Message ID | 1593232509-13720-11-git-send-email-michael.christie@oracle.com (mailing list archive) |
---|---|
State | Changes Requested |
Headers | show |
Series | target: add configfs interface | expand |
On 2020-06-27 06:35, Mike Christie wrote: > This patch exports the LIO sessions via configfs. If userspace makes > a "sessions" dir on the ACL or TPG dir to indicate to the kernel it > supports the new interface on that TPG, then the kernel will make a > dir per session in the tpg/sessions or tpg/acls/alc/sessions dir I someone creates a new ACL on a running tpg, can it happen that a session already is created before user can create the sessions folder? > It works similar to how some targets export their session info today > where if it's dynamic session then it goes in the tpg dir and if > there is an ACL then it goes in the acl's sessions dir. The name of > the dir is "session-$sid". > > qla2xxx example: > > For ACL based sessions: > > ├── 21:00:00:24:ff:46:b8:88 > │ ├── fabric_statistics > │ └── tpgt_1 > │ ├── acls > │ │ └── 21:00:00:24:ff:46:b8:8a > │ │ └── sessions > │ │ └── session-1 > > > or for a dynamic session it would be in the tpg dir > ..... > > │ ├── param > │ └── sessions > │ └── session-1 > > > > There is currently nothing in the session-$sid dir. To make the RFC > easier to read I did not post the transport id patches or the iscsi > conversion one, but on the final send I'll include them. > > Note/Warning: > > The interface has 2 quirks: > > 1. It works similar to the loop/vhost/usb/xen nexus file interface > where instead of a rmdir to delete the session you write to some special > file. For this new interface we have: > > /fabric/target/tpgt/sessions/remove_session > > 2. Because the kernel is making the session, there is no mkdir/rmdir > support for each session like other objects like LUN, tpg, target, np, > etc. But, before we remove the parent tpg, we have to remove the > children sessions still. This gives configfs the behavior it expects > where parents can't be removed before children and we will not hit > issues like we hit before. If I got it right, before user can remove a tpg from sysFS, he first has to remove all existing sessions by writing the SIDs to the new remove_sessions file. But how do you prevent initiator side from quickly creating a new session e.g. in case of FC? Can we end up in a loop of session removal and re-creation, especially in case of multiple session an the same tpg? > > To signal that this new requirement is supported, userspace must do > mkdir "sessions" on the tpg/acl to create the root sessions dir that > will contain the individual sessions. See this rtslib patch: > > https://github.com/mikechristie/rtslib-fb/commit/4af906d2955b739c0585d81b4b1a0d498cc2f663 > > If userspace does not do a mkdir "sessions" on the tpg, then the old > behavior is supported (we just don't register the session in configfs) > for that tpg. > > Signed-off-by: Mike Christie <michael.christie@oracle.com> > --- > drivers/target/target_core_fabric_configfs.c | 187 +++++++++++++++++++++++++-- > drivers/target/target_core_transport.c | 5 + > include/target/target_core_base.h | 4 + > include/target/target_core_fabric.h | 4 +- > 4 files changed, 189 insertions(+), 11 deletions(-) > > diff --git a/drivers/target/target_core_fabric_configfs.c b/drivers/target/target_core_fabric_configfs.c > index 2b70bdf..3c1288b 100644 > --- a/drivers/target/target_core_fabric_configfs.c > +++ b/drivers/target/target_core_fabric_configfs.c > @@ -322,15 +322,45 @@ static struct config_group *target_fabric_make_mappedlun( > return ERR_PTR(ret); > } > > -static void target_fabric_drop_mappedlun( > - struct config_group *group, > - struct config_item *item) > +static struct config_item_type target_nacl_sess_type = { > + .ct_owner = THIS_MODULE, > +}; > + > +static struct config_group * > +target_make_nacl_sess_group(struct config_group *group) > { > - struct se_lun_acl *lacl = container_of(to_config_group(item), > - struct se_lun_acl, se_lun_group); > + struct se_node_acl *se_nacl = container_of(group, struct se_node_acl, > + acl_group); > + struct se_portal_group *se_tpg = se_nacl->se_tpg; > + > + config_group_init_type_name(&se_nacl->acl_sess_group, "sessions", > + &target_nacl_sess_type); > + se_tpg->cfgfs_sess_supp = true; > + > + return &se_nacl->acl_sess_group; > +} > + > +static struct config_group *target_make_nacl_group(struct config_group *group, > + const char *name) > +{ > + if (!strcmp(name, "sessions")) { > + return target_make_nacl_sess_group(group); > + } else { > + return target_fabric_make_mappedlun(group, name); > + } > +} > > - configfs_remove_default_groups(&lacl->ml_stat_grps.stat_group); > - configfs_remove_default_groups(&lacl->se_lun_group); > +static void target_drop_nacl_group(struct config_group *group, > + struct config_item *item) > +{ > + struct se_lun_acl *lacl; > + > + if (strstr(config_item_name(item), "lun_")) { > + lacl = container_of(to_config_group(item), struct se_lun_acl, > + se_lun_group); > + configfs_remove_default_groups(&lacl->ml_stat_grps.stat_group); > + configfs_remove_default_groups(&lacl->se_lun_group); > + } > > config_item_put(item); > } > @@ -349,8 +379,8 @@ static void target_fabric_nacl_base_release(struct config_item *item) > }; > > static struct configfs_group_operations target_fabric_nacl_base_group_ops = { > - .make_group = target_fabric_make_mappedlun, > - .drop_item = target_fabric_drop_mappedlun, > + .make_group = target_make_nacl_group, > + .drop_item = target_drop_nacl_group, > }; > > TF_CIT_SETUP_DRV(tpg_nacl_base, &target_fabric_nacl_base_item_ops, > @@ -799,6 +829,8 @@ static void target_fabric_drop_lun( > TF_CIT_SETUP_DRV(tpg_auth, NULL, NULL); > TF_CIT_SETUP_DRV(tpg_param, NULL, NULL); > > +/* Start of tfc_tpg_session_cit */ > + > static void target_cfgfs_sess_release(struct config_item *item) > { > struct se_session *se_sess = container_of(to_config_group(item), > @@ -832,6 +864,82 @@ int target_cfgfs_init_session(struct se_session *se_sess) > return 0; > } > > +int target_cfgfs_register_session(struct se_portal_group *se_tpg, > + struct se_session *se_sess) > +{ > + struct se_node_acl *se_nacl; > + int ret; > + > + /* > + * If the fabric doesn't support close_session, there's no way for > + * userspace to clean up the session during nacl/tpg deletion. > + */ > + if (!se_tpg->cfgfs_sess_supp || !se_tpg->se_tpg_tfo->close_session) > + return 0; Why is the cfgfs_sess_supp flag per tpg? It seems to be set if either tpg/sessions or any acl/sessions folder is created. So what will happen here if e.g session for an acl is created while only tpg/sessions exists? Do we need an similar flag per acl also? And if we have a per acl and the tpg flag I think they should be removed when user removes an empty sessions folder. > + > + se_nacl = se_sess->se_node_acl; > + if (se_nacl->dynamic_node_acl) { > + ret = configfs_register_group(&se_tpg->tpg_sess_group, > + &se_sess->group); > + } else { > + ret = configfs_register_group(&se_nacl->acl_sess_group, > + &se_sess->group); > + } > + if (ret) > + goto fail; Do we have a possible race here? I think it would be better to first call target_depend_item() and then register the new session's group. > + > + /* > + * The session is not created via a mkdir like other objects. A > + * transport event like a login or userspace used the nexus file to > + * initiate creation. However, we want the same behavior as other > + * objects where we must remove the children before removing the > + * parent dir, so do a depend on the parent that is released when the > + * session is removed. > + */ > + if (se_nacl->dynamic_node_acl) { > + ret = target_depend_item(&se_tpg->tpg_sess_group.cg_item); > + } else { > + ret = target_depend_item(&se_nacl->acl_sess_group.cg_item); > + } > + if (ret) > + goto unreg_cfgfs; > + > + se_sess->added_to_cfgfs = true; > + return 0; > + > +unreg_cfgfs: > + configfs_unregister_group(&se_sess->group); > +fail: > + pr_err("Could not register session dir %d. Error %d.\n", se_sess->sid, > + ret); > + return ret; > +} > +EXPORT_SYMBOL_GPL(target_cfgfs_register_session); > + > +void target_cfgfs_unregister_session(struct se_session *se_sess) > +{ > + struct se_node_acl *se_nacl; > + > + /* > + * The session attr interface may not be enabled and discovery > + * sessions are not registered. > + */ > + if (!se_sess->added_to_cfgfs) > + return; > + > + configfs_unregister_group(&se_sess->group); > + > + se_nacl = se_sess->se_node_acl; > + if (se_nacl->dynamic_node_acl) { > + target_undepend_item(&se_sess->se_tpg->tpg_sess_group.cg_item); > + } else { > + target_undepend_item(&se_nacl->acl_sess_group.cg_item); > + } > +} > +EXPORT_SYMBOL_GPL(target_cfgfs_unregister_session); > + > +/* End of tfc_tpg_session_cit */ > + > /* Start of tfc_tpg_base_cit */ > > static void target_fabric_tpg_release(struct config_item *item) > @@ -848,7 +956,66 @@ static void target_fabric_tpg_release(struct config_item *item) > .release = target_fabric_tpg_release, > }; > > -TF_CIT_SETUP_DRV(tpg_base, &target_fabric_tpg_base_item_ops, NULL); > +static ssize_t target_tpg_remove_session_store(struct config_item *item, > + const char *page, size_t count) > +{ > + struct se_portal_group *se_tpg = container_of(to_config_group(item), > + struct se_portal_group, > + tpg_sess_group); > + int ret, sid; > + > + ret = kstrtoint(page, 10, &sid); > + if (ret < 0) > + return ret; > + > + ret = target_close_session_sync(se_tpg, sid); > + if (ret < 0) > + return ret; > + > + return count; > +} > +CONFIGFS_ATTR_WO(target_tpg_, remove_session); > + > +static struct configfs_attribute *target_tpg_sess_attrs[] = { > + &target_tpg_attr_remove_session, > + NULL, > +}; > + > +static struct config_item_type target_tpg_sess_type = { > + .ct_owner = THIS_MODULE, > + .ct_attrs = target_tpg_sess_attrs, > +}; > + > +static struct config_group * > +target_make_tpg_sess_group(struct config_group *group, const char *name) > +{ > + struct se_portal_group *se_tpg = container_of(group, > + struct se_portal_group, > + tpg_group); > + > + if (strcmp(name, "sessions")) > + return ERR_PTR(-EINVAL); > + > + config_group_init_type_name(&se_tpg->tpg_sess_group, name, > + &target_tpg_sess_type); > + se_tpg->cfgfs_sess_supp = true; > + > + return &se_tpg->tpg_sess_group; > +} > + > +static void target_drop_tpg_sess_group(struct config_group *group, > + struct config_item *item) > +{ > + config_item_put(item); > +} > + > +static struct configfs_group_operations target_tpg_sess_group_ops = { > + .make_group = target_make_tpg_sess_group, > + .drop_item = target_drop_tpg_sess_group, > +}; > + > +TF_CIT_SETUP_DRV(tpg_base, &target_fabric_tpg_base_item_ops, > + &target_tpg_sess_group_ops); > > /* End of tfc_tpg_base_cit */ > > diff --git a/drivers/target/target_core_transport.c b/drivers/target/target_core_transport.c > index 942b0c5..87aac76 100644 > --- a/drivers/target/target_core_transport.c > +++ b/drivers/target/target_core_transport.c > @@ -480,6 +480,10 @@ struct se_session * > rc = -EACCES; > goto free_session; > } > + > + rc = target_cfgfs_register_session(tpg, sess); > + if (rc) > + goto free_session; > /* > * Go ahead and perform any remaining fabric setup that is > * required before transport_register_session(). > @@ -775,6 +779,7 @@ void target_remove_session(struct se_session *se_sess) > se_sess->sess_remove_running = 1; > spin_unlock_irqrestore(&se_tpg->session_lock, flags); > > + target_cfgfs_unregister_session(se_sess); > transport_deregister_session_configfs(se_sess); > transport_deregister_session(se_sess); > } > diff --git a/include/target/target_core_base.h b/include/target/target_core_base.h > index 690fff2..f78c1f4 100644 > --- a/include/target/target_core_base.h > +++ b/include/target/target_core_base.h > @@ -571,6 +571,7 @@ struct se_node_acl { > struct config_group acl_auth_group; > struct config_group acl_param_group; > struct config_group acl_fabric_stat_group; > + struct config_group acl_sess_group; > struct list_head acl_list; > struct list_head acl_sess_list; > struct completion acl_free_comp; > @@ -626,6 +627,7 @@ struct se_session { > void *sess_cmd_map; > struct sbitmap_queue sess_tag_pool; > int sid; > + bool added_to_cfgfs; > struct config_group group; > const struct target_core_fabric_ops *tfo; > }; > @@ -887,6 +889,7 @@ struct se_portal_group { > /* Spinlock for adding/removing sessions */ > spinlock_t session_lock; > struct mutex tpg_lun_mutex; > + bool cfgfs_sess_supp; > /* linked list for initiator ACL list */ > struct list_head acl_node_list; > struct hlist_head tpg_lun_hlist; > @@ -903,6 +906,7 @@ struct se_portal_group { > struct config_group tpg_attrib_group; > struct config_group tpg_auth_group; > struct config_group tpg_param_group; > + struct config_group tpg_sess_group; > }; > > static inline struct se_portal_group *to_tpg(struct config_item *item) > diff --git a/include/target/target_core_fabric.h b/include/target/target_core_fabric.h > index e200faa..1582455 100644 > --- a/include/target/target_core_fabric.h > +++ b/include/target/target_core_fabric.h > @@ -154,7 +154,9 @@ void transport_register_session(struct se_portal_group *, > void target_put_nacl(struct se_node_acl *); > void transport_deregister_session_configfs(struct se_session *); > void transport_deregister_session(struct se_session *); > - > +int target_cfgfs_register_session(struct se_portal_group *, > + struct se_session *); > +void target_cfgfs_unregister_session(struct se_session *); > > void transport_init_se_cmd(struct se_cmd *, > const struct target_core_fabric_ops *, >
On 7/3/20 7:51 AM, Bodo Stroesser wrote: > On 2020-06-27 06:35, Mike Christie wrote: >> This patch exports the LIO sessions via configfs. If userspace makes >> a "sessions" dir on the ACL or TPG dir to indicate to the kernel it >> supports the new interface on that TPG, then the kernel will make a >> dir per session in the tpg/sessions or tpg/acls/alc/sessions dir > > I someone creates a new ACL on a running tpg, can it happen that a > session already is created before user can create the sessions folder? Right now yes. In the patch I started to try to support a per tpg mix. If a session exists then you do mkdir sessions, then before you can delete the tpg you have to delete the sessions that were created after the mkdir. But to handle all the side cases, it becomes a pain, and I don't think anyone will ever use that feature, so I plan to make it either on or off for all sessions on the tpg and no mixing. I think normally we see different tools at the per target or per fabric level, so we should be ok. > >> It works similar to how some targets export their session info today >> where if it's dynamic session then it goes in the tpg dir and if >> there is an ACL then it goes in the acl's sessions dir. The name of >> the dir is "session-$sid". >> >> qla2xxx example: >> >> For ACL based sessions: >> >> ├── 21:00:00:24:ff:46:b8:88 >> │ ├── fabric_statistics >> │ └── tpgt_1 >> │ ├── acls >> │ │ └── 21:00:00:24:ff:46:b8:8a >> │ │ └── sessions >> │ │ └── session-1 >> >> >> or for a dynamic session it would be in the tpg dir >> ..... >> >> │ ├── param >> │ └── sessions >> │ └── session-1 >> >> >> >> There is currently nothing in the session-$sid dir. To make the RFC >> easier to read I did not post the transport id patches or the iscsi >> conversion one, but on the final send I'll include them. >> >> Note/Warning: >> >> The interface has 2 quirks: >> >> 1. It works similar to the loop/vhost/usb/xen nexus file interface >> where instead of a rmdir to delete the session you write to some special >> file. For this new interface we have: >> >> /fabric/target/tpgt/sessions/remove_session >> >> 2. Because the kernel is making the session, there is no mkdir/rmdir >> support for each session like other objects like LUN, tpg, target, np, >> etc. But, before we remove the parent tpg, we have to remove the >> children sessions still. This gives configfs the behavior it expects >> where parents can't be removed before children and we will not hit >> issues like we hit before. > > If I got it right, before user can remove a tpg from sysFS, he first > has to remove all existing sessions by writing the SIDs to the new > remove_sessions file. Yes. > > But how do you prevent initiator side from quickly creating a new > session e.g. in case of FC? Can we end up in a loop of session removal > and re-creation, especially in case of multiple session an the same tpg? No. It works the same as today. When you do a tpg removal like when you do targetlci clearconfig rtslib disables the tpg which prevents the target from creating new sessions. We then bring down the objects under it like luns, portals, etc. When we get to sessions, if the target has not yet brought them down (some targets do this on tpg disablement and some do not), then with that github patch rtslib will kill them like it does for the other objects.
On 2020-07-03 18:27, Mike Christie wrote: > On 7/3/20 7:51 AM, Bodo Stroesser wrote: >> On 2020-06-27 06:35, Mike Christie wrote: >>> This patch exports the LIO sessions via configfs. If userspace makes >>> a "sessions" dir on the ACL or TPG dir to indicate to the kernel it >>> supports the new interface on that TPG, then the kernel will make a >>> dir per session in the tpg/sessions or tpg/acls/alc/sessions dir >> >> I someone creates a new ACL on a running tpg, can it happen that a >> session already is created before user can create the sessions folder? > > Right now yes. In the patch I started to try to support a per tpg mix. If a session exists then you do mkdir sessions, then before you can delete the tpg you have to delete the sessions that were created after the mkdir. > > But to handle all the side cases, it becomes a pain, and I don't think anyone will ever use that feature, so I plan to make it either on or off for all sessions on the tpg and no mixing. I think normally we see different tools at the per target or per fabric level, so we should be ok. Maybe I don't get it. What I meant is: Creation of the "sessions" folders in tpg and acl has to be done by user. If user creates a new acl while tpg is active, the acl immediately becomes active, I think. If user then creates the "sessions" folder, it could happen that a session already is started meanwhile. That session would be invisible then. Maybe an "enable" attr for acl would help? ..... > No. It works the same as today. When you do a tpg removal like when you do > > targetlci clearconfig > > rtslib disables the tpg which prevents the target from creating new sessions. We then bring down the objects under it like luns, portals, etc. When we get to sessions, if the target has not yet brought them down (some targets do this on tpg disablement and some do not), then with that github patch rtslib will kill them like it does for the other objects. > Ahh, I see. Let me resend another part of my response, that was far down: > } > +int target_cfgfs_register_session(struct se_portal_group *se_tpg, > + struct se_session *se_sess) > +{ > + struct se_node_acl *se_nacl; > + int ret; > + > + /* > + * If the fabric doesn't support close_session, there's no way for > + * userspace to clean up the session during nacl/tpg deletion. > + */ > + if (!se_tpg->cfgfs_sess_supp || !se_tpg->se_tpg_tfo->close_session) > + return 0; Why is the cfgfs_sess_supp flag per tpg? It seems to be set if either tpg/sessions or any acl/sessions folder is created. So what will happen here if e.g session for an acl is created while only tpg/sessions exists? Do we need an similar flag per acl also? And if we have a per acl and the tpg flag I think they should be removed when user removes an empty sessions folder. > + > + se_nacl = se_sess->se_node_acl; > + if (se_nacl->dynamic_node_acl) { > + ret = configfs_register_group(&se_tpg->tpg_sess_group, > + &se_sess->group); > + } else { > + ret = configfs_register_group(&se_nacl->acl_sess_group, > + &se_sess->group); > + } > + if (ret) > + goto fail; Do we have a possible race here? I think it would be better to first call target_depend_item() and then register the new session's group. > + > + /* > + * The session is not created via a mkdir like other objects. A > + * transport event like a login or userspace used the nexus file to > + * initiate creation. However, we want the same behavior as other > + * objects where we must remove the children before removing the > + * parent dir, so do a depend on the parent that is released when the > + * session is removed. > + */ > + if (se_nacl->dynamic_node_acl) { > + ret = target_depend_item(&se_tpg->tpg_sess_group.cg_item); > + } else { > + ret = target_depend_item(&se_nacl->acl_sess_group.cg_item); > + } > + if (ret) > + goto unreg_cfgfs; > + > + se_sess->added_to_cfgfs = true; > + return 0;
> On Jul 3, 2020, at 11:57 AM, Bodo Stroesser <bstroesser@ts.fujitsu.com> wrote: > > On 2020-07-03 18:27, Mike Christie wrote: >> On 7/3/20 7:51 AM, Bodo Stroesser wrote: >>> On 2020-06-27 06:35, Mike Christie wrote: >>>> This patch exports the LIO sessions via configfs. If userspace makes >>>> a "sessions" dir on the ACL or TPG dir to indicate to the kernel it >>>> supports the new interface on that TPG, then the kernel will make a >>>> dir per session in the tpg/sessions or tpg/acls/alc/sessions dir >>> >>> I someone creates a new ACL on a running tpg, can it happen that a >>> session already is created before user can create the sessions folder? >> >> Right now yes. In the patch I started to try to support a per tpg mix. If a session exists then you do mkdir sessions, then before you can delete the tpg you have to delete the sessions that were created after the mkdir. >> >> But to handle all the side cases, it becomes a pain, and I don't think anyone will ever use that feature, so I plan to make it either on or off for all sessions on the tpg and no mixing. I think normally we see different tools at the per target or per fabric level, so we should be ok. > > Maybe I don't get it. What I meant is: > > Creation of the "sessions" folders in tpg and acl has to be done by > user. > If user creates a new acl while tpg is active, the acl immediately > becomes active, I think. > If user then creates the "sessions" folder, it could happen that > a session already is started meanwhile. That session would be > invisible then. > Maybe an "enable" attr for acl would help? I see what you are saying. See below. >> No. It works the same as today. When you do a tpg removal like when you do >> >> targetlci clearconfig >> >> rtslib disables the tpg which prevents the target from creating new sessions. We then bring down the objects under it like luns, portals, etc. When we get to sessions, if the target has not yet brought them down (some targets do this on tpg disablement and some do not), then with that github patch rtslib will kill them like it does for the other objects. >> > > Ahh, I see. > > > > > Let me resend another part of my response, that was far down: > >> } >> +int target_cfgfs_register_session(struct se_portal_group *se_tpg, >> + struct se_session *se_sess) >> +{ >> + struct se_node_acl *se_nacl; >> + int ret; >> + >> + /* >> + * If the fabric doesn't support close_session, there's no way for >> + * userspace to clean up the session during nacl/tpg deletion. >> + */ >> + if (!se_tpg->cfgfs_sess_supp || !se_tpg->se_tpg_tfo->close_session) >> + return 0; > > Why is the cfgfs_sess_supp flag per tpg? It seems to be set if either > tpg/sessions or any acl/sessions folder is created. > So what will happen here if e.g session for an acl is created while > only tpg/sessions exists? Ah yeah, that is bogus. I am still working on an issue in this code. I wasn’t expecting a line by line and just a general review of cfgfs vs sysfs :) Sorry about that. I originally made it so when we make the tpg and before it is enabled you had to do mkdir sessions on the tpg to signal the kernel that the app supports the new interface. The kernel would then make the acl sessions dir for you. I was tracking down a bug in that though, and for the posting I made it so userspace had to create the acl sessions dir. While cutting and pasting the code I forgot to fix up that code. > Do we need an similar flag per acl also? > And if we have a per acl and the tpg flag I think they should be removed > when user removes an empty sessions folder. It’s just a lot easier to leave it set if userspace has enabled it once. You actually need to take into account if the tpg is enabled, and then you have some issues with the drivers that have their own nexus interface, and then there are different userspace code paths that handle this. I don’t think it’s going to be common to mix and match updated and non-updated tools, so once its set, it’s set. If you disagree let me know. It can be done. > >> + >> + se_nacl = se_sess->se_node_acl; >> + if (se_nacl->dynamic_node_acl) { >> + ret = configfs_register_group(&se_tpg->tpg_sess_group, >> + &se_sess->group); >> + } else { >> + ret = configfs_register_group(&se_nacl->acl_sess_group, >> + &se_sess->group); >> + } >> + if (ret) >> + goto fail; > > Do we have a possible race here? I think it would be better to first > call target_depend_item() and then register the new session's group. Yes. Will fix. > >> + >> + /* >> + * The session is not created via a mkdir like other objects. A >> + * transport event like a login or userspace used the nexus file to >> + * initiate creation. However, we want the same behavior as other >> + * objects where we must remove the children before removing the >> + * parent dir, so do a depend on the parent that is released when the >> + * session is removed. >> + */ >> + if (se_nacl->dynamic_node_acl) { >> + ret = target_depend_item(&se_tpg->tpg_sess_group.cg_item); >> + } else { >> + ret = target_depend_item(&se_nacl->acl_sess_group.cg_item); >> + } >> + if (ret) >> + goto unreg_cfgfs; >> + >> + se_sess->added_to_cfgfs = true; >> + return 0;
On 2020-07-03 23:19, Michael Christie wrote: ... >> Why is the cfgfs_sess_supp flag per tpg? It seems to be set if either >> tpg/sessions or any acl/sessions folder is created. >> So what will happen here if e.g session for an acl is created while >> only tpg/sessions exists? > > Ah yeah, that is bogus. I am still working on an issue in this code. I wasn’t expecting a line by line and just a general review of cfgfs vs sysfs :) Sorry about that. > > I originally made it so when we make the tpg and before it is enabled you had to do mkdir sessions on the tpg to signal the kernel that the app supports the new interface. The kernel would then make the acl sessions dir for you. > > I was tracking down a bug in that though, and for the posting I made it so userspace had to create the acl sessions dir. While cutting and pasting the code I forgot to fix up that code. Ah, ok. Please see below. > > > >> Do we need an similar flag per acl also? >> And if we have a per acl and the tpg flag I think they should be removed >> when user removes an empty sessions folder. > > It’s just a lot easier to leave it set if userspace has enabled it once. You actually need to take into account if the tpg is enabled, and then you have some issues with the drivers that have their own nexus interface, and then there are different userspace code paths that handle this. > > I don’t think it’s going to be common to mix and match updated and non-updated tools, so once its set, it’s set. If you disagree let me know. It can be done. I see no need for such a mix. If it works like you described above - kernel creates acl/sessions dirs after user created tpg/sessions - I think it is really fine.
diff --git a/drivers/target/target_core_fabric_configfs.c b/drivers/target/target_core_fabric_configfs.c index 2b70bdf..3c1288b 100644 --- a/drivers/target/target_core_fabric_configfs.c +++ b/drivers/target/target_core_fabric_configfs.c @@ -322,15 +322,45 @@ static struct config_group *target_fabric_make_mappedlun( return ERR_PTR(ret); } -static void target_fabric_drop_mappedlun( - struct config_group *group, - struct config_item *item) +static struct config_item_type target_nacl_sess_type = { + .ct_owner = THIS_MODULE, +}; + +static struct config_group * +target_make_nacl_sess_group(struct config_group *group) { - struct se_lun_acl *lacl = container_of(to_config_group(item), - struct se_lun_acl, se_lun_group); + struct se_node_acl *se_nacl = container_of(group, struct se_node_acl, + acl_group); + struct se_portal_group *se_tpg = se_nacl->se_tpg; + + config_group_init_type_name(&se_nacl->acl_sess_group, "sessions", + &target_nacl_sess_type); + se_tpg->cfgfs_sess_supp = true; + + return &se_nacl->acl_sess_group; +} + +static struct config_group *target_make_nacl_group(struct config_group *group, + const char *name) +{ + if (!strcmp(name, "sessions")) { + return target_make_nacl_sess_group(group); + } else { + return target_fabric_make_mappedlun(group, name); + } +} - configfs_remove_default_groups(&lacl->ml_stat_grps.stat_group); - configfs_remove_default_groups(&lacl->se_lun_group); +static void target_drop_nacl_group(struct config_group *group, + struct config_item *item) +{ + struct se_lun_acl *lacl; + + if (strstr(config_item_name(item), "lun_")) { + lacl = container_of(to_config_group(item), struct se_lun_acl, + se_lun_group); + configfs_remove_default_groups(&lacl->ml_stat_grps.stat_group); + configfs_remove_default_groups(&lacl->se_lun_group); + } config_item_put(item); } @@ -349,8 +379,8 @@ static void target_fabric_nacl_base_release(struct config_item *item) }; static struct configfs_group_operations target_fabric_nacl_base_group_ops = { - .make_group = target_fabric_make_mappedlun, - .drop_item = target_fabric_drop_mappedlun, + .make_group = target_make_nacl_group, + .drop_item = target_drop_nacl_group, }; TF_CIT_SETUP_DRV(tpg_nacl_base, &target_fabric_nacl_base_item_ops, @@ -799,6 +829,8 @@ static void target_fabric_drop_lun( TF_CIT_SETUP_DRV(tpg_auth, NULL, NULL); TF_CIT_SETUP_DRV(tpg_param, NULL, NULL); +/* Start of tfc_tpg_session_cit */ + static void target_cfgfs_sess_release(struct config_item *item) { struct se_session *se_sess = container_of(to_config_group(item), @@ -832,6 +864,82 @@ int target_cfgfs_init_session(struct se_session *se_sess) return 0; } +int target_cfgfs_register_session(struct se_portal_group *se_tpg, + struct se_session *se_sess) +{ + struct se_node_acl *se_nacl; + int ret; + + /* + * If the fabric doesn't support close_session, there's no way for + * userspace to clean up the session during nacl/tpg deletion. + */ + if (!se_tpg->cfgfs_sess_supp || !se_tpg->se_tpg_tfo->close_session) + return 0; + + se_nacl = se_sess->se_node_acl; + if (se_nacl->dynamic_node_acl) { + ret = configfs_register_group(&se_tpg->tpg_sess_group, + &se_sess->group); + } else { + ret = configfs_register_group(&se_nacl->acl_sess_group, + &se_sess->group); + } + if (ret) + goto fail; + + /* + * The session is not created via a mkdir like other objects. A + * transport event like a login or userspace used the nexus file to + * initiate creation. However, we want the same behavior as other + * objects where we must remove the children before removing the + * parent dir, so do a depend on the parent that is released when the + * session is removed. + */ + if (se_nacl->dynamic_node_acl) { + ret = target_depend_item(&se_tpg->tpg_sess_group.cg_item); + } else { + ret = target_depend_item(&se_nacl->acl_sess_group.cg_item); + } + if (ret) + goto unreg_cfgfs; + + se_sess->added_to_cfgfs = true; + return 0; + +unreg_cfgfs: + configfs_unregister_group(&se_sess->group); +fail: + pr_err("Could not register session dir %d. Error %d.\n", se_sess->sid, + ret); + return ret; +} +EXPORT_SYMBOL_GPL(target_cfgfs_register_session); + +void target_cfgfs_unregister_session(struct se_session *se_sess) +{ + struct se_node_acl *se_nacl; + + /* + * The session attr interface may not be enabled and discovery + * sessions are not registered. + */ + if (!se_sess->added_to_cfgfs) + return; + + configfs_unregister_group(&se_sess->group); + + se_nacl = se_sess->se_node_acl; + if (se_nacl->dynamic_node_acl) { + target_undepend_item(&se_sess->se_tpg->tpg_sess_group.cg_item); + } else { + target_undepend_item(&se_nacl->acl_sess_group.cg_item); + } +} +EXPORT_SYMBOL_GPL(target_cfgfs_unregister_session); + +/* End of tfc_tpg_session_cit */ + /* Start of tfc_tpg_base_cit */ static void target_fabric_tpg_release(struct config_item *item) @@ -848,7 +956,66 @@ static void target_fabric_tpg_release(struct config_item *item) .release = target_fabric_tpg_release, }; -TF_CIT_SETUP_DRV(tpg_base, &target_fabric_tpg_base_item_ops, NULL); +static ssize_t target_tpg_remove_session_store(struct config_item *item, + const char *page, size_t count) +{ + struct se_portal_group *se_tpg = container_of(to_config_group(item), + struct se_portal_group, + tpg_sess_group); + int ret, sid; + + ret = kstrtoint(page, 10, &sid); + if (ret < 0) + return ret; + + ret = target_close_session_sync(se_tpg, sid); + if (ret < 0) + return ret; + + return count; +} +CONFIGFS_ATTR_WO(target_tpg_, remove_session); + +static struct configfs_attribute *target_tpg_sess_attrs[] = { + &target_tpg_attr_remove_session, + NULL, +}; + +static struct config_item_type target_tpg_sess_type = { + .ct_owner = THIS_MODULE, + .ct_attrs = target_tpg_sess_attrs, +}; + +static struct config_group * +target_make_tpg_sess_group(struct config_group *group, const char *name) +{ + struct se_portal_group *se_tpg = container_of(group, + struct se_portal_group, + tpg_group); + + if (strcmp(name, "sessions")) + return ERR_PTR(-EINVAL); + + config_group_init_type_name(&se_tpg->tpg_sess_group, name, + &target_tpg_sess_type); + se_tpg->cfgfs_sess_supp = true; + + return &se_tpg->tpg_sess_group; +} + +static void target_drop_tpg_sess_group(struct config_group *group, + struct config_item *item) +{ + config_item_put(item); +} + +static struct configfs_group_operations target_tpg_sess_group_ops = { + .make_group = target_make_tpg_sess_group, + .drop_item = target_drop_tpg_sess_group, +}; + +TF_CIT_SETUP_DRV(tpg_base, &target_fabric_tpg_base_item_ops, + &target_tpg_sess_group_ops); /* End of tfc_tpg_base_cit */ diff --git a/drivers/target/target_core_transport.c b/drivers/target/target_core_transport.c index 942b0c5..87aac76 100644 --- a/drivers/target/target_core_transport.c +++ b/drivers/target/target_core_transport.c @@ -480,6 +480,10 @@ struct se_session * rc = -EACCES; goto free_session; } + + rc = target_cfgfs_register_session(tpg, sess); + if (rc) + goto free_session; /* * Go ahead and perform any remaining fabric setup that is * required before transport_register_session(). @@ -775,6 +779,7 @@ void target_remove_session(struct se_session *se_sess) se_sess->sess_remove_running = 1; spin_unlock_irqrestore(&se_tpg->session_lock, flags); + target_cfgfs_unregister_session(se_sess); transport_deregister_session_configfs(se_sess); transport_deregister_session(se_sess); } diff --git a/include/target/target_core_base.h b/include/target/target_core_base.h index 690fff2..f78c1f4 100644 --- a/include/target/target_core_base.h +++ b/include/target/target_core_base.h @@ -571,6 +571,7 @@ struct se_node_acl { struct config_group acl_auth_group; struct config_group acl_param_group; struct config_group acl_fabric_stat_group; + struct config_group acl_sess_group; struct list_head acl_list; struct list_head acl_sess_list; struct completion acl_free_comp; @@ -626,6 +627,7 @@ struct se_session { void *sess_cmd_map; struct sbitmap_queue sess_tag_pool; int sid; + bool added_to_cfgfs; struct config_group group; const struct target_core_fabric_ops *tfo; }; @@ -887,6 +889,7 @@ struct se_portal_group { /* Spinlock for adding/removing sessions */ spinlock_t session_lock; struct mutex tpg_lun_mutex; + bool cfgfs_sess_supp; /* linked list for initiator ACL list */ struct list_head acl_node_list; struct hlist_head tpg_lun_hlist; @@ -903,6 +906,7 @@ struct se_portal_group { struct config_group tpg_attrib_group; struct config_group tpg_auth_group; struct config_group tpg_param_group; + struct config_group tpg_sess_group; }; static inline struct se_portal_group *to_tpg(struct config_item *item) diff --git a/include/target/target_core_fabric.h b/include/target/target_core_fabric.h index e200faa..1582455 100644 --- a/include/target/target_core_fabric.h +++ b/include/target/target_core_fabric.h @@ -154,7 +154,9 @@ void transport_register_session(struct se_portal_group *, void target_put_nacl(struct se_node_acl *); void transport_deregister_session_configfs(struct se_session *); void transport_deregister_session(struct se_session *); - +int target_cfgfs_register_session(struct se_portal_group *, + struct se_session *); +void target_cfgfs_unregister_session(struct se_session *); void transport_init_se_cmd(struct se_cmd *, const struct target_core_fabric_ops *,
This patch exports the LIO sessions via configfs. If userspace makes a "sessions" dir on the ACL or TPG dir to indicate to the kernel it supports the new interface on that TPG, then the kernel will make a dir per session in the tpg/sessions or tpg/acls/alc/sessions dir It works similar to how some targets export their session info today where if it's dynamic session then it goes in the tpg dir and if there is an ACL then it goes in the acl's sessions dir. The name of the dir is "session-$sid". qla2xxx example: For ACL based sessions: ├── 21:00:00:24:ff:46:b8:88 │ ├── fabric_statistics │ └── tpgt_1 │ ├── acls │ │ └── 21:00:00:24:ff:46:b8:8a │ │ └── sessions │ │ └── session-1 or for a dynamic session it would be in the tpg dir ..... │ ├── param │ └── sessions │ └── session-1 There is currently nothing in the session-$sid dir. To make the RFC easier to read I did not post the transport id patches or the iscsi conversion one, but on the final send I'll include them. Note/Warning: The interface has 2 quirks: 1. It works similar to the loop/vhost/usb/xen nexus file interface where instead of a rmdir to delete the session you write to some special file. For this new interface we have: /fabric/target/tpgt/sessions/remove_session 2. Because the kernel is making the session, there is no mkdir/rmdir support for each session like other objects like LUN, tpg, target, np, etc. But, before we remove the parent tpg, we have to remove the children sessions still. This gives configfs the behavior it expects where parents can't be removed before children and we will not hit issues like we hit before. To signal that this new requirement is supported, userspace must do mkdir "sessions" on the tpg/acl to create the root sessions dir that will contain the individual sessions. See this rtslib patch: https://github.com/mikechristie/rtslib-fb/commit/4af906d2955b739c0585d81b4b1a0d498cc2f663 If userspace does not do a mkdir "sessions" on the tpg, then the old behavior is supported (we just don't register the session in configfs) for that tpg. Signed-off-by: Mike Christie <michael.christie@oracle.com> --- drivers/target/target_core_fabric_configfs.c | 187 +++++++++++++++++++++++++-- drivers/target/target_core_transport.c | 5 + include/target/target_core_base.h | 4 + include/target/target_core_fabric.h | 4 +- 4 files changed, 189 insertions(+), 11 deletions(-)