lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Fri, 12 Dec 2008 01:27:40 -0800
From:	"Nicholas A. Bellinger" <nab@...ux-iscsi.org>
To:	"Linux-iSCSI.org Target Dev" 
	<linux-iscsi-target-dev@...glegroups.com>
Cc:	linux-scsi <linux-scsi@...r.kernel.org>,
	LKML <linux-kernel@...r.kernel.org>
Subject: [PATCH] [Target_Core_Mod 1/12] Add generic target portal group
	infrastructure

>>From 445a23ff06b44ed266aa95e4f2e0c370ff13c818 Mon Sep 17 00:00:00 2001
From: Nicholas Bellinger <nab@...ux-iscsi.org>
Date: Fri, 12 Dec 2008 00:39:41 -0800
Subject: [PATCH] [Target_Core_Mod] Add generic target portal group infrastructure

This patch adds generic se_node_acl_t and se_portal_group_t infrastructure code
for Target_Core_Mod/ConfigFS.

This patch adds the following functions, moved and renamed from iscsi_target_tpg.c

extern se_node_acl_t *core_tpg_get_initiator_node_acl (se_portal_group_t *tpg, unsigned char *);
extern void core_tpg_add_node_to_devs (struct se_node_acl_s *, struct se_portal_group_s *);
extern struct se_node_acl_s *core_tpg_check_initiator_node_acl (struct se_portal_group_s *, unsigned char *);
extern void core_tpg_free_node_acls (struct se_portal_group_s *);
extern void core_tpg_clear_object_luns (struct se_portal_group_s *);
extern se_node_acl_t *core_tpg_add_initiator_node_acl (se_portal_group_t *, const char *, u32, int *);
extern int core_tpg_del_initiator_node_acl (se_portal_group_t *, const char *, int);
extern int core_tpg_set_initiator_node_queue_depth (se_portal_group_t *, unsigned char *, u32, int);
extern se_portal_group_t *core_tpg_register (struct target_core_fabric_ops *, void *);
extern int core_tpg_deregister (struct se_portal_group_s *);
extern se_lun_t *core_tpg_pre_addlun (se_portal_group_t *, u32, int *);
extern int core_tpg_post_addlun (se_portal_group_t *, se_lun_t *, int, u32, void *, struct se_obj_lun_type_s *);
extern se_lun_t *core_tpg_pre_dellun (se_portal_group_t *, u32, int, int *);
extern int core_tpg_post_dellun (se_portal_group_t *, se_lun_t *);

This code adds the following export symbols to $FABRIC_MOD:

EXPORT_SYMBOL(core_tpg_free_node_acls);
EXPORT_SYMBOL(core_tpg_clear_object_luns);
EXPORT_SYMBOL(core_tpg_add_initiator_node_acl);
EXPORT_SYMBOL(core_tpg_del_initiator_node_acl);
EXPORT_SYMBOL(core_tpg_register);
EXPORT_SYMBOL(core_tpg_deregister);
EXPORT_SYMBOL(core_tpg_pre_addlun);
EXPORT_SYMBOL(core_tpg_post_addlun);
EXPORT_SYMBOL(core_tpg_pre_dellun);
EXPORT_SYMBOL(core_tpg_post_dellun);

Signed-off-by: Nicholas A. Bellinger <nab@...ux-iscsi.org>
---
 drivers/lio-core/target_core_tpg.c |  858 ++++++++++++++++++++++++++++++++++++
 drivers/lio-core/target_core_tpg.h |   48 ++
 2 files changed, 906 insertions(+), 0 deletions(-)
 create mode 100644 drivers/lio-core/target_core_tpg.c
 create mode 100644 drivers/lio-core/target_core_tpg.h

diff --git a/drivers/lio-core/target_core_tpg.c b/drivers/lio-core/target_core_tpg.c
new file mode 100644
index 0000000..57dca83
--- /dev/null
+++ b/drivers/lio-core/target_core_tpg.c
@@ -0,0 +1,858 @@
+/*********************************************************************************
+ * Filename:  target_core_tpg.c
+ *
+ * This file contains generic Target Portal Group related functions.
+ *
+ * Copyright (c) 2002, 2003, 2004, 2005 PyX Technologies, Inc.
+ * Copyright (c) 2005, 2006, 2007 SBE, Inc. 
+ * Copyright (c) 2007 Rising Tide Software, Inc.
+ * Copyright (c) 2008 Linux-iSCSI.org
+ *
+ * Nicholas A. Bellinger <nab@...nel.org>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+ *
+ *********************************************************************************/
+
+
+#define TARGET_CORE_TPG_C
+
+#include <linux/net.h>
+#include <linux/string.h>
+#include <linux/timer.h>
+#include <linux/slab.h>
+#include <linux/spinlock.h>
+#include <linux/smp_lock.h>
+#include <linux/in.h>
+#include <net/sock.h>
+#include <net/tcp.h>
+#include <scsi/scsi.h>
+#include <scsi/scsi_cmnd.h>
+
+#include <iscsi_linux_os.h>
+#include <iscsi_linux_defs.h>
+#include <iscsi_lists.h>
+#include <iscsi_target_error.h>
+
+#include <target_core_base.h>
+#include <target_core_device.h>
+#include <target_core_hba.h>
+#include <target_core_transport.h>
+#include <target_core_plugin.h>
+#include <target_core_seobj.h>
+#include <target_core_fabric_ops.h>
+
+#undef TARGET_CORE_TPG_C
+
+extern se_global_t *se_global;
+
+/*	core_clear_initiator_node_from_tpg():
+ *
+ *
+ */
+static void core_clear_initiator_node_from_tpg (
+	se_node_acl_t *nacl,
+	se_portal_group_t *tpg)
+{
+	int i;
+	se_dev_entry_t *deve;
+	se_lun_t *lun;
+	se_lun_acl_t *acl;
+
+	spin_lock_bh(&nacl->device_list_lock);
+	for (i = 0; i < TRANSPORT_MAX_LUNS_PER_TPG; i++) {
+		deve = &nacl->device_list[i];
+
+		if (!(deve->lun_flags & TRANSPORT_LUNFLAGS_INITIATOR_ACCESS))
+			continue;
+
+		if (!deve->se_lun) {
+			printk(KERN_ERR "%s device entries device pointer is"
+				" NULL, but Initiator has access.\n",
+				TPG_TFO(tpg)->get_fabric_name());
+			continue;
+		}
+
+		lun = deve->se_lun;
+		spin_unlock_bh(&nacl->device_list_lock);
+		core_update_device_list_for_node(lun, deve->mapped_lun,
+			TRANSPORT_LUNFLAGS_NO_ACCESS, nacl, tpg, 0);
+
+		spin_lock(&lun->lun_acl_lock);
+		for (acl = lun->lun_acl_head; acl; acl = acl->next) {
+			if (!(strcmp(acl->initiatorname, nacl->initiatorname)) &&
+			     (acl->mapped_lun == deve->mapped_lun))
+				break;
+		}
+
+		if (!acl) {
+			printk(KERN_ERR "Unable to locate se_lun_acl_t for %s, mapped_lun: %u\n",
+				nacl->initiatorname, deve->mapped_lun);
+			spin_unlock(&lun->lun_acl_lock);
+			spin_lock_bh(&nacl->device_list_lock);
+			continue;
+		}
+		
+		REMOVE_ENTRY_FROM_LIST(acl, lun->lun_acl_head, lun->lun_acl_tail);
+		spin_unlock(&lun->lun_acl_lock);
+
+		spin_lock_bh(&nacl->device_list_lock);
+		kfree(acl);
+        }
+	spin_unlock_bh(&nacl->device_list_lock);
+
+	return;
+}
+
+/*	__core_tpg_get_initiator_node_acl():
+ *
+ *	spin_lock_bh(&tpg->acl_node_lock); must be held when calling
+ */
+static se_node_acl_t *__core_tpg_get_initiator_node_acl (
+	se_portal_group_t *tpg,
+	const char *initiatorname)
+{
+	se_node_acl_t *acl;
+	
+	for (acl = tpg->acl_node_head; acl; acl = acl->next) {
+		if (!(strcmp(acl->initiatorname, initiatorname)))
+			return(acl);
+	}
+
+	return(NULL);
+}
+
+/*	core_tpg_get_initiator_node_acl():
+ *
+ *
+ */     
+extern se_node_acl_t *core_tpg_get_initiator_node_acl (
+	se_portal_group_t *tpg,
+	unsigned char *initiatorname)
+{               
+	se_node_acl_t *acl;
+		                
+	spin_lock_bh(&tpg->acl_node_lock);
+	for (acl = tpg->acl_node_head; acl; acl = acl->next) {
+		if (!(strcmp(acl->initiatorname, initiatorname)) &&
+		   (!(acl->nodeacl_flags & NAF_DYNAMIC_NODE_ACL))) {
+			spin_unlock_bh(&tpg->acl_node_lock);
+			return(acl);
+		}
+	}
+	spin_unlock_bh(&tpg->acl_node_lock);
+
+	return(NULL);
+}
+
+/*	core_tpg_add_node_to_devs():
+ *
+ *
+ */
+extern void core_tpg_add_node_to_devs (
+	se_node_acl_t *acl,
+	se_portal_group_t *tpg)
+{
+	int i = 0;
+	u32 lun_access = 0;
+	se_lun_t *lun;
+
+	spin_lock(&tpg->tpg_lun_lock);
+	for (i = 0; i < TRANSPORT_MAX_LUNS_PER_TPG; i++) {
+		lun = &tpg->tpg_lun_list[i];
+		if (lun->lun_status != TRANSPORT_LUN_STATUS_ACTIVE)
+			continue;
+
+		spin_unlock(&tpg->tpg_lun_lock);
+
+		/*
+		 * By default in LIO-Target $FABRIC_MOD, demo_mode_write_protect is ON, or READ_ONLY;
+		 */
+		if (!(TPG_TFO(tpg)->tpg_check_demo_mode_write_protect(tpg))) {
+			if (LUN_OBJ_API(lun)->get_device_access) {
+				if (LUN_OBJ_API(lun)->get_device_access(lun->lun_type_ptr) == 0)
+					lun_access = TRANSPORT_LUNFLAGS_READ_ONLY;
+	                        else
+                	                lun_access = TRANSPORT_LUNFLAGS_READ_WRITE;
+			} else
+				lun_access = TRANSPORT_LUNFLAGS_READ_WRITE;
+		} else {
+                        /*
+                         * Allow only optical drives to issue R/W in default RO demo mode.
+                         */
+                        if (LUN_OBJ_API(lun)->get_device_type(lun->lun_type_ptr) == TYPE_DISK)
+                                lun_access = TRANSPORT_LUNFLAGS_READ_ONLY;
+			else
+				lun_access = TRANSPORT_LUNFLAGS_READ_WRITE;
+		}
+
+		printk("TARGET_CORE[%s]->TPG[%u]_LUN[%u] - Adding %s access"
+			" for LUN in Demo Mode\n", TPG_TFO(tpg)->get_fabric_name(),
+ 			TPG_TFO(tpg)->tpg_get_tag(tpg), lun->unpacked_lun,
+			(lun_access == TRANSPORT_LUNFLAGS_READ_WRITE) ?
+			"READ-WRITE" : "READ-ONLY");
+
+		core_update_device_list_for_node(lun, lun->unpacked_lun,
+				lun_access, acl, tpg, 1);
+		spin_lock(&tpg->tpg_lun_lock);
+	}
+	spin_unlock(&tpg->tpg_lun_lock);
+
+	return;
+}
+
+/*      core_set_queue_depth_for_node():
+ *
+ *
+ */
+static int core_set_queue_depth_for_node (
+        se_portal_group_t *tpg,
+        se_node_acl_t *acl)
+{
+        if (!acl->queue_depth) {
+                printk(KERN_ERR "Queue depth for %s Initiator Node: %s is 0,"
+			"defaulting to 1.\n", TPG_TFO(tpg)->get_fabric_name(),
+			acl->initiatorname);
+                acl->queue_depth = 1;
+        }
+
+        return(0);
+}
+
+/*      core_create_device_list_for_node():
+ *
+ *
+ */
+static int core_create_device_list_for_node (se_node_acl_t *nacl)
+{
+        if (!(nacl->device_list = (se_dev_entry_t *) kzalloc(
+                        sizeof(se_dev_entry_t) * TRANSPORT_MAX_LUNS_PER_TPG, GFP_KERNEL))) {
+                printk(KERN_ERR "Unable to allocate memory for se_node_acl_t->device_list\n");
+                return(-1);
+        }
+        memset(nacl->device_list, 0, sizeof(se_dev_entry_t) *
+                        TRANSPORT_MAX_LUNS_PER_TPG);
+
+        return(0);
+}
+
+/*	core_tpg_check_initiator_node_acl()
+ *
+ *
+ */
+extern se_node_acl_t *core_tpg_check_initiator_node_acl (
+	se_portal_group_t *tpg,
+	unsigned char *initiatorname)
+{
+	se_node_acl_t *acl;
+
+	if ((acl = core_tpg_get_initiator_node_acl(tpg, initiatorname)))
+		return(acl);
+
+	if (!(TPG_TFO(tpg)->tpg_check_demo_mode(tpg)))
+		return(NULL);
+
+	if (!(acl = (se_node_acl_t *) kzalloc(
+			sizeof(se_node_acl_t), GFP_KERNEL))) {
+		printk(KERN_ERR "Unable to allocate memory for se_node_acl_t.\n");
+		return(NULL);
+	}
+
+	spin_lock_init(&acl->device_list_lock);
+	spin_lock_init(&acl->nacl_sess_lock);
+	acl->queue_depth = TPG_TFO(tpg)->tpg_get_default_depth(tpg);
+	snprintf(acl->initiatorname, TRANSPORT_IQN_LEN, "%s", initiatorname);
+	acl->se_tpg = tpg;
+#ifdef SNMP_SUPPORT
+        acl->acl_index = scsi_get_new_index(SCSI_AUTH_INTR_INDEX);
+        spin_lock_init(&acl->stats_lock);
+#endif /* SNMP_SUPPORT */
+	acl->nodeacl_flags |= NAF_DYNAMIC_NODE_ACL;
+
+	TPG_TFO(tpg)->set_default_node_attributes(acl);
+
+	if (core_create_device_list_for_node(acl)  < 0) {
+		kfree(acl);
+		return(NULL);
+	}
+
+	if (core_set_queue_depth_for_node(tpg, acl) < 0) {
+		core_free_device_list_for_node(acl, tpg);
+		kfree(acl);
+		return(NULL);
+	}
+
+	core_tpg_add_node_to_devs(acl, tpg);
+
+	spin_lock_bh(&tpg->acl_node_lock);
+	ADD_ENTRY_TO_LIST(acl, tpg->acl_node_head, tpg->acl_node_tail);
+	tpg->num_node_acls++;
+	spin_unlock_bh(&tpg->acl_node_lock);
+
+	printk("%s_TPG[%u] - Added DYNAMIC ACL with TCQ Depth: %d for %s"
+		" Initiator Node: %s\n", TPG_TFO(tpg)->get_fabric_name(),
+		TPG_TFO(tpg)->tpg_get_tag(tpg), acl->queue_depth,
+		TPG_TFO(tpg)->get_fabric_name(), initiatorname);
+
+	return(acl);
+}
+
+/*	core_tpg_free_node_acls():
+ *
+ *
+ */
+extern void core_tpg_free_node_acls (se_portal_group_t *tpg)
+{
+	se_node_acl_t *acl = NULL, *acl_next = NULL;
+
+	spin_lock_bh(&tpg->acl_node_lock);
+	acl = tpg->acl_node_head;
+	while (acl) {
+		acl_next = acl->next;
+
+		/*
+		 * The kfree() for dynamically allocated Node ACLS is done in
+		 * iscsi_close_session().
+		 */
+		if (acl->nodeacl_flags & NAF_DYNAMIC_NODE_ACL) {
+			acl = acl_next;
+			continue;
+		}
+
+		kfree(acl);
+		tpg->num_node_acls--;
+		acl = acl_next;
+	}
+	tpg->acl_node_head = tpg->acl_node_tail = NULL;
+	spin_unlock_bh(&tpg->acl_node_lock);
+
+	return;
+}	
+
+EXPORT_SYMBOL(core_tpg_free_node_acls);
+
+extern void core_tpg_clear_object_luns (se_portal_group_t *tpg)
+{
+	int i, ret;
+	se_lun_t *lun;
+
+	spin_lock(&tpg->tpg_lun_lock);
+	for (i = 0; i < TRANSPORT_MAX_LUNS_PER_TPG; i++) {
+		lun = &tpg->tpg_lun_list[i];
+
+		if ((lun->lun_status != TRANSPORT_LUN_STATUS_ACTIVE) ||
+		    (lun->lun_type_ptr == NULL))
+			continue;
+
+		spin_unlock(&tpg->tpg_lun_lock);
+		ret = LUN_OBJ_API(lun)->del_obj_from_lun(tpg, lun);
+		spin_lock(&tpg->tpg_lun_lock);
+	}
+	spin_unlock(&tpg->tpg_lun_lock);
+
+	return;
+}
+
+EXPORT_SYMBOL(core_tpg_clear_object_luns);
+
+/*	core_tpg_add_initiator_node_acl():
+ *
+ *
+ */
+extern se_node_acl_t *core_tpg_add_initiator_node_acl (
+	se_portal_group_t *tpg,
+	void *fabric_acl_ptr,
+	const char *initiatorname,
+	u32 queue_depth,
+	int *ret)
+{
+	se_node_acl_t *acl = NULL;
+
+	spin_lock_bh(&tpg->acl_node_lock);
+	if ((acl = __core_tpg_get_initiator_node_acl(tpg, initiatorname))) {
+		if (acl->nodeacl_flags & NAF_DYNAMIC_NODE_ACL) {
+			acl->nodeacl_flags &= ~NAF_DYNAMIC_NODE_ACL;
+			printk("%s_TPG[%u] - Replacing dynamic ACL for"
+				" %s\n", TPG_TFO(tpg)->get_fabric_name(),
+				TPG_TFO(tpg)->tpg_get_tag(tpg), initiatorname);
+			spin_unlock_bh(&tpg->acl_node_lock);
+			goto done;
+		}
+
+		printk(KERN_ERR "ACL entry for %s Initiator"
+			" Node %s already exists for TPG %u, ignoring"
+			" request.\n",  TPG_TFO(tpg)->get_fabric_name(),
+			initiatorname, TPG_TFO(tpg)->tpg_get_tag(tpg));
+		spin_unlock_bh(&tpg->acl_node_lock);
+		*ret = ERR_ADDINITACL_ACL_EXISTS;
+		return(NULL);
+	}
+	spin_unlock_bh(&tpg->acl_node_lock);
+
+	if (!(acl = (se_node_acl_t *) kzalloc(
+			sizeof(se_node_acl_t), GFP_KERNEL))) {
+		printk(KERN_ERR "Unable to allocate memory for senode_acl_t.\n");
+		*ret = ERR_NO_MEMORY;
+		return(NULL);
+	}
+
+	spin_lock_init(&acl->device_list_lock);
+	acl->queue_depth = queue_depth;
+	snprintf(acl->initiatorname, TRANSPORT_IQN_LEN, "%s", initiatorname);
+	acl->se_tpg = tpg;
+#ifdef SNMP_SUPPORT
+	acl->acl_index = scsi_get_new_index(SCSI_AUTH_INTR_INDEX);
+	spin_lock_init(&acl->stats_lock);
+#endif /* SNMP_SUPPORT */
+
+	TPG_TFO(tpg)->set_default_node_attributes(acl);
+      
+	if (core_create_device_list_for_node(acl)  < 0) {
+		kfree(acl);
+		*ret = ERR_NO_MEMORY;
+		return(NULL);
+	}
+	
+	if (core_set_queue_depth_for_node(tpg, acl) < 0) {
+		core_free_device_list_for_node(acl, tpg);
+		kfree(acl);
+		*ret = ERR_ADDINITACL_QUEUE_SET_FAILED;
+		return(NULL);
+	}
+	
+	spin_lock_bh(&tpg->acl_node_lock);
+	ADD_ENTRY_TO_LIST(acl, tpg->acl_node_head, tpg->acl_node_tail);
+	tpg->num_node_acls++;
+	spin_unlock_bh(&tpg->acl_node_lock);
+
+done:
+	printk("%s_TPG[%hu] - Added ACL with TCQ Depth: %d for %s"
+		" Initiator Node: %s\n", TPG_TFO(tpg)->get_fabric_name(),
+		TPG_TFO(tpg)->tpg_get_tag(tpg), acl->queue_depth,
+		TPG_TFO(tpg)->get_fabric_name(), initiatorname);
+
+	return(acl);
+}
+
+EXPORT_SYMBOL(core_tpg_add_initiator_node_acl);
+
+/*	core_tpg_del_initiator_node_acl():
+ *
+ *
+ */
+#warning FIXME: core_tpg_del_initiator_node_acl() broken
+extern int core_tpg_del_initiator_node_acl (
+	se_portal_group_t *tpg,
+	const char *initiatorname,
+	int force)
+{
+	se_session_t *sess;
+	se_node_acl_t *acl;
+	int dynamic_acl = 0;
+
+	spin_lock_bh(&tpg->acl_node_lock);
+	if (!(acl = __core_tpg_get_initiator_node_acl(tpg, initiatorname))) {
+		printk(KERN_ERR "Access Control List entry for %s Initiator"
+			" Node %s does not exists for TPG %hu, ignoring"
+			" request.\n", TPG_TFO(tpg)->get_fabric_name(),
+			initiatorname, TPG_TFO(tpg)->tpg_get_tag(tpg));
+		spin_unlock_bh(&tpg->acl_node_lock);
+		return(ERR_INITIATORACL_DOES_NOT_EXIST);
+	}
+	if (acl->nodeacl_flags & NAF_DYNAMIC_NODE_ACL) {
+		acl->nodeacl_flags &= ~NAF_DYNAMIC_NODE_ACL;
+		dynamic_acl = 1;
+	}
+	spin_unlock_bh(&tpg->acl_node_lock);
+#if 0	
+	spin_lock_bh(&tpg->session_lock);
+	for (sess = tpg->session_head; sess; sess = sess->next) {
+		if (sess->node_acl != acl)
+			continue;
+
+		if (!force) {
+			printk(KERN_ERR "Unable to delete Access Control List for"
+			" iSCSI Initiator Node: %s while session is operational."
+			"  To forcefully delete the session use the \"force=1\""
+				" parameter.\n", initiatorname);
+			spin_unlock_bh(&tpg->session_lock);
+			spin_lock_bh(&tpg->acl_node_lock);
+			if (dynamic_acl)
+				acl->nodeacl_flags |= NAF_DYNAMIC_NODE_ACL;
+			spin_unlock_bh(&tpg->acl_node_lock);
+			return(ERR_INITIATORACL_SESSION_EXISTS);
+		}
+		spin_lock(&sess->conn_lock);
+		if (atomic_read(&sess->session_fall_back_to_erl0) ||
+		    atomic_read(&sess->session_logout) ||
+		    (sess->time2retain_timer_flags & T2R_TF_EXPIRED)) {
+			spin_unlock(&sess->conn_lock);
+			continue;
+		}
+		atomic_set(&sess->session_reinstatement, 1);
+		spin_unlock(&sess->conn_lock);
+
+		iscsi_inc_session_usage_count(sess);
+		iscsi_stop_time2retain_timer(sess);
+		break;
+	}
+	spin_unlock_bh(&tpg->session_lock);
+#endif
+	spin_lock_bh(&tpg->acl_node_lock);
+	REMOVE_ENTRY_FROM_LIST(acl, tpg->acl_node_head, tpg->acl_node_tail);
+	tpg->num_node_acls--;
+	spin_unlock_bh(&tpg->acl_node_lock);
+#if 0	
+	/*
+	 * If the iSCSI Session for the iSCSI Initiator Node exists,
+	 * forcefully shutdown the iSCSI NEXUS.
+	 */
+	if (sess) {
+		iscsi_stop_session(sess, 1, 1);
+		iscsi_dec_session_usage_count(sess);
+		iscsi_close_session(sess);
+	}
+#endif	
+	core_clear_initiator_node_from_tpg(acl, tpg);
+	core_free_device_list_for_node(acl, tpg);
+
+	TPG_TFO(tpg)->tpg_release_node_acl(tpg, acl);
+	acl->fabric_acl_ptr = NULL;
+
+	printk("%s_TPG[%hu] - Deleted ACL with TCQ Depth: %d for %s"
+		" Initiator Node: %s\n", TPG_TFO(tpg)->get_fabric_name(),
+		TPG_TFO(tpg)->tpg_get_tag(tpg), acl->queue_depth,
+		TPG_TFO(tpg)->get_fabric_name(), initiatorname);
+
+	kfree(acl);
+	return(0);
+}
+
+EXPORT_SYMBOL(core_tpg_del_initiator_node_acl);
+
+/*	core_tpg_set_initiator_node_queue_depth():
+ *
+ *
+ */
+#warning FIXME: core_tpg_set_initiator_node_queue_depth() broken
+extern int core_tpg_set_initiator_node_queue_depth (
+	se_portal_group_t *tpg,
+	unsigned char *initiatorname,
+	u32 queue_depth,
+	int force)
+{
+	int dynamic_acl = 0;
+	se_session_t *sess = NULL;
+	se_node_acl_t *acl;
+	
+	spin_lock_bh(&tpg->acl_node_lock);
+	if (!(acl = __core_tpg_get_initiator_node_acl(tpg, initiatorname))) {
+		printk(KERN_ERR "Access Control List entry for %s Initiator"
+			" Node %s does not exists for TPG %hu, ignoring"
+			" request.\n", TPG_TFO(tpg)->get_fabric_name(),
+			initiatorname, TPG_TFO(tpg)->tpg_get_tag(tpg));
+		spin_unlock_bh(&tpg->acl_node_lock);
+		return(-ENODEV);
+	}
+	if (acl->nodeacl_flags & NAF_DYNAMIC_NODE_ACL) {
+		acl->nodeacl_flags &= ~NAF_DYNAMIC_NODE_ACL;
+		dynamic_acl = 1;
+	}
+	spin_unlock_bh(&tpg->acl_node_lock);
+#if 0	
+	spin_lock_bh(&tpg->session_lock);
+	for (sess = tpg->session_head; sess; sess = sess->next) {
+		if (sess->node_acl != acl)
+			continue;
+
+		if (!force) {
+			printk(KERN_ERR "Unable to change queue depth for %s Initiator"
+				" Node: %s while session is operational.  To forcefully"
+				" change the queue depth and force session reinstatement"
+				" use the \"force=1\" parameter.\n",
+				TPG_TFO(tpg)->get_fabric_name(), initiatorname);
+			spin_unlock_bh(&tpg->session_lock);
+			spin_lock_bh(&tpg->acl_node_lock);
+			if (dynamic_acl)
+				acl->nodeacl_flags |= NAF_DYNAMIC_NODE_ACL;
+			spin_unlock_bh(&tpg->acl_node_lock);
+			return(-EEXIST);
+		}
+		spin_lock(&sess->conn_lock);
+		if (atomic_read(&sess->session_fall_back_to_erl0) ||
+		    atomic_read(&sess->session_logout) ||
+		    (sess->time2retain_timer_flags & T2R_TF_EXPIRED)) {
+			spin_unlock(&sess->conn_lock);
+			continue;
+		}
+		atomic_set(&sess->session_reinstatement, 1);
+		spin_unlock(&sess->conn_lock);
+
+		iscsi_inc_session_usage_count(sess);
+		iscsi_stop_time2retain_timer(sess);
+		break;
+	}
+#endif
+	/*
+	 * User has requested to change the queue depth for a Initiator Node.
+	 * Change the value in the Node's se_node_acl_t, and call
+	 * core_set_queue_depth_for_node() to add the requested queue depth.
+	 *
+	 * Finally call iscsi_free_session() to force session reinstatement to occur if
+	 * there is an active session for the iSCSI Initiator Node in question.
+	 */
+	acl->queue_depth = queue_depth;
+
+	if (core_set_queue_depth_for_node(tpg, acl) < 0) {
+		spin_unlock_bh(&tpg->session_lock);
+#if 0
+		if (sess)
+			iscsi_dec_session_usage_count(sess);
+#endif
+		spin_lock_bh(&tpg->acl_node_lock);
+		if (dynamic_acl)
+			acl->nodeacl_flags |= NAF_DYNAMIC_NODE_ACL;
+		spin_unlock_bh(&tpg->acl_node_lock);
+		return(-EINVAL);
+	}
+	spin_unlock_bh(&tpg->session_lock);
+#if 0
+	if (sess) {
+		iscsi_stop_session(sess, 1, 1);
+		iscsi_dec_session_usage_count(sess);
+		iscsi_close_session(sess);
+	}	
+#endif
+	printk("Successfuly changed queue depth to: %d for Initiator Node:"
+		" %s on %s Target Portal Group: %u\n", queue_depth,
+		initiatorname, TPG_TFO(tpg)->get_fabric_name(),
+		TPG_TFO(tpg)->tpg_get_tag(tpg));
+
+	spin_lock_bh(&tpg->acl_node_lock);
+	if (dynamic_acl)
+		acl->nodeacl_flags |= NAF_DYNAMIC_NODE_ACL;
+	spin_unlock_bh(&tpg->acl_node_lock);
+		
+	return(0);
+}
+
+extern se_portal_group_t *core_tpg_register (
+	struct target_core_fabric_ops *tfo,
+	void *tpg_fabric_ptr)
+{
+	se_lun_t *lun;
+	se_portal_group_t *se_tpg;
+	u32 i;
+
+	if (!(se_tpg = kzalloc(sizeof(se_portal_group_t), GFP_KERNEL))) {
+		printk(KERN_ERR "Unable to allocate se_portal_group_t\n");
+		return(ERR_PTR(-ENOMEM));
+	}
+
+	if (!(se_tpg->tpg_lun_list = kzalloc((sizeof(se_lun_t) *
+				TRANSPORT_MAX_LUNS_PER_TPG), GFP_KERNEL))) {
+		printk(KERN_ERR "Unable to allocate se_portal_group_t->tpg_lun_list\n");
+		kfree(se_tpg);
+		return(ERR_PTR(-ENOMEM));
+	}
+
+	for (i = 0; i < TRANSPORT_MAX_LUNS_PER_TPG; i++) {
+		lun = &se_tpg->tpg_lun_list[i];
+		lun->unpacked_lun = i;
+		lun->lun_type_ptr = NULL;
+		lun->persistent_reservation_check = &core_tpg_persistent_reservation_check;
+		lun->persistent_reservation_release = &core_tpg_persistent_reservation_release;
+		lun->persistent_reservation_reserve = &core_tpg_persistent_reservation_reserve;
+		lun->lun_status = TRANSPORT_LUN_STATUS_FREE;
+		spin_lock_init(&lun->lun_acl_lock);
+		spin_lock_init(&lun->lun_cmd_lock);
+		spin_lock_init(&lun->lun_reservation_lock);
+		spin_lock_init(&lun->lun_sep_lock);
+	}
+
+	se_tpg->se_tpg_fabric_ptr = tpg_fabric_ptr;
+	se_tpg->se_tpg_tfo = tfo;
+	INIT_LIST_HEAD(&se_tpg->se_tpg_list);
+	spin_lock_init(&se_tpg->acl_node_lock);
+	spin_lock_init(&se_tpg->session_lock);
+	spin_lock_init(&se_tpg->tpg_lun_lock);
+#warning FIXME: Add se_portal_group to list..
+
+	printk("TARGET_CORE[%s]: Allocated se_portal_group_t for endpoint %s %u\n",
+		tfo->get_fabric_name(), tfo->tpg_get_wwn(se_tpg),
+		tfo->tpg_get_tag(se_tpg));
+
+	return(se_tpg);
+}
+
+EXPORT_SYMBOL(core_tpg_register);
+
+extern int core_tpg_deregister (se_portal_group_t *se_tpg)
+{
+	printk("TARGET_CORE[%s]: Deallocating se_portal_group_t for endpoint %s %u\n",
+		TPG_TFO(se_tpg)->get_fabric_name(), TPG_TFO(se_tpg)->tpg_get_wwn(se_tpg),
+		TPG_TFO(se_tpg)->tpg_get_tag(se_tpg));
+
+#warning FIXME: Release se_portal_group from list
+	
+	se_tpg->se_tpg_fabric_ptr = NULL;
+	kfree(se_tpg->tpg_lun_list);
+	kfree(se_tpg);
+	return(0);
+}
+
+EXPORT_SYMBOL(core_tpg_deregister);
+
+extern se_lun_t *core_tpg_pre_addlun (
+	se_portal_group_t *tpg,
+	u32 unpacked_lun,
+	int *ret)
+{
+	se_lun_t *lun;
+	
+	if (unpacked_lun > (TRANSPORT_MAX_LUNS_PER_TPG-1)) {
+		printk(KERN_ERR "%s LUN: %u exceeds TRANSPORT_MAX_LUNS_PER_TPG-1:"
+			" %u for Target Portal Group: %u\n",
+			TPG_TFO(tpg)->get_fabric_name(),
+			unpacked_lun, TRANSPORT_MAX_LUNS_PER_TPG-1,
+			TPG_TFO(tpg)->tpg_get_tag(tpg));
+		*ret = ERR_LUN_EXCEEDS_MAX;
+		return(NULL);
+	}
+
+	spin_lock(&tpg->tpg_lun_lock);
+	lun = &tpg->tpg_lun_list[unpacked_lun];
+	if (lun->lun_status == TRANSPORT_LUN_STATUS_ACTIVE) {
+		printk(KERN_ERR "TPG Logical Unit Number: %u is already active"
+			" on %s Target Portal Group: %u, ignoring request.\n",
+			unpacked_lun, TPG_TFO(tpg)->get_fabric_name(),
+			TPG_TFO(tpg)->tpg_get_tag(tpg));
+		spin_unlock(&tpg->tpg_lun_lock);
+		*ret = ERR_ADDLUN_ALREADY_ACTIVE;
+		return(NULL);
+	}
+	spin_unlock(&tpg->tpg_lun_lock);
+
+	return(lun);
+}
+
+EXPORT_SYMBOL(core_tpg_pre_addlun);
+	
+extern int core_tpg_post_addlun (
+	se_portal_group_t *tpg,
+	se_lun_t *lun,
+	int lun_type,
+	u32 lun_access,
+	void *lun_ptr,
+	struct se_obj_lun_type_s *obj_api)
+{
+	lun->lun_obj_api = obj_api;
+	lun->lun_type_ptr = lun_ptr;
+	if (LUN_OBJ_API(lun)->export_obj(lun_ptr, tpg, lun) < 0) {
+		lun->lun_type_ptr = NULL;
+		lun->lun_obj_api = NULL;
+		return(-1);
+	}
+	
+	spin_lock(&tpg->tpg_lun_lock);
+	lun->lun_access = lun_access;
+	lun->lun_type = lun_type;
+	lun->lun_status = TRANSPORT_LUN_STATUS_ACTIVE;
+	spin_unlock(&tpg->tpg_lun_lock);
+
+	return(0);
+}
+
+EXPORT_SYMBOL(core_tpg_post_addlun);
+
+extern se_lun_t *core_tpg_pre_dellun (
+	se_portal_group_t *tpg,
+	u32 unpacked_lun,
+	int lun_type,
+	int *ret)
+{
+	se_lun_t *lun;
+	
+	if (unpacked_lun > (TRANSPORT_MAX_LUNS_PER_TPG-1)) {
+		printk(KERN_ERR "%s LUN: %u exceeds TRANSPORT_MAX_LUNS_PER_TPG-1:"
+			" %u for Target Portal Group: %u\n",
+			TPG_TFO(tpg)->get_fabric_name(), unpacked_lun,
+			TRANSPORT_MAX_LUNS_PER_TPG-1,
+			TPG_TFO(tpg)->tpg_get_tag(tpg));
+		*ret = ERR_LUN_EXCEEDS_MAX;
+		return(NULL);
+	}
+
+	spin_lock(&tpg->tpg_lun_lock);
+	lun = &tpg->tpg_lun_list[unpacked_lun];
+	if (lun->lun_status != TRANSPORT_LUN_STATUS_ACTIVE) {
+		printk(KERN_ERR "%s Logical Unit Number: %u is not active on"
+			" Target Portal Group: %u, ignoring request.\n",
+			TPG_TFO(tpg)->get_fabric_name(), unpacked_lun,
+			TPG_TFO(tpg)->tpg_get_tag(tpg));
+		spin_unlock(&tpg->tpg_lun_lock);
+		*ret = ERR_DELLUN_NOT_ACTIVE;
+		return(NULL);
+	}
+
+	if (lun->lun_type != lun_type) {
+		printk(KERN_ERR "%s Logical Unit Number: %u type: %d does not"
+			" match passed type: %d\n",
+			TPG_TFO(tpg)->get_fabric_name(),
+			unpacked_lun, lun->lun_type, lun_type);
+		spin_unlock(&tpg->tpg_lun_lock);
+		*ret = ERR_DELLUN_TYPE_MISMATCH;
+		return(NULL);
+	}
+	spin_unlock(&tpg->tpg_lun_lock);
+
+	core_clear_lun_from_tpg(lun, tpg);
+
+	return(lun);
+}
+
+EXPORT_SYMBOL(core_tpg_pre_dellun);
+
+extern int core_tpg_post_dellun (
+	se_portal_group_t *tpg,
+	se_lun_t *lun)
+{
+	se_lun_acl_t *acl, *acl_next;
+	
+	transport_clear_lun_from_sessions(lun);
+
+	LUN_OBJ_API(lun)->unexport_obj(lun->lun_type_ptr, tpg, lun);
+	LUN_OBJ_API(lun)->release_obj(lun->lun_type_ptr);
+	
+	spin_lock(&tpg->tpg_lun_lock);
+	lun->lun_status = TRANSPORT_LUN_STATUS_FREE;
+	lun->lun_type = 0;
+	lun->lun_type_ptr = NULL;
+	spin_unlock(&tpg->tpg_lun_lock);
+
+	spin_lock(&lun->lun_acl_lock);
+	acl = lun->lun_acl_head;
+	while (acl) {
+		acl_next = acl->next;
+		kfree(acl);
+		acl = acl_next;
+	}
+	lun->lun_acl_head = lun->lun_acl_tail = NULL;
+	spin_unlock(&lun->lun_acl_lock);
+
+	return(0);	
+}
+
+EXPORT_SYMBOL(core_tpg_post_dellun);
diff --git a/drivers/lio-core/target_core_tpg.h b/drivers/lio-core/target_core_tpg.h
new file mode 100644
index 0000000..d3a3523
--- /dev/null
+++ b/drivers/lio-core/target_core_tpg.h
@@ -0,0 +1,48 @@
+/*********************************************************************************
+ * Filename:  target_core_tpg.h
+ *
+ * This file contains generic Target Portal Group related definitions.
+ *
+ * Copyright (c) 2002, 2003, 2004, 2005 PyX Technologies, Inc.
+ * Copyright (c) 2005, 2006, 2007 SBE, Inc. 
+ * Copyright (c) 2007 Rising Tide Software, Inc.
+ * Copyright (c) 2008 Linux-iSCSI.org
+ *
+ * Nicholas A. Bellinger <nab@...nel.org>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+ *
+ *********************************************************************************/
+
+
+#ifndef TARGET_CORE_TPG_H
+#define TARGET_CORE_TPG_H
+
+extern se_node_acl_t *core_tpg_get_initiator_node_acl (se_portal_group_t *tpg, unsigned char *);
+extern void core_tpg_add_node_to_devs (struct se_node_acl_s *, struct se_portal_group_s *);
+extern struct se_node_acl_s *core_tpg_check_initiator_node_acl (struct se_portal_group_s *, unsigned char *);
+extern void core_tpg_free_node_acls (struct se_portal_group_s *);
+extern void core_tpg_clear_object_luns (struct se_portal_group_s *);
+extern se_node_acl_t *core_tpg_add_initiator_node_acl (se_portal_group_t *, const char *, u32, int *);
+extern int core_tpg_del_initiator_node_acl (se_portal_group_t *, const char *, int);
+extern int core_tpg_set_initiator_node_queue_depth (se_portal_group_t *, unsigned char *, u32, int);
+extern se_portal_group_t *core_tpg_register (struct target_core_fabric_ops *, void *);
+extern int core_tpg_deregister (struct se_portal_group_s *);
+extern se_lun_t *core_tpg_pre_addlun (se_portal_group_t *, u32, int *);
+extern int core_tpg_post_addlun (se_portal_group_t *, se_lun_t *, int, u32, void *, struct se_obj_lun_type_s *);
+extern se_lun_t *core_tpg_pre_dellun (se_portal_group_t *, u32, int, int *);
+extern int core_tpg_post_dellun (se_portal_group_t *, se_lun_t *);
+
+#endif /* TARGET_CORE_TPG_H */
-- 
1.5.4.1



--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ