * @spp: response service parameter page
 | 
						|
 *
 | 
						|
 * Returns spp response code.
 | 
						|
 */
 | 
						|
static int ft_prli(struct fc_rport_priv *rdata, u32 spp_len,
 | 
						|
		   const struct fc_els_spp *rspp, struct fc_els_spp *spp)
 | 
						|
{
 | 
						|
	int ret;
 | 
						|
 | 
						|
	mutex_lock(&ft_lport_lock);
 | 
						|
	ret = ft_prli_locked(rdata, spp_len, rspp, spp);
 | 
						|
	mutex_unlock(&ft_lport_lock);
 | 
						|
	TFC_SESS_DBG(rdata->local_port, "port_id %x flags %x ret %x\n",
 | 
						|
		     rdata->ids.port_id, rspp ? rspp->spp_flags : 0, ret);
 | 
						|
	return ret;
 | 
						|
}
 | 
						|
 | 
						|
static void ft_sess_free(struct kref *kref)
 | 
						|
{
 | 
						|
	struct ft_sess *sess = container_of(kref, struct ft_sess, kref);
 | 
						|
 | 
						|
	target_remove_session(sess->se_sess);
 | 
						|
	kfree_rcu(sess, rcu);
 | 
						|
}
 | 
						|
 | 
						|
void ft_sess_put(struct ft_sess *sess)
 | 
						|
{
 | 
						|
	int sess_held = kref_read(&sess->kref);
 | 
						|
 | 
						|
	BUG_ON(!sess_held);
 | 
						|
	kref_put(&sess->kref, ft_sess_free);
 | 
						|
}
 | 
						|
 | 
						|
static void ft_prlo(struct fc_rport_priv *rdata)
 | 
						|
{
 | 
						|
	struct ft_sess *sess;
 | 
						|
	struct ft_tport *tport;
 | 
						|
 | 
						|
	mutex_lock(&ft_lport_lock);
 | 
						|
	tport = rcu_dereference_protected(rdata->local_port->prov[FC_TYPE_FCP],
 | 
						|
					  lockdep_is_held(&ft_lport_lock));
 | 
						|
 | 
						|
	if (!tport) {
 | 
						|
		mutex_unlock(&ft_lport_lock);
 | 
						|
		return;
 | 
						|
	}
 | 
						|
	sess = ft_sess_delete(tport, rdata->ids.port_id);
 | 
						|
	if (!sess) {
 | 
						|
		mutex_unlock(&ft_lport_lock);
 | 
						|
		return;
 | 
						|
	}
 | 
						|
	mutex_unlock(&ft_lport_lock);
 | 
						|
	ft_close_sess(sess);		/* release from table */
 | 
						|
	rdata->prli_count--;
 | 
						|
	/* XXX TBD - clearing actions.  unit attn, see 4.10 */
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Handle incoming FCP request.
 | 
						|
 * Caller has verified that the frame is type FCP.
 | 
						|
 */
 | 
						|
static void ft_recv(struct fc_lport *lport, struct fc_frame *fp)
 | 
						|
{
 | 
						|
	struct ft_sess *sess;
 | 
						|
	u32 sid = fc_frame_sid(fp);
 | 
						|
 | 
						|
	TFC_SESS_DBG(lport, "recv sid %x\n", sid);
 | 
						|
 | 
						|
	sess = ft_sess_get(lport, sid);
 | 
						|
	if (!sess) {
 | 
						|
		TFC_SESS_DBG(lport, "sid %x sess lookup failed\n", sid);
 | 
						|
		/* TBD XXX - if FCP_CMND, send PRLO */
 | 
						|
		fc_frame_free(fp);
 | 
						|
		return;
 | 
						|
	}
 | 
						|
	ft_recv_req(sess, fp);	/* must do ft_sess_put() */
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Provider ops for libfc.
 | 
						|
 */
 | 
						|
struct fc4_prov ft_prov = {
 | 
						|
	.prli = ft_prli,
 | 
						|
	.prlo = ft_prlo,
 | 
						|
	.recv = ft_recv,
 | 
						|
	.module = THIS_MODULE,
 | 
						|
};
 |