1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * Thunderbolt XDomain discovery protocol support
4 *
5 * Copyright (C) 2017, Intel Corporation
6 * Authors: Michael Jamet <michael.jamet@intel.com>
7 * Mika Westerberg <mika.westerberg@linux.intel.com>
8 */
9
10 #include <linux/device.h>
11 #include <linux/delay.h>
12 #include <linux/kmod.h>
13 #include <linux/module.h>
14 #include <linux/pm_runtime.h>
15 #include <linux/prandom.h>
16 #include <linux/utsname.h>
17 #include <linux/uuid.h>
18 #include <linux/workqueue.h>
19
20 #include "tb.h"
21
22 #define XDOMAIN_SHORT_TIMEOUT 100 /* ms */
23 #define XDOMAIN_DEFAULT_TIMEOUT 1000 /* ms */
24 #define XDOMAIN_BONDING_TIMEOUT 10000 /* ms */
25 #define XDOMAIN_RETRIES 10
26 #define XDOMAIN_DEFAULT_MAX_HOPID 15
27
28 enum {
29 XDOMAIN_STATE_INIT,
30 XDOMAIN_STATE_UUID,
31 XDOMAIN_STATE_LINK_STATUS,
32 XDOMAIN_STATE_LINK_STATE_CHANGE,
33 XDOMAIN_STATE_LINK_STATUS2,
34 XDOMAIN_STATE_BONDING_UUID_LOW,
35 XDOMAIN_STATE_BONDING_UUID_HIGH,
36 XDOMAIN_STATE_PROPERTIES,
37 XDOMAIN_STATE_ENUMERATED,
38 XDOMAIN_STATE_ERROR,
39 };
40
41 static const char * const state_names[] = {
42 [XDOMAIN_STATE_INIT] = "INIT",
43 [XDOMAIN_STATE_UUID] = "UUID",
44 [XDOMAIN_STATE_LINK_STATUS] = "LINK_STATUS",
45 [XDOMAIN_STATE_LINK_STATE_CHANGE] = "LINK_STATE_CHANGE",
46 [XDOMAIN_STATE_LINK_STATUS2] = "LINK_STATUS2",
47 [XDOMAIN_STATE_BONDING_UUID_LOW] = "BONDING_UUID_LOW",
48 [XDOMAIN_STATE_BONDING_UUID_HIGH] = "BONDING_UUID_HIGH",
49 [XDOMAIN_STATE_PROPERTIES] = "PROPERTIES",
50 [XDOMAIN_STATE_ENUMERATED] = "ENUMERATED",
51 [XDOMAIN_STATE_ERROR] = "ERROR",
52 };
53
54 struct xdomain_request_work {
55 struct work_struct work;
56 struct tb_xdp_header *pkg;
57 struct tb *tb;
58 };
59
60 static bool tb_xdomain_enabled = true;
61 module_param_named(xdomain, tb_xdomain_enabled, bool, 0444);
62 MODULE_PARM_DESC(xdomain, "allow XDomain protocol (default: true)");
63
64 /*
65 * Serializes access to the properties and protocol handlers below. If
66 * you need to take both this lock and the struct tb_xdomain lock, take
67 * this one first.
68 */
69 static DEFINE_MUTEX(xdomain_lock);
70
71 /* Properties exposed to the remote domains */
72 static struct tb_property_dir *xdomain_property_dir;
73 static u32 xdomain_property_block_gen;
74
75 /* Additional protocol handlers */
76 static LIST_HEAD(protocol_handlers);
77
78 /* UUID for XDomain discovery protocol: b638d70e-42ff-40bb-97c2-90e2c0b2ff07 */
79 static const uuid_t tb_xdp_uuid =
80 UUID_INIT(0xb638d70e, 0x42ff, 0x40bb,
81 0x97, 0xc2, 0x90, 0xe2, 0xc0, 0xb2, 0xff, 0x07);
82
tb_is_xdomain_enabled(void)83 bool tb_is_xdomain_enabled(void)
84 {
85 return tb_xdomain_enabled && tb_acpi_is_xdomain_allowed();
86 }
87
tb_xdomain_match(const struct tb_cfg_request * req,const struct ctl_pkg * pkg)88 static bool tb_xdomain_match(const struct tb_cfg_request *req,
89 const struct ctl_pkg *pkg)
90 {
91 switch (pkg->frame.eof) {
92 case TB_CFG_PKG_ERROR:
93 return true;
94
95 case TB_CFG_PKG_XDOMAIN_RESP: {
96 const struct tb_xdp_header *res_hdr = pkg->buffer;
97 const struct tb_xdp_header *req_hdr = req->request;
98
99 if (pkg->frame.size < req->response_size / 4)
100 return false;
101
102 /* Make sure route matches */
103 if ((res_hdr->xd_hdr.route_hi & ~BIT(31)) !=
104 req_hdr->xd_hdr.route_hi)
105 return false;
106 if ((res_hdr->xd_hdr.route_lo) != req_hdr->xd_hdr.route_lo)
107 return false;
108
109 /* Check that the XDomain protocol matches */
110 if (!uuid_equal(&res_hdr->uuid, &req_hdr->uuid))
111 return false;
112
113 return true;
114 }
115
116 default:
117 return false;
118 }
119 }
120
tb_xdomain_copy(struct tb_cfg_request * req,const struct ctl_pkg * pkg)121 static bool tb_xdomain_copy(struct tb_cfg_request *req,
122 const struct ctl_pkg *pkg)
123 {
124 memcpy(req->response, pkg->buffer, req->response_size);
125 req->result.err = 0;
126 return true;
127 }
128
response_ready(void * data)129 static void response_ready(void *data)
130 {
131 tb_cfg_request_put(data);
132 }
133
__tb_xdomain_response(struct tb_ctl * ctl,const void * response,size_t size,enum tb_cfg_pkg_type type)134 static int __tb_xdomain_response(struct tb_ctl *ctl, const void *response,
135 size_t size, enum tb_cfg_pkg_type type)
136 {
137 struct tb_cfg_request *req;
138
139 req = tb_cfg_request_alloc();
140 if (!req)
141 return -ENOMEM;
142
143 req->match = tb_xdomain_match;
144 req->copy = tb_xdomain_copy;
145 req->request = response;
146 req->request_size = size;
147 req->request_type = type;
148
149 return tb_cfg_request(ctl, req, response_ready, req);
150 }
151
152 /**
153 * tb_xdomain_response() - Send a XDomain response message
154 * @xd: XDomain to send the message
155 * @response: Response to send
156 * @size: Size of the response
157 * @type: PDF type of the response
158 *
159 * This can be used to send a XDomain response message to the other
160 * domain. No response for the message is expected.
161 *
162 * Return: %0 in case of success and negative errno in case of failure
163 */
tb_xdomain_response(struct tb_xdomain * xd,const void * response,size_t size,enum tb_cfg_pkg_type type)164 int tb_xdomain_response(struct tb_xdomain *xd, const void *response,
165 size_t size, enum tb_cfg_pkg_type type)
166 {
167 return __tb_xdomain_response(xd->tb->ctl, response, size, type);
168 }
169 EXPORT_SYMBOL_GPL(tb_xdomain_response);
170
__tb_xdomain_request(struct tb_ctl * ctl,const void * request,size_t request_size,enum tb_cfg_pkg_type request_type,void * response,size_t response_size,enum tb_cfg_pkg_type response_type,unsigned int timeout_msec)171 static int __tb_xdomain_request(struct tb_ctl *ctl, const void *request,
172 size_t request_size, enum tb_cfg_pkg_type request_type, void *response,
173 size_t response_size, enum tb_cfg_pkg_type response_type,
174 unsigned int timeout_msec)
175 {
176 struct tb_cfg_request *req;
177 struct tb_cfg_result res;
178
179 req = tb_cfg_request_alloc();
180 if (!req)
181 return -ENOMEM;
182
183 req->match = tb_xdomain_match;
184 req->copy = tb_xdomain_copy;
185 req->request = request;
186 req->request_size = request_size;
187 req->request_type = request_type;
188 req->response = response;
189 req->response_size = response_size;
190 req->response_type = response_type;
191
192 res = tb_cfg_request_sync(ctl, req, timeout_msec);
193
194 tb_cfg_request_put(req);
195
196 return res.err == 1 ? -EIO : res.err;
197 }
198
199 /**
200 * tb_xdomain_request() - Send a XDomain request
201 * @xd: XDomain to send the request
202 * @request: Request to send
203 * @request_size: Size of the request in bytes
204 * @request_type: PDF type of the request
205 * @response: Response is copied here
206 * @response_size: Expected size of the response in bytes
207 * @response_type: Expected PDF type of the response
208 * @timeout_msec: Timeout in milliseconds to wait for the response
209 *
210 * This function can be used to send XDomain control channel messages to
211 * the other domain. The function waits until the response is received
212 * or when timeout triggers. Whichever comes first.
213 *
214 * Return: %0 in case of success and negative errno in case of failure
215 */
tb_xdomain_request(struct tb_xdomain * xd,const void * request,size_t request_size,enum tb_cfg_pkg_type request_type,void * response,size_t response_size,enum tb_cfg_pkg_type response_type,unsigned int timeout_msec)216 int tb_xdomain_request(struct tb_xdomain *xd, const void *request,
217 size_t request_size, enum tb_cfg_pkg_type request_type,
218 void *response, size_t response_size,
219 enum tb_cfg_pkg_type response_type, unsigned int timeout_msec)
220 {
221 return __tb_xdomain_request(xd->tb->ctl, request, request_size,
222 request_type, response, response_size,
223 response_type, timeout_msec);
224 }
225 EXPORT_SYMBOL_GPL(tb_xdomain_request);
226
tb_xdp_fill_header(struct tb_xdp_header * hdr,u64 route,u8 sequence,enum tb_xdp_type type,size_t size)227 static inline void tb_xdp_fill_header(struct tb_xdp_header *hdr, u64 route,
228 u8 sequence, enum tb_xdp_type type, size_t size)
229 {
230 u32 length_sn;
231
232 length_sn = (size - sizeof(hdr->xd_hdr)) / 4;
233 length_sn |= (sequence << TB_XDOMAIN_SN_SHIFT) & TB_XDOMAIN_SN_MASK;
234
235 hdr->xd_hdr.route_hi = upper_32_bits(route);
236 hdr->xd_hdr.route_lo = lower_32_bits(route);
237 hdr->xd_hdr.length_sn = length_sn;
238 hdr->type = type;
239 memcpy(&hdr->uuid, &tb_xdp_uuid, sizeof(tb_xdp_uuid));
240 }
241
tb_xdp_handle_error(const struct tb_xdp_error_response * res)242 static int tb_xdp_handle_error(const struct tb_xdp_error_response *res)
243 {
244 if (res->hdr.type != ERROR_RESPONSE)
245 return 0;
246
247 switch (res->error) {
248 case ERROR_UNKNOWN_PACKET:
249 case ERROR_UNKNOWN_DOMAIN:
250 return -EIO;
251 case ERROR_NOT_SUPPORTED:
252 return -ENOTSUPP;
253 case ERROR_NOT_READY:
254 return -EAGAIN;
255 default:
256 break;
257 }
258
259 return 0;
260 }
261
tb_xdp_uuid_request(struct tb_ctl * ctl,u64 route,int retry,uuid_t * uuid,u64 * remote_route)262 static int tb_xdp_uuid_request(struct tb_ctl *ctl, u64 route, int retry,
263 uuid_t *uuid, u64 *remote_route)
264 {
265 struct tb_xdp_uuid_response res;
266 struct tb_xdp_uuid req;
267 int ret;
268
269 memset(&req, 0, sizeof(req));
270 tb_xdp_fill_header(&req.hdr, route, retry % 4, UUID_REQUEST,
271 sizeof(req));
272
273 memset(&res, 0, sizeof(res));
274 ret = __tb_xdomain_request(ctl, &req, sizeof(req),
275 TB_CFG_PKG_XDOMAIN_REQ, &res, sizeof(res),
276 TB_CFG_PKG_XDOMAIN_RESP,
277 XDOMAIN_DEFAULT_TIMEOUT);
278 if (ret)
279 return ret;
280
281 ret = tb_xdp_handle_error(&res.err);
282 if (ret)
283 return ret;
284
285 uuid_copy(uuid, &res.src_uuid);
286 *remote_route = (u64)res.src_route_hi << 32 | res.src_route_lo;
287
288 return 0;
289 }
290
tb_xdp_uuid_response(struct tb_ctl * ctl,u64 route,u8 sequence,const uuid_t * uuid)291 static int tb_xdp_uuid_response(struct tb_ctl *ctl, u64 route, u8 sequence,
292 const uuid_t *uuid)
293 {
294 struct tb_xdp_uuid_response res;
295
296 memset(&res, 0, sizeof(res));
297 tb_xdp_fill_header(&res.hdr, route, sequence, UUID_RESPONSE,
298 sizeof(res));
299
300 uuid_copy(&res.src_uuid, uuid);
301 res.src_route_hi = upper_32_bits(route);
302 res.src_route_lo = lower_32_bits(route);
303
304 return __tb_xdomain_response(ctl, &res, sizeof(res),
305 TB_CFG_PKG_XDOMAIN_RESP);
306 }
307
tb_xdp_error_response(struct tb_ctl * ctl,u64 route,u8 sequence,enum tb_xdp_error error)308 static int tb_xdp_error_response(struct tb_ctl *ctl, u64 route, u8 sequence,
309 enum tb_xdp_error error)
310 {
311 struct tb_xdp_error_response res;
312
313 memset(&res, 0, sizeof(res));
314 tb_xdp_fill_header(&res.hdr, route, sequence, ERROR_RESPONSE,
315 sizeof(res));
316 res.error = error;
317
318 return __tb_xdomain_response(ctl, &res, sizeof(res),
319 TB_CFG_PKG_XDOMAIN_RESP);
320 }
321
tb_xdp_properties_request(struct tb_ctl * ctl,u64 route,const uuid_t * src_uuid,const uuid_t * dst_uuid,int retry,u32 ** block,u32 * generation)322 static int tb_xdp_properties_request(struct tb_ctl *ctl, u64 route,
323 const uuid_t *src_uuid, const uuid_t *dst_uuid, int retry,
324 u32 **block, u32 *generation)
325 {
326 struct tb_xdp_properties_response *res;
327 struct tb_xdp_properties req;
328 u16 data_len, len;
329 size_t total_size;
330 u32 *data = NULL;
331 int ret;
332
333 total_size = sizeof(*res) + TB_XDP_PROPERTIES_MAX_DATA_LENGTH * 4;
334 res = kzalloc(total_size, GFP_KERNEL);
335 if (!res)
336 return -ENOMEM;
337
338 memset(&req, 0, sizeof(req));
339 tb_xdp_fill_header(&req.hdr, route, retry % 4, PROPERTIES_REQUEST,
340 sizeof(req));
341 memcpy(&req.src_uuid, src_uuid, sizeof(*src_uuid));
342 memcpy(&req.dst_uuid, dst_uuid, sizeof(*dst_uuid));
343
344 len = 0;
345 data_len = 0;
346
347 do {
348 ret = __tb_xdomain_request(ctl, &req, sizeof(req),
349 TB_CFG_PKG_XDOMAIN_REQ, res,
350 total_size, TB_CFG_PKG_XDOMAIN_RESP,
351 XDOMAIN_DEFAULT_TIMEOUT);
352 if (ret)
353 goto err;
354
355 ret = tb_xdp_handle_error(&res->err);
356 if (ret)
357 goto err;
358
359 /*
360 * Package length includes the whole payload without the
361 * XDomain header. Validate first that the package is at
362 * least size of the response structure.
363 */
364 len = res->hdr.xd_hdr.length_sn & TB_XDOMAIN_LENGTH_MASK;
365 if (len < sizeof(*res) / 4) {
366 ret = -EINVAL;
367 goto err;
368 }
369
370 len += sizeof(res->hdr.xd_hdr) / 4;
371 len -= sizeof(*res) / 4;
372
373 if (res->offset != req.offset) {
374 ret = -EINVAL;
375 goto err;
376 }
377
378 /*
379 * First time allocate block that has enough space for
380 * the whole properties block.
381 */
382 if (!data) {
383 data_len = res->data_length;
384 if (data_len > TB_XDP_PROPERTIES_MAX_LENGTH) {
385 ret = -E2BIG;
386 goto err;
387 }
388
389 data = kcalloc(data_len, sizeof(u32), GFP_KERNEL);
390 if (!data) {
391 ret = -ENOMEM;
392 goto err;
393 }
394 }
395
396 memcpy(data + req.offset, res->data, len * 4);
397 req.offset += len;
398 } while (!data_len || req.offset < data_len);
399
400 *block = data;
401 *generation = res->generation;
402
403 kfree(res);
404
405 return data_len;
406
407 err:
408 kfree(data);
409 kfree(res);
410
411 return ret;
412 }
413
tb_xdp_properties_response(struct tb * tb,struct tb_ctl * ctl,struct tb_xdomain * xd,u8 sequence,const struct tb_xdp_properties * req)414 static int tb_xdp_properties_response(struct tb *tb, struct tb_ctl *ctl,
415 struct tb_xdomain *xd, u8 sequence, const struct tb_xdp_properties *req)
416 {
417 struct tb_xdp_properties_response *res;
418 size_t total_size;
419 u16 len;
420 int ret;
421
422 /*
423 * Currently we expect all requests to be directed to us. The
424 * protocol supports forwarding, though which we might add
425 * support later on.
426 */
427 if (!uuid_equal(xd->local_uuid, &req->dst_uuid)) {
428 tb_xdp_error_response(ctl, xd->route, sequence,
429 ERROR_UNKNOWN_DOMAIN);
430 return 0;
431 }
432
433 mutex_lock(&xd->lock);
434
435 if (req->offset >= xd->local_property_block_len) {
436 mutex_unlock(&xd->lock);
437 return -EINVAL;
438 }
439
440 len = xd->local_property_block_len - req->offset;
441 len = min_t(u16, len, TB_XDP_PROPERTIES_MAX_DATA_LENGTH);
442 total_size = sizeof(*res) + len * 4;
443
444 res = kzalloc(total_size, GFP_KERNEL);
445 if (!res) {
446 mutex_unlock(&xd->lock);
447 return -ENOMEM;
448 }
449
450 tb_xdp_fill_header(&res->hdr, xd->route, sequence, PROPERTIES_RESPONSE,
451 total_size);
452 res->generation = xd->local_property_block_gen;
453 res->data_length = xd->local_property_block_len;
454 res->offset = req->offset;
455 uuid_copy(&res->src_uuid, xd->local_uuid);
456 uuid_copy(&res->dst_uuid, &req->src_uuid);
457 memcpy(res->data, &xd->local_property_block[req->offset], len * 4);
458
459 mutex_unlock(&xd->lock);
460
461 ret = __tb_xdomain_response(ctl, res, total_size,
462 TB_CFG_PKG_XDOMAIN_RESP);
463
464 kfree(res);
465 return ret;
466 }
467
tb_xdp_properties_changed_request(struct tb_ctl * ctl,u64 route,int retry,const uuid_t * uuid)468 static int tb_xdp_properties_changed_request(struct tb_ctl *ctl, u64 route,
469 int retry, const uuid_t *uuid)
470 {
471 struct tb_xdp_properties_changed_response res;
472 struct tb_xdp_properties_changed req;
473 int ret;
474
475 memset(&req, 0, sizeof(req));
476 tb_xdp_fill_header(&req.hdr, route, retry % 4,
477 PROPERTIES_CHANGED_REQUEST, sizeof(req));
478 uuid_copy(&req.src_uuid, uuid);
479
480 memset(&res, 0, sizeof(res));
481 ret = __tb_xdomain_request(ctl, &req, sizeof(req),
482 TB_CFG_PKG_XDOMAIN_REQ, &res, sizeof(res),
483 TB_CFG_PKG_XDOMAIN_RESP,
484 XDOMAIN_DEFAULT_TIMEOUT);
485 if (ret)
486 return ret;
487
488 return tb_xdp_handle_error(&res.err);
489 }
490
491 static int
tb_xdp_properties_changed_response(struct tb_ctl * ctl,u64 route,u8 sequence)492 tb_xdp_properties_changed_response(struct tb_ctl *ctl, u64 route, u8 sequence)
493 {
494 struct tb_xdp_properties_changed_response res;
495
496 memset(&res, 0, sizeof(res));
497 tb_xdp_fill_header(&res.hdr, route, sequence,
498 PROPERTIES_CHANGED_RESPONSE, sizeof(res));
499 return __tb_xdomain_response(ctl, &res, sizeof(res),
500 TB_CFG_PKG_XDOMAIN_RESP);
501 }
502
tb_xdp_link_state_status_request(struct tb_ctl * ctl,u64 route,u8 sequence,u8 * slw,u8 * tlw,u8 * sls,u8 * tls)503 static int tb_xdp_link_state_status_request(struct tb_ctl *ctl, u64 route,
504 u8 sequence, u8 *slw, u8 *tlw,
505 u8 *sls, u8 *tls)
506 {
507 struct tb_xdp_link_state_status_response res;
508 struct tb_xdp_link_state_status req;
509 int ret;
510
511 memset(&req, 0, sizeof(req));
512 tb_xdp_fill_header(&req.hdr, route, sequence, LINK_STATE_STATUS_REQUEST,
513 sizeof(req));
514
515 memset(&res, 0, sizeof(res));
516 ret = __tb_xdomain_request(ctl, &req, sizeof(req), TB_CFG_PKG_XDOMAIN_REQ,
517 &res, sizeof(res), TB_CFG_PKG_XDOMAIN_RESP,
518 XDOMAIN_DEFAULT_TIMEOUT);
519 if (ret)
520 return ret;
521
522 ret = tb_xdp_handle_error(&res.err);
523 if (ret)
524 return ret;
525
526 if (res.status != 0)
527 return -EREMOTEIO;
528
529 *slw = res.slw;
530 *tlw = res.tlw;
531 *sls = res.sls;
532 *tls = res.tls;
533
534 return 0;
535 }
536
tb_xdp_link_state_status_response(struct tb * tb,struct tb_ctl * ctl,struct tb_xdomain * xd,u8 sequence)537 static int tb_xdp_link_state_status_response(struct tb *tb, struct tb_ctl *ctl,
538 struct tb_xdomain *xd, u8 sequence)
539 {
540 struct tb_switch *sw = tb_to_switch(xd->dev.parent);
541 struct tb_xdp_link_state_status_response res;
542 struct tb_port *port = tb_port_at(xd->route, sw);
543 u32 val[2];
544 int ret;
545
546 memset(&res, 0, sizeof(res));
547 tb_xdp_fill_header(&res.hdr, xd->route, sequence,
548 LINK_STATE_STATUS_RESPONSE, sizeof(res));
549
550 ret = tb_port_read(port, val, TB_CFG_PORT,
551 port->cap_phy + LANE_ADP_CS_0, ARRAY_SIZE(val));
552 if (ret)
553 return ret;
554
555 res.slw = (val[0] & LANE_ADP_CS_0_SUPPORTED_WIDTH_MASK) >>
556 LANE_ADP_CS_0_SUPPORTED_WIDTH_SHIFT;
557 res.sls = (val[0] & LANE_ADP_CS_0_SUPPORTED_SPEED_MASK) >>
558 LANE_ADP_CS_0_SUPPORTED_SPEED_SHIFT;
559 res.tls = val[1] & LANE_ADP_CS_1_TARGET_SPEED_MASK;
560 res.tlw = (val[1] & LANE_ADP_CS_1_TARGET_WIDTH_MASK) >>
561 LANE_ADP_CS_1_TARGET_WIDTH_SHIFT;
562
563 return __tb_xdomain_response(ctl, &res, sizeof(res),
564 TB_CFG_PKG_XDOMAIN_RESP);
565 }
566
tb_xdp_link_state_change_request(struct tb_ctl * ctl,u64 route,u8 sequence,u8 tlw,u8 tls)567 static int tb_xdp_link_state_change_request(struct tb_ctl *ctl, u64 route,
568 u8 sequence, u8 tlw, u8 tls)
569 {
570 struct tb_xdp_link_state_change_response res;
571 struct tb_xdp_link_state_change req;
572 int ret;
573
574 memset(&req, 0, sizeof(req));
575 tb_xdp_fill_header(&req.hdr, route, sequence, LINK_STATE_CHANGE_REQUEST,
576 sizeof(req));
577 req.tlw = tlw;
578 req.tls = tls;
579
580 memset(&res, 0, sizeof(res));
581 ret = __tb_xdomain_request(ctl, &req, sizeof(req), TB_CFG_PKG_XDOMAIN_REQ,
582 &res, sizeof(res), TB_CFG_PKG_XDOMAIN_RESP,
583 XDOMAIN_DEFAULT_TIMEOUT);
584 if (ret)
585 return ret;
586
587 ret = tb_xdp_handle_error(&res.err);
588 if (ret)
589 return ret;
590
591 return res.status != 0 ? -EREMOTEIO : 0;
592 }
593
tb_xdp_link_state_change_response(struct tb_ctl * ctl,u64 route,u8 sequence,u32 status)594 static int tb_xdp_link_state_change_response(struct tb_ctl *ctl, u64 route,
595 u8 sequence, u32 status)
596 {
597 struct tb_xdp_link_state_change_response res;
598
599 memset(&res, 0, sizeof(res));
600 tb_xdp_fill_header(&res.hdr, route, sequence, LINK_STATE_CHANGE_RESPONSE,
601 sizeof(res));
602
603 res.status = status;
604
605 return __tb_xdomain_response(ctl, &res, sizeof(res),
606 TB_CFG_PKG_XDOMAIN_RESP);
607 }
608
609 /**
610 * tb_register_protocol_handler() - Register protocol handler
611 * @handler: Handler to register
612 *
613 * This allows XDomain service drivers to hook into incoming XDomain
614 * messages. After this function is called the service driver needs to
615 * be able to handle calls to callback whenever a package with the
616 * registered protocol is received.
617 */
tb_register_protocol_handler(struct tb_protocol_handler * handler)618 int tb_register_protocol_handler(struct tb_protocol_handler *handler)
619 {
620 if (!handler->uuid || !handler->callback)
621 return -EINVAL;
622 if (uuid_equal(handler->uuid, &tb_xdp_uuid))
623 return -EINVAL;
624
625 mutex_lock(&xdomain_lock);
626 list_add_tail(&handler->list, &protocol_handlers);
627 mutex_unlock(&xdomain_lock);
628
629 return 0;
630 }
631 EXPORT_SYMBOL_GPL(tb_register_protocol_handler);
632
633 /**
634 * tb_unregister_protocol_handler() - Unregister protocol handler
635 * @handler: Handler to unregister
636 *
637 * Removes the previously registered protocol handler.
638 */
tb_unregister_protocol_handler(struct tb_protocol_handler * handler)639 void tb_unregister_protocol_handler(struct tb_protocol_handler *handler)
640 {
641 mutex_lock(&xdomain_lock);
642 list_del_init(&handler->list);
643 mutex_unlock(&xdomain_lock);
644 }
645 EXPORT_SYMBOL_GPL(tb_unregister_protocol_handler);
646
update_property_block(struct tb_xdomain * xd)647 static void update_property_block(struct tb_xdomain *xd)
648 {
649 mutex_lock(&xdomain_lock);
650 mutex_lock(&xd->lock);
651 /*
652 * If the local property block is not up-to-date, rebuild it now
653 * based on the global property template.
654 */
655 if (!xd->local_property_block ||
656 xd->local_property_block_gen < xdomain_property_block_gen) {
657 struct tb_property_dir *dir;
658 int ret, block_len;
659 u32 *block;
660
661 dir = tb_property_copy_dir(xdomain_property_dir);
662 if (!dir) {
663 dev_warn(&xd->dev, "failed to copy properties\n");
664 goto out_unlock;
665 }
666
667 /* Fill in non-static properties now */
668 tb_property_add_text(dir, "deviceid", utsname()->nodename);
669 tb_property_add_immediate(dir, "maxhopid", xd->local_max_hopid);
670
671 ret = tb_property_format_dir(dir, NULL, 0);
672 if (ret < 0) {
673 dev_warn(&xd->dev, "local property block creation failed\n");
674 tb_property_free_dir(dir);
675 goto out_unlock;
676 }
677
678 block_len = ret;
679 block = kcalloc(block_len, sizeof(*block), GFP_KERNEL);
680 if (!block) {
681 tb_property_free_dir(dir);
682 goto out_unlock;
683 }
684
685 ret = tb_property_format_dir(dir, block, block_len);
686 if (ret) {
687 dev_warn(&xd->dev, "property block generation failed\n");
688 tb_property_free_dir(dir);
689 kfree(block);
690 goto out_unlock;
691 }
692
693 tb_property_free_dir(dir);
694 /* Release the previous block */
695 kfree(xd->local_property_block);
696 /* Assign new one */
697 xd->local_property_block = block;
698 xd->local_property_block_len = block_len;
699 xd->local_property_block_gen = xdomain_property_block_gen;
700 }
701
702 out_unlock:
703 mutex_unlock(&xd->lock);
704 mutex_unlock(&xdomain_lock);
705 }
706
tb_xdp_handle_request(struct work_struct * work)707 static void tb_xdp_handle_request(struct work_struct *work)
708 {
709 struct xdomain_request_work *xw = container_of(work, typeof(*xw), work);
710 const struct tb_xdp_header *pkg = xw->pkg;
711 const struct tb_xdomain_header *xhdr = &pkg->xd_hdr;
712 struct tb *tb = xw->tb;
713 struct tb_ctl *ctl = tb->ctl;
714 struct tb_xdomain *xd;
715 const uuid_t *uuid;
716 int ret = 0;
717 u32 sequence;
718 u64 route;
719
720 route = ((u64)xhdr->route_hi << 32 | xhdr->route_lo) & ~BIT_ULL(63);
721 sequence = xhdr->length_sn & TB_XDOMAIN_SN_MASK;
722 sequence >>= TB_XDOMAIN_SN_SHIFT;
723
724 mutex_lock(&tb->lock);
725 if (tb->root_switch)
726 uuid = tb->root_switch->uuid;
727 else
728 uuid = NULL;
729 mutex_unlock(&tb->lock);
730
731 if (!uuid) {
732 tb_xdp_error_response(ctl, route, sequence, ERROR_NOT_READY);
733 goto out;
734 }
735
736 xd = tb_xdomain_find_by_route_locked(tb, route);
737 if (xd)
738 update_property_block(xd);
739
740 switch (pkg->type) {
741 case PROPERTIES_REQUEST:
742 tb_dbg(tb, "%llx: received XDomain properties request\n", route);
743 if (xd) {
744 ret = tb_xdp_properties_response(tb, ctl, xd, sequence,
745 (const struct tb_xdp_properties *)pkg);
746 }
747 break;
748
749 case PROPERTIES_CHANGED_REQUEST:
750 tb_dbg(tb, "%llx: received XDomain properties changed request\n",
751 route);
752
753 ret = tb_xdp_properties_changed_response(ctl, route, sequence);
754
755 /*
756 * Since the properties have been changed, let's update
757 * the xdomain related to this connection as well in
758 * case there is a change in services it offers.
759 */
760 if (xd && device_is_registered(&xd->dev))
761 queue_delayed_work(tb->wq, &xd->state_work,
762 msecs_to_jiffies(XDOMAIN_SHORT_TIMEOUT));
763 break;
764
765 case UUID_REQUEST_OLD:
766 case UUID_REQUEST:
767 tb_dbg(tb, "%llx: received XDomain UUID request\n", route);
768 ret = tb_xdp_uuid_response(ctl, route, sequence, uuid);
769 break;
770
771 case LINK_STATE_STATUS_REQUEST:
772 tb_dbg(tb, "%llx: received XDomain link state status request\n",
773 route);
774
775 if (xd) {
776 ret = tb_xdp_link_state_status_response(tb, ctl, xd,
777 sequence);
778 } else {
779 tb_xdp_error_response(ctl, route, sequence,
780 ERROR_NOT_READY);
781 }
782 break;
783
784 case LINK_STATE_CHANGE_REQUEST:
785 tb_dbg(tb, "%llx: received XDomain link state change request\n",
786 route);
787
788 if (xd && xd->state == XDOMAIN_STATE_BONDING_UUID_HIGH) {
789 const struct tb_xdp_link_state_change *lsc =
790 (const struct tb_xdp_link_state_change *)pkg;
791
792 ret = tb_xdp_link_state_change_response(ctl, route,
793 sequence, 0);
794 xd->target_link_width = lsc->tlw;
795 queue_delayed_work(tb->wq, &xd->state_work,
796 msecs_to_jiffies(XDOMAIN_SHORT_TIMEOUT));
797 } else {
798 tb_xdp_error_response(ctl, route, sequence,
799 ERROR_NOT_READY);
800 }
801 break;
802
803 default:
804 tb_dbg(tb, "%llx: unknown XDomain request %#x\n", route, pkg->type);
805 tb_xdp_error_response(ctl, route, sequence,
806 ERROR_NOT_SUPPORTED);
807 break;
808 }
809
810 tb_xdomain_put(xd);
811
812 if (ret) {
813 tb_warn(tb, "failed to send XDomain response for %#x\n",
814 pkg->type);
815 }
816
817 out:
818 kfree(xw->pkg);
819 kfree(xw);
820
821 tb_domain_put(tb);
822 }
823
824 static bool
tb_xdp_schedule_request(struct tb * tb,const struct tb_xdp_header * hdr,size_t size)825 tb_xdp_schedule_request(struct tb *tb, const struct tb_xdp_header *hdr,
826 size_t size)
827 {
828 struct xdomain_request_work *xw;
829
830 xw = kmalloc(sizeof(*xw), GFP_KERNEL);
831 if (!xw)
832 return false;
833
834 INIT_WORK(&xw->work, tb_xdp_handle_request);
835 xw->pkg = kmemdup(hdr, size, GFP_KERNEL);
836 if (!xw->pkg) {
837 kfree(xw);
838 return false;
839 }
840 xw->tb = tb_domain_get(tb);
841
842 schedule_work(&xw->work);
843 return true;
844 }
845
846 /**
847 * tb_register_service_driver() - Register XDomain service driver
848 * @drv: Driver to register
849 *
850 * Registers new service driver from @drv to the bus.
851 */
tb_register_service_driver(struct tb_service_driver * drv)852 int tb_register_service_driver(struct tb_service_driver *drv)
853 {
854 drv->driver.bus = &tb_bus_type;
855 return driver_register(&drv->driver);
856 }
857 EXPORT_SYMBOL_GPL(tb_register_service_driver);
858
859 /**
860 * tb_unregister_service_driver() - Unregister XDomain service driver
861 * @drv: Driver to unregister
862 *
863 * Unregisters XDomain service driver from the bus.
864 */
tb_unregister_service_driver(struct tb_service_driver * drv)865 void tb_unregister_service_driver(struct tb_service_driver *drv)
866 {
867 driver_unregister(&drv->driver);
868 }
869 EXPORT_SYMBOL_GPL(tb_unregister_service_driver);
870
key_show(struct device * dev,struct device_attribute * attr,char * buf)871 static ssize_t key_show(struct device *dev, struct device_attribute *attr,
872 char *buf)
873 {
874 struct tb_service *svc = container_of(dev, struct tb_service, dev);
875
876 /*
877 * It should be null terminated but anything else is pretty much
878 * allowed.
879 */
880 return sysfs_emit(buf, "%*pE\n", (int)strlen(svc->key), svc->key);
881 }
882 static DEVICE_ATTR_RO(key);
883
get_modalias(struct tb_service * svc,char * buf,size_t size)884 static int get_modalias(struct tb_service *svc, char *buf, size_t size)
885 {
886 return snprintf(buf, size, "tbsvc:k%sp%08Xv%08Xr%08X", svc->key,
887 svc->prtcid, svc->prtcvers, svc->prtcrevs);
888 }
889
modalias_show(struct device * dev,struct device_attribute * attr,char * buf)890 static ssize_t modalias_show(struct device *dev, struct device_attribute *attr,
891 char *buf)
892 {
893 struct tb_service *svc = container_of(dev, struct tb_service, dev);
894
895 /* Full buffer size except new line and null termination */
896 get_modalias(svc, buf, PAGE_SIZE - 2);
897 return strlen(strcat(buf, "\n"));
898 }
899 static DEVICE_ATTR_RO(modalias);
900
prtcid_show(struct device * dev,struct device_attribute * attr,char * buf)901 static ssize_t prtcid_show(struct device *dev, struct device_attribute *attr,
902 char *buf)
903 {
904 struct tb_service *svc = container_of(dev, struct tb_service, dev);
905
906 return sysfs_emit(buf, "%u\n", svc->prtcid);
907 }
908 static DEVICE_ATTR_RO(prtcid);
909
prtcvers_show(struct device * dev,struct device_attribute * attr,char * buf)910 static ssize_t prtcvers_show(struct device *dev, struct device_attribute *attr,
911 char *buf)
912 {
913 struct tb_service *svc = container_of(dev, struct tb_service, dev);
914
915 return sysfs_emit(buf, "%u\n", svc->prtcvers);
916 }
917 static DEVICE_ATTR_RO(prtcvers);
918
prtcrevs_show(struct device * dev,struct device_attribute * attr,char * buf)919 static ssize_t prtcrevs_show(struct device *dev, struct device_attribute *attr,
920 char *buf)
921 {
922 struct tb_service *svc = container_of(dev, struct tb_service, dev);
923
924 return sysfs_emit(buf, "%u\n", svc->prtcrevs);
925 }
926 static DEVICE_ATTR_RO(prtcrevs);
927
prtcstns_show(struct device * dev,struct device_attribute * attr,char * buf)928 static ssize_t prtcstns_show(struct device *dev, struct device_attribute *attr,
929 char *buf)
930 {
931 struct tb_service *svc = container_of(dev, struct tb_service, dev);
932
933 return sysfs_emit(buf, "0x%08x\n", svc->prtcstns);
934 }
935 static DEVICE_ATTR_RO(prtcstns);
936
937 static struct attribute *tb_service_attrs[] = {
938 &dev_attr_key.attr,
939 &dev_attr_modalias.attr,
940 &dev_attr_prtcid.attr,
941 &dev_attr_prtcvers.attr,
942 &dev_attr_prtcrevs.attr,
943 &dev_attr_prtcstns.attr,
944 NULL,
945 };
946
947 static const struct attribute_group tb_service_attr_group = {
948 .attrs = tb_service_attrs,
949 };
950
951 static const struct attribute_group *tb_service_attr_groups[] = {
952 &tb_service_attr_group,
953 NULL,
954 };
955
tb_service_uevent(struct device * dev,struct kobj_uevent_env * env)956 static int tb_service_uevent(struct device *dev, struct kobj_uevent_env *env)
957 {
958 struct tb_service *svc = container_of(dev, struct tb_service, dev);
959 char modalias[64];
960
961 get_modalias(svc, modalias, sizeof(modalias));
962 return add_uevent_var(env, "MODALIAS=%s", modalias);
963 }
964
tb_service_release(struct device * dev)965 static void tb_service_release(struct device *dev)
966 {
967 struct tb_service *svc = container_of(dev, struct tb_service, dev);
968 struct tb_xdomain *xd = tb_service_parent(svc);
969
970 tb_service_debugfs_remove(svc);
971 ida_simple_remove(&xd->service_ids, svc->id);
972 kfree(svc->key);
973 kfree(svc);
974 }
975
976 struct device_type tb_service_type = {
977 .name = "thunderbolt_service",
978 .groups = tb_service_attr_groups,
979 .uevent = tb_service_uevent,
980 .release = tb_service_release,
981 };
982 EXPORT_SYMBOL_GPL(tb_service_type);
983
remove_missing_service(struct device * dev,void * data)984 static int remove_missing_service(struct device *dev, void *data)
985 {
986 struct tb_xdomain *xd = data;
987 struct tb_service *svc;
988
989 svc = tb_to_service(dev);
990 if (!svc)
991 return 0;
992
993 if (!tb_property_find(xd->remote_properties, svc->key,
994 TB_PROPERTY_TYPE_DIRECTORY))
995 device_unregister(dev);
996
997 return 0;
998 }
999
find_service(struct device * dev,void * data)1000 static int find_service(struct device *dev, void *data)
1001 {
1002 const struct tb_property *p = data;
1003 struct tb_service *svc;
1004
1005 svc = tb_to_service(dev);
1006 if (!svc)
1007 return 0;
1008
1009 return !strcmp(svc->key, p->key);
1010 }
1011
populate_service(struct tb_service * svc,struct tb_property * property)1012 static int populate_service(struct tb_service *svc,
1013 struct tb_property *property)
1014 {
1015 struct tb_property_dir *dir = property->value.dir;
1016 struct tb_property *p;
1017
1018 /* Fill in standard properties */
1019 p = tb_property_find(dir, "prtcid", TB_PROPERTY_TYPE_VALUE);
1020 if (p)
1021 svc->prtcid = p->value.immediate;
1022 p = tb_property_find(dir, "prtcvers", TB_PROPERTY_TYPE_VALUE);
1023 if (p)
1024 svc->prtcvers = p->value.immediate;
1025 p = tb_property_find(dir, "prtcrevs", TB_PROPERTY_TYPE_VALUE);
1026 if (p)
1027 svc->prtcrevs = p->value.immediate;
1028 p = tb_property_find(dir, "prtcstns", TB_PROPERTY_TYPE_VALUE);
1029 if (p)
1030 svc->prtcstns = p->value.immediate;
1031
1032 svc->key = kstrdup(property->key, GFP_KERNEL);
1033 if (!svc->key)
1034 return -ENOMEM;
1035
1036 return 0;
1037 }
1038
enumerate_services(struct tb_xdomain * xd)1039 static void enumerate_services(struct tb_xdomain *xd)
1040 {
1041 struct tb_service *svc;
1042 struct tb_property *p;
1043 struct device *dev;
1044 int id;
1045
1046 /*
1047 * First remove all services that are not available anymore in
1048 * the updated property block.
1049 */
1050 device_for_each_child_reverse(&xd->dev, xd, remove_missing_service);
1051
1052 /* Then re-enumerate properties creating new services as we go */
1053 tb_property_for_each(xd->remote_properties, p) {
1054 if (p->type != TB_PROPERTY_TYPE_DIRECTORY)
1055 continue;
1056
1057 /* If the service exists already we are fine */
1058 dev = device_find_child(&xd->dev, p, find_service);
1059 if (dev) {
1060 put_device(dev);
1061 continue;
1062 }
1063
1064 svc = kzalloc(sizeof(*svc), GFP_KERNEL);
1065 if (!svc)
1066 break;
1067
1068 if (populate_service(svc, p)) {
1069 kfree(svc);
1070 break;
1071 }
1072
1073 id = ida_simple_get(&xd->service_ids, 0, 0, GFP_KERNEL);
1074 if (id < 0) {
1075 kfree(svc->key);
1076 kfree(svc);
1077 break;
1078 }
1079 svc->id = id;
1080 svc->dev.bus = &tb_bus_type;
1081 svc->dev.type = &tb_service_type;
1082 svc->dev.parent = &xd->dev;
1083 dev_set_name(&svc->dev, "%s.%d", dev_name(&xd->dev), svc->id);
1084
1085 tb_service_debugfs_init(svc);
1086
1087 if (device_register(&svc->dev)) {
1088 put_device(&svc->dev);
1089 break;
1090 }
1091 }
1092 }
1093
populate_properties(struct tb_xdomain * xd,struct tb_property_dir * dir)1094 static int populate_properties(struct tb_xdomain *xd,
1095 struct tb_property_dir *dir)
1096 {
1097 const struct tb_property *p;
1098
1099 /* Required properties */
1100 p = tb_property_find(dir, "deviceid", TB_PROPERTY_TYPE_VALUE);
1101 if (!p)
1102 return -EINVAL;
1103 xd->device = p->value.immediate;
1104
1105 p = tb_property_find(dir, "vendorid", TB_PROPERTY_TYPE_VALUE);
1106 if (!p)
1107 return -EINVAL;
1108 xd->vendor = p->value.immediate;
1109
1110 p = tb_property_find(dir, "maxhopid", TB_PROPERTY_TYPE_VALUE);
1111 /*
1112 * USB4 inter-domain spec suggests using 15 as HopID if the
1113 * other end does not announce it in a property. This is for
1114 * TBT3 compatibility.
1115 */
1116 xd->remote_max_hopid = p ? p->value.immediate : XDOMAIN_DEFAULT_MAX_HOPID;
1117
1118 kfree(xd->device_name);
1119 xd->device_name = NULL;
1120 kfree(xd->vendor_name);
1121 xd->vendor_name = NULL;
1122
1123 /* Optional properties */
1124 p = tb_property_find(dir, "deviceid", TB_PROPERTY_TYPE_TEXT);
1125 if (p)
1126 xd->device_name = kstrdup(p->value.text, GFP_KERNEL);
1127 p = tb_property_find(dir, "vendorid", TB_PROPERTY_TYPE_TEXT);
1128 if (p)
1129 xd->vendor_name = kstrdup(p->value.text, GFP_KERNEL);
1130
1131 return 0;
1132 }
1133
tb_xdomain_update_link_attributes(struct tb_xdomain * xd)1134 static int tb_xdomain_update_link_attributes(struct tb_xdomain *xd)
1135 {
1136 bool change = false;
1137 struct tb_port *port;
1138 int ret;
1139
1140 port = tb_port_at(xd->route, tb_xdomain_parent(xd));
1141
1142 ret = tb_port_get_link_speed(port);
1143 if (ret < 0)
1144 return ret;
1145
1146 if (xd->link_speed != ret)
1147 change = true;
1148
1149 xd->link_speed = ret;
1150
1151 ret = tb_port_get_link_width(port);
1152 if (ret < 0)
1153 return ret;
1154
1155 if (xd->link_width != ret)
1156 change = true;
1157
1158 xd->link_width = ret;
1159
1160 if (change)
1161 kobject_uevent(&xd->dev.kobj, KOBJ_CHANGE);
1162
1163 return 0;
1164 }
1165
tb_xdomain_get_uuid(struct tb_xdomain * xd)1166 static int tb_xdomain_get_uuid(struct tb_xdomain *xd)
1167 {
1168 struct tb *tb = xd->tb;
1169 uuid_t uuid;
1170 u64 route;
1171 int ret;
1172
1173 dev_dbg(&xd->dev, "requesting remote UUID\n");
1174
1175 ret = tb_xdp_uuid_request(tb->ctl, xd->route, xd->state_retries, &uuid,
1176 &route);
1177 if (ret < 0) {
1178 if (xd->state_retries-- > 0) {
1179 dev_dbg(&xd->dev, "failed to request UUID, retrying\n");
1180 return -EAGAIN;
1181 } else {
1182 dev_dbg(&xd->dev, "failed to read remote UUID\n");
1183 }
1184 return ret;
1185 }
1186
1187 dev_dbg(&xd->dev, "got remote UUID %pUb\n", &uuid);
1188
1189 if (uuid_equal(&uuid, xd->local_uuid)) {
1190 if (route == xd->route)
1191 dev_dbg(&xd->dev, "loop back detected\n");
1192 else
1193 dev_dbg(&xd->dev, "intra-domain loop detected\n");
1194
1195 /* Don't bond lanes automatically for loops */
1196 xd->bonding_possible = false;
1197 }
1198
1199 /*
1200 * If the UUID is different, there is another domain connected
1201 * so mark this one unplugged and wait for the connection
1202 * manager to replace it.
1203 */
1204 if (xd->remote_uuid && !uuid_equal(&uuid, xd->remote_uuid)) {
1205 dev_dbg(&xd->dev, "remote UUID is different, unplugging\n");
1206 xd->is_unplugged = true;
1207 return -ENODEV;
1208 }
1209
1210 /* First time fill in the missing UUID */
1211 if (!xd->remote_uuid) {
1212 xd->remote_uuid = kmemdup(&uuid, sizeof(uuid_t), GFP_KERNEL);
1213 if (!xd->remote_uuid)
1214 return -ENOMEM;
1215 }
1216
1217 return 0;
1218 }
1219
tb_xdomain_get_link_status(struct tb_xdomain * xd)1220 static int tb_xdomain_get_link_status(struct tb_xdomain *xd)
1221 {
1222 struct tb *tb = xd->tb;
1223 u8 slw, tlw, sls, tls;
1224 int ret;
1225
1226 dev_dbg(&xd->dev, "sending link state status request to %pUb\n",
1227 xd->remote_uuid);
1228
1229 ret = tb_xdp_link_state_status_request(tb->ctl, xd->route,
1230 xd->state_retries, &slw, &tlw, &sls,
1231 &tls);
1232 if (ret) {
1233 if (ret != -EOPNOTSUPP && xd->state_retries-- > 0) {
1234 dev_dbg(&xd->dev,
1235 "failed to request remote link status, retrying\n");
1236 return -EAGAIN;
1237 }
1238 dev_dbg(&xd->dev, "failed to receive remote link status\n");
1239 return ret;
1240 }
1241
1242 dev_dbg(&xd->dev, "remote link supports width %#x speed %#x\n", slw, sls);
1243
1244 if (slw < LANE_ADP_CS_0_SUPPORTED_WIDTH_DUAL) {
1245 dev_dbg(&xd->dev, "remote adapter is single lane only\n");
1246 return -EOPNOTSUPP;
1247 }
1248
1249 return 0;
1250 }
1251
tb_xdomain_link_state_change(struct tb_xdomain * xd,unsigned int width)1252 static int tb_xdomain_link_state_change(struct tb_xdomain *xd,
1253 unsigned int width)
1254 {
1255 struct tb_switch *sw = tb_to_switch(xd->dev.parent);
1256 struct tb_port *port = tb_port_at(xd->route, sw);
1257 struct tb *tb = xd->tb;
1258 u8 tlw, tls;
1259 u32 val;
1260 int ret;
1261
1262 if (width == 2)
1263 tlw = LANE_ADP_CS_1_TARGET_WIDTH_DUAL;
1264 else if (width == 1)
1265 tlw = LANE_ADP_CS_1_TARGET_WIDTH_SINGLE;
1266 else
1267 return -EINVAL;
1268
1269 /* Use the current target speed */
1270 ret = tb_port_read(port, &val, TB_CFG_PORT, port->cap_phy + LANE_ADP_CS_1, 1);
1271 if (ret)
1272 return ret;
1273 tls = val & LANE_ADP_CS_1_TARGET_SPEED_MASK;
1274
1275 dev_dbg(&xd->dev, "sending link state change request with width %#x speed %#x\n",
1276 tlw, tls);
1277
1278 ret = tb_xdp_link_state_change_request(tb->ctl, xd->route,
1279 xd->state_retries, tlw, tls);
1280 if (ret) {
1281 if (ret != -EOPNOTSUPP && xd->state_retries-- > 0) {
1282 dev_dbg(&xd->dev,
1283 "failed to change remote link state, retrying\n");
1284 return -EAGAIN;
1285 }
1286 dev_err(&xd->dev, "failed request link state change, aborting\n");
1287 return ret;
1288 }
1289
1290 dev_dbg(&xd->dev, "received link state change response\n");
1291 return 0;
1292 }
1293
tb_xdomain_bond_lanes_uuid_high(struct tb_xdomain * xd)1294 static int tb_xdomain_bond_lanes_uuid_high(struct tb_xdomain *xd)
1295 {
1296 struct tb_port *port;
1297 int ret, width;
1298
1299 if (xd->target_link_width == LANE_ADP_CS_1_TARGET_WIDTH_SINGLE) {
1300 width = 1;
1301 } else if (xd->target_link_width == LANE_ADP_CS_1_TARGET_WIDTH_DUAL) {
1302 width = 2;
1303 } else {
1304 if (xd->state_retries-- > 0) {
1305 dev_dbg(&xd->dev,
1306 "link state change request not received yet, retrying\n");
1307 return -EAGAIN;
1308 }
1309 dev_dbg(&xd->dev, "timeout waiting for link change request\n");
1310 return -ETIMEDOUT;
1311 }
1312
1313 port = tb_port_at(xd->route, tb_xdomain_parent(xd));
1314
1315 /*
1316 * We can't use tb_xdomain_lane_bonding_enable() here because it
1317 * is the other side that initiates lane bonding. So here we
1318 * just set the width to both lane adapters and wait for the
1319 * link to transition bonded.
1320 */
1321 ret = tb_port_set_link_width(port->dual_link_port, width);
1322 if (ret) {
1323 tb_port_warn(port->dual_link_port,
1324 "failed to set link width to %d\n", width);
1325 return ret;
1326 }
1327
1328 ret = tb_port_set_link_width(port, width);
1329 if (ret) {
1330 tb_port_warn(port, "failed to set link width to %d\n", width);
1331 return ret;
1332 }
1333
1334 ret = tb_port_wait_for_link_width(port, width, XDOMAIN_BONDING_TIMEOUT);
1335 if (ret) {
1336 dev_warn(&xd->dev, "error waiting for link width to become %d\n",
1337 width);
1338 return ret;
1339 }
1340
1341 port->bonded = width == 2;
1342 port->dual_link_port->bonded = width == 2;
1343
1344 tb_port_update_credits(port);
1345 tb_xdomain_update_link_attributes(xd);
1346
1347 dev_dbg(&xd->dev, "lane bonding %sabled\n", width == 2 ? "en" : "dis");
1348 return 0;
1349 }
1350
tb_xdomain_get_properties(struct tb_xdomain * xd)1351 static int tb_xdomain_get_properties(struct tb_xdomain *xd)
1352 {
1353 struct tb_property_dir *dir;
1354 struct tb *tb = xd->tb;
1355 bool update = false;
1356 u32 *block = NULL;
1357 u32 gen = 0;
1358 int ret;
1359
1360 dev_dbg(&xd->dev, "requesting remote properties\n");
1361
1362 ret = tb_xdp_properties_request(tb->ctl, xd->route, xd->local_uuid,
1363 xd->remote_uuid, xd->state_retries,
1364 &block, &gen);
1365 if (ret < 0) {
1366 if (xd->state_retries-- > 0) {
1367 dev_dbg(&xd->dev,
1368 "failed to request remote properties, retrying\n");
1369 return -EAGAIN;
1370 } else {
1371 /* Give up now */
1372 dev_err(&xd->dev,
1373 "failed read XDomain properties from %pUb\n",
1374 xd->remote_uuid);
1375 }
1376
1377 return ret;
1378 }
1379
1380 mutex_lock(&xd->lock);
1381
1382 /* Only accept newer generation properties */
1383 if (xd->remote_properties && gen <= xd->remote_property_block_gen) {
1384 ret = 0;
1385 goto err_free_block;
1386 }
1387
1388 dir = tb_property_parse_dir(block, ret);
1389 if (!dir) {
1390 dev_err(&xd->dev, "failed to parse XDomain properties\n");
1391 ret = -ENOMEM;
1392 goto err_free_block;
1393 }
1394
1395 ret = populate_properties(xd, dir);
1396 if (ret) {
1397 dev_err(&xd->dev, "missing XDomain properties in response\n");
1398 goto err_free_dir;
1399 }
1400
1401 /* Release the existing one */
1402 if (xd->remote_properties) {
1403 tb_property_free_dir(xd->remote_properties);
1404 update = true;
1405 }
1406
1407 xd->remote_properties = dir;
1408 xd->remote_property_block_gen = gen;
1409
1410 tb_xdomain_update_link_attributes(xd);
1411
1412 mutex_unlock(&xd->lock);
1413
1414 kfree(block);
1415
1416 /*
1417 * Now the device should be ready enough so we can add it to the
1418 * bus and let userspace know about it. If the device is already
1419 * registered, we notify the userspace that it has changed.
1420 */
1421 if (!update) {
1422 /*
1423 * Now disable lane 1 if bonding was not enabled. Do
1424 * this only if bonding was possible at the beginning
1425 * (that is we are the connection manager and there are
1426 * two lanes).
1427 */
1428 if (xd->bonding_possible) {
1429 struct tb_port *port;
1430
1431 port = tb_port_at(xd->route, tb_xdomain_parent(xd));
1432 if (!port->bonded)
1433 tb_port_disable(port->dual_link_port);
1434 }
1435
1436 if (device_add(&xd->dev)) {
1437 dev_err(&xd->dev, "failed to add XDomain device\n");
1438 return -ENODEV;
1439 }
1440 dev_info(&xd->dev, "new host found, vendor=%#x device=%#x\n",
1441 xd->vendor, xd->device);
1442 if (xd->vendor_name && xd->device_name)
1443 dev_info(&xd->dev, "%s %s\n", xd->vendor_name,
1444 xd->device_name);
1445
1446 tb_xdomain_debugfs_init(xd);
1447 } else {
1448 kobject_uevent(&xd->dev.kobj, KOBJ_CHANGE);
1449 }
1450
1451 enumerate_services(xd);
1452 return 0;
1453
1454 err_free_dir:
1455 tb_property_free_dir(dir);
1456 err_free_block:
1457 kfree(block);
1458 mutex_unlock(&xd->lock);
1459
1460 return ret;
1461 }
1462
tb_xdomain_queue_uuid(struct tb_xdomain * xd)1463 static void tb_xdomain_queue_uuid(struct tb_xdomain *xd)
1464 {
1465 xd->state = XDOMAIN_STATE_UUID;
1466 xd->state_retries = XDOMAIN_RETRIES;
1467 queue_delayed_work(xd->tb->wq, &xd->state_work,
1468 msecs_to_jiffies(XDOMAIN_SHORT_TIMEOUT));
1469 }
1470
tb_xdomain_queue_link_status(struct tb_xdomain * xd)1471 static void tb_xdomain_queue_link_status(struct tb_xdomain *xd)
1472 {
1473 xd->state = XDOMAIN_STATE_LINK_STATUS;
1474 xd->state_retries = XDOMAIN_RETRIES;
1475 queue_delayed_work(xd->tb->wq, &xd->state_work,
1476 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT));
1477 }
1478
tb_xdomain_queue_link_status2(struct tb_xdomain * xd)1479 static void tb_xdomain_queue_link_status2(struct tb_xdomain *xd)
1480 {
1481 xd->state = XDOMAIN_STATE_LINK_STATUS2;
1482 xd->state_retries = XDOMAIN_RETRIES;
1483 queue_delayed_work(xd->tb->wq, &xd->state_work,
1484 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT));
1485 }
1486
tb_xdomain_queue_bonding(struct tb_xdomain * xd)1487 static void tb_xdomain_queue_bonding(struct tb_xdomain *xd)
1488 {
1489 if (memcmp(xd->local_uuid, xd->remote_uuid, UUID_SIZE) > 0) {
1490 dev_dbg(&xd->dev, "we have higher UUID, other side bonds the lanes\n");
1491 xd->state = XDOMAIN_STATE_BONDING_UUID_HIGH;
1492 } else {
1493 dev_dbg(&xd->dev, "we have lower UUID, bonding lanes\n");
1494 xd->state = XDOMAIN_STATE_LINK_STATE_CHANGE;
1495 }
1496
1497 xd->state_retries = XDOMAIN_RETRIES;
1498 queue_delayed_work(xd->tb->wq, &xd->state_work,
1499 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT));
1500 }
1501
tb_xdomain_queue_bonding_uuid_low(struct tb_xdomain * xd)1502 static void tb_xdomain_queue_bonding_uuid_low(struct tb_xdomain *xd)
1503 {
1504 xd->state = XDOMAIN_STATE_BONDING_UUID_LOW;
1505 xd->state_retries = XDOMAIN_RETRIES;
1506 queue_delayed_work(xd->tb->wq, &xd->state_work,
1507 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT));
1508 }
1509
tb_xdomain_queue_properties(struct tb_xdomain * xd)1510 static void tb_xdomain_queue_properties(struct tb_xdomain *xd)
1511 {
1512 xd->state = XDOMAIN_STATE_PROPERTIES;
1513 xd->state_retries = XDOMAIN_RETRIES;
1514 queue_delayed_work(xd->tb->wq, &xd->state_work,
1515 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT));
1516 }
1517
tb_xdomain_queue_properties_changed(struct tb_xdomain * xd)1518 static void tb_xdomain_queue_properties_changed(struct tb_xdomain *xd)
1519 {
1520 xd->properties_changed_retries = XDOMAIN_RETRIES;
1521 queue_delayed_work(xd->tb->wq, &xd->properties_changed_work,
1522 msecs_to_jiffies(XDOMAIN_SHORT_TIMEOUT));
1523 }
1524
tb_xdomain_state_work(struct work_struct * work)1525 static void tb_xdomain_state_work(struct work_struct *work)
1526 {
1527 struct tb_xdomain *xd = container_of(work, typeof(*xd), state_work.work);
1528 int ret, state = xd->state;
1529
1530 if (WARN_ON_ONCE(state < XDOMAIN_STATE_INIT ||
1531 state > XDOMAIN_STATE_ERROR))
1532 return;
1533
1534 dev_dbg(&xd->dev, "running state %s\n", state_names[state]);
1535
1536 switch (state) {
1537 case XDOMAIN_STATE_INIT:
1538 if (xd->needs_uuid) {
1539 tb_xdomain_queue_uuid(xd);
1540 } else {
1541 tb_xdomain_queue_properties_changed(xd);
1542 tb_xdomain_queue_properties(xd);
1543 }
1544 break;
1545
1546 case XDOMAIN_STATE_UUID:
1547 ret = tb_xdomain_get_uuid(xd);
1548 if (ret) {
1549 if (ret == -EAGAIN)
1550 goto retry_state;
1551 xd->state = XDOMAIN_STATE_ERROR;
1552 } else {
1553 tb_xdomain_queue_properties_changed(xd);
1554 if (xd->bonding_possible)
1555 tb_xdomain_queue_link_status(xd);
1556 else
1557 tb_xdomain_queue_properties(xd);
1558 }
1559 break;
1560
1561 case XDOMAIN_STATE_LINK_STATUS:
1562 ret = tb_xdomain_get_link_status(xd);
1563 if (ret) {
1564 if (ret == -EAGAIN)
1565 goto retry_state;
1566
1567 /*
1568 * If any of the lane bonding states fail we skip
1569 * bonding completely and try to continue from
1570 * reading properties.
1571 */
1572 tb_xdomain_queue_properties(xd);
1573 } else {
1574 tb_xdomain_queue_bonding(xd);
1575 }
1576 break;
1577
1578 case XDOMAIN_STATE_LINK_STATE_CHANGE:
1579 ret = tb_xdomain_link_state_change(xd, 2);
1580 if (ret) {
1581 if (ret == -EAGAIN)
1582 goto retry_state;
1583 tb_xdomain_queue_properties(xd);
1584 } else {
1585 tb_xdomain_queue_link_status2(xd);
1586 }
1587 break;
1588
1589 case XDOMAIN_STATE_LINK_STATUS2:
1590 ret = tb_xdomain_get_link_status(xd);
1591 if (ret) {
1592 if (ret == -EAGAIN)
1593 goto retry_state;
1594 tb_xdomain_queue_properties(xd);
1595 } else {
1596 tb_xdomain_queue_bonding_uuid_low(xd);
1597 }
1598 break;
1599
1600 case XDOMAIN_STATE_BONDING_UUID_LOW:
1601 tb_xdomain_lane_bonding_enable(xd);
1602 tb_xdomain_queue_properties(xd);
1603 break;
1604
1605 case XDOMAIN_STATE_BONDING_UUID_HIGH:
1606 if (tb_xdomain_bond_lanes_uuid_high(xd) == -EAGAIN)
1607 goto retry_state;
1608 tb_xdomain_queue_properties(xd);
1609 break;
1610
1611 case XDOMAIN_STATE_PROPERTIES:
1612 ret = tb_xdomain_get_properties(xd);
1613 if (ret) {
1614 if (ret == -EAGAIN)
1615 goto retry_state;
1616 xd->state = XDOMAIN_STATE_ERROR;
1617 } else {
1618 xd->state = XDOMAIN_STATE_ENUMERATED;
1619 }
1620 break;
1621
1622 case XDOMAIN_STATE_ENUMERATED:
1623 tb_xdomain_queue_properties(xd);
1624 break;
1625
1626 case XDOMAIN_STATE_ERROR:
1627 break;
1628
1629 default:
1630 dev_warn(&xd->dev, "unexpected state %d\n", state);
1631 break;
1632 }
1633
1634 return;
1635
1636 retry_state:
1637 queue_delayed_work(xd->tb->wq, &xd->state_work,
1638 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT));
1639 }
1640
tb_xdomain_properties_changed(struct work_struct * work)1641 static void tb_xdomain_properties_changed(struct work_struct *work)
1642 {
1643 struct tb_xdomain *xd = container_of(work, typeof(*xd),
1644 properties_changed_work.work);
1645 int ret;
1646
1647 dev_dbg(&xd->dev, "sending properties changed notification\n");
1648
1649 ret = tb_xdp_properties_changed_request(xd->tb->ctl, xd->route,
1650 xd->properties_changed_retries, xd->local_uuid);
1651 if (ret) {
1652 if (xd->properties_changed_retries-- > 0) {
1653 dev_dbg(&xd->dev,
1654 "failed to send properties changed notification, retrying\n");
1655 queue_delayed_work(xd->tb->wq,
1656 &xd->properties_changed_work,
1657 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT));
1658 }
1659 dev_err(&xd->dev, "failed to send properties changed notification\n");
1660 return;
1661 }
1662
1663 xd->properties_changed_retries = XDOMAIN_RETRIES;
1664 }
1665
device_show(struct device * dev,struct device_attribute * attr,char * buf)1666 static ssize_t device_show(struct device *dev, struct device_attribute *attr,
1667 char *buf)
1668 {
1669 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
1670
1671 return sysfs_emit(buf, "%#x\n", xd->device);
1672 }
1673 static DEVICE_ATTR_RO(device);
1674
1675 static ssize_t
device_name_show(struct device * dev,struct device_attribute * attr,char * buf)1676 device_name_show(struct device *dev, struct device_attribute *attr, char *buf)
1677 {
1678 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
1679 int ret;
1680
1681 if (mutex_lock_interruptible(&xd->lock))
1682 return -ERESTARTSYS;
1683 ret = sysfs_emit(buf, "%s\n", xd->device_name ?: "");
1684 mutex_unlock(&xd->lock);
1685
1686 return ret;
1687 }
1688 static DEVICE_ATTR_RO(device_name);
1689
maxhopid_show(struct device * dev,struct device_attribute * attr,char * buf)1690 static ssize_t maxhopid_show(struct device *dev, struct device_attribute *attr,
1691 char *buf)
1692 {
1693 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
1694
1695 return sysfs_emit(buf, "%d\n", xd->remote_max_hopid);
1696 }
1697 static DEVICE_ATTR_RO(maxhopid);
1698
vendor_show(struct device * dev,struct device_attribute * attr,char * buf)1699 static ssize_t vendor_show(struct device *dev, struct device_attribute *attr,
1700 char *buf)
1701 {
1702 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
1703
1704 return sysfs_emit(buf, "%#x\n", xd->vendor);
1705 }
1706 static DEVICE_ATTR_RO(vendor);
1707
1708 static ssize_t
vendor_name_show(struct device * dev,struct device_attribute * attr,char * buf)1709 vendor_name_show(struct device *dev, struct device_attribute *attr, char *buf)
1710 {
1711 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
1712 int ret;
1713
1714 if (mutex_lock_interruptible(&xd->lock))
1715 return -ERESTARTSYS;
1716 ret = sysfs_emit(buf, "%s\n", xd->vendor_name ?: "");
1717 mutex_unlock(&xd->lock);
1718
1719 return ret;
1720 }
1721 static DEVICE_ATTR_RO(vendor_name);
1722
unique_id_show(struct device * dev,struct device_attribute * attr,char * buf)1723 static ssize_t unique_id_show(struct device *dev, struct device_attribute *attr,
1724 char *buf)
1725 {
1726 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
1727
1728 return sysfs_emit(buf, "%pUb\n", xd->remote_uuid);
1729 }
1730 static DEVICE_ATTR_RO(unique_id);
1731
speed_show(struct device * dev,struct device_attribute * attr,char * buf)1732 static ssize_t speed_show(struct device *dev, struct device_attribute *attr,
1733 char *buf)
1734 {
1735 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
1736
1737 return sysfs_emit(buf, "%u.0 Gb/s\n", xd->link_speed);
1738 }
1739
1740 static DEVICE_ATTR(rx_speed, 0444, speed_show, NULL);
1741 static DEVICE_ATTR(tx_speed, 0444, speed_show, NULL);
1742
lanes_show(struct device * dev,struct device_attribute * attr,char * buf)1743 static ssize_t lanes_show(struct device *dev, struct device_attribute *attr,
1744 char *buf)
1745 {
1746 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
1747
1748 return sysfs_emit(buf, "%u\n", xd->link_width);
1749 }
1750
1751 static DEVICE_ATTR(rx_lanes, 0444, lanes_show, NULL);
1752 static DEVICE_ATTR(tx_lanes, 0444, lanes_show, NULL);
1753
1754 static struct attribute *xdomain_attrs[] = {
1755 &dev_attr_device.attr,
1756 &dev_attr_device_name.attr,
1757 &dev_attr_maxhopid.attr,
1758 &dev_attr_rx_lanes.attr,
1759 &dev_attr_rx_speed.attr,
1760 &dev_attr_tx_lanes.attr,
1761 &dev_attr_tx_speed.attr,
1762 &dev_attr_unique_id.attr,
1763 &dev_attr_vendor.attr,
1764 &dev_attr_vendor_name.attr,
1765 NULL,
1766 };
1767
1768 static const struct attribute_group xdomain_attr_group = {
1769 .attrs = xdomain_attrs,
1770 };
1771
1772 static const struct attribute_group *xdomain_attr_groups[] = {
1773 &xdomain_attr_group,
1774 NULL,
1775 };
1776
tb_xdomain_release(struct device * dev)1777 static void tb_xdomain_release(struct device *dev)
1778 {
1779 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
1780
1781 put_device(xd->dev.parent);
1782
1783 kfree(xd->local_property_block);
1784 tb_property_free_dir(xd->remote_properties);
1785 ida_destroy(&xd->out_hopids);
1786 ida_destroy(&xd->in_hopids);
1787 ida_destroy(&xd->service_ids);
1788
1789 kfree(xd->local_uuid);
1790 kfree(xd->remote_uuid);
1791 kfree(xd->device_name);
1792 kfree(xd->vendor_name);
1793 kfree(xd);
1794 }
1795
start_handshake(struct tb_xdomain * xd)1796 static void start_handshake(struct tb_xdomain *xd)
1797 {
1798 xd->state = XDOMAIN_STATE_INIT;
1799 queue_delayed_work(xd->tb->wq, &xd->state_work,
1800 msecs_to_jiffies(XDOMAIN_SHORT_TIMEOUT));
1801 }
1802
stop_handshake(struct tb_xdomain * xd)1803 static void stop_handshake(struct tb_xdomain *xd)
1804 {
1805 cancel_delayed_work_sync(&xd->properties_changed_work);
1806 cancel_delayed_work_sync(&xd->state_work);
1807 xd->properties_changed_retries = 0;
1808 xd->state_retries = 0;
1809 }
1810
tb_xdomain_suspend(struct device * dev)1811 static int __maybe_unused tb_xdomain_suspend(struct device *dev)
1812 {
1813 stop_handshake(tb_to_xdomain(dev));
1814 return 0;
1815 }
1816
tb_xdomain_resume(struct device * dev)1817 static int __maybe_unused tb_xdomain_resume(struct device *dev)
1818 {
1819 start_handshake(tb_to_xdomain(dev));
1820 return 0;
1821 }
1822
1823 static const struct dev_pm_ops tb_xdomain_pm_ops = {
1824 SET_SYSTEM_SLEEP_PM_OPS(tb_xdomain_suspend, tb_xdomain_resume)
1825 };
1826
1827 struct device_type tb_xdomain_type = {
1828 .name = "thunderbolt_xdomain",
1829 .release = tb_xdomain_release,
1830 .pm = &tb_xdomain_pm_ops,
1831 };
1832 EXPORT_SYMBOL_GPL(tb_xdomain_type);
1833
1834 /**
1835 * tb_xdomain_alloc() - Allocate new XDomain object
1836 * @tb: Domain where the XDomain belongs
1837 * @parent: Parent device (the switch through the connection to the
1838 * other domain is reached).
1839 * @route: Route string used to reach the other domain
1840 * @local_uuid: Our local domain UUID
1841 * @remote_uuid: UUID of the other domain (optional)
1842 *
1843 * Allocates new XDomain structure and returns pointer to that. The
1844 * object must be released by calling tb_xdomain_put().
1845 */
tb_xdomain_alloc(struct tb * tb,struct device * parent,u64 route,const uuid_t * local_uuid,const uuid_t * remote_uuid)1846 struct tb_xdomain *tb_xdomain_alloc(struct tb *tb, struct device *parent,
1847 u64 route, const uuid_t *local_uuid,
1848 const uuid_t *remote_uuid)
1849 {
1850 struct tb_switch *parent_sw = tb_to_switch(parent);
1851 struct tb_xdomain *xd;
1852 struct tb_port *down;
1853
1854 /* Make sure the downstream domain is accessible */
1855 down = tb_port_at(route, parent_sw);
1856 tb_port_unlock(down);
1857
1858 xd = kzalloc(sizeof(*xd), GFP_KERNEL);
1859 if (!xd)
1860 return NULL;
1861
1862 xd->tb = tb;
1863 xd->route = route;
1864 xd->local_max_hopid = down->config.max_in_hop_id;
1865 ida_init(&xd->service_ids);
1866 ida_init(&xd->in_hopids);
1867 ida_init(&xd->out_hopids);
1868 mutex_init(&xd->lock);
1869 INIT_DELAYED_WORK(&xd->state_work, tb_xdomain_state_work);
1870 INIT_DELAYED_WORK(&xd->properties_changed_work,
1871 tb_xdomain_properties_changed);
1872
1873 xd->local_uuid = kmemdup(local_uuid, sizeof(uuid_t), GFP_KERNEL);
1874 if (!xd->local_uuid)
1875 goto err_free;
1876
1877 if (remote_uuid) {
1878 xd->remote_uuid = kmemdup(remote_uuid, sizeof(uuid_t),
1879 GFP_KERNEL);
1880 if (!xd->remote_uuid)
1881 goto err_free_local_uuid;
1882 } else {
1883 xd->needs_uuid = true;
1884 xd->bonding_possible = !!down->dual_link_port;
1885 }
1886
1887 device_initialize(&xd->dev);
1888 xd->dev.parent = get_device(parent);
1889 xd->dev.bus = &tb_bus_type;
1890 xd->dev.type = &tb_xdomain_type;
1891 xd->dev.groups = xdomain_attr_groups;
1892 dev_set_name(&xd->dev, "%u-%llx", tb->index, route);
1893
1894 dev_dbg(&xd->dev, "local UUID %pUb\n", local_uuid);
1895 if (remote_uuid)
1896 dev_dbg(&xd->dev, "remote UUID %pUb\n", remote_uuid);
1897
1898 /*
1899 * This keeps the DMA powered on as long as we have active
1900 * connection to another host.
1901 */
1902 pm_runtime_set_active(&xd->dev);
1903 pm_runtime_get_noresume(&xd->dev);
1904 pm_runtime_enable(&xd->dev);
1905
1906 return xd;
1907
1908 err_free_local_uuid:
1909 kfree(xd->local_uuid);
1910 err_free:
1911 kfree(xd);
1912
1913 return NULL;
1914 }
1915
1916 /**
1917 * tb_xdomain_add() - Add XDomain to the bus
1918 * @xd: XDomain to add
1919 *
1920 * This function starts XDomain discovery protocol handshake and
1921 * eventually adds the XDomain to the bus. After calling this function
1922 * the caller needs to call tb_xdomain_remove() in order to remove and
1923 * release the object regardless whether the handshake succeeded or not.
1924 */
tb_xdomain_add(struct tb_xdomain * xd)1925 void tb_xdomain_add(struct tb_xdomain *xd)
1926 {
1927 /* Start exchanging properties with the other host */
1928 start_handshake(xd);
1929 }
1930
unregister_service(struct device * dev,void * data)1931 static int unregister_service(struct device *dev, void *data)
1932 {
1933 device_unregister(dev);
1934 return 0;
1935 }
1936
1937 /**
1938 * tb_xdomain_remove() - Remove XDomain from the bus
1939 * @xd: XDomain to remove
1940 *
1941 * This will stop all ongoing configuration work and remove the XDomain
1942 * along with any services from the bus. When the last reference to @xd
1943 * is released the object will be released as well.
1944 */
tb_xdomain_remove(struct tb_xdomain * xd)1945 void tb_xdomain_remove(struct tb_xdomain *xd)
1946 {
1947 tb_xdomain_debugfs_remove(xd);
1948
1949 stop_handshake(xd);
1950
1951 device_for_each_child_reverse(&xd->dev, xd, unregister_service);
1952
1953 /*
1954 * Undo runtime PM here explicitly because it is possible that
1955 * the XDomain was never added to the bus and thus device_del()
1956 * is not called for it (device_del() would handle this otherwise).
1957 */
1958 pm_runtime_disable(&xd->dev);
1959 pm_runtime_put_noidle(&xd->dev);
1960 pm_runtime_set_suspended(&xd->dev);
1961
1962 if (!device_is_registered(&xd->dev)) {
1963 put_device(&xd->dev);
1964 } else {
1965 dev_info(&xd->dev, "host disconnected\n");
1966 device_unregister(&xd->dev);
1967 }
1968 }
1969
1970 /**
1971 * tb_xdomain_lane_bonding_enable() - Enable lane bonding on XDomain
1972 * @xd: XDomain connection
1973 *
1974 * Lane bonding is disabled by default for XDomains. This function tries
1975 * to enable bonding by first enabling the port and waiting for the CL0
1976 * state.
1977 *
1978 * Return: %0 in case of success and negative errno in case of error.
1979 */
tb_xdomain_lane_bonding_enable(struct tb_xdomain * xd)1980 int tb_xdomain_lane_bonding_enable(struct tb_xdomain *xd)
1981 {
1982 struct tb_port *port;
1983 int ret;
1984
1985 port = tb_port_at(xd->route, tb_xdomain_parent(xd));
1986 if (!port->dual_link_port)
1987 return -ENODEV;
1988
1989 ret = tb_port_enable(port->dual_link_port);
1990 if (ret)
1991 return ret;
1992
1993 ret = tb_wait_for_port(port->dual_link_port, true);
1994 if (ret < 0)
1995 return ret;
1996 if (!ret)
1997 return -ENOTCONN;
1998
1999 ret = tb_port_lane_bonding_enable(port);
2000 if (ret) {
2001 tb_port_warn(port, "failed to enable lane bonding\n");
2002 return ret;
2003 }
2004
2005 ret = tb_port_wait_for_link_width(port, 2, XDOMAIN_BONDING_TIMEOUT);
2006 if (ret) {
2007 tb_port_warn(port, "failed to enable lane bonding\n");
2008 return ret;
2009 }
2010
2011 tb_port_update_credits(port);
2012 tb_xdomain_update_link_attributes(xd);
2013
2014 dev_dbg(&xd->dev, "lane bonding enabled\n");
2015 return 0;
2016 }
2017 EXPORT_SYMBOL_GPL(tb_xdomain_lane_bonding_enable);
2018
2019 /**
2020 * tb_xdomain_lane_bonding_disable() - Disable lane bonding
2021 * @xd: XDomain connection
2022 *
2023 * Lane bonding is disabled by default for XDomains. If bonding has been
2024 * enabled, this function can be used to disable it.
2025 */
tb_xdomain_lane_bonding_disable(struct tb_xdomain * xd)2026 void tb_xdomain_lane_bonding_disable(struct tb_xdomain *xd)
2027 {
2028 struct tb_port *port;
2029
2030 port = tb_port_at(xd->route, tb_xdomain_parent(xd));
2031 if (port->dual_link_port) {
2032 tb_port_lane_bonding_disable(port);
2033 if (tb_port_wait_for_link_width(port, 1, 100) == -ETIMEDOUT)
2034 tb_port_warn(port, "timeout disabling lane bonding\n");
2035 tb_port_disable(port->dual_link_port);
2036 tb_port_update_credits(port);
2037 tb_xdomain_update_link_attributes(xd);
2038
2039 dev_dbg(&xd->dev, "lane bonding disabled\n");
2040 }
2041 }
2042 EXPORT_SYMBOL_GPL(tb_xdomain_lane_bonding_disable);
2043
2044 /**
2045 * tb_xdomain_alloc_in_hopid() - Allocate input HopID for tunneling
2046 * @xd: XDomain connection
2047 * @hopid: Preferred HopID or %-1 for next available
2048 *
2049 * Returns allocated HopID or negative errno. Specifically returns
2050 * %-ENOSPC if there are no more available HopIDs. Returned HopID is
2051 * guaranteed to be within range supported by the input lane adapter.
2052 * Call tb_xdomain_release_in_hopid() to release the allocated HopID.
2053 */
tb_xdomain_alloc_in_hopid(struct tb_xdomain * xd,int hopid)2054 int tb_xdomain_alloc_in_hopid(struct tb_xdomain *xd, int hopid)
2055 {
2056 if (hopid < 0)
2057 hopid = TB_PATH_MIN_HOPID;
2058 if (hopid < TB_PATH_MIN_HOPID || hopid > xd->local_max_hopid)
2059 return -EINVAL;
2060
2061 return ida_alloc_range(&xd->in_hopids, hopid, xd->local_max_hopid,
2062 GFP_KERNEL);
2063 }
2064 EXPORT_SYMBOL_GPL(tb_xdomain_alloc_in_hopid);
2065
2066 /**
2067 * tb_xdomain_alloc_out_hopid() - Allocate output HopID for tunneling
2068 * @xd: XDomain connection
2069 * @hopid: Preferred HopID or %-1 for next available
2070 *
2071 * Returns allocated HopID or negative errno. Specifically returns
2072 * %-ENOSPC if there are no more available HopIDs. Returned HopID is
2073 * guaranteed to be within range supported by the output lane adapter.
2074 * Call tb_xdomain_release_in_hopid() to release the allocated HopID.
2075 */
tb_xdomain_alloc_out_hopid(struct tb_xdomain * xd,int hopid)2076 int tb_xdomain_alloc_out_hopid(struct tb_xdomain *xd, int hopid)
2077 {
2078 if (hopid < 0)
2079 hopid = TB_PATH_MIN_HOPID;
2080 if (hopid < TB_PATH_MIN_HOPID || hopid > xd->remote_max_hopid)
2081 return -EINVAL;
2082
2083 return ida_alloc_range(&xd->out_hopids, hopid, xd->remote_max_hopid,
2084 GFP_KERNEL);
2085 }
2086 EXPORT_SYMBOL_GPL(tb_xdomain_alloc_out_hopid);
2087
2088 /**
2089 * tb_xdomain_release_in_hopid() - Release input HopID
2090 * @xd: XDomain connection
2091 * @hopid: HopID to release
2092 */
tb_xdomain_release_in_hopid(struct tb_xdomain * xd,int hopid)2093 void tb_xdomain_release_in_hopid(struct tb_xdomain *xd, int hopid)
2094 {
2095 ida_free(&xd->in_hopids, hopid);
2096 }
2097 EXPORT_SYMBOL_GPL(tb_xdomain_release_in_hopid);
2098
2099 /**
2100 * tb_xdomain_release_out_hopid() - Release output HopID
2101 * @xd: XDomain connection
2102 * @hopid: HopID to release
2103 */
tb_xdomain_release_out_hopid(struct tb_xdomain * xd,int hopid)2104 void tb_xdomain_release_out_hopid(struct tb_xdomain *xd, int hopid)
2105 {
2106 ida_free(&xd->out_hopids, hopid);
2107 }
2108 EXPORT_SYMBOL_GPL(tb_xdomain_release_out_hopid);
2109
2110 /**
2111 * tb_xdomain_enable_paths() - Enable DMA paths for XDomain connection
2112 * @xd: XDomain connection
2113 * @transmit_path: HopID we are using to send out packets
2114 * @transmit_ring: DMA ring used to send out packets
2115 * @receive_path: HopID the other end is using to send packets to us
2116 * @receive_ring: DMA ring used to receive packets from @receive_path
2117 *
2118 * The function enables DMA paths accordingly so that after successful
2119 * return the caller can send and receive packets using high-speed DMA
2120 * path. If a transmit or receive path is not needed, pass %-1 for those
2121 * parameters.
2122 *
2123 * Return: %0 in case of success and negative errno in case of error
2124 */
tb_xdomain_enable_paths(struct tb_xdomain * xd,int transmit_path,int transmit_ring,int receive_path,int receive_ring)2125 int tb_xdomain_enable_paths(struct tb_xdomain *xd, int transmit_path,
2126 int transmit_ring, int receive_path,
2127 int receive_ring)
2128 {
2129 return tb_domain_approve_xdomain_paths(xd->tb, xd, transmit_path,
2130 transmit_ring, receive_path,
2131 receive_ring);
2132 }
2133 EXPORT_SYMBOL_GPL(tb_xdomain_enable_paths);
2134
2135 /**
2136 * tb_xdomain_disable_paths() - Disable DMA paths for XDomain connection
2137 * @xd: XDomain connection
2138 * @transmit_path: HopID we are using to send out packets
2139 * @transmit_ring: DMA ring used to send out packets
2140 * @receive_path: HopID the other end is using to send packets to us
2141 * @receive_ring: DMA ring used to receive packets from @receive_path
2142 *
2143 * This does the opposite of tb_xdomain_enable_paths(). After call to
2144 * this the caller is not expected to use the rings anymore. Passing %-1
2145 * as path/ring parameter means don't care. Normally the callers should
2146 * pass the same values here as they do when paths are enabled.
2147 *
2148 * Return: %0 in case of success and negative errno in case of error
2149 */
tb_xdomain_disable_paths(struct tb_xdomain * xd,int transmit_path,int transmit_ring,int receive_path,int receive_ring)2150 int tb_xdomain_disable_paths(struct tb_xdomain *xd, int transmit_path,
2151 int transmit_ring, int receive_path,
2152 int receive_ring)
2153 {
2154 return tb_domain_disconnect_xdomain_paths(xd->tb, xd, transmit_path,
2155 transmit_ring, receive_path,
2156 receive_ring);
2157 }
2158 EXPORT_SYMBOL_GPL(tb_xdomain_disable_paths);
2159
2160 struct tb_xdomain_lookup {
2161 const uuid_t *uuid;
2162 u8 link;
2163 u8 depth;
2164 u64 route;
2165 };
2166
switch_find_xdomain(struct tb_switch * sw,const struct tb_xdomain_lookup * lookup)2167 static struct tb_xdomain *switch_find_xdomain(struct tb_switch *sw,
2168 const struct tb_xdomain_lookup *lookup)
2169 {
2170 struct tb_port *port;
2171
2172 tb_switch_for_each_port(sw, port) {
2173 struct tb_xdomain *xd;
2174
2175 if (port->xdomain) {
2176 xd = port->xdomain;
2177
2178 if (lookup->uuid) {
2179 if (xd->remote_uuid &&
2180 uuid_equal(xd->remote_uuid, lookup->uuid))
2181 return xd;
2182 } else if (lookup->link &&
2183 lookup->link == xd->link &&
2184 lookup->depth == xd->depth) {
2185 return xd;
2186 } else if (lookup->route &&
2187 lookup->route == xd->route) {
2188 return xd;
2189 }
2190 } else if (tb_port_has_remote(port)) {
2191 xd = switch_find_xdomain(port->remote->sw, lookup);
2192 if (xd)
2193 return xd;
2194 }
2195 }
2196
2197 return NULL;
2198 }
2199
2200 /**
2201 * tb_xdomain_find_by_uuid() - Find an XDomain by UUID
2202 * @tb: Domain where the XDomain belongs to
2203 * @uuid: UUID to look for
2204 *
2205 * Finds XDomain by walking through the Thunderbolt topology below @tb.
2206 * The returned XDomain will have its reference count increased so the
2207 * caller needs to call tb_xdomain_put() when it is done with the
2208 * object.
2209 *
2210 * This will find all XDomains including the ones that are not yet added
2211 * to the bus (handshake is still in progress).
2212 *
2213 * The caller needs to hold @tb->lock.
2214 */
tb_xdomain_find_by_uuid(struct tb * tb,const uuid_t * uuid)2215 struct tb_xdomain *tb_xdomain_find_by_uuid(struct tb *tb, const uuid_t *uuid)
2216 {
2217 struct tb_xdomain_lookup lookup;
2218 struct tb_xdomain *xd;
2219
2220 memset(&lookup, 0, sizeof(lookup));
2221 lookup.uuid = uuid;
2222
2223 xd = switch_find_xdomain(tb->root_switch, &lookup);
2224 return tb_xdomain_get(xd);
2225 }
2226 EXPORT_SYMBOL_GPL(tb_xdomain_find_by_uuid);
2227
2228 /**
2229 * tb_xdomain_find_by_link_depth() - Find an XDomain by link and depth
2230 * @tb: Domain where the XDomain belongs to
2231 * @link: Root switch link number
2232 * @depth: Depth in the link
2233 *
2234 * Finds XDomain by walking through the Thunderbolt topology below @tb.
2235 * The returned XDomain will have its reference count increased so the
2236 * caller needs to call tb_xdomain_put() when it is done with the
2237 * object.
2238 *
2239 * This will find all XDomains including the ones that are not yet added
2240 * to the bus (handshake is still in progress).
2241 *
2242 * The caller needs to hold @tb->lock.
2243 */
tb_xdomain_find_by_link_depth(struct tb * tb,u8 link,u8 depth)2244 struct tb_xdomain *tb_xdomain_find_by_link_depth(struct tb *tb, u8 link,
2245 u8 depth)
2246 {
2247 struct tb_xdomain_lookup lookup;
2248 struct tb_xdomain *xd;
2249
2250 memset(&lookup, 0, sizeof(lookup));
2251 lookup.link = link;
2252 lookup.depth = depth;
2253
2254 xd = switch_find_xdomain(tb->root_switch, &lookup);
2255 return tb_xdomain_get(xd);
2256 }
2257
2258 /**
2259 * tb_xdomain_find_by_route() - Find an XDomain by route string
2260 * @tb: Domain where the XDomain belongs to
2261 * @route: XDomain route string
2262 *
2263 * Finds XDomain by walking through the Thunderbolt topology below @tb.
2264 * The returned XDomain will have its reference count increased so the
2265 * caller needs to call tb_xdomain_put() when it is done with the
2266 * object.
2267 *
2268 * This will find all XDomains including the ones that are not yet added
2269 * to the bus (handshake is still in progress).
2270 *
2271 * The caller needs to hold @tb->lock.
2272 */
tb_xdomain_find_by_route(struct tb * tb,u64 route)2273 struct tb_xdomain *tb_xdomain_find_by_route(struct tb *tb, u64 route)
2274 {
2275 struct tb_xdomain_lookup lookup;
2276 struct tb_xdomain *xd;
2277
2278 memset(&lookup, 0, sizeof(lookup));
2279 lookup.route = route;
2280
2281 xd = switch_find_xdomain(tb->root_switch, &lookup);
2282 return tb_xdomain_get(xd);
2283 }
2284 EXPORT_SYMBOL_GPL(tb_xdomain_find_by_route);
2285
tb_xdomain_handle_request(struct tb * tb,enum tb_cfg_pkg_type type,const void * buf,size_t size)2286 bool tb_xdomain_handle_request(struct tb *tb, enum tb_cfg_pkg_type type,
2287 const void *buf, size_t size)
2288 {
2289 const struct tb_protocol_handler *handler, *tmp;
2290 const struct tb_xdp_header *hdr = buf;
2291 unsigned int length;
2292 int ret = 0;
2293
2294 /* We expect the packet is at least size of the header */
2295 length = hdr->xd_hdr.length_sn & TB_XDOMAIN_LENGTH_MASK;
2296 if (length != size / 4 - sizeof(hdr->xd_hdr) / 4)
2297 return true;
2298 if (length < sizeof(*hdr) / 4 - sizeof(hdr->xd_hdr) / 4)
2299 return true;
2300
2301 /*
2302 * Handle XDomain discovery protocol packets directly here. For
2303 * other protocols (based on their UUID) we call registered
2304 * handlers in turn.
2305 */
2306 if (uuid_equal(&hdr->uuid, &tb_xdp_uuid)) {
2307 if (type == TB_CFG_PKG_XDOMAIN_REQ)
2308 return tb_xdp_schedule_request(tb, hdr, size);
2309 return false;
2310 }
2311
2312 mutex_lock(&xdomain_lock);
2313 list_for_each_entry_safe(handler, tmp, &protocol_handlers, list) {
2314 if (!uuid_equal(&hdr->uuid, handler->uuid))
2315 continue;
2316
2317 mutex_unlock(&xdomain_lock);
2318 ret = handler->callback(buf, size, handler->data);
2319 mutex_lock(&xdomain_lock);
2320
2321 if (ret)
2322 break;
2323 }
2324 mutex_unlock(&xdomain_lock);
2325
2326 return ret > 0;
2327 }
2328
update_xdomain(struct device * dev,void * data)2329 static int update_xdomain(struct device *dev, void *data)
2330 {
2331 struct tb_xdomain *xd;
2332
2333 xd = tb_to_xdomain(dev);
2334 if (xd) {
2335 queue_delayed_work(xd->tb->wq, &xd->properties_changed_work,
2336 msecs_to_jiffies(50));
2337 }
2338
2339 return 0;
2340 }
2341
update_all_xdomains(void)2342 static void update_all_xdomains(void)
2343 {
2344 bus_for_each_dev(&tb_bus_type, NULL, NULL, update_xdomain);
2345 }
2346
remove_directory(const char * key,const struct tb_property_dir * dir)2347 static bool remove_directory(const char *key, const struct tb_property_dir *dir)
2348 {
2349 struct tb_property *p;
2350
2351 p = tb_property_find(xdomain_property_dir, key,
2352 TB_PROPERTY_TYPE_DIRECTORY);
2353 if (p && p->value.dir == dir) {
2354 tb_property_remove(p);
2355 return true;
2356 }
2357 return false;
2358 }
2359
2360 /**
2361 * tb_register_property_dir() - Register property directory to the host
2362 * @key: Key (name) of the directory to add
2363 * @dir: Directory to add
2364 *
2365 * Service drivers can use this function to add new property directory
2366 * to the host available properties. The other connected hosts are
2367 * notified so they can re-read properties of this host if they are
2368 * interested.
2369 *
2370 * Return: %0 on success and negative errno on failure
2371 */
tb_register_property_dir(const char * key,struct tb_property_dir * dir)2372 int tb_register_property_dir(const char *key, struct tb_property_dir *dir)
2373 {
2374 int ret;
2375
2376 if (WARN_ON(!xdomain_property_dir))
2377 return -EAGAIN;
2378
2379 if (!key || strlen(key) > 8)
2380 return -EINVAL;
2381
2382 mutex_lock(&xdomain_lock);
2383 if (tb_property_find(xdomain_property_dir, key,
2384 TB_PROPERTY_TYPE_DIRECTORY)) {
2385 ret = -EEXIST;
2386 goto err_unlock;
2387 }
2388
2389 ret = tb_property_add_dir(xdomain_property_dir, key, dir);
2390 if (ret)
2391 goto err_unlock;
2392
2393 xdomain_property_block_gen++;
2394
2395 mutex_unlock(&xdomain_lock);
2396 update_all_xdomains();
2397 return 0;
2398
2399 err_unlock:
2400 mutex_unlock(&xdomain_lock);
2401 return ret;
2402 }
2403 EXPORT_SYMBOL_GPL(tb_register_property_dir);
2404
2405 /**
2406 * tb_unregister_property_dir() - Removes property directory from host
2407 * @key: Key (name) of the directory
2408 * @dir: Directory to remove
2409 *
2410 * This will remove the existing directory from this host and notify the
2411 * connected hosts about the change.
2412 */
tb_unregister_property_dir(const char * key,struct tb_property_dir * dir)2413 void tb_unregister_property_dir(const char *key, struct tb_property_dir *dir)
2414 {
2415 int ret = 0;
2416
2417 mutex_lock(&xdomain_lock);
2418 if (remove_directory(key, dir))
2419 xdomain_property_block_gen++;
2420 mutex_unlock(&xdomain_lock);
2421
2422 if (!ret)
2423 update_all_xdomains();
2424 }
2425 EXPORT_SYMBOL_GPL(tb_unregister_property_dir);
2426
tb_xdomain_init(void)2427 int tb_xdomain_init(void)
2428 {
2429 xdomain_property_dir = tb_property_create_dir(NULL);
2430 if (!xdomain_property_dir)
2431 return -ENOMEM;
2432
2433 /*
2434 * Initialize standard set of properties without any service
2435 * directories. Those will be added by service drivers
2436 * themselves when they are loaded.
2437 *
2438 * Rest of the properties are filled dynamically based on these
2439 * when the P2P connection is made.
2440 */
2441 tb_property_add_immediate(xdomain_property_dir, "vendorid",
2442 PCI_VENDOR_ID_INTEL);
2443 tb_property_add_text(xdomain_property_dir, "vendorid", "Intel Corp.");
2444 tb_property_add_immediate(xdomain_property_dir, "deviceid", 0x1);
2445 tb_property_add_immediate(xdomain_property_dir, "devicerv", 0x80000100);
2446
2447 xdomain_property_block_gen = get_random_u32();
2448 return 0;
2449 }
2450
tb_xdomain_exit(void)2451 void tb_xdomain_exit(void)
2452 {
2453 tb_property_free_dir(xdomain_property_dir);
2454 }
2455