target_core_transport.c 77 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871
  1. /*******************************************************************************
  2. * Filename: target_core_transport.c
  3. *
  4. * This file contains the Generic Target Engine Core.
  5. *
  6. * (c) Copyright 2002-2013 Datera, Inc.
  7. *
  8. * Nicholas A. Bellinger <nab@kernel.org>
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License as published by
  12. * the Free Software Foundation; either version 2 of the License, or
  13. * (at your option) any later version.
  14. *
  15. * This program is distributed in the hope that it will be useful,
  16. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. * GNU General Public License for more details.
  19. *
  20. * You should have received a copy of the GNU General Public License
  21. * along with this program; if not, write to the Free Software
  22. * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  23. *
  24. ******************************************************************************/
  25. #include <linux/net.h>
  26. #include <linux/delay.h>
  27. #include <linux/string.h>
  28. #include <linux/timer.h>
  29. #include <linux/slab.h>
  30. #include <linux/spinlock.h>
  31. #include <linux/kthread.h>
  32. #include <linux/in.h>
  33. #include <linux/cdrom.h>
  34. #include <linux/module.h>
  35. #include <linux/ratelimit.h>
  36. #include <asm/unaligned.h>
  37. #include <net/sock.h>
  38. #include <net/tcp.h>
  39. #include <scsi/scsi.h>
  40. #include <scsi/scsi_cmnd.h>
  41. #include <scsi/scsi_tcq.h>
  42. #include <target/target_core_base.h>
  43. #include <target/target_core_backend.h>
  44. #include <target/target_core_fabric.h>
  45. #include <target/target_core_configfs.h>
  46. #include "target_core_internal.h"
  47. #include "target_core_alua.h"
  48. #include "target_core_pr.h"
  49. #include "target_core_ua.h"
  50. #define CREATE_TRACE_POINTS
  51. #include <trace/events/target.h>
  52. static struct workqueue_struct *target_completion_wq;
  53. static struct kmem_cache *se_sess_cache;
  54. struct kmem_cache *se_ua_cache;
  55. struct kmem_cache *t10_pr_reg_cache;
  56. struct kmem_cache *t10_alua_lu_gp_cache;
  57. struct kmem_cache *t10_alua_lu_gp_mem_cache;
  58. struct kmem_cache *t10_alua_tg_pt_gp_cache;
  59. struct kmem_cache *t10_alua_tg_pt_gp_mem_cache;
  60. struct kmem_cache *t10_alua_lba_map_cache;
  61. struct kmem_cache *t10_alua_lba_map_mem_cache;
  62. static void transport_complete_task_attr(struct se_cmd *cmd);
  63. static void transport_handle_queue_full(struct se_cmd *cmd,
  64. struct se_device *dev);
  65. static int transport_put_cmd(struct se_cmd *cmd);
  66. static void target_complete_ok_work(struct work_struct *work);
  67. int init_se_kmem_caches(void)
  68. {
  69. se_sess_cache = kmem_cache_create("se_sess_cache",
  70. sizeof(struct se_session), __alignof__(struct se_session),
  71. 0, NULL);
  72. if (!se_sess_cache) {
  73. pr_err("kmem_cache_create() for struct se_session"
  74. " failed\n");
  75. goto out;
  76. }
  77. se_ua_cache = kmem_cache_create("se_ua_cache",
  78. sizeof(struct se_ua), __alignof__(struct se_ua),
  79. 0, NULL);
  80. if (!se_ua_cache) {
  81. pr_err("kmem_cache_create() for struct se_ua failed\n");
  82. goto out_free_sess_cache;
  83. }
  84. t10_pr_reg_cache = kmem_cache_create("t10_pr_reg_cache",
  85. sizeof(struct t10_pr_registration),
  86. __alignof__(struct t10_pr_registration), 0, NULL);
  87. if (!t10_pr_reg_cache) {
  88. pr_err("kmem_cache_create() for struct t10_pr_registration"
  89. " failed\n");
  90. goto out_free_ua_cache;
  91. }
  92. t10_alua_lu_gp_cache = kmem_cache_create("t10_alua_lu_gp_cache",
  93. sizeof(struct t10_alua_lu_gp), __alignof__(struct t10_alua_lu_gp),
  94. 0, NULL);
  95. if (!t10_alua_lu_gp_cache) {
  96. pr_err("kmem_cache_create() for t10_alua_lu_gp_cache"
  97. " failed\n");
  98. goto out_free_pr_reg_cache;
  99. }
  100. t10_alua_lu_gp_mem_cache = kmem_cache_create("t10_alua_lu_gp_mem_cache",
  101. sizeof(struct t10_alua_lu_gp_member),
  102. __alignof__(struct t10_alua_lu_gp_member), 0, NULL);
  103. if (!t10_alua_lu_gp_mem_cache) {
  104. pr_err("kmem_cache_create() for t10_alua_lu_gp_mem_"
  105. "cache failed\n");
  106. goto out_free_lu_gp_cache;
  107. }
  108. t10_alua_tg_pt_gp_cache = kmem_cache_create("t10_alua_tg_pt_gp_cache",
  109. sizeof(struct t10_alua_tg_pt_gp),
  110. __alignof__(struct t10_alua_tg_pt_gp), 0, NULL);
  111. if (!t10_alua_tg_pt_gp_cache) {
  112. pr_err("kmem_cache_create() for t10_alua_tg_pt_gp_"
  113. "cache failed\n");
  114. goto out_free_lu_gp_mem_cache;
  115. }
  116. t10_alua_tg_pt_gp_mem_cache = kmem_cache_create(
  117. "t10_alua_tg_pt_gp_mem_cache",
  118. sizeof(struct t10_alua_tg_pt_gp_member),
  119. __alignof__(struct t10_alua_tg_pt_gp_member),
  120. 0, NULL);
  121. if (!t10_alua_tg_pt_gp_mem_cache) {
  122. pr_err("kmem_cache_create() for t10_alua_tg_pt_gp_"
  123. "mem_t failed\n");
  124. goto out_free_tg_pt_gp_cache;
  125. }
  126. t10_alua_lba_map_cache = kmem_cache_create(
  127. "t10_alua_lba_map_cache",
  128. sizeof(struct t10_alua_lba_map),
  129. __alignof__(struct t10_alua_lba_map), 0, NULL);
  130. if (!t10_alua_lba_map_cache) {
  131. pr_err("kmem_cache_create() for t10_alua_lba_map_"
  132. "cache failed\n");
  133. goto out_free_tg_pt_gp_mem_cache;
  134. }
  135. t10_alua_lba_map_mem_cache = kmem_cache_create(
  136. "t10_alua_lba_map_mem_cache",
  137. sizeof(struct t10_alua_lba_map_member),
  138. __alignof__(struct t10_alua_lba_map_member), 0, NULL);
  139. if (!t10_alua_lba_map_mem_cache) {
  140. pr_err("kmem_cache_create() for t10_alua_lba_map_mem_"
  141. "cache failed\n");
  142. goto out_free_lba_map_cache;
  143. }
  144. target_completion_wq = alloc_workqueue("target_completion",
  145. WQ_MEM_RECLAIM, 0);
  146. if (!target_completion_wq)
  147. goto out_free_lba_map_mem_cache;
  148. return 0;
  149. out_free_lba_map_mem_cache:
  150. kmem_cache_destroy(t10_alua_lba_map_mem_cache);
  151. out_free_lba_map_cache:
  152. kmem_cache_destroy(t10_alua_lba_map_cache);
  153. out_free_tg_pt_gp_mem_cache:
  154. kmem_cache_destroy(t10_alua_tg_pt_gp_mem_cache);
  155. out_free_tg_pt_gp_cache:
  156. kmem_cache_destroy(t10_alua_tg_pt_gp_cache);
  157. out_free_lu_gp_mem_cache:
  158. kmem_cache_destroy(t10_alua_lu_gp_mem_cache);
  159. out_free_lu_gp_cache:
  160. kmem_cache_destroy(t10_alua_lu_gp_cache);
  161. out_free_pr_reg_cache:
  162. kmem_cache_destroy(t10_pr_reg_cache);
  163. out_free_ua_cache:
  164. kmem_cache_destroy(se_ua_cache);
  165. out_free_sess_cache:
  166. kmem_cache_destroy(se_sess_cache);
  167. out:
  168. return -ENOMEM;
  169. }
  170. void release_se_kmem_caches(void)
  171. {
  172. destroy_workqueue(target_completion_wq);
  173. kmem_cache_destroy(se_sess_cache);
  174. kmem_cache_destroy(se_ua_cache);
  175. kmem_cache_destroy(t10_pr_reg_cache);
  176. kmem_cache_destroy(t10_alua_lu_gp_cache);
  177. kmem_cache_destroy(t10_alua_lu_gp_mem_cache);
  178. kmem_cache_destroy(t10_alua_tg_pt_gp_cache);
  179. kmem_cache_destroy(t10_alua_tg_pt_gp_mem_cache);
  180. kmem_cache_destroy(t10_alua_lba_map_cache);
  181. kmem_cache_destroy(t10_alua_lba_map_mem_cache);
  182. }
  183. /* This code ensures unique mib indexes are handed out. */
  184. static DEFINE_SPINLOCK(scsi_mib_index_lock);
  185. static u32 scsi_mib_index[SCSI_INDEX_TYPE_MAX];
  186. /*
  187. * Allocate a new row index for the entry type specified
  188. */
  189. u32 scsi_get_new_index(scsi_index_t type)
  190. {
  191. u32 new_index;
  192. BUG_ON((type < 0) || (type >= SCSI_INDEX_TYPE_MAX));
  193. spin_lock(&scsi_mib_index_lock);
  194. new_index = ++scsi_mib_index[type];
  195. spin_unlock(&scsi_mib_index_lock);
  196. return new_index;
  197. }
  198. void transport_subsystem_check_init(void)
  199. {
  200. int ret;
  201. static int sub_api_initialized;
  202. if (sub_api_initialized)
  203. return;
  204. ret = request_module("target_core_iblock");
  205. if (ret != 0)
  206. pr_err("Unable to load target_core_iblock\n");
  207. ret = request_module("target_core_file");
  208. if (ret != 0)
  209. pr_err("Unable to load target_core_file\n");
  210. ret = request_module("target_core_pscsi");
  211. if (ret != 0)
  212. pr_err("Unable to load target_core_pscsi\n");
  213. sub_api_initialized = 1;
  214. }
  215. struct se_session *transport_init_session(void)
  216. {
  217. struct se_session *se_sess;
  218. se_sess = kmem_cache_zalloc(se_sess_cache, GFP_KERNEL);
  219. if (!se_sess) {
  220. pr_err("Unable to allocate struct se_session from"
  221. " se_sess_cache\n");
  222. return ERR_PTR(-ENOMEM);
  223. }
  224. INIT_LIST_HEAD(&se_sess->sess_list);
  225. INIT_LIST_HEAD(&se_sess->sess_acl_list);
  226. INIT_LIST_HEAD(&se_sess->sess_cmd_list);
  227. INIT_LIST_HEAD(&se_sess->sess_wait_list);
  228. spin_lock_init(&se_sess->sess_cmd_lock);
  229. kref_init(&se_sess->sess_kref);
  230. return se_sess;
  231. }
  232. EXPORT_SYMBOL(transport_init_session);
  233. int transport_alloc_session_tags(struct se_session *se_sess,
  234. unsigned int tag_num, unsigned int tag_size)
  235. {
  236. int rc;
  237. se_sess->sess_cmd_map = kzalloc(tag_num * tag_size,
  238. GFP_KERNEL | __GFP_NOWARN | __GFP_REPEAT);
  239. if (!se_sess->sess_cmd_map) {
  240. se_sess->sess_cmd_map = vzalloc(tag_num * tag_size);
  241. if (!se_sess->sess_cmd_map) {
  242. pr_err("Unable to allocate se_sess->sess_cmd_map\n");
  243. return -ENOMEM;
  244. }
  245. }
  246. rc = percpu_ida_init(&se_sess->sess_tag_pool, tag_num);
  247. if (rc < 0) {
  248. pr_err("Unable to init se_sess->sess_tag_pool,"
  249. " tag_num: %u\n", tag_num);
  250. if (is_vmalloc_addr(se_sess->sess_cmd_map))
  251. vfree(se_sess->sess_cmd_map);
  252. else
  253. kfree(se_sess->sess_cmd_map);
  254. se_sess->sess_cmd_map = NULL;
  255. return -ENOMEM;
  256. }
  257. return 0;
  258. }
  259. EXPORT_SYMBOL(transport_alloc_session_tags);
  260. struct se_session *transport_init_session_tags(unsigned int tag_num,
  261. unsigned int tag_size)
  262. {
  263. struct se_session *se_sess;
  264. int rc;
  265. se_sess = transport_init_session();
  266. if (IS_ERR(se_sess))
  267. return se_sess;
  268. rc = transport_alloc_session_tags(se_sess, tag_num, tag_size);
  269. if (rc < 0) {
  270. transport_free_session(se_sess);
  271. return ERR_PTR(-ENOMEM);
  272. }
  273. return se_sess;
  274. }
  275. EXPORT_SYMBOL(transport_init_session_tags);
  276. /*
  277. * Called with spin_lock_irqsave(&struct se_portal_group->session_lock called.
  278. */
  279. void __transport_register_session(
  280. struct se_portal_group *se_tpg,
  281. struct se_node_acl *se_nacl,
  282. struct se_session *se_sess,
  283. void *fabric_sess_ptr)
  284. {
  285. unsigned char buf[PR_REG_ISID_LEN];
  286. se_sess->se_tpg = se_tpg;
  287. se_sess->fabric_sess_ptr = fabric_sess_ptr;
  288. /*
  289. * Used by struct se_node_acl's under ConfigFS to locate active se_session-t
  290. *
  291. * Only set for struct se_session's that will actually be moving I/O.
  292. * eg: *NOT* discovery sessions.
  293. */
  294. if (se_nacl) {
  295. /*
  296. * If the fabric module supports an ISID based TransportID,
  297. * save this value in binary from the fabric I_T Nexus now.
  298. */
  299. if (se_tpg->se_tpg_tfo->sess_get_initiator_sid != NULL) {
  300. memset(&buf[0], 0, PR_REG_ISID_LEN);
  301. se_tpg->se_tpg_tfo->sess_get_initiator_sid(se_sess,
  302. &buf[0], PR_REG_ISID_LEN);
  303. se_sess->sess_bin_isid = get_unaligned_be64(&buf[0]);
  304. }
  305. kref_get(&se_nacl->acl_kref);
  306. spin_lock_irq(&se_nacl->nacl_sess_lock);
  307. /*
  308. * The se_nacl->nacl_sess pointer will be set to the
  309. * last active I_T Nexus for each struct se_node_acl.
  310. */
  311. se_nacl->nacl_sess = se_sess;
  312. list_add_tail(&se_sess->sess_acl_list,
  313. &se_nacl->acl_sess_list);
  314. spin_unlock_irq(&se_nacl->nacl_sess_lock);
  315. }
  316. list_add_tail(&se_sess->sess_list, &se_tpg->tpg_sess_list);
  317. pr_debug("TARGET_CORE[%s]: Registered fabric_sess_ptr: %p\n",
  318. se_tpg->se_tpg_tfo->get_fabric_name(), se_sess->fabric_sess_ptr);
  319. }
  320. EXPORT_SYMBOL(__transport_register_session);
  321. void transport_register_session(
  322. struct se_portal_group *se_tpg,
  323. struct se_node_acl *se_nacl,
  324. struct se_session *se_sess,
  325. void *fabric_sess_ptr)
  326. {
  327. unsigned long flags;
  328. spin_lock_irqsave(&se_tpg->session_lock, flags);
  329. __transport_register_session(se_tpg, se_nacl, se_sess, fabric_sess_ptr);
  330. spin_unlock_irqrestore(&se_tpg->session_lock, flags);
  331. }
  332. EXPORT_SYMBOL(transport_register_session);
  333. static void target_release_session(struct kref *kref)
  334. {
  335. struct se_session *se_sess = container_of(kref,
  336. struct se_session, sess_kref);
  337. struct se_portal_group *se_tpg = se_sess->se_tpg;
  338. se_tpg->se_tpg_tfo->close_session(se_sess);
  339. }
  340. void target_get_session(struct se_session *se_sess)
  341. {
  342. kref_get(&se_sess->sess_kref);
  343. }
  344. EXPORT_SYMBOL(target_get_session);
  345. void target_put_session(struct se_session *se_sess)
  346. {
  347. struct se_portal_group *tpg = se_sess->se_tpg;
  348. if (tpg->se_tpg_tfo->put_session != NULL) {
  349. tpg->se_tpg_tfo->put_session(se_sess);
  350. return;
  351. }
  352. kref_put(&se_sess->sess_kref, target_release_session);
  353. }
  354. EXPORT_SYMBOL(target_put_session);
  355. static void target_complete_nacl(struct kref *kref)
  356. {
  357. struct se_node_acl *nacl = container_of(kref,
  358. struct se_node_acl, acl_kref);
  359. complete(&nacl->acl_free_comp);
  360. }
  361. void target_put_nacl(struct se_node_acl *nacl)
  362. {
  363. kref_put(&nacl->acl_kref, target_complete_nacl);
  364. }
  365. void transport_deregister_session_configfs(struct se_session *se_sess)
  366. {
  367. struct se_node_acl *se_nacl;
  368. unsigned long flags;
  369. /*
  370. * Used by struct se_node_acl's under ConfigFS to locate active struct se_session
  371. */
  372. se_nacl = se_sess->se_node_acl;
  373. if (se_nacl) {
  374. spin_lock_irqsave(&se_nacl->nacl_sess_lock, flags);
  375. if (se_nacl->acl_stop == 0)
  376. list_del(&se_sess->sess_acl_list);
  377. /*
  378. * If the session list is empty, then clear the pointer.
  379. * Otherwise, set the struct se_session pointer from the tail
  380. * element of the per struct se_node_acl active session list.
  381. */
  382. if (list_empty(&se_nacl->acl_sess_list))
  383. se_nacl->nacl_sess = NULL;
  384. else {
  385. se_nacl->nacl_sess = container_of(
  386. se_nacl->acl_sess_list.prev,
  387. struct se_session, sess_acl_list);
  388. }
  389. spin_unlock_irqrestore(&se_nacl->nacl_sess_lock, flags);
  390. }
  391. }
  392. EXPORT_SYMBOL(transport_deregister_session_configfs);
  393. void transport_free_session(struct se_session *se_sess)
  394. {
  395. if (se_sess->sess_cmd_map) {
  396. percpu_ida_destroy(&se_sess->sess_tag_pool);
  397. if (is_vmalloc_addr(se_sess->sess_cmd_map))
  398. vfree(se_sess->sess_cmd_map);
  399. else
  400. kfree(se_sess->sess_cmd_map);
  401. }
  402. kmem_cache_free(se_sess_cache, se_sess);
  403. }
  404. EXPORT_SYMBOL(transport_free_session);
  405. void transport_deregister_session(struct se_session *se_sess)
  406. {
  407. struct se_portal_group *se_tpg = se_sess->se_tpg;
  408. struct target_core_fabric_ops *se_tfo;
  409. struct se_node_acl *se_nacl;
  410. unsigned long flags;
  411. bool comp_nacl = true;
  412. if (!se_tpg) {
  413. transport_free_session(se_sess);
  414. return;
  415. }
  416. se_tfo = se_tpg->se_tpg_tfo;
  417. spin_lock_irqsave(&se_tpg->session_lock, flags);
  418. list_del(&se_sess->sess_list);
  419. se_sess->se_tpg = NULL;
  420. se_sess->fabric_sess_ptr = NULL;
  421. spin_unlock_irqrestore(&se_tpg->session_lock, flags);
  422. /*
  423. * Determine if we need to do extra work for this initiator node's
  424. * struct se_node_acl if it had been previously dynamically generated.
  425. */
  426. se_nacl = se_sess->se_node_acl;
  427. spin_lock_irqsave(&se_tpg->acl_node_lock, flags);
  428. if (se_nacl && se_nacl->dynamic_node_acl) {
  429. if (!se_tfo->tpg_check_demo_mode_cache(se_tpg)) {
  430. list_del(&se_nacl->acl_list);
  431. se_tpg->num_node_acls--;
  432. spin_unlock_irqrestore(&se_tpg->acl_node_lock, flags);
  433. core_tpg_wait_for_nacl_pr_ref(se_nacl);
  434. core_free_device_list_for_node(se_nacl, se_tpg);
  435. se_tfo->tpg_release_fabric_acl(se_tpg, se_nacl);
  436. comp_nacl = false;
  437. spin_lock_irqsave(&se_tpg->acl_node_lock, flags);
  438. }
  439. }
  440. spin_unlock_irqrestore(&se_tpg->acl_node_lock, flags);
  441. pr_debug("TARGET_CORE[%s]: Deregistered fabric_sess\n",
  442. se_tpg->se_tpg_tfo->get_fabric_name());
  443. /*
  444. * If last kref is dropping now for an explicit NodeACL, awake sleeping
  445. * ->acl_free_comp caller to wakeup configfs se_node_acl->acl_group
  446. * removal context.
  447. */
  448. if (se_nacl && comp_nacl == true)
  449. target_put_nacl(se_nacl);
  450. transport_free_session(se_sess);
  451. }
  452. EXPORT_SYMBOL(transport_deregister_session);
  453. /*
  454. * Called with cmd->t_state_lock held.
  455. */
  456. static void target_remove_from_state_list(struct se_cmd *cmd)
  457. {
  458. struct se_device *dev = cmd->se_dev;
  459. unsigned long flags;
  460. if (!dev)
  461. return;
  462. if (cmd->transport_state & CMD_T_BUSY)
  463. return;
  464. spin_lock_irqsave(&dev->execute_task_lock, flags);
  465. if (cmd->state_active) {
  466. list_del(&cmd->state_list);
  467. cmd->state_active = false;
  468. }
  469. spin_unlock_irqrestore(&dev->execute_task_lock, flags);
  470. }
  471. static int transport_cmd_check_stop(struct se_cmd *cmd, bool remove_from_lists,
  472. bool write_pending)
  473. {
  474. unsigned long flags;
  475. spin_lock_irqsave(&cmd->t_state_lock, flags);
  476. if (write_pending)
  477. cmd->t_state = TRANSPORT_WRITE_PENDING;
  478. if (remove_from_lists) {
  479. target_remove_from_state_list(cmd);
  480. /*
  481. * Clear struct se_cmd->se_lun before the handoff to FE.
  482. */
  483. cmd->se_lun = NULL;
  484. }
  485. /*
  486. * Determine if frontend context caller is requesting the stopping of
  487. * this command for frontend exceptions.
  488. */
  489. if (cmd->transport_state & CMD_T_STOP) {
  490. pr_debug("%s:%d CMD_T_STOP for ITT: 0x%08x\n",
  491. __func__, __LINE__,
  492. cmd->se_tfo->get_task_tag(cmd));
  493. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  494. complete(&cmd->t_transport_stop_comp);
  495. return 1;
  496. }
  497. cmd->transport_state &= ~CMD_T_ACTIVE;
  498. if (remove_from_lists) {
  499. /*
  500. * Some fabric modules like tcm_loop can release
  501. * their internally allocated I/O reference now and
  502. * struct se_cmd now.
  503. *
  504. * Fabric modules are expected to return '1' here if the
  505. * se_cmd being passed is released at this point,
  506. * or zero if not being released.
  507. */
  508. if (cmd->se_tfo->check_stop_free != NULL) {
  509. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  510. return cmd->se_tfo->check_stop_free(cmd);
  511. }
  512. }
  513. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  514. return 0;
  515. }
  516. static int transport_cmd_check_stop_to_fabric(struct se_cmd *cmd)
  517. {
  518. return transport_cmd_check_stop(cmd, true, false);
  519. }
  520. static void transport_lun_remove_cmd(struct se_cmd *cmd)
  521. {
  522. struct se_lun *lun = cmd->se_lun;
  523. if (!lun)
  524. return;
  525. if (cmpxchg(&cmd->lun_ref_active, true, false))
  526. percpu_ref_put(&lun->lun_ref);
  527. }
  528. void transport_cmd_finish_abort(struct se_cmd *cmd, int remove)
  529. {
  530. if (transport_cmd_check_stop_to_fabric(cmd))
  531. return;
  532. if (remove)
  533. transport_put_cmd(cmd);
  534. }
  535. static void target_complete_failure_work(struct work_struct *work)
  536. {
  537. struct se_cmd *cmd = container_of(work, struct se_cmd, work);
  538. transport_generic_request_failure(cmd,
  539. TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE);
  540. }
  541. /*
  542. * Used when asking transport to copy Sense Data from the underlying
  543. * Linux/SCSI struct scsi_cmnd
  544. */
  545. static unsigned char *transport_get_sense_buffer(struct se_cmd *cmd)
  546. {
  547. struct se_device *dev = cmd->se_dev;
  548. WARN_ON(!cmd->se_lun);
  549. if (!dev)
  550. return NULL;
  551. if (cmd->se_cmd_flags & SCF_SENT_CHECK_CONDITION)
  552. return NULL;
  553. cmd->scsi_sense_length = TRANSPORT_SENSE_BUFFER;
  554. pr_debug("HBA_[%u]_PLUG[%s]: Requesting sense for SAM STATUS: 0x%02x\n",
  555. dev->se_hba->hba_id, dev->transport->name, cmd->scsi_status);
  556. return cmd->sense_buffer;
  557. }
  558. void target_complete_cmd(struct se_cmd *cmd, u8 scsi_status)
  559. {
  560. struct se_device *dev = cmd->se_dev;
  561. int success = scsi_status == GOOD;
  562. unsigned long flags;
  563. cmd->scsi_status = scsi_status;
  564. spin_lock_irqsave(&cmd->t_state_lock, flags);
  565. cmd->transport_state &= ~CMD_T_BUSY;
  566. if (dev && dev->transport->transport_complete) {
  567. dev->transport->transport_complete(cmd,
  568. cmd->t_data_sg,
  569. transport_get_sense_buffer(cmd));
  570. if (cmd->se_cmd_flags & SCF_TRANSPORT_TASK_SENSE)
  571. success = 1;
  572. }
  573. /*
  574. * See if we are waiting to complete for an exception condition.
  575. */
  576. if (cmd->transport_state & CMD_T_REQUEST_STOP) {
  577. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  578. complete(&cmd->task_stop_comp);
  579. return;
  580. }
  581. /*
  582. * Check for case where an explicit ABORT_TASK has been received
  583. * and transport_wait_for_tasks() will be waiting for completion..
  584. */
  585. if (cmd->transport_state & CMD_T_ABORTED &&
  586. cmd->transport_state & CMD_T_STOP) {
  587. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  588. complete(&cmd->t_transport_stop_comp);
  589. return;
  590. } else if (!success) {
  591. INIT_WORK(&cmd->work, target_complete_failure_work);
  592. } else {
  593. INIT_WORK(&cmd->work, target_complete_ok_work);
  594. }
  595. cmd->t_state = TRANSPORT_COMPLETE;
  596. cmd->transport_state |= (CMD_T_COMPLETE | CMD_T_ACTIVE);
  597. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  598. queue_work(target_completion_wq, &cmd->work);
  599. }
  600. EXPORT_SYMBOL(target_complete_cmd);
  601. static void target_add_to_state_list(struct se_cmd *cmd)
  602. {
  603. struct se_device *dev = cmd->se_dev;
  604. unsigned long flags;
  605. spin_lock_irqsave(&dev->execute_task_lock, flags);
  606. if (!cmd->state_active) {
  607. list_add_tail(&cmd->state_list, &dev->state_list);
  608. cmd->state_active = true;
  609. }
  610. spin_unlock_irqrestore(&dev->execute_task_lock, flags);
  611. }
  612. /*
  613. * Handle QUEUE_FULL / -EAGAIN and -ENOMEM status
  614. */
  615. static void transport_write_pending_qf(struct se_cmd *cmd);
  616. static void transport_complete_qf(struct se_cmd *cmd);
  617. void target_qf_do_work(struct work_struct *work)
  618. {
  619. struct se_device *dev = container_of(work, struct se_device,
  620. qf_work_queue);
  621. LIST_HEAD(qf_cmd_list);
  622. struct se_cmd *cmd, *cmd_tmp;
  623. spin_lock_irq(&dev->qf_cmd_lock);
  624. list_splice_init(&dev->qf_cmd_list, &qf_cmd_list);
  625. spin_unlock_irq(&dev->qf_cmd_lock);
  626. list_for_each_entry_safe(cmd, cmd_tmp, &qf_cmd_list, se_qf_node) {
  627. list_del(&cmd->se_qf_node);
  628. atomic_dec(&dev->dev_qf_count);
  629. smp_mb__after_atomic_dec();
  630. pr_debug("Processing %s cmd: %p QUEUE_FULL in work queue"
  631. " context: %s\n", cmd->se_tfo->get_fabric_name(), cmd,
  632. (cmd->t_state == TRANSPORT_COMPLETE_QF_OK) ? "COMPLETE_OK" :
  633. (cmd->t_state == TRANSPORT_COMPLETE_QF_WP) ? "WRITE_PENDING"
  634. : "UNKNOWN");
  635. if (cmd->t_state == TRANSPORT_COMPLETE_QF_WP)
  636. transport_write_pending_qf(cmd);
  637. else if (cmd->t_state == TRANSPORT_COMPLETE_QF_OK)
  638. transport_complete_qf(cmd);
  639. }
  640. }
  641. unsigned char *transport_dump_cmd_direction(struct se_cmd *cmd)
  642. {
  643. switch (cmd->data_direction) {
  644. case DMA_NONE:
  645. return "NONE";
  646. case DMA_FROM_DEVICE:
  647. return "READ";
  648. case DMA_TO_DEVICE:
  649. return "WRITE";
  650. case DMA_BIDIRECTIONAL:
  651. return "BIDI";
  652. default:
  653. break;
  654. }
  655. return "UNKNOWN";
  656. }
  657. void transport_dump_dev_state(
  658. struct se_device *dev,
  659. char *b,
  660. int *bl)
  661. {
  662. *bl += sprintf(b + *bl, "Status: ");
  663. if (dev->export_count)
  664. *bl += sprintf(b + *bl, "ACTIVATED");
  665. else
  666. *bl += sprintf(b + *bl, "DEACTIVATED");
  667. *bl += sprintf(b + *bl, " Max Queue Depth: %d", dev->queue_depth);
  668. *bl += sprintf(b + *bl, " SectorSize: %u HwMaxSectors: %u\n",
  669. dev->dev_attrib.block_size,
  670. dev->dev_attrib.hw_max_sectors);
  671. *bl += sprintf(b + *bl, " ");
  672. }
  673. void transport_dump_vpd_proto_id(
  674. struct t10_vpd *vpd,
  675. unsigned char *p_buf,
  676. int p_buf_len)
  677. {
  678. unsigned char buf[VPD_TMP_BUF_SIZE];
  679. int len;
  680. memset(buf, 0, VPD_TMP_BUF_SIZE);
  681. len = sprintf(buf, "T10 VPD Protocol Identifier: ");
  682. switch (vpd->protocol_identifier) {
  683. case 0x00:
  684. sprintf(buf+len, "Fibre Channel\n");
  685. break;
  686. case 0x10:
  687. sprintf(buf+len, "Parallel SCSI\n");
  688. break;
  689. case 0x20:
  690. sprintf(buf+len, "SSA\n");
  691. break;
  692. case 0x30:
  693. sprintf(buf+len, "IEEE 1394\n");
  694. break;
  695. case 0x40:
  696. sprintf(buf+len, "SCSI Remote Direct Memory Access"
  697. " Protocol\n");
  698. break;
  699. case 0x50:
  700. sprintf(buf+len, "Internet SCSI (iSCSI)\n");
  701. break;
  702. case 0x60:
  703. sprintf(buf+len, "SAS Serial SCSI Protocol\n");
  704. break;
  705. case 0x70:
  706. sprintf(buf+len, "Automation/Drive Interface Transport"
  707. " Protocol\n");
  708. break;
  709. case 0x80:
  710. sprintf(buf+len, "AT Attachment Interface ATA/ATAPI\n");
  711. break;
  712. default:
  713. sprintf(buf+len, "Unknown 0x%02x\n",
  714. vpd->protocol_identifier);
  715. break;
  716. }
  717. if (p_buf)
  718. strncpy(p_buf, buf, p_buf_len);
  719. else
  720. pr_debug("%s", buf);
  721. }
  722. void
  723. transport_set_vpd_proto_id(struct t10_vpd *vpd, unsigned char *page_83)
  724. {
  725. /*
  726. * Check if the Protocol Identifier Valid (PIV) bit is set..
  727. *
  728. * from spc3r23.pdf section 7.5.1
  729. */
  730. if (page_83[1] & 0x80) {
  731. vpd->protocol_identifier = (page_83[0] & 0xf0);
  732. vpd->protocol_identifier_set = 1;
  733. transport_dump_vpd_proto_id(vpd, NULL, 0);
  734. }
  735. }
  736. EXPORT_SYMBOL(transport_set_vpd_proto_id);
  737. int transport_dump_vpd_assoc(
  738. struct t10_vpd *vpd,
  739. unsigned char *p_buf,
  740. int p_buf_len)
  741. {
  742. unsigned char buf[VPD_TMP_BUF_SIZE];
  743. int ret = 0;
  744. int len;
  745. memset(buf, 0, VPD_TMP_BUF_SIZE);
  746. len = sprintf(buf, "T10 VPD Identifier Association: ");
  747. switch (vpd->association) {
  748. case 0x00:
  749. sprintf(buf+len, "addressed logical unit\n");
  750. break;
  751. case 0x10:
  752. sprintf(buf+len, "target port\n");
  753. break;
  754. case 0x20:
  755. sprintf(buf+len, "SCSI target device\n");
  756. break;
  757. default:
  758. sprintf(buf+len, "Unknown 0x%02x\n", vpd->association);
  759. ret = -EINVAL;
  760. break;
  761. }
  762. if (p_buf)
  763. strncpy(p_buf, buf, p_buf_len);
  764. else
  765. pr_debug("%s", buf);
  766. return ret;
  767. }
  768. int transport_set_vpd_assoc(struct t10_vpd *vpd, unsigned char *page_83)
  769. {
  770. /*
  771. * The VPD identification association..
  772. *
  773. * from spc3r23.pdf Section 7.6.3.1 Table 297
  774. */
  775. vpd->association = (page_83[1] & 0x30);
  776. return transport_dump_vpd_assoc(vpd, NULL, 0);
  777. }
  778. EXPORT_SYMBOL(transport_set_vpd_assoc);
  779. int transport_dump_vpd_ident_type(
  780. struct t10_vpd *vpd,
  781. unsigned char *p_buf,
  782. int p_buf_len)
  783. {
  784. unsigned char buf[VPD_TMP_BUF_SIZE];
  785. int ret = 0;
  786. int len;
  787. memset(buf, 0, VPD_TMP_BUF_SIZE);
  788. len = sprintf(buf, "T10 VPD Identifier Type: ");
  789. switch (vpd->device_identifier_type) {
  790. case 0x00:
  791. sprintf(buf+len, "Vendor specific\n");
  792. break;
  793. case 0x01:
  794. sprintf(buf+len, "T10 Vendor ID based\n");
  795. break;
  796. case 0x02:
  797. sprintf(buf+len, "EUI-64 based\n");
  798. break;
  799. case 0x03:
  800. sprintf(buf+len, "NAA\n");
  801. break;
  802. case 0x04:
  803. sprintf(buf+len, "Relative target port identifier\n");
  804. break;
  805. case 0x08:
  806. sprintf(buf+len, "SCSI name string\n");
  807. break;
  808. default:
  809. sprintf(buf+len, "Unsupported: 0x%02x\n",
  810. vpd->device_identifier_type);
  811. ret = -EINVAL;
  812. break;
  813. }
  814. if (p_buf) {
  815. if (p_buf_len < strlen(buf)+1)
  816. return -EINVAL;
  817. strncpy(p_buf, buf, p_buf_len);
  818. } else {
  819. pr_debug("%s", buf);
  820. }
  821. return ret;
  822. }
  823. int transport_set_vpd_ident_type(struct t10_vpd *vpd, unsigned char *page_83)
  824. {
  825. /*
  826. * The VPD identifier type..
  827. *
  828. * from spc3r23.pdf Section 7.6.3.1 Table 298
  829. */
  830. vpd->device_identifier_type = (page_83[1] & 0x0f);
  831. return transport_dump_vpd_ident_type(vpd, NULL, 0);
  832. }
  833. EXPORT_SYMBOL(transport_set_vpd_ident_type);
  834. int transport_dump_vpd_ident(
  835. struct t10_vpd *vpd,
  836. unsigned char *p_buf,
  837. int p_buf_len)
  838. {
  839. unsigned char buf[VPD_TMP_BUF_SIZE];
  840. int ret = 0;
  841. memset(buf, 0, VPD_TMP_BUF_SIZE);
  842. switch (vpd->device_identifier_code_set) {
  843. case 0x01: /* Binary */
  844. snprintf(buf, sizeof(buf),
  845. "T10 VPD Binary Device Identifier: %s\n",
  846. &vpd->device_identifier[0]);
  847. break;
  848. case 0x02: /* ASCII */
  849. snprintf(buf, sizeof(buf),
  850. "T10 VPD ASCII Device Identifier: %s\n",
  851. &vpd->device_identifier[0]);
  852. break;
  853. case 0x03: /* UTF-8 */
  854. snprintf(buf, sizeof(buf),
  855. "T10 VPD UTF-8 Device Identifier: %s\n",
  856. &vpd->device_identifier[0]);
  857. break;
  858. default:
  859. sprintf(buf, "T10 VPD Device Identifier encoding unsupported:"
  860. " 0x%02x", vpd->device_identifier_code_set);
  861. ret = -EINVAL;
  862. break;
  863. }
  864. if (p_buf)
  865. strncpy(p_buf, buf, p_buf_len);
  866. else
  867. pr_debug("%s", buf);
  868. return ret;
  869. }
  870. int
  871. transport_set_vpd_ident(struct t10_vpd *vpd, unsigned char *page_83)
  872. {
  873. static const char hex_str[] = "0123456789abcdef";
  874. int j = 0, i = 4; /* offset to start of the identifier */
  875. /*
  876. * The VPD Code Set (encoding)
  877. *
  878. * from spc3r23.pdf Section 7.6.3.1 Table 296
  879. */
  880. vpd->device_identifier_code_set = (page_83[0] & 0x0f);
  881. switch (vpd->device_identifier_code_set) {
  882. case 0x01: /* Binary */
  883. vpd->device_identifier[j++] =
  884. hex_str[vpd->device_identifier_type];
  885. while (i < (4 + page_83[3])) {
  886. vpd->device_identifier[j++] =
  887. hex_str[(page_83[i] & 0xf0) >> 4];
  888. vpd->device_identifier[j++] =
  889. hex_str[page_83[i] & 0x0f];
  890. i++;
  891. }
  892. break;
  893. case 0x02: /* ASCII */
  894. case 0x03: /* UTF-8 */
  895. while (i < (4 + page_83[3]))
  896. vpd->device_identifier[j++] = page_83[i++];
  897. break;
  898. default:
  899. break;
  900. }
  901. return transport_dump_vpd_ident(vpd, NULL, 0);
  902. }
  903. EXPORT_SYMBOL(transport_set_vpd_ident);
  904. sense_reason_t
  905. target_cmd_size_check(struct se_cmd *cmd, unsigned int size)
  906. {
  907. struct se_device *dev = cmd->se_dev;
  908. if (cmd->unknown_data_length) {
  909. cmd->data_length = size;
  910. } else if (size != cmd->data_length) {
  911. pr_warn("TARGET_CORE[%s]: Expected Transfer Length:"
  912. " %u does not match SCSI CDB Length: %u for SAM Opcode:"
  913. " 0x%02x\n", cmd->se_tfo->get_fabric_name(),
  914. cmd->data_length, size, cmd->t_task_cdb[0]);
  915. if (cmd->data_direction == DMA_TO_DEVICE) {
  916. pr_err("Rejecting underflow/overflow"
  917. " WRITE data\n");
  918. return TCM_INVALID_CDB_FIELD;
  919. }
  920. /*
  921. * Reject READ_* or WRITE_* with overflow/underflow for
  922. * type SCF_SCSI_DATA_CDB.
  923. */
  924. if (dev->dev_attrib.block_size != 512) {
  925. pr_err("Failing OVERFLOW/UNDERFLOW for LBA op"
  926. " CDB on non 512-byte sector setup subsystem"
  927. " plugin: %s\n", dev->transport->name);
  928. /* Returns CHECK_CONDITION + INVALID_CDB_FIELD */
  929. return TCM_INVALID_CDB_FIELD;
  930. }
  931. /*
  932. * For the overflow case keep the existing fabric provided
  933. * ->data_length. Otherwise for the underflow case, reset
  934. * ->data_length to the smaller SCSI expected data transfer
  935. * length.
  936. */
  937. if (size > cmd->data_length) {
  938. cmd->se_cmd_flags |= SCF_OVERFLOW_BIT;
  939. cmd->residual_count = (size - cmd->data_length);
  940. } else {
  941. cmd->se_cmd_flags |= SCF_UNDERFLOW_BIT;
  942. cmd->residual_count = (cmd->data_length - size);
  943. cmd->data_length = size;
  944. }
  945. }
  946. return 0;
  947. }
  948. /*
  949. * Used by fabric modules containing a local struct se_cmd within their
  950. * fabric dependent per I/O descriptor.
  951. */
  952. void transport_init_se_cmd(
  953. struct se_cmd *cmd,
  954. struct target_core_fabric_ops *tfo,
  955. struct se_session *se_sess,
  956. u32 data_length,
  957. int data_direction,
  958. int task_attr,
  959. unsigned char *sense_buffer)
  960. {
  961. INIT_LIST_HEAD(&cmd->se_delayed_node);
  962. INIT_LIST_HEAD(&cmd->se_qf_node);
  963. INIT_LIST_HEAD(&cmd->se_cmd_list);
  964. INIT_LIST_HEAD(&cmd->state_list);
  965. init_completion(&cmd->t_transport_stop_comp);
  966. init_completion(&cmd->cmd_wait_comp);
  967. init_completion(&cmd->task_stop_comp);
  968. spin_lock_init(&cmd->t_state_lock);
  969. cmd->transport_state = CMD_T_DEV_ACTIVE;
  970. cmd->se_tfo = tfo;
  971. cmd->se_sess = se_sess;
  972. cmd->data_length = data_length;
  973. cmd->data_direction = data_direction;
  974. cmd->sam_task_attr = task_attr;
  975. cmd->sense_buffer = sense_buffer;
  976. cmd->state_active = false;
  977. }
  978. EXPORT_SYMBOL(transport_init_se_cmd);
  979. static sense_reason_t
  980. transport_check_alloc_task_attr(struct se_cmd *cmd)
  981. {
  982. struct se_device *dev = cmd->se_dev;
  983. /*
  984. * Check if SAM Task Attribute emulation is enabled for this
  985. * struct se_device storage object
  986. */
  987. if (dev->transport->transport_type == TRANSPORT_PLUGIN_PHBA_PDEV)
  988. return 0;
  989. if (cmd->sam_task_attr == MSG_ACA_TAG) {
  990. pr_debug("SAM Task Attribute ACA"
  991. " emulation is not supported\n");
  992. return TCM_INVALID_CDB_FIELD;
  993. }
  994. /*
  995. * Used to determine when ORDERED commands should go from
  996. * Dormant to Active status.
  997. */
  998. cmd->se_ordered_id = atomic_inc_return(&dev->dev_ordered_id);
  999. smp_mb__after_atomic_inc();
  1000. pr_debug("Allocated se_ordered_id: %u for Task Attr: 0x%02x on %s\n",
  1001. cmd->se_ordered_id, cmd->sam_task_attr,
  1002. dev->transport->name);
  1003. return 0;
  1004. }
  1005. sense_reason_t
  1006. target_setup_cmd_from_cdb(struct se_cmd *cmd, unsigned char *cdb)
  1007. {
  1008. struct se_device *dev = cmd->se_dev;
  1009. sense_reason_t ret;
  1010. /*
  1011. * Ensure that the received CDB is less than the max (252 + 8) bytes
  1012. * for VARIABLE_LENGTH_CMD
  1013. */
  1014. if (scsi_command_size(cdb) > SCSI_MAX_VARLEN_CDB_SIZE) {
  1015. pr_err("Received SCSI CDB with command_size: %d that"
  1016. " exceeds SCSI_MAX_VARLEN_CDB_SIZE: %d\n",
  1017. scsi_command_size(cdb), SCSI_MAX_VARLEN_CDB_SIZE);
  1018. return TCM_INVALID_CDB_FIELD;
  1019. }
  1020. /*
  1021. * If the received CDB is larger than TCM_MAX_COMMAND_SIZE,
  1022. * allocate the additional extended CDB buffer now.. Otherwise
  1023. * setup the pointer from __t_task_cdb to t_task_cdb.
  1024. */
  1025. if (scsi_command_size(cdb) > sizeof(cmd->__t_task_cdb)) {
  1026. cmd->t_task_cdb = kzalloc(scsi_command_size(cdb),
  1027. GFP_KERNEL);
  1028. if (!cmd->t_task_cdb) {
  1029. pr_err("Unable to allocate cmd->t_task_cdb"
  1030. " %u > sizeof(cmd->__t_task_cdb): %lu ops\n",
  1031. scsi_command_size(cdb),
  1032. (unsigned long)sizeof(cmd->__t_task_cdb));
  1033. return TCM_OUT_OF_RESOURCES;
  1034. }
  1035. } else
  1036. cmd->t_task_cdb = &cmd->__t_task_cdb[0];
  1037. /*
  1038. * Copy the original CDB into cmd->
  1039. */
  1040. memcpy(cmd->t_task_cdb, cdb, scsi_command_size(cdb));
  1041. trace_target_sequencer_start(cmd);
  1042. /*
  1043. * Check for an existing UNIT ATTENTION condition
  1044. */
  1045. ret = target_scsi3_ua_check(cmd);
  1046. if (ret)
  1047. return ret;
  1048. ret = target_alua_state_check(cmd);
  1049. if (ret)
  1050. return ret;
  1051. ret = target_check_reservation(cmd);
  1052. if (ret) {
  1053. cmd->scsi_status = SAM_STAT_RESERVATION_CONFLICT;
  1054. return ret;
  1055. }
  1056. ret = dev->transport->parse_cdb(cmd);
  1057. if (ret)
  1058. return ret;
  1059. ret = transport_check_alloc_task_attr(cmd);
  1060. if (ret)
  1061. return ret;
  1062. cmd->se_cmd_flags |= SCF_SUPPORTED_SAM_OPCODE;
  1063. spin_lock(&cmd->se_lun->lun_sep_lock);
  1064. if (cmd->se_lun->lun_sep)
  1065. cmd->se_lun->lun_sep->sep_stats.cmd_pdus++;
  1066. spin_unlock(&cmd->se_lun->lun_sep_lock);
  1067. return 0;
  1068. }
  1069. EXPORT_SYMBOL(target_setup_cmd_from_cdb);
  1070. /*
  1071. * Used by fabric module frontends to queue tasks directly.
  1072. * Many only be used from process context only
  1073. */
  1074. int transport_handle_cdb_direct(
  1075. struct se_cmd *cmd)
  1076. {
  1077. sense_reason_t ret;
  1078. if (!cmd->se_lun) {
  1079. dump_stack();
  1080. pr_err("cmd->se_lun is NULL\n");
  1081. return -EINVAL;
  1082. }
  1083. if (in_interrupt()) {
  1084. dump_stack();
  1085. pr_err("transport_generic_handle_cdb cannot be called"
  1086. " from interrupt context\n");
  1087. return -EINVAL;
  1088. }
  1089. /*
  1090. * Set TRANSPORT_NEW_CMD state and CMD_T_ACTIVE to ensure that
  1091. * outstanding descriptors are handled correctly during shutdown via
  1092. * transport_wait_for_tasks()
  1093. *
  1094. * Also, we don't take cmd->t_state_lock here as we only expect
  1095. * this to be called for initial descriptor submission.
  1096. */
  1097. cmd->t_state = TRANSPORT_NEW_CMD;
  1098. cmd->transport_state |= CMD_T_ACTIVE;
  1099. /*
  1100. * transport_generic_new_cmd() is already handling QUEUE_FULL,
  1101. * so follow TRANSPORT_NEW_CMD processing thread context usage
  1102. * and call transport_generic_request_failure() if necessary..
  1103. */
  1104. ret = transport_generic_new_cmd(cmd);
  1105. if (ret)
  1106. transport_generic_request_failure(cmd, ret);
  1107. return 0;
  1108. }
  1109. EXPORT_SYMBOL(transport_handle_cdb_direct);
  1110. sense_reason_t
  1111. transport_generic_map_mem_to_cmd(struct se_cmd *cmd, struct scatterlist *sgl,
  1112. u32 sgl_count, struct scatterlist *sgl_bidi, u32 sgl_bidi_count)
  1113. {
  1114. if (!sgl || !sgl_count)
  1115. return 0;
  1116. /*
  1117. * Reject SCSI data overflow with map_mem_to_cmd() as incoming
  1118. * scatterlists already have been set to follow what the fabric
  1119. * passes for the original expected data transfer length.
  1120. */
  1121. if (cmd->se_cmd_flags & SCF_OVERFLOW_BIT) {
  1122. pr_warn("Rejecting SCSI DATA overflow for fabric using"
  1123. " SCF_PASSTHROUGH_SG_TO_MEM_NOALLOC\n");
  1124. return TCM_INVALID_CDB_FIELD;
  1125. }
  1126. cmd->t_data_sg = sgl;
  1127. cmd->t_data_nents = sgl_count;
  1128. if (sgl_bidi && sgl_bidi_count) {
  1129. cmd->t_bidi_data_sg = sgl_bidi;
  1130. cmd->t_bidi_data_nents = sgl_bidi_count;
  1131. }
  1132. cmd->se_cmd_flags |= SCF_PASSTHROUGH_SG_TO_MEM_NOALLOC;
  1133. return 0;
  1134. }
  1135. /*
  1136. * target_submit_cmd_map_sgls - lookup unpacked lun and submit uninitialized
  1137. * se_cmd + use pre-allocated SGL memory.
  1138. *
  1139. * @se_cmd: command descriptor to submit
  1140. * @se_sess: associated se_sess for endpoint
  1141. * @cdb: pointer to SCSI CDB
  1142. * @sense: pointer to SCSI sense buffer
  1143. * @unpacked_lun: unpacked LUN to reference for struct se_lun
  1144. * @data_length: fabric expected data transfer length
  1145. * @task_addr: SAM task attribute
  1146. * @data_dir: DMA data direction
  1147. * @flags: flags for command submission from target_sc_flags_tables
  1148. * @sgl: struct scatterlist memory for unidirectional mapping
  1149. * @sgl_count: scatterlist count for unidirectional mapping
  1150. * @sgl_bidi: struct scatterlist memory for bidirectional READ mapping
  1151. * @sgl_bidi_count: scatterlist count for bidirectional READ mapping
  1152. * @sgl_prot: struct scatterlist memory protection information
  1153. * @sgl_prot_count: scatterlist count for protection information
  1154. *
  1155. * Returns non zero to signal active I/O shutdown failure. All other
  1156. * setup exceptions will be returned as a SCSI CHECK_CONDITION response,
  1157. * but still return zero here.
  1158. *
  1159. * This may only be called from process context, and also currently
  1160. * assumes internal allocation of fabric payload buffer by target-core.
  1161. */
  1162. int target_submit_cmd_map_sgls(struct se_cmd *se_cmd, struct se_session *se_sess,
  1163. unsigned char *cdb, unsigned char *sense, u32 unpacked_lun,
  1164. u32 data_length, int task_attr, int data_dir, int flags,
  1165. struct scatterlist *sgl, u32 sgl_count,
  1166. struct scatterlist *sgl_bidi, u32 sgl_bidi_count,
  1167. struct scatterlist *sgl_prot, u32 sgl_prot_count)
  1168. {
  1169. struct se_portal_group *se_tpg;
  1170. sense_reason_t rc;
  1171. int ret;
  1172. se_tpg = se_sess->se_tpg;
  1173. BUG_ON(!se_tpg);
  1174. BUG_ON(se_cmd->se_tfo || se_cmd->se_sess);
  1175. BUG_ON(in_interrupt());
  1176. /*
  1177. * Initialize se_cmd for target operation. From this point
  1178. * exceptions are handled by sending exception status via
  1179. * target_core_fabric_ops->queue_status() callback
  1180. */
  1181. transport_init_se_cmd(se_cmd, se_tpg->se_tpg_tfo, se_sess,
  1182. data_length, data_dir, task_attr, sense);
  1183. if (flags & TARGET_SCF_UNKNOWN_SIZE)
  1184. se_cmd->unknown_data_length = 1;
  1185. /*
  1186. * Obtain struct se_cmd->cmd_kref reference and add new cmd to
  1187. * se_sess->sess_cmd_list. A second kref_get here is necessary
  1188. * for fabrics using TARGET_SCF_ACK_KREF that expect a second
  1189. * kref_put() to happen during fabric packet acknowledgement.
  1190. */
  1191. ret = target_get_sess_cmd(se_sess, se_cmd, (flags & TARGET_SCF_ACK_KREF));
  1192. if (ret)
  1193. return ret;
  1194. /*
  1195. * Signal bidirectional data payloads to target-core
  1196. */
  1197. if (flags & TARGET_SCF_BIDI_OP)
  1198. se_cmd->se_cmd_flags |= SCF_BIDI;
  1199. /*
  1200. * Locate se_lun pointer and attach it to struct se_cmd
  1201. */
  1202. rc = transport_lookup_cmd_lun(se_cmd, unpacked_lun);
  1203. if (rc) {
  1204. transport_send_check_condition_and_sense(se_cmd, rc, 0);
  1205. target_put_sess_cmd(se_sess, se_cmd);
  1206. return 0;
  1207. }
  1208. /*
  1209. * Save pointers for SGLs containing protection information,
  1210. * if present.
  1211. */
  1212. if (sgl_prot_count) {
  1213. se_cmd->t_prot_sg = sgl_prot;
  1214. se_cmd->t_prot_nents = sgl_prot_count;
  1215. }
  1216. rc = target_setup_cmd_from_cdb(se_cmd, cdb);
  1217. if (rc != 0) {
  1218. transport_generic_request_failure(se_cmd, rc);
  1219. return 0;
  1220. }
  1221. /*
  1222. * When a non zero sgl_count has been passed perform SGL passthrough
  1223. * mapping for pre-allocated fabric memory instead of having target
  1224. * core perform an internal SGL allocation..
  1225. */
  1226. if (sgl_count != 0) {
  1227. BUG_ON(!sgl);
  1228. /*
  1229. * A work-around for tcm_loop as some userspace code via
  1230. * scsi-generic do not memset their associated read buffers,
  1231. * so go ahead and do that here for type non-data CDBs. Also
  1232. * note that this is currently guaranteed to be a single SGL
  1233. * for this case by target core in target_setup_cmd_from_cdb()
  1234. * -> transport_generic_cmd_sequencer().
  1235. */
  1236. if (!(se_cmd->se_cmd_flags & SCF_SCSI_DATA_CDB) &&
  1237. se_cmd->data_direction == DMA_FROM_DEVICE) {
  1238. unsigned char *buf = NULL;
  1239. if (sgl)
  1240. buf = kmap(sg_page(sgl)) + sgl->offset;
  1241. if (buf) {
  1242. memset(buf, 0, sgl->length);
  1243. kunmap(sg_page(sgl));
  1244. }
  1245. }
  1246. rc = transport_generic_map_mem_to_cmd(se_cmd, sgl, sgl_count,
  1247. sgl_bidi, sgl_bidi_count);
  1248. if (rc != 0) {
  1249. transport_generic_request_failure(se_cmd, rc);
  1250. return 0;
  1251. }
  1252. }
  1253. /*
  1254. * Check if we need to delay processing because of ALUA
  1255. * Active/NonOptimized primary access state..
  1256. */
  1257. core_alua_check_nonop_delay(se_cmd);
  1258. transport_handle_cdb_direct(se_cmd);
  1259. return 0;
  1260. }
  1261. EXPORT_SYMBOL(target_submit_cmd_map_sgls);
  1262. /*
  1263. * target_submit_cmd - lookup unpacked lun and submit uninitialized se_cmd
  1264. *
  1265. * @se_cmd: command descriptor to submit
  1266. * @se_sess: associated se_sess for endpoint
  1267. * @cdb: pointer to SCSI CDB
  1268. * @sense: pointer to SCSI sense buffer
  1269. * @unpacked_lun: unpacked LUN to reference for struct se_lun
  1270. * @data_length: fabric expected data transfer length
  1271. * @task_addr: SAM task attribute
  1272. * @data_dir: DMA data direction
  1273. * @flags: flags for command submission from target_sc_flags_tables
  1274. *
  1275. * Returns non zero to signal active I/O shutdown failure. All other
  1276. * setup exceptions will be returned as a SCSI CHECK_CONDITION response,
  1277. * but still return zero here.
  1278. *
  1279. * This may only be called from process context, and also currently
  1280. * assumes internal allocation of fabric payload buffer by target-core.
  1281. *
  1282. * It also assumes interal target core SGL memory allocation.
  1283. */
  1284. int target_submit_cmd(struct se_cmd *se_cmd, struct se_session *se_sess,
  1285. unsigned char *cdb, unsigned char *sense, u32 unpacked_lun,
  1286. u32 data_length, int task_attr, int data_dir, int flags)
  1287. {
  1288. return target_submit_cmd_map_sgls(se_cmd, se_sess, cdb, sense,
  1289. unpacked_lun, data_length, task_attr, data_dir,
  1290. flags, NULL, 0, NULL, 0, NULL, 0);
  1291. }
  1292. EXPORT_SYMBOL(target_submit_cmd);
  1293. static void target_complete_tmr_failure(struct work_struct *work)
  1294. {
  1295. struct se_cmd *se_cmd = container_of(work, struct se_cmd, work);
  1296. se_cmd->se_tmr_req->response = TMR_LUN_DOES_NOT_EXIST;
  1297. se_cmd->se_tfo->queue_tm_rsp(se_cmd);
  1298. transport_cmd_check_stop_to_fabric(se_cmd);
  1299. }
  1300. /**
  1301. * target_submit_tmr - lookup unpacked lun and submit uninitialized se_cmd
  1302. * for TMR CDBs
  1303. *
  1304. * @se_cmd: command descriptor to submit
  1305. * @se_sess: associated se_sess for endpoint
  1306. * @sense: pointer to SCSI sense buffer
  1307. * @unpacked_lun: unpacked LUN to reference for struct se_lun
  1308. * @fabric_context: fabric context for TMR req
  1309. * @tm_type: Type of TM request
  1310. * @gfp: gfp type for caller
  1311. * @tag: referenced task tag for TMR_ABORT_TASK
  1312. * @flags: submit cmd flags
  1313. *
  1314. * Callable from all contexts.
  1315. **/
  1316. int target_submit_tmr(struct se_cmd *se_cmd, struct se_session *se_sess,
  1317. unsigned char *sense, u32 unpacked_lun,
  1318. void *fabric_tmr_ptr, unsigned char tm_type,
  1319. gfp_t gfp, unsigned int tag, int flags)
  1320. {
  1321. struct se_portal_group *se_tpg;
  1322. int ret;
  1323. se_tpg = se_sess->se_tpg;
  1324. BUG_ON(!se_tpg);
  1325. transport_init_se_cmd(se_cmd, se_tpg->se_tpg_tfo, se_sess,
  1326. 0, DMA_NONE, MSG_SIMPLE_TAG, sense);
  1327. /*
  1328. * FIXME: Currently expect caller to handle se_cmd->se_tmr_req
  1329. * allocation failure.
  1330. */
  1331. ret = core_tmr_alloc_req(se_cmd, fabric_tmr_ptr, tm_type, gfp);
  1332. if (ret < 0)
  1333. return -ENOMEM;
  1334. if (tm_type == TMR_ABORT_TASK)
  1335. se_cmd->se_tmr_req->ref_task_tag = tag;
  1336. /* See target_submit_cmd for commentary */
  1337. ret = target_get_sess_cmd(se_sess, se_cmd, (flags & TARGET_SCF_ACK_KREF));
  1338. if (ret) {
  1339. core_tmr_release_req(se_cmd->se_tmr_req);
  1340. return ret;
  1341. }
  1342. ret = transport_lookup_tmr_lun(se_cmd, unpacked_lun);
  1343. if (ret) {
  1344. /*
  1345. * For callback during failure handling, push this work off
  1346. * to process context with TMR_LUN_DOES_NOT_EXIST status.
  1347. */
  1348. INIT_WORK(&se_cmd->work, target_complete_tmr_failure);
  1349. schedule_work(&se_cmd->work);
  1350. return 0;
  1351. }
  1352. transport_generic_handle_tmr(se_cmd);
  1353. return 0;
  1354. }
  1355. EXPORT_SYMBOL(target_submit_tmr);
  1356. /*
  1357. * If the cmd is active, request it to be stopped and sleep until it
  1358. * has completed.
  1359. */
  1360. bool target_stop_cmd(struct se_cmd *cmd, unsigned long *flags)
  1361. {
  1362. bool was_active = false;
  1363. if (cmd->transport_state & CMD_T_BUSY) {
  1364. cmd->transport_state |= CMD_T_REQUEST_STOP;
  1365. spin_unlock_irqrestore(&cmd->t_state_lock, *flags);
  1366. pr_debug("cmd %p waiting to complete\n", cmd);
  1367. wait_for_completion(&cmd->task_stop_comp);
  1368. pr_debug("cmd %p stopped successfully\n", cmd);
  1369. spin_lock_irqsave(&cmd->t_state_lock, *flags);
  1370. cmd->transport_state &= ~CMD_T_REQUEST_STOP;
  1371. cmd->transport_state &= ~CMD_T_BUSY;
  1372. was_active = true;
  1373. }
  1374. return was_active;
  1375. }
  1376. /*
  1377. * Handle SAM-esque emulation for generic transport request failures.
  1378. */
  1379. void transport_generic_request_failure(struct se_cmd *cmd,
  1380. sense_reason_t sense_reason)
  1381. {
  1382. int ret = 0;
  1383. pr_debug("-----[ Storage Engine Exception for cmd: %p ITT: 0x%08x"
  1384. " CDB: 0x%02x\n", cmd, cmd->se_tfo->get_task_tag(cmd),
  1385. cmd->t_task_cdb[0]);
  1386. pr_debug("-----[ i_state: %d t_state: %d sense_reason: %d\n",
  1387. cmd->se_tfo->get_cmd_state(cmd),
  1388. cmd->t_state, sense_reason);
  1389. pr_debug("-----[ CMD_T_ACTIVE: %d CMD_T_STOP: %d CMD_T_SENT: %d\n",
  1390. (cmd->transport_state & CMD_T_ACTIVE) != 0,
  1391. (cmd->transport_state & CMD_T_STOP) != 0,
  1392. (cmd->transport_state & CMD_T_SENT) != 0);
  1393. /*
  1394. * For SAM Task Attribute emulation for failed struct se_cmd
  1395. */
  1396. transport_complete_task_attr(cmd);
  1397. /*
  1398. * Handle special case for COMPARE_AND_WRITE failure, where the
  1399. * callback is expected to drop the per device ->caw_mutex.
  1400. */
  1401. if ((cmd->se_cmd_flags & SCF_COMPARE_AND_WRITE) &&
  1402. cmd->transport_complete_callback)
  1403. cmd->transport_complete_callback(cmd);
  1404. switch (sense_reason) {
  1405. case TCM_NON_EXISTENT_LUN:
  1406. case TCM_UNSUPPORTED_SCSI_OPCODE:
  1407. case TCM_INVALID_CDB_FIELD:
  1408. case TCM_INVALID_PARAMETER_LIST:
  1409. case TCM_PARAMETER_LIST_LENGTH_ERROR:
  1410. case TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE:
  1411. case TCM_UNKNOWN_MODE_PAGE:
  1412. case TCM_WRITE_PROTECTED:
  1413. case TCM_ADDRESS_OUT_OF_RANGE:
  1414. case TCM_CHECK_CONDITION_ABORT_CMD:
  1415. case TCM_CHECK_CONDITION_UNIT_ATTENTION:
  1416. case TCM_CHECK_CONDITION_NOT_READY:
  1417. case TCM_LOGICAL_BLOCK_GUARD_CHECK_FAILED:
  1418. case TCM_LOGICAL_BLOCK_APP_TAG_CHECK_FAILED:
  1419. case TCM_LOGICAL_BLOCK_REF_TAG_CHECK_FAILED:
  1420. break;
  1421. case TCM_OUT_OF_RESOURCES:
  1422. sense_reason = TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
  1423. break;
  1424. case TCM_RESERVATION_CONFLICT:
  1425. /*
  1426. * No SENSE Data payload for this case, set SCSI Status
  1427. * and queue the response to $FABRIC_MOD.
  1428. *
  1429. * Uses linux/include/scsi/scsi.h SAM status codes defs
  1430. */
  1431. cmd->scsi_status = SAM_STAT_RESERVATION_CONFLICT;
  1432. /*
  1433. * For UA Interlock Code 11b, a RESERVATION CONFLICT will
  1434. * establish a UNIT ATTENTION with PREVIOUS RESERVATION
  1435. * CONFLICT STATUS.
  1436. *
  1437. * See spc4r17, section 7.4.6 Control Mode Page, Table 349
  1438. */
  1439. if (cmd->se_sess &&
  1440. cmd->se_dev->dev_attrib.emulate_ua_intlck_ctrl == 2)
  1441. core_scsi3_ua_allocate(cmd->se_sess->se_node_acl,
  1442. cmd->orig_fe_lun, 0x2C,
  1443. ASCQ_2CH_PREVIOUS_RESERVATION_CONFLICT_STATUS);
  1444. trace_target_cmd_complete(cmd);
  1445. ret = cmd->se_tfo-> queue_status(cmd);
  1446. if (ret == -EAGAIN || ret == -ENOMEM)
  1447. goto queue_full;
  1448. goto check_stop;
  1449. default:
  1450. pr_err("Unknown transport error for CDB 0x%02x: %d\n",
  1451. cmd->t_task_cdb[0], sense_reason);
  1452. sense_reason = TCM_UNSUPPORTED_SCSI_OPCODE;
  1453. break;
  1454. }
  1455. ret = transport_send_check_condition_and_sense(cmd, sense_reason, 0);
  1456. if (ret == -EAGAIN || ret == -ENOMEM)
  1457. goto queue_full;
  1458. check_stop:
  1459. transport_lun_remove_cmd(cmd);
  1460. if (!transport_cmd_check_stop_to_fabric(cmd))
  1461. ;
  1462. return;
  1463. queue_full:
  1464. cmd->t_state = TRANSPORT_COMPLETE_QF_OK;
  1465. transport_handle_queue_full(cmd, cmd->se_dev);
  1466. }
  1467. EXPORT_SYMBOL(transport_generic_request_failure);
  1468. void __target_execute_cmd(struct se_cmd *cmd)
  1469. {
  1470. sense_reason_t ret;
  1471. if (cmd->execute_cmd) {
  1472. ret = cmd->execute_cmd(cmd);
  1473. if (ret) {
  1474. spin_lock_irq(&cmd->t_state_lock);
  1475. cmd->transport_state &= ~(CMD_T_BUSY|CMD_T_SENT);
  1476. spin_unlock_irq(&cmd->t_state_lock);
  1477. transport_generic_request_failure(cmd, ret);
  1478. }
  1479. }
  1480. }
  1481. static bool target_handle_task_attr(struct se_cmd *cmd)
  1482. {
  1483. struct se_device *dev = cmd->se_dev;
  1484. if (dev->transport->transport_type == TRANSPORT_PLUGIN_PHBA_PDEV)
  1485. return false;
  1486. /*
  1487. * Check for the existence of HEAD_OF_QUEUE, and if true return 1
  1488. * to allow the passed struct se_cmd list of tasks to the front of the list.
  1489. */
  1490. switch (cmd->sam_task_attr) {
  1491. case MSG_HEAD_TAG:
  1492. pr_debug("Added HEAD_OF_QUEUE for CDB: 0x%02x, "
  1493. "se_ordered_id: %u\n",
  1494. cmd->t_task_cdb[0], cmd->se_ordered_id);
  1495. return false;
  1496. case MSG_ORDERED_TAG:
  1497. atomic_inc(&dev->dev_ordered_sync);
  1498. smp_mb__after_atomic_inc();
  1499. pr_debug("Added ORDERED for CDB: 0x%02x to ordered list, "
  1500. " se_ordered_id: %u\n",
  1501. cmd->t_task_cdb[0], cmd->se_ordered_id);
  1502. /*
  1503. * Execute an ORDERED command if no other older commands
  1504. * exist that need to be completed first.
  1505. */
  1506. if (!atomic_read(&dev->simple_cmds))
  1507. return false;
  1508. break;
  1509. default:
  1510. /*
  1511. * For SIMPLE and UNTAGGED Task Attribute commands
  1512. */
  1513. atomic_inc(&dev->simple_cmds);
  1514. smp_mb__after_atomic_inc();
  1515. break;
  1516. }
  1517. if (atomic_read(&dev->dev_ordered_sync) == 0)
  1518. return false;
  1519. spin_lock(&dev->delayed_cmd_lock);
  1520. list_add_tail(&cmd->se_delayed_node, &dev->delayed_cmd_list);
  1521. spin_unlock(&dev->delayed_cmd_lock);
  1522. pr_debug("Added CDB: 0x%02x Task Attr: 0x%02x to"
  1523. " delayed CMD list, se_ordered_id: %u\n",
  1524. cmd->t_task_cdb[0], cmd->sam_task_attr,
  1525. cmd->se_ordered_id);
  1526. return true;
  1527. }
  1528. void target_execute_cmd(struct se_cmd *cmd)
  1529. {
  1530. /*
  1531. * If the received CDB has aleady been aborted stop processing it here.
  1532. */
  1533. if (transport_check_aborted_status(cmd, 1))
  1534. return;
  1535. /*
  1536. * Determine if frontend context caller is requesting the stopping of
  1537. * this command for frontend exceptions.
  1538. */
  1539. spin_lock_irq(&cmd->t_state_lock);
  1540. if (cmd->transport_state & CMD_T_STOP) {
  1541. pr_debug("%s:%d CMD_T_STOP for ITT: 0x%08x\n",
  1542. __func__, __LINE__,
  1543. cmd->se_tfo->get_task_tag(cmd));
  1544. spin_unlock_irq(&cmd->t_state_lock);
  1545. complete(&cmd->t_transport_stop_comp);
  1546. return;
  1547. }
  1548. cmd->t_state = TRANSPORT_PROCESSING;
  1549. cmd->transport_state |= CMD_T_ACTIVE|CMD_T_BUSY|CMD_T_SENT;
  1550. spin_unlock_irq(&cmd->t_state_lock);
  1551. if (target_handle_task_attr(cmd)) {
  1552. spin_lock_irq(&cmd->t_state_lock);
  1553. cmd->transport_state &= ~CMD_T_BUSY|CMD_T_SENT;
  1554. spin_unlock_irq(&cmd->t_state_lock);
  1555. return;
  1556. }
  1557. __target_execute_cmd(cmd);
  1558. }
  1559. EXPORT_SYMBOL(target_execute_cmd);
  1560. /*
  1561. * Process all commands up to the last received ORDERED task attribute which
  1562. * requires another blocking boundary
  1563. */
  1564. static void target_restart_delayed_cmds(struct se_device *dev)
  1565. {
  1566. for (;;) {
  1567. struct se_cmd *cmd;
  1568. spin_lock(&dev->delayed_cmd_lock);
  1569. if (list_empty(&dev->delayed_cmd_list)) {
  1570. spin_unlock(&dev->delayed_cmd_lock);
  1571. break;
  1572. }
  1573. cmd = list_entry(dev->delayed_cmd_list.next,
  1574. struct se_cmd, se_delayed_node);
  1575. list_del(&cmd->se_delayed_node);
  1576. spin_unlock(&dev->delayed_cmd_lock);
  1577. __target_execute_cmd(cmd);
  1578. if (cmd->sam_task_attr == MSG_ORDERED_TAG)
  1579. break;
  1580. }
  1581. }
  1582. /*
  1583. * Called from I/O completion to determine which dormant/delayed
  1584. * and ordered cmds need to have their tasks added to the execution queue.
  1585. */
  1586. static void transport_complete_task_attr(struct se_cmd *cmd)
  1587. {
  1588. struct se_device *dev = cmd->se_dev;
  1589. if (dev->transport->transport_type == TRANSPORT_PLUGIN_PHBA_PDEV)
  1590. return;
  1591. if (cmd->sam_task_attr == MSG_SIMPLE_TAG) {
  1592. atomic_dec(&dev->simple_cmds);
  1593. smp_mb__after_atomic_dec();
  1594. dev->dev_cur_ordered_id++;
  1595. pr_debug("Incremented dev->dev_cur_ordered_id: %u for"
  1596. " SIMPLE: %u\n", dev->dev_cur_ordered_id,
  1597. cmd->se_ordered_id);
  1598. } else if (cmd->sam_task_attr == MSG_HEAD_TAG) {
  1599. dev->dev_cur_ordered_id++;
  1600. pr_debug("Incremented dev_cur_ordered_id: %u for"
  1601. " HEAD_OF_QUEUE: %u\n", dev->dev_cur_ordered_id,
  1602. cmd->se_ordered_id);
  1603. } else if (cmd->sam_task_attr == MSG_ORDERED_TAG) {
  1604. atomic_dec(&dev->dev_ordered_sync);
  1605. smp_mb__after_atomic_dec();
  1606. dev->dev_cur_ordered_id++;
  1607. pr_debug("Incremented dev_cur_ordered_id: %u for ORDERED:"
  1608. " %u\n", dev->dev_cur_ordered_id, cmd->se_ordered_id);
  1609. }
  1610. target_restart_delayed_cmds(dev);
  1611. }
  1612. static void transport_complete_qf(struct se_cmd *cmd)
  1613. {
  1614. int ret = 0;
  1615. transport_complete_task_attr(cmd);
  1616. if (cmd->se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) {
  1617. trace_target_cmd_complete(cmd);
  1618. ret = cmd->se_tfo->queue_status(cmd);
  1619. if (ret)
  1620. goto out;
  1621. }
  1622. switch (cmd->data_direction) {
  1623. case DMA_FROM_DEVICE:
  1624. trace_target_cmd_complete(cmd);
  1625. ret = cmd->se_tfo->queue_data_in(cmd);
  1626. break;
  1627. case DMA_TO_DEVICE:
  1628. if (cmd->se_cmd_flags & SCF_BIDI) {
  1629. ret = cmd->se_tfo->queue_data_in(cmd);
  1630. if (ret < 0)
  1631. break;
  1632. }
  1633. /* Fall through for DMA_TO_DEVICE */
  1634. case DMA_NONE:
  1635. trace_target_cmd_complete(cmd);
  1636. ret = cmd->se_tfo->queue_status(cmd);
  1637. break;
  1638. default:
  1639. break;
  1640. }
  1641. out:
  1642. if (ret < 0) {
  1643. transport_handle_queue_full(cmd, cmd->se_dev);
  1644. return;
  1645. }
  1646. transport_lun_remove_cmd(cmd);
  1647. transport_cmd_check_stop_to_fabric(cmd);
  1648. }
  1649. static void transport_handle_queue_full(
  1650. struct se_cmd *cmd,
  1651. struct se_device *dev)
  1652. {
  1653. spin_lock_irq(&dev->qf_cmd_lock);
  1654. list_add_tail(&cmd->se_qf_node, &cmd->se_dev->qf_cmd_list);
  1655. atomic_inc(&dev->dev_qf_count);
  1656. smp_mb__after_atomic_inc();
  1657. spin_unlock_irq(&cmd->se_dev->qf_cmd_lock);
  1658. schedule_work(&cmd->se_dev->qf_work_queue);
  1659. }
  1660. static void target_complete_ok_work(struct work_struct *work)
  1661. {
  1662. struct se_cmd *cmd = container_of(work, struct se_cmd, work);
  1663. int ret;
  1664. /*
  1665. * Check if we need to move delayed/dormant tasks from cmds on the
  1666. * delayed execution list after a HEAD_OF_QUEUE or ORDERED Task
  1667. * Attribute.
  1668. */
  1669. transport_complete_task_attr(cmd);
  1670. /*
  1671. * Check to schedule QUEUE_FULL work, or execute an existing
  1672. * cmd->transport_qf_callback()
  1673. */
  1674. if (atomic_read(&cmd->se_dev->dev_qf_count) != 0)
  1675. schedule_work(&cmd->se_dev->qf_work_queue);
  1676. /*
  1677. * Check if we need to send a sense buffer from
  1678. * the struct se_cmd in question.
  1679. */
  1680. if (cmd->se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) {
  1681. WARN_ON(!cmd->scsi_status);
  1682. ret = transport_send_check_condition_and_sense(
  1683. cmd, 0, 1);
  1684. if (ret == -EAGAIN || ret == -ENOMEM)
  1685. goto queue_full;
  1686. transport_lun_remove_cmd(cmd);
  1687. transport_cmd_check_stop_to_fabric(cmd);
  1688. return;
  1689. }
  1690. /*
  1691. * Check for a callback, used by amongst other things
  1692. * XDWRITE_READ_10 and COMPARE_AND_WRITE emulation.
  1693. */
  1694. if (cmd->transport_complete_callback) {
  1695. sense_reason_t rc;
  1696. rc = cmd->transport_complete_callback(cmd);
  1697. if (!rc && !(cmd->se_cmd_flags & SCF_COMPARE_AND_WRITE_POST)) {
  1698. return;
  1699. } else if (rc) {
  1700. ret = transport_send_check_condition_and_sense(cmd,
  1701. rc, 0);
  1702. if (ret == -EAGAIN || ret == -ENOMEM)
  1703. goto queue_full;
  1704. transport_lun_remove_cmd(cmd);
  1705. transport_cmd_check_stop_to_fabric(cmd);
  1706. return;
  1707. }
  1708. }
  1709. switch (cmd->data_direction) {
  1710. case DMA_FROM_DEVICE:
  1711. spin_lock(&cmd->se_lun->lun_sep_lock);
  1712. if (cmd->se_lun->lun_sep) {
  1713. cmd->se_lun->lun_sep->sep_stats.tx_data_octets +=
  1714. cmd->data_length;
  1715. }
  1716. spin_unlock(&cmd->se_lun->lun_sep_lock);
  1717. trace_target_cmd_complete(cmd);
  1718. ret = cmd->se_tfo->queue_data_in(cmd);
  1719. if (ret == -EAGAIN || ret == -ENOMEM)
  1720. goto queue_full;
  1721. break;
  1722. case DMA_TO_DEVICE:
  1723. spin_lock(&cmd->se_lun->lun_sep_lock);
  1724. if (cmd->se_lun->lun_sep) {
  1725. cmd->se_lun->lun_sep->sep_stats.rx_data_octets +=
  1726. cmd->data_length;
  1727. }
  1728. spin_unlock(&cmd->se_lun->lun_sep_lock);
  1729. /*
  1730. * Check if we need to send READ payload for BIDI-COMMAND
  1731. */
  1732. if (cmd->se_cmd_flags & SCF_BIDI) {
  1733. spin_lock(&cmd->se_lun->lun_sep_lock);
  1734. if (cmd->se_lun->lun_sep) {
  1735. cmd->se_lun->lun_sep->sep_stats.tx_data_octets +=
  1736. cmd->data_length;
  1737. }
  1738. spin_unlock(&cmd->se_lun->lun_sep_lock);
  1739. ret = cmd->se_tfo->queue_data_in(cmd);
  1740. if (ret == -EAGAIN || ret == -ENOMEM)
  1741. goto queue_full;
  1742. break;
  1743. }
  1744. /* Fall through for DMA_TO_DEVICE */
  1745. case DMA_NONE:
  1746. trace_target_cmd_complete(cmd);
  1747. ret = cmd->se_tfo->queue_status(cmd);
  1748. if (ret == -EAGAIN || ret == -ENOMEM)
  1749. goto queue_full;
  1750. break;
  1751. default:
  1752. break;
  1753. }
  1754. transport_lun_remove_cmd(cmd);
  1755. transport_cmd_check_stop_to_fabric(cmd);
  1756. return;
  1757. queue_full:
  1758. pr_debug("Handling complete_ok QUEUE_FULL: se_cmd: %p,"
  1759. " data_direction: %d\n", cmd, cmd->data_direction);
  1760. cmd->t_state = TRANSPORT_COMPLETE_QF_OK;
  1761. transport_handle_queue_full(cmd, cmd->se_dev);
  1762. }
  1763. static inline void transport_free_sgl(struct scatterlist *sgl, int nents)
  1764. {
  1765. struct scatterlist *sg;
  1766. int count;
  1767. for_each_sg(sgl, sg, nents, count)
  1768. __free_page(sg_page(sg));
  1769. kfree(sgl);
  1770. }
  1771. static inline void transport_reset_sgl_orig(struct se_cmd *cmd)
  1772. {
  1773. /*
  1774. * Check for saved t_data_sg that may be used for COMPARE_AND_WRITE
  1775. * emulation, and free + reset pointers if necessary..
  1776. */
  1777. if (!cmd->t_data_sg_orig)
  1778. return;
  1779. kfree(cmd->t_data_sg);
  1780. cmd->t_data_sg = cmd->t_data_sg_orig;
  1781. cmd->t_data_sg_orig = NULL;
  1782. cmd->t_data_nents = cmd->t_data_nents_orig;
  1783. cmd->t_data_nents_orig = 0;
  1784. }
  1785. static inline void transport_free_pages(struct se_cmd *cmd)
  1786. {
  1787. if (cmd->se_cmd_flags & SCF_PASSTHROUGH_SG_TO_MEM_NOALLOC) {
  1788. transport_reset_sgl_orig(cmd);
  1789. return;
  1790. }
  1791. transport_reset_sgl_orig(cmd);
  1792. transport_free_sgl(cmd->t_data_sg, cmd->t_data_nents);
  1793. cmd->t_data_sg = NULL;
  1794. cmd->t_data_nents = 0;
  1795. transport_free_sgl(cmd->t_bidi_data_sg, cmd->t_bidi_data_nents);
  1796. cmd->t_bidi_data_sg = NULL;
  1797. cmd->t_bidi_data_nents = 0;
  1798. }
  1799. /**
  1800. * transport_release_cmd - free a command
  1801. * @cmd: command to free
  1802. *
  1803. * This routine unconditionally frees a command, and reference counting
  1804. * or list removal must be done in the caller.
  1805. */
  1806. static int transport_release_cmd(struct se_cmd *cmd)
  1807. {
  1808. BUG_ON(!cmd->se_tfo);
  1809. if (cmd->se_cmd_flags & SCF_SCSI_TMR_CDB)
  1810. core_tmr_release_req(cmd->se_tmr_req);
  1811. if (cmd->t_task_cdb != cmd->__t_task_cdb)
  1812. kfree(cmd->t_task_cdb);
  1813. /*
  1814. * If this cmd has been setup with target_get_sess_cmd(), drop
  1815. * the kref and call ->release_cmd() in kref callback.
  1816. */
  1817. return target_put_sess_cmd(cmd->se_sess, cmd);
  1818. }
  1819. /**
  1820. * transport_put_cmd - release a reference to a command
  1821. * @cmd: command to release
  1822. *
  1823. * This routine releases our reference to the command and frees it if possible.
  1824. */
  1825. static int transport_put_cmd(struct se_cmd *cmd)
  1826. {
  1827. transport_free_pages(cmd);
  1828. return transport_release_cmd(cmd);
  1829. }
  1830. void *transport_kmap_data_sg(struct se_cmd *cmd)
  1831. {
  1832. struct scatterlist *sg = cmd->t_data_sg;
  1833. struct page **pages;
  1834. int i;
  1835. /*
  1836. * We need to take into account a possible offset here for fabrics like
  1837. * tcm_loop who may be using a contig buffer from the SCSI midlayer for
  1838. * control CDBs passed as SGLs via transport_generic_map_mem_to_cmd()
  1839. */
  1840. if (!cmd->t_data_nents)
  1841. return NULL;
  1842. BUG_ON(!sg);
  1843. if (cmd->t_data_nents == 1)
  1844. return kmap(sg_page(sg)) + sg->offset;
  1845. /* >1 page. use vmap */
  1846. pages = kmalloc(sizeof(*pages) * cmd->t_data_nents, GFP_KERNEL);
  1847. if (!pages)
  1848. return NULL;
  1849. /* convert sg[] to pages[] */
  1850. for_each_sg(cmd->t_data_sg, sg, cmd->t_data_nents, i) {
  1851. pages[i] = sg_page(sg);
  1852. }
  1853. cmd->t_data_vmap = vmap(pages, cmd->t_data_nents, VM_MAP, PAGE_KERNEL);
  1854. kfree(pages);
  1855. if (!cmd->t_data_vmap)
  1856. return NULL;
  1857. return cmd->t_data_vmap + cmd->t_data_sg[0].offset;
  1858. }
  1859. EXPORT_SYMBOL(transport_kmap_data_sg);
  1860. void transport_kunmap_data_sg(struct se_cmd *cmd)
  1861. {
  1862. if (!cmd->t_data_nents) {
  1863. return;
  1864. } else if (cmd->t_data_nents == 1) {
  1865. kunmap(sg_page(cmd->t_data_sg));
  1866. return;
  1867. }
  1868. vunmap(cmd->t_data_vmap);
  1869. cmd->t_data_vmap = NULL;
  1870. }
  1871. EXPORT_SYMBOL(transport_kunmap_data_sg);
  1872. int
  1873. target_alloc_sgl(struct scatterlist **sgl, unsigned int *nents, u32 length,
  1874. bool zero_page)
  1875. {
  1876. struct scatterlist *sg;
  1877. struct page *page;
  1878. gfp_t zero_flag = (zero_page) ? __GFP_ZERO : 0;
  1879. unsigned int nent;
  1880. int i = 0;
  1881. nent = DIV_ROUND_UP(length, PAGE_SIZE);
  1882. sg = kmalloc(sizeof(struct scatterlist) * nent, GFP_KERNEL);
  1883. if (!sg)
  1884. return -ENOMEM;
  1885. sg_init_table(sg, nent);
  1886. while (length) {
  1887. u32 page_len = min_t(u32, length, PAGE_SIZE);
  1888. page = alloc_page(GFP_KERNEL | zero_flag);
  1889. if (!page)
  1890. goto out;
  1891. sg_set_page(&sg[i], page, page_len, 0);
  1892. length -= page_len;
  1893. i++;
  1894. }
  1895. *sgl = sg;
  1896. *nents = nent;
  1897. return 0;
  1898. out:
  1899. while (i > 0) {
  1900. i--;
  1901. __free_page(sg_page(&sg[i]));
  1902. }
  1903. kfree(sg);
  1904. return -ENOMEM;
  1905. }
  1906. /*
  1907. * Allocate any required resources to execute the command. For writes we
  1908. * might not have the payload yet, so notify the fabric via a call to
  1909. * ->write_pending instead. Otherwise place it on the execution queue.
  1910. */
  1911. sense_reason_t
  1912. transport_generic_new_cmd(struct se_cmd *cmd)
  1913. {
  1914. int ret = 0;
  1915. /*
  1916. * Determine is the TCM fabric module has already allocated physical
  1917. * memory, and is directly calling transport_generic_map_mem_to_cmd()
  1918. * beforehand.
  1919. */
  1920. if (!(cmd->se_cmd_flags & SCF_PASSTHROUGH_SG_TO_MEM_NOALLOC) &&
  1921. cmd->data_length) {
  1922. bool zero_flag = !(cmd->se_cmd_flags & SCF_SCSI_DATA_CDB);
  1923. if ((cmd->se_cmd_flags & SCF_BIDI) ||
  1924. (cmd->se_cmd_flags & SCF_COMPARE_AND_WRITE)) {
  1925. u32 bidi_length;
  1926. if (cmd->se_cmd_flags & SCF_COMPARE_AND_WRITE)
  1927. bidi_length = cmd->t_task_nolb *
  1928. cmd->se_dev->dev_attrib.block_size;
  1929. else
  1930. bidi_length = cmd->data_length;
  1931. ret = target_alloc_sgl(&cmd->t_bidi_data_sg,
  1932. &cmd->t_bidi_data_nents,
  1933. bidi_length, zero_flag);
  1934. if (ret < 0)
  1935. return TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
  1936. }
  1937. ret = target_alloc_sgl(&cmd->t_data_sg, &cmd->t_data_nents,
  1938. cmd->data_length, zero_flag);
  1939. if (ret < 0)
  1940. return TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
  1941. }
  1942. /*
  1943. * If this command is not a write we can execute it right here,
  1944. * for write buffers we need to notify the fabric driver first
  1945. * and let it call back once the write buffers are ready.
  1946. */
  1947. target_add_to_state_list(cmd);
  1948. if (cmd->data_direction != DMA_TO_DEVICE) {
  1949. target_execute_cmd(cmd);
  1950. return 0;
  1951. }
  1952. transport_cmd_check_stop(cmd, false, true);
  1953. ret = cmd->se_tfo->write_pending(cmd);
  1954. if (ret == -EAGAIN || ret == -ENOMEM)
  1955. goto queue_full;
  1956. /* fabric drivers should only return -EAGAIN or -ENOMEM as error */
  1957. WARN_ON(ret);
  1958. return (!ret) ? 0 : TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
  1959. queue_full:
  1960. pr_debug("Handling write_pending QUEUE__FULL: se_cmd: %p\n", cmd);
  1961. cmd->t_state = TRANSPORT_COMPLETE_QF_WP;
  1962. transport_handle_queue_full(cmd, cmd->se_dev);
  1963. return 0;
  1964. }
  1965. EXPORT_SYMBOL(transport_generic_new_cmd);
  1966. static void transport_write_pending_qf(struct se_cmd *cmd)
  1967. {
  1968. int ret;
  1969. ret = cmd->se_tfo->write_pending(cmd);
  1970. if (ret == -EAGAIN || ret == -ENOMEM) {
  1971. pr_debug("Handling write_pending QUEUE__FULL: se_cmd: %p\n",
  1972. cmd);
  1973. transport_handle_queue_full(cmd, cmd->se_dev);
  1974. }
  1975. }
  1976. int transport_generic_free_cmd(struct se_cmd *cmd, int wait_for_tasks)
  1977. {
  1978. unsigned long flags;
  1979. int ret = 0;
  1980. if (!(cmd->se_cmd_flags & SCF_SE_LUN_CMD)) {
  1981. if (wait_for_tasks && (cmd->se_cmd_flags & SCF_SCSI_TMR_CDB))
  1982. transport_wait_for_tasks(cmd);
  1983. ret = transport_release_cmd(cmd);
  1984. } else {
  1985. if (wait_for_tasks)
  1986. transport_wait_for_tasks(cmd);
  1987. /*
  1988. * Handle WRITE failure case where transport_generic_new_cmd()
  1989. * has already added se_cmd to state_list, but fabric has
  1990. * failed command before I/O submission.
  1991. */
  1992. if (cmd->state_active) {
  1993. spin_lock_irqsave(&cmd->t_state_lock, flags);
  1994. target_remove_from_state_list(cmd);
  1995. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  1996. }
  1997. if (cmd->se_lun)
  1998. transport_lun_remove_cmd(cmd);
  1999. ret = transport_put_cmd(cmd);
  2000. }
  2001. return ret;
  2002. }
  2003. EXPORT_SYMBOL(transport_generic_free_cmd);
  2004. /* target_get_sess_cmd - Add command to active ->sess_cmd_list
  2005. * @se_sess: session to reference
  2006. * @se_cmd: command descriptor to add
  2007. * @ack_kref: Signal that fabric will perform an ack target_put_sess_cmd()
  2008. */
  2009. int target_get_sess_cmd(struct se_session *se_sess, struct se_cmd *se_cmd,
  2010. bool ack_kref)
  2011. {
  2012. unsigned long flags;
  2013. int ret = 0;
  2014. kref_init(&se_cmd->cmd_kref);
  2015. /*
  2016. * Add a second kref if the fabric caller is expecting to handle
  2017. * fabric acknowledgement that requires two target_put_sess_cmd()
  2018. * invocations before se_cmd descriptor release.
  2019. */
  2020. if (ack_kref == true) {
  2021. kref_get(&se_cmd->cmd_kref);
  2022. se_cmd->se_cmd_flags |= SCF_ACK_KREF;
  2023. }
  2024. spin_lock_irqsave(&se_sess->sess_cmd_lock, flags);
  2025. if (se_sess->sess_tearing_down) {
  2026. ret = -ESHUTDOWN;
  2027. goto out;
  2028. }
  2029. list_add_tail(&se_cmd->se_cmd_list, &se_sess->sess_cmd_list);
  2030. out:
  2031. spin_unlock_irqrestore(&se_sess->sess_cmd_lock, flags);
  2032. return ret;
  2033. }
  2034. EXPORT_SYMBOL(target_get_sess_cmd);
  2035. static void target_release_cmd_kref(struct kref *kref)
  2036. {
  2037. struct se_cmd *se_cmd = container_of(kref, struct se_cmd, cmd_kref);
  2038. struct se_session *se_sess = se_cmd->se_sess;
  2039. if (list_empty(&se_cmd->se_cmd_list)) {
  2040. spin_unlock(&se_sess->sess_cmd_lock);
  2041. se_cmd->se_tfo->release_cmd(se_cmd);
  2042. return;
  2043. }
  2044. if (se_sess->sess_tearing_down && se_cmd->cmd_wait_set) {
  2045. spin_unlock(&se_sess->sess_cmd_lock);
  2046. complete(&se_cmd->cmd_wait_comp);
  2047. return;
  2048. }
  2049. list_del(&se_cmd->se_cmd_list);
  2050. spin_unlock(&se_sess->sess_cmd_lock);
  2051. se_cmd->se_tfo->release_cmd(se_cmd);
  2052. }
  2053. /* target_put_sess_cmd - Check for active I/O shutdown via kref_put
  2054. * @se_sess: session to reference
  2055. * @se_cmd: command descriptor to drop
  2056. */
  2057. int target_put_sess_cmd(struct se_session *se_sess, struct se_cmd *se_cmd)
  2058. {
  2059. return kref_put_spinlock_irqsave(&se_cmd->cmd_kref, target_release_cmd_kref,
  2060. &se_sess->sess_cmd_lock);
  2061. }
  2062. EXPORT_SYMBOL(target_put_sess_cmd);
  2063. /* target_sess_cmd_list_set_waiting - Flag all commands in
  2064. * sess_cmd_list to complete cmd_wait_comp. Set
  2065. * sess_tearing_down so no more commands are queued.
  2066. * @se_sess: session to flag
  2067. */
  2068. void target_sess_cmd_list_set_waiting(struct se_session *se_sess)
  2069. {
  2070. struct se_cmd *se_cmd;
  2071. unsigned long flags;
  2072. spin_lock_irqsave(&se_sess->sess_cmd_lock, flags);
  2073. if (se_sess->sess_tearing_down) {
  2074. spin_unlock_irqrestore(&se_sess->sess_cmd_lock, flags);
  2075. return;
  2076. }
  2077. se_sess->sess_tearing_down = 1;
  2078. list_splice_init(&se_sess->sess_cmd_list, &se_sess->sess_wait_list);
  2079. list_for_each_entry(se_cmd, &se_sess->sess_wait_list, se_cmd_list)
  2080. se_cmd->cmd_wait_set = 1;
  2081. spin_unlock_irqrestore(&se_sess->sess_cmd_lock, flags);
  2082. }
  2083. EXPORT_SYMBOL(target_sess_cmd_list_set_waiting);
  2084. /* target_wait_for_sess_cmds - Wait for outstanding descriptors
  2085. * @se_sess: session to wait for active I/O
  2086. */
  2087. void target_wait_for_sess_cmds(struct se_session *se_sess)
  2088. {
  2089. struct se_cmd *se_cmd, *tmp_cmd;
  2090. unsigned long flags;
  2091. list_for_each_entry_safe(se_cmd, tmp_cmd,
  2092. &se_sess->sess_wait_list, se_cmd_list) {
  2093. list_del(&se_cmd->se_cmd_list);
  2094. pr_debug("Waiting for se_cmd: %p t_state: %d, fabric state:"
  2095. " %d\n", se_cmd, se_cmd->t_state,
  2096. se_cmd->se_tfo->get_cmd_state(se_cmd));
  2097. wait_for_completion(&se_cmd->cmd_wait_comp);
  2098. pr_debug("After cmd_wait_comp: se_cmd: %p t_state: %d"
  2099. " fabric state: %d\n", se_cmd, se_cmd->t_state,
  2100. se_cmd->se_tfo->get_cmd_state(se_cmd));
  2101. se_cmd->se_tfo->release_cmd(se_cmd);
  2102. }
  2103. spin_lock_irqsave(&se_sess->sess_cmd_lock, flags);
  2104. WARN_ON(!list_empty(&se_sess->sess_cmd_list));
  2105. spin_unlock_irqrestore(&se_sess->sess_cmd_lock, flags);
  2106. }
  2107. EXPORT_SYMBOL(target_wait_for_sess_cmds);
  2108. static int transport_clear_lun_ref_thread(void *p)
  2109. {
  2110. struct se_lun *lun = p;
  2111. percpu_ref_kill(&lun->lun_ref);
  2112. wait_for_completion(&lun->lun_ref_comp);
  2113. complete(&lun->lun_shutdown_comp);
  2114. return 0;
  2115. }
  2116. int transport_clear_lun_ref(struct se_lun *lun)
  2117. {
  2118. struct task_struct *kt;
  2119. kt = kthread_run(transport_clear_lun_ref_thread, lun,
  2120. "tcm_cl_%u", lun->unpacked_lun);
  2121. if (IS_ERR(kt)) {
  2122. pr_err("Unable to start clear_lun thread\n");
  2123. return PTR_ERR(kt);
  2124. }
  2125. wait_for_completion(&lun->lun_shutdown_comp);
  2126. return 0;
  2127. }
  2128. /**
  2129. * transport_wait_for_tasks - wait for completion to occur
  2130. * @cmd: command to wait
  2131. *
  2132. * Called from frontend fabric context to wait for storage engine
  2133. * to pause and/or release frontend generated struct se_cmd.
  2134. */
  2135. bool transport_wait_for_tasks(struct se_cmd *cmd)
  2136. {
  2137. unsigned long flags;
  2138. spin_lock_irqsave(&cmd->t_state_lock, flags);
  2139. if (!(cmd->se_cmd_flags & SCF_SE_LUN_CMD) &&
  2140. !(cmd->se_cmd_flags & SCF_SCSI_TMR_CDB)) {
  2141. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  2142. return false;
  2143. }
  2144. if (!(cmd->se_cmd_flags & SCF_SUPPORTED_SAM_OPCODE) &&
  2145. !(cmd->se_cmd_flags & SCF_SCSI_TMR_CDB)) {
  2146. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  2147. return false;
  2148. }
  2149. if (!(cmd->transport_state & CMD_T_ACTIVE)) {
  2150. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  2151. return false;
  2152. }
  2153. cmd->transport_state |= CMD_T_STOP;
  2154. pr_debug("wait_for_tasks: Stopping %p ITT: 0x%08x"
  2155. " i_state: %d, t_state: %d, CMD_T_STOP\n",
  2156. cmd, cmd->se_tfo->get_task_tag(cmd),
  2157. cmd->se_tfo->get_cmd_state(cmd), cmd->t_state);
  2158. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  2159. wait_for_completion(&cmd->t_transport_stop_comp);
  2160. spin_lock_irqsave(&cmd->t_state_lock, flags);
  2161. cmd->transport_state &= ~(CMD_T_ACTIVE | CMD_T_STOP);
  2162. pr_debug("wait_for_tasks: Stopped wait_for_completion("
  2163. "&cmd->t_transport_stop_comp) for ITT: 0x%08x\n",
  2164. cmd->se_tfo->get_task_tag(cmd));
  2165. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  2166. return true;
  2167. }
  2168. EXPORT_SYMBOL(transport_wait_for_tasks);
  2169. static int transport_get_sense_codes(
  2170. struct se_cmd *cmd,
  2171. u8 *asc,
  2172. u8 *ascq)
  2173. {
  2174. *asc = cmd->scsi_asc;
  2175. *ascq = cmd->scsi_ascq;
  2176. return 0;
  2177. }
  2178. static
  2179. void transport_err_sector_info(unsigned char *buffer, sector_t bad_sector)
  2180. {
  2181. /* Place failed LBA in sense data information descriptor 0. */
  2182. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 0xc;
  2183. buffer[SPC_DESC_TYPE_OFFSET] = 0; /* Information */
  2184. buffer[SPC_ADDITIONAL_DESC_LEN_OFFSET] = 0xa;
  2185. buffer[SPC_VALIDITY_OFFSET] = 0x80;
  2186. /* Descriptor Information: failing sector */
  2187. put_unaligned_be64(bad_sector, &buffer[12]);
  2188. }
  2189. int
  2190. transport_send_check_condition_and_sense(struct se_cmd *cmd,
  2191. sense_reason_t reason, int from_transport)
  2192. {
  2193. unsigned char *buffer = cmd->sense_buffer;
  2194. unsigned long flags;
  2195. u8 asc = 0, ascq = 0;
  2196. spin_lock_irqsave(&cmd->t_state_lock, flags);
  2197. if (cmd->se_cmd_flags & SCF_SENT_CHECK_CONDITION) {
  2198. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  2199. return 0;
  2200. }
  2201. cmd->se_cmd_flags |= SCF_SENT_CHECK_CONDITION;
  2202. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  2203. if (!reason && from_transport)
  2204. goto after_reason;
  2205. if (!from_transport)
  2206. cmd->se_cmd_flags |= SCF_EMULATED_TASK_SENSE;
  2207. /*
  2208. * Actual SENSE DATA, see SPC-3 7.23.2 SPC_SENSE_KEY_OFFSET uses
  2209. * SENSE KEY values from include/scsi/scsi.h
  2210. */
  2211. switch (reason) {
  2212. case TCM_NO_SENSE:
  2213. /* CURRENT ERROR */
  2214. buffer[0] = 0x70;
  2215. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2216. /* Not Ready */
  2217. buffer[SPC_SENSE_KEY_OFFSET] = NOT_READY;
  2218. /* NO ADDITIONAL SENSE INFORMATION */
  2219. buffer[SPC_ASC_KEY_OFFSET] = 0;
  2220. buffer[SPC_ASCQ_KEY_OFFSET] = 0;
  2221. break;
  2222. case TCM_NON_EXISTENT_LUN:
  2223. /* CURRENT ERROR */
  2224. buffer[0] = 0x70;
  2225. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2226. /* ILLEGAL REQUEST */
  2227. buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
  2228. /* LOGICAL UNIT NOT SUPPORTED */
  2229. buffer[SPC_ASC_KEY_OFFSET] = 0x25;
  2230. break;
  2231. case TCM_UNSUPPORTED_SCSI_OPCODE:
  2232. case TCM_SECTOR_COUNT_TOO_MANY:
  2233. /* CURRENT ERROR */
  2234. buffer[0] = 0x70;
  2235. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2236. /* ILLEGAL REQUEST */
  2237. buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
  2238. /* INVALID COMMAND OPERATION CODE */
  2239. buffer[SPC_ASC_KEY_OFFSET] = 0x20;
  2240. break;
  2241. case TCM_UNKNOWN_MODE_PAGE:
  2242. /* CURRENT ERROR */
  2243. buffer[0] = 0x70;
  2244. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2245. /* ILLEGAL REQUEST */
  2246. buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
  2247. /* INVALID FIELD IN CDB */
  2248. buffer[SPC_ASC_KEY_OFFSET] = 0x24;
  2249. break;
  2250. case TCM_CHECK_CONDITION_ABORT_CMD:
  2251. /* CURRENT ERROR */
  2252. buffer[0] = 0x70;
  2253. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2254. /* ABORTED COMMAND */
  2255. buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
  2256. /* BUS DEVICE RESET FUNCTION OCCURRED */
  2257. buffer[SPC_ASC_KEY_OFFSET] = 0x29;
  2258. buffer[SPC_ASCQ_KEY_OFFSET] = 0x03;
  2259. break;
  2260. case TCM_INCORRECT_AMOUNT_OF_DATA:
  2261. /* CURRENT ERROR */
  2262. buffer[0] = 0x70;
  2263. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2264. /* ABORTED COMMAND */
  2265. buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
  2266. /* WRITE ERROR */
  2267. buffer[SPC_ASC_KEY_OFFSET] = 0x0c;
  2268. /* NOT ENOUGH UNSOLICITED DATA */
  2269. buffer[SPC_ASCQ_KEY_OFFSET] = 0x0d;
  2270. break;
  2271. case TCM_INVALID_CDB_FIELD:
  2272. /* CURRENT ERROR */
  2273. buffer[0] = 0x70;
  2274. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2275. /* ILLEGAL REQUEST */
  2276. buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
  2277. /* INVALID FIELD IN CDB */
  2278. buffer[SPC_ASC_KEY_OFFSET] = 0x24;
  2279. break;
  2280. case TCM_INVALID_PARAMETER_LIST:
  2281. /* CURRENT ERROR */
  2282. buffer[0] = 0x70;
  2283. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2284. /* ILLEGAL REQUEST */
  2285. buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
  2286. /* INVALID FIELD IN PARAMETER LIST */
  2287. buffer[SPC_ASC_KEY_OFFSET] = 0x26;
  2288. break;
  2289. case TCM_PARAMETER_LIST_LENGTH_ERROR:
  2290. /* CURRENT ERROR */
  2291. buffer[0] = 0x70;
  2292. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2293. /* ILLEGAL REQUEST */
  2294. buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
  2295. /* PARAMETER LIST LENGTH ERROR */
  2296. buffer[SPC_ASC_KEY_OFFSET] = 0x1a;
  2297. break;
  2298. case TCM_UNEXPECTED_UNSOLICITED_DATA:
  2299. /* CURRENT ERROR */
  2300. buffer[0] = 0x70;
  2301. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2302. /* ABORTED COMMAND */
  2303. buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
  2304. /* WRITE ERROR */
  2305. buffer[SPC_ASC_KEY_OFFSET] = 0x0c;
  2306. /* UNEXPECTED_UNSOLICITED_DATA */
  2307. buffer[SPC_ASCQ_KEY_OFFSET] = 0x0c;
  2308. break;
  2309. case TCM_SERVICE_CRC_ERROR:
  2310. /* CURRENT ERROR */
  2311. buffer[0] = 0x70;
  2312. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2313. /* ABORTED COMMAND */
  2314. buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
  2315. /* PROTOCOL SERVICE CRC ERROR */
  2316. buffer[SPC_ASC_KEY_OFFSET] = 0x47;
  2317. /* N/A */
  2318. buffer[SPC_ASCQ_KEY_OFFSET] = 0x05;
  2319. break;
  2320. case TCM_SNACK_REJECTED:
  2321. /* CURRENT ERROR */
  2322. buffer[0] = 0x70;
  2323. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2324. /* ABORTED COMMAND */
  2325. buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
  2326. /* READ ERROR */
  2327. buffer[SPC_ASC_KEY_OFFSET] = 0x11;
  2328. /* FAILED RETRANSMISSION REQUEST */
  2329. buffer[SPC_ASCQ_KEY_OFFSET] = 0x13;
  2330. break;
  2331. case TCM_WRITE_PROTECTED:
  2332. /* CURRENT ERROR */
  2333. buffer[0] = 0x70;
  2334. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2335. /* DATA PROTECT */
  2336. buffer[SPC_SENSE_KEY_OFFSET] = DATA_PROTECT;
  2337. /* WRITE PROTECTED */
  2338. buffer[SPC_ASC_KEY_OFFSET] = 0x27;
  2339. break;
  2340. case TCM_ADDRESS_OUT_OF_RANGE:
  2341. /* CURRENT ERROR */
  2342. buffer[0] = 0x70;
  2343. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2344. /* ILLEGAL REQUEST */
  2345. buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
  2346. /* LOGICAL BLOCK ADDRESS OUT OF RANGE */
  2347. buffer[SPC_ASC_KEY_OFFSET] = 0x21;
  2348. break;
  2349. case TCM_CHECK_CONDITION_UNIT_ATTENTION:
  2350. /* CURRENT ERROR */
  2351. buffer[0] = 0x70;
  2352. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2353. /* UNIT ATTENTION */
  2354. buffer[SPC_SENSE_KEY_OFFSET] = UNIT_ATTENTION;
  2355. core_scsi3_ua_for_check_condition(cmd, &asc, &ascq);
  2356. buffer[SPC_ASC_KEY_OFFSET] = asc;
  2357. buffer[SPC_ASCQ_KEY_OFFSET] = ascq;
  2358. break;
  2359. case TCM_CHECK_CONDITION_NOT_READY:
  2360. /* CURRENT ERROR */
  2361. buffer[0] = 0x70;
  2362. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2363. /* Not Ready */
  2364. buffer[SPC_SENSE_KEY_OFFSET] = NOT_READY;
  2365. transport_get_sense_codes(cmd, &asc, &ascq);
  2366. buffer[SPC_ASC_KEY_OFFSET] = asc;
  2367. buffer[SPC_ASCQ_KEY_OFFSET] = ascq;
  2368. break;
  2369. case TCM_MISCOMPARE_VERIFY:
  2370. /* CURRENT ERROR */
  2371. buffer[0] = 0x70;
  2372. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2373. buffer[SPC_SENSE_KEY_OFFSET] = MISCOMPARE;
  2374. /* MISCOMPARE DURING VERIFY OPERATION */
  2375. buffer[SPC_ASC_KEY_OFFSET] = 0x1d;
  2376. buffer[SPC_ASCQ_KEY_OFFSET] = 0x00;
  2377. break;
  2378. case TCM_LOGICAL_BLOCK_GUARD_CHECK_FAILED:
  2379. /* CURRENT ERROR */
  2380. buffer[0] = 0x70;
  2381. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2382. /* ILLEGAL REQUEST */
  2383. buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
  2384. /* LOGICAL BLOCK GUARD CHECK FAILED */
  2385. buffer[SPC_ASC_KEY_OFFSET] = 0x10;
  2386. buffer[SPC_ASCQ_KEY_OFFSET] = 0x01;
  2387. transport_err_sector_info(buffer, cmd->bad_sector);
  2388. break;
  2389. case TCM_LOGICAL_BLOCK_APP_TAG_CHECK_FAILED:
  2390. /* CURRENT ERROR */
  2391. buffer[0] = 0x70;
  2392. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2393. /* ILLEGAL REQUEST */
  2394. buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
  2395. /* LOGICAL BLOCK APPLICATION TAG CHECK FAILED */
  2396. buffer[SPC_ASC_KEY_OFFSET] = 0x10;
  2397. buffer[SPC_ASCQ_KEY_OFFSET] = 0x02;
  2398. transport_err_sector_info(buffer, cmd->bad_sector);
  2399. break;
  2400. case TCM_LOGICAL_BLOCK_REF_TAG_CHECK_FAILED:
  2401. /* CURRENT ERROR */
  2402. buffer[0] = 0x70;
  2403. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2404. /* ILLEGAL REQUEST */
  2405. buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
  2406. /* LOGICAL BLOCK REFERENCE TAG CHECK FAILED */
  2407. buffer[SPC_ASC_KEY_OFFSET] = 0x10;
  2408. buffer[SPC_ASCQ_KEY_OFFSET] = 0x03;
  2409. transport_err_sector_info(buffer, cmd->bad_sector);
  2410. break;
  2411. case TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE:
  2412. default:
  2413. /* CURRENT ERROR */
  2414. buffer[0] = 0x70;
  2415. buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
  2416. /*
  2417. * Returning ILLEGAL REQUEST would cause immediate IO errors on
  2418. * Solaris initiators. Returning NOT READY instead means the
  2419. * operations will be retried a finite number of times and we
  2420. * can survive intermittent errors.
  2421. */
  2422. buffer[SPC_SENSE_KEY_OFFSET] = NOT_READY;
  2423. /* LOGICAL UNIT COMMUNICATION FAILURE */
  2424. buffer[SPC_ASC_KEY_OFFSET] = 0x08;
  2425. break;
  2426. }
  2427. /*
  2428. * This code uses linux/include/scsi/scsi.h SAM status codes!
  2429. */
  2430. cmd->scsi_status = SAM_STAT_CHECK_CONDITION;
  2431. /*
  2432. * Automatically padded, this value is encoded in the fabric's
  2433. * data_length response PDU containing the SCSI defined sense data.
  2434. */
  2435. cmd->scsi_sense_length = TRANSPORT_SENSE_BUFFER;
  2436. after_reason:
  2437. trace_target_cmd_complete(cmd);
  2438. return cmd->se_tfo->queue_status(cmd);
  2439. }
  2440. EXPORT_SYMBOL(transport_send_check_condition_and_sense);
  2441. int transport_check_aborted_status(struct se_cmd *cmd, int send_status)
  2442. {
  2443. if (!(cmd->transport_state & CMD_T_ABORTED))
  2444. return 0;
  2445. if (!send_status || (cmd->se_cmd_flags & SCF_SENT_DELAYED_TAS))
  2446. return 1;
  2447. pr_debug("Sending delayed SAM_STAT_TASK_ABORTED status for CDB: 0x%02x ITT: 0x%08x\n",
  2448. cmd->t_task_cdb[0], cmd->se_tfo->get_task_tag(cmd));
  2449. cmd->se_cmd_flags |= SCF_SENT_DELAYED_TAS;
  2450. cmd->scsi_status = SAM_STAT_TASK_ABORTED;
  2451. trace_target_cmd_complete(cmd);
  2452. cmd->se_tfo->queue_status(cmd);
  2453. return 1;
  2454. }
  2455. EXPORT_SYMBOL(transport_check_aborted_status);
  2456. void transport_send_task_abort(struct se_cmd *cmd)
  2457. {
  2458. unsigned long flags;
  2459. spin_lock_irqsave(&cmd->t_state_lock, flags);
  2460. if (cmd->se_cmd_flags & (SCF_SENT_CHECK_CONDITION | SCF_SENT_DELAYED_TAS)) {
  2461. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  2462. return;
  2463. }
  2464. spin_unlock_irqrestore(&cmd->t_state_lock, flags);
  2465. /*
  2466. * If there are still expected incoming fabric WRITEs, we wait
  2467. * until until they have completed before sending a TASK_ABORTED
  2468. * response. This response with TASK_ABORTED status will be
  2469. * queued back to fabric module by transport_check_aborted_status().
  2470. */
  2471. if (cmd->data_direction == DMA_TO_DEVICE) {
  2472. if (cmd->se_tfo->write_pending_status(cmd) != 0) {
  2473. cmd->transport_state |= CMD_T_ABORTED;
  2474. smp_mb__after_atomic_inc();
  2475. return;
  2476. }
  2477. }
  2478. cmd->scsi_status = SAM_STAT_TASK_ABORTED;
  2479. transport_lun_remove_cmd(cmd);
  2480. pr_debug("Setting SAM_STAT_TASK_ABORTED status for CDB: 0x%02x,"
  2481. " ITT: 0x%08x\n", cmd->t_task_cdb[0],
  2482. cmd->se_tfo->get_task_tag(cmd));
  2483. trace_target_cmd_complete(cmd);
  2484. cmd->se_tfo->queue_status(cmd);
  2485. }
  2486. static void target_tmr_work(struct work_struct *work)
  2487. {
  2488. struct se_cmd *cmd = container_of(work, struct se_cmd, work);
  2489. struct se_device *dev = cmd->se_dev;
  2490. struct se_tmr_req *tmr = cmd->se_tmr_req;
  2491. int ret;
  2492. switch (tmr->function) {
  2493. case TMR_ABORT_TASK:
  2494. core_tmr_abort_task(dev, tmr, cmd->se_sess);
  2495. break;
  2496. case TMR_ABORT_TASK_SET:
  2497. case TMR_CLEAR_ACA:
  2498. case TMR_CLEAR_TASK_SET:
  2499. tmr->response = TMR_TASK_MGMT_FUNCTION_NOT_SUPPORTED;
  2500. break;
  2501. case TMR_LUN_RESET:
  2502. ret = core_tmr_lun_reset(dev, tmr, NULL, NULL);
  2503. tmr->response = (!ret) ? TMR_FUNCTION_COMPLETE :
  2504. TMR_FUNCTION_REJECTED;
  2505. break;
  2506. case TMR_TARGET_WARM_RESET:
  2507. tmr->response = TMR_FUNCTION_REJECTED;
  2508. break;
  2509. case TMR_TARGET_COLD_RESET:
  2510. tmr->response = TMR_FUNCTION_REJECTED;
  2511. break;
  2512. default:
  2513. pr_err("Uknown TMR function: 0x%02x.\n",
  2514. tmr->function);
  2515. tmr->response = TMR_FUNCTION_REJECTED;
  2516. break;
  2517. }
  2518. cmd->t_state = TRANSPORT_ISTATE_PROCESSING;
  2519. cmd->se_tfo->queue_tm_rsp(cmd);
  2520. transport_cmd_check_stop_to_fabric(cmd);
  2521. }
  2522. int transport_generic_handle_tmr(
  2523. struct se_cmd *cmd)
  2524. {
  2525. INIT_WORK(&cmd->work, target_tmr_work);
  2526. queue_work(cmd->se_dev->tmr_wq, &cmd->work);
  2527. return 0;
  2528. }
  2529. EXPORT_SYMBOL(transport_generic_handle_tmr);