1 /* bnx2fc_tgt.c: QLogic Linux FCoE offload driver. 2 * Handles operations such as session offload/upload etc, and manages 3 * session resources such as connection id and qp resources. 4 * 5 * Copyright (c) 2008-2013 Broadcom Corporation 6 * Copyright (c) 2014-2016 QLogic Corporation 7 * Copyright (c) 2016-2017 Cavium Inc. 8 * 9 * This program is free software; you can redistribute it and/or modify 10 * it under the terms of the GNU General Public License as published by 11 * the Free Software Foundation. 12 * 13 * Written by: Bhanu Prakash Gollapudi (bprakash@broadcom.com) 14 */ 15 16 #include "bnx2fc.h" 17 static void bnx2fc_upld_timer(struct timer_list *t); 18 static void bnx2fc_ofld_timer(struct timer_list *t); 19 static int bnx2fc_init_tgt(struct bnx2fc_rport *tgt, 20 struct fcoe_port *port, 21 struct fc_rport_priv *rdata); 22 static u32 bnx2fc_alloc_conn_id(struct bnx2fc_hba *hba, 23 struct bnx2fc_rport *tgt); 24 static int bnx2fc_alloc_session_resc(struct bnx2fc_hba *hba, 25 struct bnx2fc_rport *tgt); 26 static void bnx2fc_free_session_resc(struct bnx2fc_hba *hba, 27 struct bnx2fc_rport *tgt); 28 static void bnx2fc_free_conn_id(struct bnx2fc_hba *hba, u32 conn_id); 29 30 static void bnx2fc_upld_timer(struct timer_list *t) 31 { 32 33 struct bnx2fc_rport *tgt = from_timer(tgt, t, upld_timer); 34 35 BNX2FC_TGT_DBG(tgt, "upld_timer - Upload compl not received!!\n"); 36 /* fake upload completion */ 37 clear_bit(BNX2FC_FLAG_OFFLOADED, &tgt->flags); 38 clear_bit(BNX2FC_FLAG_ENABLED, &tgt->flags); 39 set_bit(BNX2FC_FLAG_UPLD_REQ_COMPL, &tgt->flags); 40 wake_up_interruptible(&tgt->upld_wait); 41 } 42 43 static void bnx2fc_ofld_timer(struct timer_list *t) 44 { 45 46 struct bnx2fc_rport *tgt = from_timer(tgt, t, ofld_timer); 47 48 BNX2FC_TGT_DBG(tgt, "entered bnx2fc_ofld_timer\n"); 49 /* NOTE: This function should never be called, as 50 * offload should never timeout 51 */ 52 /* 53 * If the timer has expired, this session is dead 54 * Clear offloaded flag and logout of this device. 55 * Since OFFLOADED flag is cleared, this case 56 * will be considered as offload error and the 57 * port will be logged off, and conn_id, session 58 * resources are freed up in bnx2fc_offload_session 59 */ 60 clear_bit(BNX2FC_FLAG_OFFLOADED, &tgt->flags); 61 clear_bit(BNX2FC_FLAG_ENABLED, &tgt->flags); 62 set_bit(BNX2FC_FLAG_OFLD_REQ_CMPL, &tgt->flags); 63 wake_up_interruptible(&tgt->ofld_wait); 64 } 65 66 static void bnx2fc_ofld_wait(struct bnx2fc_rport *tgt) 67 { 68 timer_setup(&tgt->ofld_timer, bnx2fc_ofld_timer, 0); 69 mod_timer(&tgt->ofld_timer, jiffies + BNX2FC_FW_TIMEOUT); 70 71 wait_event_interruptible(tgt->ofld_wait, 72 (test_bit( 73 BNX2FC_FLAG_OFLD_REQ_CMPL, 74 &tgt->flags))); 75 if (signal_pending(current)) 76 flush_signals(current); 77 del_timer_sync(&tgt->ofld_timer); 78 } 79 80 static void bnx2fc_offload_session(struct fcoe_port *port, 81 struct bnx2fc_rport *tgt, 82 struct fc_rport_priv *rdata) 83 { 84 struct fc_rport *rport = rdata->rport; 85 struct bnx2fc_interface *interface = port->priv; 86 struct bnx2fc_hba *hba = interface->hba; 87 int rval; 88 int i = 0; 89 90 /* Initialize bnx2fc_rport */ 91 /* NOTE: tgt is already bzero'd */ 92 rval = bnx2fc_init_tgt(tgt, port, rdata); 93 if (rval) { 94 printk(KERN_ERR PFX "Failed to allocate conn id for " 95 "port_id (%6x)\n", rport->port_id); 96 goto tgt_init_err; 97 } 98 99 /* Allocate session resources */ 100 rval = bnx2fc_alloc_session_resc(hba, tgt); 101 if (rval) { 102 printk(KERN_ERR PFX "Failed to allocate resources\n"); 103 goto ofld_err; 104 } 105 106 /* 107 * Initialize FCoE session offload process. 108 * Upon completion of offload process add 109 * rport to list of rports 110 */ 111 retry_ofld: 112 clear_bit(BNX2FC_FLAG_OFLD_REQ_CMPL, &tgt->flags); 113 rval = bnx2fc_send_session_ofld_req(port, tgt); 114 if (rval) { 115 printk(KERN_ERR PFX "ofld_req failed\n"); 116 goto ofld_err; 117 } 118 119 /* 120 * wait for the session is offloaded and enabled. 3 Secs 121 * should be ample time for this process to complete. 122 */ 123 bnx2fc_ofld_wait(tgt); 124 125 if (!(test_bit(BNX2FC_FLAG_OFFLOADED, &tgt->flags))) { 126 if (test_and_clear_bit(BNX2FC_FLAG_CTX_ALLOC_FAILURE, 127 &tgt->flags)) { 128 BNX2FC_TGT_DBG(tgt, "ctx_alloc_failure, " 129 "retry ofld..%d\n", i++); 130 msleep_interruptible(1000); 131 if (i > 3) { 132 i = 0; 133 goto ofld_err; 134 } 135 goto retry_ofld; 136 } 137 goto ofld_err; 138 } 139 if (bnx2fc_map_doorbell(tgt)) { 140 printk(KERN_ERR PFX "map doorbell failed - no mem\n"); 141 goto ofld_err; 142 } 143 clear_bit(BNX2FC_FLAG_OFLD_REQ_CMPL, &tgt->flags); 144 rval = bnx2fc_send_session_enable_req(port, tgt); 145 if (rval) { 146 pr_err(PFX "enable session failed\n"); 147 goto ofld_err; 148 } 149 bnx2fc_ofld_wait(tgt); 150 if (!(test_bit(BNX2FC_FLAG_ENABLED, &tgt->flags))) 151 goto ofld_err; 152 return; 153 154 ofld_err: 155 /* couldn't offload the session. log off from this rport */ 156 BNX2FC_TGT_DBG(tgt, "bnx2fc_offload_session - offload error\n"); 157 clear_bit(BNX2FC_FLAG_OFFLOADED, &tgt->flags); 158 /* Free session resources */ 159 bnx2fc_free_session_resc(hba, tgt); 160 tgt_init_err: 161 if (tgt->fcoe_conn_id != -1) 162 bnx2fc_free_conn_id(hba, tgt->fcoe_conn_id); 163 fc_rport_logoff(rdata); 164 } 165 166 void bnx2fc_flush_active_ios(struct bnx2fc_rport *tgt) 167 { 168 struct bnx2fc_cmd *io_req; 169 struct bnx2fc_cmd *tmp; 170 int rc; 171 int i = 0; 172 BNX2FC_TGT_DBG(tgt, "Entered flush_active_ios - %d\n", 173 tgt->num_active_ios.counter); 174 175 spin_lock_bh(&tgt->tgt_lock); 176 tgt->flush_in_prog = 1; 177 178 list_for_each_entry_safe(io_req, tmp, &tgt->active_cmd_queue, link) { 179 i++; 180 list_del_init(&io_req->link); 181 io_req->on_active_queue = 0; 182 BNX2FC_IO_DBG(io_req, "cmd_queue cleanup\n"); 183 184 if (cancel_delayed_work(&io_req->timeout_work)) { 185 if (test_and_clear_bit(BNX2FC_FLAG_EH_ABORT, 186 &io_req->req_flags)) { 187 /* Handle eh_abort timeout */ 188 BNX2FC_IO_DBG(io_req, "eh_abort for IO " 189 "cleaned up\n"); 190 complete(&io_req->tm_done); 191 } 192 kref_put(&io_req->refcount, 193 bnx2fc_cmd_release); /* drop timer hold */ 194 } 195 196 set_bit(BNX2FC_FLAG_IO_COMPL, &io_req->req_flags); 197 set_bit(BNX2FC_FLAG_IO_CLEANUP, &io_req->req_flags); 198 199 /* Do not issue cleanup when disable request failed */ 200 if (test_bit(BNX2FC_FLAG_DISABLE_FAILED, &tgt->flags)) 201 bnx2fc_process_cleanup_compl(io_req, io_req->task, 0); 202 else { 203 rc = bnx2fc_initiate_cleanup(io_req); 204 BUG_ON(rc); 205 } 206 } 207 208 list_for_each_entry_safe(io_req, tmp, &tgt->active_tm_queue, link) { 209 i++; 210 list_del_init(&io_req->link); 211 io_req->on_tmf_queue = 0; 212 BNX2FC_IO_DBG(io_req, "tm_queue cleanup\n"); 213 if (io_req->wait_for_comp) 214 complete(&io_req->tm_done); 215 } 216 217 list_for_each_entry_safe(io_req, tmp, &tgt->els_queue, link) { 218 i++; 219 list_del_init(&io_req->link); 220 io_req->on_active_queue = 0; 221 222 BNX2FC_IO_DBG(io_req, "els_queue cleanup\n"); 223 224 if (cancel_delayed_work(&io_req->timeout_work)) 225 kref_put(&io_req->refcount, 226 bnx2fc_cmd_release); /* drop timer hold */ 227 228 if ((io_req->cb_func) && (io_req->cb_arg)) { 229 io_req->cb_func(io_req->cb_arg); 230 io_req->cb_arg = NULL; 231 } 232 233 /* Do not issue cleanup when disable request failed */ 234 if (test_bit(BNX2FC_FLAG_DISABLE_FAILED, &tgt->flags)) 235 bnx2fc_process_cleanup_compl(io_req, io_req->task, 0); 236 else { 237 rc = bnx2fc_initiate_cleanup(io_req); 238 BUG_ON(rc); 239 } 240 } 241 242 list_for_each_entry_safe(io_req, tmp, &tgt->io_retire_queue, link) { 243 i++; 244 list_del_init(&io_req->link); 245 246 BNX2FC_IO_DBG(io_req, "retire_queue flush\n"); 247 248 if (cancel_delayed_work(&io_req->timeout_work)) { 249 if (test_and_clear_bit(BNX2FC_FLAG_EH_ABORT, 250 &io_req->req_flags)) { 251 /* Handle eh_abort timeout */ 252 BNX2FC_IO_DBG(io_req, "eh_abort for IO " 253 "in retire_q\n"); 254 if (io_req->wait_for_comp) 255 complete(&io_req->tm_done); 256 } 257 kref_put(&io_req->refcount, bnx2fc_cmd_release); 258 } 259 260 clear_bit(BNX2FC_FLAG_ISSUE_RRQ, &io_req->req_flags); 261 } 262 263 BNX2FC_TGT_DBG(tgt, "IOs flushed = %d\n", i); 264 i = 0; 265 spin_unlock_bh(&tgt->tgt_lock); 266 /* wait for active_ios to go to 0 */ 267 while ((tgt->num_active_ios.counter != 0) && (i++ < BNX2FC_WAIT_CNT)) 268 msleep(25); 269 if (tgt->num_active_ios.counter != 0) 270 printk(KERN_ERR PFX "CLEANUP on port 0x%x:" 271 " active_ios = %d\n", 272 tgt->rdata->ids.port_id, tgt->num_active_ios.counter); 273 spin_lock_bh(&tgt->tgt_lock); 274 tgt->flush_in_prog = 0; 275 spin_unlock_bh(&tgt->tgt_lock); 276 } 277 278 static void bnx2fc_upld_wait(struct bnx2fc_rport *tgt) 279 { 280 timer_setup(&tgt->upld_timer, bnx2fc_upld_timer, 0); 281 mod_timer(&tgt->upld_timer, jiffies + BNX2FC_FW_TIMEOUT); 282 wait_event_interruptible(tgt->upld_wait, 283 (test_bit( 284 BNX2FC_FLAG_UPLD_REQ_COMPL, 285 &tgt->flags))); 286 if (signal_pending(current)) 287 flush_signals(current); 288 del_timer_sync(&tgt->upld_timer); 289 } 290 291 static void bnx2fc_upload_session(struct fcoe_port *port, 292 struct bnx2fc_rport *tgt) 293 { 294 struct bnx2fc_interface *interface = port->priv; 295 struct bnx2fc_hba *hba = interface->hba; 296 297 BNX2FC_TGT_DBG(tgt, "upload_session: active_ios = %d\n", 298 tgt->num_active_ios.counter); 299 300 /* 301 * Called with hba->hba_mutex held. 302 * This is a blocking call 303 */ 304 clear_bit(BNX2FC_FLAG_UPLD_REQ_COMPL, &tgt->flags); 305 bnx2fc_send_session_disable_req(port, tgt); 306 307 /* 308 * wait for upload to complete. 3 Secs 309 * should be sufficient time for this process to complete. 310 */ 311 BNX2FC_TGT_DBG(tgt, "waiting for disable compl\n"); 312 bnx2fc_upld_wait(tgt); 313 314 /* 315 * traverse thru the active_q and tmf_q and cleanup 316 * IOs in these lists 317 */ 318 BNX2FC_TGT_DBG(tgt, "flush/upload - disable wait flags = 0x%lx\n", 319 tgt->flags); 320 bnx2fc_flush_active_ios(tgt); 321 322 /* Issue destroy KWQE */ 323 if (test_bit(BNX2FC_FLAG_DISABLED, &tgt->flags)) { 324 BNX2FC_TGT_DBG(tgt, "send destroy req\n"); 325 clear_bit(BNX2FC_FLAG_UPLD_REQ_COMPL, &tgt->flags); 326 bnx2fc_send_session_destroy_req(hba, tgt); 327 328 /* wait for destroy to complete */ 329 bnx2fc_upld_wait(tgt); 330 331 if (!(test_bit(BNX2FC_FLAG_DESTROYED, &tgt->flags))) 332 printk(KERN_ERR PFX "ERROR!! destroy timed out\n"); 333 334 BNX2FC_TGT_DBG(tgt, "destroy wait complete flags = 0x%lx\n", 335 tgt->flags); 336 337 } else if (test_bit(BNX2FC_FLAG_DISABLE_FAILED, &tgt->flags)) { 338 printk(KERN_ERR PFX "ERROR!! DISABLE req failed, destroy" 339 " not sent to FW\n"); 340 } else { 341 printk(KERN_ERR PFX "ERROR!! DISABLE req timed out, destroy" 342 " not sent to FW\n"); 343 } 344 345 /* Free session resources */ 346 bnx2fc_free_session_resc(hba, tgt); 347 bnx2fc_free_conn_id(hba, tgt->fcoe_conn_id); 348 } 349 350 static int bnx2fc_init_tgt(struct bnx2fc_rport *tgt, 351 struct fcoe_port *port, 352 struct fc_rport_priv *rdata) 353 { 354 355 struct fc_rport *rport = rdata->rport; 356 struct bnx2fc_interface *interface = port->priv; 357 struct bnx2fc_hba *hba = interface->hba; 358 struct b577xx_doorbell_set_prod *sq_db = &tgt->sq_db; 359 struct b577xx_fcoe_rx_doorbell *rx_db = &tgt->rx_db; 360 361 tgt->rport = rport; 362 tgt->rdata = rdata; 363 tgt->port = port; 364 365 if (hba->num_ofld_sess >= BNX2FC_NUM_MAX_SESS) { 366 BNX2FC_TGT_DBG(tgt, "exceeded max sessions. logoff this tgt\n"); 367 tgt->fcoe_conn_id = -1; 368 return -1; 369 } 370 371 tgt->fcoe_conn_id = bnx2fc_alloc_conn_id(hba, tgt); 372 if (tgt->fcoe_conn_id == -1) 373 return -1; 374 375 BNX2FC_TGT_DBG(tgt, "init_tgt - conn_id = 0x%x\n", tgt->fcoe_conn_id); 376 377 tgt->max_sqes = BNX2FC_SQ_WQES_MAX; 378 tgt->max_rqes = BNX2FC_RQ_WQES_MAX; 379 tgt->max_cqes = BNX2FC_CQ_WQES_MAX; 380 atomic_set(&tgt->free_sqes, BNX2FC_SQ_WQES_MAX); 381 382 /* Initialize the toggle bit */ 383 tgt->sq_curr_toggle_bit = 1; 384 tgt->cq_curr_toggle_bit = 1; 385 tgt->sq_prod_idx = 0; 386 tgt->cq_cons_idx = 0; 387 tgt->rq_prod_idx = 0x8000; 388 tgt->rq_cons_idx = 0; 389 atomic_set(&tgt->num_active_ios, 0); 390 tgt->retry_delay_timestamp = 0; 391 392 if (rdata->flags & FC_RP_FLAGS_RETRY && 393 rdata->ids.roles & FC_RPORT_ROLE_FCP_TARGET && 394 !(rdata->ids.roles & FC_RPORT_ROLE_FCP_INITIATOR)) { 395 tgt->dev_type = TYPE_TAPE; 396 tgt->io_timeout = 0; /* use default ULP timeout */ 397 } else { 398 tgt->dev_type = TYPE_DISK; 399 tgt->io_timeout = BNX2FC_IO_TIMEOUT; 400 } 401 402 /* initialize sq doorbell */ 403 sq_db->header.header = B577XX_DOORBELL_HDR_DB_TYPE; 404 sq_db->header.header |= B577XX_FCOE_CONNECTION_TYPE << 405 B577XX_DOORBELL_HDR_CONN_TYPE_SHIFT; 406 /* initialize rx doorbell */ 407 rx_db->hdr.header = ((0x1 << B577XX_DOORBELL_HDR_RX_SHIFT) | 408 (0x1 << B577XX_DOORBELL_HDR_DB_TYPE_SHIFT) | 409 (B577XX_FCOE_CONNECTION_TYPE << 410 B577XX_DOORBELL_HDR_CONN_TYPE_SHIFT)); 411 rx_db->params = (0x2 << B577XX_FCOE_RX_DOORBELL_NEGATIVE_ARM_SHIFT) | 412 (0x3 << B577XX_FCOE_RX_DOORBELL_OPCODE_SHIFT); 413 414 spin_lock_init(&tgt->tgt_lock); 415 spin_lock_init(&tgt->cq_lock); 416 417 /* Initialize active_cmd_queue list */ 418 INIT_LIST_HEAD(&tgt->active_cmd_queue); 419 420 /* Initialize IO retire queue */ 421 INIT_LIST_HEAD(&tgt->io_retire_queue); 422 423 INIT_LIST_HEAD(&tgt->els_queue); 424 425 /* Initialize active_tm_queue list */ 426 INIT_LIST_HEAD(&tgt->active_tm_queue); 427 428 init_waitqueue_head(&tgt->ofld_wait); 429 init_waitqueue_head(&tgt->upld_wait); 430 431 return 0; 432 } 433 434 /** 435 * This event_callback is called after successful completion of libfc 436 * initiated target login. bnx2fc can proceed with initiating the session 437 * establishment. 438 */ 439 void bnx2fc_rport_event_handler(struct fc_lport *lport, 440 struct fc_rport_priv *rdata, 441 enum fc_rport_event event) 442 { 443 struct fcoe_port *port = lport_priv(lport); 444 struct bnx2fc_interface *interface = port->priv; 445 struct bnx2fc_hba *hba = interface->hba; 446 struct fc_rport *rport = rdata->rport; 447 struct fc_rport_libfc_priv *rp; 448 struct bnx2fc_rport *tgt; 449 u32 port_id; 450 451 BNX2FC_HBA_DBG(lport, "rport_event_hdlr: event = %d, port_id = 0x%x\n", 452 event, rdata->ids.port_id); 453 switch (event) { 454 case RPORT_EV_READY: 455 if (!rport) { 456 printk(KERN_ERR PFX "rport is NULL: ERROR!\n"); 457 break; 458 } 459 460 rp = rport->dd_data; 461 if (rport->port_id == FC_FID_DIR_SERV) { 462 /* 463 * bnx2fc_rport structure doesn't exist for 464 * directory server. 465 * We should not come here, as lport will 466 * take care of fabric login 467 */ 468 printk(KERN_ERR PFX "%x - rport_event_handler ERROR\n", 469 rdata->ids.port_id); 470 break; 471 } 472 473 if (rdata->spp_type != FC_TYPE_FCP) { 474 BNX2FC_HBA_DBG(lport, "not FCP type target." 475 " not offloading\n"); 476 break; 477 } 478 if (!(rdata->ids.roles & FC_RPORT_ROLE_FCP_TARGET)) { 479 BNX2FC_HBA_DBG(lport, "not FCP_TARGET" 480 " not offloading\n"); 481 break; 482 } 483 484 /* 485 * Offlaod process is protected with hba mutex. 486 * Use the same mutex_lock for upload process too 487 */ 488 mutex_lock(&hba->hba_mutex); 489 tgt = (struct bnx2fc_rport *)&rp[1]; 490 491 /* This can happen when ADISC finds the same target */ 492 if (test_bit(BNX2FC_FLAG_ENABLED, &tgt->flags)) { 493 BNX2FC_TGT_DBG(tgt, "already offloaded\n"); 494 mutex_unlock(&hba->hba_mutex); 495 return; 496 } 497 498 /* 499 * Offload the session. This is a blocking call, and will 500 * wait until the session is offloaded. 501 */ 502 bnx2fc_offload_session(port, tgt, rdata); 503 504 BNX2FC_TGT_DBG(tgt, "OFFLOAD num_ofld_sess = %d\n", 505 hba->num_ofld_sess); 506 507 if (test_bit(BNX2FC_FLAG_ENABLED, &tgt->flags)) { 508 /* Session is offloaded and enabled. */ 509 BNX2FC_TGT_DBG(tgt, "sess offloaded\n"); 510 /* This counter is protected with hba mutex */ 511 hba->num_ofld_sess++; 512 513 set_bit(BNX2FC_FLAG_SESSION_READY, &tgt->flags); 514 } else { 515 /* 516 * Offload or enable would have failed. 517 * In offload/enable completion path, the 518 * rport would have already been removed 519 */ 520 BNX2FC_TGT_DBG(tgt, "Port is being logged off as " 521 "offloaded flag not set\n"); 522 } 523 mutex_unlock(&hba->hba_mutex); 524 break; 525 case RPORT_EV_LOGO: 526 case RPORT_EV_FAILED: 527 case RPORT_EV_STOP: 528 port_id = rdata->ids.port_id; 529 if (port_id == FC_FID_DIR_SERV) 530 break; 531 532 if (!rport) { 533 printk(KERN_INFO PFX "%x - rport not created Yet!!\n", 534 port_id); 535 break; 536 } 537 rp = rport->dd_data; 538 mutex_lock(&hba->hba_mutex); 539 /* 540 * Perform session upload. Note that rdata->peers is already 541 * removed from disc->rports list before we get this event. 542 */ 543 tgt = (struct bnx2fc_rport *)&rp[1]; 544 545 if (!(test_bit(BNX2FC_FLAG_ENABLED, &tgt->flags))) { 546 mutex_unlock(&hba->hba_mutex); 547 break; 548 } 549 clear_bit(BNX2FC_FLAG_SESSION_READY, &tgt->flags); 550 551 bnx2fc_upload_session(port, tgt); 552 hba->num_ofld_sess--; 553 BNX2FC_TGT_DBG(tgt, "UPLOAD num_ofld_sess = %d\n", 554 hba->num_ofld_sess); 555 /* 556 * Try to wake up the linkdown wait thread. If num_ofld_sess 557 * is 0, the waiting therad wakes up 558 */ 559 if ((hba->wait_for_link_down) && 560 (hba->num_ofld_sess == 0)) { 561 wake_up_interruptible(&hba->shutdown_wait); 562 } 563 mutex_unlock(&hba->hba_mutex); 564 565 break; 566 567 case RPORT_EV_NONE: 568 break; 569 } 570 } 571 572 /** 573 * bnx2fc_tgt_lookup() - Lookup a bnx2fc_rport by port_id 574 * 575 * @port: fcoe_port struct to lookup the target port on 576 * @port_id: The remote port ID to look up 577 */ 578 struct bnx2fc_rport *bnx2fc_tgt_lookup(struct fcoe_port *port, 579 u32 port_id) 580 { 581 struct bnx2fc_interface *interface = port->priv; 582 struct bnx2fc_hba *hba = interface->hba; 583 struct bnx2fc_rport *tgt; 584 struct fc_rport_priv *rdata; 585 int i; 586 587 for (i = 0; i < BNX2FC_NUM_MAX_SESS; i++) { 588 tgt = hba->tgt_ofld_list[i]; 589 if ((tgt) && (tgt->port == port)) { 590 rdata = tgt->rdata; 591 if (rdata->ids.port_id == port_id) { 592 if (rdata->rp_state != RPORT_ST_DELETE) { 593 BNX2FC_TGT_DBG(tgt, "rport " 594 "obtained\n"); 595 return tgt; 596 } else { 597 BNX2FC_TGT_DBG(tgt, "rport 0x%x " 598 "is in DELETED state\n", 599 rdata->ids.port_id); 600 return NULL; 601 } 602 } 603 } 604 } 605 return NULL; 606 } 607 608 609 /** 610 * bnx2fc_alloc_conn_id - allocates FCOE Connection id 611 * 612 * @hba: pointer to adapter structure 613 * @tgt: pointer to bnx2fc_rport structure 614 */ 615 static u32 bnx2fc_alloc_conn_id(struct bnx2fc_hba *hba, 616 struct bnx2fc_rport *tgt) 617 { 618 u32 conn_id, next; 619 620 /* called with hba mutex held */ 621 622 /* 623 * tgt_ofld_list access is synchronized using 624 * both hba mutex and hba lock. Atleast hba mutex or 625 * hba lock needs to be held for read access. 626 */ 627 628 spin_lock_bh(&hba->hba_lock); 629 next = hba->next_conn_id; 630 conn_id = hba->next_conn_id++; 631 if (hba->next_conn_id == BNX2FC_NUM_MAX_SESS) 632 hba->next_conn_id = 0; 633 634 while (hba->tgt_ofld_list[conn_id] != NULL) { 635 conn_id++; 636 if (conn_id == BNX2FC_NUM_MAX_SESS) 637 conn_id = 0; 638 639 if (conn_id == next) { 640 /* No free conn_ids are available */ 641 spin_unlock_bh(&hba->hba_lock); 642 return -1; 643 } 644 } 645 hba->tgt_ofld_list[conn_id] = tgt; 646 tgt->fcoe_conn_id = conn_id; 647 spin_unlock_bh(&hba->hba_lock); 648 return conn_id; 649 } 650 651 static void bnx2fc_free_conn_id(struct bnx2fc_hba *hba, u32 conn_id) 652 { 653 /* called with hba mutex held */ 654 spin_lock_bh(&hba->hba_lock); 655 hba->tgt_ofld_list[conn_id] = NULL; 656 spin_unlock_bh(&hba->hba_lock); 657 } 658 659 /** 660 *bnx2fc_alloc_session_resc - Allocate qp resources for the session 661 * 662 */ 663 static int bnx2fc_alloc_session_resc(struct bnx2fc_hba *hba, 664 struct bnx2fc_rport *tgt) 665 { 666 dma_addr_t page; 667 int num_pages; 668 u32 *pbl; 669 670 /* Allocate and map SQ */ 671 tgt->sq_mem_size = tgt->max_sqes * BNX2FC_SQ_WQE_SIZE; 672 tgt->sq_mem_size = (tgt->sq_mem_size + (CNIC_PAGE_SIZE - 1)) & 673 CNIC_PAGE_MASK; 674 675 tgt->sq = dma_zalloc_coherent(&hba->pcidev->dev, tgt->sq_mem_size, 676 &tgt->sq_dma, GFP_KERNEL); 677 if (!tgt->sq) { 678 printk(KERN_ERR PFX "unable to allocate SQ memory %d\n", 679 tgt->sq_mem_size); 680 goto mem_alloc_failure; 681 } 682 683 /* Allocate and map CQ */ 684 tgt->cq_mem_size = tgt->max_cqes * BNX2FC_CQ_WQE_SIZE; 685 tgt->cq_mem_size = (tgt->cq_mem_size + (CNIC_PAGE_SIZE - 1)) & 686 CNIC_PAGE_MASK; 687 688 tgt->cq = dma_zalloc_coherent(&hba->pcidev->dev, tgt->cq_mem_size, 689 &tgt->cq_dma, GFP_KERNEL); 690 if (!tgt->cq) { 691 printk(KERN_ERR PFX "unable to allocate CQ memory %d\n", 692 tgt->cq_mem_size); 693 goto mem_alloc_failure; 694 } 695 696 /* Allocate and map RQ and RQ PBL */ 697 tgt->rq_mem_size = tgt->max_rqes * BNX2FC_RQ_WQE_SIZE; 698 tgt->rq_mem_size = (tgt->rq_mem_size + (CNIC_PAGE_SIZE - 1)) & 699 CNIC_PAGE_MASK; 700 701 tgt->rq = dma_zalloc_coherent(&hba->pcidev->dev, tgt->rq_mem_size, 702 &tgt->rq_dma, GFP_KERNEL); 703 if (!tgt->rq) { 704 printk(KERN_ERR PFX "unable to allocate RQ memory %d\n", 705 tgt->rq_mem_size); 706 goto mem_alloc_failure; 707 } 708 709 tgt->rq_pbl_size = (tgt->rq_mem_size / CNIC_PAGE_SIZE) * sizeof(void *); 710 tgt->rq_pbl_size = (tgt->rq_pbl_size + (CNIC_PAGE_SIZE - 1)) & 711 CNIC_PAGE_MASK; 712 713 tgt->rq_pbl = dma_zalloc_coherent(&hba->pcidev->dev, tgt->rq_pbl_size, 714 &tgt->rq_pbl_dma, GFP_KERNEL); 715 if (!tgt->rq_pbl) { 716 printk(KERN_ERR PFX "unable to allocate RQ PBL %d\n", 717 tgt->rq_pbl_size); 718 goto mem_alloc_failure; 719 } 720 721 num_pages = tgt->rq_mem_size / CNIC_PAGE_SIZE; 722 page = tgt->rq_dma; 723 pbl = (u32 *)tgt->rq_pbl; 724 725 while (num_pages--) { 726 *pbl = (u32)page; 727 pbl++; 728 *pbl = (u32)((u64)page >> 32); 729 pbl++; 730 page += CNIC_PAGE_SIZE; 731 } 732 733 /* Allocate and map XFERQ */ 734 tgt->xferq_mem_size = tgt->max_sqes * BNX2FC_XFERQ_WQE_SIZE; 735 tgt->xferq_mem_size = (tgt->xferq_mem_size + (CNIC_PAGE_SIZE - 1)) & 736 CNIC_PAGE_MASK; 737 738 tgt->xferq = dma_zalloc_coherent(&hba->pcidev->dev, 739 tgt->xferq_mem_size, &tgt->xferq_dma, 740 GFP_KERNEL); 741 if (!tgt->xferq) { 742 printk(KERN_ERR PFX "unable to allocate XFERQ %d\n", 743 tgt->xferq_mem_size); 744 goto mem_alloc_failure; 745 } 746 747 /* Allocate and map CONFQ & CONFQ PBL */ 748 tgt->confq_mem_size = tgt->max_sqes * BNX2FC_CONFQ_WQE_SIZE; 749 tgt->confq_mem_size = (tgt->confq_mem_size + (CNIC_PAGE_SIZE - 1)) & 750 CNIC_PAGE_MASK; 751 752 tgt->confq = dma_zalloc_coherent(&hba->pcidev->dev, 753 tgt->confq_mem_size, &tgt->confq_dma, 754 GFP_KERNEL); 755 if (!tgt->confq) { 756 printk(KERN_ERR PFX "unable to allocate CONFQ %d\n", 757 tgt->confq_mem_size); 758 goto mem_alloc_failure; 759 } 760 761 tgt->confq_pbl_size = 762 (tgt->confq_mem_size / CNIC_PAGE_SIZE) * sizeof(void *); 763 tgt->confq_pbl_size = 764 (tgt->confq_pbl_size + (CNIC_PAGE_SIZE - 1)) & CNIC_PAGE_MASK; 765 766 tgt->confq_pbl = dma_zalloc_coherent(&hba->pcidev->dev, 767 tgt->confq_pbl_size, 768 &tgt->confq_pbl_dma, GFP_KERNEL); 769 if (!tgt->confq_pbl) { 770 printk(KERN_ERR PFX "unable to allocate CONFQ PBL %d\n", 771 tgt->confq_pbl_size); 772 goto mem_alloc_failure; 773 } 774 775 num_pages = tgt->confq_mem_size / CNIC_PAGE_SIZE; 776 page = tgt->confq_dma; 777 pbl = (u32 *)tgt->confq_pbl; 778 779 while (num_pages--) { 780 *pbl = (u32)page; 781 pbl++; 782 *pbl = (u32)((u64)page >> 32); 783 pbl++; 784 page += CNIC_PAGE_SIZE; 785 } 786 787 /* Allocate and map ConnDB */ 788 tgt->conn_db_mem_size = sizeof(struct fcoe_conn_db); 789 790 tgt->conn_db = dma_zalloc_coherent(&hba->pcidev->dev, 791 tgt->conn_db_mem_size, 792 &tgt->conn_db_dma, GFP_KERNEL); 793 if (!tgt->conn_db) { 794 printk(KERN_ERR PFX "unable to allocate conn_db %d\n", 795 tgt->conn_db_mem_size); 796 goto mem_alloc_failure; 797 } 798 799 800 /* Allocate and map LCQ */ 801 tgt->lcq_mem_size = (tgt->max_sqes + 8) * BNX2FC_SQ_WQE_SIZE; 802 tgt->lcq_mem_size = (tgt->lcq_mem_size + (CNIC_PAGE_SIZE - 1)) & 803 CNIC_PAGE_MASK; 804 805 tgt->lcq = dma_zalloc_coherent(&hba->pcidev->dev, tgt->lcq_mem_size, 806 &tgt->lcq_dma, GFP_KERNEL); 807 808 if (!tgt->lcq) { 809 printk(KERN_ERR PFX "unable to allocate lcq %d\n", 810 tgt->lcq_mem_size); 811 goto mem_alloc_failure; 812 } 813 814 tgt->conn_db->rq_prod = 0x8000; 815 816 return 0; 817 818 mem_alloc_failure: 819 return -ENOMEM; 820 } 821 822 /** 823 * bnx2i_free_session_resc - free qp resources for the session 824 * 825 * @hba: adapter structure pointer 826 * @tgt: bnx2fc_rport structure pointer 827 * 828 * Free QP resources - SQ/RQ/CQ/XFERQ memory and PBL 829 */ 830 static void bnx2fc_free_session_resc(struct bnx2fc_hba *hba, 831 struct bnx2fc_rport *tgt) 832 { 833 void __iomem *ctx_base_ptr; 834 835 BNX2FC_TGT_DBG(tgt, "Freeing up session resources\n"); 836 837 spin_lock_bh(&tgt->cq_lock); 838 ctx_base_ptr = tgt->ctx_base; 839 tgt->ctx_base = NULL; 840 841 /* Free LCQ */ 842 if (tgt->lcq) { 843 dma_free_coherent(&hba->pcidev->dev, tgt->lcq_mem_size, 844 tgt->lcq, tgt->lcq_dma); 845 tgt->lcq = NULL; 846 } 847 /* Free connDB */ 848 if (tgt->conn_db) { 849 dma_free_coherent(&hba->pcidev->dev, tgt->conn_db_mem_size, 850 tgt->conn_db, tgt->conn_db_dma); 851 tgt->conn_db = NULL; 852 } 853 /* Free confq and confq pbl */ 854 if (tgt->confq_pbl) { 855 dma_free_coherent(&hba->pcidev->dev, tgt->confq_pbl_size, 856 tgt->confq_pbl, tgt->confq_pbl_dma); 857 tgt->confq_pbl = NULL; 858 } 859 if (tgt->confq) { 860 dma_free_coherent(&hba->pcidev->dev, tgt->confq_mem_size, 861 tgt->confq, tgt->confq_dma); 862 tgt->confq = NULL; 863 } 864 /* Free XFERQ */ 865 if (tgt->xferq) { 866 dma_free_coherent(&hba->pcidev->dev, tgt->xferq_mem_size, 867 tgt->xferq, tgt->xferq_dma); 868 tgt->xferq = NULL; 869 } 870 /* Free RQ PBL and RQ */ 871 if (tgt->rq_pbl) { 872 dma_free_coherent(&hba->pcidev->dev, tgt->rq_pbl_size, 873 tgt->rq_pbl, tgt->rq_pbl_dma); 874 tgt->rq_pbl = NULL; 875 } 876 if (tgt->rq) { 877 dma_free_coherent(&hba->pcidev->dev, tgt->rq_mem_size, 878 tgt->rq, tgt->rq_dma); 879 tgt->rq = NULL; 880 } 881 /* Free CQ */ 882 if (tgt->cq) { 883 dma_free_coherent(&hba->pcidev->dev, tgt->cq_mem_size, 884 tgt->cq, tgt->cq_dma); 885 tgt->cq = NULL; 886 } 887 /* Free SQ */ 888 if (tgt->sq) { 889 dma_free_coherent(&hba->pcidev->dev, tgt->sq_mem_size, 890 tgt->sq, tgt->sq_dma); 891 tgt->sq = NULL; 892 } 893 spin_unlock_bh(&tgt->cq_lock); 894 895 if (ctx_base_ptr) 896 iounmap(ctx_base_ptr); 897 } 898