2011-07-23 14:43:04 +08:00
|
|
|
/*******************************************************************************
|
|
|
|
* This file contains the configfs implementation for iSCSI Target mode
|
|
|
|
* from the LIO-Target Project.
|
|
|
|
*
|
2013-09-06 06:29:12 +08:00
|
|
|
* (c) Copyright 2007-2013 Datera, Inc.
|
2011-07-23 14:43:04 +08:00
|
|
|
*
|
|
|
|
* Author: Nicholas A. Bellinger <nab@linux-iscsi.org>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <linux/configfs.h>
|
2013-07-03 23:35:11 +08:00
|
|
|
#include <linux/ctype.h>
|
2011-08-31 06:16:43 +08:00
|
|
|
#include <linux/export.h>
|
2012-01-23 08:39:49 +08:00
|
|
|
#include <linux/inet.h>
|
2011-07-23 14:43:04 +08:00
|
|
|
#include <target/target_core_base.h>
|
2011-11-16 22:46:48 +08:00
|
|
|
#include <target/target_core_fabric.h>
|
2011-07-23 14:43:04 +08:00
|
|
|
#include <target/target_core_fabric_configfs.h>
|
|
|
|
#include <target/target_core_configfs.h>
|
|
|
|
#include <target/configfs_macros.h>
|
2013-03-21 06:29:15 +08:00
|
|
|
#include <target/iscsi/iscsi_transport.h>
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-01-07 20:57:31 +08:00
|
|
|
#include <target/iscsi/iscsi_target_core.h>
|
2011-07-23 14:43:04 +08:00
|
|
|
#include "iscsi_target_parameters.h"
|
|
|
|
#include "iscsi_target_device.h"
|
|
|
|
#include "iscsi_target_erl0.h"
|
|
|
|
#include "iscsi_target_nodeattrib.h"
|
|
|
|
#include "iscsi_target_tpg.h"
|
|
|
|
#include "iscsi_target_util.h"
|
|
|
|
#include "iscsi_target.h"
|
2015-01-07 20:57:31 +08:00
|
|
|
#include <target/iscsi/iscsi_target_stat.h>
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
struct lio_target_configfs_attribute {
|
|
|
|
struct configfs_attribute attr;
|
|
|
|
ssize_t (*show)(void *, char *);
|
|
|
|
ssize_t (*store)(void *, const char *, size_t);
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Start items for lio_target_portal_cit */
|
|
|
|
|
|
|
|
static ssize_t lio_target_np_show_sctp(
|
|
|
|
struct se_tpg_np *se_tpg_np,
|
|
|
|
char *page)
|
|
|
|
{
|
|
|
|
struct iscsi_tpg_np *tpg_np = container_of(se_tpg_np,
|
|
|
|
struct iscsi_tpg_np, se_tpg_np);
|
|
|
|
struct iscsi_tpg_np *tpg_np_sctp;
|
|
|
|
ssize_t rb;
|
|
|
|
|
|
|
|
tpg_np_sctp = iscsit_tpg_locate_child_np(tpg_np, ISCSI_SCTP_TCP);
|
|
|
|
if (tpg_np_sctp)
|
|
|
|
rb = sprintf(page, "1\n");
|
|
|
|
else
|
|
|
|
rb = sprintf(page, "0\n");
|
|
|
|
|
|
|
|
return rb;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t lio_target_np_store_sctp(
|
|
|
|
struct se_tpg_np *se_tpg_np,
|
|
|
|
const char *page,
|
|
|
|
size_t count)
|
|
|
|
{
|
|
|
|
struct iscsi_np *np;
|
|
|
|
struct iscsi_portal_group *tpg;
|
|
|
|
struct iscsi_tpg_np *tpg_np = container_of(se_tpg_np,
|
|
|
|
struct iscsi_tpg_np, se_tpg_np);
|
|
|
|
struct iscsi_tpg_np *tpg_np_sctp = NULL;
|
|
|
|
u32 op;
|
|
|
|
int ret;
|
|
|
|
|
2013-07-03 23:35:11 +08:00
|
|
|
ret = kstrtou32(page, 0, &op);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
2011-07-23 14:43:04 +08:00
|
|
|
if ((op != 1) && (op != 0)) {
|
|
|
|
pr_err("Illegal value for tpg_enable: %u\n", op);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
np = tpg_np->tpg_np;
|
|
|
|
if (!np) {
|
|
|
|
pr_err("Unable to locate struct iscsi_np from"
|
|
|
|
" struct iscsi_tpg_np\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
tpg = tpg_np->tpg;
|
|
|
|
if (iscsit_get_tpg(tpg) < 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (op) {
|
|
|
|
/*
|
|
|
|
* Use existing np->np_sockaddr for SCTP network portal reference
|
|
|
|
*/
|
|
|
|
tpg_np_sctp = iscsit_tpg_add_network_portal(tpg, &np->np_sockaddr,
|
|
|
|
np->np_ip, tpg_np, ISCSI_SCTP_TCP);
|
|
|
|
if (!tpg_np_sctp || IS_ERR(tpg_np_sctp))
|
|
|
|
goto out;
|
|
|
|
} else {
|
|
|
|
tpg_np_sctp = iscsit_tpg_locate_child_np(tpg_np, ISCSI_SCTP_TCP);
|
|
|
|
if (!tpg_np_sctp)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
ret = iscsit_tpg_del_network_portal(tpg, tpg_np_sctp);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
iscsit_put_tpg(tpg);
|
|
|
|
return count;
|
|
|
|
out:
|
|
|
|
iscsit_put_tpg(tpg);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
TF_NP_BASE_ATTR(lio_target, sctp, S_IRUGO | S_IWUSR);
|
|
|
|
|
2013-03-07 14:20:36 +08:00
|
|
|
static ssize_t lio_target_np_show_iser(
|
|
|
|
struct se_tpg_np *se_tpg_np,
|
|
|
|
char *page)
|
|
|
|
{
|
|
|
|
struct iscsi_tpg_np *tpg_np = container_of(se_tpg_np,
|
|
|
|
struct iscsi_tpg_np, se_tpg_np);
|
|
|
|
struct iscsi_tpg_np *tpg_np_iser;
|
|
|
|
ssize_t rb;
|
|
|
|
|
|
|
|
tpg_np_iser = iscsit_tpg_locate_child_np(tpg_np, ISCSI_INFINIBAND);
|
|
|
|
if (tpg_np_iser)
|
|
|
|
rb = sprintf(page, "1\n");
|
|
|
|
else
|
|
|
|
rb = sprintf(page, "0\n");
|
|
|
|
|
|
|
|
return rb;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t lio_target_np_store_iser(
|
|
|
|
struct se_tpg_np *se_tpg_np,
|
|
|
|
const char *page,
|
|
|
|
size_t count)
|
|
|
|
{
|
|
|
|
struct iscsi_np *np;
|
|
|
|
struct iscsi_portal_group *tpg;
|
|
|
|
struct iscsi_tpg_np *tpg_np = container_of(se_tpg_np,
|
|
|
|
struct iscsi_tpg_np, se_tpg_np);
|
|
|
|
struct iscsi_tpg_np *tpg_np_iser = NULL;
|
|
|
|
char *endptr;
|
|
|
|
u32 op;
|
2013-05-30 03:05:59 +08:00
|
|
|
int rc = 0;
|
2013-03-07 14:20:36 +08:00
|
|
|
|
|
|
|
op = simple_strtoul(page, &endptr, 0);
|
|
|
|
if ((op != 1) && (op != 0)) {
|
|
|
|
pr_err("Illegal value for tpg_enable: %u\n", op);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
np = tpg_np->tpg_np;
|
|
|
|
if (!np) {
|
|
|
|
pr_err("Unable to locate struct iscsi_np from"
|
|
|
|
" struct iscsi_tpg_np\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
tpg = tpg_np->tpg;
|
|
|
|
if (iscsit_get_tpg(tpg) < 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (op) {
|
2013-05-30 03:05:59 +08:00
|
|
|
rc = request_module("ib_isert");
|
|
|
|
if (rc != 0) {
|
2013-03-07 14:20:36 +08:00
|
|
|
pr_warn("Unable to request_module for ib_isert\n");
|
2013-05-30 03:05:59 +08:00
|
|
|
rc = 0;
|
|
|
|
}
|
2013-03-07 14:20:36 +08:00
|
|
|
|
|
|
|
tpg_np_iser = iscsit_tpg_add_network_portal(tpg, &np->np_sockaddr,
|
|
|
|
np->np_ip, tpg_np, ISCSI_INFINIBAND);
|
2013-05-30 03:05:59 +08:00
|
|
|
if (IS_ERR(tpg_np_iser)) {
|
|
|
|
rc = PTR_ERR(tpg_np_iser);
|
2013-03-07 14:20:36 +08:00
|
|
|
goto out;
|
2013-05-30 03:05:59 +08:00
|
|
|
}
|
2013-03-07 14:20:36 +08:00
|
|
|
} else {
|
|
|
|
tpg_np_iser = iscsit_tpg_locate_child_np(tpg_np, ISCSI_INFINIBAND);
|
2013-05-30 03:05:59 +08:00
|
|
|
if (tpg_np_iser) {
|
|
|
|
rc = iscsit_tpg_del_network_portal(tpg, tpg_np_iser);
|
|
|
|
if (rc < 0)
|
|
|
|
goto out;
|
|
|
|
}
|
2013-03-07 14:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
iscsit_put_tpg(tpg);
|
|
|
|
return count;
|
|
|
|
out:
|
|
|
|
iscsit_put_tpg(tpg);
|
2013-05-30 03:05:59 +08:00
|
|
|
return rc;
|
2013-03-07 14:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
TF_NP_BASE_ATTR(lio_target, iser, S_IRUGO | S_IWUSR);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
static struct configfs_attribute *lio_target_portal_attrs[] = {
|
|
|
|
&lio_target_np_sctp.attr,
|
2013-03-07 14:20:36 +08:00
|
|
|
&lio_target_np_iser.attr,
|
2011-07-23 14:43:04 +08:00
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Stop items for lio_target_portal_cit */
|
|
|
|
|
|
|
|
/* Start items for lio_target_np_cit */
|
|
|
|
|
|
|
|
#define MAX_PORTAL_LEN 256
|
|
|
|
|
2012-09-26 20:00:36 +08:00
|
|
|
static struct se_tpg_np *lio_target_call_addnptotpg(
|
2011-07-23 14:43:04 +08:00
|
|
|
struct se_portal_group *se_tpg,
|
|
|
|
struct config_group *group,
|
|
|
|
const char *name)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg;
|
|
|
|
struct iscsi_tpg_np *tpg_np;
|
|
|
|
char *str, *str2, *ip_str, *port_str;
|
|
|
|
struct __kernel_sockaddr_storage sockaddr;
|
|
|
|
struct sockaddr_in *sock_in;
|
|
|
|
struct sockaddr_in6 *sock_in6;
|
|
|
|
unsigned long port;
|
|
|
|
int ret;
|
|
|
|
char buf[MAX_PORTAL_LEN + 1];
|
|
|
|
|
|
|
|
if (strlen(name) > MAX_PORTAL_LEN) {
|
|
|
|
pr_err("strlen(name): %d exceeds MAX_PORTAL_LEN: %d\n",
|
|
|
|
(int)strlen(name), MAX_PORTAL_LEN);
|
|
|
|
return ERR_PTR(-EOVERFLOW);
|
|
|
|
}
|
|
|
|
memset(buf, 0, MAX_PORTAL_LEN + 1);
|
2011-07-28 03:37:03 +08:00
|
|
|
snprintf(buf, MAX_PORTAL_LEN + 1, "%s", name);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
memset(&sockaddr, 0, sizeof(struct __kernel_sockaddr_storage));
|
|
|
|
|
|
|
|
str = strstr(buf, "[");
|
|
|
|
if (str) {
|
|
|
|
const char *end;
|
|
|
|
|
|
|
|
str2 = strstr(str, "]");
|
|
|
|
if (!str2) {
|
|
|
|
pr_err("Unable to locate trailing \"]\""
|
|
|
|
" in IPv6 iSCSI network portal address\n");
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
}
|
|
|
|
str++; /* Skip over leading "[" */
|
|
|
|
*str2 = '\0'; /* Terminate the IPv6 address */
|
|
|
|
str2++; /* Skip over the "]" */
|
|
|
|
port_str = strstr(str2, ":");
|
|
|
|
if (!port_str) {
|
|
|
|
pr_err("Unable to locate \":port\""
|
|
|
|
" in IPv6 iSCSI network portal address\n");
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
}
|
|
|
|
*port_str = '\0'; /* Terminate string for IP */
|
|
|
|
port_str++; /* Skip over ":" */
|
|
|
|
|
2013-07-19 15:22:19 +08:00
|
|
|
ret = kstrtoul(port_str, 0, &port);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (ret < 0) {
|
2013-07-19 15:22:19 +08:00
|
|
|
pr_err("kstrtoul() failed for port_str: %d\n", ret);
|
2011-07-23 14:43:04 +08:00
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
|
|
|
sock_in6 = (struct sockaddr_in6 *)&sockaddr;
|
|
|
|
sock_in6->sin6_family = AF_INET6;
|
|
|
|
sock_in6->sin6_port = htons((unsigned short)port);
|
|
|
|
ret = in6_pton(str, IPV6_ADDRESS_SPACE,
|
|
|
|
(void *)&sock_in6->sin6_addr.in6_u, -1, &end);
|
|
|
|
if (ret <= 0) {
|
|
|
|
pr_err("in6_pton returned: %d\n", ret);
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
str = ip_str = &buf[0];
|
|
|
|
port_str = strstr(ip_str, ":");
|
|
|
|
if (!port_str) {
|
|
|
|
pr_err("Unable to locate \":port\""
|
|
|
|
" in IPv4 iSCSI network portal address\n");
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
}
|
|
|
|
*port_str = '\0'; /* Terminate string for IP */
|
|
|
|
port_str++; /* Skip over ":" */
|
|
|
|
|
2013-07-19 15:22:19 +08:00
|
|
|
ret = kstrtoul(port_str, 0, &port);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (ret < 0) {
|
2013-07-19 15:22:19 +08:00
|
|
|
pr_err("kstrtoul() failed for port_str: %d\n", ret);
|
2011-07-23 14:43:04 +08:00
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
|
|
|
sock_in = (struct sockaddr_in *)&sockaddr;
|
|
|
|
sock_in->sin_family = AF_INET;
|
|
|
|
sock_in->sin_port = htons((unsigned short)port);
|
|
|
|
sock_in->sin_addr.s_addr = in_aton(ip_str);
|
|
|
|
}
|
|
|
|
tpg = container_of(se_tpg, struct iscsi_portal_group, tpg_se_tpg);
|
|
|
|
ret = iscsit_get_tpg(tpg);
|
|
|
|
if (ret < 0)
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
|
|
|
|
pr_debug("LIO_Target_ConfigFS: REGISTER -> %s TPGT: %hu"
|
|
|
|
" PORTAL: %s\n",
|
|
|
|
config_item_name(&se_tpg->se_tpg_wwn->wwn_group.cg_item),
|
|
|
|
tpg->tpgt, name);
|
|
|
|
/*
|
|
|
|
* Assume ISCSI_TCP by default. Other network portals for other
|
|
|
|
* iSCSI fabrics:
|
|
|
|
*
|
|
|
|
* Traditional iSCSI over SCTP (initial support)
|
|
|
|
* iSER/TCP (TODO, hardware available)
|
|
|
|
* iSER/SCTP (TODO, software emulation with osc-iwarp)
|
|
|
|
* iSER/IB (TODO, hardware available)
|
|
|
|
*
|
2012-08-27 21:46:00 +08:00
|
|
|
* can be enabled with attributes under
|
2011-07-23 14:43:04 +08:00
|
|
|
* sys/kernel/config/iscsi/$IQN/$TPG/np/$IP:$PORT/
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
tpg_np = iscsit_tpg_add_network_portal(tpg, &sockaddr, str, NULL,
|
|
|
|
ISCSI_TCP);
|
|
|
|
if (IS_ERR(tpg_np)) {
|
|
|
|
iscsit_put_tpg(tpg);
|
2011-08-02 05:58:18 +08:00
|
|
|
return ERR_CAST(tpg_np);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
pr_debug("LIO_Target_ConfigFS: addnptotpg done!\n");
|
|
|
|
|
|
|
|
iscsit_put_tpg(tpg);
|
|
|
|
return &tpg_np->se_tpg_np;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void lio_target_call_delnpfromtpg(
|
|
|
|
struct se_tpg_np *se_tpg_np)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg;
|
|
|
|
struct iscsi_tpg_np *tpg_np;
|
|
|
|
struct se_portal_group *se_tpg;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
tpg_np = container_of(se_tpg_np, struct iscsi_tpg_np, se_tpg_np);
|
|
|
|
tpg = tpg_np->tpg;
|
|
|
|
ret = iscsit_get_tpg(tpg);
|
|
|
|
if (ret < 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
se_tpg = &tpg->tpg_se_tpg;
|
|
|
|
pr_debug("LIO_Target_ConfigFS: DEREGISTER -> %s TPGT: %hu"
|
|
|
|
" PORTAL: %s:%hu\n", config_item_name(&se_tpg->se_tpg_wwn->wwn_group.cg_item),
|
|
|
|
tpg->tpgt, tpg_np->tpg_np->np_ip, tpg_np->tpg_np->np_port);
|
|
|
|
|
|
|
|
ret = iscsit_tpg_del_network_portal(tpg, tpg_np);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
pr_debug("LIO_Target_ConfigFS: delnpfromtpg done!\n");
|
|
|
|
out:
|
|
|
|
iscsit_put_tpg(tpg);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* End items for lio_target_np_cit */
|
|
|
|
|
|
|
|
/* Start items for lio_target_nacl_attrib_cit */
|
|
|
|
|
|
|
|
#define DEF_NACL_ATTRIB(name) \
|
|
|
|
static ssize_t iscsi_nacl_attrib_show_##name( \
|
|
|
|
struct se_node_acl *se_nacl, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_node_acl *nacl = container_of(se_nacl, struct iscsi_node_acl, \
|
|
|
|
se_node_acl); \
|
|
|
|
\
|
2013-10-10 02:05:57 +08:00
|
|
|
return sprintf(page, "%u\n", nacl->node_attrib.name); \
|
2011-07-23 14:43:04 +08:00
|
|
|
} \
|
|
|
|
\
|
|
|
|
static ssize_t iscsi_nacl_attrib_store_##name( \
|
|
|
|
struct se_node_acl *se_nacl, \
|
|
|
|
const char *page, \
|
|
|
|
size_t count) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_node_acl *nacl = container_of(se_nacl, struct iscsi_node_acl, \
|
|
|
|
se_node_acl); \
|
|
|
|
u32 val; \
|
|
|
|
int ret; \
|
|
|
|
\
|
2013-07-03 23:35:11 +08:00
|
|
|
ret = kstrtou32(page, 0, &val); \
|
|
|
|
if (ret) \
|
|
|
|
return ret; \
|
2011-07-23 14:43:04 +08:00
|
|
|
ret = iscsit_na_##name(nacl, val); \
|
|
|
|
if (ret < 0) \
|
|
|
|
return ret; \
|
|
|
|
\
|
|
|
|
return count; \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define NACL_ATTR(_name, _mode) TF_NACL_ATTRIB_ATTR(iscsi, _name, _mode);
|
|
|
|
/*
|
|
|
|
* Define iscsi_node_attrib_s_dataout_timeout
|
|
|
|
*/
|
|
|
|
DEF_NACL_ATTRIB(dataout_timeout);
|
|
|
|
NACL_ATTR(dataout_timeout, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_node_attrib_s_dataout_timeout_retries
|
|
|
|
*/
|
|
|
|
DEF_NACL_ATTRIB(dataout_timeout_retries);
|
|
|
|
NACL_ATTR(dataout_timeout_retries, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_node_attrib_s_default_erl
|
|
|
|
*/
|
|
|
|
DEF_NACL_ATTRIB(default_erl);
|
|
|
|
NACL_ATTR(default_erl, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_node_attrib_s_nopin_timeout
|
|
|
|
*/
|
|
|
|
DEF_NACL_ATTRIB(nopin_timeout);
|
|
|
|
NACL_ATTR(nopin_timeout, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_node_attrib_s_nopin_response_timeout
|
|
|
|
*/
|
|
|
|
DEF_NACL_ATTRIB(nopin_response_timeout);
|
|
|
|
NACL_ATTR(nopin_response_timeout, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_node_attrib_s_random_datain_pdu_offsets
|
|
|
|
*/
|
|
|
|
DEF_NACL_ATTRIB(random_datain_pdu_offsets);
|
|
|
|
NACL_ATTR(random_datain_pdu_offsets, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_node_attrib_s_random_datain_seq_offsets
|
|
|
|
*/
|
|
|
|
DEF_NACL_ATTRIB(random_datain_seq_offsets);
|
|
|
|
NACL_ATTR(random_datain_seq_offsets, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_node_attrib_s_random_r2t_offsets
|
|
|
|
*/
|
|
|
|
DEF_NACL_ATTRIB(random_r2t_offsets);
|
|
|
|
NACL_ATTR(random_r2t_offsets, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
static struct configfs_attribute *lio_target_nacl_attrib_attrs[] = {
|
|
|
|
&iscsi_nacl_attrib_dataout_timeout.attr,
|
|
|
|
&iscsi_nacl_attrib_dataout_timeout_retries.attr,
|
|
|
|
&iscsi_nacl_attrib_default_erl.attr,
|
|
|
|
&iscsi_nacl_attrib_nopin_timeout.attr,
|
|
|
|
&iscsi_nacl_attrib_nopin_response_timeout.attr,
|
|
|
|
&iscsi_nacl_attrib_random_datain_pdu_offsets.attr,
|
|
|
|
&iscsi_nacl_attrib_random_datain_seq_offsets.attr,
|
|
|
|
&iscsi_nacl_attrib_random_r2t_offsets.attr,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* End items for lio_target_nacl_attrib_cit */
|
|
|
|
|
|
|
|
/* Start items for lio_target_nacl_auth_cit */
|
|
|
|
|
|
|
|
#define __DEF_NACL_AUTH_STR(prefix, name, flags) \
|
|
|
|
static ssize_t __iscsi_##prefix##_show_##name( \
|
|
|
|
struct iscsi_node_acl *nacl, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_node_auth *auth = &nacl->node_auth; \
|
|
|
|
\
|
|
|
|
if (!capable(CAP_SYS_ADMIN)) \
|
|
|
|
return -EPERM; \
|
|
|
|
return snprintf(page, PAGE_SIZE, "%s\n", auth->name); \
|
|
|
|
} \
|
|
|
|
\
|
|
|
|
static ssize_t __iscsi_##prefix##_store_##name( \
|
|
|
|
struct iscsi_node_acl *nacl, \
|
|
|
|
const char *page, \
|
|
|
|
size_t count) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_node_auth *auth = &nacl->node_auth; \
|
|
|
|
\
|
|
|
|
if (!capable(CAP_SYS_ADMIN)) \
|
|
|
|
return -EPERM; \
|
2013-11-22 06:49:56 +08:00
|
|
|
if (count >= sizeof(auth->name)) \
|
|
|
|
return -EINVAL; \
|
2013-07-03 23:35:11 +08:00
|
|
|
snprintf(auth->name, sizeof(auth->name), "%s", page); \
|
2011-07-23 14:43:04 +08:00
|
|
|
if (!strncmp("NULL", auth->name, 4)) \
|
|
|
|
auth->naf_flags &= ~flags; \
|
|
|
|
else \
|
|
|
|
auth->naf_flags |= flags; \
|
|
|
|
\
|
|
|
|
if ((auth->naf_flags & NAF_USERID_IN_SET) && \
|
|
|
|
(auth->naf_flags & NAF_PASSWORD_IN_SET)) \
|
|
|
|
auth->authenticate_target = 1; \
|
|
|
|
else \
|
|
|
|
auth->authenticate_target = 0; \
|
|
|
|
\
|
|
|
|
return count; \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define __DEF_NACL_AUTH_INT(prefix, name) \
|
|
|
|
static ssize_t __iscsi_##prefix##_show_##name( \
|
|
|
|
struct iscsi_node_acl *nacl, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_node_auth *auth = &nacl->node_auth; \
|
|
|
|
\
|
|
|
|
if (!capable(CAP_SYS_ADMIN)) \
|
|
|
|
return -EPERM; \
|
|
|
|
\
|
|
|
|
return snprintf(page, PAGE_SIZE, "%d\n", auth->name); \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define DEF_NACL_AUTH_STR(name, flags) \
|
|
|
|
__DEF_NACL_AUTH_STR(nacl_auth, name, flags) \
|
|
|
|
static ssize_t iscsi_nacl_auth_show_##name( \
|
|
|
|
struct se_node_acl *nacl, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
return __iscsi_nacl_auth_show_##name(container_of(nacl, \
|
|
|
|
struct iscsi_node_acl, se_node_acl), page); \
|
|
|
|
} \
|
|
|
|
static ssize_t iscsi_nacl_auth_store_##name( \
|
|
|
|
struct se_node_acl *nacl, \
|
|
|
|
const char *page, \
|
|
|
|
size_t count) \
|
|
|
|
{ \
|
|
|
|
return __iscsi_nacl_auth_store_##name(container_of(nacl, \
|
|
|
|
struct iscsi_node_acl, se_node_acl), page, count); \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define DEF_NACL_AUTH_INT(name) \
|
|
|
|
__DEF_NACL_AUTH_INT(nacl_auth, name) \
|
|
|
|
static ssize_t iscsi_nacl_auth_show_##name( \
|
|
|
|
struct se_node_acl *nacl, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
return __iscsi_nacl_auth_show_##name(container_of(nacl, \
|
|
|
|
struct iscsi_node_acl, se_node_acl), page); \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define AUTH_ATTR(_name, _mode) TF_NACL_AUTH_ATTR(iscsi, _name, _mode);
|
|
|
|
#define AUTH_ATTR_RO(_name) TF_NACL_AUTH_ATTR_RO(iscsi, _name);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* One-way authentication userid
|
|
|
|
*/
|
|
|
|
DEF_NACL_AUTH_STR(userid, NAF_USERID_SET);
|
|
|
|
AUTH_ATTR(userid, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* One-way authentication password
|
|
|
|
*/
|
|
|
|
DEF_NACL_AUTH_STR(password, NAF_PASSWORD_SET);
|
|
|
|
AUTH_ATTR(password, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Enforce mutual authentication
|
|
|
|
*/
|
|
|
|
DEF_NACL_AUTH_INT(authenticate_target);
|
|
|
|
AUTH_ATTR_RO(authenticate_target);
|
|
|
|
/*
|
|
|
|
* Mutual authentication userid
|
|
|
|
*/
|
|
|
|
DEF_NACL_AUTH_STR(userid_mutual, NAF_USERID_IN_SET);
|
|
|
|
AUTH_ATTR(userid_mutual, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Mutual authentication password
|
|
|
|
*/
|
|
|
|
DEF_NACL_AUTH_STR(password_mutual, NAF_PASSWORD_IN_SET);
|
|
|
|
AUTH_ATTR(password_mutual, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
static struct configfs_attribute *lio_target_nacl_auth_attrs[] = {
|
|
|
|
&iscsi_nacl_auth_userid.attr,
|
|
|
|
&iscsi_nacl_auth_password.attr,
|
|
|
|
&iscsi_nacl_auth_authenticate_target.attr,
|
|
|
|
&iscsi_nacl_auth_userid_mutual.attr,
|
|
|
|
&iscsi_nacl_auth_password_mutual.attr,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* End items for lio_target_nacl_auth_cit */
|
|
|
|
|
|
|
|
/* Start items for lio_target_nacl_param_cit */
|
|
|
|
|
|
|
|
#define DEF_NACL_PARAM(name) \
|
|
|
|
static ssize_t iscsi_nacl_param_show_##name( \
|
|
|
|
struct se_node_acl *se_nacl, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_session *sess; \
|
|
|
|
struct se_session *se_sess; \
|
|
|
|
ssize_t rb; \
|
|
|
|
\
|
|
|
|
spin_lock_bh(&se_nacl->nacl_sess_lock); \
|
|
|
|
se_sess = se_nacl->nacl_sess; \
|
|
|
|
if (!se_sess) { \
|
|
|
|
rb = snprintf(page, PAGE_SIZE, \
|
|
|
|
"No Active iSCSI Session\n"); \
|
|
|
|
} else { \
|
|
|
|
sess = se_sess->fabric_sess_ptr; \
|
|
|
|
rb = snprintf(page, PAGE_SIZE, "%u\n", \
|
|
|
|
(u32)sess->sess_ops->name); \
|
|
|
|
} \
|
|
|
|
spin_unlock_bh(&se_nacl->nacl_sess_lock); \
|
|
|
|
\
|
|
|
|
return rb; \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define NACL_PARAM_ATTR(_name) TF_NACL_PARAM_ATTR_RO(iscsi, _name);
|
|
|
|
|
|
|
|
DEF_NACL_PARAM(MaxConnections);
|
|
|
|
NACL_PARAM_ATTR(MaxConnections);
|
|
|
|
|
|
|
|
DEF_NACL_PARAM(InitialR2T);
|
|
|
|
NACL_PARAM_ATTR(InitialR2T);
|
|
|
|
|
|
|
|
DEF_NACL_PARAM(ImmediateData);
|
|
|
|
NACL_PARAM_ATTR(ImmediateData);
|
|
|
|
|
|
|
|
DEF_NACL_PARAM(MaxBurstLength);
|
|
|
|
NACL_PARAM_ATTR(MaxBurstLength);
|
|
|
|
|
|
|
|
DEF_NACL_PARAM(FirstBurstLength);
|
|
|
|
NACL_PARAM_ATTR(FirstBurstLength);
|
|
|
|
|
|
|
|
DEF_NACL_PARAM(DefaultTime2Wait);
|
|
|
|
NACL_PARAM_ATTR(DefaultTime2Wait);
|
|
|
|
|
|
|
|
DEF_NACL_PARAM(DefaultTime2Retain);
|
|
|
|
NACL_PARAM_ATTR(DefaultTime2Retain);
|
|
|
|
|
|
|
|
DEF_NACL_PARAM(MaxOutstandingR2T);
|
|
|
|
NACL_PARAM_ATTR(MaxOutstandingR2T);
|
|
|
|
|
|
|
|
DEF_NACL_PARAM(DataPDUInOrder);
|
|
|
|
NACL_PARAM_ATTR(DataPDUInOrder);
|
|
|
|
|
|
|
|
DEF_NACL_PARAM(DataSequenceInOrder);
|
|
|
|
NACL_PARAM_ATTR(DataSequenceInOrder);
|
|
|
|
|
|
|
|
DEF_NACL_PARAM(ErrorRecoveryLevel);
|
|
|
|
NACL_PARAM_ATTR(ErrorRecoveryLevel);
|
|
|
|
|
|
|
|
static struct configfs_attribute *lio_target_nacl_param_attrs[] = {
|
|
|
|
&iscsi_nacl_param_MaxConnections.attr,
|
|
|
|
&iscsi_nacl_param_InitialR2T.attr,
|
|
|
|
&iscsi_nacl_param_ImmediateData.attr,
|
|
|
|
&iscsi_nacl_param_MaxBurstLength.attr,
|
|
|
|
&iscsi_nacl_param_FirstBurstLength.attr,
|
|
|
|
&iscsi_nacl_param_DefaultTime2Wait.attr,
|
|
|
|
&iscsi_nacl_param_DefaultTime2Retain.attr,
|
|
|
|
&iscsi_nacl_param_MaxOutstandingR2T.attr,
|
|
|
|
&iscsi_nacl_param_DataPDUInOrder.attr,
|
|
|
|
&iscsi_nacl_param_DataSequenceInOrder.attr,
|
|
|
|
&iscsi_nacl_param_ErrorRecoveryLevel.attr,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* End items for lio_target_nacl_param_cit */
|
|
|
|
|
|
|
|
/* Start items for lio_target_acl_cit */
|
|
|
|
|
|
|
|
static ssize_t lio_target_nacl_show_info(
|
|
|
|
struct se_node_acl *se_nacl,
|
|
|
|
char *page)
|
|
|
|
{
|
|
|
|
struct iscsi_session *sess;
|
|
|
|
struct iscsi_conn *conn;
|
|
|
|
struct se_session *se_sess;
|
|
|
|
ssize_t rb = 0;
|
|
|
|
|
|
|
|
spin_lock_bh(&se_nacl->nacl_sess_lock);
|
|
|
|
se_sess = se_nacl->nacl_sess;
|
|
|
|
if (!se_sess) {
|
|
|
|
rb += sprintf(page+rb, "No active iSCSI Session for Initiator"
|
|
|
|
" Endpoint: %s\n", se_nacl->initiatorname);
|
|
|
|
} else {
|
|
|
|
sess = se_sess->fabric_sess_ptr;
|
|
|
|
|
2014-09-03 05:49:50 +08:00
|
|
|
rb += sprintf(page+rb, "InitiatorName: %s\n",
|
|
|
|
sess->sess_ops->InitiatorName);
|
|
|
|
rb += sprintf(page+rb, "InitiatorAlias: %s\n",
|
|
|
|
sess->sess_ops->InitiatorAlias);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2015-01-15 19:40:56 +08:00
|
|
|
rb += sprintf(page+rb,
|
|
|
|
"LIO Session ID: %u ISID: 0x%6ph TSIH: %hu ",
|
|
|
|
sess->sid, sess->isid, sess->tsih);
|
2011-07-23 14:43:04 +08:00
|
|
|
rb += sprintf(page+rb, "SessionType: %s\n",
|
|
|
|
(sess->sess_ops->SessionType) ?
|
|
|
|
"Discovery" : "Normal");
|
|
|
|
rb += sprintf(page+rb, "Session State: ");
|
|
|
|
switch (sess->session_state) {
|
|
|
|
case TARG_SESS_STATE_FREE:
|
|
|
|
rb += sprintf(page+rb, "TARG_SESS_FREE\n");
|
|
|
|
break;
|
|
|
|
case TARG_SESS_STATE_ACTIVE:
|
|
|
|
rb += sprintf(page+rb, "TARG_SESS_STATE_ACTIVE\n");
|
|
|
|
break;
|
|
|
|
case TARG_SESS_STATE_LOGGED_IN:
|
|
|
|
rb += sprintf(page+rb, "TARG_SESS_STATE_LOGGED_IN\n");
|
|
|
|
break;
|
|
|
|
case TARG_SESS_STATE_FAILED:
|
|
|
|
rb += sprintf(page+rb, "TARG_SESS_STATE_FAILED\n");
|
|
|
|
break;
|
|
|
|
case TARG_SESS_STATE_IN_CONTINUE:
|
|
|
|
rb += sprintf(page+rb, "TARG_SESS_STATE_IN_CONTINUE\n");
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
rb += sprintf(page+rb, "ERROR: Unknown Session"
|
|
|
|
" State!\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
rb += sprintf(page+rb, "---------------------[iSCSI Session"
|
|
|
|
" Values]-----------------------\n");
|
|
|
|
rb += sprintf(page+rb, " CmdSN/WR : CmdSN/WC : ExpCmdSN"
|
|
|
|
" : MaxCmdSN : ITT : TTT\n");
|
|
|
|
rb += sprintf(page+rb, " 0x%08x 0x%08x 0x%08x 0x%08x"
|
|
|
|
" 0x%08x 0x%08x\n",
|
|
|
|
sess->cmdsn_window,
|
|
|
|
(sess->max_cmd_sn - sess->exp_cmd_sn) + 1,
|
|
|
|
sess->exp_cmd_sn, sess->max_cmd_sn,
|
|
|
|
sess->init_task_tag, sess->targ_xfer_tag);
|
|
|
|
rb += sprintf(page+rb, "----------------------[iSCSI"
|
|
|
|
" Connections]-------------------------\n");
|
|
|
|
|
|
|
|
spin_lock(&sess->conn_lock);
|
|
|
|
list_for_each_entry(conn, &sess->sess_conn_list, conn_list) {
|
|
|
|
rb += sprintf(page+rb, "CID: %hu Connection"
|
|
|
|
" State: ", conn->cid);
|
|
|
|
switch (conn->conn_state) {
|
|
|
|
case TARG_CONN_STATE_FREE:
|
|
|
|
rb += sprintf(page+rb,
|
|
|
|
"TARG_CONN_STATE_FREE\n");
|
|
|
|
break;
|
|
|
|
case TARG_CONN_STATE_XPT_UP:
|
|
|
|
rb += sprintf(page+rb,
|
|
|
|
"TARG_CONN_STATE_XPT_UP\n");
|
|
|
|
break;
|
|
|
|
case TARG_CONN_STATE_IN_LOGIN:
|
|
|
|
rb += sprintf(page+rb,
|
|
|
|
"TARG_CONN_STATE_IN_LOGIN\n");
|
|
|
|
break;
|
|
|
|
case TARG_CONN_STATE_LOGGED_IN:
|
|
|
|
rb += sprintf(page+rb,
|
|
|
|
"TARG_CONN_STATE_LOGGED_IN\n");
|
|
|
|
break;
|
|
|
|
case TARG_CONN_STATE_IN_LOGOUT:
|
|
|
|
rb += sprintf(page+rb,
|
|
|
|
"TARG_CONN_STATE_IN_LOGOUT\n");
|
|
|
|
break;
|
|
|
|
case TARG_CONN_STATE_LOGOUT_REQUESTED:
|
|
|
|
rb += sprintf(page+rb,
|
|
|
|
"TARG_CONN_STATE_LOGOUT_REQUESTED\n");
|
|
|
|
break;
|
|
|
|
case TARG_CONN_STATE_CLEANUP_WAIT:
|
|
|
|
rb += sprintf(page+rb,
|
|
|
|
"TARG_CONN_STATE_CLEANUP_WAIT\n");
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
rb += sprintf(page+rb,
|
|
|
|
"ERROR: Unknown Connection State!\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
rb += sprintf(page+rb, " Address %s %s", conn->login_ip,
|
|
|
|
(conn->network_transport == ISCSI_TCP) ?
|
|
|
|
"TCP" : "SCTP");
|
|
|
|
rb += sprintf(page+rb, " StatSN: 0x%08x\n",
|
|
|
|
conn->stat_sn);
|
|
|
|
}
|
|
|
|
spin_unlock(&sess->conn_lock);
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&se_nacl->nacl_sess_lock);
|
|
|
|
|
|
|
|
return rb;
|
|
|
|
}
|
|
|
|
|
|
|
|
TF_NACL_BASE_ATTR_RO(lio_target, info);
|
|
|
|
|
|
|
|
static ssize_t lio_target_nacl_show_cmdsn_depth(
|
|
|
|
struct se_node_acl *se_nacl,
|
|
|
|
char *page)
|
|
|
|
{
|
|
|
|
return sprintf(page, "%u\n", se_nacl->queue_depth);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t lio_target_nacl_store_cmdsn_depth(
|
|
|
|
struct se_node_acl *se_nacl,
|
|
|
|
const char *page,
|
|
|
|
size_t count)
|
|
|
|
{
|
|
|
|
struct se_portal_group *se_tpg = se_nacl->se_tpg;
|
|
|
|
struct iscsi_portal_group *tpg = container_of(se_tpg,
|
|
|
|
struct iscsi_portal_group, tpg_se_tpg);
|
|
|
|
struct config_item *acl_ci, *tpg_ci, *wwn_ci;
|
|
|
|
u32 cmdsn_depth = 0;
|
|
|
|
int ret;
|
|
|
|
|
2013-07-03 23:35:11 +08:00
|
|
|
ret = kstrtou32(page, 0, &cmdsn_depth);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
2011-07-23 14:43:04 +08:00
|
|
|
if (cmdsn_depth > TA_DEFAULT_CMDSN_DEPTH_MAX) {
|
|
|
|
pr_err("Passed cmdsn_depth: %u exceeds"
|
|
|
|
" TA_DEFAULT_CMDSN_DEPTH_MAX: %u\n", cmdsn_depth,
|
|
|
|
TA_DEFAULT_CMDSN_DEPTH_MAX);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
acl_ci = &se_nacl->acl_group.cg_item;
|
|
|
|
if (!acl_ci) {
|
|
|
|
pr_err("Unable to locatel acl_ci\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
tpg_ci = &acl_ci->ci_parent->ci_group->cg_item;
|
|
|
|
if (!tpg_ci) {
|
|
|
|
pr_err("Unable to locate tpg_ci\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
wwn_ci = &tpg_ci->ci_group->cg_item;
|
|
|
|
if (!wwn_ci) {
|
|
|
|
pr_err("Unable to locate config_item wwn_ci\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (iscsit_get_tpg(tpg) < 0)
|
|
|
|
return -EINVAL;
|
|
|
|
/*
|
|
|
|
* iscsit_tpg_set_initiator_node_queue_depth() assumes force=1
|
|
|
|
*/
|
|
|
|
ret = iscsit_tpg_set_initiator_node_queue_depth(tpg,
|
|
|
|
config_item_name(acl_ci), cmdsn_depth, 1);
|
|
|
|
|
|
|
|
pr_debug("LIO_Target_ConfigFS: %s/%s Set CmdSN Window: %u for"
|
|
|
|
"InitiatorName: %s\n", config_item_name(wwn_ci),
|
|
|
|
config_item_name(tpg_ci), cmdsn_depth,
|
|
|
|
config_item_name(acl_ci));
|
|
|
|
|
|
|
|
iscsit_put_tpg(tpg);
|
|
|
|
return (!ret) ? count : (ssize_t)ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
TF_NACL_BASE_ATTR(lio_target, cmdsn_depth, S_IRUGO | S_IWUSR);
|
|
|
|
|
2012-12-12 08:30:53 +08:00
|
|
|
static ssize_t lio_target_nacl_show_tag(
|
|
|
|
struct se_node_acl *se_nacl,
|
|
|
|
char *page)
|
|
|
|
{
|
|
|
|
return snprintf(page, PAGE_SIZE, "%s", se_nacl->acl_tag);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t lio_target_nacl_store_tag(
|
|
|
|
struct se_node_acl *se_nacl,
|
|
|
|
const char *page,
|
|
|
|
size_t count)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = core_tpg_set_initiator_node_tag(se_nacl->se_tpg, se_nacl, page);
|
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
|
|
|
TF_NACL_BASE_ATTR(lio_target, tag, S_IRUGO | S_IWUSR);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
static struct configfs_attribute *lio_target_initiator_attrs[] = {
|
|
|
|
&lio_target_nacl_info.attr,
|
|
|
|
&lio_target_nacl_cmdsn_depth.attr,
|
2012-12-12 08:30:53 +08:00
|
|
|
&lio_target_nacl_tag.attr,
|
2011-07-23 14:43:04 +08:00
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct se_node_acl *lio_tpg_alloc_fabric_acl(
|
|
|
|
struct se_portal_group *se_tpg)
|
|
|
|
{
|
|
|
|
struct iscsi_node_acl *acl;
|
|
|
|
|
|
|
|
acl = kzalloc(sizeof(struct iscsi_node_acl), GFP_KERNEL);
|
|
|
|
if (!acl) {
|
|
|
|
pr_err("Unable to allocate memory for struct iscsi_node_acl\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return &acl->se_node_acl;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct se_node_acl *lio_target_make_nodeacl(
|
|
|
|
struct se_portal_group *se_tpg,
|
|
|
|
struct config_group *group,
|
|
|
|
const char *name)
|
|
|
|
{
|
|
|
|
struct config_group *stats_cg;
|
|
|
|
struct iscsi_node_acl *acl;
|
|
|
|
struct se_node_acl *se_nacl_new, *se_nacl;
|
|
|
|
struct iscsi_portal_group *tpg = container_of(se_tpg,
|
|
|
|
struct iscsi_portal_group, tpg_se_tpg);
|
|
|
|
u32 cmdsn_depth;
|
|
|
|
|
|
|
|
se_nacl_new = lio_tpg_alloc_fabric_acl(se_tpg);
|
|
|
|
if (!se_nacl_new)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
|
2013-10-10 02:05:57 +08:00
|
|
|
cmdsn_depth = tpg->tpg_attrib.default_cmdsn_depth;
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* se_nacl_new may be released by core_tpg_add_initiator_node_acl()
|
|
|
|
* when converting a NdoeACL from demo mode -> explict
|
|
|
|
*/
|
|
|
|
se_nacl = core_tpg_add_initiator_node_acl(se_tpg, se_nacl_new,
|
|
|
|
name, cmdsn_depth);
|
|
|
|
if (IS_ERR(se_nacl))
|
|
|
|
return se_nacl;
|
|
|
|
|
2012-02-27 14:16:07 +08:00
|
|
|
acl = container_of(se_nacl, struct iscsi_node_acl, se_node_acl);
|
|
|
|
stats_cg = &se_nacl->acl_fabric_stat_group;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2012-11-28 01:54:21 +08:00
|
|
|
stats_cg->default_groups = kmalloc(sizeof(struct config_group *) * 2,
|
2011-07-23 14:43:04 +08:00
|
|
|
GFP_KERNEL);
|
|
|
|
if (!stats_cg->default_groups) {
|
|
|
|
pr_err("Unable to allocate memory for"
|
|
|
|
" stats_cg->default_groups\n");
|
|
|
|
core_tpg_del_initiator_node_acl(se_tpg, se_nacl, 1);
|
|
|
|
kfree(acl);
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
}
|
|
|
|
|
2013-10-10 02:05:57 +08:00
|
|
|
stats_cg->default_groups[0] = &acl->node_stat_grps.iscsi_sess_stats_group;
|
2011-07-23 14:43:04 +08:00
|
|
|
stats_cg->default_groups[1] = NULL;
|
2013-10-10 02:05:57 +08:00
|
|
|
config_group_init_type_name(&acl->node_stat_grps.iscsi_sess_stats_group,
|
2011-07-23 14:43:04 +08:00
|
|
|
"iscsi_sess_stats", &iscsi_stat_sess_cit);
|
|
|
|
|
|
|
|
return se_nacl;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void lio_target_drop_nodeacl(
|
|
|
|
struct se_node_acl *se_nacl)
|
|
|
|
{
|
|
|
|
struct se_portal_group *se_tpg = se_nacl->se_tpg;
|
|
|
|
struct iscsi_node_acl *acl = container_of(se_nacl,
|
|
|
|
struct iscsi_node_acl, se_node_acl);
|
|
|
|
struct config_item *df_item;
|
|
|
|
struct config_group *stats_cg;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
stats_cg = &acl->se_node_acl.acl_fabric_stat_group;
|
|
|
|
for (i = 0; stats_cg->default_groups[i]; i++) {
|
|
|
|
df_item = &stats_cg->default_groups[i]->cg_item;
|
|
|
|
stats_cg->default_groups[i] = NULL;
|
|
|
|
config_item_put(df_item);
|
|
|
|
}
|
|
|
|
kfree(stats_cg->default_groups);
|
|
|
|
|
|
|
|
core_tpg_del_initiator_node_acl(se_tpg, se_nacl, 1);
|
|
|
|
kfree(acl);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* End items for lio_target_acl_cit */
|
|
|
|
|
|
|
|
/* Start items for lio_target_tpg_attrib_cit */
|
|
|
|
|
|
|
|
#define DEF_TPG_ATTRIB(name) \
|
|
|
|
\
|
|
|
|
static ssize_t iscsi_tpg_attrib_show_##name( \
|
|
|
|
struct se_portal_group *se_tpg, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_portal_group *tpg = container_of(se_tpg, \
|
|
|
|
struct iscsi_portal_group, tpg_se_tpg); \
|
|
|
|
ssize_t rb; \
|
|
|
|
\
|
|
|
|
if (iscsit_get_tpg(tpg) < 0) \
|
|
|
|
return -EINVAL; \
|
|
|
|
\
|
2013-10-10 02:05:57 +08:00
|
|
|
rb = sprintf(page, "%u\n", tpg->tpg_attrib.name); \
|
2011-07-23 14:43:04 +08:00
|
|
|
iscsit_put_tpg(tpg); \
|
|
|
|
return rb; \
|
|
|
|
} \
|
|
|
|
\
|
|
|
|
static ssize_t iscsi_tpg_attrib_store_##name( \
|
|
|
|
struct se_portal_group *se_tpg, \
|
|
|
|
const char *page, \
|
|
|
|
size_t count) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_portal_group *tpg = container_of(se_tpg, \
|
|
|
|
struct iscsi_portal_group, tpg_se_tpg); \
|
|
|
|
u32 val; \
|
|
|
|
int ret; \
|
|
|
|
\
|
|
|
|
if (iscsit_get_tpg(tpg) < 0) \
|
|
|
|
return -EINVAL; \
|
|
|
|
\
|
2013-07-03 23:35:11 +08:00
|
|
|
ret = kstrtou32(page, 0, &val); \
|
|
|
|
if (ret) \
|
|
|
|
goto out; \
|
2011-07-23 14:43:04 +08:00
|
|
|
ret = iscsit_ta_##name(tpg, val); \
|
|
|
|
if (ret < 0) \
|
|
|
|
goto out; \
|
|
|
|
\
|
|
|
|
iscsit_put_tpg(tpg); \
|
|
|
|
return count; \
|
|
|
|
out: \
|
|
|
|
iscsit_put_tpg(tpg); \
|
|
|
|
return ret; \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define TPG_ATTR(_name, _mode) TF_TPG_ATTRIB_ATTR(iscsi, _name, _mode);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Define iscsi_tpg_attrib_s_authentication
|
|
|
|
*/
|
|
|
|
DEF_TPG_ATTRIB(authentication);
|
|
|
|
TPG_ATTR(authentication, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_tpg_attrib_s_login_timeout
|
|
|
|
*/
|
|
|
|
DEF_TPG_ATTRIB(login_timeout);
|
|
|
|
TPG_ATTR(login_timeout, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_tpg_attrib_s_netif_timeout
|
|
|
|
*/
|
|
|
|
DEF_TPG_ATTRIB(netif_timeout);
|
|
|
|
TPG_ATTR(netif_timeout, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_tpg_attrib_s_generate_node_acls
|
|
|
|
*/
|
|
|
|
DEF_TPG_ATTRIB(generate_node_acls);
|
|
|
|
TPG_ATTR(generate_node_acls, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_tpg_attrib_s_default_cmdsn_depth
|
|
|
|
*/
|
|
|
|
DEF_TPG_ATTRIB(default_cmdsn_depth);
|
|
|
|
TPG_ATTR(default_cmdsn_depth, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
Define iscsi_tpg_attrib_s_cache_dynamic_acls
|
|
|
|
*/
|
|
|
|
DEF_TPG_ATTRIB(cache_dynamic_acls);
|
|
|
|
TPG_ATTR(cache_dynamic_acls, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_tpg_attrib_s_demo_mode_write_protect
|
|
|
|
*/
|
|
|
|
DEF_TPG_ATTRIB(demo_mode_write_protect);
|
|
|
|
TPG_ATTR(demo_mode_write_protect, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Define iscsi_tpg_attrib_s_prod_mode_write_protect
|
|
|
|
*/
|
|
|
|
DEF_TPG_ATTRIB(prod_mode_write_protect);
|
|
|
|
TPG_ATTR(prod_mode_write_protect, S_IRUGO | S_IWUSR);
|
2013-10-08 05:12:11 +08:00
|
|
|
/*
|
|
|
|
* Define iscsi_tpg_attrib_s_demo_mode_discovery,
|
|
|
|
*/
|
|
|
|
DEF_TPG_ATTRIB(demo_mode_discovery);
|
|
|
|
TPG_ATTR(demo_mode_discovery, S_IRUGO | S_IWUSR);
|
2013-11-21 03:57:18 +08:00
|
|
|
/*
|
|
|
|
* Define iscsi_tpg_attrib_s_default_erl
|
|
|
|
*/
|
|
|
|
DEF_TPG_ATTRIB(default_erl);
|
|
|
|
TPG_ATTR(default_erl, S_IRUGO | S_IWUSR);
|
2014-02-19 23:50:20 +08:00
|
|
|
/*
|
|
|
|
* Define iscsi_tpg_attrib_s_t10_pi
|
|
|
|
*/
|
|
|
|
DEF_TPG_ATTRIB(t10_pi);
|
|
|
|
TPG_ATTR(t10_pi, S_IRUGO | S_IWUSR);
|
2015-03-30 10:36:16 +08:00
|
|
|
/*
|
|
|
|
* Define iscsi_tpg_attrib_s_fabric_prot_type
|
|
|
|
*/
|
|
|
|
DEF_TPG_ATTRIB(fabric_prot_type);
|
|
|
|
TPG_ATTR(fabric_prot_type, S_IRUGO | S_IWUSR);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
static struct configfs_attribute *lio_target_tpg_attrib_attrs[] = {
|
|
|
|
&iscsi_tpg_attrib_authentication.attr,
|
|
|
|
&iscsi_tpg_attrib_login_timeout.attr,
|
|
|
|
&iscsi_tpg_attrib_netif_timeout.attr,
|
|
|
|
&iscsi_tpg_attrib_generate_node_acls.attr,
|
|
|
|
&iscsi_tpg_attrib_default_cmdsn_depth.attr,
|
|
|
|
&iscsi_tpg_attrib_cache_dynamic_acls.attr,
|
|
|
|
&iscsi_tpg_attrib_demo_mode_write_protect.attr,
|
|
|
|
&iscsi_tpg_attrib_prod_mode_write_protect.attr,
|
2013-10-08 05:12:11 +08:00
|
|
|
&iscsi_tpg_attrib_demo_mode_discovery.attr,
|
2013-11-21 03:57:18 +08:00
|
|
|
&iscsi_tpg_attrib_default_erl.attr,
|
2014-02-19 23:50:20 +08:00
|
|
|
&iscsi_tpg_attrib_t10_pi.attr,
|
2015-03-30 10:36:16 +08:00
|
|
|
&iscsi_tpg_attrib_fabric_prot_type.attr,
|
2011-07-23 14:43:04 +08:00
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* End items for lio_target_tpg_attrib_cit */
|
|
|
|
|
2013-06-20 09:48:51 +08:00
|
|
|
/* Start items for lio_target_tpg_auth_cit */
|
|
|
|
|
|
|
|
#define __DEF_TPG_AUTH_STR(prefix, name, flags) \
|
|
|
|
static ssize_t __iscsi_##prefix##_show_##name( \
|
|
|
|
struct se_portal_group *se_tpg, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_portal_group *tpg = container_of(se_tpg, \
|
|
|
|
struct iscsi_portal_group, tpg_se_tpg); \
|
|
|
|
struct iscsi_node_auth *auth = &tpg->tpg_demo_auth; \
|
|
|
|
\
|
|
|
|
if (!capable(CAP_SYS_ADMIN)) \
|
|
|
|
return -EPERM; \
|
|
|
|
\
|
|
|
|
return snprintf(page, PAGE_SIZE, "%s\n", auth->name); \
|
|
|
|
} \
|
|
|
|
\
|
|
|
|
static ssize_t __iscsi_##prefix##_store_##name( \
|
|
|
|
struct se_portal_group *se_tpg, \
|
|
|
|
const char *page, \
|
|
|
|
size_t count) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_portal_group *tpg = container_of(se_tpg, \
|
|
|
|
struct iscsi_portal_group, tpg_se_tpg); \
|
|
|
|
struct iscsi_node_auth *auth = &tpg->tpg_demo_auth; \
|
|
|
|
\
|
|
|
|
if (!capable(CAP_SYS_ADMIN)) \
|
|
|
|
return -EPERM; \
|
|
|
|
\
|
2013-07-07 07:48:55 +08:00
|
|
|
snprintf(auth->name, sizeof(auth->name), "%s", page); \
|
2013-06-20 09:48:51 +08:00
|
|
|
if (!(strncmp("NULL", auth->name, 4))) \
|
|
|
|
auth->naf_flags &= ~flags; \
|
|
|
|
else \
|
|
|
|
auth->naf_flags |= flags; \
|
|
|
|
\
|
|
|
|
if ((auth->naf_flags & NAF_USERID_IN_SET) && \
|
|
|
|
(auth->naf_flags & NAF_PASSWORD_IN_SET)) \
|
|
|
|
auth->authenticate_target = 1; \
|
|
|
|
else \
|
|
|
|
auth->authenticate_target = 0; \
|
|
|
|
\
|
|
|
|
return count; \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define __DEF_TPG_AUTH_INT(prefix, name) \
|
|
|
|
static ssize_t __iscsi_##prefix##_show_##name( \
|
|
|
|
struct se_portal_group *se_tpg, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_portal_group *tpg = container_of(se_tpg, \
|
|
|
|
struct iscsi_portal_group, tpg_se_tpg); \
|
|
|
|
struct iscsi_node_auth *auth = &tpg->tpg_demo_auth; \
|
|
|
|
\
|
|
|
|
if (!capable(CAP_SYS_ADMIN)) \
|
|
|
|
return -EPERM; \
|
|
|
|
\
|
|
|
|
return snprintf(page, PAGE_SIZE, "%d\n", auth->name); \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define DEF_TPG_AUTH_STR(name, flags) \
|
|
|
|
__DEF_TPG_AUTH_STR(tpg_auth, name, flags) \
|
|
|
|
static ssize_t iscsi_tpg_auth_show_##name( \
|
|
|
|
struct se_portal_group *se_tpg, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
return __iscsi_tpg_auth_show_##name(se_tpg, page); \
|
|
|
|
} \
|
|
|
|
\
|
|
|
|
static ssize_t iscsi_tpg_auth_store_##name( \
|
|
|
|
struct se_portal_group *se_tpg, \
|
|
|
|
const char *page, \
|
|
|
|
size_t count) \
|
|
|
|
{ \
|
|
|
|
return __iscsi_tpg_auth_store_##name(se_tpg, page, count); \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define DEF_TPG_AUTH_INT(name) \
|
|
|
|
__DEF_TPG_AUTH_INT(tpg_auth, name) \
|
|
|
|
static ssize_t iscsi_tpg_auth_show_##name( \
|
|
|
|
struct se_portal_group *se_tpg, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
return __iscsi_tpg_auth_show_##name(se_tpg, page); \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define TPG_AUTH_ATTR(_name, _mode) TF_TPG_AUTH_ATTR(iscsi, _name, _mode);
|
|
|
|
#define TPG_AUTH_ATTR_RO(_name) TF_TPG_AUTH_ATTR_RO(iscsi, _name);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* * One-way authentication userid
|
|
|
|
* */
|
|
|
|
DEF_TPG_AUTH_STR(userid, NAF_USERID_SET);
|
|
|
|
TPG_AUTH_ATTR(userid, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* * One-way authentication password
|
|
|
|
* */
|
|
|
|
DEF_TPG_AUTH_STR(password, NAF_PASSWORD_SET);
|
|
|
|
TPG_AUTH_ATTR(password, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* * Enforce mutual authentication
|
|
|
|
* */
|
|
|
|
DEF_TPG_AUTH_INT(authenticate_target);
|
|
|
|
TPG_AUTH_ATTR_RO(authenticate_target);
|
|
|
|
/*
|
|
|
|
* * Mutual authentication userid
|
|
|
|
* */
|
|
|
|
DEF_TPG_AUTH_STR(userid_mutual, NAF_USERID_IN_SET);
|
|
|
|
TPG_AUTH_ATTR(userid_mutual, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* * Mutual authentication password
|
|
|
|
* */
|
|
|
|
DEF_TPG_AUTH_STR(password_mutual, NAF_PASSWORD_IN_SET);
|
|
|
|
TPG_AUTH_ATTR(password_mutual, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
static struct configfs_attribute *lio_target_tpg_auth_attrs[] = {
|
|
|
|
&iscsi_tpg_auth_userid.attr,
|
|
|
|
&iscsi_tpg_auth_password.attr,
|
|
|
|
&iscsi_tpg_auth_authenticate_target.attr,
|
|
|
|
&iscsi_tpg_auth_userid_mutual.attr,
|
|
|
|
&iscsi_tpg_auth_password_mutual.attr,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* End items for lio_target_tpg_auth_cit */
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
/* Start items for lio_target_tpg_param_cit */
|
|
|
|
|
|
|
|
#define DEF_TPG_PARAM(name) \
|
|
|
|
static ssize_t iscsi_tpg_param_show_##name( \
|
|
|
|
struct se_portal_group *se_tpg, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_portal_group *tpg = container_of(se_tpg, \
|
|
|
|
struct iscsi_portal_group, tpg_se_tpg); \
|
|
|
|
struct iscsi_param *param; \
|
|
|
|
ssize_t rb; \
|
|
|
|
\
|
|
|
|
if (iscsit_get_tpg(tpg) < 0) \
|
|
|
|
return -EINVAL; \
|
|
|
|
\
|
|
|
|
param = iscsi_find_param_from_key(__stringify(name), \
|
|
|
|
tpg->param_list); \
|
|
|
|
if (!param) { \
|
|
|
|
iscsit_put_tpg(tpg); \
|
|
|
|
return -EINVAL; \
|
|
|
|
} \
|
|
|
|
rb = snprintf(page, PAGE_SIZE, "%s\n", param->value); \
|
|
|
|
\
|
|
|
|
iscsit_put_tpg(tpg); \
|
|
|
|
return rb; \
|
|
|
|
} \
|
|
|
|
static ssize_t iscsi_tpg_param_store_##name( \
|
|
|
|
struct se_portal_group *se_tpg, \
|
|
|
|
const char *page, \
|
|
|
|
size_t count) \
|
|
|
|
{ \
|
|
|
|
struct iscsi_portal_group *tpg = container_of(se_tpg, \
|
|
|
|
struct iscsi_portal_group, tpg_se_tpg); \
|
|
|
|
char *buf; \
|
2013-07-03 23:35:11 +08:00
|
|
|
int ret, len; \
|
2011-07-23 14:43:04 +08:00
|
|
|
\
|
|
|
|
buf = kzalloc(PAGE_SIZE, GFP_KERNEL); \
|
|
|
|
if (!buf) \
|
|
|
|
return -ENOMEM; \
|
2013-07-03 23:35:11 +08:00
|
|
|
len = snprintf(buf, PAGE_SIZE, "%s=%s", __stringify(name), page); \
|
|
|
|
if (isspace(buf[len-1])) \
|
|
|
|
buf[len-1] = '\0'; /* Kill newline */ \
|
2011-07-23 14:43:04 +08:00
|
|
|
\
|
|
|
|
if (iscsit_get_tpg(tpg) < 0) { \
|
|
|
|
kfree(buf); \
|
|
|
|
return -EINVAL; \
|
|
|
|
} \
|
|
|
|
\
|
|
|
|
ret = iscsi_change_param_value(buf, tpg->param_list, 1); \
|
|
|
|
if (ret < 0) \
|
|
|
|
goto out; \
|
|
|
|
\
|
|
|
|
kfree(buf); \
|
|
|
|
iscsit_put_tpg(tpg); \
|
|
|
|
return count; \
|
|
|
|
out: \
|
|
|
|
kfree(buf); \
|
|
|
|
iscsit_put_tpg(tpg); \
|
|
|
|
return -EINVAL; \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define TPG_PARAM_ATTR(_name, _mode) TF_TPG_PARAM_ATTR(iscsi, _name, _mode);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(AuthMethod);
|
|
|
|
TPG_PARAM_ATTR(AuthMethod, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(HeaderDigest);
|
|
|
|
TPG_PARAM_ATTR(HeaderDigest, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(DataDigest);
|
|
|
|
TPG_PARAM_ATTR(DataDigest, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(MaxConnections);
|
|
|
|
TPG_PARAM_ATTR(MaxConnections, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(TargetAlias);
|
|
|
|
TPG_PARAM_ATTR(TargetAlias, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(InitialR2T);
|
|
|
|
TPG_PARAM_ATTR(InitialR2T, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(ImmediateData);
|
|
|
|
TPG_PARAM_ATTR(ImmediateData, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(MaxRecvDataSegmentLength);
|
|
|
|
TPG_PARAM_ATTR(MaxRecvDataSegmentLength, S_IRUGO | S_IWUSR);
|
|
|
|
|
2012-09-30 12:47:16 +08:00
|
|
|
DEF_TPG_PARAM(MaxXmitDataSegmentLength);
|
|
|
|
TPG_PARAM_ATTR(MaxXmitDataSegmentLength, S_IRUGO | S_IWUSR);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
DEF_TPG_PARAM(MaxBurstLength);
|
|
|
|
TPG_PARAM_ATTR(MaxBurstLength, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(FirstBurstLength);
|
|
|
|
TPG_PARAM_ATTR(FirstBurstLength, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(DefaultTime2Wait);
|
|
|
|
TPG_PARAM_ATTR(DefaultTime2Wait, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(DefaultTime2Retain);
|
|
|
|
TPG_PARAM_ATTR(DefaultTime2Retain, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(MaxOutstandingR2T);
|
|
|
|
TPG_PARAM_ATTR(MaxOutstandingR2T, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(DataPDUInOrder);
|
|
|
|
TPG_PARAM_ATTR(DataPDUInOrder, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(DataSequenceInOrder);
|
|
|
|
TPG_PARAM_ATTR(DataSequenceInOrder, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(ErrorRecoveryLevel);
|
|
|
|
TPG_PARAM_ATTR(ErrorRecoveryLevel, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(IFMarker);
|
|
|
|
TPG_PARAM_ATTR(IFMarker, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(OFMarker);
|
|
|
|
TPG_PARAM_ATTR(OFMarker, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(IFMarkInt);
|
|
|
|
TPG_PARAM_ATTR(IFMarkInt, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
DEF_TPG_PARAM(OFMarkInt);
|
|
|
|
TPG_PARAM_ATTR(OFMarkInt, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
static struct configfs_attribute *lio_target_tpg_param_attrs[] = {
|
|
|
|
&iscsi_tpg_param_AuthMethod.attr,
|
|
|
|
&iscsi_tpg_param_HeaderDigest.attr,
|
|
|
|
&iscsi_tpg_param_DataDigest.attr,
|
|
|
|
&iscsi_tpg_param_MaxConnections.attr,
|
|
|
|
&iscsi_tpg_param_TargetAlias.attr,
|
|
|
|
&iscsi_tpg_param_InitialR2T.attr,
|
|
|
|
&iscsi_tpg_param_ImmediateData.attr,
|
|
|
|
&iscsi_tpg_param_MaxRecvDataSegmentLength.attr,
|
2012-09-30 12:47:16 +08:00
|
|
|
&iscsi_tpg_param_MaxXmitDataSegmentLength.attr,
|
2011-07-23 14:43:04 +08:00
|
|
|
&iscsi_tpg_param_MaxBurstLength.attr,
|
|
|
|
&iscsi_tpg_param_FirstBurstLength.attr,
|
|
|
|
&iscsi_tpg_param_DefaultTime2Wait.attr,
|
|
|
|
&iscsi_tpg_param_DefaultTime2Retain.attr,
|
|
|
|
&iscsi_tpg_param_MaxOutstandingR2T.attr,
|
|
|
|
&iscsi_tpg_param_DataPDUInOrder.attr,
|
|
|
|
&iscsi_tpg_param_DataSequenceInOrder.attr,
|
|
|
|
&iscsi_tpg_param_ErrorRecoveryLevel.attr,
|
|
|
|
&iscsi_tpg_param_IFMarker.attr,
|
|
|
|
&iscsi_tpg_param_OFMarker.attr,
|
|
|
|
&iscsi_tpg_param_IFMarkInt.attr,
|
|
|
|
&iscsi_tpg_param_OFMarkInt.attr,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* End items for lio_target_tpg_param_cit */
|
|
|
|
|
|
|
|
/* Start items for lio_target_tpg_cit */
|
|
|
|
|
|
|
|
static ssize_t lio_target_tpg_show_enable(
|
|
|
|
struct se_portal_group *se_tpg,
|
|
|
|
char *page)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg = container_of(se_tpg,
|
|
|
|
struct iscsi_portal_group, tpg_se_tpg);
|
|
|
|
ssize_t len;
|
|
|
|
|
|
|
|
spin_lock(&tpg->tpg_state_lock);
|
|
|
|
len = sprintf(page, "%d\n",
|
|
|
|
(tpg->tpg_state == TPG_STATE_ACTIVE) ? 1 : 0);
|
|
|
|
spin_unlock(&tpg->tpg_state_lock);
|
|
|
|
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t lio_target_tpg_store_enable(
|
|
|
|
struct se_portal_group *se_tpg,
|
|
|
|
const char *page,
|
|
|
|
size_t count)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg = container_of(se_tpg,
|
|
|
|
struct iscsi_portal_group, tpg_se_tpg);
|
|
|
|
u32 op;
|
2013-07-03 23:35:11 +08:00
|
|
|
int ret;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-07-03 23:35:11 +08:00
|
|
|
ret = kstrtou32(page, 0, &op);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
2011-07-23 14:43:04 +08:00
|
|
|
if ((op != 1) && (op != 0)) {
|
|
|
|
pr_err("Illegal value for tpg_enable: %u\n", op);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = iscsit_get_tpg(tpg);
|
|
|
|
if (ret < 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (op) {
|
|
|
|
ret = iscsit_tpg_enable_portal_group(tpg);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* iscsit_tpg_disable_portal_group() assumes force=1
|
|
|
|
*/
|
|
|
|
ret = iscsit_tpg_disable_portal_group(tpg, 1);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
iscsit_put_tpg(tpg);
|
|
|
|
return count;
|
|
|
|
out:
|
|
|
|
iscsit_put_tpg(tpg);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
TF_TPG_BASE_ATTR(lio_target, enable, S_IRUGO | S_IWUSR);
|
|
|
|
|
2015-03-07 12:40:57 +08:00
|
|
|
static ssize_t lio_target_tpg_show_dynamic_sessions(
|
|
|
|
struct se_portal_group *se_tpg,
|
|
|
|
char *page)
|
|
|
|
{
|
|
|
|
return target_show_dynamic_sessions(se_tpg, page);
|
|
|
|
}
|
|
|
|
|
|
|
|
TF_TPG_BASE_ATTR_RO(lio_target, dynamic_sessions);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
static struct configfs_attribute *lio_target_tpg_attrs[] = {
|
|
|
|
&lio_target_tpg_enable.attr,
|
2015-03-07 12:40:57 +08:00
|
|
|
&lio_target_tpg_dynamic_sessions.attr,
|
2011-07-23 14:43:04 +08:00
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* End items for lio_target_tpg_cit */
|
|
|
|
|
|
|
|
/* Start items for lio_target_tiqn_cit */
|
|
|
|
|
2012-09-26 20:00:36 +08:00
|
|
|
static struct se_portal_group *lio_target_tiqn_addtpg(
|
2011-07-23 14:43:04 +08:00
|
|
|
struct se_wwn *wwn,
|
|
|
|
struct config_group *group,
|
|
|
|
const char *name)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg;
|
|
|
|
struct iscsi_tiqn *tiqn;
|
2013-07-03 23:35:11 +08:00
|
|
|
char *tpgt_str;
|
|
|
|
int ret;
|
|
|
|
u16 tpgt;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
tiqn = container_of(wwn, struct iscsi_tiqn, tiqn_wwn);
|
|
|
|
/*
|
|
|
|
* Only tpgt_# directory groups can be created below
|
|
|
|
* target/iscsi/iqn.superturodiskarry/
|
2013-07-03 23:35:11 +08:00
|
|
|
*/
|
2011-07-23 14:43:04 +08:00
|
|
|
tpgt_str = strstr(name, "tpgt_");
|
|
|
|
if (!tpgt_str) {
|
|
|
|
pr_err("Unable to locate \"tpgt_#\" directory"
|
|
|
|
" group\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
tpgt_str += 5; /* Skip ahead of "tpgt_" */
|
2013-07-03 23:35:11 +08:00
|
|
|
ret = kstrtou16(tpgt_str, 0, &tpgt);
|
|
|
|
if (ret)
|
|
|
|
return NULL;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
tpg = iscsit_alloc_portal_group(tiqn, tpgt);
|
|
|
|
if (!tpg)
|
|
|
|
return NULL;
|
|
|
|
|
2015-04-09 02:01:35 +08:00
|
|
|
ret = core_tpg_register(&iscsi_ops, wwn, &tpg->tpg_se_tpg,
|
|
|
|
tpg, TRANSPORT_TPG_TYPE_NORMAL);
|
2011-07-23 14:43:04 +08:00
|
|
|
if (ret < 0)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
ret = iscsit_tpg_add_portal_group(tiqn, tpg);
|
|
|
|
if (ret != 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
pr_debug("LIO_Target_ConfigFS: REGISTER -> %s\n", tiqn->tiqn);
|
|
|
|
pr_debug("LIO_Target_ConfigFS: REGISTER -> Allocated TPG: %s\n",
|
|
|
|
name);
|
|
|
|
return &tpg->tpg_se_tpg;
|
|
|
|
out:
|
|
|
|
core_tpg_deregister(&tpg->tpg_se_tpg);
|
|
|
|
kfree(tpg);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2012-09-26 20:00:36 +08:00
|
|
|
static void lio_target_tiqn_deltpg(struct se_portal_group *se_tpg)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg;
|
|
|
|
struct iscsi_tiqn *tiqn;
|
|
|
|
|
|
|
|
tpg = container_of(se_tpg, struct iscsi_portal_group, tpg_se_tpg);
|
|
|
|
tiqn = tpg->tpg_tiqn;
|
|
|
|
/*
|
|
|
|
* iscsit_tpg_del_portal_group() assumes force=1
|
|
|
|
*/
|
|
|
|
pr_debug("LIO_Target_ConfigFS: DEREGISTER -> Releasing TPG\n");
|
|
|
|
iscsit_tpg_del_portal_group(tiqn, tpg, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* End items for lio_target_tiqn_cit */
|
|
|
|
|
|
|
|
/* Start LIO-Target TIQN struct contig_item lio_target_cit */
|
|
|
|
|
|
|
|
static ssize_t lio_target_wwn_show_attr_lio_version(
|
|
|
|
struct target_fabric_configfs *tf,
|
|
|
|
char *page)
|
|
|
|
{
|
2013-09-06 06:29:12 +08:00
|
|
|
return sprintf(page, "Datera Inc. iSCSI Target "ISCSIT_VERSION"\n");
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
TF_WWN_ATTR_RO(lio_target, lio_version);
|
|
|
|
|
|
|
|
static struct configfs_attribute *lio_target_wwn_attrs[] = {
|
|
|
|
&lio_target_wwn_lio_version.attr,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
2012-09-26 20:00:36 +08:00
|
|
|
static struct se_wwn *lio_target_call_coreaddtiqn(
|
2011-07-23 14:43:04 +08:00
|
|
|
struct target_fabric_configfs *tf,
|
|
|
|
struct config_group *group,
|
|
|
|
const char *name)
|
|
|
|
{
|
|
|
|
struct config_group *stats_cg;
|
|
|
|
struct iscsi_tiqn *tiqn;
|
|
|
|
|
|
|
|
tiqn = iscsit_add_tiqn((unsigned char *)name);
|
|
|
|
if (IS_ERR(tiqn))
|
2011-08-02 05:58:18 +08:00
|
|
|
return ERR_CAST(tiqn);
|
2011-07-23 14:43:04 +08:00
|
|
|
/*
|
|
|
|
* Setup struct iscsi_wwn_stat_grps for se_wwn->fabric_stat_group.
|
|
|
|
*/
|
|
|
|
stats_cg = &tiqn->tiqn_wwn.fabric_stat_group;
|
|
|
|
|
2012-11-28 01:54:21 +08:00
|
|
|
stats_cg->default_groups = kmalloc(sizeof(struct config_group *) * 6,
|
2011-07-23 14:43:04 +08:00
|
|
|
GFP_KERNEL);
|
|
|
|
if (!stats_cg->default_groups) {
|
|
|
|
pr_err("Unable to allocate memory for"
|
|
|
|
" stats_cg->default_groups\n");
|
|
|
|
iscsit_del_tiqn(tiqn);
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
}
|
|
|
|
|
2013-10-10 02:05:57 +08:00
|
|
|
stats_cg->default_groups[0] = &tiqn->tiqn_stat_grps.iscsi_instance_group;
|
|
|
|
stats_cg->default_groups[1] = &tiqn->tiqn_stat_grps.iscsi_sess_err_group;
|
|
|
|
stats_cg->default_groups[2] = &tiqn->tiqn_stat_grps.iscsi_tgt_attr_group;
|
|
|
|
stats_cg->default_groups[3] = &tiqn->tiqn_stat_grps.iscsi_login_stats_group;
|
|
|
|
stats_cg->default_groups[4] = &tiqn->tiqn_stat_grps.iscsi_logout_stats_group;
|
2011-07-23 14:43:04 +08:00
|
|
|
stats_cg->default_groups[5] = NULL;
|
2013-10-10 02:05:57 +08:00
|
|
|
config_group_init_type_name(&tiqn->tiqn_stat_grps.iscsi_instance_group,
|
2011-07-23 14:43:04 +08:00
|
|
|
"iscsi_instance", &iscsi_stat_instance_cit);
|
2013-10-10 02:05:57 +08:00
|
|
|
config_group_init_type_name(&tiqn->tiqn_stat_grps.iscsi_sess_err_group,
|
2011-07-23 14:43:04 +08:00
|
|
|
"iscsi_sess_err", &iscsi_stat_sess_err_cit);
|
2013-10-10 02:05:57 +08:00
|
|
|
config_group_init_type_name(&tiqn->tiqn_stat_grps.iscsi_tgt_attr_group,
|
2011-07-23 14:43:04 +08:00
|
|
|
"iscsi_tgt_attr", &iscsi_stat_tgt_attr_cit);
|
2013-10-10 02:05:57 +08:00
|
|
|
config_group_init_type_name(&tiqn->tiqn_stat_grps.iscsi_login_stats_group,
|
2011-07-23 14:43:04 +08:00
|
|
|
"iscsi_login_stats", &iscsi_stat_login_cit);
|
2013-10-10 02:05:57 +08:00
|
|
|
config_group_init_type_name(&tiqn->tiqn_stat_grps.iscsi_logout_stats_group,
|
2011-07-23 14:43:04 +08:00
|
|
|
"iscsi_logout_stats", &iscsi_stat_logout_cit);
|
|
|
|
|
|
|
|
pr_debug("LIO_Target_ConfigFS: REGISTER -> %s\n", tiqn->tiqn);
|
|
|
|
pr_debug("LIO_Target_ConfigFS: REGISTER -> Allocated Node:"
|
|
|
|
" %s\n", name);
|
|
|
|
return &tiqn->tiqn_wwn;
|
|
|
|
}
|
|
|
|
|
2012-09-26 20:00:36 +08:00
|
|
|
static void lio_target_call_coredeltiqn(
|
2011-07-23 14:43:04 +08:00
|
|
|
struct se_wwn *wwn)
|
|
|
|
{
|
|
|
|
struct iscsi_tiqn *tiqn = container_of(wwn, struct iscsi_tiqn, tiqn_wwn);
|
|
|
|
struct config_item *df_item;
|
|
|
|
struct config_group *stats_cg;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
stats_cg = &tiqn->tiqn_wwn.fabric_stat_group;
|
|
|
|
for (i = 0; stats_cg->default_groups[i]; i++) {
|
|
|
|
df_item = &stats_cg->default_groups[i]->cg_item;
|
|
|
|
stats_cg->default_groups[i] = NULL;
|
|
|
|
config_item_put(df_item);
|
|
|
|
}
|
|
|
|
kfree(stats_cg->default_groups);
|
|
|
|
|
|
|
|
pr_debug("LIO_Target_ConfigFS: DEREGISTER -> %s\n",
|
|
|
|
tiqn->tiqn);
|
|
|
|
iscsit_del_tiqn(tiqn);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* End LIO-Target TIQN struct contig_lio_target_cit */
|
|
|
|
|
|
|
|
/* Start lio_target_discovery_auth_cit */
|
|
|
|
|
|
|
|
#define DEF_DISC_AUTH_STR(name, flags) \
|
|
|
|
__DEF_NACL_AUTH_STR(disc, name, flags) \
|
|
|
|
static ssize_t iscsi_disc_show_##name( \
|
|
|
|
struct target_fabric_configfs *tf, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
return __iscsi_disc_show_##name(&iscsit_global->discovery_acl, \
|
|
|
|
page); \
|
|
|
|
} \
|
|
|
|
static ssize_t iscsi_disc_store_##name( \
|
|
|
|
struct target_fabric_configfs *tf, \
|
|
|
|
const char *page, \
|
|
|
|
size_t count) \
|
|
|
|
{ \
|
|
|
|
return __iscsi_disc_store_##name(&iscsit_global->discovery_acl, \
|
|
|
|
page, count); \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define DEF_DISC_AUTH_INT(name) \
|
|
|
|
__DEF_NACL_AUTH_INT(disc, name) \
|
|
|
|
static ssize_t iscsi_disc_show_##name( \
|
|
|
|
struct target_fabric_configfs *tf, \
|
|
|
|
char *page) \
|
|
|
|
{ \
|
|
|
|
return __iscsi_disc_show_##name(&iscsit_global->discovery_acl, \
|
|
|
|
page); \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define DISC_AUTH_ATTR(_name, _mode) TF_DISC_ATTR(iscsi, _name, _mode)
|
|
|
|
#define DISC_AUTH_ATTR_RO(_name) TF_DISC_ATTR_RO(iscsi, _name)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* One-way authentication userid
|
|
|
|
*/
|
|
|
|
DEF_DISC_AUTH_STR(userid, NAF_USERID_SET);
|
|
|
|
DISC_AUTH_ATTR(userid, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* One-way authentication password
|
|
|
|
*/
|
|
|
|
DEF_DISC_AUTH_STR(password, NAF_PASSWORD_SET);
|
|
|
|
DISC_AUTH_ATTR(password, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Enforce mutual authentication
|
|
|
|
*/
|
|
|
|
DEF_DISC_AUTH_INT(authenticate_target);
|
|
|
|
DISC_AUTH_ATTR_RO(authenticate_target);
|
|
|
|
/*
|
|
|
|
* Mutual authentication userid
|
|
|
|
*/
|
|
|
|
DEF_DISC_AUTH_STR(userid_mutual, NAF_USERID_IN_SET);
|
|
|
|
DISC_AUTH_ATTR(userid_mutual, S_IRUGO | S_IWUSR);
|
|
|
|
/*
|
|
|
|
* Mutual authentication password
|
|
|
|
*/
|
|
|
|
DEF_DISC_AUTH_STR(password_mutual, NAF_PASSWORD_IN_SET);
|
|
|
|
DISC_AUTH_ATTR(password_mutual, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* enforce_discovery_auth
|
|
|
|
*/
|
|
|
|
static ssize_t iscsi_disc_show_enforce_discovery_auth(
|
|
|
|
struct target_fabric_configfs *tf,
|
|
|
|
char *page)
|
|
|
|
{
|
|
|
|
struct iscsi_node_auth *discovery_auth = &iscsit_global->discovery_acl.node_auth;
|
|
|
|
|
|
|
|
return sprintf(page, "%d\n", discovery_auth->enforce_discovery_auth);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t iscsi_disc_store_enforce_discovery_auth(
|
|
|
|
struct target_fabric_configfs *tf,
|
|
|
|
const char *page,
|
|
|
|
size_t count)
|
|
|
|
{
|
|
|
|
struct iscsi_param *param;
|
|
|
|
struct iscsi_portal_group *discovery_tpg = iscsit_global->discovery_tpg;
|
|
|
|
u32 op;
|
2013-07-03 23:35:11 +08:00
|
|
|
int err;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-07-03 23:35:11 +08:00
|
|
|
err = kstrtou32(page, 0, &op);
|
|
|
|
if (err)
|
|
|
|
return -EINVAL;
|
2011-07-23 14:43:04 +08:00
|
|
|
if ((op != 1) && (op != 0)) {
|
|
|
|
pr_err("Illegal value for enforce_discovery_auth:"
|
|
|
|
" %u\n", op);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!discovery_tpg) {
|
|
|
|
pr_err("iscsit_global->discovery_tpg is NULL\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
param = iscsi_find_param_from_key(AUTHMETHOD,
|
|
|
|
discovery_tpg->param_list);
|
|
|
|
if (!param)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (op) {
|
|
|
|
/*
|
|
|
|
* Reset the AuthMethod key to CHAP.
|
|
|
|
*/
|
|
|
|
if (iscsi_update_param_value(param, CHAP) < 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
discovery_tpg->tpg_attrib.authentication = 1;
|
|
|
|
iscsit_global->discovery_acl.node_auth.enforce_discovery_auth = 1;
|
|
|
|
pr_debug("LIO-CORE[0] Successfully enabled"
|
|
|
|
" authentication enforcement for iSCSI"
|
|
|
|
" Discovery TPG\n");
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Reset the AuthMethod key to CHAP,None
|
|
|
|
*/
|
|
|
|
if (iscsi_update_param_value(param, "CHAP,None") < 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
discovery_tpg->tpg_attrib.authentication = 0;
|
|
|
|
iscsit_global->discovery_acl.node_auth.enforce_discovery_auth = 0;
|
|
|
|
pr_debug("LIO-CORE[0] Successfully disabled"
|
|
|
|
" authentication enforcement for iSCSI"
|
|
|
|
" Discovery TPG\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
|
|
|
DISC_AUTH_ATTR(enforce_discovery_auth, S_IRUGO | S_IWUSR);
|
|
|
|
|
|
|
|
static struct configfs_attribute *lio_target_discovery_auth_attrs[] = {
|
|
|
|
&iscsi_disc_userid.attr,
|
|
|
|
&iscsi_disc_password.attr,
|
|
|
|
&iscsi_disc_authenticate_target.attr,
|
|
|
|
&iscsi_disc_userid_mutual.attr,
|
|
|
|
&iscsi_disc_password_mutual.attr,
|
|
|
|
&iscsi_disc_enforce_discovery_auth.attr,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* End lio_target_discovery_auth_cit */
|
|
|
|
|
|
|
|
/* Start functions for target_core_fabric_ops */
|
|
|
|
|
|
|
|
static char *iscsi_get_fabric_name(void)
|
|
|
|
{
|
|
|
|
return "iSCSI";
|
|
|
|
}
|
|
|
|
|
|
|
|
static u32 iscsi_get_task_tag(struct se_cmd *se_cmd)
|
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
|
|
|
|
|
2012-09-26 20:00:39 +08:00
|
|
|
/* only used for printks or comparism with ->ref_task_tag */
|
|
|
|
return (__force u32)cmd->init_task_tag;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int iscsi_get_cmd_state(struct se_cmd *se_cmd)
|
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
|
|
|
|
|
|
|
|
return cmd->i_state;
|
|
|
|
}
|
|
|
|
|
|
|
|
static u32 lio_sess_get_index(struct se_session *se_sess)
|
|
|
|
{
|
|
|
|
struct iscsi_session *sess = se_sess->fabric_sess_ptr;
|
|
|
|
|
|
|
|
return sess->session_index;
|
|
|
|
}
|
|
|
|
|
|
|
|
static u32 lio_sess_get_initiator_sid(
|
|
|
|
struct se_session *se_sess,
|
|
|
|
unsigned char *buf,
|
|
|
|
u32 size)
|
|
|
|
{
|
|
|
|
struct iscsi_session *sess = se_sess->fabric_sess_ptr;
|
|
|
|
/*
|
|
|
|
* iSCSI Initiator Session Identifier from RFC-3720.
|
|
|
|
*/
|
2015-01-15 19:40:56 +08:00
|
|
|
return snprintf(buf, size, "%6phN", sess->isid);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int lio_queue_data_in(struct se_cmd *se_cmd)
|
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
|
|
|
|
|
|
|
|
cmd->i_state = ISTATE_SEND_DATAIN;
|
2013-03-21 06:29:15 +08:00
|
|
|
cmd->conn->conn_transport->iscsit_queue_data_in(cmd->conn, cmd);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int lio_write_pending(struct se_cmd *se_cmd)
|
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
|
2013-03-07 14:18:24 +08:00
|
|
|
struct iscsi_conn *conn = cmd->conn;
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
if (!cmd->immediate_data && !cmd->unsolicited_data)
|
2013-03-07 14:18:24 +08:00
|
|
|
return conn->conn_transport->iscsit_get_dataout(conn, cmd, false);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int lio_write_pending_status(struct se_cmd *se_cmd)
|
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
spin_lock_bh(&cmd->istate_lock);
|
|
|
|
ret = !(cmd->cmd_flags & ICF_GOT_LAST_DATAOUT);
|
|
|
|
spin_unlock_bh(&cmd->istate_lock);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int lio_queue_status(struct se_cmd *se_cmd)
|
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
|
|
|
|
|
|
|
|
cmd->i_state = ISTATE_SEND_STATUS;
|
2013-11-13 09:54:56 +08:00
|
|
|
|
|
|
|
if (cmd->se_cmd.scsi_status || cmd->sense_reason) {
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, cmd->conn, cmd->i_state);
|
|
|
|
return 0;
|
|
|
|
}
|
2013-03-21 06:29:15 +08:00
|
|
|
cmd->conn->conn_transport->iscsit_queue_status(cmd->conn, cmd);
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-07-03 23:22:17 +08:00
|
|
|
static void lio_queue_tm_rsp(struct se_cmd *se_cmd)
|
2011-07-23 14:43:04 +08:00
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
|
|
|
|
|
|
|
|
cmd->i_state = ISTATE_SEND_TASKMGTRSP;
|
|
|
|
iscsit_add_cmd_to_response_queue(cmd, cmd->conn, cmd->i_state);
|
|
|
|
}
|
|
|
|
|
2014-03-23 05:55:56 +08:00
|
|
|
static void lio_aborted_task(struct se_cmd *se_cmd)
|
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
|
|
|
|
|
|
|
|
cmd->conn->conn_transport->iscsit_aborted_task(cmd->conn, cmd);
|
|
|
|
}
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
static char *lio_tpg_get_endpoint_wwn(struct se_portal_group *se_tpg)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
|
|
|
|
|
|
|
|
return &tpg->tpg_tiqn->tiqn[0];
|
|
|
|
}
|
|
|
|
|
|
|
|
static u16 lio_tpg_get_tag(struct se_portal_group *se_tpg)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
|
|
|
|
|
|
|
|
return tpg->tpgt;
|
|
|
|
}
|
|
|
|
|
|
|
|
static u32 lio_tpg_get_default_depth(struct se_portal_group *se_tpg)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
|
|
|
|
|
2013-10-10 02:05:57 +08:00
|
|
|
return tpg->tpg_attrib.default_cmdsn_depth;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int lio_tpg_check_demo_mode(struct se_portal_group *se_tpg)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
|
|
|
|
|
2013-10-10 02:05:57 +08:00
|
|
|
return tpg->tpg_attrib.generate_node_acls;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int lio_tpg_check_demo_mode_cache(struct se_portal_group *se_tpg)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
|
|
|
|
|
2013-10-10 02:05:57 +08:00
|
|
|
return tpg->tpg_attrib.cache_dynamic_acls;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int lio_tpg_check_demo_mode_write_protect(
|
|
|
|
struct se_portal_group *se_tpg)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
|
|
|
|
|
2013-10-10 02:05:57 +08:00
|
|
|
return tpg->tpg_attrib.demo_mode_write_protect;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int lio_tpg_check_prod_mode_write_protect(
|
|
|
|
struct se_portal_group *se_tpg)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
|
|
|
|
|
2013-10-10 02:05:57 +08:00
|
|
|
return tpg->tpg_attrib.prod_mode_write_protect;
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2015-03-30 10:36:16 +08:00
|
|
|
static int lio_tpg_check_prot_fabric_only(
|
|
|
|
struct se_portal_group *se_tpg)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
|
|
|
|
/*
|
|
|
|
* Only report fabric_prot_type if t10_pi has also been enabled
|
|
|
|
* for incoming ib_isert sessions.
|
|
|
|
*/
|
|
|
|
if (!tpg->tpg_attrib.t10_pi)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return tpg->tpg_attrib.fabric_prot_type;
|
|
|
|
}
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
static void lio_tpg_release_fabric_acl(
|
|
|
|
struct se_portal_group *se_tpg,
|
|
|
|
struct se_node_acl *se_acl)
|
|
|
|
{
|
|
|
|
struct iscsi_node_acl *acl = container_of(se_acl,
|
|
|
|
struct iscsi_node_acl, se_node_acl);
|
|
|
|
kfree(acl);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Called with spin_lock_bh(struct se_portal_group->session_lock) held..
|
|
|
|
*
|
|
|
|
* Also, this function calls iscsit_inc_session_usage_count() on the
|
|
|
|
* struct iscsi_session in question.
|
|
|
|
*/
|
|
|
|
static int lio_tpg_shutdown_session(struct se_session *se_sess)
|
|
|
|
{
|
|
|
|
struct iscsi_session *sess = se_sess->fabric_sess_ptr;
|
|
|
|
|
|
|
|
spin_lock(&sess->conn_lock);
|
|
|
|
if (atomic_read(&sess->session_fall_back_to_erl0) ||
|
|
|
|
atomic_read(&sess->session_logout) ||
|
|
|
|
(sess->time2retain_timer_flags & ISCSI_TF_EXPIRED)) {
|
|
|
|
spin_unlock(&sess->conn_lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
atomic_set(&sess->session_reinstatement, 1);
|
|
|
|
spin_unlock(&sess->conn_lock);
|
|
|
|
|
|
|
|
iscsit_stop_time2retain_timer(sess);
|
2012-02-27 17:43:32 +08:00
|
|
|
iscsit_stop_session(sess, 1, 1);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Calls iscsit_dec_session_usage_count() as inverse of
|
|
|
|
* lio_tpg_shutdown_session()
|
|
|
|
*/
|
|
|
|
static void lio_tpg_close_session(struct se_session *se_sess)
|
|
|
|
{
|
|
|
|
struct iscsi_session *sess = se_sess->fabric_sess_ptr;
|
|
|
|
/*
|
|
|
|
* If the iSCSI Session for the iSCSI Initiator Node exists,
|
|
|
|
* forcefully shutdown the iSCSI NEXUS.
|
|
|
|
*/
|
|
|
|
iscsit_close_session(sess);
|
|
|
|
}
|
|
|
|
|
|
|
|
static u32 lio_tpg_get_inst_index(struct se_portal_group *se_tpg)
|
|
|
|
{
|
|
|
|
struct iscsi_portal_group *tpg = se_tpg->se_tpg_fabric_ptr;
|
|
|
|
|
|
|
|
return tpg->tpg_tiqn->tiqn_index;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void lio_set_default_node_attributes(struct se_node_acl *se_acl)
|
|
|
|
{
|
|
|
|
struct iscsi_node_acl *acl = container_of(se_acl, struct iscsi_node_acl,
|
|
|
|
se_node_acl);
|
2013-11-21 03:57:18 +08:00
|
|
|
struct se_portal_group *se_tpg = se_acl->se_tpg;
|
|
|
|
struct iscsi_portal_group *tpg = container_of(se_tpg,
|
|
|
|
struct iscsi_portal_group, tpg_se_tpg);
|
2011-07-23 14:43:04 +08:00
|
|
|
|
2013-10-10 02:05:57 +08:00
|
|
|
acl->node_attrib.nacl = acl;
|
2013-11-21 03:57:18 +08:00
|
|
|
iscsit_set_default_node_attribues(acl, tpg);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2013-03-07 14:18:24 +08:00
|
|
|
static int lio_check_stop_free(struct se_cmd *se_cmd)
|
|
|
|
{
|
2015-04-27 19:52:36 +08:00
|
|
|
return target_put_sess_cmd(se_cmd);
|
2013-03-07 14:18:24 +08:00
|
|
|
}
|
|
|
|
|
2011-07-23 14:43:04 +08:00
|
|
|
static void lio_release_cmd(struct se_cmd *se_cmd)
|
|
|
|
{
|
|
|
|
struct iscsi_cmd *cmd = container_of(se_cmd, struct iscsi_cmd, se_cmd);
|
|
|
|
|
2013-03-07 14:09:17 +08:00
|
|
|
pr_debug("Entering lio_release_cmd for se_cmd: %p\n", se_cmd);
|
2013-08-18 05:27:56 +08:00
|
|
|
iscsit_release_cmd(cmd);
|
2011-07-23 14:43:04 +08:00
|
|
|
}
|
|
|
|
|
2015-04-09 02:01:35 +08:00
|
|
|
const struct target_core_fabric_ops iscsi_ops = {
|
|
|
|
.module = THIS_MODULE,
|
|
|
|
.name = "iscsi",
|
|
|
|
.get_fabric_name = iscsi_get_fabric_name,
|
|
|
|
.get_fabric_proto_ident = iscsi_get_fabric_proto_ident,
|
|
|
|
.tpg_get_wwn = lio_tpg_get_endpoint_wwn,
|
|
|
|
.tpg_get_tag = lio_tpg_get_tag,
|
|
|
|
.tpg_get_default_depth = lio_tpg_get_default_depth,
|
|
|
|
.tpg_get_pr_transport_id = iscsi_get_pr_transport_id,
|
|
|
|
.tpg_get_pr_transport_id_len = iscsi_get_pr_transport_id_len,
|
|
|
|
.tpg_parse_pr_out_transport_id = iscsi_parse_pr_out_transport_id,
|
|
|
|
.tpg_check_demo_mode = lio_tpg_check_demo_mode,
|
|
|
|
.tpg_check_demo_mode_cache = lio_tpg_check_demo_mode_cache,
|
|
|
|
.tpg_check_demo_mode_write_protect =
|
|
|
|
lio_tpg_check_demo_mode_write_protect,
|
|
|
|
.tpg_check_prod_mode_write_protect =
|
|
|
|
lio_tpg_check_prod_mode_write_protect,
|
|
|
|
.tpg_check_prot_fabric_only = &lio_tpg_check_prot_fabric_only,
|
|
|
|
.tpg_alloc_fabric_acl = lio_tpg_alloc_fabric_acl,
|
|
|
|
.tpg_release_fabric_acl = lio_tpg_release_fabric_acl,
|
|
|
|
.tpg_get_inst_index = lio_tpg_get_inst_index,
|
|
|
|
.check_stop_free = lio_check_stop_free,
|
|
|
|
.release_cmd = lio_release_cmd,
|
|
|
|
.shutdown_session = lio_tpg_shutdown_session,
|
|
|
|
.close_session = lio_tpg_close_session,
|
|
|
|
.sess_get_index = lio_sess_get_index,
|
|
|
|
.sess_get_initiator_sid = lio_sess_get_initiator_sid,
|
|
|
|
.write_pending = lio_write_pending,
|
|
|
|
.write_pending_status = lio_write_pending_status,
|
|
|
|
.set_default_node_attributes = lio_set_default_node_attributes,
|
|
|
|
.get_task_tag = iscsi_get_task_tag,
|
|
|
|
.get_cmd_state = iscsi_get_cmd_state,
|
|
|
|
.queue_data_in = lio_queue_data_in,
|
|
|
|
.queue_status = lio_queue_status,
|
|
|
|
.queue_tm_rsp = lio_queue_tm_rsp,
|
|
|
|
.aborted_task = lio_aborted_task,
|
|
|
|
.fabric_make_wwn = lio_target_call_coreaddtiqn,
|
|
|
|
.fabric_drop_wwn = lio_target_call_coredeltiqn,
|
|
|
|
.fabric_make_tpg = lio_target_tiqn_addtpg,
|
|
|
|
.fabric_drop_tpg = lio_target_tiqn_deltpg,
|
|
|
|
.fabric_make_np = lio_target_call_addnptotpg,
|
|
|
|
.fabric_drop_np = lio_target_call_delnpfromtpg,
|
|
|
|
.fabric_make_nodeacl = lio_target_make_nodeacl,
|
|
|
|
.fabric_drop_nodeacl = lio_target_drop_nodeacl,
|
|
|
|
|
|
|
|
.tfc_discovery_attrs = lio_target_discovery_auth_attrs,
|
|
|
|
.tfc_wwn_attrs = lio_target_wwn_attrs,
|
|
|
|
.tfc_tpg_base_attrs = lio_target_tpg_attrs,
|
|
|
|
.tfc_tpg_attrib_attrs = lio_target_tpg_attrib_attrs,
|
|
|
|
.tfc_tpg_auth_attrs = lio_target_tpg_auth_attrs,
|
|
|
|
.tfc_tpg_param_attrs = lio_target_tpg_param_attrs,
|
|
|
|
.tfc_tpg_np_base_attrs = lio_target_portal_attrs,
|
|
|
|
.tfc_tpg_nacl_base_attrs = lio_target_initiator_attrs,
|
|
|
|
.tfc_tpg_nacl_attrib_attrs = lio_target_nacl_attrib_attrs,
|
|
|
|
.tfc_tpg_nacl_auth_attrs = lio_target_nacl_auth_attrs,
|
|
|
|
.tfc_tpg_nacl_param_attrs = lio_target_nacl_param_attrs,
|
|
|
|
};
|