Merge tag 'char-misc-3.19-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/gregk...
[linux-2.6-block.git] / drivers / scsi / bnx2fc / bnx2fc_tgt.c
CommitLineData
17d87c45 1/* bnx2fc_tgt.c: QLogic NetXtreme II Linux FCoE offload driver.
853e2bd2
BG
2 * Handles operations such as session offload/upload etc, and manages
3 * session resources such as connection id and qp resources.
4 *
cf122191 5 * Copyright (c) 2008 - 2013 Broadcom Corporation
17d87c45 6 * Copyright (c) 2014, QLogic Corporation
853e2bd2
BG
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation.
11 *
12 * Written by: Bhanu Prakash Gollapudi (bprakash@broadcom.com)
13 */
14
15#include "bnx2fc.h"
16static void bnx2fc_upld_timer(unsigned long data);
17static void bnx2fc_ofld_timer(unsigned long data);
18static int bnx2fc_init_tgt(struct bnx2fc_rport *tgt,
19 struct fcoe_port *port,
20 struct fc_rport_priv *rdata);
21static u32 bnx2fc_alloc_conn_id(struct bnx2fc_hba *hba,
22 struct bnx2fc_rport *tgt);
23static int bnx2fc_alloc_session_resc(struct bnx2fc_hba *hba,
24 struct bnx2fc_rport *tgt);
25static void bnx2fc_free_session_resc(struct bnx2fc_hba *hba,
26 struct bnx2fc_rport *tgt);
27static void bnx2fc_free_conn_id(struct bnx2fc_hba *hba, u32 conn_id);
28
29static void bnx2fc_upld_timer(unsigned long data)
30{
31
32 struct bnx2fc_rport *tgt = (struct bnx2fc_rport *)data;
33
34 BNX2FC_TGT_DBG(tgt, "upld_timer - Upload compl not received!!\n");
35 /* fake upload completion */
36 clear_bit(BNX2FC_FLAG_OFFLOADED, &tgt->flags);
e7f4fed5 37 clear_bit(BNX2FC_FLAG_ENABLED, &tgt->flags);
853e2bd2
BG
38 set_bit(BNX2FC_FLAG_UPLD_REQ_COMPL, &tgt->flags);
39 wake_up_interruptible(&tgt->upld_wait);
40}
41
42static void bnx2fc_ofld_timer(unsigned long data)
43{
44
45 struct bnx2fc_rport *tgt = (struct bnx2fc_rport *)data;
46
47 BNX2FC_TGT_DBG(tgt, "entered bnx2fc_ofld_timer\n");
48 /* NOTE: This function should never be called, as
49 * offload should never timeout
50 */
51 /*
52 * If the timer has expired, this session is dead
53 * Clear offloaded flag and logout of this device.
54 * Since OFFLOADED flag is cleared, this case
55 * will be considered as offload error and the
56 * port will be logged off, and conn_id, session
57 * resources are freed up in bnx2fc_offload_session
58 */
59 clear_bit(BNX2FC_FLAG_OFFLOADED, &tgt->flags);
e7f4fed5 60 clear_bit(BNX2FC_FLAG_ENABLED, &tgt->flags);
853e2bd2
BG
61 set_bit(BNX2FC_FLAG_OFLD_REQ_CMPL, &tgt->flags);
62 wake_up_interruptible(&tgt->ofld_wait);
63}
64
26bf62a3
BPG
65static void bnx2fc_ofld_wait(struct bnx2fc_rport *tgt)
66{
67 setup_timer(&tgt->ofld_timer, bnx2fc_ofld_timer, (unsigned long)tgt);
68 mod_timer(&tgt->ofld_timer, jiffies + BNX2FC_FW_TIMEOUT);
69
70 wait_event_interruptible(tgt->ofld_wait,
71 (test_bit(
72 BNX2FC_FLAG_OFLD_REQ_CMPL,
73 &tgt->flags)));
74 if (signal_pending(current))
75 flush_signals(current);
76 del_timer_sync(&tgt->ofld_timer);
77}
78
853e2bd2
BG
79static void bnx2fc_offload_session(struct fcoe_port *port,
80 struct bnx2fc_rport *tgt,
81 struct fc_rport_priv *rdata)
82{
83 struct fc_lport *lport = rdata->local_port;
84 struct fc_rport *rport = rdata->rport;
aea71a02
BPG
85 struct bnx2fc_interface *interface = port->priv;
86 struct bnx2fc_hba *hba = interface->hba;
853e2bd2
BG
87 int rval;
88 int i = 0;
89
90 /* Initialize bnx2fc_rport */
91 /* NOTE: tgt is already bzero'd */
92 rval = bnx2fc_init_tgt(tgt, port, rdata);
93 if (rval) {
94 printk(KERN_ERR PFX "Failed to allocate conn id for "
95 "port_id (%6x)\n", rport->port_id);
5fb8fd0d 96 goto tgt_init_err;
853e2bd2
BG
97 }
98
99 /* Allocate session resources */
100 rval = bnx2fc_alloc_session_resc(hba, tgt);
101 if (rval) {
102 printk(KERN_ERR PFX "Failed to allocate resources\n");
103 goto ofld_err;
104 }
105
106 /*
107 * Initialize FCoE session offload process.
108 * Upon completion of offload process add
109 * rport to list of rports
110 */
111retry_ofld:
112 clear_bit(BNX2FC_FLAG_OFLD_REQ_CMPL, &tgt->flags);
113 rval = bnx2fc_send_session_ofld_req(port, tgt);
114 if (rval) {
115 printk(KERN_ERR PFX "ofld_req failed\n");
116 goto ofld_err;
117 }
118
119 /*
120 * wait for the session is offloaded and enabled. 3 Secs
121 * should be ample time for this process to complete.
122 */
26bf62a3 123 bnx2fc_ofld_wait(tgt);
853e2bd2
BG
124
125 if (!(test_bit(BNX2FC_FLAG_OFFLOADED, &tgt->flags))) {
126 if (test_and_clear_bit(BNX2FC_FLAG_CTX_ALLOC_FAILURE,
127 &tgt->flags)) {
128 BNX2FC_TGT_DBG(tgt, "ctx_alloc_failure, "
129 "retry ofld..%d\n", i++);
130 msleep_interruptible(1000);
131 if (i > 3) {
132 i = 0;
133 goto ofld_err;
134 }
135 goto retry_ofld;
136 }
137 goto ofld_err;
138 }
139 if (bnx2fc_map_doorbell(tgt)) {
140 printk(KERN_ERR PFX "map doorbell failed - no mem\n");
e7f4fed5
BPG
141 goto ofld_err;
142 }
143 clear_bit(BNX2FC_FLAG_OFLD_REQ_CMPL, &tgt->flags);
144 rval = bnx2fc_send_session_enable_req(port, tgt);
145 if (rval) {
146 pr_err(PFX "enable session failed\n");
147 goto ofld_err;
a96e8e11 148 }
e7f4fed5
BPG
149 bnx2fc_ofld_wait(tgt);
150 if (!(test_bit(BNX2FC_FLAG_ENABLED, &tgt->flags)))
151 goto ofld_err;
853e2bd2
BG
152 return;
153
154ofld_err:
155 /* couldn't offload the session. log off from this rport */
156 BNX2FC_TGT_DBG(tgt, "bnx2fc_offload_session - offload error\n");
e7f4fed5 157 clear_bit(BNX2FC_FLAG_OFFLOADED, &tgt->flags);
853e2bd2
BG
158 /* Free session resources */
159 bnx2fc_free_session_resc(hba, tgt);
5fb8fd0d 160tgt_init_err:
853e2bd2
BG
161 if (tgt->fcoe_conn_id != -1)
162 bnx2fc_free_conn_id(hba, tgt->fcoe_conn_id);
5fb8fd0d 163 lport->tt.rport_logoff(rdata);
853e2bd2
BG
164}
165
166void bnx2fc_flush_active_ios(struct bnx2fc_rport *tgt)
167{
168 struct bnx2fc_cmd *io_req;
d71fb3bd 169 struct bnx2fc_cmd *tmp;
853e2bd2
BG
170 int rc;
171 int i = 0;
172 BNX2FC_TGT_DBG(tgt, "Entered flush_active_ios - %d\n",
173 tgt->num_active_ios.counter);
174
175 spin_lock_bh(&tgt->tgt_lock);
176 tgt->flush_in_prog = 1;
177
d71fb3bd 178 list_for_each_entry_safe(io_req, tmp, &tgt->active_cmd_queue, link) {
853e2bd2 179 i++;
853e2bd2
BG
180 list_del_init(&io_req->link);
181 io_req->on_active_queue = 0;
182 BNX2FC_IO_DBG(io_req, "cmd_queue cleanup\n");
183
184 if (cancel_delayed_work(&io_req->timeout_work)) {
185 if (test_and_clear_bit(BNX2FC_FLAG_EH_ABORT,
186 &io_req->req_flags)) {
187 /* Handle eh_abort timeout */
188 BNX2FC_IO_DBG(io_req, "eh_abort for IO "
189 "cleaned up\n");
190 complete(&io_req->tm_done);
191 }
192 kref_put(&io_req->refcount,
193 bnx2fc_cmd_release); /* drop timer hold */
194 }
195
196 set_bit(BNX2FC_FLAG_IO_COMPL, &io_req->req_flags);
197 set_bit(BNX2FC_FLAG_IO_CLEANUP, &io_req->req_flags);
5c17ae21
BPG
198
199 /* Do not issue cleanup when disable request failed */
200 if (test_bit(BNX2FC_FLAG_DISABLE_FAILED, &tgt->flags))
201 bnx2fc_process_cleanup_compl(io_req, io_req->task, 0);
202 else {
203 rc = bnx2fc_initiate_cleanup(io_req);
204 BUG_ON(rc);
205 }
853e2bd2
BG
206 }
207
d71fb3bd 208 list_for_each_entry_safe(io_req, tmp, &tgt->active_tm_queue, link) {
92886c9c 209 i++;
92886c9c
BPG
210 list_del_init(&io_req->link);
211 io_req->on_tmf_queue = 0;
212 BNX2FC_IO_DBG(io_req, "tm_queue cleanup\n");
213 if (io_req->wait_for_comp)
214 complete(&io_req->tm_done);
215 }
216
d71fb3bd 217 list_for_each_entry_safe(io_req, tmp, &tgt->els_queue, link) {
853e2bd2 218 i++;
853e2bd2
BG
219 list_del_init(&io_req->link);
220 io_req->on_active_queue = 0;
221
222 BNX2FC_IO_DBG(io_req, "els_queue cleanup\n");
223
224 if (cancel_delayed_work(&io_req->timeout_work))
225 kref_put(&io_req->refcount,
226 bnx2fc_cmd_release); /* drop timer hold */
227
228 if ((io_req->cb_func) && (io_req->cb_arg)) {
229 io_req->cb_func(io_req->cb_arg);
230 io_req->cb_arg = NULL;
231 }
232
5c17ae21
BPG
233 /* Do not issue cleanup when disable request failed */
234 if (test_bit(BNX2FC_FLAG_DISABLE_FAILED, &tgt->flags))
235 bnx2fc_process_cleanup_compl(io_req, io_req->task, 0);
236 else {
237 rc = bnx2fc_initiate_cleanup(io_req);
238 BUG_ON(rc);
239 }
853e2bd2
BG
240 }
241
d71fb3bd 242 list_for_each_entry_safe(io_req, tmp, &tgt->io_retire_queue, link) {
853e2bd2 243 i++;
853e2bd2
BG
244 list_del_init(&io_req->link);
245
246 BNX2FC_IO_DBG(io_req, "retire_queue flush\n");
247
c1bb4f33
BPG
248 if (cancel_delayed_work(&io_req->timeout_work)) {
249 if (test_and_clear_bit(BNX2FC_FLAG_EH_ABORT,
250 &io_req->req_flags)) {
251 /* Handle eh_abort timeout */
252 BNX2FC_IO_DBG(io_req, "eh_abort for IO "
253 "in retire_q\n");
254 if (io_req->wait_for_comp)
255 complete(&io_req->tm_done);
256 }
853e2bd2 257 kref_put(&io_req->refcount, bnx2fc_cmd_release);
c1bb4f33 258 }
853e2bd2
BG
259
260 clear_bit(BNX2FC_FLAG_ISSUE_RRQ, &io_req->req_flags);
261 }
262
263 BNX2FC_TGT_DBG(tgt, "IOs flushed = %d\n", i);
264 i = 0;
265 spin_unlock_bh(&tgt->tgt_lock);
266 /* wait for active_ios to go to 0 */
267 while ((tgt->num_active_ios.counter != 0) && (i++ < BNX2FC_WAIT_CNT))
268 msleep(25);
269 if (tgt->num_active_ios.counter != 0)
270 printk(KERN_ERR PFX "CLEANUP on port 0x%x:"
271 " active_ios = %d\n",
272 tgt->rdata->ids.port_id, tgt->num_active_ios.counter);
273 spin_lock_bh(&tgt->tgt_lock);
274 tgt->flush_in_prog = 0;
275 spin_unlock_bh(&tgt->tgt_lock);
276}
277
26bf62a3
BPG
278static void bnx2fc_upld_wait(struct bnx2fc_rport *tgt)
279{
280 setup_timer(&tgt->upld_timer, bnx2fc_upld_timer, (unsigned long)tgt);
281 mod_timer(&tgt->upld_timer, jiffies + BNX2FC_FW_TIMEOUT);
282 wait_event_interruptible(tgt->upld_wait,
283 (test_bit(
284 BNX2FC_FLAG_UPLD_REQ_COMPL,
285 &tgt->flags)));
286 if (signal_pending(current))
287 flush_signals(current);
288 del_timer_sync(&tgt->upld_timer);
289}
290
853e2bd2
BG
291static void bnx2fc_upload_session(struct fcoe_port *port,
292 struct bnx2fc_rport *tgt)
293{
aea71a02
BPG
294 struct bnx2fc_interface *interface = port->priv;
295 struct bnx2fc_hba *hba = interface->hba;
853e2bd2
BG
296
297 BNX2FC_TGT_DBG(tgt, "upload_session: active_ios = %d\n",
298 tgt->num_active_ios.counter);
299
300 /*
301 * Called with hba->hba_mutex held.
302 * This is a blocking call
303 */
304 clear_bit(BNX2FC_FLAG_UPLD_REQ_COMPL, &tgt->flags);
305 bnx2fc_send_session_disable_req(port, tgt);
306
307 /*
308 * wait for upload to complete. 3 Secs
309 * should be sufficient time for this process to complete.
310 */
853e2bd2 311 BNX2FC_TGT_DBG(tgt, "waiting for disable compl\n");
26bf62a3 312 bnx2fc_upld_wait(tgt);
853e2bd2
BG
313
314 /*
315 * traverse thru the active_q and tmf_q and cleanup
316 * IOs in these lists
317 */
318 BNX2FC_TGT_DBG(tgt, "flush/upload - disable wait flags = 0x%lx\n",
319 tgt->flags);
320 bnx2fc_flush_active_ios(tgt);
321
322 /* Issue destroy KWQE */
323 if (test_bit(BNX2FC_FLAG_DISABLED, &tgt->flags)) {
324 BNX2FC_TGT_DBG(tgt, "send destroy req\n");
325 clear_bit(BNX2FC_FLAG_UPLD_REQ_COMPL, &tgt->flags);
326 bnx2fc_send_session_destroy_req(hba, tgt);
327
328 /* wait for destroy to complete */
26bf62a3 329 bnx2fc_upld_wait(tgt);
853e2bd2
BG
330
331 if (!(test_bit(BNX2FC_FLAG_DESTROYED, &tgt->flags)))
332 printk(KERN_ERR PFX "ERROR!! destroy timed out\n");
333
334 BNX2FC_TGT_DBG(tgt, "destroy wait complete flags = 0x%lx\n",
335 tgt->flags);
853e2bd2 336
5c17ae21
BPG
337 } else if (test_bit(BNX2FC_FLAG_DISABLE_FAILED, &tgt->flags)) {
338 printk(KERN_ERR PFX "ERROR!! DISABLE req failed, destroy"
339 " not sent to FW\n");
340 } else {
853e2bd2
BG
341 printk(KERN_ERR PFX "ERROR!! DISABLE req timed out, destroy"
342 " not sent to FW\n");
5c17ae21 343 }
853e2bd2
BG
344
345 /* Free session resources */
853e2bd2
BG
346 bnx2fc_free_session_resc(hba, tgt);
347 bnx2fc_free_conn_id(hba, tgt->fcoe_conn_id);
853e2bd2
BG
348}
349
350static int bnx2fc_init_tgt(struct bnx2fc_rport *tgt,
351 struct fcoe_port *port,
352 struct fc_rport_priv *rdata)
353{
354
355 struct fc_rport *rport = rdata->rport;
aea71a02
BPG
356 struct bnx2fc_interface *interface = port->priv;
357 struct bnx2fc_hba *hba = interface->hba;
619c5cb6
VZ
358 struct b577xx_doorbell_set_prod *sq_db = &tgt->sq_db;
359 struct b577xx_fcoe_rx_doorbell *rx_db = &tgt->rx_db;
853e2bd2
BG
360
361 tgt->rport = rport;
362 tgt->rdata = rdata;
363 tgt->port = port;
364
365 if (hba->num_ofld_sess >= BNX2FC_NUM_MAX_SESS) {
366 BNX2FC_TGT_DBG(tgt, "exceeded max sessions. logoff this tgt\n");
367 tgt->fcoe_conn_id = -1;
368 return -1;
369 }
370
371 tgt->fcoe_conn_id = bnx2fc_alloc_conn_id(hba, tgt);
372 if (tgt->fcoe_conn_id == -1)
373 return -1;
374
375 BNX2FC_TGT_DBG(tgt, "init_tgt - conn_id = 0x%x\n", tgt->fcoe_conn_id);
376
377 tgt->max_sqes = BNX2FC_SQ_WQES_MAX;
378 tgt->max_rqes = BNX2FC_RQ_WQES_MAX;
379 tgt->max_cqes = BNX2FC_CQ_WQES_MAX;
619c5cb6 380 atomic_set(&tgt->free_sqes, BNX2FC_SQ_WQES_MAX);
853e2bd2
BG
381
382 /* Initialize the toggle bit */
383 tgt->sq_curr_toggle_bit = 1;
384 tgt->cq_curr_toggle_bit = 1;
385 tgt->sq_prod_idx = 0;
386 tgt->cq_cons_idx = 0;
387 tgt->rq_prod_idx = 0x8000;
388 tgt->rq_cons_idx = 0;
389 atomic_set(&tgt->num_active_ios, 0);
245a5754 390 tgt->retry_delay_timestamp = 0;
853e2bd2 391
50b7186f
BPG
392 if (rdata->flags & FC_RP_FLAGS_RETRY &&
393 rdata->ids.roles & FC_RPORT_ROLE_FCP_TARGET &&
394 !(rdata->ids.roles & FC_RPORT_ROLE_FCP_INITIATOR)) {
b252f4c7
BPG
395 tgt->dev_type = TYPE_TAPE;
396 tgt->io_timeout = 0; /* use default ULP timeout */
397 } else {
398 tgt->dev_type = TYPE_DISK;
399 tgt->io_timeout = BNX2FC_IO_TIMEOUT;
400 }
401
619c5cb6
VZ
402 /* initialize sq doorbell */
403 sq_db->header.header = B577XX_DOORBELL_HDR_DB_TYPE;
404 sq_db->header.header |= B577XX_FCOE_CONNECTION_TYPE <<
405 B577XX_DOORBELL_HDR_CONN_TYPE_SHIFT;
406 /* initialize rx doorbell */
407 rx_db->hdr.header = ((0x1 << B577XX_DOORBELL_HDR_RX_SHIFT) |
408 (0x1 << B577XX_DOORBELL_HDR_DB_TYPE_SHIFT) |
409 (B577XX_FCOE_CONNECTION_TYPE <<
410 B577XX_DOORBELL_HDR_CONN_TYPE_SHIFT));
411 rx_db->params = (0x2 << B577XX_FCOE_RX_DOORBELL_NEGATIVE_ARM_SHIFT) |
412 (0x3 << B577XX_FCOE_RX_DOORBELL_OPCODE_SHIFT);
853e2bd2
BG
413
414 spin_lock_init(&tgt->tgt_lock);
415 spin_lock_init(&tgt->cq_lock);
416
417 /* Initialize active_cmd_queue list */
418 INIT_LIST_HEAD(&tgt->active_cmd_queue);
419
420 /* Initialize IO retire queue */
421 INIT_LIST_HEAD(&tgt->io_retire_queue);
422
423 INIT_LIST_HEAD(&tgt->els_queue);
424
425 /* Initialize active_tm_queue list */
426 INIT_LIST_HEAD(&tgt->active_tm_queue);
427
428 init_waitqueue_head(&tgt->ofld_wait);
429 init_waitqueue_head(&tgt->upld_wait);
430
431 return 0;
432}
433
434/**
435 * This event_callback is called after successful completion of libfc
436 * initiated target login. bnx2fc can proceed with initiating the session
437 * establishment.
438 */
439void bnx2fc_rport_event_handler(struct fc_lport *lport,
440 struct fc_rport_priv *rdata,
441 enum fc_rport_event event)
442{
443 struct fcoe_port *port = lport_priv(lport);
aea71a02
BPG
444 struct bnx2fc_interface *interface = port->priv;
445 struct bnx2fc_hba *hba = interface->hba;
853e2bd2
BG
446 struct fc_rport *rport = rdata->rport;
447 struct fc_rport_libfc_priv *rp;
448 struct bnx2fc_rport *tgt;
449 u32 port_id;
450
451 BNX2FC_HBA_DBG(lport, "rport_event_hdlr: event = %d, port_id = 0x%x\n",
452 event, rdata->ids.port_id);
453 switch (event) {
454 case RPORT_EV_READY:
455 if (!rport) {
b2a554ff 456 printk(KERN_ERR PFX "rport is NULL: ERROR!\n");
853e2bd2
BG
457 break;
458 }
459
460 rp = rport->dd_data;
461 if (rport->port_id == FC_FID_DIR_SERV) {
462 /*
25985edc 463 * bnx2fc_rport structure doesn't exist for
853e2bd2
BG
464 * directory server.
465 * We should not come here, as lport will
466 * take care of fabric login
467 */
b2a554ff 468 printk(KERN_ERR PFX "%x - rport_event_handler ERROR\n",
853e2bd2
BG
469 rdata->ids.port_id);
470 break;
471 }
472
473 if (rdata->spp_type != FC_TYPE_FCP) {
474 BNX2FC_HBA_DBG(lport, "not FCP type target."
475 " not offloading\n");
476 break;
477 }
478 if (!(rdata->ids.roles & FC_RPORT_ROLE_FCP_TARGET)) {
479 BNX2FC_HBA_DBG(lport, "not FCP_TARGET"
480 " not offloading\n");
481 break;
482 }
483
484 /*
485 * Offlaod process is protected with hba mutex.
486 * Use the same mutex_lock for upload process too
487 */
488 mutex_lock(&hba->hba_mutex);
489 tgt = (struct bnx2fc_rport *)&rp[1];
490
491 /* This can happen when ADISC finds the same target */
e7f4fed5 492 if (test_bit(BNX2FC_FLAG_ENABLED, &tgt->flags)) {
853e2bd2
BG
493 BNX2FC_TGT_DBG(tgt, "already offloaded\n");
494 mutex_unlock(&hba->hba_mutex);
495 return;
496 }
497
498 /*
499 * Offload the session. This is a blocking call, and will
500 * wait until the session is offloaded.
501 */
502 bnx2fc_offload_session(port, tgt, rdata);
503
504 BNX2FC_TGT_DBG(tgt, "OFFLOAD num_ofld_sess = %d\n",
505 hba->num_ofld_sess);
506
e7f4fed5
BPG
507 if (test_bit(BNX2FC_FLAG_ENABLED, &tgt->flags)) {
508 /* Session is offloaded and enabled. */
853e2bd2
BG
509 BNX2FC_TGT_DBG(tgt, "sess offloaded\n");
510 /* This counter is protected with hba mutex */
511 hba->num_ofld_sess++;
512
513 set_bit(BNX2FC_FLAG_SESSION_READY, &tgt->flags);
514 } else {
515 /*
516 * Offload or enable would have failed.
517 * In offload/enable completion path, the
518 * rport would have already been removed
519 */
520 BNX2FC_TGT_DBG(tgt, "Port is being logged off as "
521 "offloaded flag not set\n");
522 }
523 mutex_unlock(&hba->hba_mutex);
524 break;
525 case RPORT_EV_LOGO:
526 case RPORT_EV_FAILED:
527 case RPORT_EV_STOP:
528 port_id = rdata->ids.port_id;
529 if (port_id == FC_FID_DIR_SERV)
530 break;
531
532 if (!rport) {
b2a554ff 533 printk(KERN_INFO PFX "%x - rport not created Yet!!\n",
853e2bd2
BG
534 port_id);
535 break;
536 }
537 rp = rport->dd_data;
538 mutex_lock(&hba->hba_mutex);
539 /*
540 * Perform session upload. Note that rdata->peers is already
541 * removed from disc->rports list before we get this event.
542 */
543 tgt = (struct bnx2fc_rport *)&rp[1];
544
e7f4fed5 545 if (!(test_bit(BNX2FC_FLAG_ENABLED, &tgt->flags))) {
853e2bd2
BG
546 mutex_unlock(&hba->hba_mutex);
547 break;
548 }
549 clear_bit(BNX2FC_FLAG_SESSION_READY, &tgt->flags);
550
551 bnx2fc_upload_session(port, tgt);
552 hba->num_ofld_sess--;
553 BNX2FC_TGT_DBG(tgt, "UPLOAD num_ofld_sess = %d\n",
554 hba->num_ofld_sess);
555 /*
556 * Try to wake up the linkdown wait thread. If num_ofld_sess
557 * is 0, the waiting therad wakes up
558 */
559 if ((hba->wait_for_link_down) &&
560 (hba->num_ofld_sess == 0)) {
561 wake_up_interruptible(&hba->shutdown_wait);
562 }
563 if (test_bit(BNX2FC_FLAG_EXPL_LOGO, &tgt->flags)) {
564 printk(KERN_ERR PFX "Relogin to the tgt\n");
565 mutex_lock(&lport->disc.disc_mutex);
566 lport->tt.rport_login(rdata);
567 mutex_unlock(&lport->disc.disc_mutex);
568 }
569 mutex_unlock(&hba->hba_mutex);
570
571 break;
572
573 case RPORT_EV_NONE:
574 break;
575 }
576}
577
578/**
579 * bnx2fc_tgt_lookup() - Lookup a bnx2fc_rport by port_id
580 *
581 * @port: fcoe_port struct to lookup the target port on
582 * @port_id: The remote port ID to look up
583 */
584struct bnx2fc_rport *bnx2fc_tgt_lookup(struct fcoe_port *port,
585 u32 port_id)
586{
aea71a02
BPG
587 struct bnx2fc_interface *interface = port->priv;
588 struct bnx2fc_hba *hba = interface->hba;
853e2bd2
BG
589 struct bnx2fc_rport *tgt;
590 struct fc_rport_priv *rdata;
591 int i;
592
593 for (i = 0; i < BNX2FC_NUM_MAX_SESS; i++) {
594 tgt = hba->tgt_ofld_list[i];
595 if ((tgt) && (tgt->port == port)) {
596 rdata = tgt->rdata;
597 if (rdata->ids.port_id == port_id) {
598 if (rdata->rp_state != RPORT_ST_DELETE) {
599 BNX2FC_TGT_DBG(tgt, "rport "
600 "obtained\n");
601 return tgt;
602 } else {
aea71a02 603 BNX2FC_TGT_DBG(tgt, "rport 0x%x "
853e2bd2
BG
604 "is in DELETED state\n",
605 rdata->ids.port_id);
606 return NULL;
607 }
608 }
609 }
610 }
611 return NULL;
612}
613
614
615/**
616 * bnx2fc_alloc_conn_id - allocates FCOE Connection id
617 *
618 * @hba: pointer to adapter structure
619 * @tgt: pointer to bnx2fc_rport structure
620 */
621static u32 bnx2fc_alloc_conn_id(struct bnx2fc_hba *hba,
622 struct bnx2fc_rport *tgt)
623{
624 u32 conn_id, next;
625
626 /* called with hba mutex held */
627
628 /*
629 * tgt_ofld_list access is synchronized using
630 * both hba mutex and hba lock. Atleast hba mutex or
631 * hba lock needs to be held for read access.
632 */
633
634 spin_lock_bh(&hba->hba_lock);
635 next = hba->next_conn_id;
636 conn_id = hba->next_conn_id++;
637 if (hba->next_conn_id == BNX2FC_NUM_MAX_SESS)
638 hba->next_conn_id = 0;
639
640 while (hba->tgt_ofld_list[conn_id] != NULL) {
641 conn_id++;
642 if (conn_id == BNX2FC_NUM_MAX_SESS)
643 conn_id = 0;
644
645 if (conn_id == next) {
646 /* No free conn_ids are available */
647 spin_unlock_bh(&hba->hba_lock);
648 return -1;
649 }
650 }
651 hba->tgt_ofld_list[conn_id] = tgt;
652 tgt->fcoe_conn_id = conn_id;
653 spin_unlock_bh(&hba->hba_lock);
654 return conn_id;
655}
656
657static void bnx2fc_free_conn_id(struct bnx2fc_hba *hba, u32 conn_id)
658{
659 /* called with hba mutex held */
660 spin_lock_bh(&hba->hba_lock);
661 hba->tgt_ofld_list[conn_id] = NULL;
853e2bd2
BG
662 spin_unlock_bh(&hba->hba_lock);
663}
664
665/**
666 *bnx2fc_alloc_session_resc - Allocate qp resources for the session
667 *
668 */
669static int bnx2fc_alloc_session_resc(struct bnx2fc_hba *hba,
670 struct bnx2fc_rport *tgt)
671{
672 dma_addr_t page;
673 int num_pages;
674 u32 *pbl;
675
676 /* Allocate and map SQ */
677 tgt->sq_mem_size = tgt->max_sqes * BNX2FC_SQ_WQE_SIZE;
be1fefc2
MC
678 tgt->sq_mem_size = (tgt->sq_mem_size + (CNIC_PAGE_SIZE - 1)) &
679 CNIC_PAGE_MASK;
853e2bd2
BG
680
681 tgt->sq = dma_alloc_coherent(&hba->pcidev->dev, tgt->sq_mem_size,
682 &tgt->sq_dma, GFP_KERNEL);
683 if (!tgt->sq) {
b2a554ff 684 printk(KERN_ERR PFX "unable to allocate SQ memory %d\n",
853e2bd2
BG
685 tgt->sq_mem_size);
686 goto mem_alloc_failure;
687 }
688 memset(tgt->sq, 0, tgt->sq_mem_size);
689
690 /* Allocate and map CQ */
691 tgt->cq_mem_size = tgt->max_cqes * BNX2FC_CQ_WQE_SIZE;
be1fefc2
MC
692 tgt->cq_mem_size = (tgt->cq_mem_size + (CNIC_PAGE_SIZE - 1)) &
693 CNIC_PAGE_MASK;
853e2bd2
BG
694
695 tgt->cq = dma_alloc_coherent(&hba->pcidev->dev, tgt->cq_mem_size,
696 &tgt->cq_dma, GFP_KERNEL);
697 if (!tgt->cq) {
b2a554ff 698 printk(KERN_ERR PFX "unable to allocate CQ memory %d\n",
853e2bd2
BG
699 tgt->cq_mem_size);
700 goto mem_alloc_failure;
701 }
702 memset(tgt->cq, 0, tgt->cq_mem_size);
703
704 /* Allocate and map RQ and RQ PBL */
705 tgt->rq_mem_size = tgt->max_rqes * BNX2FC_RQ_WQE_SIZE;
be1fefc2
MC
706 tgt->rq_mem_size = (tgt->rq_mem_size + (CNIC_PAGE_SIZE - 1)) &
707 CNIC_PAGE_MASK;
853e2bd2
BG
708
709 tgt->rq = dma_alloc_coherent(&hba->pcidev->dev, tgt->rq_mem_size,
710 &tgt->rq_dma, GFP_KERNEL);
711 if (!tgt->rq) {
b2a554ff 712 printk(KERN_ERR PFX "unable to allocate RQ memory %d\n",
853e2bd2
BG
713 tgt->rq_mem_size);
714 goto mem_alloc_failure;
715 }
716 memset(tgt->rq, 0, tgt->rq_mem_size);
717
be1fefc2
MC
718 tgt->rq_pbl_size = (tgt->rq_mem_size / CNIC_PAGE_SIZE) * sizeof(void *);
719 tgt->rq_pbl_size = (tgt->rq_pbl_size + (CNIC_PAGE_SIZE - 1)) &
720 CNIC_PAGE_MASK;
853e2bd2
BG
721
722 tgt->rq_pbl = dma_alloc_coherent(&hba->pcidev->dev, tgt->rq_pbl_size,
723 &tgt->rq_pbl_dma, GFP_KERNEL);
724 if (!tgt->rq_pbl) {
b2a554ff 725 printk(KERN_ERR PFX "unable to allocate RQ PBL %d\n",
853e2bd2
BG
726 tgt->rq_pbl_size);
727 goto mem_alloc_failure;
728 }
729
730 memset(tgt->rq_pbl, 0, tgt->rq_pbl_size);
be1fefc2 731 num_pages = tgt->rq_mem_size / CNIC_PAGE_SIZE;
853e2bd2
BG
732 page = tgt->rq_dma;
733 pbl = (u32 *)tgt->rq_pbl;
734
735 while (num_pages--) {
736 *pbl = (u32)page;
737 pbl++;
738 *pbl = (u32)((u64)page >> 32);
739 pbl++;
be1fefc2 740 page += CNIC_PAGE_SIZE;
853e2bd2
BG
741 }
742
743 /* Allocate and map XFERQ */
744 tgt->xferq_mem_size = tgt->max_sqes * BNX2FC_XFERQ_WQE_SIZE;
be1fefc2
MC
745 tgt->xferq_mem_size = (tgt->xferq_mem_size + (CNIC_PAGE_SIZE - 1)) &
746 CNIC_PAGE_MASK;
853e2bd2
BG
747
748 tgt->xferq = dma_alloc_coherent(&hba->pcidev->dev, tgt->xferq_mem_size,
749 &tgt->xferq_dma, GFP_KERNEL);
750 if (!tgt->xferq) {
b2a554ff 751 printk(KERN_ERR PFX "unable to allocate XFERQ %d\n",
853e2bd2
BG
752 tgt->xferq_mem_size);
753 goto mem_alloc_failure;
754 }
755 memset(tgt->xferq, 0, tgt->xferq_mem_size);
756
757 /* Allocate and map CONFQ & CONFQ PBL */
758 tgt->confq_mem_size = tgt->max_sqes * BNX2FC_CONFQ_WQE_SIZE;
be1fefc2
MC
759 tgt->confq_mem_size = (tgt->confq_mem_size + (CNIC_PAGE_SIZE - 1)) &
760 CNIC_PAGE_MASK;
853e2bd2
BG
761
762 tgt->confq = dma_alloc_coherent(&hba->pcidev->dev, tgt->confq_mem_size,
763 &tgt->confq_dma, GFP_KERNEL);
764 if (!tgt->confq) {
b2a554ff 765 printk(KERN_ERR PFX "unable to allocate CONFQ %d\n",
853e2bd2
BG
766 tgt->confq_mem_size);
767 goto mem_alloc_failure;
768 }
769 memset(tgt->confq, 0, tgt->confq_mem_size);
770
771 tgt->confq_pbl_size =
be1fefc2 772 (tgt->confq_mem_size / CNIC_PAGE_SIZE) * sizeof(void *);
853e2bd2 773 tgt->confq_pbl_size =
be1fefc2 774 (tgt->confq_pbl_size + (CNIC_PAGE_SIZE - 1)) & CNIC_PAGE_MASK;
853e2bd2
BG
775
776 tgt->confq_pbl = dma_alloc_coherent(&hba->pcidev->dev,
777 tgt->confq_pbl_size,
778 &tgt->confq_pbl_dma, GFP_KERNEL);
779 if (!tgt->confq_pbl) {
b2a554ff 780 printk(KERN_ERR PFX "unable to allocate CONFQ PBL %d\n",
853e2bd2
BG
781 tgt->confq_pbl_size);
782 goto mem_alloc_failure;
783 }
784
785 memset(tgt->confq_pbl, 0, tgt->confq_pbl_size);
be1fefc2 786 num_pages = tgt->confq_mem_size / CNIC_PAGE_SIZE;
853e2bd2
BG
787 page = tgt->confq_dma;
788 pbl = (u32 *)tgt->confq_pbl;
789
790 while (num_pages--) {
791 *pbl = (u32)page;
792 pbl++;
793 *pbl = (u32)((u64)page >> 32);
794 pbl++;
be1fefc2 795 page += CNIC_PAGE_SIZE;
853e2bd2
BG
796 }
797
798 /* Allocate and map ConnDB */
799 tgt->conn_db_mem_size = sizeof(struct fcoe_conn_db);
800
801 tgt->conn_db = dma_alloc_coherent(&hba->pcidev->dev,
802 tgt->conn_db_mem_size,
803 &tgt->conn_db_dma, GFP_KERNEL);
804 if (!tgt->conn_db) {
b2a554ff 805 printk(KERN_ERR PFX "unable to allocate conn_db %d\n",
853e2bd2
BG
806 tgt->conn_db_mem_size);
807 goto mem_alloc_failure;
808 }
809 memset(tgt->conn_db, 0, tgt->conn_db_mem_size);
810
811
812 /* Allocate and map LCQ */
813 tgt->lcq_mem_size = (tgt->max_sqes + 8) * BNX2FC_SQ_WQE_SIZE;
be1fefc2
MC
814 tgt->lcq_mem_size = (tgt->lcq_mem_size + (CNIC_PAGE_SIZE - 1)) &
815 CNIC_PAGE_MASK;
853e2bd2
BG
816
817 tgt->lcq = dma_alloc_coherent(&hba->pcidev->dev, tgt->lcq_mem_size,
818 &tgt->lcq_dma, GFP_KERNEL);
819
820 if (!tgt->lcq) {
b2a554ff 821 printk(KERN_ERR PFX "unable to allocate lcq %d\n",
853e2bd2
BG
822 tgt->lcq_mem_size);
823 goto mem_alloc_failure;
824 }
825 memset(tgt->lcq, 0, tgt->lcq_mem_size);
826
853e2bd2
BG
827 tgt->conn_db->rq_prod = 0x8000;
828
829 return 0;
830
831mem_alloc_failure:
853e2bd2
BG
832 return -ENOMEM;
833}
834
835/**
836 * bnx2i_free_session_resc - free qp resources for the session
837 *
838 * @hba: adapter structure pointer
839 * @tgt: bnx2fc_rport structure pointer
840 *
841 * Free QP resources - SQ/RQ/CQ/XFERQ memory and PBL
842 */
843static void bnx2fc_free_session_resc(struct bnx2fc_hba *hba,
844 struct bnx2fc_rport *tgt)
845{
b338c785 846 void __iomem *ctx_base_ptr;
853e2bd2 847
b338c785 848 BNX2FC_TGT_DBG(tgt, "Freeing up session resources\n");
619c5cb6
VZ
849
850 spin_lock_bh(&tgt->cq_lock);
b338c785
BPG
851 ctx_base_ptr = tgt->ctx_base;
852 tgt->ctx_base = NULL;
853
853e2bd2
BG
854 /* Free LCQ */
855 if (tgt->lcq) {
856 dma_free_coherent(&hba->pcidev->dev, tgt->lcq_mem_size,
857 tgt->lcq, tgt->lcq_dma);
858 tgt->lcq = NULL;
859 }
860 /* Free connDB */
861 if (tgt->conn_db) {
862 dma_free_coherent(&hba->pcidev->dev, tgt->conn_db_mem_size,
863 tgt->conn_db, tgt->conn_db_dma);
864 tgt->conn_db = NULL;
865 }
866 /* Free confq and confq pbl */
867 if (tgt->confq_pbl) {
868 dma_free_coherent(&hba->pcidev->dev, tgt->confq_pbl_size,
869 tgt->confq_pbl, tgt->confq_pbl_dma);
870 tgt->confq_pbl = NULL;
871 }
872 if (tgt->confq) {
873 dma_free_coherent(&hba->pcidev->dev, tgt->confq_mem_size,
874 tgt->confq, tgt->confq_dma);
875 tgt->confq = NULL;
876 }
877 /* Free XFERQ */
878 if (tgt->xferq) {
879 dma_free_coherent(&hba->pcidev->dev, tgt->xferq_mem_size,
880 tgt->xferq, tgt->xferq_dma);
881 tgt->xferq = NULL;
882 }
883 /* Free RQ PBL and RQ */
884 if (tgt->rq_pbl) {
885 dma_free_coherent(&hba->pcidev->dev, tgt->rq_pbl_size,
886 tgt->rq_pbl, tgt->rq_pbl_dma);
887 tgt->rq_pbl = NULL;
888 }
889 if (tgt->rq) {
890 dma_free_coherent(&hba->pcidev->dev, tgt->rq_mem_size,
891 tgt->rq, tgt->rq_dma);
892 tgt->rq = NULL;
893 }
894 /* Free CQ */
895 if (tgt->cq) {
896 dma_free_coherent(&hba->pcidev->dev, tgt->cq_mem_size,
897 tgt->cq, tgt->cq_dma);
898 tgt->cq = NULL;
899 }
900 /* Free SQ */
901 if (tgt->sq) {
902 dma_free_coherent(&hba->pcidev->dev, tgt->sq_mem_size,
903 tgt->sq, tgt->sq_dma);
904 tgt->sq = NULL;
905 }
619c5cb6 906 spin_unlock_bh(&tgt->cq_lock);
b338c785
BPG
907
908 if (ctx_base_ptr)
909 iounmap(ctx_base_ptr);
853e2bd2 910}