linux/drivers/target/iscsi/iscsi_target_tpg.c
<<
>>
Prefs
   1/*******************************************************************************
   2 * This file contains iSCSI Target Portal Group related functions.
   3 *
   4 * (c) Copyright 2007-2013 Datera, Inc.
   5 *
   6 * Author: Nicholas A. Bellinger <nab@linux-iscsi.org>
   7 *
   8 * This program is free software; you can redistribute it and/or modify
   9 * it under the terms of the GNU General Public License as published by
  10 * the Free Software Foundation; either version 2 of the License, or
  11 * (at your option) any later version.
  12 *
  13 * This program is distributed in the hope that it will be useful,
  14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  16 * GNU General Public License for more details.
  17 ******************************************************************************/
  18
  19#include <linux/slab.h>
  20#include <target/target_core_base.h>
  21#include <target/target_core_fabric.h>
  22#include <target/iscsi/iscsi_target_core.h>
  23#include "iscsi_target_erl0.h"
  24#include "iscsi_target_login.h"
  25#include "iscsi_target_nodeattrib.h"
  26#include "iscsi_target_tpg.h"
  27#include "iscsi_target_util.h"
  28#include "iscsi_target.h"
  29#include "iscsi_target_parameters.h"
  30
  31#include <target/iscsi/iscsi_transport.h>
  32
  33struct iscsi_portal_group *iscsit_alloc_portal_group(struct iscsi_tiqn *tiqn, u16 tpgt)
  34{
  35        struct iscsi_portal_group *tpg;
  36
  37        tpg = kzalloc(sizeof(struct iscsi_portal_group), GFP_KERNEL);
  38        if (!tpg) {
  39                pr_err("Unable to allocate struct iscsi_portal_group\n");
  40                return NULL;
  41        }
  42
  43        tpg->tpgt = tpgt;
  44        tpg->tpg_state = TPG_STATE_FREE;
  45        tpg->tpg_tiqn = tiqn;
  46        INIT_LIST_HEAD(&tpg->tpg_gnp_list);
  47        INIT_LIST_HEAD(&tpg->tpg_list);
  48        mutex_init(&tpg->tpg_access_lock);
  49        sema_init(&tpg->np_login_sem, 1);
  50        spin_lock_init(&tpg->tpg_state_lock);
  51        spin_lock_init(&tpg->tpg_np_lock);
  52
  53        return tpg;
  54}
  55
  56static void iscsit_set_default_tpg_attribs(struct iscsi_portal_group *);
  57
  58int iscsit_load_discovery_tpg(void)
  59{
  60        struct iscsi_param *param;
  61        struct iscsi_portal_group *tpg;
  62        int ret;
  63
  64        tpg = iscsit_alloc_portal_group(NULL, 1);
  65        if (!tpg) {
  66                pr_err("Unable to allocate struct iscsi_portal_group\n");
  67                return -1;
  68        }
  69        /*
  70         * Save iscsi_ops pointer for special case discovery TPG that
  71         * doesn't exist as se_wwn->wwn_group within configfs.
  72         */
  73        tpg->tpg_se_tpg.se_tpg_tfo = &iscsi_ops;
  74        ret = core_tpg_register(NULL, &tpg->tpg_se_tpg, -1);
  75        if (ret < 0) {
  76                kfree(tpg);
  77                return -1;
  78        }
  79
  80        tpg->sid = 1; /* First Assigned LIO Session ID */
  81        iscsit_set_default_tpg_attribs(tpg);
  82
  83        if (iscsi_create_default_params(&tpg->param_list) < 0)
  84                goto out;
  85        /*
  86         * By default we disable authentication for discovery sessions,
  87         * this can be changed with:
  88         *
  89         * /sys/kernel/config/target/iscsi/discovery_auth/enforce_discovery_auth
  90         */
  91        param = iscsi_find_param_from_key(AUTHMETHOD, tpg->param_list);
  92        if (!param)
  93                goto free_pl_out;
  94
  95        if (iscsi_update_param_value(param, "CHAP,None") < 0)
  96                goto free_pl_out;
  97
  98        tpg->tpg_attrib.authentication = 0;
  99
 100        spin_lock(&tpg->tpg_state_lock);
 101        tpg->tpg_state  = TPG_STATE_ACTIVE;
 102        spin_unlock(&tpg->tpg_state_lock);
 103
 104        iscsit_global->discovery_tpg = tpg;
 105        pr_debug("CORE[0] - Allocated Discovery TPG\n");
 106
 107        return 0;
 108free_pl_out:
 109        iscsi_release_param_list(tpg->param_list);
 110out:
 111        if (tpg->sid == 1)
 112                core_tpg_deregister(&tpg->tpg_se_tpg);
 113        kfree(tpg);
 114        return -1;
 115}
 116
 117void iscsit_release_discovery_tpg(void)
 118{
 119        struct iscsi_portal_group *tpg = iscsit_global->discovery_tpg;
 120
 121        if (!tpg)
 122                return;
 123
 124        iscsi_release_param_list(tpg->param_list);
 125        core_tpg_deregister(&tpg->tpg_se_tpg);
 126
 127        kfree(tpg);
 128        iscsit_global->discovery_tpg = NULL;
 129}
 130
 131struct iscsi_portal_group *iscsit_get_tpg_from_np(
 132        struct iscsi_tiqn *tiqn,
 133        struct iscsi_np *np,
 134        struct iscsi_tpg_np **tpg_np_out)
 135{
 136        struct iscsi_portal_group *tpg = NULL;
 137        struct iscsi_tpg_np *tpg_np;
 138
 139        spin_lock(&tiqn->tiqn_tpg_lock);
 140        list_for_each_entry(tpg, &tiqn->tiqn_tpg_list, tpg_list) {
 141
 142                spin_lock(&tpg->tpg_state_lock);
 143                if (tpg->tpg_state != TPG_STATE_ACTIVE) {
 144                        spin_unlock(&tpg->tpg_state_lock);
 145                        continue;
 146                }
 147                spin_unlock(&tpg->tpg_state_lock);
 148
 149                spin_lock(&tpg->tpg_np_lock);
 150                list_for_each_entry(tpg_np, &tpg->tpg_gnp_list, tpg_np_list) {
 151                        if (tpg_np->tpg_np == np) {
 152                                *tpg_np_out = tpg_np;
 153                                kref_get(&tpg_np->tpg_np_kref);
 154                                spin_unlock(&tpg->tpg_np_lock);
 155                                spin_unlock(&tiqn->tiqn_tpg_lock);
 156                                return tpg;
 157                        }
 158                }
 159                spin_unlock(&tpg->tpg_np_lock);
 160        }
 161        spin_unlock(&tiqn->tiqn_tpg_lock);
 162
 163        return NULL;
 164}
 165
 166int iscsit_get_tpg(
 167        struct iscsi_portal_group *tpg)
 168{
 169        return mutex_lock_interruptible(&tpg->tpg_access_lock);
 170}
 171
 172void iscsit_put_tpg(struct iscsi_portal_group *tpg)
 173{
 174        mutex_unlock(&tpg->tpg_access_lock);
 175}
 176
 177static void iscsit_clear_tpg_np_login_thread(
 178        struct iscsi_tpg_np *tpg_np,
 179        struct iscsi_portal_group *tpg,
 180        bool shutdown)
 181{
 182        if (!tpg_np->tpg_np) {
 183                pr_err("struct iscsi_tpg_np->tpg_np is NULL!\n");
 184                return;
 185        }
 186
 187        if (shutdown)
 188                tpg_np->tpg_np->enabled = false;
 189        iscsit_reset_np_thread(tpg_np->tpg_np, tpg_np, tpg, shutdown);
 190}
 191
 192static void iscsit_clear_tpg_np_login_threads(
 193        struct iscsi_portal_group *tpg,
 194        bool shutdown)
 195{
 196        struct iscsi_tpg_np *tpg_np;
 197
 198        spin_lock(&tpg->tpg_np_lock);
 199        list_for_each_entry(tpg_np, &tpg->tpg_gnp_list, tpg_np_list) {
 200                if (!tpg_np->tpg_np) {
 201                        pr_err("struct iscsi_tpg_np->tpg_np is NULL!\n");
 202                        continue;
 203                }
 204                spin_unlock(&tpg->tpg_np_lock);
 205                iscsit_clear_tpg_np_login_thread(tpg_np, tpg, shutdown);
 206                spin_lock(&tpg->tpg_np_lock);
 207        }
 208        spin_unlock(&tpg->tpg_np_lock);
 209}
 210
 211void iscsit_tpg_dump_params(struct iscsi_portal_group *tpg)
 212{
 213        iscsi_print_params(tpg->param_list);
 214}
 215
 216static void iscsit_set_default_tpg_attribs(struct iscsi_portal_group *tpg)
 217{
 218        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 219
 220        a->authentication = TA_AUTHENTICATION;
 221        a->login_timeout = TA_LOGIN_TIMEOUT;
 222        a->netif_timeout = TA_NETIF_TIMEOUT;
 223        a->default_cmdsn_depth = TA_DEFAULT_CMDSN_DEPTH;
 224        a->generate_node_acls = TA_GENERATE_NODE_ACLS;
 225        a->cache_dynamic_acls = TA_CACHE_DYNAMIC_ACLS;
 226        a->demo_mode_write_protect = TA_DEMO_MODE_WRITE_PROTECT;
 227        a->prod_mode_write_protect = TA_PROD_MODE_WRITE_PROTECT;
 228        a->demo_mode_discovery = TA_DEMO_MODE_DISCOVERY;
 229        a->default_erl = TA_DEFAULT_ERL;
 230        a->t10_pi = TA_DEFAULT_T10_PI;
 231        a->fabric_prot_type = TA_DEFAULT_FABRIC_PROT_TYPE;
 232        a->tpg_enabled_sendtargets = TA_DEFAULT_TPG_ENABLED_SENDTARGETS;
 233        a->login_keys_workaround = TA_DEFAULT_LOGIN_KEYS_WORKAROUND;
 234}
 235
 236int iscsit_tpg_add_portal_group(struct iscsi_tiqn *tiqn, struct iscsi_portal_group *tpg)
 237{
 238        if (tpg->tpg_state != TPG_STATE_FREE) {
 239                pr_err("Unable to add iSCSI Target Portal Group: %d"
 240                        " while not in TPG_STATE_FREE state.\n", tpg->tpgt);
 241                return -EEXIST;
 242        }
 243        iscsit_set_default_tpg_attribs(tpg);
 244
 245        if (iscsi_create_default_params(&tpg->param_list) < 0)
 246                goto err_out;
 247
 248        tpg->tpg_attrib.tpg = tpg;
 249
 250        spin_lock(&tpg->tpg_state_lock);
 251        tpg->tpg_state  = TPG_STATE_INACTIVE;
 252        spin_unlock(&tpg->tpg_state_lock);
 253
 254        spin_lock(&tiqn->tiqn_tpg_lock);
 255        list_add_tail(&tpg->tpg_list, &tiqn->tiqn_tpg_list);
 256        tiqn->tiqn_ntpgs++;
 257        pr_debug("CORE[%s]_TPG[%hu] - Added iSCSI Target Portal Group\n",
 258                        tiqn->tiqn, tpg->tpgt);
 259        spin_unlock(&tiqn->tiqn_tpg_lock);
 260
 261        return 0;
 262err_out:
 263        if (tpg->param_list) {
 264                iscsi_release_param_list(tpg->param_list);
 265                tpg->param_list = NULL;
 266        }
 267        return -ENOMEM;
 268}
 269
 270int iscsit_tpg_del_portal_group(
 271        struct iscsi_tiqn *tiqn,
 272        struct iscsi_portal_group *tpg,
 273        int force)
 274{
 275        u8 old_state = tpg->tpg_state;
 276
 277        spin_lock(&tpg->tpg_state_lock);
 278        tpg->tpg_state = TPG_STATE_INACTIVE;
 279        spin_unlock(&tpg->tpg_state_lock);
 280
 281        if (iscsit_release_sessions_for_tpg(tpg, force) < 0) {
 282                pr_err("Unable to delete iSCSI Target Portal Group:"
 283                        " %hu while active sessions exist, and force=0\n",
 284                        tpg->tpgt);
 285                tpg->tpg_state = old_state;
 286                return -EPERM;
 287        }
 288
 289        if (tpg->param_list) {
 290                iscsi_release_param_list(tpg->param_list);
 291                tpg->param_list = NULL;
 292        }
 293
 294        core_tpg_deregister(&tpg->tpg_se_tpg);
 295
 296        spin_lock(&tpg->tpg_state_lock);
 297        tpg->tpg_state = TPG_STATE_FREE;
 298        spin_unlock(&tpg->tpg_state_lock);
 299
 300        spin_lock(&tiqn->tiqn_tpg_lock);
 301        tiqn->tiqn_ntpgs--;
 302        list_del(&tpg->tpg_list);
 303        spin_unlock(&tiqn->tiqn_tpg_lock);
 304
 305        pr_debug("CORE[%s]_TPG[%hu] - Deleted iSCSI Target Portal Group\n",
 306                        tiqn->tiqn, tpg->tpgt);
 307
 308        kfree(tpg);
 309        return 0;
 310}
 311
 312int iscsit_tpg_enable_portal_group(struct iscsi_portal_group *tpg)
 313{
 314        struct iscsi_param *param;
 315        struct iscsi_tiqn *tiqn = tpg->tpg_tiqn;
 316        int ret;
 317
 318        if (tpg->tpg_state == TPG_STATE_ACTIVE) {
 319                pr_err("iSCSI target portal group: %hu is already"
 320                        " active, ignoring request.\n", tpg->tpgt);
 321                return -EINVAL;
 322        }
 323        /*
 324         * Make sure that AuthMethod does not contain None as an option
 325         * unless explictly disabled.  Set the default to CHAP if authentication
 326         * is enforced (as per default), and remove the NONE option.
 327         */
 328        param = iscsi_find_param_from_key(AUTHMETHOD, tpg->param_list);
 329        if (!param)
 330                return -EINVAL;
 331
 332        if (tpg->tpg_attrib.authentication) {
 333                if (!strcmp(param->value, NONE)) {
 334                        ret = iscsi_update_param_value(param, CHAP);
 335                        if (ret)
 336                                goto err;
 337                }
 338
 339                ret = iscsit_ta_authentication(tpg, 1);
 340                if (ret < 0)
 341                        goto err;
 342        }
 343
 344        spin_lock(&tpg->tpg_state_lock);
 345        tpg->tpg_state = TPG_STATE_ACTIVE;
 346        spin_unlock(&tpg->tpg_state_lock);
 347
 348        spin_lock(&tiqn->tiqn_tpg_lock);
 349        tiqn->tiqn_active_tpgs++;
 350        pr_debug("iSCSI_TPG[%hu] - Enabled iSCSI Target Portal Group\n",
 351                        tpg->tpgt);
 352        spin_unlock(&tiqn->tiqn_tpg_lock);
 353
 354        return 0;
 355
 356err:
 357        return ret;
 358}
 359
 360int iscsit_tpg_disable_portal_group(struct iscsi_portal_group *tpg, int force)
 361{
 362        struct iscsi_tiqn *tiqn;
 363        u8 old_state = tpg->tpg_state;
 364
 365        spin_lock(&tpg->tpg_state_lock);
 366        if (tpg->tpg_state == TPG_STATE_INACTIVE) {
 367                pr_err("iSCSI Target Portal Group: %hu is already"
 368                        " inactive, ignoring request.\n", tpg->tpgt);
 369                spin_unlock(&tpg->tpg_state_lock);
 370                return -EINVAL;
 371        }
 372        tpg->tpg_state = TPG_STATE_INACTIVE;
 373        spin_unlock(&tpg->tpg_state_lock);
 374
 375        iscsit_clear_tpg_np_login_threads(tpg, false);
 376
 377        if (iscsit_release_sessions_for_tpg(tpg, force) < 0) {
 378                spin_lock(&tpg->tpg_state_lock);
 379                tpg->tpg_state = old_state;
 380                spin_unlock(&tpg->tpg_state_lock);
 381                pr_err("Unable to disable iSCSI Target Portal Group:"
 382                        " %hu while active sessions exist, and force=0\n",
 383                        tpg->tpgt);
 384                return -EPERM;
 385        }
 386
 387        tiqn = tpg->tpg_tiqn;
 388        if (!tiqn || (tpg == iscsit_global->discovery_tpg))
 389                return 0;
 390
 391        spin_lock(&tiqn->tiqn_tpg_lock);
 392        tiqn->tiqn_active_tpgs--;
 393        pr_debug("iSCSI_TPG[%hu] - Disabled iSCSI Target Portal Group\n",
 394                        tpg->tpgt);
 395        spin_unlock(&tiqn->tiqn_tpg_lock);
 396
 397        return 0;
 398}
 399
 400struct iscsi_node_attrib *iscsit_tpg_get_node_attrib(
 401        struct iscsi_session *sess)
 402{
 403        struct se_session *se_sess = sess->se_sess;
 404        struct se_node_acl *se_nacl = se_sess->se_node_acl;
 405        struct iscsi_node_acl *acl = container_of(se_nacl, struct iscsi_node_acl,
 406                                        se_node_acl);
 407
 408        return &acl->node_attrib;
 409}
 410
 411struct iscsi_tpg_np *iscsit_tpg_locate_child_np(
 412        struct iscsi_tpg_np *tpg_np,
 413        int network_transport)
 414{
 415        struct iscsi_tpg_np *tpg_np_child, *tpg_np_child_tmp;
 416
 417        spin_lock(&tpg_np->tpg_np_parent_lock);
 418        list_for_each_entry_safe(tpg_np_child, tpg_np_child_tmp,
 419                        &tpg_np->tpg_np_parent_list, tpg_np_child_list) {
 420                if (tpg_np_child->tpg_np->np_network_transport ==
 421                                network_transport) {
 422                        spin_unlock(&tpg_np->tpg_np_parent_lock);
 423                        return tpg_np_child;
 424                }
 425        }
 426        spin_unlock(&tpg_np->tpg_np_parent_lock);
 427
 428        return NULL;
 429}
 430
 431static bool iscsit_tpg_check_network_portal(
 432        struct iscsi_tiqn *tiqn,
 433        struct sockaddr_storage *sockaddr,
 434        int network_transport)
 435{
 436        struct iscsi_portal_group *tpg;
 437        struct iscsi_tpg_np *tpg_np;
 438        struct iscsi_np *np;
 439        bool match = false;
 440
 441        spin_lock(&tiqn->tiqn_tpg_lock);
 442        list_for_each_entry(tpg, &tiqn->tiqn_tpg_list, tpg_list) {
 443
 444                spin_lock(&tpg->tpg_np_lock);
 445                list_for_each_entry(tpg_np, &tpg->tpg_gnp_list, tpg_np_list) {
 446                        np = tpg_np->tpg_np;
 447
 448                        match = iscsit_check_np_match(sockaddr, np,
 449                                                network_transport);
 450                        if (match)
 451                                break;
 452                }
 453                spin_unlock(&tpg->tpg_np_lock);
 454        }
 455        spin_unlock(&tiqn->tiqn_tpg_lock);
 456
 457        return match;
 458}
 459
 460struct iscsi_tpg_np *iscsit_tpg_add_network_portal(
 461        struct iscsi_portal_group *tpg,
 462        struct sockaddr_storage *sockaddr,
 463        struct iscsi_tpg_np *tpg_np_parent,
 464        int network_transport)
 465{
 466        struct iscsi_np *np;
 467        struct iscsi_tpg_np *tpg_np;
 468
 469        if (!tpg_np_parent) {
 470                if (iscsit_tpg_check_network_portal(tpg->tpg_tiqn, sockaddr,
 471                                network_transport)) {
 472                        pr_err("Network Portal: %pISc already exists on a"
 473                                " different TPG on %s\n", sockaddr,
 474                                tpg->tpg_tiqn->tiqn);
 475                        return ERR_PTR(-EEXIST);
 476                }
 477        }
 478
 479        tpg_np = kzalloc(sizeof(struct iscsi_tpg_np), GFP_KERNEL);
 480        if (!tpg_np) {
 481                pr_err("Unable to allocate memory for"
 482                                " struct iscsi_tpg_np.\n");
 483                return ERR_PTR(-ENOMEM);
 484        }
 485
 486        np = iscsit_add_np(sockaddr, network_transport);
 487        if (IS_ERR(np)) {
 488                kfree(tpg_np);
 489                return ERR_CAST(np);
 490        }
 491
 492        INIT_LIST_HEAD(&tpg_np->tpg_np_list);
 493        INIT_LIST_HEAD(&tpg_np->tpg_np_child_list);
 494        INIT_LIST_HEAD(&tpg_np->tpg_np_parent_list);
 495        spin_lock_init(&tpg_np->tpg_np_parent_lock);
 496        init_completion(&tpg_np->tpg_np_comp);
 497        kref_init(&tpg_np->tpg_np_kref);
 498        tpg_np->tpg_np          = np;
 499        tpg_np->tpg             = tpg;
 500
 501        spin_lock(&tpg->tpg_np_lock);
 502        list_add_tail(&tpg_np->tpg_np_list, &tpg->tpg_gnp_list);
 503        tpg->num_tpg_nps++;
 504        if (tpg->tpg_tiqn)
 505                tpg->tpg_tiqn->tiqn_num_tpg_nps++;
 506        spin_unlock(&tpg->tpg_np_lock);
 507
 508        if (tpg_np_parent) {
 509                tpg_np->tpg_np_parent = tpg_np_parent;
 510                spin_lock(&tpg_np_parent->tpg_np_parent_lock);
 511                list_add_tail(&tpg_np->tpg_np_child_list,
 512                        &tpg_np_parent->tpg_np_parent_list);
 513                spin_unlock(&tpg_np_parent->tpg_np_parent_lock);
 514        }
 515
 516        pr_debug("CORE[%s] - Added Network Portal: %pISpc,%hu on %s\n",
 517                tpg->tpg_tiqn->tiqn, &np->np_sockaddr, tpg->tpgt,
 518                np->np_transport->name);
 519
 520        return tpg_np;
 521}
 522
 523static int iscsit_tpg_release_np(
 524        struct iscsi_tpg_np *tpg_np,
 525        struct iscsi_portal_group *tpg,
 526        struct iscsi_np *np)
 527{
 528        iscsit_clear_tpg_np_login_thread(tpg_np, tpg, true);
 529
 530        pr_debug("CORE[%s] - Removed Network Portal: %pISpc,%hu on %s\n",
 531                tpg->tpg_tiqn->tiqn, &np->np_sockaddr, tpg->tpgt,
 532                np->np_transport->name);
 533
 534        tpg_np->tpg_np = NULL;
 535        tpg_np->tpg = NULL;
 536        kfree(tpg_np);
 537        /*
 538         * iscsit_del_np() will shutdown struct iscsi_np when last TPG reference is released.
 539         */
 540        return iscsit_del_np(np);
 541}
 542
 543int iscsit_tpg_del_network_portal(
 544        struct iscsi_portal_group *tpg,
 545        struct iscsi_tpg_np *tpg_np)
 546{
 547        struct iscsi_np *np;
 548        struct iscsi_tpg_np *tpg_np_child, *tpg_np_child_tmp;
 549        int ret = 0;
 550
 551        np = tpg_np->tpg_np;
 552        if (!np) {
 553                pr_err("Unable to locate struct iscsi_np from"
 554                                " struct iscsi_tpg_np\n");
 555                return -EINVAL;
 556        }
 557
 558        if (!tpg_np->tpg_np_parent) {
 559                /*
 560                 * We are the parent tpg network portal.  Release all of the
 561                 * child tpg_np's (eg: the non ISCSI_TCP ones) on our parent
 562                 * list first.
 563                 */
 564                list_for_each_entry_safe(tpg_np_child, tpg_np_child_tmp,
 565                                &tpg_np->tpg_np_parent_list,
 566                                tpg_np_child_list) {
 567                        ret = iscsit_tpg_del_network_portal(tpg, tpg_np_child);
 568                        if (ret < 0)
 569                                pr_err("iscsit_tpg_del_network_portal()"
 570                                        " failed: %d\n", ret);
 571                }
 572        } else {
 573                /*
 574                 * We are not the parent ISCSI_TCP tpg network portal.  Release
 575                 * our own network portals from the child list.
 576                 */
 577                spin_lock(&tpg_np->tpg_np_parent->tpg_np_parent_lock);
 578                list_del(&tpg_np->tpg_np_child_list);
 579                spin_unlock(&tpg_np->tpg_np_parent->tpg_np_parent_lock);
 580        }
 581
 582        spin_lock(&tpg->tpg_np_lock);
 583        list_del(&tpg_np->tpg_np_list);
 584        tpg->num_tpg_nps--;
 585        if (tpg->tpg_tiqn)
 586                tpg->tpg_tiqn->tiqn_num_tpg_nps--;
 587        spin_unlock(&tpg->tpg_np_lock);
 588
 589        return iscsit_tpg_release_np(tpg_np, tpg, np);
 590}
 591
 592int iscsit_ta_authentication(struct iscsi_portal_group *tpg, u32 authentication)
 593{
 594        unsigned char buf1[256], buf2[256], *none = NULL;
 595        int len;
 596        struct iscsi_param *param;
 597        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 598
 599        if ((authentication != 1) && (authentication != 0)) {
 600                pr_err("Illegal value for authentication parameter:"
 601                        " %u, ignoring request.\n", authentication);
 602                return -EINVAL;
 603        }
 604
 605        memset(buf1, 0, sizeof(buf1));
 606        memset(buf2, 0, sizeof(buf2));
 607
 608        param = iscsi_find_param_from_key(AUTHMETHOD, tpg->param_list);
 609        if (!param)
 610                return -EINVAL;
 611
 612        if (authentication) {
 613                snprintf(buf1, sizeof(buf1), "%s", param->value);
 614                none = strstr(buf1, NONE);
 615                if (!none)
 616                        goto out;
 617                if (!strncmp(none + 4, ",", 1)) {
 618                        if (!strcmp(buf1, none))
 619                                sprintf(buf2, "%s", none+5);
 620                        else {
 621                                none--;
 622                                *none = '\0';
 623                                len = sprintf(buf2, "%s", buf1);
 624                                none += 5;
 625                                sprintf(buf2 + len, "%s", none);
 626                        }
 627                } else {
 628                        none--;
 629                        *none = '\0';
 630                        sprintf(buf2, "%s", buf1);
 631                }
 632                if (iscsi_update_param_value(param, buf2) < 0)
 633                        return -EINVAL;
 634        } else {
 635                snprintf(buf1, sizeof(buf1), "%s", param->value);
 636                none = strstr(buf1, NONE);
 637                if (none)
 638                        goto out;
 639                strncat(buf1, ",", strlen(","));
 640                strncat(buf1, NONE, strlen(NONE));
 641                if (iscsi_update_param_value(param, buf1) < 0)
 642                        return -EINVAL;
 643        }
 644
 645out:
 646        a->authentication = authentication;
 647        pr_debug("%s iSCSI Authentication Methods for TPG: %hu.\n",
 648                a->authentication ? "Enforcing" : "Disabling", tpg->tpgt);
 649
 650        return 0;
 651}
 652
 653int iscsit_ta_login_timeout(
 654        struct iscsi_portal_group *tpg,
 655        u32 login_timeout)
 656{
 657        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 658
 659        if (login_timeout > TA_LOGIN_TIMEOUT_MAX) {
 660                pr_err("Requested Login Timeout %u larger than maximum"
 661                        " %u\n", login_timeout, TA_LOGIN_TIMEOUT_MAX);
 662                return -EINVAL;
 663        } else if (login_timeout < TA_LOGIN_TIMEOUT_MIN) {
 664                pr_err("Requested Logout Timeout %u smaller than"
 665                        " minimum %u\n", login_timeout, TA_LOGIN_TIMEOUT_MIN);
 666                return -EINVAL;
 667        }
 668
 669        a->login_timeout = login_timeout;
 670        pr_debug("Set Logout Timeout to %u for Target Portal Group"
 671                " %hu\n", a->login_timeout, tpg->tpgt);
 672
 673        return 0;
 674}
 675
 676int iscsit_ta_netif_timeout(
 677        struct iscsi_portal_group *tpg,
 678        u32 netif_timeout)
 679{
 680        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 681
 682        if (netif_timeout > TA_NETIF_TIMEOUT_MAX) {
 683                pr_err("Requested Network Interface Timeout %u larger"
 684                        " than maximum %u\n", netif_timeout,
 685                                TA_NETIF_TIMEOUT_MAX);
 686                return -EINVAL;
 687        } else if (netif_timeout < TA_NETIF_TIMEOUT_MIN) {
 688                pr_err("Requested Network Interface Timeout %u smaller"
 689                        " than minimum %u\n", netif_timeout,
 690                                TA_NETIF_TIMEOUT_MIN);
 691                return -EINVAL;
 692        }
 693
 694        a->netif_timeout = netif_timeout;
 695        pr_debug("Set Network Interface Timeout to %u for"
 696                " Target Portal Group %hu\n", a->netif_timeout, tpg->tpgt);
 697
 698        return 0;
 699}
 700
 701int iscsit_ta_generate_node_acls(
 702        struct iscsi_portal_group *tpg,
 703        u32 flag)
 704{
 705        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 706
 707        if ((flag != 0) && (flag != 1)) {
 708                pr_err("Illegal value %d\n", flag);
 709                return -EINVAL;
 710        }
 711
 712        a->generate_node_acls = flag;
 713        pr_debug("iSCSI_TPG[%hu] - Generate Initiator Portal Group ACLs: %s\n",
 714                tpg->tpgt, (a->generate_node_acls) ? "Enabled" : "Disabled");
 715
 716        if (flag == 1 && a->cache_dynamic_acls == 0) {
 717                pr_debug("Explicitly setting cache_dynamic_acls=1 when "
 718                        "generate_node_acls=1\n");
 719                a->cache_dynamic_acls = 1;
 720        }
 721
 722        return 0;
 723}
 724
 725int iscsit_ta_default_cmdsn_depth(
 726        struct iscsi_portal_group *tpg,
 727        u32 tcq_depth)
 728{
 729        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 730
 731        if (tcq_depth > TA_DEFAULT_CMDSN_DEPTH_MAX) {
 732                pr_err("Requested Default Queue Depth: %u larger"
 733                        " than maximum %u\n", tcq_depth,
 734                                TA_DEFAULT_CMDSN_DEPTH_MAX);
 735                return -EINVAL;
 736        } else if (tcq_depth < TA_DEFAULT_CMDSN_DEPTH_MIN) {
 737                pr_err("Requested Default Queue Depth: %u smaller"
 738                        " than minimum %u\n", tcq_depth,
 739                                TA_DEFAULT_CMDSN_DEPTH_MIN);
 740                return -EINVAL;
 741        }
 742
 743        a->default_cmdsn_depth = tcq_depth;
 744        pr_debug("iSCSI_TPG[%hu] - Set Default CmdSN TCQ Depth to %u\n",
 745                tpg->tpgt, a->default_cmdsn_depth);
 746
 747        return 0;
 748}
 749
 750int iscsit_ta_cache_dynamic_acls(
 751        struct iscsi_portal_group *tpg,
 752        u32 flag)
 753{
 754        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 755
 756        if ((flag != 0) && (flag != 1)) {
 757                pr_err("Illegal value %d\n", flag);
 758                return -EINVAL;
 759        }
 760
 761        if (a->generate_node_acls == 1 && flag == 0) {
 762                pr_debug("Skipping cache_dynamic_acls=0 when"
 763                        " generate_node_acls=1\n");
 764                return 0;
 765        }
 766
 767        a->cache_dynamic_acls = flag;
 768        pr_debug("iSCSI_TPG[%hu] - Cache Dynamic Initiator Portal Group"
 769                " ACLs %s\n", tpg->tpgt, (a->cache_dynamic_acls) ?
 770                "Enabled" : "Disabled");
 771
 772        return 0;
 773}
 774
 775int iscsit_ta_demo_mode_write_protect(
 776        struct iscsi_portal_group *tpg,
 777        u32 flag)
 778{
 779        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 780
 781        if ((flag != 0) && (flag != 1)) {
 782                pr_err("Illegal value %d\n", flag);
 783                return -EINVAL;
 784        }
 785
 786        a->demo_mode_write_protect = flag;
 787        pr_debug("iSCSI_TPG[%hu] - Demo Mode Write Protect bit: %s\n",
 788                tpg->tpgt, (a->demo_mode_write_protect) ? "ON" : "OFF");
 789
 790        return 0;
 791}
 792
 793int iscsit_ta_prod_mode_write_protect(
 794        struct iscsi_portal_group *tpg,
 795        u32 flag)
 796{
 797        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 798
 799        if ((flag != 0) && (flag != 1)) {
 800                pr_err("Illegal value %d\n", flag);
 801                return -EINVAL;
 802        }
 803
 804        a->prod_mode_write_protect = flag;
 805        pr_debug("iSCSI_TPG[%hu] - Production Mode Write Protect bit:"
 806                " %s\n", tpg->tpgt, (a->prod_mode_write_protect) ?
 807                "ON" : "OFF");
 808
 809        return 0;
 810}
 811
 812int iscsit_ta_demo_mode_discovery(
 813        struct iscsi_portal_group *tpg,
 814        u32 flag)
 815{
 816        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 817
 818        if ((flag != 0) && (flag != 1)) {
 819                pr_err("Illegal value %d\n", flag);
 820                return -EINVAL;
 821        }
 822
 823        a->demo_mode_discovery = flag;
 824        pr_debug("iSCSI_TPG[%hu] - Demo Mode Discovery bit:"
 825                " %s\n", tpg->tpgt, (a->demo_mode_discovery) ?
 826                "ON" : "OFF");
 827
 828        return 0;
 829}
 830
 831int iscsit_ta_default_erl(
 832        struct iscsi_portal_group *tpg,
 833        u32 default_erl)
 834{
 835        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 836
 837        if ((default_erl != 0) && (default_erl != 1) && (default_erl != 2)) {
 838                pr_err("Illegal value for default_erl: %u\n", default_erl);
 839                return -EINVAL;
 840        }
 841
 842        a->default_erl = default_erl;
 843        pr_debug("iSCSI_TPG[%hu] - DefaultERL: %u\n", tpg->tpgt, a->default_erl);
 844
 845        return 0;
 846}
 847
 848int iscsit_ta_t10_pi(
 849        struct iscsi_portal_group *tpg,
 850        u32 flag)
 851{
 852        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 853
 854        if ((flag != 0) && (flag != 1)) {
 855                pr_err("Illegal value %d\n", flag);
 856                return -EINVAL;
 857        }
 858
 859        a->t10_pi = flag;
 860        pr_debug("iSCSI_TPG[%hu] - T10 Protection information bit:"
 861                " %s\n", tpg->tpgt, (a->t10_pi) ?
 862                "ON" : "OFF");
 863
 864        return 0;
 865}
 866
 867int iscsit_ta_fabric_prot_type(
 868        struct iscsi_portal_group *tpg,
 869        u32 prot_type)
 870{
 871        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 872
 873        if ((prot_type != 0) && (prot_type != 1) && (prot_type != 3)) {
 874                pr_err("Illegal value for fabric_prot_type: %u\n", prot_type);
 875                return -EINVAL;
 876        }
 877
 878        a->fabric_prot_type = prot_type;
 879        pr_debug("iSCSI_TPG[%hu] - T10 Fabric Protection Type: %u\n",
 880                 tpg->tpgt, prot_type);
 881
 882        return 0;
 883}
 884
 885int iscsit_ta_tpg_enabled_sendtargets(
 886        struct iscsi_portal_group *tpg,
 887        u32 flag)
 888{
 889        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 890
 891        if ((flag != 0) && (flag != 1)) {
 892                pr_err("Illegal value %d\n", flag);
 893                return -EINVAL;
 894        }
 895
 896        a->tpg_enabled_sendtargets = flag;
 897        pr_debug("iSCSI_TPG[%hu] - TPG enabled bit required for SendTargets:"
 898                " %s\n", tpg->tpgt, (a->tpg_enabled_sendtargets) ? "ON" : "OFF");
 899
 900        return 0;
 901}
 902
 903int iscsit_ta_login_keys_workaround(
 904        struct iscsi_portal_group *tpg,
 905        u32 flag)
 906{
 907        struct iscsi_tpg_attrib *a = &tpg->tpg_attrib;
 908
 909        if ((flag != 0) && (flag != 1)) {
 910                pr_err("Illegal value %d\n", flag);
 911                return -EINVAL;
 912        }
 913
 914        a->login_keys_workaround = flag;
 915        pr_debug("iSCSI_TPG[%hu] - TPG enabled bit for login keys workaround: %s ",
 916                tpg->tpgt, (a->login_keys_workaround) ? "ON" : "OFF");
 917
 918        return 0;
 919}
 920