]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/target/target_core_transport.c
iscsi-target: Add explicit set of cache_dynamic_acls=1 for TPG demo-mode
[mirror_ubuntu-artful-kernel.git] / drivers / target / target_core_transport.c
CommitLineData
c66ac9db
NB
1/*******************************************************************************
2 * Filename: target_core_transport.c
3 *
4 * This file contains the Generic Target Engine Core.
5 *
6 * Copyright (c) 2002, 2003, 2004, 2005 PyX Technologies, Inc.
7 * Copyright (c) 2005, 2006, 2007 SBE, Inc.
8 * Copyright (c) 2007-2010 Rising Tide Systems
9 * Copyright (c) 2008-2010 Linux-iSCSI.org
10 *
11 * Nicholas A. Bellinger <nab@kernel.org>
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation; either version 2 of the License, or
16 * (at your option) any later version.
17 *
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
22 *
23 * You should have received a copy of the GNU General Public License
24 * along with this program; if not, write to the Free Software
25 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
26 *
27 ******************************************************************************/
28
c66ac9db
NB
29#include <linux/net.h>
30#include <linux/delay.h>
31#include <linux/string.h>
32#include <linux/timer.h>
33#include <linux/slab.h>
34#include <linux/blkdev.h>
35#include <linux/spinlock.h>
c66ac9db
NB
36#include <linux/kthread.h>
37#include <linux/in.h>
38#include <linux/cdrom.h>
827509e3 39#include <linux/module.h>
015487b8 40#include <linux/ratelimit.h>
c66ac9db
NB
41#include <asm/unaligned.h>
42#include <net/sock.h>
43#include <net/tcp.h>
44#include <scsi/scsi.h>
45#include <scsi/scsi_cmnd.h>
e66ecd50 46#include <scsi/scsi_tcq.h>
c66ac9db
NB
47
48#include <target/target_core_base.h>
c4795fb2
CH
49#include <target/target_core_backend.h>
50#include <target/target_core_fabric.h>
c66ac9db
NB
51#include <target/target_core_configfs.h>
52
e26d99ae 53#include "target_core_internal.h"
c66ac9db 54#include "target_core_alua.h"
c66ac9db 55#include "target_core_pr.h"
c66ac9db
NB
56#include "target_core_ua.h"
57
35e0e757 58static struct workqueue_struct *target_completion_wq;
c66ac9db 59static struct kmem_cache *se_sess_cache;
c66ac9db 60struct kmem_cache *se_ua_cache;
c66ac9db
NB
61struct kmem_cache *t10_pr_reg_cache;
62struct kmem_cache *t10_alua_lu_gp_cache;
63struct kmem_cache *t10_alua_lu_gp_mem_cache;
64struct kmem_cache *t10_alua_tg_pt_gp_cache;
65struct kmem_cache *t10_alua_tg_pt_gp_mem_cache;
66
c66ac9db 67static void transport_complete_task_attr(struct se_cmd *cmd);
07bde79a 68static void transport_handle_queue_full(struct se_cmd *cmd,
e057f533 69 struct se_device *dev);
05d1c7c0 70static int transport_generic_get_mem(struct se_cmd *cmd);
bc187ea6 71static int target_get_sess_cmd(struct se_session *, struct se_cmd *, bool);
39c05f32 72static void transport_put_cmd(struct se_cmd *cmd);
c66ac9db 73static int transport_set_sense_codes(struct se_cmd *cmd, u8 asc, u8 ascq);
35e0e757 74static void target_complete_ok_work(struct work_struct *work);
c66ac9db 75
e3d6f909 76int init_se_kmem_caches(void)
c66ac9db 77{
c66ac9db
NB
78 se_sess_cache = kmem_cache_create("se_sess_cache",
79 sizeof(struct se_session), __alignof__(struct se_session),
80 0, NULL);
6708bb27
AG
81 if (!se_sess_cache) {
82 pr_err("kmem_cache_create() for struct se_session"
c66ac9db 83 " failed\n");
c8e31f26 84 goto out;
c66ac9db
NB
85 }
86 se_ua_cache = kmem_cache_create("se_ua_cache",
87 sizeof(struct se_ua), __alignof__(struct se_ua),
88 0, NULL);
6708bb27
AG
89 if (!se_ua_cache) {
90 pr_err("kmem_cache_create() for struct se_ua failed\n");
35e0e757 91 goto out_free_sess_cache;
c66ac9db 92 }
c66ac9db
NB
93 t10_pr_reg_cache = kmem_cache_create("t10_pr_reg_cache",
94 sizeof(struct t10_pr_registration),
95 __alignof__(struct t10_pr_registration), 0, NULL);
6708bb27
AG
96 if (!t10_pr_reg_cache) {
97 pr_err("kmem_cache_create() for struct t10_pr_registration"
c66ac9db 98 " failed\n");
35e0e757 99 goto out_free_ua_cache;
c66ac9db
NB
100 }
101 t10_alua_lu_gp_cache = kmem_cache_create("t10_alua_lu_gp_cache",
102 sizeof(struct t10_alua_lu_gp), __alignof__(struct t10_alua_lu_gp),
103 0, NULL);
6708bb27
AG
104 if (!t10_alua_lu_gp_cache) {
105 pr_err("kmem_cache_create() for t10_alua_lu_gp_cache"
c66ac9db 106 " failed\n");
35e0e757 107 goto out_free_pr_reg_cache;
c66ac9db
NB
108 }
109 t10_alua_lu_gp_mem_cache = kmem_cache_create("t10_alua_lu_gp_mem_cache",
110 sizeof(struct t10_alua_lu_gp_member),
111 __alignof__(struct t10_alua_lu_gp_member), 0, NULL);
6708bb27
AG
112 if (!t10_alua_lu_gp_mem_cache) {
113 pr_err("kmem_cache_create() for t10_alua_lu_gp_mem_"
c66ac9db 114 "cache failed\n");
35e0e757 115 goto out_free_lu_gp_cache;
c66ac9db
NB
116 }
117 t10_alua_tg_pt_gp_cache = kmem_cache_create("t10_alua_tg_pt_gp_cache",
118 sizeof(struct t10_alua_tg_pt_gp),
119 __alignof__(struct t10_alua_tg_pt_gp), 0, NULL);
6708bb27
AG
120 if (!t10_alua_tg_pt_gp_cache) {
121 pr_err("kmem_cache_create() for t10_alua_tg_pt_gp_"
c66ac9db 122 "cache failed\n");
35e0e757 123 goto out_free_lu_gp_mem_cache;
c66ac9db
NB
124 }
125 t10_alua_tg_pt_gp_mem_cache = kmem_cache_create(
126 "t10_alua_tg_pt_gp_mem_cache",
127 sizeof(struct t10_alua_tg_pt_gp_member),
128 __alignof__(struct t10_alua_tg_pt_gp_member),
129 0, NULL);
6708bb27
AG
130 if (!t10_alua_tg_pt_gp_mem_cache) {
131 pr_err("kmem_cache_create() for t10_alua_tg_pt_gp_"
c66ac9db 132 "mem_t failed\n");
35e0e757 133 goto out_free_tg_pt_gp_cache;
c66ac9db
NB
134 }
135
35e0e757
CH
136 target_completion_wq = alloc_workqueue("target_completion",
137 WQ_MEM_RECLAIM, 0);
138 if (!target_completion_wq)
139 goto out_free_tg_pt_gp_mem_cache;
140
c66ac9db 141 return 0;
35e0e757
CH
142
143out_free_tg_pt_gp_mem_cache:
144 kmem_cache_destroy(t10_alua_tg_pt_gp_mem_cache);
145out_free_tg_pt_gp_cache:
146 kmem_cache_destroy(t10_alua_tg_pt_gp_cache);
147out_free_lu_gp_mem_cache:
148 kmem_cache_destroy(t10_alua_lu_gp_mem_cache);
149out_free_lu_gp_cache:
150 kmem_cache_destroy(t10_alua_lu_gp_cache);
151out_free_pr_reg_cache:
152 kmem_cache_destroy(t10_pr_reg_cache);
153out_free_ua_cache:
154 kmem_cache_destroy(se_ua_cache);
155out_free_sess_cache:
156 kmem_cache_destroy(se_sess_cache);
c66ac9db 157out:
e3d6f909 158 return -ENOMEM;
c66ac9db
NB
159}
160
e3d6f909 161void release_se_kmem_caches(void)
c66ac9db 162{
35e0e757 163 destroy_workqueue(target_completion_wq);
c66ac9db
NB
164 kmem_cache_destroy(se_sess_cache);
165 kmem_cache_destroy(se_ua_cache);
c66ac9db
NB
166 kmem_cache_destroy(t10_pr_reg_cache);
167 kmem_cache_destroy(t10_alua_lu_gp_cache);
168 kmem_cache_destroy(t10_alua_lu_gp_mem_cache);
169 kmem_cache_destroy(t10_alua_tg_pt_gp_cache);
170 kmem_cache_destroy(t10_alua_tg_pt_gp_mem_cache);
c66ac9db
NB
171}
172
e3d6f909
AG
173/* This code ensures unique mib indexes are handed out. */
174static DEFINE_SPINLOCK(scsi_mib_index_lock);
175static u32 scsi_mib_index[SCSI_INDEX_TYPE_MAX];
e89d15ee
NB
176
177/*
178 * Allocate a new row index for the entry type specified
179 */
180u32 scsi_get_new_index(scsi_index_t type)
181{
182 u32 new_index;
183
e3d6f909 184 BUG_ON((type < 0) || (type >= SCSI_INDEX_TYPE_MAX));
e89d15ee 185
e3d6f909
AG
186 spin_lock(&scsi_mib_index_lock);
187 new_index = ++scsi_mib_index[type];
188 spin_unlock(&scsi_mib_index_lock);
e89d15ee
NB
189
190 return new_index;
191}
192
dbc5623e 193void transport_subsystem_check_init(void)
c66ac9db
NB
194{
195 int ret;
283669d2 196 static int sub_api_initialized;
c66ac9db 197
dbc5623e
NB
198 if (sub_api_initialized)
199 return;
200
c66ac9db
NB
201 ret = request_module("target_core_iblock");
202 if (ret != 0)
6708bb27 203 pr_err("Unable to load target_core_iblock\n");
c66ac9db
NB
204
205 ret = request_module("target_core_file");
206 if (ret != 0)
6708bb27 207 pr_err("Unable to load target_core_file\n");
c66ac9db
NB
208
209 ret = request_module("target_core_pscsi");
210 if (ret != 0)
6708bb27 211 pr_err("Unable to load target_core_pscsi\n");
c66ac9db 212
e3d6f909 213 sub_api_initialized = 1;
c66ac9db
NB
214}
215
216struct se_session *transport_init_session(void)
217{
218 struct se_session *se_sess;
219
220 se_sess = kmem_cache_zalloc(se_sess_cache, GFP_KERNEL);
6708bb27
AG
221 if (!se_sess) {
222 pr_err("Unable to allocate struct se_session from"
c66ac9db
NB
223 " se_sess_cache\n");
224 return ERR_PTR(-ENOMEM);
225 }
226 INIT_LIST_HEAD(&se_sess->sess_list);
227 INIT_LIST_HEAD(&se_sess->sess_acl_list);
a17f091d 228 INIT_LIST_HEAD(&se_sess->sess_cmd_list);
a17f091d 229 spin_lock_init(&se_sess->sess_cmd_lock);
41ac82b6 230 kref_init(&se_sess->sess_kref);
c66ac9db
NB
231
232 return se_sess;
233}
234EXPORT_SYMBOL(transport_init_session);
235
236/*
140854cb 237 * Called with spin_lock_irqsave(&struct se_portal_group->session_lock called.
c66ac9db
NB
238 */
239void __transport_register_session(
240 struct se_portal_group *se_tpg,
241 struct se_node_acl *se_nacl,
242 struct se_session *se_sess,
243 void *fabric_sess_ptr)
244{
245 unsigned char buf[PR_REG_ISID_LEN];
246
247 se_sess->se_tpg = se_tpg;
248 se_sess->fabric_sess_ptr = fabric_sess_ptr;
249 /*
250 * Used by struct se_node_acl's under ConfigFS to locate active se_session-t
251 *
252 * Only set for struct se_session's that will actually be moving I/O.
253 * eg: *NOT* discovery sessions.
254 */
255 if (se_nacl) {
256 /*
257 * If the fabric module supports an ISID based TransportID,
258 * save this value in binary from the fabric I_T Nexus now.
259 */
e3d6f909 260 if (se_tpg->se_tpg_tfo->sess_get_initiator_sid != NULL) {
c66ac9db 261 memset(&buf[0], 0, PR_REG_ISID_LEN);
e3d6f909 262 se_tpg->se_tpg_tfo->sess_get_initiator_sid(se_sess,
c66ac9db
NB
263 &buf[0], PR_REG_ISID_LEN);
264 se_sess->sess_bin_isid = get_unaligned_be64(&buf[0]);
265 }
afb999ff
NB
266 kref_get(&se_nacl->acl_kref);
267
c66ac9db
NB
268 spin_lock_irq(&se_nacl->nacl_sess_lock);
269 /*
270 * The se_nacl->nacl_sess pointer will be set to the
271 * last active I_T Nexus for each struct se_node_acl.
272 */
273 se_nacl->nacl_sess = se_sess;
274
275 list_add_tail(&se_sess->sess_acl_list,
276 &se_nacl->acl_sess_list);
277 spin_unlock_irq(&se_nacl->nacl_sess_lock);
278 }
279 list_add_tail(&se_sess->sess_list, &se_tpg->tpg_sess_list);
280
6708bb27 281 pr_debug("TARGET_CORE[%s]: Registered fabric_sess_ptr: %p\n",
e3d6f909 282 se_tpg->se_tpg_tfo->get_fabric_name(), se_sess->fabric_sess_ptr);
c66ac9db
NB
283}
284EXPORT_SYMBOL(__transport_register_session);
285
286void transport_register_session(
287 struct se_portal_group *se_tpg,
288 struct se_node_acl *se_nacl,
289 struct se_session *se_sess,
290 void *fabric_sess_ptr)
291{
140854cb
NB
292 unsigned long flags;
293
294 spin_lock_irqsave(&se_tpg->session_lock, flags);
c66ac9db 295 __transport_register_session(se_tpg, se_nacl, se_sess, fabric_sess_ptr);
140854cb 296 spin_unlock_irqrestore(&se_tpg->session_lock, flags);
c66ac9db
NB
297}
298EXPORT_SYMBOL(transport_register_session);
299
4149268e 300void target_release_session(struct kref *kref)
41ac82b6
NB
301{
302 struct se_session *se_sess = container_of(kref,
303 struct se_session, sess_kref);
304 struct se_portal_group *se_tpg = se_sess->se_tpg;
305
306 se_tpg->se_tpg_tfo->close_session(se_sess);
307}
308
309void target_get_session(struct se_session *se_sess)
310{
311 kref_get(&se_sess->sess_kref);
312}
313EXPORT_SYMBOL(target_get_session);
314
33933a0e 315void target_put_session(struct se_session *se_sess)
41ac82b6 316{
4149268e
JE
317 struct se_portal_group *tpg = se_sess->se_tpg;
318
319 if (tpg->se_tpg_tfo->put_session != NULL) {
320 tpg->se_tpg_tfo->put_session(se_sess);
321 return;
322 }
33933a0e 323 kref_put(&se_sess->sess_kref, target_release_session);
41ac82b6
NB
324}
325EXPORT_SYMBOL(target_put_session);
326
afb999ff
NB
327static void target_complete_nacl(struct kref *kref)
328{
329 struct se_node_acl *nacl = container_of(kref,
330 struct se_node_acl, acl_kref);
331
332 complete(&nacl->acl_free_comp);
333}
334
335void target_put_nacl(struct se_node_acl *nacl)
336{
337 kref_put(&nacl->acl_kref, target_complete_nacl);
338}
339
c66ac9db
NB
340void transport_deregister_session_configfs(struct se_session *se_sess)
341{
342 struct se_node_acl *se_nacl;
23388864 343 unsigned long flags;
c66ac9db
NB
344 /*
345 * Used by struct se_node_acl's under ConfigFS to locate active struct se_session
346 */
347 se_nacl = se_sess->se_node_acl;
6708bb27 348 if (se_nacl) {
23388864 349 spin_lock_irqsave(&se_nacl->nacl_sess_lock, flags);
337c0607
NB
350 if (se_nacl->acl_stop == 0)
351 list_del(&se_sess->sess_acl_list);
c66ac9db
NB
352 /*
353 * If the session list is empty, then clear the pointer.
354 * Otherwise, set the struct se_session pointer from the tail
355 * element of the per struct se_node_acl active session list.
356 */
357 if (list_empty(&se_nacl->acl_sess_list))
358 se_nacl->nacl_sess = NULL;
359 else {
360 se_nacl->nacl_sess = container_of(
361 se_nacl->acl_sess_list.prev,
362 struct se_session, sess_acl_list);
363 }
23388864 364 spin_unlock_irqrestore(&se_nacl->nacl_sess_lock, flags);
c66ac9db
NB
365 }
366}
367EXPORT_SYMBOL(transport_deregister_session_configfs);
368
369void transport_free_session(struct se_session *se_sess)
370{
371 kmem_cache_free(se_sess_cache, se_sess);
372}
373EXPORT_SYMBOL(transport_free_session);
374
375void transport_deregister_session(struct se_session *se_sess)
376{
377 struct se_portal_group *se_tpg = se_sess->se_tpg;
01468346 378 struct target_core_fabric_ops *se_tfo;
c66ac9db 379 struct se_node_acl *se_nacl;
e63a8e19 380 unsigned long flags;
01468346 381 bool comp_nacl = true;
c66ac9db 382
6708bb27 383 if (!se_tpg) {
c66ac9db
NB
384 transport_free_session(se_sess);
385 return;
386 }
01468346 387 se_tfo = se_tpg->se_tpg_tfo;
c66ac9db 388
e63a8e19 389 spin_lock_irqsave(&se_tpg->session_lock, flags);
c66ac9db
NB
390 list_del(&se_sess->sess_list);
391 se_sess->se_tpg = NULL;
392 se_sess->fabric_sess_ptr = NULL;
e63a8e19 393 spin_unlock_irqrestore(&se_tpg->session_lock, flags);
c66ac9db
NB
394
395 /*
396 * Determine if we need to do extra work for this initiator node's
397 * struct se_node_acl if it had been previously dynamically generated.
398 */
399 se_nacl = se_sess->se_node_acl;
01468346
NB
400
401 spin_lock_irqsave(&se_tpg->acl_node_lock, flags);
402 if (se_nacl && se_nacl->dynamic_node_acl) {
403 if (!se_tfo->tpg_check_demo_mode_cache(se_tpg)) {
404 list_del(&se_nacl->acl_list);
405 se_tpg->num_node_acls--;
406 spin_unlock_irqrestore(&se_tpg->acl_node_lock, flags);
407 core_tpg_wait_for_nacl_pr_ref(se_nacl);
408 core_free_device_list_for_node(se_nacl, se_tpg);
409 se_tfo->tpg_release_fabric_acl(se_tpg, se_nacl);
410
411 comp_nacl = false;
412 spin_lock_irqsave(&se_tpg->acl_node_lock, flags);
c66ac9db 413 }
c66ac9db 414 }
01468346 415 spin_unlock_irqrestore(&se_tpg->acl_node_lock, flags);
c66ac9db 416
6708bb27 417 pr_debug("TARGET_CORE[%s]: Deregistered fabric_sess\n",
e3d6f909 418 se_tpg->se_tpg_tfo->get_fabric_name());
01468346 419 /*
afb999ff
NB
420 * If last kref is dropping now for an explict NodeACL, awake sleeping
421 * ->acl_free_comp caller to wakeup configfs se_node_acl->acl_group
422 * removal context.
01468346
NB
423 */
424 if (se_nacl && comp_nacl == true)
afb999ff 425 target_put_nacl(se_nacl);
01468346 426
afb999ff 427 transport_free_session(se_sess);
c66ac9db
NB
428}
429EXPORT_SYMBOL(transport_deregister_session);
430
431/*
a1d8b49a 432 * Called with cmd->t_state_lock held.
c66ac9db 433 */
cf572a96 434static void target_remove_from_state_list(struct se_cmd *cmd)
c66ac9db 435{
42bf829e 436 struct se_device *dev = cmd->se_dev;
c66ac9db
NB
437 unsigned long flags;
438
42bf829e
CH
439 if (!dev)
440 return;
c66ac9db 441
cf572a96
CH
442 if (cmd->transport_state & CMD_T_BUSY)
443 return;
c66ac9db 444
cf572a96
CH
445 spin_lock_irqsave(&dev->execute_task_lock, flags);
446 if (cmd->state_active) {
447 list_del(&cmd->state_list);
cf572a96 448 cmd->state_active = false;
c66ac9db 449 }
cf572a96 450 spin_unlock_irqrestore(&dev->execute_task_lock, flags);
c66ac9db
NB
451}
452
f7113a47 453static int transport_cmd_check_stop(struct se_cmd *cmd, bool remove_from_lists)
c66ac9db
NB
454{
455 unsigned long flags;
456
a1d8b49a 457 spin_lock_irqsave(&cmd->t_state_lock, flags);
c66ac9db
NB
458 /*
459 * Determine if IOCTL context caller in requesting the stopping of this
460 * command for LUN shutdown purposes.
461 */
7d680f3b
CH
462 if (cmd->transport_state & CMD_T_LUN_STOP) {
463 pr_debug("%s:%d CMD_T_LUN_STOP for ITT: 0x%08x\n",
464 __func__, __LINE__, cmd->se_tfo->get_task_tag(cmd));
c66ac9db 465
7d680f3b 466 cmd->transport_state &= ~CMD_T_ACTIVE;
f7113a47 467 if (remove_from_lists)
cf572a96 468 target_remove_from_state_list(cmd);
a1d8b49a 469 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
c66ac9db 470
a1d8b49a 471 complete(&cmd->transport_lun_stop_comp);
c66ac9db
NB
472 return 1;
473 }
f7113a47
CH
474
475 if (remove_from_lists) {
476 target_remove_from_state_list(cmd);
477
478 /*
479 * Clear struct se_cmd->se_lun before the handoff to FE.
480 */
481 cmd->se_lun = NULL;
482 }
483
c66ac9db
NB
484 /*
485 * Determine if frontend context caller is requesting the stopping of
e3d6f909 486 * this command for frontend exceptions.
c66ac9db 487 */
7d680f3b
CH
488 if (cmd->transport_state & CMD_T_STOP) {
489 pr_debug("%s:%d CMD_T_STOP for ITT: 0x%08x\n",
490 __func__, __LINE__,
e3d6f909 491 cmd->se_tfo->get_task_tag(cmd));
c66ac9db 492
a1d8b49a 493 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
c66ac9db 494
a1d8b49a 495 complete(&cmd->t_transport_stop_comp);
c66ac9db
NB
496 return 1;
497 }
f7113a47
CH
498
499 cmd->transport_state &= ~CMD_T_ACTIVE;
500 if (remove_from_lists) {
501 /*
502 * Some fabric modules like tcm_loop can release
503 * their internally allocated I/O reference now and
504 * struct se_cmd now.
505 *
506 * Fabric modules are expected to return '1' here if the
507 * se_cmd being passed is released at this point,
508 * or zero if not being released.
509 */
510 if (cmd->se_tfo->check_stop_free != NULL) {
511 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
512 return cmd->se_tfo->check_stop_free(cmd);
c66ac9db 513 }
f7113a47 514 }
c66ac9db 515
a1d8b49a 516 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
c66ac9db
NB
517 return 0;
518}
519
520static int transport_cmd_check_stop_to_fabric(struct se_cmd *cmd)
521{
f7113a47 522 return transport_cmd_check_stop(cmd, true);
c66ac9db
NB
523}
524
525static void transport_lun_remove_cmd(struct se_cmd *cmd)
526{
e3d6f909 527 struct se_lun *lun = cmd->se_lun;
c66ac9db
NB
528 unsigned long flags;
529
530 if (!lun)
531 return;
532
a1d8b49a 533 spin_lock_irqsave(&cmd->t_state_lock, flags);
7d680f3b
CH
534 if (cmd->transport_state & CMD_T_DEV_ACTIVE) {
535 cmd->transport_state &= ~CMD_T_DEV_ACTIVE;
cf572a96 536 target_remove_from_state_list(cmd);
c66ac9db 537 }
a1d8b49a 538 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
c66ac9db 539
c66ac9db 540 spin_lock_irqsave(&lun->lun_cmd_lock, flags);
3d26fea0
CH
541 if (!list_empty(&cmd->se_lun_node))
542 list_del_init(&cmd->se_lun_node);
c66ac9db
NB
543 spin_unlock_irqrestore(&lun->lun_cmd_lock, flags);
544}
545
546void transport_cmd_finish_abort(struct se_cmd *cmd, int remove)
547{
c8e31f26 548 if (!(cmd->se_cmd_flags & SCF_SCSI_TMR_CDB))
8dc52b54 549 transport_lun_remove_cmd(cmd);
c66ac9db
NB
550
551 if (transport_cmd_check_stop_to_fabric(cmd))
552 return;
af877292 553 if (remove)
e6a2573f 554 transport_put_cmd(cmd);
c66ac9db
NB
555}
556
35e0e757
CH
557static void target_complete_failure_work(struct work_struct *work)
558{
559 struct se_cmd *cmd = container_of(work, struct se_cmd, work);
560
03e98c9e 561 transport_generic_request_failure(cmd);
35e0e757
CH
562}
563
6138ed2a 564/*
d5829eac
PB
565 * Used when asking transport to copy Sense Data from the underlying
566 * Linux/SCSI struct scsi_cmnd
6138ed2a 567 */
d5829eac 568static unsigned char *transport_get_sense_buffer(struct se_cmd *cmd)
6138ed2a 569{
6138ed2a 570 struct se_device *dev = cmd->se_dev;
6138ed2a
PB
571
572 WARN_ON(!cmd->se_lun);
573
574 if (!dev)
d5829eac 575 return NULL;
6138ed2a 576
d5829eac
PB
577 if (cmd->se_cmd_flags & SCF_SENT_CHECK_CONDITION)
578 return NULL;
6138ed2a 579
9c58b7dd 580 cmd->scsi_sense_length = TRANSPORT_SENSE_BUFFER;
6138ed2a 581
d5829eac 582 pr_debug("HBA_[%u]_PLUG[%s]: Requesting sense for SAM STATUS: 0x%02x\n",
6138ed2a 583 dev->se_hba->hba_id, dev->transport->name, cmd->scsi_status);
9c58b7dd 584 return cmd->sense_buffer;
6138ed2a
PB
585}
586
5787cacd 587void target_complete_cmd(struct se_cmd *cmd, u8 scsi_status)
c66ac9db 588{
42bf829e 589 struct se_device *dev = cmd->se_dev;
5787cacd 590 int success = scsi_status == GOOD;
c66ac9db 591 unsigned long flags;
c66ac9db 592
5787cacd
CH
593 cmd->scsi_status = scsi_status;
594
595
a1d8b49a 596 spin_lock_irqsave(&cmd->t_state_lock, flags);
cf572a96 597 cmd->transport_state &= ~CMD_T_BUSY;
c66ac9db 598
c66ac9db 599 if (dev && dev->transport->transport_complete) {
d5829eac
PB
600 dev->transport->transport_complete(cmd,
601 cmd->t_data_sg,
602 transport_get_sense_buffer(cmd));
603 if (cmd->se_cmd_flags & SCF_TRANSPORT_TASK_SENSE)
c66ac9db 604 success = 1;
c66ac9db
NB
605 }
606
607 /*
5787cacd 608 * See if we are waiting to complete for an exception condition.
c66ac9db 609 */
cf572a96 610 if (cmd->transport_state & CMD_T_REQUEST_STOP) {
a1d8b49a 611 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
cf572a96 612 complete(&cmd->task_stop_comp);
c66ac9db
NB
613 return;
614 }
2235007c
CH
615
616 if (!success)
7d680f3b 617 cmd->transport_state |= CMD_T_FAILED;
2235007c 618
3d28934a
NB
619 /*
620 * Check for case where an explict ABORT_TASK has been received
621 * and transport_wait_for_tasks() will be waiting for completion..
622 */
623 if (cmd->transport_state & CMD_T_ABORTED &&
624 cmd->transport_state & CMD_T_STOP) {
625 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
626 complete(&cmd->t_transport_stop_comp);
627 return;
628 } else if (cmd->transport_state & CMD_T_FAILED) {
41e16e98 629 cmd->scsi_sense_reason = TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
35e0e757 630 INIT_WORK(&cmd->work, target_complete_failure_work);
c66ac9db 631 } else {
35e0e757 632 INIT_WORK(&cmd->work, target_complete_ok_work);
c66ac9db 633 }
35e0e757 634
35e0e757 635 cmd->t_state = TRANSPORT_COMPLETE;
3d28934a 636 cmd->transport_state |= (CMD_T_COMPLETE | CMD_T_ACTIVE);
a1d8b49a 637 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
c66ac9db 638
35e0e757 639 queue_work(target_completion_wq, &cmd->work);
c66ac9db 640}
6bb35e00
CH
641EXPORT_SYMBOL(target_complete_cmd);
642
cf572a96 643static void target_add_to_state_list(struct se_cmd *cmd)
c66ac9db 644{
cf572a96
CH
645 struct se_device *dev = cmd->se_dev;
646 unsigned long flags;
c66ac9db 647
cf572a96
CH
648 spin_lock_irqsave(&dev->execute_task_lock, flags);
649 if (!cmd->state_active) {
650 list_add_tail(&cmd->state_list, &dev->state_list);
651 cmd->state_active = true;
c66ac9db 652 }
cf572a96 653 spin_unlock_irqrestore(&dev->execute_task_lock, flags);
c66ac9db
NB
654}
655
07bde79a 656/*
f147abb4 657 * Handle QUEUE_FULL / -EAGAIN and -ENOMEM status
07bde79a 658 */
7a6f0a1e
CH
659static void transport_write_pending_qf(struct se_cmd *cmd);
660static void transport_complete_qf(struct se_cmd *cmd);
07bde79a
NB
661
662static void target_qf_do_work(struct work_struct *work)
663{
664 struct se_device *dev = container_of(work, struct se_device,
665 qf_work_queue);
bcac364a 666 LIST_HEAD(qf_cmd_list);
07bde79a
NB
667 struct se_cmd *cmd, *cmd_tmp;
668
669 spin_lock_irq(&dev->qf_cmd_lock);
bcac364a
RD
670 list_splice_init(&dev->qf_cmd_list, &qf_cmd_list);
671 spin_unlock_irq(&dev->qf_cmd_lock);
07bde79a 672
bcac364a 673 list_for_each_entry_safe(cmd, cmd_tmp, &qf_cmd_list, se_qf_node) {
07bde79a
NB
674 list_del(&cmd->se_qf_node);
675 atomic_dec(&dev->dev_qf_count);
676 smp_mb__after_atomic_dec();
07bde79a 677
6708bb27 678 pr_debug("Processing %s cmd: %p QUEUE_FULL in work queue"
07bde79a 679 " context: %s\n", cmd->se_tfo->get_fabric_name(), cmd,
e057f533 680 (cmd->t_state == TRANSPORT_COMPLETE_QF_OK) ? "COMPLETE_OK" :
07bde79a
NB
681 (cmd->t_state == TRANSPORT_COMPLETE_QF_WP) ? "WRITE_PENDING"
682 : "UNKNOWN");
f7a5cc0b 683
7a6f0a1e
CH
684 if (cmd->t_state == TRANSPORT_COMPLETE_QF_WP)
685 transport_write_pending_qf(cmd);
686 else if (cmd->t_state == TRANSPORT_COMPLETE_QF_OK)
687 transport_complete_qf(cmd);
07bde79a 688 }
07bde79a
NB
689}
690
c66ac9db
NB
691unsigned char *transport_dump_cmd_direction(struct se_cmd *cmd)
692{
693 switch (cmd->data_direction) {
694 case DMA_NONE:
695 return "NONE";
696 case DMA_FROM_DEVICE:
697 return "READ";
698 case DMA_TO_DEVICE:
699 return "WRITE";
700 case DMA_BIDIRECTIONAL:
701 return "BIDI";
702 default:
703 break;
704 }
705
706 return "UNKNOWN";
707}
708
709void transport_dump_dev_state(
710 struct se_device *dev,
711 char *b,
712 int *bl)
713{
714 *bl += sprintf(b + *bl, "Status: ");
715 switch (dev->dev_status) {
716 case TRANSPORT_DEVICE_ACTIVATED:
717 *bl += sprintf(b + *bl, "ACTIVATED");
718 break;
719 case TRANSPORT_DEVICE_DEACTIVATED:
720 *bl += sprintf(b + *bl, "DEACTIVATED");
721 break;
722 case TRANSPORT_DEVICE_SHUTDOWN:
723 *bl += sprintf(b + *bl, "SHUTDOWN");
724 break;
725 case TRANSPORT_DEVICE_OFFLINE_ACTIVATED:
726 case TRANSPORT_DEVICE_OFFLINE_DEACTIVATED:
727 *bl += sprintf(b + *bl, "OFFLINE");
728 break;
729 default:
730 *bl += sprintf(b + *bl, "UNKNOWN=%d", dev->dev_status);
731 break;
732 }
733
5f41a31d 734 *bl += sprintf(b + *bl, " Max Queue Depth: %d", dev->queue_depth);
11e764bd
NB
735 *bl += sprintf(b + *bl, " SectorSize: %u HwMaxSectors: %u\n",
736 dev->se_sub_dev->se_dev_attrib.block_size,
737 dev->se_sub_dev->se_dev_attrib.hw_max_sectors);
c66ac9db
NB
738 *bl += sprintf(b + *bl, " ");
739}
740
c66ac9db
NB
741void transport_dump_vpd_proto_id(
742 struct t10_vpd *vpd,
743 unsigned char *p_buf,
744 int p_buf_len)
745{
746 unsigned char buf[VPD_TMP_BUF_SIZE];
747 int len;
748
749 memset(buf, 0, VPD_TMP_BUF_SIZE);
750 len = sprintf(buf, "T10 VPD Protocol Identifier: ");
751
752 switch (vpd->protocol_identifier) {
753 case 0x00:
754 sprintf(buf+len, "Fibre Channel\n");
755 break;
756 case 0x10:
757 sprintf(buf+len, "Parallel SCSI\n");
758 break;
759 case 0x20:
760 sprintf(buf+len, "SSA\n");
761 break;
762 case 0x30:
763 sprintf(buf+len, "IEEE 1394\n");
764 break;
765 case 0x40:
766 sprintf(buf+len, "SCSI Remote Direct Memory Access"
767 " Protocol\n");
768 break;
769 case 0x50:
770 sprintf(buf+len, "Internet SCSI (iSCSI)\n");
771 break;
772 case 0x60:
773 sprintf(buf+len, "SAS Serial SCSI Protocol\n");
774 break;
775 case 0x70:
776 sprintf(buf+len, "Automation/Drive Interface Transport"
777 " Protocol\n");
778 break;
779 case 0x80:
780 sprintf(buf+len, "AT Attachment Interface ATA/ATAPI\n");
781 break;
782 default:
783 sprintf(buf+len, "Unknown 0x%02x\n",
784 vpd->protocol_identifier);
785 break;
786 }
787
788 if (p_buf)
789 strncpy(p_buf, buf, p_buf_len);
790 else
6708bb27 791 pr_debug("%s", buf);
c66ac9db
NB
792}
793
794void
795transport_set_vpd_proto_id(struct t10_vpd *vpd, unsigned char *page_83)
796{
797 /*
798 * Check if the Protocol Identifier Valid (PIV) bit is set..
799 *
800 * from spc3r23.pdf section 7.5.1
801 */
802 if (page_83[1] & 0x80) {
803 vpd->protocol_identifier = (page_83[0] & 0xf0);
804 vpd->protocol_identifier_set = 1;
805 transport_dump_vpd_proto_id(vpd, NULL, 0);
806 }
807}
808EXPORT_SYMBOL(transport_set_vpd_proto_id);
809
810int transport_dump_vpd_assoc(
811 struct t10_vpd *vpd,
812 unsigned char *p_buf,
813 int p_buf_len)
814{
815 unsigned char buf[VPD_TMP_BUF_SIZE];
e3d6f909
AG
816 int ret = 0;
817 int len;
c66ac9db
NB
818
819 memset(buf, 0, VPD_TMP_BUF_SIZE);
820 len = sprintf(buf, "T10 VPD Identifier Association: ");
821
822 switch (vpd->association) {
823 case 0x00:
824 sprintf(buf+len, "addressed logical unit\n");
825 break;
826 case 0x10:
827 sprintf(buf+len, "target port\n");
828 break;
829 case 0x20:
830 sprintf(buf+len, "SCSI target device\n");
831 break;
832 default:
833 sprintf(buf+len, "Unknown 0x%02x\n", vpd->association);
e3d6f909 834 ret = -EINVAL;
c66ac9db
NB
835 break;
836 }
837
838 if (p_buf)
839 strncpy(p_buf, buf, p_buf_len);
840 else
6708bb27 841 pr_debug("%s", buf);
c66ac9db
NB
842
843 return ret;
844}
845
846int transport_set_vpd_assoc(struct t10_vpd *vpd, unsigned char *page_83)
847{
848 /*
849 * The VPD identification association..
850 *
851 * from spc3r23.pdf Section 7.6.3.1 Table 297
852 */
853 vpd->association = (page_83[1] & 0x30);
854 return transport_dump_vpd_assoc(vpd, NULL, 0);
855}
856EXPORT_SYMBOL(transport_set_vpd_assoc);
857
858int transport_dump_vpd_ident_type(
859 struct t10_vpd *vpd,
860 unsigned char *p_buf,
861 int p_buf_len)
862{
863 unsigned char buf[VPD_TMP_BUF_SIZE];
e3d6f909
AG
864 int ret = 0;
865 int len;
c66ac9db
NB
866
867 memset(buf, 0, VPD_TMP_BUF_SIZE);
868 len = sprintf(buf, "T10 VPD Identifier Type: ");
869
870 switch (vpd->device_identifier_type) {
871 case 0x00:
872 sprintf(buf+len, "Vendor specific\n");
873 break;
874 case 0x01:
875 sprintf(buf+len, "T10 Vendor ID based\n");
876 break;
877 case 0x02:
878 sprintf(buf+len, "EUI-64 based\n");
879 break;
880 case 0x03:
881 sprintf(buf+len, "NAA\n");
882 break;
883 case 0x04:
884 sprintf(buf+len, "Relative target port identifier\n");
885 break;
886 case 0x08:
887 sprintf(buf+len, "SCSI name string\n");
888 break;
889 default:
890 sprintf(buf+len, "Unsupported: 0x%02x\n",
891 vpd->device_identifier_type);
e3d6f909 892 ret = -EINVAL;
c66ac9db
NB
893 break;
894 }
895
e3d6f909
AG
896 if (p_buf) {
897 if (p_buf_len < strlen(buf)+1)
898 return -EINVAL;
c66ac9db 899 strncpy(p_buf, buf, p_buf_len);
e3d6f909 900 } else {
6708bb27 901 pr_debug("%s", buf);
e3d6f909 902 }
c66ac9db
NB
903
904 return ret;
905}
906
907int transport_set_vpd_ident_type(struct t10_vpd *vpd, unsigned char *page_83)
908{
909 /*
910 * The VPD identifier type..
911 *
912 * from spc3r23.pdf Section 7.6.3.1 Table 298
913 */
914 vpd->device_identifier_type = (page_83[1] & 0x0f);
915 return transport_dump_vpd_ident_type(vpd, NULL, 0);
916}
917EXPORT_SYMBOL(transport_set_vpd_ident_type);
918
919int transport_dump_vpd_ident(
920 struct t10_vpd *vpd,
921 unsigned char *p_buf,
922 int p_buf_len)
923{
924 unsigned char buf[VPD_TMP_BUF_SIZE];
925 int ret = 0;
926
927 memset(buf, 0, VPD_TMP_BUF_SIZE);
928
929 switch (vpd->device_identifier_code_set) {
930 case 0x01: /* Binary */
931 sprintf(buf, "T10 VPD Binary Device Identifier: %s\n",
932 &vpd->device_identifier[0]);
933 break;
934 case 0x02: /* ASCII */
935 sprintf(buf, "T10 VPD ASCII Device Identifier: %s\n",
936 &vpd->device_identifier[0]);
937 break;
938 case 0x03: /* UTF-8 */
939 sprintf(buf, "T10 VPD UTF-8 Device Identifier: %s\n",
940 &vpd->device_identifier[0]);
941 break;
942 default:
943 sprintf(buf, "T10 VPD Device Identifier encoding unsupported:"
944 " 0x%02x", vpd->device_identifier_code_set);
e3d6f909 945 ret = -EINVAL;
c66ac9db
NB
946 break;
947 }
948
949 if (p_buf)
950 strncpy(p_buf, buf, p_buf_len);
951 else
6708bb27 952 pr_debug("%s", buf);
c66ac9db
NB
953
954 return ret;
955}
956
957int
958transport_set_vpd_ident(struct t10_vpd *vpd, unsigned char *page_83)
959{
960 static const char hex_str[] = "0123456789abcdef";
35d1efe8 961 int j = 0, i = 4; /* offset to start of the identifier */
c66ac9db
NB
962
963 /*
964 * The VPD Code Set (encoding)
965 *
966 * from spc3r23.pdf Section 7.6.3.1 Table 296
967 */
968 vpd->device_identifier_code_set = (page_83[0] & 0x0f);
969 switch (vpd->device_identifier_code_set) {
970 case 0x01: /* Binary */
971 vpd->device_identifier[j++] =
972 hex_str[vpd->device_identifier_type];
973 while (i < (4 + page_83[3])) {
974 vpd->device_identifier[j++] =
975 hex_str[(page_83[i] & 0xf0) >> 4];
976 vpd->device_identifier[j++] =
977 hex_str[page_83[i] & 0x0f];
978 i++;
979 }
980 break;
981 case 0x02: /* ASCII */
982 case 0x03: /* UTF-8 */
983 while (i < (4 + page_83[3]))
984 vpd->device_identifier[j++] = page_83[i++];
985 break;
986 default:
987 break;
988 }
989
990 return transport_dump_vpd_ident(vpd, NULL, 0);
991}
992EXPORT_SYMBOL(transport_set_vpd_ident);
993
994static void core_setup_task_attr_emulation(struct se_device *dev)
995{
996 /*
997 * If this device is from Target_Core_Mod/pSCSI, disable the
998 * SAM Task Attribute emulation.
999 *
1000 * This is currently not available in upsream Linux/SCSI Target
1001 * mode code, and is assumed to be disabled while using TCM/pSCSI.
1002 */
e3d6f909 1003 if (dev->transport->transport_type == TRANSPORT_PLUGIN_PHBA_PDEV) {
c66ac9db
NB
1004 dev->dev_task_attr_type = SAM_TASK_ATTR_PASSTHROUGH;
1005 return;
1006 }
1007
1008 dev->dev_task_attr_type = SAM_TASK_ATTR_EMULATED;
6708bb27 1009 pr_debug("%s: Using SAM_TASK_ATTR_EMULATED for SPC: 0x%02x"
e3d6f909
AG
1010 " device\n", dev->transport->name,
1011 dev->transport->get_device_rev(dev));
c66ac9db
NB
1012}
1013
1014static void scsi_dump_inquiry(struct se_device *dev)
1015{
e3d6f909 1016 struct t10_wwn *wwn = &dev->se_sub_dev->t10_wwn;
e59a41b6 1017 char buf[17];
c66ac9db
NB
1018 int i, device_type;
1019 /*
1020 * Print Linux/SCSI style INQUIRY formatting to the kernel ring buffer
1021 */
c66ac9db
NB
1022 for (i = 0; i < 8; i++)
1023 if (wwn->vendor[i] >= 0x20)
e59a41b6 1024 buf[i] = wwn->vendor[i];
c66ac9db 1025 else
e59a41b6
SAS
1026 buf[i] = ' ';
1027 buf[i] = '\0';
1028 pr_debug(" Vendor: %s\n", buf);
c66ac9db 1029
c66ac9db
NB
1030 for (i = 0; i < 16; i++)
1031 if (wwn->model[i] >= 0x20)
e59a41b6 1032 buf[i] = wwn->model[i];
c66ac9db 1033 else
e59a41b6
SAS
1034 buf[i] = ' ';
1035 buf[i] = '\0';
1036 pr_debug(" Model: %s\n", buf);
c66ac9db 1037
c66ac9db
NB
1038 for (i = 0; i < 4; i++)
1039 if (wwn->revision[i] >= 0x20)
e59a41b6 1040 buf[i] = wwn->revision[i];
c66ac9db 1041 else
e59a41b6
SAS
1042 buf[i] = ' ';
1043 buf[i] = '\0';
1044 pr_debug(" Revision: %s\n", buf);
c66ac9db 1045
e3d6f909 1046 device_type = dev->transport->get_device_type(dev);
6708bb27
AG
1047 pr_debug(" Type: %s ", scsi_device_type(device_type));
1048 pr_debug(" ANSI SCSI revision: %02x\n",
e3d6f909 1049 dev->transport->get_device_rev(dev));
c66ac9db
NB
1050}
1051
1052struct se_device *transport_add_device_to_core_hba(
1053 struct se_hba *hba,
1054 struct se_subsystem_api *transport,
1055 struct se_subsystem_dev *se_dev,
1056 u32 device_flags,
1057 void *transport_dev,
1058 struct se_dev_limits *dev_limits,
1059 const char *inquiry_prod,
1060 const char *inquiry_rev)
1061{
12a18bdc 1062 int force_pt;
c66ac9db
NB
1063 struct se_device *dev;
1064
1065 dev = kzalloc(sizeof(struct se_device), GFP_KERNEL);
6708bb27
AG
1066 if (!dev) {
1067 pr_err("Unable to allocate memory for se_dev_t\n");
c66ac9db
NB
1068 return NULL;
1069 }
c66ac9db
NB
1070
1071 dev->dev_flags = device_flags;
1072 dev->dev_status |= TRANSPORT_DEVICE_DEACTIVATED;
5951146d 1073 dev->dev_ptr = transport_dev;
c66ac9db
NB
1074 dev->se_hba = hba;
1075 dev->se_sub_dev = se_dev;
1076 dev->transport = transport;
c66ac9db
NB
1077 INIT_LIST_HEAD(&dev->dev_list);
1078 INIT_LIST_HEAD(&dev->dev_sep_list);
1079 INIT_LIST_HEAD(&dev->dev_tmr_list);
c66ac9db 1080 INIT_LIST_HEAD(&dev->delayed_cmd_list);
cf572a96 1081 INIT_LIST_HEAD(&dev->state_list);
07bde79a 1082 INIT_LIST_HEAD(&dev->qf_cmd_list);
c66ac9db
NB
1083 spin_lock_init(&dev->execute_task_lock);
1084 spin_lock_init(&dev->delayed_cmd_lock);
c66ac9db
NB
1085 spin_lock_init(&dev->dev_reservation_lock);
1086 spin_lock_init(&dev->dev_status_lock);
c66ac9db
NB
1087 spin_lock_init(&dev->se_port_lock);
1088 spin_lock_init(&dev->se_tmr_lock);
07bde79a 1089 spin_lock_init(&dev->qf_cmd_lock);
c66ac9db
NB
1090 atomic_set(&dev->dev_ordered_id, 0);
1091
1092 se_dev_set_default_attribs(dev, dev_limits);
1093
1094 dev->dev_index = scsi_get_new_index(SCSI_DEVICE_INDEX);
1095 dev->creation_time = get_jiffies_64();
1096 spin_lock_init(&dev->stats_lock);
1097
1098 spin_lock(&hba->device_lock);
1099 list_add_tail(&dev->dev_list, &hba->hba_dev_list);
1100 hba->dev_count++;
1101 spin_unlock(&hba->device_lock);
1102 /*
1103 * Setup the SAM Task Attribute emulation for struct se_device
1104 */
1105 core_setup_task_attr_emulation(dev);
1106 /*
1107 * Force PR and ALUA passthrough emulation with internal object use.
1108 */
1109 force_pt = (hba->hba_flags & HBA_FLAGS_INTERNAL_USE);
1110 /*
1111 * Setup the Reservations infrastructure for struct se_device
1112 */
1113 core_setup_reservations(dev, force_pt);
1114 /*
1115 * Setup the Asymmetric Logical Unit Assignment for struct se_device
1116 */
1117 if (core_setup_alua(dev, force_pt) < 0)
2962846d 1118 goto err_dev_list;
c66ac9db
NB
1119
1120 /*
1121 * Startup the struct se_device processing thread
1122 */
af877292
CH
1123 dev->tmr_wq = alloc_workqueue("tmr-%s", WQ_MEM_RECLAIM | WQ_UNBOUND, 1,
1124 dev->transport->name);
1125 if (!dev->tmr_wq) {
1126 pr_err("Unable to create tmr workqueue for %s\n",
e3d6f909 1127 dev->transport->name);
2962846d 1128 goto err_dev_list;
c66ac9db 1129 }
07bde79a
NB
1130 /*
1131 * Setup work_queue for QUEUE_FULL
1132 */
1133 INIT_WORK(&dev->qf_work_queue, target_qf_do_work);
c66ac9db
NB
1134 /*
1135 * Preload the initial INQUIRY const values if we are doing
1136 * anything virtual (IBLOCK, FILEIO, RAMDISK), but not for TCM/pSCSI
1137 * passthrough because this is being provided by the backend LLD.
1138 * This is required so that transport_get_inquiry() copies these
1139 * originals once back into DEV_T10_WWN(dev) for the virtual device
1140 * setup.
1141 */
e3d6f909 1142 if (dev->transport->transport_type != TRANSPORT_PLUGIN_PHBA_PDEV) {
f22c1196 1143 if (!inquiry_prod || !inquiry_rev) {
6708bb27 1144 pr_err("All non TCM/pSCSI plugins require"
c66ac9db 1145 " INQUIRY consts\n");
2962846d 1146 goto err_wq;
c66ac9db
NB
1147 }
1148
e3d6f909
AG
1149 strncpy(&dev->se_sub_dev->t10_wwn.vendor[0], "LIO-ORG", 8);
1150 strncpy(&dev->se_sub_dev->t10_wwn.model[0], inquiry_prod, 16);
1151 strncpy(&dev->se_sub_dev->t10_wwn.revision[0], inquiry_rev, 4);
c66ac9db
NB
1152 }
1153 scsi_dump_inquiry(dev);
1154
12a18bdc 1155 return dev;
c66ac9db 1156
2962846d
DC
1157err_wq:
1158 destroy_workqueue(dev->tmr_wq);
1159err_dev_list:
c66ac9db
NB
1160 spin_lock(&hba->device_lock);
1161 list_del(&dev->dev_list);
1162 hba->dev_count--;
1163 spin_unlock(&hba->device_lock);
1164
1165 se_release_vpd_for_dev(dev);
1166
c66ac9db
NB
1167 kfree(dev);
1168
1169 return NULL;
1170}
1171EXPORT_SYMBOL(transport_add_device_to_core_hba);
1172
1fd032ee 1173int target_cmd_size_check(struct se_cmd *cmd, unsigned int size)
9b3b8041
CH
1174{
1175 struct se_device *dev = cmd->se_dev;
1176
1177 if (cmd->unknown_data_length) {
1178 cmd->data_length = size;
1179 } else if (size != cmd->data_length) {
1180 pr_warn("TARGET_CORE[%s]: Expected Transfer Length:"
1181 " %u does not match SCSI CDB Length: %u for SAM Opcode:"
1182 " 0x%02x\n", cmd->se_tfo->get_fabric_name(),
1183 cmd->data_length, size, cmd->t_task_cdb[0]);
1184
9b3b8041
CH
1185 if (cmd->data_direction == DMA_TO_DEVICE) {
1186 pr_err("Rejecting underflow/overflow"
1187 " WRITE data\n");
1188 goto out_invalid_cdb_field;
1189 }
1190 /*
1191 * Reject READ_* or WRITE_* with overflow/underflow for
1192 * type SCF_SCSI_DATA_CDB.
1193 */
1194 if (dev->se_sub_dev->se_dev_attrib.block_size != 512) {
1195 pr_err("Failing OVERFLOW/UNDERFLOW for LBA op"
1196 " CDB on non 512-byte sector setup subsystem"
1197 " plugin: %s\n", dev->transport->name);
1198 /* Returns CHECK_CONDITION + INVALID_CDB_FIELD */
1199 goto out_invalid_cdb_field;
1200 }
4c054ba6
NB
1201 /*
1202 * For the overflow case keep the existing fabric provided
1203 * ->data_length. Otherwise for the underflow case, reset
1204 * ->data_length to the smaller SCSI expected data transfer
1205 * length.
1206 */
9b3b8041
CH
1207 if (size > cmd->data_length) {
1208 cmd->se_cmd_flags |= SCF_OVERFLOW_BIT;
1209 cmd->residual_count = (size - cmd->data_length);
1210 } else {
1211 cmd->se_cmd_flags |= SCF_UNDERFLOW_BIT;
1212 cmd->residual_count = (cmd->data_length - size);
4c054ba6 1213 cmd->data_length = size;
9b3b8041 1214 }
9b3b8041
CH
1215 }
1216
1217 return 0;
1218
1219out_invalid_cdb_field:
1220 cmd->se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
1221 cmd->scsi_sense_reason = TCM_INVALID_CDB_FIELD;
1222 return -EINVAL;
1223}
1224
c66ac9db
NB
1225/*
1226 * Used by fabric modules containing a local struct se_cmd within their
1227 * fabric dependent per I/O descriptor.
1228 */
1229void transport_init_se_cmd(
1230 struct se_cmd *cmd,
1231 struct target_core_fabric_ops *tfo,
1232 struct se_session *se_sess,
1233 u32 data_length,
1234 int data_direction,
1235 int task_attr,
1236 unsigned char *sense_buffer)
1237{
5951146d
AG
1238 INIT_LIST_HEAD(&cmd->se_lun_node);
1239 INIT_LIST_HEAD(&cmd->se_delayed_node);
07bde79a 1240 INIT_LIST_HEAD(&cmd->se_qf_node);
a17f091d 1241 INIT_LIST_HEAD(&cmd->se_cmd_list);
cf572a96 1242 INIT_LIST_HEAD(&cmd->state_list);
a1d8b49a
AG
1243 init_completion(&cmd->transport_lun_fe_stop_comp);
1244 init_completion(&cmd->transport_lun_stop_comp);
1245 init_completion(&cmd->t_transport_stop_comp);
a17f091d 1246 init_completion(&cmd->cmd_wait_comp);
cf572a96 1247 init_completion(&cmd->task_stop_comp);
a1d8b49a 1248 spin_lock_init(&cmd->t_state_lock);
7d680f3b 1249 cmd->transport_state = CMD_T_DEV_ACTIVE;
c66ac9db
NB
1250
1251 cmd->se_tfo = tfo;
1252 cmd->se_sess = se_sess;
1253 cmd->data_length = data_length;
1254 cmd->data_direction = data_direction;
1255 cmd->sam_task_attr = task_attr;
1256 cmd->sense_buffer = sense_buffer;
cf572a96
CH
1257
1258 cmd->state_active = false;
c66ac9db
NB
1259}
1260EXPORT_SYMBOL(transport_init_se_cmd);
1261
1262static int transport_check_alloc_task_attr(struct se_cmd *cmd)
1263{
1264 /*
1265 * Check if SAM Task Attribute emulation is enabled for this
1266 * struct se_device storage object
1267 */
5951146d 1268 if (cmd->se_dev->dev_task_attr_type != SAM_TASK_ATTR_EMULATED)
c66ac9db
NB
1269 return 0;
1270
e66ecd50 1271 if (cmd->sam_task_attr == MSG_ACA_TAG) {
6708bb27 1272 pr_debug("SAM Task Attribute ACA"
c66ac9db 1273 " emulation is not supported\n");
e3d6f909 1274 return -EINVAL;
c66ac9db
NB
1275 }
1276 /*
1277 * Used to determine when ORDERED commands should go from
1278 * Dormant to Active status.
1279 */
5951146d 1280 cmd->se_ordered_id = atomic_inc_return(&cmd->se_dev->dev_ordered_id);
c66ac9db 1281 smp_mb__after_atomic_inc();
6708bb27 1282 pr_debug("Allocated se_ordered_id: %u for Task Attr: 0x%02x on %s\n",
c66ac9db 1283 cmd->se_ordered_id, cmd->sam_task_attr,
6708bb27 1284 cmd->se_dev->transport->name);
c66ac9db
NB
1285 return 0;
1286}
1287
a12f41f8 1288/* target_setup_cmd_from_cdb():
c66ac9db
NB
1289 *
1290 * Called from fabric RX Thread.
1291 */
a12f41f8 1292int target_setup_cmd_from_cdb(
c66ac9db
NB
1293 struct se_cmd *cmd,
1294 unsigned char *cdb)
1295{
cb4f4d3c
CH
1296 struct se_subsystem_dev *su_dev = cmd->se_dev->se_sub_dev;
1297 u32 pr_reg_type = 0;
1298 u8 alua_ascq = 0;
1299 unsigned long flags;
c66ac9db
NB
1300 int ret;
1301
c66ac9db
NB
1302 /*
1303 * Ensure that the received CDB is less than the max (252 + 8) bytes
1304 * for VARIABLE_LENGTH_CMD
1305 */
1306 if (scsi_command_size(cdb) > SCSI_MAX_VARLEN_CDB_SIZE) {
6708bb27 1307 pr_err("Received SCSI CDB with command_size: %d that"
c66ac9db
NB
1308 " exceeds SCSI_MAX_VARLEN_CDB_SIZE: %d\n",
1309 scsi_command_size(cdb), SCSI_MAX_VARLEN_CDB_SIZE);
03e98c9e
NB
1310 cmd->se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
1311 cmd->scsi_sense_reason = TCM_INVALID_CDB_FIELD;
e3d6f909 1312 return -EINVAL;
c66ac9db
NB
1313 }
1314 /*
1315 * If the received CDB is larger than TCM_MAX_COMMAND_SIZE,
1316 * allocate the additional extended CDB buffer now.. Otherwise
1317 * setup the pointer from __t_task_cdb to t_task_cdb.
1318 */
a1d8b49a
AG
1319 if (scsi_command_size(cdb) > sizeof(cmd->__t_task_cdb)) {
1320 cmd->t_task_cdb = kzalloc(scsi_command_size(cdb),
c66ac9db 1321 GFP_KERNEL);
6708bb27
AG
1322 if (!cmd->t_task_cdb) {
1323 pr_err("Unable to allocate cmd->t_task_cdb"
a1d8b49a 1324 " %u > sizeof(cmd->__t_task_cdb): %lu ops\n",
c66ac9db 1325 scsi_command_size(cdb),
a1d8b49a 1326 (unsigned long)sizeof(cmd->__t_task_cdb));
03e98c9e
NB
1327 cmd->se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
1328 cmd->scsi_sense_reason =
1329 TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
e3d6f909 1330 return -ENOMEM;
c66ac9db
NB
1331 }
1332 } else
a1d8b49a 1333 cmd->t_task_cdb = &cmd->__t_task_cdb[0];
c66ac9db 1334 /*
a1d8b49a 1335 * Copy the original CDB into cmd->
c66ac9db 1336 */
a1d8b49a 1337 memcpy(cmd->t_task_cdb, cdb, scsi_command_size(cdb));
cb4f4d3c
CH
1338
1339 /*
1340 * Check for an existing UNIT ATTENTION condition
1341 */
1342 if (core_scsi3_ua_check(cmd, cdb) < 0) {
1343 cmd->se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
1344 cmd->scsi_sense_reason = TCM_CHECK_CONDITION_UNIT_ATTENTION;
1345 return -EINVAL;
1346 }
1347
1348 ret = su_dev->t10_alua.alua_state_check(cmd, cdb, &alua_ascq);
1349 if (ret != 0) {
1350 /*
1351 * Set SCSI additional sense code (ASC) to 'LUN Not Accessible';
1352 * The ALUA additional sense code qualifier (ASCQ) is determined
1353 * by the ALUA primary or secondary access state..
1354 */
1355 if (ret > 0) {
1356 pr_debug("[%s]: ALUA TG Port not available, "
1357 "SenseKey: NOT_READY, ASC/ASCQ: "
1358 "0x04/0x%02x\n",
1359 cmd->se_tfo->get_fabric_name(), alua_ascq);
1360
1361 transport_set_sense_codes(cmd, 0x04, alua_ascq);
1362 cmd->se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
1363 cmd->scsi_sense_reason = TCM_CHECK_CONDITION_NOT_READY;
1364 return -EINVAL;
1365 }
1366 cmd->se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
1367 cmd->scsi_sense_reason = TCM_INVALID_CDB_FIELD;
1368 return -EINVAL;
1369 }
1370
1371 /*
1372 * Check status for SPC-3 Persistent Reservations
1373 */
1374 if (su_dev->t10_pr.pr_ops.t10_reservation_check(cmd, &pr_reg_type)) {
1375 if (su_dev->t10_pr.pr_ops.t10_seq_non_holder(
1376 cmd, cdb, pr_reg_type) != 0) {
1377 cmd->se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
1378 cmd->se_cmd_flags |= SCF_SCSI_RESERVATION_CONFLICT;
1379 cmd->scsi_status = SAM_STAT_RESERVATION_CONFLICT;
1380 cmd->scsi_sense_reason = TCM_RESERVATION_CONFLICT;
1381 return -EBUSY;
1382 }
1383 /*
1384 * This means the CDB is allowed for the SCSI Initiator port
1385 * when said port is *NOT* holding the legacy SPC-2 or
1386 * SPC-3 Persistent Reservation.
1387 */
1388 }
1389
1fd032ee 1390 ret = cmd->se_dev->transport->parse_cdb(cmd);
c66ac9db
NB
1391 if (ret < 0)
1392 return ret;
cb4f4d3c
CH
1393
1394 spin_lock_irqsave(&cmd->t_state_lock, flags);
1395 cmd->se_cmd_flags |= SCF_SUPPORTED_SAM_OPCODE;
1396 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
1397
c66ac9db
NB
1398 /*
1399 * Check for SAM Task Attribute Emulation
1400 */
1401 if (transport_check_alloc_task_attr(cmd) < 0) {
1402 cmd->se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
1403 cmd->scsi_sense_reason = TCM_INVALID_CDB_FIELD;
5951146d 1404 return -EINVAL;
c66ac9db
NB
1405 }
1406 spin_lock(&cmd->se_lun->lun_sep_lock);
1407 if (cmd->se_lun->lun_sep)
1408 cmd->se_lun->lun_sep->sep_stats.cmd_pdus++;
1409 spin_unlock(&cmd->se_lun->lun_sep_lock);
1410 return 0;
1411}
a12f41f8 1412EXPORT_SYMBOL(target_setup_cmd_from_cdb);
c66ac9db 1413
695434e1
NB
1414/*
1415 * Used by fabric module frontends to queue tasks directly.
1416 * Many only be used from process context only
1417 */
1418int transport_handle_cdb_direct(
1419 struct se_cmd *cmd)
1420{
dd8ae59d
NB
1421 int ret;
1422
695434e1
NB
1423 if (!cmd->se_lun) {
1424 dump_stack();
6708bb27 1425 pr_err("cmd->se_lun is NULL\n");
695434e1
NB
1426 return -EINVAL;
1427 }
1428 if (in_interrupt()) {
1429 dump_stack();
6708bb27 1430 pr_err("transport_generic_handle_cdb cannot be called"
695434e1
NB
1431 " from interrupt context\n");
1432 return -EINVAL;
1433 }
dd8ae59d 1434 /*
af877292
CH
1435 * Set TRANSPORT_NEW_CMD state and CMD_T_ACTIVE to ensure that
1436 * outstanding descriptors are handled correctly during shutdown via
1437 * transport_wait_for_tasks()
dd8ae59d
NB
1438 *
1439 * Also, we don't take cmd->t_state_lock here as we only expect
1440 * this to be called for initial descriptor submission.
1441 */
1442 cmd->t_state = TRANSPORT_NEW_CMD;
7d680f3b
CH
1443 cmd->transport_state |= CMD_T_ACTIVE;
1444
dd8ae59d
NB
1445 /*
1446 * transport_generic_new_cmd() is already handling QUEUE_FULL,
1447 * so follow TRANSPORT_NEW_CMD processing thread context usage
1448 * and call transport_generic_request_failure() if necessary..
1449 */
1450 ret = transport_generic_new_cmd(cmd);
03e98c9e
NB
1451 if (ret < 0)
1452 transport_generic_request_failure(cmd);
1453
dd8ae59d 1454 return 0;
695434e1
NB
1455}
1456EXPORT_SYMBOL(transport_handle_cdb_direct);
1457
a6360785
NB
1458/**
1459 * target_submit_cmd - lookup unpacked lun and submit uninitialized se_cmd
1460 *
1461 * @se_cmd: command descriptor to submit
1462 * @se_sess: associated se_sess for endpoint
1463 * @cdb: pointer to SCSI CDB
1464 * @sense: pointer to SCSI sense buffer
1465 * @unpacked_lun: unpacked LUN to reference for struct se_lun
1466 * @data_length: fabric expected data transfer length
1467 * @task_addr: SAM task attribute
1468 * @data_dir: DMA data direction
1469 * @flags: flags for command submission from target_sc_flags_tables
1470 *
d6dfc868
RD
1471 * Returns non zero to signal active I/O shutdown failure. All other
1472 * setup exceptions will be returned as a SCSI CHECK_CONDITION response,
1473 * but still return zero here.
1474 *
a6360785
NB
1475 * This may only be called from process context, and also currently
1476 * assumes internal allocation of fabric payload buffer by target-core.
1477 **/
d6dfc868 1478int target_submit_cmd(struct se_cmd *se_cmd, struct se_session *se_sess,
a6360785
NB
1479 unsigned char *cdb, unsigned char *sense, u32 unpacked_lun,
1480 u32 data_length, int task_attr, int data_dir, int flags)
1481{
1482 struct se_portal_group *se_tpg;
1483 int rc;
1484
1485 se_tpg = se_sess->se_tpg;
1486 BUG_ON(!se_tpg);
1487 BUG_ON(se_cmd->se_tfo || se_cmd->se_sess);
1488 BUG_ON(in_interrupt());
1489 /*
1490 * Initialize se_cmd for target operation. From this point
1491 * exceptions are handled by sending exception status via
1492 * target_core_fabric_ops->queue_status() callback
1493 */
1494 transport_init_se_cmd(se_cmd, se_tpg->se_tpg_tfo, se_sess,
1495 data_length, data_dir, task_attr, sense);
b0d79946
SAS
1496 if (flags & TARGET_SCF_UNKNOWN_SIZE)
1497 se_cmd->unknown_data_length = 1;
a6360785
NB
1498 /*
1499 * Obtain struct se_cmd->cmd_kref reference and add new cmd to
1500 * se_sess->sess_cmd_list. A second kref_get here is necessary
1501 * for fabrics using TARGET_SCF_ACK_KREF that expect a second
1502 * kref_put() to happen during fabric packet acknowledgement.
1503 */
bc187ea6
RD
1504 rc = target_get_sess_cmd(se_sess, se_cmd, (flags & TARGET_SCF_ACK_KREF));
1505 if (rc)
d6dfc868 1506 return rc;
a6360785
NB
1507 /*
1508 * Signal bidirectional data payloads to target-core
1509 */
1510 if (flags & TARGET_SCF_BIDI_OP)
1511 se_cmd->se_cmd_flags |= SCF_BIDI;
1512 /*
1513 * Locate se_lun pointer and attach it to struct se_cmd
1514 */
735703ca
NB
1515 if (transport_lookup_cmd_lun(se_cmd, unpacked_lun) < 0) {
1516 transport_send_check_condition_and_sense(se_cmd,
1517 se_cmd->scsi_sense_reason, 0);
1518 target_put_sess_cmd(se_sess, se_cmd);
d6dfc868 1519 return 0;
735703ca 1520 }
d6e0175c 1521
a12f41f8 1522 rc = target_setup_cmd_from_cdb(se_cmd, cdb);
735703ca
NB
1523 if (rc != 0) {
1524 transport_generic_request_failure(se_cmd);
d6dfc868 1525 return 0;
735703ca 1526 }
11e319ed
AG
1527
1528 /*
1529 * Check if we need to delay processing because of ALUA
1530 * Active/NonOptimized primary access state..
1531 */
1532 core_alua_check_nonop_delay(se_cmd);
1533
a6360785 1534 transport_handle_cdb_direct(se_cmd);
d6dfc868 1535 return 0;
a6360785
NB
1536}
1537EXPORT_SYMBOL(target_submit_cmd);
1538
9f0d05c2
NB
1539static void target_complete_tmr_failure(struct work_struct *work)
1540{
1541 struct se_cmd *se_cmd = container_of(work, struct se_cmd, work);
1542
1543 se_cmd->se_tmr_req->response = TMR_LUN_DOES_NOT_EXIST;
1544 se_cmd->se_tfo->queue_tm_rsp(se_cmd);
1545 transport_generic_free_cmd(se_cmd, 0);
1546}
1547
ea98d7f9
AG
1548/**
1549 * target_submit_tmr - lookup unpacked lun and submit uninitialized se_cmd
1550 * for TMR CDBs
1551 *
1552 * @se_cmd: command descriptor to submit
1553 * @se_sess: associated se_sess for endpoint
1554 * @sense: pointer to SCSI sense buffer
1555 * @unpacked_lun: unpacked LUN to reference for struct se_lun
1556 * @fabric_context: fabric context for TMR req
1557 * @tm_type: Type of TM request
c0974f89
NB
1558 * @gfp: gfp type for caller
1559 * @tag: referenced task tag for TMR_ABORT_TASK
c7042cae 1560 * @flags: submit cmd flags
ea98d7f9
AG
1561 *
1562 * Callable from all contexts.
1563 **/
1564
c7042cae 1565int target_submit_tmr(struct se_cmd *se_cmd, struct se_session *se_sess,
ea98d7f9 1566 unsigned char *sense, u32 unpacked_lun,
c0974f89
NB
1567 void *fabric_tmr_ptr, unsigned char tm_type,
1568 gfp_t gfp, unsigned int tag, int flags)
ea98d7f9
AG
1569{
1570 struct se_portal_group *se_tpg;
1571 int ret;
1572
1573 se_tpg = se_sess->se_tpg;
1574 BUG_ON(!se_tpg);
1575
1576 transport_init_se_cmd(se_cmd, se_tpg->se_tpg_tfo, se_sess,
1577 0, DMA_NONE, MSG_SIMPLE_TAG, sense);
c7042cae
NB
1578 /*
1579 * FIXME: Currently expect caller to handle se_cmd->se_tmr_req
1580 * allocation failure.
1581 */
c0974f89 1582 ret = core_tmr_alloc_req(se_cmd, fabric_tmr_ptr, tm_type, gfp);
c7042cae
NB
1583 if (ret < 0)
1584 return -ENOMEM;
ea98d7f9 1585
c0974f89
NB
1586 if (tm_type == TMR_ABORT_TASK)
1587 se_cmd->se_tmr_req->ref_task_tag = tag;
1588
ea98d7f9 1589 /* See target_submit_cmd for commentary */
bc187ea6
RD
1590 ret = target_get_sess_cmd(se_sess, se_cmd, (flags & TARGET_SCF_ACK_KREF));
1591 if (ret) {
1592 core_tmr_release_req(se_cmd->se_tmr_req);
1593 return ret;
1594 }
ea98d7f9 1595
ea98d7f9
AG
1596 ret = transport_lookup_tmr_lun(se_cmd, unpacked_lun);
1597 if (ret) {
9f0d05c2
NB
1598 /*
1599 * For callback during failure handling, push this work off
1600 * to process context with TMR_LUN_DOES_NOT_EXIST status.
1601 */
1602 INIT_WORK(&se_cmd->work, target_complete_tmr_failure);
1603 schedule_work(&se_cmd->work);
c7042cae 1604 return 0;
ea98d7f9
AG
1605 }
1606 transport_generic_handle_tmr(se_cmd);
c7042cae 1607 return 0;
ea98d7f9
AG
1608}
1609EXPORT_SYMBOL(target_submit_tmr);
1610
cdbb70bb 1611/*
cf572a96 1612 * If the cmd is active, request it to be stopped and sleep until it
cdbb70bb
CH
1613 * has completed.
1614 */
cf572a96 1615bool target_stop_cmd(struct se_cmd *cmd, unsigned long *flags)
cdbb70bb 1616{
cdbb70bb
CH
1617 bool was_active = false;
1618
cf572a96
CH
1619 if (cmd->transport_state & CMD_T_BUSY) {
1620 cmd->transport_state |= CMD_T_REQUEST_STOP;
cdbb70bb
CH
1621 spin_unlock_irqrestore(&cmd->t_state_lock, *flags);
1622
cf572a96
CH
1623 pr_debug("cmd %p waiting to complete\n", cmd);
1624 wait_for_completion(&cmd->task_stop_comp);
1625 pr_debug("cmd %p stopped successfully\n", cmd);
cdbb70bb
CH
1626
1627 spin_lock_irqsave(&cmd->t_state_lock, *flags);
cf572a96
CH
1628 cmd->transport_state &= ~CMD_T_REQUEST_STOP;
1629 cmd->transport_state &= ~CMD_T_BUSY;
cdbb70bb
CH
1630 was_active = true;
1631 }
1632
cdbb70bb
CH
1633 return was_active;
1634}
1635
c66ac9db
NB
1636/*
1637 * Handle SAM-esque emulation for generic transport request failures.
1638 */
2fbff127 1639void transport_generic_request_failure(struct se_cmd *cmd)
c66ac9db 1640{
07bde79a
NB
1641 int ret = 0;
1642
6708bb27 1643 pr_debug("-----[ Storage Engine Exception for cmd: %p ITT: 0x%08x"
e3d6f909 1644 " CDB: 0x%02x\n", cmd, cmd->se_tfo->get_task_tag(cmd),
a1d8b49a 1645 cmd->t_task_cdb[0]);
03e98c9e 1646 pr_debug("-----[ i_state: %d t_state: %d scsi_sense_reason: %d\n",
e3d6f909 1647 cmd->se_tfo->get_cmd_state(cmd),
03e98c9e 1648 cmd->t_state, cmd->scsi_sense_reason);
d43d6aea 1649 pr_debug("-----[ CMD_T_ACTIVE: %d CMD_T_STOP: %d CMD_T_SENT: %d\n",
7d680f3b
CH
1650 (cmd->transport_state & CMD_T_ACTIVE) != 0,
1651 (cmd->transport_state & CMD_T_STOP) != 0,
1652 (cmd->transport_state & CMD_T_SENT) != 0);
c66ac9db 1653
c66ac9db
NB
1654 /*
1655 * For SAM Task Attribute emulation for failed struct se_cmd
1656 */
1657 if (cmd->se_dev->dev_task_attr_type == SAM_TASK_ATTR_EMULATED)
1658 transport_complete_task_attr(cmd);
1659
03e98c9e
NB
1660 switch (cmd->scsi_sense_reason) {
1661 case TCM_NON_EXISTENT_LUN:
1662 case TCM_UNSUPPORTED_SCSI_OPCODE:
1663 case TCM_INVALID_CDB_FIELD:
1664 case TCM_INVALID_PARAMETER_LIST:
1665 case TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE:
1666 case TCM_UNKNOWN_MODE_PAGE:
1667 case TCM_WRITE_PROTECTED:
e2397c70 1668 case TCM_ADDRESS_OUT_OF_RANGE:
03e98c9e
NB
1669 case TCM_CHECK_CONDITION_ABORT_CMD:
1670 case TCM_CHECK_CONDITION_UNIT_ATTENTION:
1671 case TCM_CHECK_CONDITION_NOT_READY:
c66ac9db 1672 break;
03e98c9e 1673 case TCM_RESERVATION_CONFLICT:
c66ac9db
NB
1674 /*
1675 * No SENSE Data payload for this case, set SCSI Status
1676 * and queue the response to $FABRIC_MOD.
1677 *
1678 * Uses linux/include/scsi/scsi.h SAM status codes defs
1679 */
1680 cmd->scsi_status = SAM_STAT_RESERVATION_CONFLICT;
1681 /*
1682 * For UA Interlock Code 11b, a RESERVATION CONFLICT will
1683 * establish a UNIT ATTENTION with PREVIOUS RESERVATION
1684 * CONFLICT STATUS.
1685 *
1686 * See spc4r17, section 7.4.6 Control Mode Page, Table 349
1687 */
e3d6f909
AG
1688 if (cmd->se_sess &&
1689 cmd->se_dev->se_sub_dev->se_dev_attrib.emulate_ua_intlck_ctrl == 2)
1690 core_scsi3_ua_allocate(cmd->se_sess->se_node_acl,
c66ac9db
NB
1691 cmd->orig_fe_lun, 0x2C,
1692 ASCQ_2CH_PREVIOUS_RESERVATION_CONFLICT_STATUS);
1693
07bde79a 1694 ret = cmd->se_tfo->queue_status(cmd);
f147abb4 1695 if (ret == -EAGAIN || ret == -ENOMEM)
07bde79a 1696 goto queue_full;
c66ac9db 1697 goto check_stop;
c66ac9db 1698 default:
6708bb27 1699 pr_err("Unknown transport error for CDB 0x%02x: %d\n",
03e98c9e 1700 cmd->t_task_cdb[0], cmd->scsi_sense_reason);
c66ac9db
NB
1701 cmd->scsi_sense_reason = TCM_UNSUPPORTED_SCSI_OPCODE;
1702 break;
1703 }
f3146437 1704
03e98c9e
NB
1705 ret = transport_send_check_condition_and_sense(cmd,
1706 cmd->scsi_sense_reason, 0);
1707 if (ret == -EAGAIN || ret == -ENOMEM)
1708 goto queue_full;
07bde79a 1709
c66ac9db
NB
1710check_stop:
1711 transport_lun_remove_cmd(cmd);
6708bb27 1712 if (!transport_cmd_check_stop_to_fabric(cmd))
c66ac9db 1713 ;
07bde79a
NB
1714 return;
1715
1716queue_full:
e057f533
CH
1717 cmd->t_state = TRANSPORT_COMPLETE_QF_OK;
1718 transport_handle_queue_full(cmd, cmd->se_dev);
c66ac9db 1719}
2fbff127 1720EXPORT_SYMBOL(transport_generic_request_failure);
c66ac9db 1721
5f41a31d 1722static void __target_execute_cmd(struct se_cmd *cmd)
c66ac9db 1723{
0c2ad7d1 1724 int error = 0;
5f41a31d
CH
1725
1726 spin_lock_irq(&cmd->t_state_lock);
1727 cmd->transport_state |= (CMD_T_BUSY|CMD_T_SENT);
1728 spin_unlock_irq(&cmd->t_state_lock);
1729
1730 if (cmd->execute_cmd)
1731 error = cmd->execute_cmd(cmd);
5f41a31d
CH
1732
1733 if (error) {
1734 spin_lock_irq(&cmd->t_state_lock);
1735 cmd->transport_state &= ~(CMD_T_BUSY|CMD_T_SENT);
1736 spin_unlock_irq(&cmd->t_state_lock);
1737
1738 transport_generic_request_failure(cmd);
1739 }
1740}
1741
70baf0ab 1742void target_execute_cmd(struct se_cmd *cmd)
5f41a31d
CH
1743{
1744 struct se_device *dev = cmd->se_dev;
1745
d59a02b4
CH
1746 /*
1747 * If the received CDB has aleady been aborted stop processing it here.
1748 */
1749 if (transport_check_aborted_status(cmd, 1))
1750 return;
1751
f7113a47
CH
1752 /*
1753 * Determine if IOCTL context caller in requesting the stopping of this
1754 * command for LUN shutdown purposes.
1755 */
1756 spin_lock_irq(&cmd->t_state_lock);
1757 if (cmd->transport_state & CMD_T_LUN_STOP) {
1758 pr_debug("%s:%d CMD_T_LUN_STOP for ITT: 0x%08x\n",
1759 __func__, __LINE__, cmd->se_tfo->get_task_tag(cmd));
1760
1761 cmd->transport_state &= ~CMD_T_ACTIVE;
1762 spin_unlock_irq(&cmd->t_state_lock);
1763 complete(&cmd->transport_lun_stop_comp);
1764 return;
1765 }
1766 /*
1767 * Determine if frontend context caller is requesting the stopping of
1768 * this command for frontend exceptions.
1769 */
1770 if (cmd->transport_state & CMD_T_STOP) {
1771 pr_debug("%s:%d CMD_T_STOP for ITT: 0x%08x\n",
1772 __func__, __LINE__,
1773 cmd->se_tfo->get_task_tag(cmd));
1774
1775 spin_unlock_irq(&cmd->t_state_lock);
1776 complete(&cmd->t_transport_stop_comp);
5f41a31d 1777 return;
f7113a47
CH
1778 }
1779
1780 cmd->t_state = TRANSPORT_PROCESSING;
1781 spin_unlock_irq(&cmd->t_state_lock);
5f41a31d
CH
1782
1783 if (dev->dev_task_attr_type != SAM_TASK_ATTR_EMULATED)
1784 goto execute;
1785
c66ac9db 1786 /*
25985edc 1787 * Check for the existence of HEAD_OF_QUEUE, and if true return 1
c66ac9db
NB
1788 * to allow the passed struct se_cmd list of tasks to the front of the list.
1789 */
5f41a31d
CH
1790 switch (cmd->sam_task_attr) {
1791 case MSG_HEAD_TAG:
1792 pr_debug("Added HEAD_OF_QUEUE for CDB: 0x%02x, "
1793 "se_ordered_id: %u\n",
1794 cmd->t_task_cdb[0], cmd->se_ordered_id);
1795 goto execute;
1796 case MSG_ORDERED_TAG:
1797 atomic_inc(&dev->dev_ordered_sync);
c66ac9db
NB
1798 smp_mb__after_atomic_inc();
1799
5f41a31d
CH
1800 pr_debug("Added ORDERED for CDB: 0x%02x to ordered list, "
1801 " se_ordered_id: %u\n",
1802 cmd->t_task_cdb[0], cmd->se_ordered_id);
1803
c66ac9db 1804 /*
5f41a31d
CH
1805 * Execute an ORDERED command if no other older commands
1806 * exist that need to be completed first.
c66ac9db 1807 */
5f41a31d
CH
1808 if (!atomic_read(&dev->simple_cmds))
1809 goto execute;
1810 break;
1811 default:
c66ac9db
NB
1812 /*
1813 * For SIMPLE and UNTAGGED Task Attribute commands
1814 */
5f41a31d 1815 atomic_inc(&dev->simple_cmds);
c66ac9db 1816 smp_mb__after_atomic_inc();
5f41a31d 1817 break;
c66ac9db 1818 }
5f41a31d
CH
1819
1820 if (atomic_read(&dev->dev_ordered_sync) != 0) {
1821 spin_lock(&dev->delayed_cmd_lock);
5f41a31d
CH
1822 list_add_tail(&cmd->se_delayed_node, &dev->delayed_cmd_list);
1823 spin_unlock(&dev->delayed_cmd_lock);
c66ac9db 1824
6708bb27 1825 pr_debug("Added CDB: 0x%02x Task Attr: 0x%02x to"
c66ac9db 1826 " delayed CMD list, se_ordered_id: %u\n",
a1d8b49a 1827 cmd->t_task_cdb[0], cmd->sam_task_attr,
c66ac9db 1828 cmd->se_ordered_id);
5f41a31d 1829 return;
c66ac9db 1830 }
c66ac9db 1831
5f41a31d 1832execute:
c66ac9db 1833 /*
5f41a31d 1834 * Otherwise, no ORDERED task attributes exist..
c66ac9db 1835 */
5f41a31d 1836 __target_execute_cmd(cmd);
c66ac9db 1837}
70baf0ab 1838EXPORT_SYMBOL(target_execute_cmd);
c66ac9db 1839
5f41a31d
CH
1840/*
1841 * Process all commands up to the last received ORDERED task attribute which
1842 * requires another blocking boundary
1843 */
1844static void target_restart_delayed_cmds(struct se_device *dev)
1845{
1846 for (;;) {
1847 struct se_cmd *cmd;
1848
1849 spin_lock(&dev->delayed_cmd_lock);
1850 if (list_empty(&dev->delayed_cmd_list)) {
1851 spin_unlock(&dev->delayed_cmd_lock);
1852 break;
1853 }
1854
1855 cmd = list_entry(dev->delayed_cmd_list.next,
1856 struct se_cmd, se_delayed_node);
1857 list_del(&cmd->se_delayed_node);
1858 spin_unlock(&dev->delayed_cmd_lock);
1859
1860 __target_execute_cmd(cmd);
1861
1862 if (cmd->sam_task_attr == MSG_ORDERED_TAG)
1863 break;
1864 }
1865}
1866
c66ac9db 1867/*
35e0e757 1868 * Called from I/O completion to determine which dormant/delayed
c66ac9db
NB
1869 * and ordered cmds need to have their tasks added to the execution queue.
1870 */
1871static void transport_complete_task_attr(struct se_cmd *cmd)
1872{
5951146d 1873 struct se_device *dev = cmd->se_dev;
c66ac9db 1874
e66ecd50 1875 if (cmd->sam_task_attr == MSG_SIMPLE_TAG) {
c66ac9db
NB
1876 atomic_dec(&dev->simple_cmds);
1877 smp_mb__after_atomic_dec();
1878 dev->dev_cur_ordered_id++;
6708bb27 1879 pr_debug("Incremented dev->dev_cur_ordered_id: %u for"
c66ac9db
NB
1880 " SIMPLE: %u\n", dev->dev_cur_ordered_id,
1881 cmd->se_ordered_id);
e66ecd50 1882 } else if (cmd->sam_task_attr == MSG_HEAD_TAG) {
c66ac9db 1883 dev->dev_cur_ordered_id++;
6708bb27 1884 pr_debug("Incremented dev_cur_ordered_id: %u for"
c66ac9db
NB
1885 " HEAD_OF_QUEUE: %u\n", dev->dev_cur_ordered_id,
1886 cmd->se_ordered_id);
e66ecd50 1887 } else if (cmd->sam_task_attr == MSG_ORDERED_TAG) {
c66ac9db
NB
1888 atomic_dec(&dev->dev_ordered_sync);
1889 smp_mb__after_atomic_dec();
c66ac9db
NB
1890
1891 dev->dev_cur_ordered_id++;
6708bb27 1892 pr_debug("Incremented dev_cur_ordered_id: %u for ORDERED:"
c66ac9db
NB
1893 " %u\n", dev->dev_cur_ordered_id, cmd->se_ordered_id);
1894 }
c66ac9db 1895
5f41a31d 1896 target_restart_delayed_cmds(dev);
c66ac9db
NB
1897}
1898
e057f533 1899static void transport_complete_qf(struct se_cmd *cmd)
07bde79a
NB
1900{
1901 int ret = 0;
1902
e057f533
CH
1903 if (cmd->se_dev->dev_task_attr_type == SAM_TASK_ATTR_EMULATED)
1904 transport_complete_task_attr(cmd);
1905
1906 if (cmd->se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) {
1907 ret = cmd->se_tfo->queue_status(cmd);
1908 if (ret)
1909 goto out;
1910 }
07bde79a
NB
1911
1912 switch (cmd->data_direction) {
1913 case DMA_FROM_DEVICE:
1914 ret = cmd->se_tfo->queue_data_in(cmd);
1915 break;
1916 case DMA_TO_DEVICE:
ec98f782 1917 if (cmd->t_bidi_data_sg) {
07bde79a
NB
1918 ret = cmd->se_tfo->queue_data_in(cmd);
1919 if (ret < 0)
e057f533 1920 break;
07bde79a
NB
1921 }
1922 /* Fall through for DMA_TO_DEVICE */
1923 case DMA_NONE:
1924 ret = cmd->se_tfo->queue_status(cmd);
1925 break;
1926 default:
1927 break;
1928 }
1929
e057f533
CH
1930out:
1931 if (ret < 0) {
1932 transport_handle_queue_full(cmd, cmd->se_dev);
1933 return;
1934 }
1935 transport_lun_remove_cmd(cmd);
1936 transport_cmd_check_stop_to_fabric(cmd);
07bde79a
NB
1937}
1938
1939static void transport_handle_queue_full(
1940 struct se_cmd *cmd,
e057f533 1941 struct se_device *dev)
07bde79a
NB
1942{
1943 spin_lock_irq(&dev->qf_cmd_lock);
07bde79a
NB
1944 list_add_tail(&cmd->se_qf_node, &cmd->se_dev->qf_cmd_list);
1945 atomic_inc(&dev->dev_qf_count);
1946 smp_mb__after_atomic_inc();
1947 spin_unlock_irq(&cmd->se_dev->qf_cmd_lock);
1948
1949 schedule_work(&cmd->se_dev->qf_work_queue);
1950}
1951
35e0e757 1952static void target_complete_ok_work(struct work_struct *work)
c66ac9db 1953{
35e0e757 1954 struct se_cmd *cmd = container_of(work, struct se_cmd, work);
27a27099 1955 int ret;
35e0e757 1956
c66ac9db
NB
1957 /*
1958 * Check if we need to move delayed/dormant tasks from cmds on the
1959 * delayed execution list after a HEAD_OF_QUEUE or ORDERED Task
1960 * Attribute.
1961 */
5951146d 1962 if (cmd->se_dev->dev_task_attr_type == SAM_TASK_ATTR_EMULATED)
c66ac9db 1963 transport_complete_task_attr(cmd);
07bde79a
NB
1964 /*
1965 * Check to schedule QUEUE_FULL work, or execute an existing
1966 * cmd->transport_qf_callback()
1967 */
1968 if (atomic_read(&cmd->se_dev->dev_qf_count) != 0)
1969 schedule_work(&cmd->se_dev->qf_work_queue);
1970
c66ac9db 1971 /*
d5829eac 1972 * Check if we need to send a sense buffer from
c66ac9db
NB
1973 * the struct se_cmd in question.
1974 */
1975 if (cmd->se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) {
27a27099 1976 WARN_ON(!cmd->scsi_status);
27a27099
PB
1977 ret = transport_send_check_condition_and_sense(
1978 cmd, 0, 1);
1979 if (ret == -EAGAIN || ret == -ENOMEM)
1980 goto queue_full;
1981
1982 transport_lun_remove_cmd(cmd);
1983 transport_cmd_check_stop_to_fabric(cmd);
1984 return;
c66ac9db
NB
1985 }
1986 /*
25985edc 1987 * Check for a callback, used by amongst other things
c66ac9db
NB
1988 * XDWRITE_READ_10 emulation.
1989 */
1990 if (cmd->transport_complete_callback)
1991 cmd->transport_complete_callback(cmd);
1992
1993 switch (cmd->data_direction) {
1994 case DMA_FROM_DEVICE:
1995 spin_lock(&cmd->se_lun->lun_sep_lock);
e3d6f909
AG
1996 if (cmd->se_lun->lun_sep) {
1997 cmd->se_lun->lun_sep->sep_stats.tx_data_octets +=
c66ac9db
NB
1998 cmd->data_length;
1999 }
2000 spin_unlock(&cmd->se_lun->lun_sep_lock);
c66ac9db 2001
07bde79a 2002 ret = cmd->se_tfo->queue_data_in(cmd);
f147abb4 2003 if (ret == -EAGAIN || ret == -ENOMEM)
07bde79a 2004 goto queue_full;
c66ac9db
NB
2005 break;
2006 case DMA_TO_DEVICE:
2007 spin_lock(&cmd->se_lun->lun_sep_lock);
e3d6f909
AG
2008 if (cmd->se_lun->lun_sep) {
2009 cmd->se_lun->lun_sep->sep_stats.rx_data_octets +=
c66ac9db
NB
2010 cmd->data_length;
2011 }
2012 spin_unlock(&cmd->se_lun->lun_sep_lock);
2013 /*
2014 * Check if we need to send READ payload for BIDI-COMMAND
2015 */
ec98f782 2016 if (cmd->t_bidi_data_sg) {
c66ac9db 2017 spin_lock(&cmd->se_lun->lun_sep_lock);
e3d6f909
AG
2018 if (cmd->se_lun->lun_sep) {
2019 cmd->se_lun->lun_sep->sep_stats.tx_data_octets +=
c66ac9db
NB
2020 cmd->data_length;
2021 }
2022 spin_unlock(&cmd->se_lun->lun_sep_lock);
07bde79a 2023 ret = cmd->se_tfo->queue_data_in(cmd);
f147abb4 2024 if (ret == -EAGAIN || ret == -ENOMEM)
07bde79a 2025 goto queue_full;
c66ac9db
NB
2026 break;
2027 }
2028 /* Fall through for DMA_TO_DEVICE */
2029 case DMA_NONE:
07bde79a 2030 ret = cmd->se_tfo->queue_status(cmd);
f147abb4 2031 if (ret == -EAGAIN || ret == -ENOMEM)
07bde79a 2032 goto queue_full;
c66ac9db
NB
2033 break;
2034 default:
2035 break;
2036 }
2037
2038 transport_lun_remove_cmd(cmd);
2039 transport_cmd_check_stop_to_fabric(cmd);
07bde79a
NB
2040 return;
2041
2042queue_full:
6708bb27 2043 pr_debug("Handling complete_ok QUEUE_FULL: se_cmd: %p,"
07bde79a 2044 " data_direction: %d\n", cmd, cmd->data_direction);
e057f533
CH
2045 cmd->t_state = TRANSPORT_COMPLETE_QF_OK;
2046 transport_handle_queue_full(cmd, cmd->se_dev);
c66ac9db
NB
2047}
2048
6708bb27 2049static inline void transport_free_sgl(struct scatterlist *sgl, int nents)
c66ac9db 2050{
ec98f782 2051 struct scatterlist *sg;
ec98f782 2052 int count;
c66ac9db 2053
6708bb27
AG
2054 for_each_sg(sgl, sg, nents, count)
2055 __free_page(sg_page(sg));
c66ac9db 2056
6708bb27
AG
2057 kfree(sgl);
2058}
c66ac9db 2059
6708bb27
AG
2060static inline void transport_free_pages(struct se_cmd *cmd)
2061{
2062 if (cmd->se_cmd_flags & SCF_PASSTHROUGH_SG_TO_MEM_NOALLOC)
2063 return;
2064
2065 transport_free_sgl(cmd->t_data_sg, cmd->t_data_nents);
ec98f782
AG
2066 cmd->t_data_sg = NULL;
2067 cmd->t_data_nents = 0;
c66ac9db 2068
6708bb27 2069 transport_free_sgl(cmd->t_bidi_data_sg, cmd->t_bidi_data_nents);
ec98f782
AG
2070 cmd->t_bidi_data_sg = NULL;
2071 cmd->t_bidi_data_nents = 0;
c66ac9db
NB
2072}
2073
e26d99ae
CH
2074/**
2075 * transport_release_cmd - free a command
2076 * @cmd: command to free
2077 *
2078 * This routine unconditionally frees a command, and reference counting
2079 * or list removal must be done in the caller.
2080 */
2081static void transport_release_cmd(struct se_cmd *cmd)
2082{
2083 BUG_ON(!cmd->se_tfo);
2084
c8e31f26 2085 if (cmd->se_cmd_flags & SCF_SCSI_TMR_CDB)
e26d99ae
CH
2086 core_tmr_release_req(cmd->se_tmr_req);
2087 if (cmd->t_task_cdb != cmd->__t_task_cdb)
2088 kfree(cmd->t_task_cdb);
2089 /*
7481deb4
NB
2090 * If this cmd has been setup with target_get_sess_cmd(), drop
2091 * the kref and call ->release_cmd() in kref callback.
e26d99ae 2092 */
7481deb4
NB
2093 if (cmd->check_release != 0) {
2094 target_put_sess_cmd(cmd->se_sess, cmd);
2095 return;
2096 }
e26d99ae
CH
2097 cmd->se_tfo->release_cmd(cmd);
2098}
2099
d3df7825
CH
2100/**
2101 * transport_put_cmd - release a reference to a command
2102 * @cmd: command to release
2103 *
2104 * This routine releases our reference to the command and frees it if possible.
2105 */
39c05f32 2106static void transport_put_cmd(struct se_cmd *cmd)
c66ac9db
NB
2107{
2108 unsigned long flags;
c66ac9db 2109
a1d8b49a 2110 spin_lock_irqsave(&cmd->t_state_lock, flags);
4911e3cc
CH
2111 if (atomic_read(&cmd->t_fe_count)) {
2112 if (!atomic_dec_and_test(&cmd->t_fe_count))
2113 goto out_busy;
2114 }
2115
7d680f3b
CH
2116 if (cmd->transport_state & CMD_T_DEV_ACTIVE) {
2117 cmd->transport_state &= ~CMD_T_DEV_ACTIVE;
cf572a96 2118 target_remove_from_state_list(cmd);
c66ac9db 2119 }
a1d8b49a 2120 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
c66ac9db 2121
c66ac9db 2122 transport_free_pages(cmd);
31afc39c 2123 transport_release_cmd(cmd);
39c05f32 2124 return;
4911e3cc
CH
2125out_busy:
2126 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
c66ac9db
NB
2127}
2128
c66ac9db 2129/*
ec98f782
AG
2130 * transport_generic_map_mem_to_cmd - Use fabric-alloced pages instead of
2131 * allocating in the core.
c66ac9db
NB
2132 * @cmd: Associated se_cmd descriptor
2133 * @mem: SGL style memory for TCM WRITE / READ
2134 * @sg_mem_num: Number of SGL elements
2135 * @mem_bidi_in: SGL style memory for TCM BIDI READ
2136 * @sg_mem_bidi_num: Number of BIDI READ SGL elements
2137 *
2138 * Return: nonzero return cmd was rejected for -ENOMEM or inproper usage
2139 * of parameters.
2140 */
2141int transport_generic_map_mem_to_cmd(
2142 struct se_cmd *cmd,
5951146d
AG
2143 struct scatterlist *sgl,
2144 u32 sgl_count,
2145 struct scatterlist *sgl_bidi,
2146 u32 sgl_bidi_count)
c66ac9db 2147{
5951146d 2148 if (!sgl || !sgl_count)
c66ac9db 2149 return 0;
c66ac9db 2150
64f1db38
CH
2151 /*
2152 * Reject SCSI data overflow with map_mem_to_cmd() as incoming
2153 * scatterlists already have been set to follow what the fabric
2154 * passes for the original expected data transfer length.
2155 */
2156 if (cmd->se_cmd_flags & SCF_OVERFLOW_BIT) {
2157 pr_warn("Rejecting SCSI DATA overflow for fabric using"
2158 " SCF_PASSTHROUGH_SG_TO_MEM_NOALLOC\n");
2159 cmd->se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
2160 cmd->scsi_sense_reason = TCM_INVALID_CDB_FIELD;
2161 return -EINVAL;
2162 }
c66ac9db 2163
64f1db38
CH
2164 cmd->t_data_sg = sgl;
2165 cmd->t_data_nents = sgl_count;
c66ac9db 2166
64f1db38
CH
2167 if (sgl_bidi && sgl_bidi_count) {
2168 cmd->t_bidi_data_sg = sgl_bidi;
2169 cmd->t_bidi_data_nents = sgl_bidi_count;
c66ac9db 2170 }
64f1db38 2171 cmd->se_cmd_flags |= SCF_PASSTHROUGH_SG_TO_MEM_NOALLOC;
c66ac9db
NB
2172 return 0;
2173}
2174EXPORT_SYMBOL(transport_generic_map_mem_to_cmd);
2175
4949314c 2176void *transport_kmap_data_sg(struct se_cmd *cmd)
05d1c7c0 2177{
ec98f782 2178 struct scatterlist *sg = cmd->t_data_sg;
4949314c
AG
2179 struct page **pages;
2180 int i;
05d1c7c0
AG
2181
2182 /*
ec98f782
AG
2183 * We need to take into account a possible offset here for fabrics like
2184 * tcm_loop who may be using a contig buffer from the SCSI midlayer for
2185 * control CDBs passed as SGLs via transport_generic_map_mem_to_cmd()
05d1c7c0 2186 */
4949314c
AG
2187 if (!cmd->t_data_nents)
2188 return NULL;
3717ef0c
PB
2189
2190 BUG_ON(!sg);
2191 if (cmd->t_data_nents == 1)
4949314c
AG
2192 return kmap(sg_page(sg)) + sg->offset;
2193
2194 /* >1 page. use vmap */
2195 pages = kmalloc(sizeof(*pages) * cmd->t_data_nents, GFP_KERNEL);
3717ef0c
PB
2196 if (!pages) {
2197 cmd->scsi_sense_reason = TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
4949314c 2198 return NULL;
3717ef0c 2199 }
4949314c
AG
2200
2201 /* convert sg[] to pages[] */
2202 for_each_sg(cmd->t_data_sg, sg, cmd->t_data_nents, i) {
2203 pages[i] = sg_page(sg);
2204 }
2205
2206 cmd->t_data_vmap = vmap(pages, cmd->t_data_nents, VM_MAP, PAGE_KERNEL);
2207 kfree(pages);
3717ef0c
PB
2208 if (!cmd->t_data_vmap) {
2209 cmd->scsi_sense_reason = TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
4949314c 2210 return NULL;
3717ef0c 2211 }
4949314c
AG
2212
2213 return cmd->t_data_vmap + cmd->t_data_sg[0].offset;
05d1c7c0 2214}
4949314c 2215EXPORT_SYMBOL(transport_kmap_data_sg);
05d1c7c0 2216
4949314c 2217void transport_kunmap_data_sg(struct se_cmd *cmd)
05d1c7c0 2218{
a1edf9cf 2219 if (!cmd->t_data_nents) {
4949314c 2220 return;
a1edf9cf 2221 } else if (cmd->t_data_nents == 1) {
4949314c 2222 kunmap(sg_page(cmd->t_data_sg));
a1edf9cf
AG
2223 return;
2224 }
4949314c
AG
2225
2226 vunmap(cmd->t_data_vmap);
2227 cmd->t_data_vmap = NULL;
05d1c7c0 2228}
4949314c 2229EXPORT_SYMBOL(transport_kunmap_data_sg);
05d1c7c0 2230
c66ac9db 2231static int
05d1c7c0 2232transport_generic_get_mem(struct se_cmd *cmd)
c66ac9db 2233{
ec98f782
AG
2234 u32 length = cmd->data_length;
2235 unsigned int nents;
2236 struct page *page;
9db9da33 2237 gfp_t zero_flag;
ec98f782 2238 int i = 0;
c66ac9db 2239
ec98f782
AG
2240 nents = DIV_ROUND_UP(length, PAGE_SIZE);
2241 cmd->t_data_sg = kmalloc(sizeof(struct scatterlist) * nents, GFP_KERNEL);
2242 if (!cmd->t_data_sg)
2243 return -ENOMEM;
c66ac9db 2244
ec98f782
AG
2245 cmd->t_data_nents = nents;
2246 sg_init_table(cmd->t_data_sg, nents);
c66ac9db 2247
64f1db38 2248 zero_flag = cmd->se_cmd_flags & SCF_SCSI_DATA_CDB ? 0 : __GFP_ZERO;
9db9da33 2249
ec98f782
AG
2250 while (length) {
2251 u32 page_len = min_t(u32, length, PAGE_SIZE);
9db9da33 2252 page = alloc_page(GFP_KERNEL | zero_flag);
ec98f782
AG
2253 if (!page)
2254 goto out;
c66ac9db 2255
ec98f782
AG
2256 sg_set_page(&cmd->t_data_sg[i], page, page_len, 0);
2257 length -= page_len;
2258 i++;
c66ac9db 2259 }
c66ac9db 2260 return 0;
c66ac9db 2261
ec98f782 2262out:
d0e27c88 2263 while (i > 0) {
ec98f782 2264 i--;
d0e27c88 2265 __free_page(sg_page(&cmd->t_data_sg[i]));
c66ac9db 2266 }
ec98f782
AG
2267 kfree(cmd->t_data_sg);
2268 cmd->t_data_sg = NULL;
2269 return -ENOMEM;
c66ac9db
NB
2270}
2271
da0f7619 2272/*
b16a35b0
AG
2273 * Allocate any required resources to execute the command. For writes we
2274 * might not have the payload yet, so notify the fabric via a call to
2275 * ->write_pending instead. Otherwise place it on the execution queue.
c66ac9db 2276 */
a1d8b49a 2277int transport_generic_new_cmd(struct se_cmd *cmd)
c66ac9db 2278{
c66ac9db
NB
2279 int ret = 0;
2280
2281 /*
2282 * Determine is the TCM fabric module has already allocated physical
2283 * memory, and is directly calling transport_generic_map_mem_to_cmd()
ec98f782 2284 * beforehand.
c66ac9db 2285 */
ec98f782
AG
2286 if (!(cmd->se_cmd_flags & SCF_PASSTHROUGH_SG_TO_MEM_NOALLOC) &&
2287 cmd->data_length) {
05d1c7c0 2288 ret = transport_generic_get_mem(cmd);
c66ac9db 2289 if (ret < 0)
03e98c9e 2290 goto out_fail;
c66ac9db 2291 }
da0f7619 2292
4101f0a8 2293 atomic_inc(&cmd->t_fe_count);
4101f0a8 2294
c66ac9db 2295 /*
c3196f0c
CH
2296 * If this command is not a write we can execute it right here,
2297 * for write buffers we need to notify the fabric driver first
2298 * and let it call back once the write buffers are ready.
c66ac9db 2299 */
5f41a31d 2300 target_add_to_state_list(cmd);
c3196f0c
CH
2301 if (cmd->data_direction != DMA_TO_DEVICE) {
2302 target_execute_cmd(cmd);
2303 return 0;
2304 }
2305
2306 spin_lock_irq(&cmd->t_state_lock);
2307 cmd->t_state = TRANSPORT_WRITE_PENDING;
2308 spin_unlock_irq(&cmd->t_state_lock);
2309
2310 transport_cmd_check_stop(cmd, false);
2311
2312 ret = cmd->se_tfo->write_pending(cmd);
2313 if (ret == -EAGAIN || ret == -ENOMEM)
2314 goto queue_full;
2315
2316 if (ret < 0)
2317 return ret;
2318 return 1;
da0f7619
CH
2319
2320out_fail:
2321 cmd->se_cmd_flags |= SCF_SCSI_CDB_EXCEPTION;
2322 cmd->scsi_sense_reason = TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
2323 return -EINVAL;
c3196f0c
CH
2324queue_full:
2325 pr_debug("Handling write_pending QUEUE__FULL: se_cmd: %p\n", cmd);
2326 cmd->t_state = TRANSPORT_COMPLETE_QF_WP;
2327 transport_handle_queue_full(cmd, cmd->se_dev);
2328 return 0;
c66ac9db 2329}
a1d8b49a 2330EXPORT_SYMBOL(transport_generic_new_cmd);
c66ac9db 2331
e057f533 2332static void transport_write_pending_qf(struct se_cmd *cmd)
07bde79a 2333{
f147abb4
NB
2334 int ret;
2335
2336 ret = cmd->se_tfo->write_pending(cmd);
2337 if (ret == -EAGAIN || ret == -ENOMEM) {
e057f533
CH
2338 pr_debug("Handling write_pending QUEUE__FULL: se_cmd: %p\n",
2339 cmd);
2340 transport_handle_queue_full(cmd, cmd->se_dev);
2341 }
07bde79a
NB
2342}
2343
39c05f32 2344void transport_generic_free_cmd(struct se_cmd *cmd, int wait_for_tasks)
c66ac9db 2345{
d14921d6 2346 if (!(cmd->se_cmd_flags & SCF_SE_LUN_CMD)) {
c8e31f26 2347 if (wait_for_tasks && (cmd->se_cmd_flags & SCF_SCSI_TMR_CDB))
d14921d6
NB
2348 transport_wait_for_tasks(cmd);
2349
35462975 2350 transport_release_cmd(cmd);
d14921d6
NB
2351 } else {
2352 if (wait_for_tasks)
2353 transport_wait_for_tasks(cmd);
2354
c66ac9db
NB
2355 core_dec_lacl_count(cmd->se_sess->se_node_acl, cmd);
2356
82f1c8a4 2357 if (cmd->se_lun)
c66ac9db 2358 transport_lun_remove_cmd(cmd);
c66ac9db 2359
39c05f32 2360 transport_put_cmd(cmd);
c66ac9db
NB
2361 }
2362}
2363EXPORT_SYMBOL(transport_generic_free_cmd);
2364
a17f091d
NB
2365/* target_get_sess_cmd - Add command to active ->sess_cmd_list
2366 * @se_sess: session to reference
2367 * @se_cmd: command descriptor to add
a6360785 2368 * @ack_kref: Signal that fabric will perform an ack target_put_sess_cmd()
a17f091d 2369 */
bc187ea6
RD
2370static int target_get_sess_cmd(struct se_session *se_sess, struct se_cmd *se_cmd,
2371 bool ack_kref)
a17f091d
NB
2372{
2373 unsigned long flags;
bc187ea6 2374 int ret = 0;
a17f091d 2375
7481deb4 2376 kref_init(&se_cmd->cmd_kref);
a6360785
NB
2377 /*
2378 * Add a second kref if the fabric caller is expecting to handle
2379 * fabric acknowledgement that requires two target_put_sess_cmd()
2380 * invocations before se_cmd descriptor release.
2381 */
86715569 2382 if (ack_kref == true) {
a6360785 2383 kref_get(&se_cmd->cmd_kref);
86715569
NB
2384 se_cmd->se_cmd_flags |= SCF_ACK_KREF;
2385 }
7481deb4 2386
a17f091d 2387 spin_lock_irqsave(&se_sess->sess_cmd_lock, flags);
bc187ea6
RD
2388 if (se_sess->sess_tearing_down) {
2389 ret = -ESHUTDOWN;
2390 goto out;
2391 }
a17f091d
NB
2392 list_add_tail(&se_cmd->se_cmd_list, &se_sess->sess_cmd_list);
2393 se_cmd->check_release = 1;
bc187ea6
RD
2394
2395out:
a17f091d 2396 spin_unlock_irqrestore(&se_sess->sess_cmd_lock, flags);
bc187ea6 2397 return ret;
a17f091d 2398}
a17f091d 2399
7481deb4 2400static void target_release_cmd_kref(struct kref *kref)
a17f091d 2401{
7481deb4
NB
2402 struct se_cmd *se_cmd = container_of(kref, struct se_cmd, cmd_kref);
2403 struct se_session *se_sess = se_cmd->se_sess;
a17f091d
NB
2404 unsigned long flags;
2405
2406 spin_lock_irqsave(&se_sess->sess_cmd_lock, flags);
2407 if (list_empty(&se_cmd->se_cmd_list)) {
2408 spin_unlock_irqrestore(&se_sess->sess_cmd_lock, flags);
ffc32d52 2409 se_cmd->se_tfo->release_cmd(se_cmd);
7481deb4 2410 return;
a17f091d 2411 }
a17f091d
NB
2412 if (se_sess->sess_tearing_down && se_cmd->cmd_wait_set) {
2413 spin_unlock_irqrestore(&se_sess->sess_cmd_lock, flags);
2414 complete(&se_cmd->cmd_wait_comp);
7481deb4 2415 return;
a17f091d
NB
2416 }
2417 list_del(&se_cmd->se_cmd_list);
2418 spin_unlock_irqrestore(&se_sess->sess_cmd_lock, flags);
2419
7481deb4
NB
2420 se_cmd->se_tfo->release_cmd(se_cmd);
2421}
2422
2423/* target_put_sess_cmd - Check for active I/O shutdown via kref_put
2424 * @se_sess: session to reference
2425 * @se_cmd: command descriptor to drop
2426 */
2427int target_put_sess_cmd(struct se_session *se_sess, struct se_cmd *se_cmd)
2428{
2429 return kref_put(&se_cmd->cmd_kref, target_release_cmd_kref);
a17f091d
NB
2430}
2431EXPORT_SYMBOL(target_put_sess_cmd);
2432
1c7b13fe
RD
2433/* target_sess_cmd_list_set_waiting - Flag all commands in
2434 * sess_cmd_list to complete cmd_wait_comp. Set
2435 * sess_tearing_down so no more commands are queued.
2436 * @se_sess: session to flag
a17f091d 2437 */
1c7b13fe 2438void target_sess_cmd_list_set_waiting(struct se_session *se_sess)
a17f091d
NB
2439{
2440 struct se_cmd *se_cmd;
2441 unsigned long flags;
2442
a17f091d 2443 spin_lock_irqsave(&se_sess->sess_cmd_lock, flags);
a17f091d 2444
1c7b13fe
RD
2445 WARN_ON(se_sess->sess_tearing_down);
2446 se_sess->sess_tearing_down = 1;
a17f091d 2447
1c7b13fe 2448 list_for_each_entry(se_cmd, &se_sess->sess_cmd_list, se_cmd_list)
a17f091d
NB
2449 se_cmd->cmd_wait_set = 1;
2450
2451 spin_unlock_irqrestore(&se_sess->sess_cmd_lock, flags);
2452}
1c7b13fe 2453EXPORT_SYMBOL(target_sess_cmd_list_set_waiting);
a17f091d
NB
2454
2455/* target_wait_for_sess_cmds - Wait for outstanding descriptors
2456 * @se_sess: session to wait for active I/O
2457 * @wait_for_tasks: Make extra transport_wait_for_tasks call
2458 */
2459void target_wait_for_sess_cmds(
2460 struct se_session *se_sess,
2461 int wait_for_tasks)
2462{
2463 struct se_cmd *se_cmd, *tmp_cmd;
2464 bool rc = false;
2465
2466 list_for_each_entry_safe(se_cmd, tmp_cmd,
1c7b13fe 2467 &se_sess->sess_cmd_list, se_cmd_list) {
a17f091d
NB
2468 list_del(&se_cmd->se_cmd_list);
2469
2470 pr_debug("Waiting for se_cmd: %p t_state: %d, fabric state:"
2471 " %d\n", se_cmd, se_cmd->t_state,
2472 se_cmd->se_tfo->get_cmd_state(se_cmd));
2473
2474 if (wait_for_tasks) {
2475 pr_debug("Calling transport_wait_for_tasks se_cmd: %p t_state: %d,"
2476 " fabric state: %d\n", se_cmd, se_cmd->t_state,
2477 se_cmd->se_tfo->get_cmd_state(se_cmd));
2478
2479 rc = transport_wait_for_tasks(se_cmd);
2480
2481 pr_debug("After transport_wait_for_tasks se_cmd: %p t_state: %d,"
2482 " fabric state: %d\n", se_cmd, se_cmd->t_state,
2483 se_cmd->se_tfo->get_cmd_state(se_cmd));
2484 }
2485
2486 if (!rc) {
2487 wait_for_completion(&se_cmd->cmd_wait_comp);
2488 pr_debug("After cmd_wait_comp: se_cmd: %p t_state: %d"
2489 " fabric state: %d\n", se_cmd, se_cmd->t_state,
2490 se_cmd->se_tfo->get_cmd_state(se_cmd));
2491 }
2492
2493 se_cmd->se_tfo->release_cmd(se_cmd);
2494 }
2495}
2496EXPORT_SYMBOL(target_wait_for_sess_cmds);
2497
c66ac9db
NB
2498/* transport_lun_wait_for_tasks():
2499 *
2500 * Called from ConfigFS context to stop the passed struct se_cmd to allow
2501 * an struct se_lun to be successfully shutdown.
2502 */
2503static int transport_lun_wait_for_tasks(struct se_cmd *cmd, struct se_lun *lun)
2504{
2505 unsigned long flags;
cf572a96
CH
2506 int ret = 0;
2507
c66ac9db
NB
2508 /*
2509 * If the frontend has already requested this struct se_cmd to
2510 * be stopped, we can safely ignore this struct se_cmd.
2511 */
a1d8b49a 2512 spin_lock_irqsave(&cmd->t_state_lock, flags);
7d680f3b
CH
2513 if (cmd->transport_state & CMD_T_STOP) {
2514 cmd->transport_state &= ~CMD_T_LUN_STOP;
2515
2516 pr_debug("ConfigFS ITT[0x%08x] - CMD_T_STOP, skipping\n",
2517 cmd->se_tfo->get_task_tag(cmd));
a1d8b49a 2518 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
f7113a47 2519 transport_cmd_check_stop(cmd, false);
e3d6f909 2520 return -EPERM;
c66ac9db 2521 }
7d680f3b 2522 cmd->transport_state |= CMD_T_LUN_FE_STOP;
a1d8b49a 2523 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
c66ac9db 2524
cf572a96
CH
2525 // XXX: audit task_flags checks.
2526 spin_lock_irqsave(&cmd->t_state_lock, flags);
2527 if ((cmd->transport_state & CMD_T_BUSY) &&
2528 (cmd->transport_state & CMD_T_SENT)) {
2529 if (!target_stop_cmd(cmd, &flags))
2530 ret++;
cf572a96 2531 }
5f41a31d 2532 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
c66ac9db 2533
785fdf70
CH
2534 pr_debug("ConfigFS: cmd: %p stop tasks ret:"
2535 " %d\n", cmd, ret);
c66ac9db 2536 if (!ret) {
6708bb27 2537 pr_debug("ConfigFS: ITT[0x%08x] - stopping cmd....\n",
e3d6f909 2538 cmd->se_tfo->get_task_tag(cmd));
a1d8b49a 2539 wait_for_completion(&cmd->transport_lun_stop_comp);
6708bb27 2540 pr_debug("ConfigFS: ITT[0x%08x] - stopped cmd....\n",
e3d6f909 2541 cmd->se_tfo->get_task_tag(cmd));
c66ac9db 2542 }
c66ac9db
NB
2543
2544 return 0;
2545}
2546
c66ac9db
NB
2547static void __transport_clear_lun_from_sessions(struct se_lun *lun)
2548{
2549 struct se_cmd *cmd = NULL;
2550 unsigned long lun_flags, cmd_flags;
2551 /*
2552 * Do exception processing and return CHECK_CONDITION status to the
2553 * Initiator Port.
2554 */
2555 spin_lock_irqsave(&lun->lun_cmd_lock, lun_flags);
5951146d
AG
2556 while (!list_empty(&lun->lun_cmd_list)) {
2557 cmd = list_first_entry(&lun->lun_cmd_list,
2558 struct se_cmd, se_lun_node);
3d26fea0 2559 list_del_init(&cmd->se_lun_node);
5951146d 2560
a1d8b49a 2561 spin_lock(&cmd->t_state_lock);
6708bb27 2562 pr_debug("SE_LUN[%d] - Setting cmd->transport"
c66ac9db 2563 "_lun_stop for ITT: 0x%08x\n",
e3d6f909
AG
2564 cmd->se_lun->unpacked_lun,
2565 cmd->se_tfo->get_task_tag(cmd));
7d680f3b 2566 cmd->transport_state |= CMD_T_LUN_STOP;
a1d8b49a 2567 spin_unlock(&cmd->t_state_lock);
c66ac9db
NB
2568
2569 spin_unlock_irqrestore(&lun->lun_cmd_lock, lun_flags);
2570
6708bb27
AG
2571 if (!cmd->se_lun) {
2572 pr_err("ITT: 0x%08x, [i,t]_state: %u/%u\n",
e3d6f909
AG
2573 cmd->se_tfo->get_task_tag(cmd),
2574 cmd->se_tfo->get_cmd_state(cmd), cmd->t_state);
c66ac9db
NB
2575 BUG();
2576 }
2577 /*
2578 * If the Storage engine still owns the iscsi_cmd_t, determine
2579 * and/or stop its context.
2580 */
6708bb27 2581 pr_debug("SE_LUN[%d] - ITT: 0x%08x before transport"
e3d6f909
AG
2582 "_lun_wait_for_tasks()\n", cmd->se_lun->unpacked_lun,
2583 cmd->se_tfo->get_task_tag(cmd));
c66ac9db 2584
e3d6f909 2585 if (transport_lun_wait_for_tasks(cmd, cmd->se_lun) < 0) {
c66ac9db
NB
2586 spin_lock_irqsave(&lun->lun_cmd_lock, lun_flags);
2587 continue;
2588 }
2589
6708bb27 2590 pr_debug("SE_LUN[%d] - ITT: 0x%08x after transport_lun"
c66ac9db 2591 "_wait_for_tasks(): SUCCESS\n",
e3d6f909
AG
2592 cmd->se_lun->unpacked_lun,
2593 cmd->se_tfo->get_task_tag(cmd));
c66ac9db 2594
a1d8b49a 2595 spin_lock_irqsave(&cmd->t_state_lock, cmd_flags);
7d680f3b 2596 if (!(cmd->transport_state & CMD_T_DEV_ACTIVE)) {
a1d8b49a 2597 spin_unlock_irqrestore(&cmd->t_state_lock, cmd_flags);
c66ac9db
NB
2598 goto check_cond;
2599 }
7d680f3b 2600 cmd->transport_state &= ~CMD_T_DEV_ACTIVE;
cf572a96 2601 target_remove_from_state_list(cmd);
a1d8b49a 2602 spin_unlock_irqrestore(&cmd->t_state_lock, cmd_flags);
c66ac9db 2603
c66ac9db
NB
2604 /*
2605 * The Storage engine stopped this struct se_cmd before it was
2606 * send to the fabric frontend for delivery back to the
2607 * Initiator Node. Return this SCSI CDB back with an
2608 * CHECK_CONDITION status.
2609 */
2610check_cond:
2611 transport_send_check_condition_and_sense(cmd,
2612 TCM_NON_EXISTENT_LUN, 0);
2613 /*
2614 * If the fabric frontend is waiting for this iscsi_cmd_t to
2615 * be released, notify the waiting thread now that LU has
2616 * finished accessing it.
2617 */
a1d8b49a 2618 spin_lock_irqsave(&cmd->t_state_lock, cmd_flags);
7d680f3b 2619 if (cmd->transport_state & CMD_T_LUN_FE_STOP) {
6708bb27 2620 pr_debug("SE_LUN[%d] - Detected FE stop for"
c66ac9db
NB
2621 " struct se_cmd: %p ITT: 0x%08x\n",
2622 lun->unpacked_lun,
e3d6f909 2623 cmd, cmd->se_tfo->get_task_tag(cmd));
c66ac9db 2624
a1d8b49a 2625 spin_unlock_irqrestore(&cmd->t_state_lock,
c66ac9db 2626 cmd_flags);
f7113a47 2627 transport_cmd_check_stop(cmd, false);
a1d8b49a 2628 complete(&cmd->transport_lun_fe_stop_comp);
c66ac9db
NB
2629 spin_lock_irqsave(&lun->lun_cmd_lock, lun_flags);
2630 continue;
2631 }
6708bb27 2632 pr_debug("SE_LUN[%d] - ITT: 0x%08x finished processing\n",
e3d6f909 2633 lun->unpacked_lun, cmd->se_tfo->get_task_tag(cmd));
c66ac9db 2634
a1d8b49a 2635 spin_unlock_irqrestore(&cmd->t_state_lock, cmd_flags);
c66ac9db
NB
2636 spin_lock_irqsave(&lun->lun_cmd_lock, lun_flags);
2637 }
2638 spin_unlock_irqrestore(&lun->lun_cmd_lock, lun_flags);
2639}
2640
2641static int transport_clear_lun_thread(void *p)
2642{
8359cf43 2643 struct se_lun *lun = p;
c66ac9db
NB
2644
2645 __transport_clear_lun_from_sessions(lun);
2646 complete(&lun->lun_shutdown_comp);
2647
2648 return 0;
2649}
2650
2651int transport_clear_lun_from_sessions(struct se_lun *lun)
2652{
2653 struct task_struct *kt;
2654
5951146d 2655 kt = kthread_run(transport_clear_lun_thread, lun,
c66ac9db
NB
2656 "tcm_cl_%u", lun->unpacked_lun);
2657 if (IS_ERR(kt)) {
6708bb27 2658 pr_err("Unable to start clear_lun thread\n");
e3d6f909 2659 return PTR_ERR(kt);
c66ac9db
NB
2660 }
2661 wait_for_completion(&lun->lun_shutdown_comp);
2662
2663 return 0;
2664}
2665
d14921d6
NB
2666/**
2667 * transport_wait_for_tasks - wait for completion to occur
2668 * @cmd: command to wait
c66ac9db 2669 *
d14921d6
NB
2670 * Called from frontend fabric context to wait for storage engine
2671 * to pause and/or release frontend generated struct se_cmd.
c66ac9db 2672 */
a17f091d 2673bool transport_wait_for_tasks(struct se_cmd *cmd)
c66ac9db
NB
2674{
2675 unsigned long flags;
2676
a1d8b49a 2677 spin_lock_irqsave(&cmd->t_state_lock, flags);
c8e31f26
AG
2678 if (!(cmd->se_cmd_flags & SCF_SE_LUN_CMD) &&
2679 !(cmd->se_cmd_flags & SCF_SCSI_TMR_CDB)) {
d14921d6 2680 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
a17f091d 2681 return false;
d14921d6 2682 }
cb4f4d3c 2683
c8e31f26
AG
2684 if (!(cmd->se_cmd_flags & SCF_SUPPORTED_SAM_OPCODE) &&
2685 !(cmd->se_cmd_flags & SCF_SCSI_TMR_CDB)) {
d14921d6 2686 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
a17f091d 2687 return false;
d14921d6 2688 }
c66ac9db
NB
2689 /*
2690 * If we are already stopped due to an external event (ie: LUN shutdown)
2691 * sleep until the connection can have the passed struct se_cmd back.
a1d8b49a 2692 * The cmd->transport_lun_stopped_sem will be upped by
c66ac9db
NB
2693 * transport_clear_lun_from_sessions() once the ConfigFS context caller
2694 * has completed its operation on the struct se_cmd.
2695 */
7d680f3b 2696 if (cmd->transport_state & CMD_T_LUN_STOP) {
6708bb27 2697 pr_debug("wait_for_tasks: Stopping"
e3d6f909 2698 " wait_for_completion(&cmd->t_tasktransport_lun_fe"
c66ac9db 2699 "_stop_comp); for ITT: 0x%08x\n",
e3d6f909 2700 cmd->se_tfo->get_task_tag(cmd));
c66ac9db
NB
2701 /*
2702 * There is a special case for WRITES where a FE exception +
2703 * LUN shutdown means ConfigFS context is still sleeping on
2704 * transport_lun_stop_comp in transport_lun_wait_for_tasks().
2705 * We go ahead and up transport_lun_stop_comp just to be sure
2706 * here.
2707 */
a1d8b49a
AG
2708 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
2709 complete(&cmd->transport_lun_stop_comp);
2710 wait_for_completion(&cmd->transport_lun_fe_stop_comp);
2711 spin_lock_irqsave(&cmd->t_state_lock, flags);
c66ac9db 2712
cf572a96 2713 target_remove_from_state_list(cmd);
c66ac9db
NB
2714 /*
2715 * At this point, the frontend who was the originator of this
2716 * struct se_cmd, now owns the structure and can be released through
2717 * normal means below.
2718 */
6708bb27 2719 pr_debug("wait_for_tasks: Stopped"
e3d6f909 2720 " wait_for_completion(&cmd->t_tasktransport_lun_fe_"
c66ac9db 2721 "stop_comp); for ITT: 0x%08x\n",
e3d6f909 2722 cmd->se_tfo->get_task_tag(cmd));
c66ac9db 2723
7d680f3b 2724 cmd->transport_state &= ~CMD_T_LUN_STOP;
c66ac9db 2725 }
7d680f3b 2726
3d28934a 2727 if (!(cmd->transport_state & CMD_T_ACTIVE)) {
d14921d6 2728 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
a17f091d 2729 return false;
d14921d6 2730 }
c66ac9db 2731
7d680f3b 2732 cmd->transport_state |= CMD_T_STOP;
c66ac9db 2733
6708bb27 2734 pr_debug("wait_for_tasks: Stopping %p ITT: 0x%08x"
7d680f3b 2735 " i_state: %d, t_state: %d, CMD_T_STOP\n",
f2da9dbd
CH
2736 cmd, cmd->se_tfo->get_task_tag(cmd),
2737 cmd->se_tfo->get_cmd_state(cmd), cmd->t_state);
c66ac9db 2738
a1d8b49a 2739 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
c66ac9db 2740
a1d8b49a 2741 wait_for_completion(&cmd->t_transport_stop_comp);
c66ac9db 2742
a1d8b49a 2743 spin_lock_irqsave(&cmd->t_state_lock, flags);
7d680f3b 2744 cmd->transport_state &= ~(CMD_T_ACTIVE | CMD_T_STOP);
c66ac9db 2745
35d1efe8 2746 pr_debug("wait_for_tasks: Stopped wait_for_completion("
a1d8b49a 2747 "&cmd->t_transport_stop_comp) for ITT: 0x%08x\n",
e3d6f909 2748 cmd->se_tfo->get_task_tag(cmd));
c66ac9db 2749
d14921d6 2750 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
a17f091d
NB
2751
2752 return true;
c66ac9db 2753}
d14921d6 2754EXPORT_SYMBOL(transport_wait_for_tasks);
c66ac9db
NB
2755
2756static int transport_get_sense_codes(
2757 struct se_cmd *cmd,
2758 u8 *asc,
2759 u8 *ascq)
2760{
2761 *asc = cmd->scsi_asc;
2762 *ascq = cmd->scsi_ascq;
2763
2764 return 0;
2765}
2766
2767static int transport_set_sense_codes(
2768 struct se_cmd *cmd,
2769 u8 asc,
2770 u8 ascq)
2771{
2772 cmd->scsi_asc = asc;
2773 cmd->scsi_ascq = ascq;
2774
2775 return 0;
2776}
2777
2778int transport_send_check_condition_and_sense(
2779 struct se_cmd *cmd,
2780 u8 reason,
2781 int from_transport)
2782{
2783 unsigned char *buffer = cmd->sense_buffer;
2784 unsigned long flags;
c66ac9db
NB
2785 u8 asc = 0, ascq = 0;
2786
a1d8b49a 2787 spin_lock_irqsave(&cmd->t_state_lock, flags);
c66ac9db 2788 if (cmd->se_cmd_flags & SCF_SENT_CHECK_CONDITION) {
a1d8b49a 2789 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
c66ac9db
NB
2790 return 0;
2791 }
2792 cmd->se_cmd_flags |= SCF_SENT_CHECK_CONDITION;
a1d8b49a 2793 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
c66ac9db
NB
2794
2795 if (!reason && from_transport)
2796 goto after_reason;
2797
2798 if (!from_transport)
2799 cmd->se_cmd_flags |= SCF_EMULATED_TASK_SENSE;
9c58b7dd 2800
c66ac9db
NB
2801 /*
2802 * Actual SENSE DATA, see SPC-3 7.23.2 SPC_SENSE_KEY_OFFSET uses
2803 * SENSE KEY values from include/scsi/scsi.h
2804 */
2805 switch (reason) {
2806 case TCM_NON_EXISTENT_LUN:
eb39d340 2807 /* CURRENT ERROR */
9c58b7dd
RD
2808 buffer[0] = 0x70;
2809 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
eb39d340 2810 /* ILLEGAL REQUEST */
9c58b7dd 2811 buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
eb39d340 2812 /* LOGICAL UNIT NOT SUPPORTED */
9c58b7dd 2813 buffer[SPC_ASC_KEY_OFFSET] = 0x25;
eb39d340 2814 break;
c66ac9db
NB
2815 case TCM_UNSUPPORTED_SCSI_OPCODE:
2816 case TCM_SECTOR_COUNT_TOO_MANY:
2817 /* CURRENT ERROR */
9c58b7dd
RD
2818 buffer[0] = 0x70;
2819 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
c66ac9db 2820 /* ILLEGAL REQUEST */
9c58b7dd 2821 buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
c66ac9db 2822 /* INVALID COMMAND OPERATION CODE */
9c58b7dd 2823 buffer[SPC_ASC_KEY_OFFSET] = 0x20;
c66ac9db
NB
2824 break;
2825 case TCM_UNKNOWN_MODE_PAGE:
2826 /* CURRENT ERROR */
9c58b7dd
RD
2827 buffer[0] = 0x70;
2828 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
c66ac9db 2829 /* ILLEGAL REQUEST */
9c58b7dd 2830 buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
c66ac9db 2831 /* INVALID FIELD IN CDB */
9c58b7dd 2832 buffer[SPC_ASC_KEY_OFFSET] = 0x24;
c66ac9db
NB
2833 break;
2834 case TCM_CHECK_CONDITION_ABORT_CMD:
2835 /* CURRENT ERROR */
9c58b7dd
RD
2836 buffer[0] = 0x70;
2837 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
c66ac9db 2838 /* ABORTED COMMAND */
9c58b7dd 2839 buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
c66ac9db 2840 /* BUS DEVICE RESET FUNCTION OCCURRED */
9c58b7dd
RD
2841 buffer[SPC_ASC_KEY_OFFSET] = 0x29;
2842 buffer[SPC_ASCQ_KEY_OFFSET] = 0x03;
c66ac9db
NB
2843 break;
2844 case TCM_INCORRECT_AMOUNT_OF_DATA:
2845 /* CURRENT ERROR */
9c58b7dd
RD
2846 buffer[0] = 0x70;
2847 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
c66ac9db 2848 /* ABORTED COMMAND */
9c58b7dd 2849 buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
c66ac9db 2850 /* WRITE ERROR */
9c58b7dd 2851 buffer[SPC_ASC_KEY_OFFSET] = 0x0c;
c66ac9db 2852 /* NOT ENOUGH UNSOLICITED DATA */
9c58b7dd 2853 buffer[SPC_ASCQ_KEY_OFFSET] = 0x0d;
c66ac9db
NB
2854 break;
2855 case TCM_INVALID_CDB_FIELD:
2856 /* CURRENT ERROR */
9c58b7dd
RD
2857 buffer[0] = 0x70;
2858 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
9fbc8909 2859 /* ILLEGAL REQUEST */
9c58b7dd 2860 buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
c66ac9db 2861 /* INVALID FIELD IN CDB */
9c58b7dd 2862 buffer[SPC_ASC_KEY_OFFSET] = 0x24;
c66ac9db
NB
2863 break;
2864 case TCM_INVALID_PARAMETER_LIST:
2865 /* CURRENT ERROR */
9c58b7dd
RD
2866 buffer[0] = 0x70;
2867 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
9fbc8909 2868 /* ILLEGAL REQUEST */
9c58b7dd 2869 buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
c66ac9db 2870 /* INVALID FIELD IN PARAMETER LIST */
9c58b7dd 2871 buffer[SPC_ASC_KEY_OFFSET] = 0x26;
c66ac9db
NB
2872 break;
2873 case TCM_UNEXPECTED_UNSOLICITED_DATA:
2874 /* CURRENT ERROR */
9c58b7dd
RD
2875 buffer[0] = 0x70;
2876 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
c66ac9db 2877 /* ABORTED COMMAND */
9c58b7dd 2878 buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
c66ac9db 2879 /* WRITE ERROR */
9c58b7dd 2880 buffer[SPC_ASC_KEY_OFFSET] = 0x0c;
c66ac9db 2881 /* UNEXPECTED_UNSOLICITED_DATA */
9c58b7dd 2882 buffer[SPC_ASCQ_KEY_OFFSET] = 0x0c;
c66ac9db
NB
2883 break;
2884 case TCM_SERVICE_CRC_ERROR:
2885 /* CURRENT ERROR */
9c58b7dd
RD
2886 buffer[0] = 0x70;
2887 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
c66ac9db 2888 /* ABORTED COMMAND */
9c58b7dd 2889 buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
c66ac9db 2890 /* PROTOCOL SERVICE CRC ERROR */
9c58b7dd 2891 buffer[SPC_ASC_KEY_OFFSET] = 0x47;
c66ac9db 2892 /* N/A */
9c58b7dd 2893 buffer[SPC_ASCQ_KEY_OFFSET] = 0x05;
c66ac9db
NB
2894 break;
2895 case TCM_SNACK_REJECTED:
2896 /* CURRENT ERROR */
9c58b7dd
RD
2897 buffer[0] = 0x70;
2898 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
c66ac9db 2899 /* ABORTED COMMAND */
9c58b7dd 2900 buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
c66ac9db 2901 /* READ ERROR */
9c58b7dd 2902 buffer[SPC_ASC_KEY_OFFSET] = 0x11;
c66ac9db 2903 /* FAILED RETRANSMISSION REQUEST */
9c58b7dd 2904 buffer[SPC_ASCQ_KEY_OFFSET] = 0x13;
c66ac9db
NB
2905 break;
2906 case TCM_WRITE_PROTECTED:
2907 /* CURRENT ERROR */
9c58b7dd
RD
2908 buffer[0] = 0x70;
2909 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
c66ac9db 2910 /* DATA PROTECT */
9c58b7dd 2911 buffer[SPC_SENSE_KEY_OFFSET] = DATA_PROTECT;
c66ac9db 2912 /* WRITE PROTECTED */
9c58b7dd 2913 buffer[SPC_ASC_KEY_OFFSET] = 0x27;
c66ac9db 2914 break;
e2397c70
RD
2915 case TCM_ADDRESS_OUT_OF_RANGE:
2916 /* CURRENT ERROR */
9c58b7dd
RD
2917 buffer[0] = 0x70;
2918 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
e2397c70 2919 /* ILLEGAL REQUEST */
9c58b7dd 2920 buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
e2397c70 2921 /* LOGICAL BLOCK ADDRESS OUT OF RANGE */
9c58b7dd 2922 buffer[SPC_ASC_KEY_OFFSET] = 0x21;
e2397c70 2923 break;
c66ac9db
NB
2924 case TCM_CHECK_CONDITION_UNIT_ATTENTION:
2925 /* CURRENT ERROR */
9c58b7dd
RD
2926 buffer[0] = 0x70;
2927 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
c66ac9db 2928 /* UNIT ATTENTION */
9c58b7dd 2929 buffer[SPC_SENSE_KEY_OFFSET] = UNIT_ATTENTION;
c66ac9db 2930 core_scsi3_ua_for_check_condition(cmd, &asc, &ascq);
9c58b7dd
RD
2931 buffer[SPC_ASC_KEY_OFFSET] = asc;
2932 buffer[SPC_ASCQ_KEY_OFFSET] = ascq;
c66ac9db
NB
2933 break;
2934 case TCM_CHECK_CONDITION_NOT_READY:
2935 /* CURRENT ERROR */
9c58b7dd
RD
2936 buffer[0] = 0x70;
2937 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
c66ac9db 2938 /* Not Ready */
9c58b7dd 2939 buffer[SPC_SENSE_KEY_OFFSET] = NOT_READY;
c66ac9db 2940 transport_get_sense_codes(cmd, &asc, &ascq);
9c58b7dd
RD
2941 buffer[SPC_ASC_KEY_OFFSET] = asc;
2942 buffer[SPC_ASCQ_KEY_OFFSET] = ascq;
c66ac9db
NB
2943 break;
2944 case TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE:
2945 default:
2946 /* CURRENT ERROR */
9c58b7dd
RD
2947 buffer[0] = 0x70;
2948 buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
c66ac9db 2949 /* ILLEGAL REQUEST */
9c58b7dd 2950 buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
c66ac9db 2951 /* LOGICAL UNIT COMMUNICATION FAILURE */
9c58b7dd 2952 buffer[SPC_ASC_KEY_OFFSET] = 0x80;
c66ac9db
NB
2953 break;
2954 }
2955 /*
2956 * This code uses linux/include/scsi/scsi.h SAM status codes!
2957 */
2958 cmd->scsi_status = SAM_STAT_CHECK_CONDITION;
2959 /*
2960 * Automatically padded, this value is encoded in the fabric's
2961 * data_length response PDU containing the SCSI defined sense data.
2962 */
9c58b7dd 2963 cmd->scsi_sense_length = TRANSPORT_SENSE_BUFFER;
c66ac9db
NB
2964
2965after_reason:
07bde79a 2966 return cmd->se_tfo->queue_status(cmd);
c66ac9db
NB
2967}
2968EXPORT_SYMBOL(transport_send_check_condition_and_sense);
2969
2970int transport_check_aborted_status(struct se_cmd *cmd, int send_status)
2971{
2972 int ret = 0;
2973
7d680f3b 2974 if (cmd->transport_state & CMD_T_ABORTED) {
6708bb27 2975 if (!send_status ||
c66ac9db
NB
2976 (cmd->se_cmd_flags & SCF_SENT_DELAYED_TAS))
2977 return 1;
8b1e1244 2978
6708bb27 2979 pr_debug("Sending delayed SAM_STAT_TASK_ABORTED"
c66ac9db 2980 " status for CDB: 0x%02x ITT: 0x%08x\n",
a1d8b49a 2981 cmd->t_task_cdb[0],
e3d6f909 2982 cmd->se_tfo->get_task_tag(cmd));
8b1e1244 2983
c66ac9db 2984 cmd->se_cmd_flags |= SCF_SENT_DELAYED_TAS;
e3d6f909 2985 cmd->se_tfo->queue_status(cmd);
c66ac9db
NB
2986 ret = 1;
2987 }
2988 return ret;
2989}
2990EXPORT_SYMBOL(transport_check_aborted_status);
2991
2992void transport_send_task_abort(struct se_cmd *cmd)
2993{
c252f003
NB
2994 unsigned long flags;
2995
2996 spin_lock_irqsave(&cmd->t_state_lock, flags);
2997 if (cmd->se_cmd_flags & SCF_SENT_CHECK_CONDITION) {
2998 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
2999 return;
3000 }
3001 spin_unlock_irqrestore(&cmd->t_state_lock, flags);
3002
c66ac9db
NB
3003 /*
3004 * If there are still expected incoming fabric WRITEs, we wait
3005 * until until they have completed before sending a TASK_ABORTED
3006 * response. This response with TASK_ABORTED status will be
3007 * queued back to fabric module by transport_check_aborted_status().
3008 */
3009 if (cmd->data_direction == DMA_TO_DEVICE) {
e3d6f909 3010 if (cmd->se_tfo->write_pending_status(cmd) != 0) {
7d680f3b 3011 cmd->transport_state |= CMD_T_ABORTED;
c66ac9db 3012 smp_mb__after_atomic_inc();
c66ac9db
NB
3013 }
3014 }
3015 cmd->scsi_status = SAM_STAT_TASK_ABORTED;
8b1e1244 3016
6708bb27 3017 pr_debug("Setting SAM_STAT_TASK_ABORTED status for CDB: 0x%02x,"
a1d8b49a 3018 " ITT: 0x%08x\n", cmd->t_task_cdb[0],
e3d6f909 3019 cmd->se_tfo->get_task_tag(cmd));
8b1e1244 3020
e3d6f909 3021 cmd->se_tfo->queue_status(cmd);
c66ac9db
NB
3022}
3023
af877292 3024static void target_tmr_work(struct work_struct *work)
c66ac9db 3025{
af877292 3026 struct se_cmd *cmd = container_of(work, struct se_cmd, work);
5951146d 3027 struct se_device *dev = cmd->se_dev;
c66ac9db
NB
3028 struct se_tmr_req *tmr = cmd->se_tmr_req;
3029 int ret;
3030
3031 switch (tmr->function) {
5c6cd613 3032 case TMR_ABORT_TASK:
3d28934a 3033 core_tmr_abort_task(dev, tmr, cmd->se_sess);
c66ac9db 3034 break;
5c6cd613
NB
3035 case TMR_ABORT_TASK_SET:
3036 case TMR_CLEAR_ACA:
3037 case TMR_CLEAR_TASK_SET:
c66ac9db
NB
3038 tmr->response = TMR_TASK_MGMT_FUNCTION_NOT_SUPPORTED;
3039 break;
5c6cd613 3040 case TMR_LUN_RESET:
c66ac9db
NB
3041 ret = core_tmr_lun_reset(dev, tmr, NULL, NULL);
3042 tmr->response = (!ret) ? TMR_FUNCTION_COMPLETE :
3043 TMR_FUNCTION_REJECTED;
3044 break;
5c6cd613 3045 case TMR_TARGET_WARM_RESET:
c66ac9db
NB
3046 tmr->response = TMR_FUNCTION_REJECTED;
3047 break;
5c6cd613 3048 case TMR_TARGET_COLD_RESET:
c66ac9db
NB
3049 tmr->response = TMR_FUNCTION_REJECTED;
3050 break;
c66ac9db 3051 default:
6708bb27 3052 pr_err("Uknown TMR function: 0x%02x.\n",
c66ac9db
NB
3053 tmr->function);
3054 tmr->response = TMR_FUNCTION_REJECTED;
3055 break;
3056 }
3057
3058 cmd->t_state = TRANSPORT_ISTATE_PROCESSING;
e3d6f909 3059 cmd->se_tfo->queue_tm_rsp(cmd);
c66ac9db 3060
b7b8bef7 3061 transport_cmd_check_stop_to_fabric(cmd);
c66ac9db
NB
3062}
3063
af877292
CH
3064int transport_generic_handle_tmr(
3065 struct se_cmd *cmd)
c66ac9db 3066{
af877292
CH
3067 INIT_WORK(&cmd->work, target_tmr_work);
3068 queue_work(cmd->se_dev->tmr_wq, &cmd->work);
c66ac9db
NB
3069 return 0;
3070}
af877292 3071EXPORT_SYMBOL(transport_generic_handle_tmr);