target_core_transport.c 77.5 KB
Newer Older
1 2 3 4 5
/*******************************************************************************
 * Filename:  target_core_transport.c
 *
 * This file contains the Generic Target Engine Core.
 *
6
 * (c) Copyright 2002-2012 RisingTide Systems LLC.
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
 *
 * Nicholas A. Bellinger <nab@kernel.org>
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
 *
 ******************************************************************************/

#include <linux/net.h>
#include <linux/delay.h>
#include <linux/string.h>
#include <linux/timer.h>
#include <linux/slab.h>
#include <linux/blkdev.h>
#include <linux/spinlock.h>
#include <linux/kthread.h>
#include <linux/in.h>
#include <linux/cdrom.h>
36
#include <linux/module.h>
37
#include <linux/ratelimit.h>
38 39 40 41 42
#include <asm/unaligned.h>
#include <net/sock.h>
#include <net/tcp.h>
#include <scsi/scsi.h>
#include <scsi/scsi_cmnd.h>
43
#include <scsi/scsi_tcq.h>
44 45

#include <target/target_core_base.h>
46 47
#include <target/target_core_backend.h>
#include <target/target_core_fabric.h>
48 49
#include <target/target_core_configfs.h>

C
Christoph Hellwig 已提交
50
#include "target_core_internal.h"
51 52 53 54
#include "target_core_alua.h"
#include "target_core_pr.h"
#include "target_core_ua.h"

55
static struct workqueue_struct *target_completion_wq;
56 57 58 59 60 61 62 63 64
static struct kmem_cache *se_sess_cache;
struct kmem_cache *se_ua_cache;
struct kmem_cache *t10_pr_reg_cache;
struct kmem_cache *t10_alua_lu_gp_cache;
struct kmem_cache *t10_alua_lu_gp_mem_cache;
struct kmem_cache *t10_alua_tg_pt_gp_cache;
struct kmem_cache *t10_alua_tg_pt_gp_mem_cache;

static void transport_complete_task_attr(struct se_cmd *cmd);
65
static void transport_handle_queue_full(struct se_cmd *cmd,
66
		struct se_device *dev);
67
static int transport_generic_get_mem(struct se_cmd *cmd);
68
static void transport_put_cmd(struct se_cmd *cmd);
69
static void target_complete_ok_work(struct work_struct *work);
70

71
int init_se_kmem_caches(void)
72 73 74 75
{
	se_sess_cache = kmem_cache_create("se_sess_cache",
			sizeof(struct se_session), __alignof__(struct se_session),
			0, NULL);
76 77
	if (!se_sess_cache) {
		pr_err("kmem_cache_create() for struct se_session"
78
				" failed\n");
79
		goto out;
80 81 82 83
	}
	se_ua_cache = kmem_cache_create("se_ua_cache",
			sizeof(struct se_ua), __alignof__(struct se_ua),
			0, NULL);
84 85
	if (!se_ua_cache) {
		pr_err("kmem_cache_create() for struct se_ua failed\n");
86
		goto out_free_sess_cache;
87 88 89 90
	}
	t10_pr_reg_cache = kmem_cache_create("t10_pr_reg_cache",
			sizeof(struct t10_pr_registration),
			__alignof__(struct t10_pr_registration), 0, NULL);
91 92
	if (!t10_pr_reg_cache) {
		pr_err("kmem_cache_create() for struct t10_pr_registration"
93
				" failed\n");
94
		goto out_free_ua_cache;
95 96 97 98
	}
	t10_alua_lu_gp_cache = kmem_cache_create("t10_alua_lu_gp_cache",
			sizeof(struct t10_alua_lu_gp), __alignof__(struct t10_alua_lu_gp),
			0, NULL);
99 100
	if (!t10_alua_lu_gp_cache) {
		pr_err("kmem_cache_create() for t10_alua_lu_gp_cache"
101
				" failed\n");
102
		goto out_free_pr_reg_cache;
103 104 105 106
	}
	t10_alua_lu_gp_mem_cache = kmem_cache_create("t10_alua_lu_gp_mem_cache",
			sizeof(struct t10_alua_lu_gp_member),
			__alignof__(struct t10_alua_lu_gp_member), 0, NULL);
107 108
	if (!t10_alua_lu_gp_mem_cache) {
		pr_err("kmem_cache_create() for t10_alua_lu_gp_mem_"
109
				"cache failed\n");
110
		goto out_free_lu_gp_cache;
111 112 113 114
	}
	t10_alua_tg_pt_gp_cache = kmem_cache_create("t10_alua_tg_pt_gp_cache",
			sizeof(struct t10_alua_tg_pt_gp),
			__alignof__(struct t10_alua_tg_pt_gp), 0, NULL);
115 116
	if (!t10_alua_tg_pt_gp_cache) {
		pr_err("kmem_cache_create() for t10_alua_tg_pt_gp_"
117
				"cache failed\n");
118
		goto out_free_lu_gp_mem_cache;
119 120 121 122 123 124
	}
	t10_alua_tg_pt_gp_mem_cache = kmem_cache_create(
			"t10_alua_tg_pt_gp_mem_cache",
			sizeof(struct t10_alua_tg_pt_gp_member),
			__alignof__(struct t10_alua_tg_pt_gp_member),
			0, NULL);
125 126
	if (!t10_alua_tg_pt_gp_mem_cache) {
		pr_err("kmem_cache_create() for t10_alua_tg_pt_gp_"
127
				"mem_t failed\n");
128
		goto out_free_tg_pt_gp_cache;
129 130
	}

131 132 133 134 135
	target_completion_wq = alloc_workqueue("target_completion",
					       WQ_MEM_RECLAIM, 0);
	if (!target_completion_wq)
		goto out_free_tg_pt_gp_mem_cache;

136
	return 0;
137 138 139 140 141 142 143 144 145 146 147 148 149 150 151

out_free_tg_pt_gp_mem_cache:
	kmem_cache_destroy(t10_alua_tg_pt_gp_mem_cache);
out_free_tg_pt_gp_cache:
	kmem_cache_destroy(t10_alua_tg_pt_gp_cache);
out_free_lu_gp_mem_cache:
	kmem_cache_destroy(t10_alua_lu_gp_mem_cache);
out_free_lu_gp_cache:
	kmem_cache_destroy(t10_alua_lu_gp_cache);
out_free_pr_reg_cache:
	kmem_cache_destroy(t10_pr_reg_cache);
out_free_ua_cache:
	kmem_cache_destroy(se_ua_cache);
out_free_sess_cache:
	kmem_cache_destroy(se_sess_cache);
152
out:
153
	return -ENOMEM;
154 155
}

156
void release_se_kmem_caches(void)
157
{
158
	destroy_workqueue(target_completion_wq);
159 160 161 162 163 164 165 166 167
	kmem_cache_destroy(se_sess_cache);
	kmem_cache_destroy(se_ua_cache);
	kmem_cache_destroy(t10_pr_reg_cache);
	kmem_cache_destroy(t10_alua_lu_gp_cache);
	kmem_cache_destroy(t10_alua_lu_gp_mem_cache);
	kmem_cache_destroy(t10_alua_tg_pt_gp_cache);
	kmem_cache_destroy(t10_alua_tg_pt_gp_mem_cache);
}

168 169 170
/* This code ensures unique mib indexes are handed out. */
static DEFINE_SPINLOCK(scsi_mib_index_lock);
static u32 scsi_mib_index[SCSI_INDEX_TYPE_MAX];
171 172 173 174 175 176 177 178

/*
 * Allocate a new row index for the entry type specified
 */
u32 scsi_get_new_index(scsi_index_t type)
{
	u32 new_index;

179
	BUG_ON((type < 0) || (type >= SCSI_INDEX_TYPE_MAX));
180

181 182 183
	spin_lock(&scsi_mib_index_lock);
	new_index = ++scsi_mib_index[type];
	spin_unlock(&scsi_mib_index_lock);
184 185 186 187

	return new_index;
}

188
void transport_subsystem_check_init(void)
189 190
{
	int ret;
191
	static int sub_api_initialized;
192

193 194 195
	if (sub_api_initialized)
		return;

196 197
	ret = request_module("target_core_iblock");
	if (ret != 0)
198
		pr_err("Unable to load target_core_iblock\n");
199 200 201

	ret = request_module("target_core_file");
	if (ret != 0)
202
		pr_err("Unable to load target_core_file\n");
203 204 205

	ret = request_module("target_core_pscsi");
	if (ret != 0)
206
		pr_err("Unable to load target_core_pscsi\n");
207

208
	sub_api_initialized = 1;
209 210 211 212 213 214 215
}

struct se_session *transport_init_session(void)
{
	struct se_session *se_sess;

	se_sess = kmem_cache_zalloc(se_sess_cache, GFP_KERNEL);
216 217
	if (!se_sess) {
		pr_err("Unable to allocate struct se_session from"
218 219 220 221 222
				" se_sess_cache\n");
		return ERR_PTR(-ENOMEM);
	}
	INIT_LIST_HEAD(&se_sess->sess_list);
	INIT_LIST_HEAD(&se_sess->sess_acl_list);
223 224
	INIT_LIST_HEAD(&se_sess->sess_cmd_list);
	spin_lock_init(&se_sess->sess_cmd_lock);
225
	kref_init(&se_sess->sess_kref);
226 227 228 229 230 231

	return se_sess;
}
EXPORT_SYMBOL(transport_init_session);

/*
232
 * Called with spin_lock_irqsave(&struct se_portal_group->session_lock called.
233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254
 */
void __transport_register_session(
	struct se_portal_group *se_tpg,
	struct se_node_acl *se_nacl,
	struct se_session *se_sess,
	void *fabric_sess_ptr)
{
	unsigned char buf[PR_REG_ISID_LEN];

	se_sess->se_tpg = se_tpg;
	se_sess->fabric_sess_ptr = fabric_sess_ptr;
	/*
	 * Used by struct se_node_acl's under ConfigFS to locate active se_session-t
	 *
	 * Only set for struct se_session's that will actually be moving I/O.
	 * eg: *NOT* discovery sessions.
	 */
	if (se_nacl) {
		/*
		 * If the fabric module supports an ISID based TransportID,
		 * save this value in binary from the fabric I_T Nexus now.
		 */
255
		if (se_tpg->se_tpg_tfo->sess_get_initiator_sid != NULL) {
256
			memset(&buf[0], 0, PR_REG_ISID_LEN);
257
			se_tpg->se_tpg_tfo->sess_get_initiator_sid(se_sess,
258 259 260
					&buf[0], PR_REG_ISID_LEN);
			se_sess->sess_bin_isid = get_unaligned_be64(&buf[0]);
		}
261 262
		kref_get(&se_nacl->acl_kref);

263 264 265 266 267 268 269 270 271 272 273 274 275
		spin_lock_irq(&se_nacl->nacl_sess_lock);
		/*
		 * The se_nacl->nacl_sess pointer will be set to the
		 * last active I_T Nexus for each struct se_node_acl.
		 */
		se_nacl->nacl_sess = se_sess;

		list_add_tail(&se_sess->sess_acl_list,
			      &se_nacl->acl_sess_list);
		spin_unlock_irq(&se_nacl->nacl_sess_lock);
	}
	list_add_tail(&se_sess->sess_list, &se_tpg->tpg_sess_list);

276
	pr_debug("TARGET_CORE[%s]: Registered fabric_sess_ptr: %p\n",
277
		se_tpg->se_tpg_tfo->get_fabric_name(), se_sess->fabric_sess_ptr);
278 279 280 281 282 283 284 285 286
}
EXPORT_SYMBOL(__transport_register_session);

void transport_register_session(
	struct se_portal_group *se_tpg,
	struct se_node_acl *se_nacl,
	struct se_session *se_sess,
	void *fabric_sess_ptr)
{
287 288 289
	unsigned long flags;

	spin_lock_irqsave(&se_tpg->session_lock, flags);
290
	__transport_register_session(se_tpg, se_nacl, se_sess, fabric_sess_ptr);
291
	spin_unlock_irqrestore(&se_tpg->session_lock, flags);
292 293 294
}
EXPORT_SYMBOL(transport_register_session);

295
static void target_release_session(struct kref *kref)
296 297 298 299 300 301 302 303 304 305 306 307 308 309
{
	struct se_session *se_sess = container_of(kref,
			struct se_session, sess_kref);
	struct se_portal_group *se_tpg = se_sess->se_tpg;

	se_tpg->se_tpg_tfo->close_session(se_sess);
}

void target_get_session(struct se_session *se_sess)
{
	kref_get(&se_sess->sess_kref);
}
EXPORT_SYMBOL(target_get_session);

310
void target_put_session(struct se_session *se_sess)
311
{
312 313 314 315 316 317
	struct se_portal_group *tpg = se_sess->se_tpg;

	if (tpg->se_tpg_tfo->put_session != NULL) {
		tpg->se_tpg_tfo->put_session(se_sess);
		return;
	}
318
	kref_put(&se_sess->sess_kref, target_release_session);
319 320 321
}
EXPORT_SYMBOL(target_put_session);

322 323 324 325 326 327 328 329 330 331 332 333 334
static void target_complete_nacl(struct kref *kref)
{
	struct se_node_acl *nacl = container_of(kref,
				struct se_node_acl, acl_kref);

	complete(&nacl->acl_free_comp);
}

void target_put_nacl(struct se_node_acl *nacl)
{
	kref_put(&nacl->acl_kref, target_complete_nacl);
}

335 336 337
void transport_deregister_session_configfs(struct se_session *se_sess)
{
	struct se_node_acl *se_nacl;
338
	unsigned long flags;
339 340 341 342
	/*
	 * Used by struct se_node_acl's under ConfigFS to locate active struct se_session
	 */
	se_nacl = se_sess->se_node_acl;
343
	if (se_nacl) {
344
		spin_lock_irqsave(&se_nacl->nacl_sess_lock, flags);
345 346
		if (se_nacl->acl_stop == 0)
			list_del(&se_sess->sess_acl_list);
347 348 349 350 351 352 353 354 355 356 357 358
		/*
		 * If the session list is empty, then clear the pointer.
		 * Otherwise, set the struct se_session pointer from the tail
		 * element of the per struct se_node_acl active session list.
		 */
		if (list_empty(&se_nacl->acl_sess_list))
			se_nacl->nacl_sess = NULL;
		else {
			se_nacl->nacl_sess = container_of(
					se_nacl->acl_sess_list.prev,
					struct se_session, sess_acl_list);
		}
359
		spin_unlock_irqrestore(&se_nacl->nacl_sess_lock, flags);
360 361 362 363 364 365 366 367 368 369 370 371 372
	}
}
EXPORT_SYMBOL(transport_deregister_session_configfs);

void transport_free_session(struct se_session *se_sess)
{
	kmem_cache_free(se_sess_cache, se_sess);
}
EXPORT_SYMBOL(transport_free_session);

void transport_deregister_session(struct se_session *se_sess)
{
	struct se_portal_group *se_tpg = se_sess->se_tpg;
373
	struct target_core_fabric_ops *se_tfo;
374
	struct se_node_acl *se_nacl;
375
	unsigned long flags;
376
	bool comp_nacl = true;
377

378
	if (!se_tpg) {
379 380 381
		transport_free_session(se_sess);
		return;
	}
382
	se_tfo = se_tpg->se_tpg_tfo;
383

384
	spin_lock_irqsave(&se_tpg->session_lock, flags);
385 386 387
	list_del(&se_sess->sess_list);
	se_sess->se_tpg = NULL;
	se_sess->fabric_sess_ptr = NULL;
388
	spin_unlock_irqrestore(&se_tpg->session_lock, flags);
389 390 391 392 393 394

	/*
	 * Determine if we need to do extra work for this initiator node's
	 * struct se_node_acl if it had been previously dynamically generated.
	 */
	se_nacl = se_sess->se_node_acl;
395 396 397 398 399 400 401 402 403 404 405 406 407

	spin_lock_irqsave(&se_tpg->acl_node_lock, flags);
	if (se_nacl && se_nacl->dynamic_node_acl) {
		if (!se_tfo->tpg_check_demo_mode_cache(se_tpg)) {
			list_del(&se_nacl->acl_list);
			se_tpg->num_node_acls--;
			spin_unlock_irqrestore(&se_tpg->acl_node_lock, flags);
			core_tpg_wait_for_nacl_pr_ref(se_nacl);
			core_free_device_list_for_node(se_nacl, se_tpg);
			se_tfo->tpg_release_fabric_acl(se_tpg, se_nacl);

			comp_nacl = false;
			spin_lock_irqsave(&se_tpg->acl_node_lock, flags);
408 409
		}
	}
410
	spin_unlock_irqrestore(&se_tpg->acl_node_lock, flags);
411

412
	pr_debug("TARGET_CORE[%s]: Deregistered fabric_sess\n",
413
		se_tpg->se_tpg_tfo->get_fabric_name());
414
	/*
415 416 417
	 * If last kref is dropping now for an explict NodeACL, awake sleeping
	 * ->acl_free_comp caller to wakeup configfs se_node_acl->acl_group
	 * removal context.
418 419
	 */
	if (se_nacl && comp_nacl == true)
420
		target_put_nacl(se_nacl);
421

422
	transport_free_session(se_sess);
423 424 425 426
}
EXPORT_SYMBOL(transport_deregister_session);

/*
427
 * Called with cmd->t_state_lock held.
428
 */
429
static void target_remove_from_state_list(struct se_cmd *cmd)
430
{
431
	struct se_device *dev = cmd->se_dev;
432 433
	unsigned long flags;

434 435
	if (!dev)
		return;
436

437 438
	if (cmd->transport_state & CMD_T_BUSY)
		return;
439

440 441 442 443
	spin_lock_irqsave(&dev->execute_task_lock, flags);
	if (cmd->state_active) {
		list_del(&cmd->state_list);
		cmd->state_active = false;
444
	}
445
	spin_unlock_irqrestore(&dev->execute_task_lock, flags);
446 447
}

448
static int transport_cmd_check_stop(struct se_cmd *cmd, bool remove_from_lists)
449 450 451
{
	unsigned long flags;

452
	spin_lock_irqsave(&cmd->t_state_lock, flags);
453 454 455 456
	/*
	 * Determine if IOCTL context caller in requesting the stopping of this
	 * command for LUN shutdown purposes.
	 */
457 458 459
	if (cmd->transport_state & CMD_T_LUN_STOP) {
		pr_debug("%s:%d CMD_T_LUN_STOP for ITT: 0x%08x\n",
			__func__, __LINE__, cmd->se_tfo->get_task_tag(cmd));
460

461
		cmd->transport_state &= ~CMD_T_ACTIVE;
462
		if (remove_from_lists)
463
			target_remove_from_state_list(cmd);
464
		spin_unlock_irqrestore(&cmd->t_state_lock, flags);
465

466
		complete(&cmd->transport_lun_stop_comp);
467 468
		return 1;
	}
469 470 471 472 473 474 475 476 477 478

	if (remove_from_lists) {
		target_remove_from_state_list(cmd);

		/*
		 * Clear struct se_cmd->se_lun before the handoff to FE.
		 */
		cmd->se_lun = NULL;
	}

479 480
	/*
	 * Determine if frontend context caller is requesting the stopping of
481
	 * this command for frontend exceptions.
482
	 */
483 484 485
	if (cmd->transport_state & CMD_T_STOP) {
		pr_debug("%s:%d CMD_T_STOP for ITT: 0x%08x\n",
			__func__, __LINE__,
486
			cmd->se_tfo->get_task_tag(cmd));
487

488
		spin_unlock_irqrestore(&cmd->t_state_lock, flags);
489

490
		complete(&cmd->t_transport_stop_comp);
491 492
		return 1;
	}
493 494 495 496 497 498 499 500 501 502 503 504 505 506 507

	cmd->transport_state &= ~CMD_T_ACTIVE;
	if (remove_from_lists) {
		/*
		 * Some fabric modules like tcm_loop can release
		 * their internally allocated I/O reference now and
		 * struct se_cmd now.
		 *
		 * Fabric modules are expected to return '1' here if the
		 * se_cmd being passed is released at this point,
		 * or zero if not being released.
		 */
		if (cmd->se_tfo->check_stop_free != NULL) {
			spin_unlock_irqrestore(&cmd->t_state_lock, flags);
			return cmd->se_tfo->check_stop_free(cmd);
508
		}
509
	}
510

511
	spin_unlock_irqrestore(&cmd->t_state_lock, flags);
512 513 514 515 516
	return 0;
}

static int transport_cmd_check_stop_to_fabric(struct se_cmd *cmd)
{
517
	return transport_cmd_check_stop(cmd, true);
518 519 520 521
}

static void transport_lun_remove_cmd(struct se_cmd *cmd)
{
522
	struct se_lun *lun = cmd->se_lun;
523 524 525 526 527
	unsigned long flags;

	if (!lun)
		return;

528
	spin_lock_irqsave(&cmd->t_state_lock, flags);
529 530
	if (cmd->transport_state & CMD_T_DEV_ACTIVE) {
		cmd->transport_state &= ~CMD_T_DEV_ACTIVE;
531
		target_remove_from_state_list(cmd);
532
	}
533
	spin_unlock_irqrestore(&cmd->t_state_lock, flags);
534 535

	spin_lock_irqsave(&lun->lun_cmd_lock, flags);
536 537
	if (!list_empty(&cmd->se_lun_node))
		list_del_init(&cmd->se_lun_node);
538 539 540 541 542 543 544
	spin_unlock_irqrestore(&lun->lun_cmd_lock, flags);
}

void transport_cmd_finish_abort(struct se_cmd *cmd, int remove)
{
	if (transport_cmd_check_stop_to_fabric(cmd))
		return;
545
	if (remove)
546
		transport_put_cmd(cmd);
547 548
}

549 550 551 552
static void target_complete_failure_work(struct work_struct *work)
{
	struct se_cmd *cmd = container_of(work, struct se_cmd, work);

553 554
	transport_generic_request_failure(cmd,
			TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE);
555 556
}

557
/*
558 559
 * Used when asking transport to copy Sense Data from the underlying
 * Linux/SCSI struct scsi_cmnd
560
 */
561
static unsigned char *transport_get_sense_buffer(struct se_cmd *cmd)
562 563 564 565 566 567
{
	struct se_device *dev = cmd->se_dev;

	WARN_ON(!cmd->se_lun);

	if (!dev)
568
		return NULL;
569

570 571
	if (cmd->se_cmd_flags & SCF_SENT_CHECK_CONDITION)
		return NULL;
572

573
	cmd->scsi_sense_length = TRANSPORT_SENSE_BUFFER;
574

575
	pr_debug("HBA_[%u]_PLUG[%s]: Requesting sense for SAM STATUS: 0x%02x\n",
576
		dev->se_hba->hba_id, dev->transport->name, cmd->scsi_status);
577
	return cmd->sense_buffer;
578 579
}

580
void target_complete_cmd(struct se_cmd *cmd, u8 scsi_status)
581
{
582
	struct se_device *dev = cmd->se_dev;
583
	int success = scsi_status == GOOD;
584 585
	unsigned long flags;

586 587 588
	cmd->scsi_status = scsi_status;


589
	spin_lock_irqsave(&cmd->t_state_lock, flags);
590
	cmd->transport_state &= ~CMD_T_BUSY;
591 592

	if (dev && dev->transport->transport_complete) {
593 594 595 596
		dev->transport->transport_complete(cmd,
				cmd->t_data_sg,
				transport_get_sense_buffer(cmd));
		if (cmd->se_cmd_flags & SCF_TRANSPORT_TASK_SENSE)
597 598 599 600
			success = 1;
	}

	/*
601
	 * See if we are waiting to complete for an exception condition.
602
	 */
603
	if (cmd->transport_state & CMD_T_REQUEST_STOP) {
604
		spin_unlock_irqrestore(&cmd->t_state_lock, flags);
605
		complete(&cmd->task_stop_comp);
606 607
		return;
	}
608 609

	if (!success)
610
		cmd->transport_state |= CMD_T_FAILED;
611

612 613 614 615 616 617 618 619 620 621
	/*
	 * Check for case where an explict ABORT_TASK has been received
	 * and transport_wait_for_tasks() will be waiting for completion..
	 */
	if (cmd->transport_state & CMD_T_ABORTED &&
	    cmd->transport_state & CMD_T_STOP) {
		spin_unlock_irqrestore(&cmd->t_state_lock, flags);
		complete(&cmd->t_transport_stop_comp);
		return;
	} else if (cmd->transport_state & CMD_T_FAILED) {
622
		INIT_WORK(&cmd->work, target_complete_failure_work);
623
	} else {
624
		INIT_WORK(&cmd->work, target_complete_ok_work);
625
	}
626 627

	cmd->t_state = TRANSPORT_COMPLETE;
628
	cmd->transport_state |= (CMD_T_COMPLETE | CMD_T_ACTIVE);
629
	spin_unlock_irqrestore(&cmd->t_state_lock, flags);
630

631
	queue_work(target_completion_wq, &cmd->work);
632
}
633 634
EXPORT_SYMBOL(target_complete_cmd);

635
static void target_add_to_state_list(struct se_cmd *cmd)
636
{
637 638
	struct se_device *dev = cmd->se_dev;
	unsigned long flags;
639

640 641 642 643
	spin_lock_irqsave(&dev->execute_task_lock, flags);
	if (!cmd->state_active) {
		list_add_tail(&cmd->state_list, &dev->state_list);
		cmd->state_active = true;
644
	}
645
	spin_unlock_irqrestore(&dev->execute_task_lock, flags);
646 647
}

648
/*
649
 * Handle QUEUE_FULL / -EAGAIN and -ENOMEM status
650
 */
651 652
static void transport_write_pending_qf(struct se_cmd *cmd);
static void transport_complete_qf(struct se_cmd *cmd);
653

654
void target_qf_do_work(struct work_struct *work)
655 656 657
{
	struct se_device *dev = container_of(work, struct se_device,
					qf_work_queue);
658
	LIST_HEAD(qf_cmd_list);
659 660 661
	struct se_cmd *cmd, *cmd_tmp;

	spin_lock_irq(&dev->qf_cmd_lock);
662 663
	list_splice_init(&dev->qf_cmd_list, &qf_cmd_list);
	spin_unlock_irq(&dev->qf_cmd_lock);
664

665
	list_for_each_entry_safe(cmd, cmd_tmp, &qf_cmd_list, se_qf_node) {
666 667 668 669
		list_del(&cmd->se_qf_node);
		atomic_dec(&dev->dev_qf_count);
		smp_mb__after_atomic_dec();

670
		pr_debug("Processing %s cmd: %p QUEUE_FULL in work queue"
671
			" context: %s\n", cmd->se_tfo->get_fabric_name(), cmd,
672
			(cmd->t_state == TRANSPORT_COMPLETE_QF_OK) ? "COMPLETE_OK" :
673 674
			(cmd->t_state == TRANSPORT_COMPLETE_QF_WP) ? "WRITE_PENDING"
			: "UNKNOWN");
675

676 677 678 679
		if (cmd->t_state == TRANSPORT_COMPLETE_QF_WP)
			transport_write_pending_qf(cmd);
		else if (cmd->t_state == TRANSPORT_COMPLETE_QF_OK)
			transport_complete_qf(cmd);
680 681 682
	}
}

683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706
unsigned char *transport_dump_cmd_direction(struct se_cmd *cmd)
{
	switch (cmd->data_direction) {
	case DMA_NONE:
		return "NONE";
	case DMA_FROM_DEVICE:
		return "READ";
	case DMA_TO_DEVICE:
		return "WRITE";
	case DMA_BIDIRECTIONAL:
		return "BIDI";
	default:
		break;
	}

	return "UNKNOWN";
}

void transport_dump_dev_state(
	struct se_device *dev,
	char *b,
	int *bl)
{
	*bl += sprintf(b + *bl, "Status: ");
707
	if (dev->export_count)
708
		*bl += sprintf(b + *bl, "ACTIVATED");
709
	else
710 711
		*bl += sprintf(b + *bl, "DEACTIVATED");

712
	*bl += sprintf(b + *bl, "  Max Queue Depth: %d", dev->queue_depth);
713
	*bl += sprintf(b + *bl, "  SectorSize: %u  HwMaxSectors: %u\n",
714 715
		dev->dev_attrib.block_size,
		dev->dev_attrib.hw_max_sectors);
716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768
	*bl += sprintf(b + *bl, "        ");
}

void transport_dump_vpd_proto_id(
	struct t10_vpd *vpd,
	unsigned char *p_buf,
	int p_buf_len)
{
	unsigned char buf[VPD_TMP_BUF_SIZE];
	int len;

	memset(buf, 0, VPD_TMP_BUF_SIZE);
	len = sprintf(buf, "T10 VPD Protocol Identifier: ");

	switch (vpd->protocol_identifier) {
	case 0x00:
		sprintf(buf+len, "Fibre Channel\n");
		break;
	case 0x10:
		sprintf(buf+len, "Parallel SCSI\n");
		break;
	case 0x20:
		sprintf(buf+len, "SSA\n");
		break;
	case 0x30:
		sprintf(buf+len, "IEEE 1394\n");
		break;
	case 0x40:
		sprintf(buf+len, "SCSI Remote Direct Memory Access"
				" Protocol\n");
		break;
	case 0x50:
		sprintf(buf+len, "Internet SCSI (iSCSI)\n");
		break;
	case 0x60:
		sprintf(buf+len, "SAS Serial SCSI Protocol\n");
		break;
	case 0x70:
		sprintf(buf+len, "Automation/Drive Interface Transport"
				" Protocol\n");
		break;
	case 0x80:
		sprintf(buf+len, "AT Attachment Interface ATA/ATAPI\n");
		break;
	default:
		sprintf(buf+len, "Unknown 0x%02x\n",
				vpd->protocol_identifier);
		break;
	}

	if (p_buf)
		strncpy(p_buf, buf, p_buf_len);
	else
769
		pr_debug("%s", buf);
770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793
}

void
transport_set_vpd_proto_id(struct t10_vpd *vpd, unsigned char *page_83)
{
	/*
	 * Check if the Protocol Identifier Valid (PIV) bit is set..
	 *
	 * from spc3r23.pdf section 7.5.1
	 */
	 if (page_83[1] & 0x80) {
		vpd->protocol_identifier = (page_83[0] & 0xf0);
		vpd->protocol_identifier_set = 1;
		transport_dump_vpd_proto_id(vpd, NULL, 0);
	}
}
EXPORT_SYMBOL(transport_set_vpd_proto_id);

int transport_dump_vpd_assoc(
	struct t10_vpd *vpd,
	unsigned char *p_buf,
	int p_buf_len)
{
	unsigned char buf[VPD_TMP_BUF_SIZE];
794 795
	int ret = 0;
	int len;
796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811

	memset(buf, 0, VPD_TMP_BUF_SIZE);
	len = sprintf(buf, "T10 VPD Identifier Association: ");

	switch (vpd->association) {
	case 0x00:
		sprintf(buf+len, "addressed logical unit\n");
		break;
	case 0x10:
		sprintf(buf+len, "target port\n");
		break;
	case 0x20:
		sprintf(buf+len, "SCSI target device\n");
		break;
	default:
		sprintf(buf+len, "Unknown 0x%02x\n", vpd->association);
812
		ret = -EINVAL;
813 814 815 816 817 818
		break;
	}

	if (p_buf)
		strncpy(p_buf, buf, p_buf_len);
	else
819
		pr_debug("%s", buf);
820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841

	return ret;
}

int transport_set_vpd_assoc(struct t10_vpd *vpd, unsigned char *page_83)
{
	/*
	 * The VPD identification association..
	 *
	 * from spc3r23.pdf Section 7.6.3.1 Table 297
	 */
	vpd->association = (page_83[1] & 0x30);
	return transport_dump_vpd_assoc(vpd, NULL, 0);
}
EXPORT_SYMBOL(transport_set_vpd_assoc);

int transport_dump_vpd_ident_type(
	struct t10_vpd *vpd,
	unsigned char *p_buf,
	int p_buf_len)
{
	unsigned char buf[VPD_TMP_BUF_SIZE];
842 843
	int ret = 0;
	int len;
844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869

	memset(buf, 0, VPD_TMP_BUF_SIZE);
	len = sprintf(buf, "T10 VPD Identifier Type: ");

	switch (vpd->device_identifier_type) {
	case 0x00:
		sprintf(buf+len, "Vendor specific\n");
		break;
	case 0x01:
		sprintf(buf+len, "T10 Vendor ID based\n");
		break;
	case 0x02:
		sprintf(buf+len, "EUI-64 based\n");
		break;
	case 0x03:
		sprintf(buf+len, "NAA\n");
		break;
	case 0x04:
		sprintf(buf+len, "Relative target port identifier\n");
		break;
	case 0x08:
		sprintf(buf+len, "SCSI name string\n");
		break;
	default:
		sprintf(buf+len, "Unsupported: 0x%02x\n",
				vpd->device_identifier_type);
870
		ret = -EINVAL;
871 872 873
		break;
	}

874 875 876
	if (p_buf) {
		if (p_buf_len < strlen(buf)+1)
			return -EINVAL;
877
		strncpy(p_buf, buf, p_buf_len);
878
	} else {
879
		pr_debug("%s", buf);
880
	}
881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908

	return ret;
}

int transport_set_vpd_ident_type(struct t10_vpd *vpd, unsigned char *page_83)
{
	/*
	 * The VPD identifier type..
	 *
	 * from spc3r23.pdf Section 7.6.3.1 Table 298
	 */
	vpd->device_identifier_type = (page_83[1] & 0x0f);
	return transport_dump_vpd_ident_type(vpd, NULL, 0);
}
EXPORT_SYMBOL(transport_set_vpd_ident_type);

int transport_dump_vpd_ident(
	struct t10_vpd *vpd,
	unsigned char *p_buf,
	int p_buf_len)
{
	unsigned char buf[VPD_TMP_BUF_SIZE];
	int ret = 0;

	memset(buf, 0, VPD_TMP_BUF_SIZE);

	switch (vpd->device_identifier_code_set) {
	case 0x01: /* Binary */
909 910
		snprintf(buf, sizeof(buf),
			"T10 VPD Binary Device Identifier: %s\n",
911 912 913
			&vpd->device_identifier[0]);
		break;
	case 0x02: /* ASCII */
914 915
		snprintf(buf, sizeof(buf),
			"T10 VPD ASCII Device Identifier: %s\n",
916 917 918
			&vpd->device_identifier[0]);
		break;
	case 0x03: /* UTF-8 */
919 920
		snprintf(buf, sizeof(buf),
			"T10 VPD UTF-8 Device Identifier: %s\n",
921 922 923 924 925
			&vpd->device_identifier[0]);
		break;
	default:
		sprintf(buf, "T10 VPD Device Identifier encoding unsupported:"
			" 0x%02x", vpd->device_identifier_code_set);
926
		ret = -EINVAL;
927 928 929 930 931 932
		break;
	}

	if (p_buf)
		strncpy(p_buf, buf, p_buf_len);
	else
933
		pr_debug("%s", buf);
934 935 936 937 938 939 940 941

	return ret;
}

int
transport_set_vpd_ident(struct t10_vpd *vpd, unsigned char *page_83)
{
	static const char hex_str[] = "0123456789abcdef";
942
	int j = 0, i = 4; /* offset to start of the identifier */
943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974

	/*
	 * The VPD Code Set (encoding)
	 *
	 * from spc3r23.pdf Section 7.6.3.1 Table 296
	 */
	vpd->device_identifier_code_set = (page_83[0] & 0x0f);
	switch (vpd->device_identifier_code_set) {
	case 0x01: /* Binary */
		vpd->device_identifier[j++] =
				hex_str[vpd->device_identifier_type];
		while (i < (4 + page_83[3])) {
			vpd->device_identifier[j++] =
				hex_str[(page_83[i] & 0xf0) >> 4];
			vpd->device_identifier[j++] =
				hex_str[page_83[i] & 0x0f];
			i++;
		}
		break;
	case 0x02: /* ASCII */
	case 0x03: /* UTF-8 */
		while (i < (4 + page_83[3]))
			vpd->device_identifier[j++] = page_83[i++];
		break;
	default:
		break;
	}

	return transport_dump_vpd_ident(vpd, NULL, 0);
}
EXPORT_SYMBOL(transport_set_vpd_ident);

975 976
sense_reason_t
target_cmd_size_check(struct se_cmd *cmd, unsigned int size)
977 978 979 980 981 982 983 984 985 986 987 988 989 990
{
	struct se_device *dev = cmd->se_dev;

	if (cmd->unknown_data_length) {
		cmd->data_length = size;
	} else if (size != cmd->data_length) {
		pr_warn("TARGET_CORE[%s]: Expected Transfer Length:"
			" %u does not match SCSI CDB Length: %u for SAM Opcode:"
			" 0x%02x\n", cmd->se_tfo->get_fabric_name(),
				cmd->data_length, size, cmd->t_task_cdb[0]);

		if (cmd->data_direction == DMA_TO_DEVICE) {
			pr_err("Rejecting underflow/overflow"
					" WRITE data\n");
991
			return TCM_INVALID_CDB_FIELD;
992 993 994 995 996
		}
		/*
		 * Reject READ_* or WRITE_* with overflow/underflow for
		 * type SCF_SCSI_DATA_CDB.
		 */
997
		if (dev->dev_attrib.block_size != 512)  {
998 999 1000 1001
			pr_err("Failing OVERFLOW/UNDERFLOW for LBA op"
				" CDB on non 512-byte sector setup subsystem"
				" plugin: %s\n", dev->transport->name);
			/* Returns CHECK_CONDITION + INVALID_CDB_FIELD */
1002
			return TCM_INVALID_CDB_FIELD;
1003
		}
1004 1005 1006 1007 1008 1009
		/*
		 * For the overflow case keep the existing fabric provided
		 * ->data_length.  Otherwise for the underflow case, reset
		 * ->data_length to the smaller SCSI expected data transfer
		 * length.
		 */
1010 1011 1012 1013 1014 1015
		if (size > cmd->data_length) {
			cmd->se_cmd_flags |= SCF_OVERFLOW_BIT;
			cmd->residual_count = (size - cmd->data_length);
		} else {
			cmd->se_cmd_flags |= SCF_UNDERFLOW_BIT;
			cmd->residual_count = (cmd->data_length - size);
1016
			cmd->data_length = size;
1017 1018 1019 1020 1021 1022 1023
		}
	}

	return 0;

}

1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036
/*
 * Used by fabric modules containing a local struct se_cmd within their
 * fabric dependent per I/O descriptor.
 */
void transport_init_se_cmd(
	struct se_cmd *cmd,
	struct target_core_fabric_ops *tfo,
	struct se_session *se_sess,
	u32 data_length,
	int data_direction,
	int task_attr,
	unsigned char *sense_buffer)
{
1037 1038
	INIT_LIST_HEAD(&cmd->se_lun_node);
	INIT_LIST_HEAD(&cmd->se_delayed_node);
1039
	INIT_LIST_HEAD(&cmd->se_qf_node);
1040
	INIT_LIST_HEAD(&cmd->se_cmd_list);
1041
	INIT_LIST_HEAD(&cmd->state_list);
1042 1043 1044
	init_completion(&cmd->transport_lun_fe_stop_comp);
	init_completion(&cmd->transport_lun_stop_comp);
	init_completion(&cmd->t_transport_stop_comp);
1045
	init_completion(&cmd->cmd_wait_comp);
1046
	init_completion(&cmd->task_stop_comp);
1047
	spin_lock_init(&cmd->t_state_lock);
1048
	cmd->transport_state = CMD_T_DEV_ACTIVE;
1049 1050 1051 1052 1053 1054 1055

	cmd->se_tfo = tfo;
	cmd->se_sess = se_sess;
	cmd->data_length = data_length;
	cmd->data_direction = data_direction;
	cmd->sam_task_attr = task_attr;
	cmd->sense_buffer = sense_buffer;
1056 1057

	cmd->state_active = false;
1058 1059 1060
}
EXPORT_SYMBOL(transport_init_se_cmd);

1061 1062
static sense_reason_t
transport_check_alloc_task_attr(struct se_cmd *cmd)
1063
{
1064 1065
	struct se_device *dev = cmd->se_dev;

1066 1067 1068 1069
	/*
	 * Check if SAM Task Attribute emulation is enabled for this
	 * struct se_device storage object
	 */
1070
	if (dev->transport->transport_type == TRANSPORT_PLUGIN_PHBA_PDEV)
1071 1072
		return 0;

1073
	if (cmd->sam_task_attr == MSG_ACA_TAG) {
1074
		pr_debug("SAM Task Attribute ACA"
1075
			" emulation is not supported\n");
1076
		return TCM_INVALID_CDB_FIELD;
1077 1078 1079 1080 1081
	}
	/*
	 * Used to determine when ORDERED commands should go from
	 * Dormant to Active status.
	 */
1082
	cmd->se_ordered_id = atomic_inc_return(&dev->dev_ordered_id);
1083
	smp_mb__after_atomic_inc();
1084
	pr_debug("Allocated se_ordered_id: %u for Task Attr: 0x%02x on %s\n",
1085
			cmd->se_ordered_id, cmd->sam_task_attr,
1086
			dev->transport->name);
1087 1088 1089
	return 0;
}

1090 1091
sense_reason_t
target_setup_cmd_from_cdb(struct se_cmd *cmd, unsigned char *cdb)
1092
{
1093
	struct se_device *dev = cmd->se_dev;
1094
	unsigned long flags;
1095
	sense_reason_t ret;
1096 1097 1098 1099 1100 1101

	/*
	 * Ensure that the received CDB is less than the max (252 + 8) bytes
	 * for VARIABLE_LENGTH_CMD
	 */
	if (scsi_command_size(cdb) > SCSI_MAX_VARLEN_CDB_SIZE) {
1102
		pr_err("Received SCSI CDB with command_size: %d that"
1103 1104
			" exceeds SCSI_MAX_VARLEN_CDB_SIZE: %d\n",
			scsi_command_size(cdb), SCSI_MAX_VARLEN_CDB_SIZE);
1105
		return TCM_INVALID_CDB_FIELD;
1106 1107 1108 1109 1110 1111
	}
	/*
	 * If the received CDB is larger than TCM_MAX_COMMAND_SIZE,
	 * allocate the additional extended CDB buffer now..  Otherwise
	 * setup the pointer from __t_task_cdb to t_task_cdb.
	 */
1112 1113
	if (scsi_command_size(cdb) > sizeof(cmd->__t_task_cdb)) {
		cmd->t_task_cdb = kzalloc(scsi_command_size(cdb),
1114
						GFP_KERNEL);
1115 1116
		if (!cmd->t_task_cdb) {
			pr_err("Unable to allocate cmd->t_task_cdb"
1117
				" %u > sizeof(cmd->__t_task_cdb): %lu ops\n",
1118
				scsi_command_size(cdb),
1119
				(unsigned long)sizeof(cmd->__t_task_cdb));
1120
			return TCM_OUT_OF_RESOURCES;
1121 1122
		}
	} else
1123
		cmd->t_task_cdb = &cmd->__t_task_cdb[0];
1124
	/*
1125
	 * Copy the original CDB into cmd->
1126
	 */
1127
	memcpy(cmd->t_task_cdb, cdb, scsi_command_size(cdb));
1128 1129 1130 1131

	/*
	 * Check for an existing UNIT ATTENTION condition
	 */
1132 1133 1134
	ret = target_scsi3_ua_check(cmd);
	if (ret)
		return ret;
1135

C
Christoph Hellwig 已提交
1136
	ret = target_alua_state_check(cmd);
1137 1138
	if (ret)
		return ret;
1139

1140
	ret = target_check_reservation(cmd);
1141 1142
	if (ret) {
		cmd->scsi_status = SAM_STAT_RESERVATION_CONFLICT;
1143
		return ret;
1144
	}
1145

1146
	ret = dev->transport->parse_cdb(cmd);
1147 1148 1149 1150 1151
	if (ret)
		return ret;

	ret = transport_check_alloc_task_attr(cmd);
	if (ret)
1152
		return ret;
1153 1154 1155 1156 1157

	spin_lock_irqsave(&cmd->t_state_lock, flags);
	cmd->se_cmd_flags |= SCF_SUPPORTED_SAM_OPCODE;
	spin_unlock_irqrestore(&cmd->t_state_lock, flags);

1158 1159 1160 1161 1162 1163
	spin_lock(&cmd->se_lun->lun_sep_lock);
	if (cmd->se_lun->lun_sep)
		cmd->se_lun->lun_sep->sep_stats.cmd_pdus++;
	spin_unlock(&cmd->se_lun->lun_sep_lock);
	return 0;
}
1164
EXPORT_SYMBOL(target_setup_cmd_from_cdb);
1165

1166 1167 1168 1169 1170 1171 1172
/*
 * Used by fabric module frontends to queue tasks directly.
 * Many only be used from process context only
 */
int transport_handle_cdb_direct(
	struct se_cmd *cmd)
{
1173
	sense_reason_t ret;
1174

1175 1176
	if (!cmd->se_lun) {
		dump_stack();
1177
		pr_err("cmd->se_lun is NULL\n");
1178 1179 1180 1181
		return -EINVAL;
	}
	if (in_interrupt()) {
		dump_stack();
1182
		pr_err("transport_generic_handle_cdb cannot be called"
1183 1184 1185
				" from interrupt context\n");
		return -EINVAL;
	}
1186
	/*
1187 1188 1189
	 * Set TRANSPORT_NEW_CMD state and CMD_T_ACTIVE to ensure that
	 * outstanding descriptors are handled correctly during shutdown via
	 * transport_wait_for_tasks()
1190 1191 1192 1193 1194
	 *
	 * Also, we don't take cmd->t_state_lock here as we only expect
	 * this to be called for initial descriptor submission.
	 */
	cmd->t_state = TRANSPORT_NEW_CMD;
1195 1196
	cmd->transport_state |= CMD_T_ACTIVE;

1197 1198 1199 1200 1201 1202
	/*
	 * transport_generic_new_cmd() is already handling QUEUE_FULL,
	 * so follow TRANSPORT_NEW_CMD processing thread context usage
	 * and call transport_generic_request_failure() if necessary..
	 */
	ret = transport_generic_new_cmd(cmd);
1203 1204
	if (ret)
		transport_generic_request_failure(cmd, ret);
1205
	return 0;
1206 1207 1208
}
EXPORT_SYMBOL(transport_handle_cdb_direct);

1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237
static sense_reason_t
transport_generic_map_mem_to_cmd(struct se_cmd *cmd, struct scatterlist *sgl,
		u32 sgl_count, struct scatterlist *sgl_bidi, u32 sgl_bidi_count)
{
	if (!sgl || !sgl_count)
		return 0;

	/*
	 * Reject SCSI data overflow with map_mem_to_cmd() as incoming
	 * scatterlists already have been set to follow what the fabric
	 * passes for the original expected data transfer length.
	 */
	if (cmd->se_cmd_flags & SCF_OVERFLOW_BIT) {
		pr_warn("Rejecting SCSI DATA overflow for fabric using"
			" SCF_PASSTHROUGH_SG_TO_MEM_NOALLOC\n");
		return TCM_INVALID_CDB_FIELD;
	}

	cmd->t_data_sg = sgl;
	cmd->t_data_nents = sgl_count;

	if (sgl_bidi && sgl_bidi_count) {
		cmd->t_bidi_data_sg = sgl_bidi;
		cmd->t_bidi_data_nents = sgl_bidi_count;
	}
	cmd->se_cmd_flags |= SCF_PASSTHROUGH_SG_TO_MEM_NOALLOC;
	return 0;
}

1238 1239 1240
/*
 * target_submit_cmd_map_sgls - lookup unpacked lun and submit uninitialized
 * 			 se_cmd + use pre-allocated SGL memory.
1241 1242 1243 1244 1245 1246 1247 1248 1249 1250
 *
 * @se_cmd: command descriptor to submit
 * @se_sess: associated se_sess for endpoint
 * @cdb: pointer to SCSI CDB
 * @sense: pointer to SCSI sense buffer
 * @unpacked_lun: unpacked LUN to reference for struct se_lun
 * @data_length: fabric expected data transfer length
 * @task_addr: SAM task attribute
 * @data_dir: DMA data direction
 * @flags: flags for command submission from target_sc_flags_tables
1251 1252 1253 1254
 * @sgl: struct scatterlist memory for unidirectional mapping
 * @sgl_count: scatterlist count for unidirectional mapping
 * @sgl_bidi: struct scatterlist memory for bidirectional READ mapping
 * @sgl_bidi_count: scatterlist count for bidirectional READ mapping
1255
 *
1256 1257 1258 1259
 * Returns non zero to signal active I/O shutdown failure.  All other
 * setup exceptions will be returned as a SCSI CHECK_CONDITION response,
 * but still return zero here.
 *
1260 1261
 * This may only be called from process context, and also currently
 * assumes internal allocation of fabric payload buffer by target-core.
1262 1263
 */
int target_submit_cmd_map_sgls(struct se_cmd *se_cmd, struct se_session *se_sess,
1264
		unsigned char *cdb, unsigned char *sense, u32 unpacked_lun,
1265 1266 1267
		u32 data_length, int task_attr, int data_dir, int flags,
		struct scatterlist *sgl, u32 sgl_count,
		struct scatterlist *sgl_bidi, u32 sgl_bidi_count)
1268 1269
{
	struct se_portal_group *se_tpg;
1270 1271
	sense_reason_t rc;
	int ret;
1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283

	se_tpg = se_sess->se_tpg;
	BUG_ON(!se_tpg);
	BUG_ON(se_cmd->se_tfo || se_cmd->se_sess);
	BUG_ON(in_interrupt());
	/*
	 * Initialize se_cmd for target operation.  From this point
	 * exceptions are handled by sending exception status via
	 * target_core_fabric_ops->queue_status() callback
	 */
	transport_init_se_cmd(se_cmd, se_tpg->se_tpg_tfo, se_sess,
				data_length, data_dir, task_attr, sense);
1284 1285
	if (flags & TARGET_SCF_UNKNOWN_SIZE)
		se_cmd->unknown_data_length = 1;
1286 1287 1288 1289 1290 1291
	/*
	 * Obtain struct se_cmd->cmd_kref reference and add new cmd to
	 * se_sess->sess_cmd_list.  A second kref_get here is necessary
	 * for fabrics using TARGET_SCF_ACK_KREF that expect a second
	 * kref_put() to happen during fabric packet acknowledgement.
	 */
1292 1293 1294
	ret = target_get_sess_cmd(se_sess, se_cmd, (flags & TARGET_SCF_ACK_KREF));
	if (ret)
		return ret;
1295 1296 1297 1298 1299 1300 1301 1302
	/*
	 * Signal bidirectional data payloads to target-core
	 */
	if (flags & TARGET_SCF_BIDI_OP)
		se_cmd->se_cmd_flags |= SCF_BIDI;
	/*
	 * Locate se_lun pointer and attach it to struct se_cmd
	 */
1303 1304 1305
	rc = transport_lookup_cmd_lun(se_cmd, unpacked_lun);
	if (rc) {
		transport_send_check_condition_and_sense(se_cmd, rc, 0);
1306
		target_put_sess_cmd(se_sess, se_cmd);
1307
		return 0;
1308
	}
1309

1310
	rc = target_setup_cmd_from_cdb(se_cmd, cdb);
1311
	if (rc != 0) {
1312
		transport_generic_request_failure(se_cmd, rc);
1313
		return 0;
1314
	}
1315 1316 1317 1318 1319 1320 1321 1322
	/*
	 * When a non zero sgl_count has been passed perform SGL passthrough
	 * mapping for pre-allocated fabric memory instead of having target
	 * core perform an internal SGL allocation..
	 */
	if (sgl_count != 0) {
		BUG_ON(!sgl);

1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343
		/*
		 * A work-around for tcm_loop as some userspace code via
		 * scsi-generic do not memset their associated read buffers,
		 * so go ahead and do that here for type non-data CDBs.  Also
		 * note that this is currently guaranteed to be a single SGL
		 * for this case by target core in target_setup_cmd_from_cdb()
		 * -> transport_generic_cmd_sequencer().
		 */
		if (!(se_cmd->se_cmd_flags & SCF_SCSI_DATA_CDB) &&
		     se_cmd->data_direction == DMA_FROM_DEVICE) {
			unsigned char *buf = NULL;

			if (sgl)
				buf = kmap(sg_page(sgl)) + sgl->offset;

			if (buf) {
				memset(buf, 0, sgl->length);
				kunmap(sg_page(sgl));
			}
		}

1344 1345 1346
		rc = transport_generic_map_mem_to_cmd(se_cmd, sgl, sgl_count,
				sgl_bidi, sgl_bidi_count);
		if (rc != 0) {
1347
			transport_generic_request_failure(se_cmd, rc);
1348 1349 1350
			return 0;
		}
	}
1351 1352 1353 1354 1355 1356
	/*
	 * Check if we need to delay processing because of ALUA
	 * Active/NonOptimized primary access state..
	 */
	core_alua_check_nonop_delay(se_cmd);

1357
	transport_handle_cdb_direct(se_cmd);
1358
	return 0;
1359
}
1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391
EXPORT_SYMBOL(target_submit_cmd_map_sgls);

/*
 * target_submit_cmd - lookup unpacked lun and submit uninitialized se_cmd
 *
 * @se_cmd: command descriptor to submit
 * @se_sess: associated se_sess for endpoint
 * @cdb: pointer to SCSI CDB
 * @sense: pointer to SCSI sense buffer
 * @unpacked_lun: unpacked LUN to reference for struct se_lun
 * @data_length: fabric expected data transfer length
 * @task_addr: SAM task attribute
 * @data_dir: DMA data direction
 * @flags: flags for command submission from target_sc_flags_tables
 *
 * Returns non zero to signal active I/O shutdown failure.  All other
 * setup exceptions will be returned as a SCSI CHECK_CONDITION response,
 * but still return zero here.
 *
 * This may only be called from process context, and also currently
 * assumes internal allocation of fabric payload buffer by target-core.
 *
 * It also assumes interal target core SGL memory allocation.
 */
int target_submit_cmd(struct se_cmd *se_cmd, struct se_session *se_sess,
		unsigned char *cdb, unsigned char *sense, u32 unpacked_lun,
		u32 data_length, int task_attr, int data_dir, int flags)
{
	return target_submit_cmd_map_sgls(se_cmd, se_sess, cdb, sense,
			unpacked_lun, data_length, task_attr, data_dir,
			flags, NULL, 0, NULL, 0);
}
1392 1393
EXPORT_SYMBOL(target_submit_cmd);

1394 1395 1396 1397 1398 1399
static void target_complete_tmr_failure(struct work_struct *work)
{
	struct se_cmd *se_cmd = container_of(work, struct se_cmd, work);

	se_cmd->se_tmr_req->response = TMR_LUN_DOES_NOT_EXIST;
	se_cmd->se_tfo->queue_tm_rsp(se_cmd);
1400 1401

	transport_cmd_check_stop_to_fabric(se_cmd);
1402 1403
}

1404 1405 1406 1407 1408 1409 1410 1411 1412 1413
/**
 * target_submit_tmr - lookup unpacked lun and submit uninitialized se_cmd
 *                     for TMR CDBs
 *
 * @se_cmd: command descriptor to submit
 * @se_sess: associated se_sess for endpoint
 * @sense: pointer to SCSI sense buffer
 * @unpacked_lun: unpacked LUN to reference for struct se_lun
 * @fabric_context: fabric context for TMR req
 * @tm_type: Type of TM request
1414 1415
 * @gfp: gfp type for caller
 * @tag: referenced task tag for TMR_ABORT_TASK
1416
 * @flags: submit cmd flags
1417 1418 1419 1420
 *
 * Callable from all contexts.
 **/

1421
int target_submit_tmr(struct se_cmd *se_cmd, struct se_session *se_sess,
1422
		unsigned char *sense, u32 unpacked_lun,
1423 1424
		void *fabric_tmr_ptr, unsigned char tm_type,
		gfp_t gfp, unsigned int tag, int flags)
1425 1426 1427 1428 1429 1430 1431 1432 1433
{
	struct se_portal_group *se_tpg;
	int ret;

	se_tpg = se_sess->se_tpg;
	BUG_ON(!se_tpg);

	transport_init_se_cmd(se_cmd, se_tpg->se_tpg_tfo, se_sess,
			      0, DMA_NONE, MSG_SIMPLE_TAG, sense);
1434 1435 1436 1437
	/*
	 * FIXME: Currently expect caller to handle se_cmd->se_tmr_req
	 * allocation failure.
	 */
1438
	ret = core_tmr_alloc_req(se_cmd, fabric_tmr_ptr, tm_type, gfp);
1439 1440
	if (ret < 0)
		return -ENOMEM;
1441

1442 1443 1444
	if (tm_type == TMR_ABORT_TASK)
		se_cmd->se_tmr_req->ref_task_tag = tag;

1445
	/* See target_submit_cmd for commentary */
1446 1447 1448 1449 1450
	ret = target_get_sess_cmd(se_sess, se_cmd, (flags & TARGET_SCF_ACK_KREF));
	if (ret) {
		core_tmr_release_req(se_cmd->se_tmr_req);
		return ret;
	}
1451 1452 1453

	ret = transport_lookup_tmr_lun(se_cmd, unpacked_lun);
	if (ret) {
1454 1455 1456 1457 1458 1459
		/*
		 * For callback during failure handling, push this work off
		 * to process context with TMR_LUN_DOES_NOT_EXIST status.
		 */
		INIT_WORK(&se_cmd->work, target_complete_tmr_failure);
		schedule_work(&se_cmd->work);
1460
		return 0;
1461 1462
	}
	transport_generic_handle_tmr(se_cmd);
1463
	return 0;
1464 1465 1466
}
EXPORT_SYMBOL(target_submit_tmr);

1467
/*
1468
 * If the cmd is active, request it to be stopped and sleep until it
1469 1470
 * has completed.
 */
1471
bool target_stop_cmd(struct se_cmd *cmd, unsigned long *flags)
1472 1473 1474
{
	bool was_active = false;

1475 1476
	if (cmd->transport_state & CMD_T_BUSY) {
		cmd->transport_state |= CMD_T_REQUEST_STOP;
1477 1478
		spin_unlock_irqrestore(&cmd->t_state_lock, *flags);

1479 1480 1481
		pr_debug("cmd %p waiting to complete\n", cmd);
		wait_for_completion(&cmd->task_stop_comp);
		pr_debug("cmd %p stopped successfully\n", cmd);
1482 1483

		spin_lock_irqsave(&cmd->t_state_lock, *flags);
1484 1485
		cmd->transport_state &= ~CMD_T_REQUEST_STOP;
		cmd->transport_state &= ~CMD_T_BUSY;
1486 1487 1488 1489 1490 1491
		was_active = true;
	}

	return was_active;
}

1492 1493 1494
/*
 * Handle SAM-esque emulation for generic transport request failures.
 */
1495 1496
void transport_generic_request_failure(struct se_cmd *cmd,
		sense_reason_t sense_reason)
1497
{
1498 1499
	int ret = 0;

1500
	pr_debug("-----[ Storage Engine Exception for cmd: %p ITT: 0x%08x"
1501
		" CDB: 0x%02x\n", cmd, cmd->se_tfo->get_task_tag(cmd),
1502
		cmd->t_task_cdb[0]);
1503
	pr_debug("-----[ i_state: %d t_state: %d sense_reason: %d\n",
1504
		cmd->se_tfo->get_cmd_state(cmd),
1505
		cmd->t_state, sense_reason);
1506
	pr_debug("-----[ CMD_T_ACTIVE: %d CMD_T_STOP: %d CMD_T_SENT: %d\n",
1507 1508 1509
		(cmd->transport_state & CMD_T_ACTIVE) != 0,
		(cmd->transport_state & CMD_T_STOP) != 0,
		(cmd->transport_state & CMD_T_SENT) != 0);
1510 1511 1512 1513

	/*
	 * For SAM Task Attribute emulation for failed struct se_cmd
	 */
1514
	transport_complete_task_attr(cmd);
1515

1516
	switch (sense_reason) {
1517 1518 1519 1520
	case TCM_NON_EXISTENT_LUN:
	case TCM_UNSUPPORTED_SCSI_OPCODE:
	case TCM_INVALID_CDB_FIELD:
	case TCM_INVALID_PARAMETER_LIST:
1521
	case TCM_PARAMETER_LIST_LENGTH_ERROR:
1522 1523 1524
	case TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE:
	case TCM_UNKNOWN_MODE_PAGE:
	case TCM_WRITE_PROTECTED:
1525
	case TCM_ADDRESS_OUT_OF_RANGE:
1526 1527 1528
	case TCM_CHECK_CONDITION_ABORT_CMD:
	case TCM_CHECK_CONDITION_UNIT_ATTENTION:
	case TCM_CHECK_CONDITION_NOT_READY:
1529
		break;
1530 1531 1532
	case TCM_OUT_OF_RESOURCES:
		sense_reason = TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
		break;
1533
	case TCM_RESERVATION_CONFLICT:
1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547
		/*
		 * No SENSE Data payload for this case, set SCSI Status
		 * and queue the response to $FABRIC_MOD.
		 *
		 * Uses linux/include/scsi/scsi.h SAM status codes defs
		 */
		cmd->scsi_status = SAM_STAT_RESERVATION_CONFLICT;
		/*
		 * For UA Interlock Code 11b, a RESERVATION CONFLICT will
		 * establish a UNIT ATTENTION with PREVIOUS RESERVATION
		 * CONFLICT STATUS.
		 *
		 * See spc4r17, section 7.4.6 Control Mode Page, Table 349
		 */
1548
		if (cmd->se_sess &&
1549
		    cmd->se_dev->dev_attrib.emulate_ua_intlck_ctrl == 2)
1550
			core_scsi3_ua_allocate(cmd->se_sess->se_node_acl,
1551 1552 1553
				cmd->orig_fe_lun, 0x2C,
				ASCQ_2CH_PREVIOUS_RESERVATION_CONFLICT_STATUS);

1554
		ret = cmd->se_tfo->queue_status(cmd);
1555
		if (ret == -EAGAIN || ret == -ENOMEM)
1556
			goto queue_full;
1557 1558
		goto check_stop;
	default:
1559
		pr_err("Unknown transport error for CDB 0x%02x: %d\n",
1560 1561
			cmd->t_task_cdb[0], sense_reason);
		sense_reason = TCM_UNSUPPORTED_SCSI_OPCODE;
1562 1563
		break;
	}
1564

1565
	ret = transport_send_check_condition_and_sense(cmd, sense_reason, 0);
1566 1567
	if (ret == -EAGAIN || ret == -ENOMEM)
		goto queue_full;
1568

1569 1570
check_stop:
	transport_lun_remove_cmd(cmd);
1571
	if (!transport_cmd_check_stop_to_fabric(cmd))
1572
		;
1573 1574 1575
	return;

queue_full:
1576 1577
	cmd->t_state = TRANSPORT_COMPLETE_QF_OK;
	transport_handle_queue_full(cmd, cmd->se_dev);
1578
}
1579
EXPORT_SYMBOL(transport_generic_request_failure);
1580

1581
static void __target_execute_cmd(struct se_cmd *cmd)
1582
{
1583
	sense_reason_t ret;
1584 1585 1586 1587 1588

	spin_lock_irq(&cmd->t_state_lock);
	cmd->transport_state |= (CMD_T_BUSY|CMD_T_SENT);
	spin_unlock_irq(&cmd->t_state_lock);

1589 1590 1591 1592 1593 1594
	if (cmd->execute_cmd) {
		ret = cmd->execute_cmd(cmd);
		if (ret) {
			spin_lock_irq(&cmd->t_state_lock);
			cmd->transport_state &= ~(CMD_T_BUSY|CMD_T_SENT);
			spin_unlock_irq(&cmd->t_state_lock);
1595

1596 1597
			transport_generic_request_failure(cmd, ret);
		}
1598 1599 1600
	}
}

1601
static bool target_handle_task_attr(struct se_cmd *cmd)
1602 1603 1604
{
	struct se_device *dev = cmd->se_dev;

1605 1606
	if (dev->transport->transport_type == TRANSPORT_PLUGIN_PHBA_PDEV)
		return false;
1607

1608
	/*
L
Lucas De Marchi 已提交
1609
	 * Check for the existence of HEAD_OF_QUEUE, and if true return 1
1610 1611
	 * to allow the passed struct se_cmd list of tasks to the front of the list.
	 */
1612 1613 1614 1615 1616
	switch (cmd->sam_task_attr) {
	case MSG_HEAD_TAG:
		pr_debug("Added HEAD_OF_QUEUE for CDB: 0x%02x, "
			 "se_ordered_id: %u\n",
			 cmd->t_task_cdb[0], cmd->se_ordered_id);
1617
		return false;
1618 1619
	case MSG_ORDERED_TAG:
		atomic_inc(&dev->dev_ordered_sync);
1620 1621
		smp_mb__after_atomic_inc();

1622 1623 1624 1625
		pr_debug("Added ORDERED for CDB: 0x%02x to ordered list, "
			 " se_ordered_id: %u\n",
			 cmd->t_task_cdb[0], cmd->se_ordered_id);

1626
		/*
1627 1628
		 * Execute an ORDERED command if no other older commands
		 * exist that need to be completed first.
1629
		 */
1630
		if (!atomic_read(&dev->simple_cmds))
1631
			return false;
1632 1633
		break;
	default:
1634 1635 1636
		/*
		 * For SIMPLE and UNTAGGED Task Attribute commands
		 */
1637
		atomic_inc(&dev->simple_cmds);
1638
		smp_mb__after_atomic_inc();
1639
		break;
1640
	}
1641

1642 1643
	if (atomic_read(&dev->dev_ordered_sync) == 0)
		return false;
1644

1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660
	spin_lock(&dev->delayed_cmd_lock);
	list_add_tail(&cmd->se_delayed_node, &dev->delayed_cmd_list);
	spin_unlock(&dev->delayed_cmd_lock);

	pr_debug("Added CDB: 0x%02x Task Attr: 0x%02x to"
		" delayed CMD list, se_ordered_id: %u\n",
		cmd->t_task_cdb[0], cmd->sam_task_attr,
		cmd->se_ordered_id);
	return true;
}

void target_execute_cmd(struct se_cmd *cmd)
{
	/*
	 * If the received CDB has aleady been aborted stop processing it here.
	 */
1661 1662
	if (transport_check_aborted_status(cmd, 1)) {
		complete(&cmd->transport_lun_stop_comp);
1663
		return;
1664 1665 1666
	}

	/*
1667 1668
	 * Determine if IOCTL context caller in requesting the stopping of this
	 * command for LUN shutdown purposes.
1669
	 */
1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694
	spin_lock_irq(&cmd->t_state_lock);
	if (cmd->transport_state & CMD_T_LUN_STOP) {
		pr_debug("%s:%d CMD_T_LUN_STOP for ITT: 0x%08x\n",
			__func__, __LINE__, cmd->se_tfo->get_task_tag(cmd));

		cmd->transport_state &= ~CMD_T_ACTIVE;
		spin_unlock_irq(&cmd->t_state_lock);
		complete(&cmd->transport_lun_stop_comp);
		return;
	}
	/*
	 * Determine if frontend context caller is requesting the stopping of
	 * this command for frontend exceptions.
	 */
	if (cmd->transport_state & CMD_T_STOP) {
		pr_debug("%s:%d CMD_T_STOP for ITT: 0x%08x\n",
			__func__, __LINE__,
			cmd->se_tfo->get_task_tag(cmd));

		spin_unlock_irq(&cmd->t_state_lock);
		complete(&cmd->t_transport_stop_comp);
		return;
	}

	cmd->t_state = TRANSPORT_PROCESSING;
1695
	cmd->transport_state |= CMD_T_ACTIVE;
1696 1697 1698 1699
	spin_unlock_irq(&cmd->t_state_lock);

	if (!target_handle_task_attr(cmd))
		__target_execute_cmd(cmd);
1700
}
1701
EXPORT_SYMBOL(target_execute_cmd);
1702

1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729
/*
 * Process all commands up to the last received ORDERED task attribute which
 * requires another blocking boundary
 */
static void target_restart_delayed_cmds(struct se_device *dev)
{
	for (;;) {
		struct se_cmd *cmd;

		spin_lock(&dev->delayed_cmd_lock);
		if (list_empty(&dev->delayed_cmd_list)) {
			spin_unlock(&dev->delayed_cmd_lock);
			break;
		}

		cmd = list_entry(dev->delayed_cmd_list.next,
				 struct se_cmd, se_delayed_node);
		list_del(&cmd->se_delayed_node);
		spin_unlock(&dev->delayed_cmd_lock);

		__target_execute_cmd(cmd);

		if (cmd->sam_task_attr == MSG_ORDERED_TAG)
			break;
	}
}

1730
/*
1731
 * Called from I/O completion to determine which dormant/delayed
1732 1733 1734 1735
 * and ordered cmds need to have their tasks added to the execution queue.
 */
static void transport_complete_task_attr(struct se_cmd *cmd)
{
1736
	struct se_device *dev = cmd->se_dev;
1737

1738 1739 1740
	if (dev->transport->transport_type == TRANSPORT_PLUGIN_PHBA_PDEV)
		return;

1741
	if (cmd->sam_task_attr == MSG_SIMPLE_TAG) {
1742 1743 1744
		atomic_dec(&dev->simple_cmds);
		smp_mb__after_atomic_dec();
		dev->dev_cur_ordered_id++;
1745
		pr_debug("Incremented dev->dev_cur_ordered_id: %u for"
1746 1747
			" SIMPLE: %u\n", dev->dev_cur_ordered_id,
			cmd->se_ordered_id);
1748
	} else if (cmd->sam_task_attr == MSG_HEAD_TAG) {
1749
		dev->dev_cur_ordered_id++;
1750
		pr_debug("Incremented dev_cur_ordered_id: %u for"
1751 1752
			" HEAD_OF_QUEUE: %u\n", dev->dev_cur_ordered_id,
			cmd->se_ordered_id);
1753
	} else if (cmd->sam_task_attr == MSG_ORDERED_TAG) {
1754 1755 1756 1757
		atomic_dec(&dev->dev_ordered_sync);
		smp_mb__after_atomic_dec();

		dev->dev_cur_ordered_id++;
1758
		pr_debug("Incremented dev_cur_ordered_id: %u for ORDERED:"
1759 1760 1761
			" %u\n", dev->dev_cur_ordered_id, cmd->se_ordered_id);
	}

1762
	target_restart_delayed_cmds(dev);
1763 1764
}

1765
static void transport_complete_qf(struct se_cmd *cmd)
1766 1767 1768
{
	int ret = 0;

1769
	transport_complete_task_attr(cmd);
1770 1771 1772 1773 1774 1775

	if (cmd->se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) {
		ret = cmd->se_tfo->queue_status(cmd);
		if (ret)
			goto out;
	}
1776 1777 1778 1779 1780 1781

	switch (cmd->data_direction) {
	case DMA_FROM_DEVICE:
		ret = cmd->se_tfo->queue_data_in(cmd);
		break;
	case DMA_TO_DEVICE:
1782
		if (cmd->t_bidi_data_sg) {
1783 1784
			ret = cmd->se_tfo->queue_data_in(cmd);
			if (ret < 0)
1785
				break;
1786 1787 1788 1789 1790 1791 1792 1793 1794
		}
		/* Fall through for DMA_TO_DEVICE */
	case DMA_NONE:
		ret = cmd->se_tfo->queue_status(cmd);
		break;
	default:
		break;
	}

1795 1796 1797 1798 1799 1800 1801
out:
	if (ret < 0) {
		transport_handle_queue_full(cmd, cmd->se_dev);
		return;
	}
	transport_lun_remove_cmd(cmd);
	transport_cmd_check_stop_to_fabric(cmd);
1802 1803 1804 1805
}

static void transport_handle_queue_full(
	struct se_cmd *cmd,
1806
	struct se_device *dev)
1807 1808 1809 1810 1811 1812 1813 1814 1815 1816
{
	spin_lock_irq(&dev->qf_cmd_lock);
	list_add_tail(&cmd->se_qf_node, &cmd->se_dev->qf_cmd_list);
	atomic_inc(&dev->dev_qf_count);
	smp_mb__after_atomic_inc();
	spin_unlock_irq(&cmd->se_dev->qf_cmd_lock);

	schedule_work(&cmd->se_dev->qf_work_queue);
}

1817
static void target_complete_ok_work(struct work_struct *work)
1818
{
1819
	struct se_cmd *cmd = container_of(work, struct se_cmd, work);
1820
	int ret;
1821

1822 1823 1824 1825 1826
	/*
	 * Check if we need to move delayed/dormant tasks from cmds on the
	 * delayed execution list after a HEAD_OF_QUEUE or ORDERED Task
	 * Attribute.
	 */
1827 1828
	transport_complete_task_attr(cmd);

1829 1830 1831 1832 1833 1834 1835
	/*
	 * Check to schedule QUEUE_FULL work, or execute an existing
	 * cmd->transport_qf_callback()
	 */
	if (atomic_read(&cmd->se_dev->dev_qf_count) != 0)
		schedule_work(&cmd->se_dev->qf_work_queue);

1836
	/*
1837
	 * Check if we need to send a sense buffer from
1838 1839 1840
	 * the struct se_cmd in question.
	 */
	if (cmd->se_cmd_flags & SCF_TRANSPORT_TASK_SENSE) {
1841 1842 1843 1844 1845 1846 1847 1848 1849
		WARN_ON(!cmd->scsi_status);
		ret = transport_send_check_condition_and_sense(
					cmd, 0, 1);
		if (ret == -EAGAIN || ret == -ENOMEM)
			goto queue_full;

		transport_lun_remove_cmd(cmd);
		transport_cmd_check_stop_to_fabric(cmd);
		return;
1850 1851
	}
	/*
L
Lucas De Marchi 已提交
1852
	 * Check for a callback, used by amongst other things
1853 1854 1855 1856 1857 1858 1859 1860
	 * XDWRITE_READ_10 emulation.
	 */
	if (cmd->transport_complete_callback)
		cmd->transport_complete_callback(cmd);

	switch (cmd->data_direction) {
	case DMA_FROM_DEVICE:
		spin_lock(&cmd->se_lun->lun_sep_lock);
1861 1862
		if (cmd->se_lun->lun_sep) {
			cmd->se_lun->lun_sep->sep_stats.tx_data_octets +=
1863 1864 1865 1866
					cmd->data_length;
		}
		spin_unlock(&cmd->se_lun->lun_sep_lock);

1867
		ret = cmd->se_tfo->queue_data_in(cmd);
1868
		if (ret == -EAGAIN || ret == -ENOMEM)
1869
			goto queue_full;
1870 1871 1872
		break;
	case DMA_TO_DEVICE:
		spin_lock(&cmd->se_lun->lun_sep_lock);
1873 1874
		if (cmd->se_lun->lun_sep) {
			cmd->se_lun->lun_sep->sep_stats.rx_data_octets +=
1875 1876 1877 1878 1879 1880
				cmd->data_length;
		}
		spin_unlock(&cmd->se_lun->lun_sep_lock);
		/*
		 * Check if we need to send READ payload for BIDI-COMMAND
		 */
1881
		if (cmd->t_bidi_data_sg) {
1882
			spin_lock(&cmd->se_lun->lun_sep_lock);
1883 1884
			if (cmd->se_lun->lun_sep) {
				cmd->se_lun->lun_sep->sep_stats.tx_data_octets +=
1885 1886 1887
					cmd->data_length;
			}
			spin_unlock(&cmd->se_lun->lun_sep_lock);
1888
			ret = cmd->se_tfo->queue_data_in(cmd);
1889
			if (ret == -EAGAIN || ret == -ENOMEM)
1890
				goto queue_full;
1891 1892 1893 1894
			break;
		}
		/* Fall through for DMA_TO_DEVICE */
	case DMA_NONE:
1895
		ret = cmd->se_tfo->queue_status(cmd);
1896
		if (ret == -EAGAIN || ret == -ENOMEM)
1897
			goto queue_full;
1898 1899 1900 1901 1902 1903 1904
		break;
	default:
		break;
	}

	transport_lun_remove_cmd(cmd);
	transport_cmd_check_stop_to_fabric(cmd);
1905 1906 1907
	return;

queue_full:
1908
	pr_debug("Handling complete_ok QUEUE_FULL: se_cmd: %p,"
1909
		" data_direction: %d\n", cmd, cmd->data_direction);
1910 1911
	cmd->t_state = TRANSPORT_COMPLETE_QF_OK;
	transport_handle_queue_full(cmd, cmd->se_dev);
1912 1913
}

1914
static inline void transport_free_sgl(struct scatterlist *sgl, int nents)
1915
{
1916 1917
	struct scatterlist *sg;
	int count;
1918

1919 1920
	for_each_sg(sgl, sg, nents, count)
		__free_page(sg_page(sg));
1921

1922 1923
	kfree(sgl);
}
1924

1925 1926 1927 1928 1929 1930
static inline void transport_free_pages(struct se_cmd *cmd)
{
	if (cmd->se_cmd_flags & SCF_PASSTHROUGH_SG_TO_MEM_NOALLOC)
		return;

	transport_free_sgl(cmd->t_data_sg, cmd->t_data_nents);
1931 1932
	cmd->t_data_sg = NULL;
	cmd->t_data_nents = 0;
1933

1934
	transport_free_sgl(cmd->t_bidi_data_sg, cmd->t_bidi_data_nents);
1935 1936
	cmd->t_bidi_data_sg = NULL;
	cmd->t_bidi_data_nents = 0;
1937 1938
}

C
Christoph Hellwig 已提交
1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949
/**
 * transport_release_cmd - free a command
 * @cmd:       command to free
 *
 * This routine unconditionally frees a command, and reference counting
 * or list removal must be done in the caller.
 */
static void transport_release_cmd(struct se_cmd *cmd)
{
	BUG_ON(!cmd->se_tfo);

1950
	if (cmd->se_cmd_flags & SCF_SCSI_TMR_CDB)
C
Christoph Hellwig 已提交
1951 1952 1953 1954
		core_tmr_release_req(cmd->se_tmr_req);
	if (cmd->t_task_cdb != cmd->__t_task_cdb)
		kfree(cmd->t_task_cdb);
	/*
1955 1956
	 * If this cmd has been setup with target_get_sess_cmd(), drop
	 * the kref and call ->release_cmd() in kref callback.
C
Christoph Hellwig 已提交
1957
	 */
1958 1959 1960 1961
	 if (cmd->check_release != 0) {
		target_put_sess_cmd(cmd->se_sess, cmd);
		return;
	}
C
Christoph Hellwig 已提交
1962 1963 1964
	cmd->se_tfo->release_cmd(cmd);
}

1965 1966 1967 1968 1969 1970
/**
 * transport_put_cmd - release a reference to a command
 * @cmd:       command to release
 *
 * This routine releases our reference to the command and frees it if possible.
 */
1971
static void transport_put_cmd(struct se_cmd *cmd)
1972 1973 1974
{
	unsigned long flags;

1975
	spin_lock_irqsave(&cmd->t_state_lock, flags);
1976 1977 1978 1979
	if (atomic_read(&cmd->t_fe_count) &&
	    !atomic_dec_and_test(&cmd->t_fe_count)) {
		spin_unlock_irqrestore(&cmd->t_state_lock, flags);
		return;
1980 1981
	}

1982 1983
	if (cmd->transport_state & CMD_T_DEV_ACTIVE) {
		cmd->transport_state &= ~CMD_T_DEV_ACTIVE;
1984
		target_remove_from_state_list(cmd);
1985
	}
1986
	spin_unlock_irqrestore(&cmd->t_state_lock, flags);
1987 1988

	transport_free_pages(cmd);
1989
	transport_release_cmd(cmd);
1990
	return;
1991 1992
}

1993
void *transport_kmap_data_sg(struct se_cmd *cmd)
1994
{
1995
	struct scatterlist *sg = cmd->t_data_sg;
1996 1997
	struct page **pages;
	int i;
1998 1999

	/*
2000 2001 2002
	 * We need to take into account a possible offset here for fabrics like
	 * tcm_loop who may be using a contig buffer from the SCSI midlayer for
	 * control CDBs passed as SGLs via transport_generic_map_mem_to_cmd()
2003
	 */
2004 2005
	if (!cmd->t_data_nents)
		return NULL;
2006 2007 2008

	BUG_ON(!sg);
	if (cmd->t_data_nents == 1)
2009 2010 2011 2012
		return kmap(sg_page(sg)) + sg->offset;

	/* >1 page. use vmap */
	pages = kmalloc(sizeof(*pages) * cmd->t_data_nents, GFP_KERNEL);
2013
	if (!pages)
2014 2015 2016 2017 2018 2019 2020 2021 2022
		return NULL;

	/* convert sg[] to pages[] */
	for_each_sg(cmd->t_data_sg, sg, cmd->t_data_nents, i) {
		pages[i] = sg_page(sg);
	}

	cmd->t_data_vmap = vmap(pages, cmd->t_data_nents,  VM_MAP, PAGE_KERNEL);
	kfree(pages);
2023
	if (!cmd->t_data_vmap)
2024 2025 2026
		return NULL;

	return cmd->t_data_vmap + cmd->t_data_sg[0].offset;
2027
}
2028
EXPORT_SYMBOL(transport_kmap_data_sg);
2029

2030
void transport_kunmap_data_sg(struct se_cmd *cmd)
2031
{
2032
	if (!cmd->t_data_nents) {
2033
		return;
2034
	} else if (cmd->t_data_nents == 1) {
2035
		kunmap(sg_page(cmd->t_data_sg));
2036 2037
		return;
	}
2038 2039 2040

	vunmap(cmd->t_data_vmap);
	cmd->t_data_vmap = NULL;
2041
}
2042
EXPORT_SYMBOL(transport_kunmap_data_sg);
2043

2044
static int
2045
transport_generic_get_mem(struct se_cmd *cmd)
2046
{
2047 2048 2049
	u32 length = cmd->data_length;
	unsigned int nents;
	struct page *page;
2050
	gfp_t zero_flag;
2051
	int i = 0;
2052

2053 2054 2055 2056
	nents = DIV_ROUND_UP(length, PAGE_SIZE);
	cmd->t_data_sg = kmalloc(sizeof(struct scatterlist) * nents, GFP_KERNEL);
	if (!cmd->t_data_sg)
		return -ENOMEM;
2057

2058 2059
	cmd->t_data_nents = nents;
	sg_init_table(cmd->t_data_sg, nents);
2060

2061
	zero_flag = cmd->se_cmd_flags & SCF_SCSI_DATA_CDB ? 0 : __GFP_ZERO;
2062

2063 2064
	while (length) {
		u32 page_len = min_t(u32, length, PAGE_SIZE);
2065
		page = alloc_page(GFP_KERNEL | zero_flag);
2066 2067
		if (!page)
			goto out;
2068

2069 2070 2071
		sg_set_page(&cmd->t_data_sg[i], page, page_len, 0);
		length -= page_len;
		i++;
2072 2073 2074
	}
	return 0;

2075
out:
2076
	while (i > 0) {
2077
		i--;
2078
		__free_page(sg_page(&cmd->t_data_sg[i]));
2079
	}
2080 2081 2082
	kfree(cmd->t_data_sg);
	cmd->t_data_sg = NULL;
	return -ENOMEM;
2083 2084
}

2085
/*
2086 2087 2088
 * Allocate any required resources to execute the command.  For writes we
 * might not have the payload yet, so notify the fabric via a call to
 * ->write_pending instead. Otherwise place it on the execution queue.
2089
 */
2090 2091
sense_reason_t
transport_generic_new_cmd(struct se_cmd *cmd)
2092 2093 2094 2095 2096 2097
{
	int ret = 0;

	/*
	 * Determine is the TCM fabric module has already allocated physical
	 * memory, and is directly calling transport_generic_map_mem_to_cmd()
2098
	 * beforehand.
2099
	 */
2100 2101
	if (!(cmd->se_cmd_flags & SCF_PASSTHROUGH_SG_TO_MEM_NOALLOC) &&
	    cmd->data_length) {
2102
		ret = transport_generic_get_mem(cmd);
2103
		if (ret < 0)
2104
			return TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
2105
	}
2106

2107 2108
	atomic_inc(&cmd->t_fe_count);

2109
	/*
2110 2111 2112
	 * If this command is not a write we can execute it right here,
	 * for write buffers we need to notify the fabric driver first
	 * and let it call back once the write buffers are ready.
2113
	 */
2114
	target_add_to_state_list(cmd);
2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129
	if (cmd->data_direction != DMA_TO_DEVICE) {
		target_execute_cmd(cmd);
		return 0;
	}

	spin_lock_irq(&cmd->t_state_lock);
	cmd->t_state = TRANSPORT_WRITE_PENDING;
	spin_unlock_irq(&cmd->t_state_lock);

	transport_cmd_check_stop(cmd, false);

	ret = cmd->se_tfo->write_pending(cmd);
	if (ret == -EAGAIN || ret == -ENOMEM)
		goto queue_full;

2130 2131 2132
	/* fabric drivers should only return -EAGAIN or -ENOMEM as error */
	WARN_ON(ret);

2133
	return (!ret) ? 0 : TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE;
2134

2135 2136 2137 2138 2139
queue_full:
	pr_debug("Handling write_pending QUEUE__FULL: se_cmd: %p\n", cmd);
	cmd->t_state = TRANSPORT_COMPLETE_QF_WP;
	transport_handle_queue_full(cmd, cmd->se_dev);
	return 0;
2140
}
2141
EXPORT_SYMBOL(transport_generic_new_cmd);
2142

2143
static void transport_write_pending_qf(struct se_cmd *cmd)
2144
{
2145 2146 2147 2148
	int ret;

	ret = cmd->se_tfo->write_pending(cmd);
	if (ret == -EAGAIN || ret == -ENOMEM) {
2149 2150 2151 2152
		pr_debug("Handling write_pending QUEUE__FULL: se_cmd: %p\n",
			 cmd);
		transport_handle_queue_full(cmd, cmd->se_dev);
	}
2153 2154
}

2155
void transport_generic_free_cmd(struct se_cmd *cmd, int wait_for_tasks)
2156
{
2157
	if (!(cmd->se_cmd_flags & SCF_SE_LUN_CMD)) {
2158
		if (wait_for_tasks && (cmd->se_cmd_flags & SCF_SCSI_TMR_CDB))
2159 2160
			 transport_wait_for_tasks(cmd);

2161
		transport_release_cmd(cmd);
2162 2163 2164 2165
	} else {
		if (wait_for_tasks)
			transport_wait_for_tasks(cmd);

2166
		if (cmd->se_lun)
2167 2168
			transport_lun_remove_cmd(cmd);

2169
		transport_put_cmd(cmd);
2170 2171 2172 2173
	}
}
EXPORT_SYMBOL(transport_generic_free_cmd);

2174 2175 2176
/* target_get_sess_cmd - Add command to active ->sess_cmd_list
 * @se_sess:	session to reference
 * @se_cmd:	command descriptor to add
2177
 * @ack_kref:	Signal that fabric will perform an ack target_put_sess_cmd()
2178
 */
2179
int target_get_sess_cmd(struct se_session *se_sess, struct se_cmd *se_cmd,
2180
			       bool ack_kref)
2181 2182
{
	unsigned long flags;
2183
	int ret = 0;
2184

2185
	kref_init(&se_cmd->cmd_kref);
2186 2187 2188 2189 2190
	/*
	 * Add a second kref if the fabric caller is expecting to handle
	 * fabric acknowledgement that requires two target_put_sess_cmd()
	 * invocations before se_cmd descriptor release.
	 */
2191
	if (ack_kref == true) {
2192
		kref_get(&se_cmd->cmd_kref);
2193 2194
		se_cmd->se_cmd_flags |= SCF_ACK_KREF;
	}
2195

2196
	spin_lock_irqsave(&se_sess->sess_cmd_lock, flags);
2197 2198 2199 2200
	if (se_sess->sess_tearing_down) {
		ret = -ESHUTDOWN;
		goto out;
	}
2201 2202
	list_add_tail(&se_cmd->se_cmd_list, &se_sess->sess_cmd_list);
	se_cmd->check_release = 1;
2203 2204

out:
2205
	spin_unlock_irqrestore(&se_sess->sess_cmd_lock, flags);
2206
	return ret;
2207
}
2208
EXPORT_SYMBOL(target_get_sess_cmd);
2209

2210
static void target_release_cmd_kref(struct kref *kref)
2211
{
2212 2213
	struct se_cmd *se_cmd = container_of(kref, struct se_cmd, cmd_kref);
	struct se_session *se_sess = se_cmd->se_sess;
2214 2215

	if (list_empty(&se_cmd->se_cmd_list)) {
2216
		spin_unlock(&se_sess->sess_cmd_lock);
2217
		se_cmd->se_tfo->release_cmd(se_cmd);
2218
		return;
2219 2220
	}
	if (se_sess->sess_tearing_down && se_cmd->cmd_wait_set) {
2221
		spin_unlock(&se_sess->sess_cmd_lock);
2222
		complete(&se_cmd->cmd_wait_comp);
2223
		return;
2224 2225
	}
	list_del(&se_cmd->se_cmd_list);
2226
	spin_unlock(&se_sess->sess_cmd_lock);
2227

2228 2229 2230 2231 2232 2233 2234 2235 2236
	se_cmd->se_tfo->release_cmd(se_cmd);
}

/* target_put_sess_cmd - Check for active I/O shutdown via kref_put
 * @se_sess:	session to reference
 * @se_cmd:	command descriptor to drop
 */
int target_put_sess_cmd(struct se_session *se_sess, struct se_cmd *se_cmd)
{
2237 2238
	return kref_put_spinlock_irqsave(&se_cmd->cmd_kref, target_release_cmd_kref,
			&se_sess->sess_cmd_lock);
2239 2240 2241
}
EXPORT_SYMBOL(target_put_sess_cmd);

2242 2243 2244 2245
/* target_sess_cmd_list_set_waiting - Flag all commands in
 *         sess_cmd_list to complete cmd_wait_comp.  Set
 *         sess_tearing_down so no more commands are queued.
 * @se_sess:	session to flag
2246
 */
2247
void target_sess_cmd_list_set_waiting(struct se_session *se_sess)
2248 2249 2250 2251 2252 2253
{
	struct se_cmd *se_cmd;
	unsigned long flags;

	spin_lock_irqsave(&se_sess->sess_cmd_lock, flags);

2254 2255
	WARN_ON(se_sess->sess_tearing_down);
	se_sess->sess_tearing_down = 1;
2256

2257
	list_for_each_entry(se_cmd, &se_sess->sess_cmd_list, se_cmd_list)
2258 2259 2260 2261
		se_cmd->cmd_wait_set = 1;

	spin_unlock_irqrestore(&se_sess->sess_cmd_lock, flags);
}
2262
EXPORT_SYMBOL(target_sess_cmd_list_set_waiting);
2263 2264 2265 2266

/* target_wait_for_sess_cmds - Wait for outstanding descriptors
 * @se_sess:    session to wait for active I/O
 */
2267
void target_wait_for_sess_cmds(struct se_session *se_sess)
2268 2269 2270 2271
{
	struct se_cmd *se_cmd, *tmp_cmd;

	list_for_each_entry_safe(se_cmd, tmp_cmd,
2272
				&se_sess->sess_cmd_list, se_cmd_list) {
2273 2274 2275 2276 2277 2278
		list_del(&se_cmd->se_cmd_list);

		pr_debug("Waiting for se_cmd: %p t_state: %d, fabric state:"
			" %d\n", se_cmd, se_cmd->t_state,
			se_cmd->se_tfo->get_cmd_state(se_cmd));

2279 2280 2281 2282
		wait_for_completion(&se_cmd->cmd_wait_comp);
		pr_debug("After cmd_wait_comp: se_cmd: %p t_state: %d"
			" fabric state: %d\n", se_cmd, se_cmd->t_state,
			se_cmd->se_tfo->get_cmd_state(se_cmd));
2283 2284 2285 2286 2287 2288

		se_cmd->se_tfo->release_cmd(se_cmd);
	}
}
EXPORT_SYMBOL(target_wait_for_sess_cmds);

2289 2290 2291 2292 2293 2294 2295 2296
/*	transport_lun_wait_for_tasks():
 *
 *	Called from ConfigFS context to stop the passed struct se_cmd to allow
 *	an struct se_lun to be successfully shutdown.
 */
static int transport_lun_wait_for_tasks(struct se_cmd *cmd, struct se_lun *lun)
{
	unsigned long flags;
2297 2298
	int ret = 0;

2299 2300 2301 2302
	/*
	 * If the frontend has already requested this struct se_cmd to
	 * be stopped, we can safely ignore this struct se_cmd.
	 */
2303
	spin_lock_irqsave(&cmd->t_state_lock, flags);
2304 2305 2306 2307 2308
	if (cmd->transport_state & CMD_T_STOP) {
		cmd->transport_state &= ~CMD_T_LUN_STOP;

		pr_debug("ConfigFS ITT[0x%08x] - CMD_T_STOP, skipping\n",
			 cmd->se_tfo->get_task_tag(cmd));
2309
		spin_unlock_irqrestore(&cmd->t_state_lock, flags);
2310
		transport_cmd_check_stop(cmd, false);
2311
		return -EPERM;
2312
	}
2313
	cmd->transport_state |= CMD_T_LUN_FE_STOP;
2314
	spin_unlock_irqrestore(&cmd->t_state_lock, flags);
2315

2316 2317 2318 2319 2320 2321 2322
	// XXX: audit task_flags checks.
	spin_lock_irqsave(&cmd->t_state_lock, flags);
	if ((cmd->transport_state & CMD_T_BUSY) &&
	    (cmd->transport_state & CMD_T_SENT)) {
		if (!target_stop_cmd(cmd, &flags))
			ret++;
	}
2323
	spin_unlock_irqrestore(&cmd->t_state_lock, flags);
2324

2325 2326
	pr_debug("ConfigFS: cmd: %p stop tasks ret:"
			" %d\n", cmd, ret);
2327
	if (!ret) {
2328
		pr_debug("ConfigFS: ITT[0x%08x] - stopping cmd....\n",
2329
				cmd->se_tfo->get_task_tag(cmd));
2330
		wait_for_completion(&cmd->transport_lun_stop_comp);
2331
		pr_debug("ConfigFS: ITT[0x%08x] - stopped cmd....\n",
2332
				cmd->se_tfo->get_task_tag(cmd));
2333 2334 2335 2336 2337 2338 2339 2340 2341 2342 2343 2344 2345 2346
	}

	return 0;
}

static void __transport_clear_lun_from_sessions(struct se_lun *lun)
{
	struct se_cmd *cmd = NULL;
	unsigned long lun_flags, cmd_flags;
	/*
	 * Do exception processing and return CHECK_CONDITION status to the
	 * Initiator Port.
	 */
	spin_lock_irqsave(&lun->lun_cmd_lock, lun_flags);
2347 2348 2349
	while (!list_empty(&lun->lun_cmd_list)) {
		cmd = list_first_entry(&lun->lun_cmd_list,
		       struct se_cmd, se_lun_node);
2350
		list_del_init(&cmd->se_lun_node);
2351

2352
		spin_lock(&cmd->t_state_lock);
2353
		pr_debug("SE_LUN[%d] - Setting cmd->transport"
2354
			"_lun_stop for  ITT: 0x%08x\n",
2355 2356
			cmd->se_lun->unpacked_lun,
			cmd->se_tfo->get_task_tag(cmd));
2357
		cmd->transport_state |= CMD_T_LUN_STOP;
2358
		spin_unlock(&cmd->t_state_lock);
2359 2360 2361

		spin_unlock_irqrestore(&lun->lun_cmd_lock, lun_flags);

2362 2363
		if (!cmd->se_lun) {
			pr_err("ITT: 0x%08x, [i,t]_state: %u/%u\n",
2364 2365
				cmd->se_tfo->get_task_tag(cmd),
				cmd->se_tfo->get_cmd_state(cmd), cmd->t_state);
2366 2367 2368 2369 2370 2371
			BUG();
		}
		/*
		 * If the Storage engine still owns the iscsi_cmd_t, determine
		 * and/or stop its context.
		 */
2372
		pr_debug("SE_LUN[%d] - ITT: 0x%08x before transport"
2373 2374
			"_lun_wait_for_tasks()\n", cmd->se_lun->unpacked_lun,
			cmd->se_tfo->get_task_tag(cmd));
2375

2376
		if (transport_lun_wait_for_tasks(cmd, cmd->se_lun) < 0) {
2377 2378 2379 2380
			spin_lock_irqsave(&lun->lun_cmd_lock, lun_flags);
			continue;
		}

2381
		pr_debug("SE_LUN[%d] - ITT: 0x%08x after transport_lun"
2382
			"_wait_for_tasks(): SUCCESS\n",
2383 2384
			cmd->se_lun->unpacked_lun,
			cmd->se_tfo->get_task_tag(cmd));
2385

2386
		spin_lock_irqsave(&cmd->t_state_lock, cmd_flags);
2387
		if (!(cmd->transport_state & CMD_T_DEV_ACTIVE)) {
2388
			spin_unlock_irqrestore(&cmd->t_state_lock, cmd_flags);
2389 2390
			goto check_cond;
		}
2391
		cmd->transport_state &= ~CMD_T_DEV_ACTIVE;
2392
		target_remove_from_state_list(cmd);
2393
		spin_unlock_irqrestore(&cmd->t_state_lock, cmd_flags);
2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408

		/*
		 * The Storage engine stopped this struct se_cmd before it was
		 * send to the fabric frontend for delivery back to the
		 * Initiator Node.  Return this SCSI CDB back with an
		 * CHECK_CONDITION status.
		 */
check_cond:
		transport_send_check_condition_and_sense(cmd,
				TCM_NON_EXISTENT_LUN, 0);
		/*
		 *  If the fabric frontend is waiting for this iscsi_cmd_t to
		 * be released, notify the waiting thread now that LU has
		 * finished accessing it.
		 */
2409
		spin_lock_irqsave(&cmd->t_state_lock, cmd_flags);
2410
		if (cmd->transport_state & CMD_T_LUN_FE_STOP) {
2411
			pr_debug("SE_LUN[%d] - Detected FE stop for"
2412 2413
				" struct se_cmd: %p ITT: 0x%08x\n",
				lun->unpacked_lun,
2414
				cmd, cmd->se_tfo->get_task_tag(cmd));
2415

2416
			spin_unlock_irqrestore(&cmd->t_state_lock,
2417
					cmd_flags);
2418
			transport_cmd_check_stop(cmd, false);
2419
			complete(&cmd->transport_lun_fe_stop_comp);
2420 2421 2422
			spin_lock_irqsave(&lun->lun_cmd_lock, lun_flags);
			continue;
		}
2423
		pr_debug("SE_LUN[%d] - ITT: 0x%08x finished processing\n",
2424
			lun->unpacked_lun, cmd->se_tfo->get_task_tag(cmd));
2425

2426
		spin_unlock_irqrestore(&cmd->t_state_lock, cmd_flags);
2427 2428 2429 2430 2431 2432 2433
		spin_lock_irqsave(&lun->lun_cmd_lock, lun_flags);
	}
	spin_unlock_irqrestore(&lun->lun_cmd_lock, lun_flags);
}

static int transport_clear_lun_thread(void *p)
{
J
Jörn Engel 已提交
2434
	struct se_lun *lun = p;
2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445

	__transport_clear_lun_from_sessions(lun);
	complete(&lun->lun_shutdown_comp);

	return 0;
}

int transport_clear_lun_from_sessions(struct se_lun *lun)
{
	struct task_struct *kt;

2446
	kt = kthread_run(transport_clear_lun_thread, lun,
2447 2448
			"tcm_cl_%u", lun->unpacked_lun);
	if (IS_ERR(kt)) {
2449
		pr_err("Unable to start clear_lun thread\n");
2450
		return PTR_ERR(kt);
2451 2452 2453 2454 2455 2456
	}
	wait_for_completion(&lun->lun_shutdown_comp);

	return 0;
}

2457 2458 2459
/**
 * transport_wait_for_tasks - wait for completion to occur
 * @cmd:	command to wait
2460
 *
2461 2462
 * Called from frontend fabric context to wait for storage engine
 * to pause and/or release frontend generated struct se_cmd.
2463
 */
2464
bool transport_wait_for_tasks(struct se_cmd *cmd)
2465 2466 2467
{
	unsigned long flags;

2468
	spin_lock_irqsave(&cmd->t_state_lock, flags);
2469 2470
	if (!(cmd->se_cmd_flags & SCF_SE_LUN_CMD) &&
	    !(cmd->se_cmd_flags & SCF_SCSI_TMR_CDB)) {
2471
		spin_unlock_irqrestore(&cmd->t_state_lock, flags);
2472
		return false;
2473
	}
2474

2475 2476
	if (!(cmd->se_cmd_flags & SCF_SUPPORTED_SAM_OPCODE) &&
	    !(cmd->se_cmd_flags & SCF_SCSI_TMR_CDB)) {
2477
		spin_unlock_irqrestore(&cmd->t_state_lock, flags);
2478
		return false;
2479
	}
2480 2481 2482
	/*
	 * If we are already stopped due to an external event (ie: LUN shutdown)
	 * sleep until the connection can have the passed struct se_cmd back.
2483
	 * The cmd->transport_lun_stopped_sem will be upped by
2484 2485 2486
	 * transport_clear_lun_from_sessions() once the ConfigFS context caller
	 * has completed its operation on the struct se_cmd.
	 */
2487
	if (cmd->transport_state & CMD_T_LUN_STOP) {
2488
		pr_debug("wait_for_tasks: Stopping"
2489
			" wait_for_completion(&cmd->t_tasktransport_lun_fe"
2490
			"_stop_comp); for ITT: 0x%08x\n",
2491
			cmd->se_tfo->get_task_tag(cmd));
2492 2493 2494 2495 2496 2497 2498
		/*
		 * There is a special case for WRITES where a FE exception +
		 * LUN shutdown means ConfigFS context is still sleeping on
		 * transport_lun_stop_comp in transport_lun_wait_for_tasks().
		 * We go ahead and up transport_lun_stop_comp just to be sure
		 * here.
		 */
2499 2500 2501 2502
		spin_unlock_irqrestore(&cmd->t_state_lock, flags);
		complete(&cmd->transport_lun_stop_comp);
		wait_for_completion(&cmd->transport_lun_fe_stop_comp);
		spin_lock_irqsave(&cmd->t_state_lock, flags);
2503

2504
		target_remove_from_state_list(cmd);
2505 2506 2507 2508 2509
		/*
		 * At this point, the frontend who was the originator of this
		 * struct se_cmd, now owns the structure and can be released through
		 * normal means below.
		 */
2510
		pr_debug("wait_for_tasks: Stopped"
2511
			" wait_for_completion(&cmd->t_tasktransport_lun_fe_"
2512
			"stop_comp); for ITT: 0x%08x\n",
2513
			cmd->se_tfo->get_task_tag(cmd));
2514

2515
		cmd->transport_state &= ~CMD_T_LUN_STOP;
2516
	}
2517

2518
	if (!(cmd->transport_state & CMD_T_ACTIVE)) {
2519
		spin_unlock_irqrestore(&cmd->t_state_lock, flags);
2520
		return false;
2521
	}
2522

2523
	cmd->transport_state |= CMD_T_STOP;
2524

2525
	pr_debug("wait_for_tasks: Stopping %p ITT: 0x%08x"
2526
		" i_state: %d, t_state: %d, CMD_T_STOP\n",
2527 2528
		cmd, cmd->se_tfo->get_task_tag(cmd),
		cmd->se_tfo->get_cmd_state(cmd), cmd->t_state);
2529

2530
	spin_unlock_irqrestore(&cmd->t_state_lock, flags);
2531

2532
	wait_for_completion(&cmd->t_transport_stop_comp);
2533

2534
	spin_lock_irqsave(&cmd->t_state_lock, flags);
2535
	cmd->transport_state &= ~(CMD_T_ACTIVE | CMD_T_STOP);
2536

2537
	pr_debug("wait_for_tasks: Stopped wait_for_completion("
2538
		"&cmd->t_transport_stop_comp) for ITT: 0x%08x\n",
2539
		cmd->se_tfo->get_task_tag(cmd));
2540

2541
	spin_unlock_irqrestore(&cmd->t_state_lock, flags);
2542 2543

	return true;
2544
}
2545
EXPORT_SYMBOL(transport_wait_for_tasks);
2546 2547 2548 2549 2550 2551 2552 2553 2554 2555 2556 2557

static int transport_get_sense_codes(
	struct se_cmd *cmd,
	u8 *asc,
	u8 *ascq)
{
	*asc = cmd->scsi_asc;
	*ascq = cmd->scsi_ascq;

	return 0;
}

2558 2559 2560
int
transport_send_check_condition_and_sense(struct se_cmd *cmd,
		sense_reason_t reason, int from_transport)
2561 2562 2563 2564 2565
{
	unsigned char *buffer = cmd->sense_buffer;
	unsigned long flags;
	u8 asc = 0, ascq = 0;

2566
	spin_lock_irqsave(&cmd->t_state_lock, flags);
2567
	if (cmd->se_cmd_flags & SCF_SENT_CHECK_CONDITION) {
2568
		spin_unlock_irqrestore(&cmd->t_state_lock, flags);
2569 2570 2571
		return 0;
	}
	cmd->se_cmd_flags |= SCF_SENT_CHECK_CONDITION;
2572
	spin_unlock_irqrestore(&cmd->t_state_lock, flags);
2573 2574 2575 2576 2577 2578

	if (!reason && from_transport)
		goto after_reason;

	if (!from_transport)
		cmd->se_cmd_flags |= SCF_EMULATED_TASK_SENSE;
2579

2580 2581 2582 2583 2584
	/*
	 * Actual SENSE DATA, see SPC-3 7.23.2  SPC_SENSE_KEY_OFFSET uses
	 * SENSE KEY values from include/scsi/scsi.h
	 */
	switch (reason) {
H
Hannes Reinecke 已提交
2585 2586 2587 2588 2589 2590 2591 2592 2593 2594
	case TCM_NO_SENSE:
		/* CURRENT ERROR */
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
		/* Not Ready */
		buffer[SPC_SENSE_KEY_OFFSET] = NOT_READY;
		/* NO ADDITIONAL SENSE INFORMATION */
		buffer[SPC_ASC_KEY_OFFSET] = 0;
		buffer[SPC_ASCQ_KEY_OFFSET] = 0;
		break;
2595
	case TCM_NON_EXISTENT_LUN:
2596
		/* CURRENT ERROR */
2597 2598
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2599
		/* ILLEGAL REQUEST */
2600
		buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
2601
		/* LOGICAL UNIT NOT SUPPORTED */
2602
		buffer[SPC_ASC_KEY_OFFSET] = 0x25;
2603
		break;
2604 2605 2606
	case TCM_UNSUPPORTED_SCSI_OPCODE:
	case TCM_SECTOR_COUNT_TOO_MANY:
		/* CURRENT ERROR */
2607 2608
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2609
		/* ILLEGAL REQUEST */
2610
		buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
2611
		/* INVALID COMMAND OPERATION CODE */
2612
		buffer[SPC_ASC_KEY_OFFSET] = 0x20;
2613 2614 2615
		break;
	case TCM_UNKNOWN_MODE_PAGE:
		/* CURRENT ERROR */
2616 2617
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2618
		/* ILLEGAL REQUEST */
2619
		buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
2620
		/* INVALID FIELD IN CDB */
2621
		buffer[SPC_ASC_KEY_OFFSET] = 0x24;
2622 2623 2624
		break;
	case TCM_CHECK_CONDITION_ABORT_CMD:
		/* CURRENT ERROR */
2625 2626
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2627
		/* ABORTED COMMAND */
2628
		buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
2629
		/* BUS DEVICE RESET FUNCTION OCCURRED */
2630 2631
		buffer[SPC_ASC_KEY_OFFSET] = 0x29;
		buffer[SPC_ASCQ_KEY_OFFSET] = 0x03;
2632 2633 2634
		break;
	case TCM_INCORRECT_AMOUNT_OF_DATA:
		/* CURRENT ERROR */
2635 2636
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2637
		/* ABORTED COMMAND */
2638
		buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
2639
		/* WRITE ERROR */
2640
		buffer[SPC_ASC_KEY_OFFSET] = 0x0c;
2641
		/* NOT ENOUGH UNSOLICITED DATA */
2642
		buffer[SPC_ASCQ_KEY_OFFSET] = 0x0d;
2643 2644 2645
		break;
	case TCM_INVALID_CDB_FIELD:
		/* CURRENT ERROR */
2646 2647
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2648
		/* ILLEGAL REQUEST */
2649
		buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
2650
		/* INVALID FIELD IN CDB */
2651
		buffer[SPC_ASC_KEY_OFFSET] = 0x24;
2652 2653 2654
		break;
	case TCM_INVALID_PARAMETER_LIST:
		/* CURRENT ERROR */
2655 2656
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2657
		/* ILLEGAL REQUEST */
2658
		buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
2659
		/* INVALID FIELD IN PARAMETER LIST */
2660
		buffer[SPC_ASC_KEY_OFFSET] = 0x26;
2661
		break;
2662 2663 2664 2665 2666 2667 2668 2669 2670
	case TCM_PARAMETER_LIST_LENGTH_ERROR:
		/* CURRENT ERROR */
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
		/* ILLEGAL REQUEST */
		buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
		/* PARAMETER LIST LENGTH ERROR */
		buffer[SPC_ASC_KEY_OFFSET] = 0x1a;
		break;
2671 2672
	case TCM_UNEXPECTED_UNSOLICITED_DATA:
		/* CURRENT ERROR */
2673 2674
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2675
		/* ABORTED COMMAND */
2676
		buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
2677
		/* WRITE ERROR */
2678
		buffer[SPC_ASC_KEY_OFFSET] = 0x0c;
2679
		/* UNEXPECTED_UNSOLICITED_DATA */
2680
		buffer[SPC_ASCQ_KEY_OFFSET] = 0x0c;
2681 2682 2683
		break;
	case TCM_SERVICE_CRC_ERROR:
		/* CURRENT ERROR */
2684 2685
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2686
		/* ABORTED COMMAND */
2687
		buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
2688
		/* PROTOCOL SERVICE CRC ERROR */
2689
		buffer[SPC_ASC_KEY_OFFSET] = 0x47;
2690
		/* N/A */
2691
		buffer[SPC_ASCQ_KEY_OFFSET] = 0x05;
2692 2693 2694
		break;
	case TCM_SNACK_REJECTED:
		/* CURRENT ERROR */
2695 2696
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2697
		/* ABORTED COMMAND */
2698
		buffer[SPC_SENSE_KEY_OFFSET] = ABORTED_COMMAND;
2699
		/* READ ERROR */
2700
		buffer[SPC_ASC_KEY_OFFSET] = 0x11;
2701
		/* FAILED RETRANSMISSION REQUEST */
2702
		buffer[SPC_ASCQ_KEY_OFFSET] = 0x13;
2703 2704 2705
		break;
	case TCM_WRITE_PROTECTED:
		/* CURRENT ERROR */
2706 2707
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2708
		/* DATA PROTECT */
2709
		buffer[SPC_SENSE_KEY_OFFSET] = DATA_PROTECT;
2710
		/* WRITE PROTECTED */
2711
		buffer[SPC_ASC_KEY_OFFSET] = 0x27;
2712
		break;
2713 2714
	case TCM_ADDRESS_OUT_OF_RANGE:
		/* CURRENT ERROR */
2715 2716
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2717
		/* ILLEGAL REQUEST */
2718
		buffer[SPC_SENSE_KEY_OFFSET] = ILLEGAL_REQUEST;
2719
		/* LOGICAL BLOCK ADDRESS OUT OF RANGE */
2720
		buffer[SPC_ASC_KEY_OFFSET] = 0x21;
2721
		break;
2722 2723
	case TCM_CHECK_CONDITION_UNIT_ATTENTION:
		/* CURRENT ERROR */
2724 2725
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2726
		/* UNIT ATTENTION */
2727
		buffer[SPC_SENSE_KEY_OFFSET] = UNIT_ATTENTION;
2728
		core_scsi3_ua_for_check_condition(cmd, &asc, &ascq);
2729 2730
		buffer[SPC_ASC_KEY_OFFSET] = asc;
		buffer[SPC_ASCQ_KEY_OFFSET] = ascq;
2731 2732 2733
		break;
	case TCM_CHECK_CONDITION_NOT_READY:
		/* CURRENT ERROR */
2734 2735
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2736
		/* Not Ready */
2737
		buffer[SPC_SENSE_KEY_OFFSET] = NOT_READY;
2738
		transport_get_sense_codes(cmd, &asc, &ascq);
2739 2740
		buffer[SPC_ASC_KEY_OFFSET] = asc;
		buffer[SPC_ASCQ_KEY_OFFSET] = ascq;
2741 2742 2743 2744
		break;
	case TCM_LOGICAL_UNIT_COMMUNICATION_FAILURE:
	default:
		/* CURRENT ERROR */
2745 2746
		buffer[0] = 0x70;
		buffer[SPC_ADD_SENSE_LEN_OFFSET] = 10;
2747 2748 2749 2750 2751 2752 2753
		/*
		 * Returning ILLEGAL REQUEST would cause immediate IO errors on
		 * Solaris initiators.  Returning NOT READY instead means the
		 * operations will be retried a finite number of times and we
		 * can survive intermittent errors.
		 */
		buffer[SPC_SENSE_KEY_OFFSET] = NOT_READY;
2754
		/* LOGICAL UNIT COMMUNICATION FAILURE */
2755
		buffer[SPC_ASC_KEY_OFFSET] = 0x08;
2756 2757 2758 2759 2760 2761 2762 2763 2764 2765
		break;
	}
	/*
	 * This code uses linux/include/scsi/scsi.h SAM status codes!
	 */
	cmd->scsi_status = SAM_STAT_CHECK_CONDITION;
	/*
	 * Automatically padded, this value is encoded in the fabric's
	 * data_length response PDU containing the SCSI defined sense data.
	 */
2766
	cmd->scsi_sense_length  = TRANSPORT_SENSE_BUFFER;
2767 2768

after_reason:
2769
	return cmd->se_tfo->queue_status(cmd);
2770 2771 2772 2773 2774
}
EXPORT_SYMBOL(transport_send_check_condition_and_sense);

int transport_check_aborted_status(struct se_cmd *cmd, int send_status)
{
2775 2776
	if (!(cmd->transport_state & CMD_T_ABORTED))
		return 0;
2777

2778 2779
	if (!send_status || (cmd->se_cmd_flags & SCF_SENT_DELAYED_TAS))
		return 1;
2780

2781 2782
	pr_debug("Sending delayed SAM_STAT_TASK_ABORTED status for CDB: 0x%02x ITT: 0x%08x\n",
		 cmd->t_task_cdb[0], cmd->se_tfo->get_task_tag(cmd));
2783

2784 2785 2786 2787
	cmd->se_cmd_flags |= SCF_SENT_DELAYED_TAS;
	cmd->se_tfo->queue_status(cmd);

	return 1;
2788 2789 2790 2791 2792
}
EXPORT_SYMBOL(transport_check_aborted_status);

void transport_send_task_abort(struct se_cmd *cmd)
{
2793 2794 2795
	unsigned long flags;

	spin_lock_irqsave(&cmd->t_state_lock, flags);
2796
	if (cmd->se_cmd_flags & (SCF_SENT_CHECK_CONDITION | SCF_SENT_DELAYED_TAS)) {
2797 2798 2799 2800 2801
		spin_unlock_irqrestore(&cmd->t_state_lock, flags);
		return;
	}
	spin_unlock_irqrestore(&cmd->t_state_lock, flags);

2802 2803 2804 2805 2806 2807 2808
	/*
	 * If there are still expected incoming fabric WRITEs, we wait
	 * until until they have completed before sending a TASK_ABORTED
	 * response.  This response with TASK_ABORTED status will be
	 * queued back to fabric module by transport_check_aborted_status().
	 */
	if (cmd->data_direction == DMA_TO_DEVICE) {
2809
		if (cmd->se_tfo->write_pending_status(cmd) != 0) {
2810
			cmd->transport_state |= CMD_T_ABORTED;
2811 2812 2813 2814
			smp_mb__after_atomic_inc();
		}
	}
	cmd->scsi_status = SAM_STAT_TASK_ABORTED;
2815

2816 2817
	transport_lun_remove_cmd(cmd);

2818
	pr_debug("Setting SAM_STAT_TASK_ABORTED status for CDB: 0x%02x,"
2819
		" ITT: 0x%08x\n", cmd->t_task_cdb[0],
2820
		cmd->se_tfo->get_task_tag(cmd));
2821

2822
	cmd->se_tfo->queue_status(cmd);
2823 2824
}

2825
static void target_tmr_work(struct work_struct *work)
2826
{
2827
	struct se_cmd *cmd = container_of(work, struct se_cmd, work);
2828
	struct se_device *dev = cmd->se_dev;
2829 2830 2831 2832
	struct se_tmr_req *tmr = cmd->se_tmr_req;
	int ret;

	switch (tmr->function) {
2833
	case TMR_ABORT_TASK:
2834
		core_tmr_abort_task(dev, tmr, cmd->se_sess);
2835
		break;
2836 2837 2838
	case TMR_ABORT_TASK_SET:
	case TMR_CLEAR_ACA:
	case TMR_CLEAR_TASK_SET:
2839 2840
		tmr->response = TMR_TASK_MGMT_FUNCTION_NOT_SUPPORTED;
		break;
2841
	case TMR_LUN_RESET:
2842 2843 2844 2845
		ret = core_tmr_lun_reset(dev, tmr, NULL, NULL);
		tmr->response = (!ret) ? TMR_FUNCTION_COMPLETE :
					 TMR_FUNCTION_REJECTED;
		break;
2846
	case TMR_TARGET_WARM_RESET:
2847 2848
		tmr->response = TMR_FUNCTION_REJECTED;
		break;
2849
	case TMR_TARGET_COLD_RESET:
2850 2851 2852
		tmr->response = TMR_FUNCTION_REJECTED;
		break;
	default:
2853
		pr_err("Uknown TMR function: 0x%02x.\n",
2854 2855 2856 2857 2858 2859
				tmr->function);
		tmr->response = TMR_FUNCTION_REJECTED;
		break;
	}

	cmd->t_state = TRANSPORT_ISTATE_PROCESSING;
2860
	cmd->se_tfo->queue_tm_rsp(cmd);
2861

2862
	transport_cmd_check_stop_to_fabric(cmd);
2863 2864
}

2865 2866
int transport_generic_handle_tmr(
	struct se_cmd *cmd)
2867
{
2868 2869
	INIT_WORK(&cmd->work, target_tmr_work);
	queue_work(cmd->se_dev->tmr_wq, &cmd->work);
2870 2871
	return 0;
}
2872
EXPORT_SYMBOL(transport_generic_handle_tmr);