1 // SPDX-License-Identifier: GPL-2.0 2 /* 3 * Thunderbolt XDomain discovery protocol support 4 * 5 * Copyright (C) 2017, Intel Corporation 6 * Authors: Michael Jamet <michael.jamet@intel.com> 7 * Mika Westerberg <mika.westerberg@linux.intel.com> 8 */ 9 10 #include <linux/device.h> 11 #include <linux/delay.h> 12 #include <linux/kmod.h> 13 #include <linux/module.h> 14 #include <linux/pm_runtime.h> 15 #include <linux/prandom.h> 16 #include <linux/string_helpers.h> 17 #include <linux/utsname.h> 18 #include <linux/uuid.h> 19 #include <linux/workqueue.h> 20 21 #include "tb.h" 22 23 #define XDOMAIN_SHORT_TIMEOUT 100 /* ms */ 24 #define XDOMAIN_DEFAULT_TIMEOUT 1000 /* ms */ 25 #define XDOMAIN_BONDING_TIMEOUT 10000 /* ms */ 26 #define XDOMAIN_RETRIES 10 27 #define XDOMAIN_DEFAULT_MAX_HOPID 15 28 29 enum { 30 XDOMAIN_STATE_INIT, 31 XDOMAIN_STATE_UUID, 32 XDOMAIN_STATE_LINK_STATUS, 33 XDOMAIN_STATE_LINK_STATE_CHANGE, 34 XDOMAIN_STATE_LINK_STATUS2, 35 XDOMAIN_STATE_BONDING_UUID_LOW, 36 XDOMAIN_STATE_BONDING_UUID_HIGH, 37 XDOMAIN_STATE_PROPERTIES, 38 XDOMAIN_STATE_ENUMERATED, 39 XDOMAIN_STATE_ERROR, 40 }; 41 42 static const char * const state_names[] = { 43 [XDOMAIN_STATE_INIT] = "INIT", 44 [XDOMAIN_STATE_UUID] = "UUID", 45 [XDOMAIN_STATE_LINK_STATUS] = "LINK_STATUS", 46 [XDOMAIN_STATE_LINK_STATE_CHANGE] = "LINK_STATE_CHANGE", 47 [XDOMAIN_STATE_LINK_STATUS2] = "LINK_STATUS2", 48 [XDOMAIN_STATE_BONDING_UUID_LOW] = "BONDING_UUID_LOW", 49 [XDOMAIN_STATE_BONDING_UUID_HIGH] = "BONDING_UUID_HIGH", 50 [XDOMAIN_STATE_PROPERTIES] = "PROPERTIES", 51 [XDOMAIN_STATE_ENUMERATED] = "ENUMERATED", 52 [XDOMAIN_STATE_ERROR] = "ERROR", 53 }; 54 55 struct xdomain_request_work { 56 struct work_struct work; 57 struct tb_xdp_header *pkg; 58 struct tb *tb; 59 }; 60 61 static bool tb_xdomain_enabled = true; 62 module_param_named(xdomain, tb_xdomain_enabled, bool, 0444); 63 MODULE_PARM_DESC(xdomain, "allow XDomain protocol (default: true)"); 64 65 /* 66 * Serializes access to the properties and protocol handlers below. If 67 * you need to take both this lock and the struct tb_xdomain lock, take 68 * this one first. 69 */ 70 static DEFINE_MUTEX(xdomain_lock); 71 72 /* Properties exposed to the remote domains */ 73 static struct tb_property_dir *xdomain_property_dir; 74 static u32 xdomain_property_block_gen; 75 76 /* Additional protocol handlers */ 77 static LIST_HEAD(protocol_handlers); 78 79 /* UUID for XDomain discovery protocol: b638d70e-42ff-40bb-97c2-90e2c0b2ff07 */ 80 static const uuid_t tb_xdp_uuid = 81 UUID_INIT(0xb638d70e, 0x42ff, 0x40bb, 82 0x97, 0xc2, 0x90, 0xe2, 0xc0, 0xb2, 0xff, 0x07); 83 84 bool tb_is_xdomain_enabled(void) 85 { 86 return tb_xdomain_enabled && tb_acpi_is_xdomain_allowed(); 87 } 88 89 static bool tb_xdomain_match(const struct tb_cfg_request *req, 90 const struct ctl_pkg *pkg) 91 { 92 switch (pkg->frame.eof) { 93 case TB_CFG_PKG_ERROR: 94 return true; 95 96 case TB_CFG_PKG_XDOMAIN_RESP: { 97 const struct tb_xdp_header *res_hdr = pkg->buffer; 98 const struct tb_xdp_header *req_hdr = req->request; 99 100 if (pkg->frame.size < req->response_size / 4) 101 return false; 102 103 /* Make sure route matches */ 104 if ((res_hdr->xd_hdr.route_hi & ~BIT(31)) != 105 req_hdr->xd_hdr.route_hi) 106 return false; 107 if ((res_hdr->xd_hdr.route_lo) != req_hdr->xd_hdr.route_lo) 108 return false; 109 110 /* Check that the XDomain protocol matches */ 111 if (!uuid_equal(&res_hdr->uuid, &req_hdr->uuid)) 112 return false; 113 114 return true; 115 } 116 117 default: 118 return false; 119 } 120 } 121 122 static bool tb_xdomain_copy(struct tb_cfg_request *req, 123 const struct ctl_pkg *pkg) 124 { 125 memcpy(req->response, pkg->buffer, req->response_size); 126 req->result.err = 0; 127 return true; 128 } 129 130 static void response_ready(void *data) 131 { 132 tb_cfg_request_put(data); 133 } 134 135 static int __tb_xdomain_response(struct tb_ctl *ctl, const void *response, 136 size_t size, enum tb_cfg_pkg_type type) 137 { 138 struct tb_cfg_request *req; 139 140 req = tb_cfg_request_alloc(); 141 if (!req) 142 return -ENOMEM; 143 144 req->match = tb_xdomain_match; 145 req->copy = tb_xdomain_copy; 146 req->request = response; 147 req->request_size = size; 148 req->request_type = type; 149 150 return tb_cfg_request(ctl, req, response_ready, req); 151 } 152 153 /** 154 * tb_xdomain_response() - Send a XDomain response message 155 * @xd: XDomain to send the message 156 * @response: Response to send 157 * @size: Size of the response 158 * @type: PDF type of the response 159 * 160 * This can be used to send a XDomain response message to the other 161 * domain. No response for the message is expected. 162 * 163 * Return: %0 in case of success and negative errno in case of failure 164 */ 165 int tb_xdomain_response(struct tb_xdomain *xd, const void *response, 166 size_t size, enum tb_cfg_pkg_type type) 167 { 168 return __tb_xdomain_response(xd->tb->ctl, response, size, type); 169 } 170 EXPORT_SYMBOL_GPL(tb_xdomain_response); 171 172 static int __tb_xdomain_request(struct tb_ctl *ctl, const void *request, 173 size_t request_size, enum tb_cfg_pkg_type request_type, void *response, 174 size_t response_size, enum tb_cfg_pkg_type response_type, 175 unsigned int timeout_msec) 176 { 177 struct tb_cfg_request *req; 178 struct tb_cfg_result res; 179 180 req = tb_cfg_request_alloc(); 181 if (!req) 182 return -ENOMEM; 183 184 req->match = tb_xdomain_match; 185 req->copy = tb_xdomain_copy; 186 req->request = request; 187 req->request_size = request_size; 188 req->request_type = request_type; 189 req->response = response; 190 req->response_size = response_size; 191 req->response_type = response_type; 192 193 res = tb_cfg_request_sync(ctl, req, timeout_msec); 194 195 tb_cfg_request_put(req); 196 197 return res.err == 1 ? -EIO : res.err; 198 } 199 200 /** 201 * tb_xdomain_request() - Send a XDomain request 202 * @xd: XDomain to send the request 203 * @request: Request to send 204 * @request_size: Size of the request in bytes 205 * @request_type: PDF type of the request 206 * @response: Response is copied here 207 * @response_size: Expected size of the response in bytes 208 * @response_type: Expected PDF type of the response 209 * @timeout_msec: Timeout in milliseconds to wait for the response 210 * 211 * This function can be used to send XDomain control channel messages to 212 * the other domain. The function waits until the response is received 213 * or when timeout triggers. Whichever comes first. 214 * 215 * Return: %0 in case of success and negative errno in case of failure 216 */ 217 int tb_xdomain_request(struct tb_xdomain *xd, const void *request, 218 size_t request_size, enum tb_cfg_pkg_type request_type, 219 void *response, size_t response_size, 220 enum tb_cfg_pkg_type response_type, unsigned int timeout_msec) 221 { 222 return __tb_xdomain_request(xd->tb->ctl, request, request_size, 223 request_type, response, response_size, 224 response_type, timeout_msec); 225 } 226 EXPORT_SYMBOL_GPL(tb_xdomain_request); 227 228 static inline void tb_xdp_fill_header(struct tb_xdp_header *hdr, u64 route, 229 u8 sequence, enum tb_xdp_type type, size_t size) 230 { 231 u32 length_sn; 232 233 length_sn = (size - sizeof(hdr->xd_hdr)) / 4; 234 length_sn |= (sequence << TB_XDOMAIN_SN_SHIFT) & TB_XDOMAIN_SN_MASK; 235 236 hdr->xd_hdr.route_hi = upper_32_bits(route); 237 hdr->xd_hdr.route_lo = lower_32_bits(route); 238 hdr->xd_hdr.length_sn = length_sn; 239 hdr->type = type; 240 memcpy(&hdr->uuid, &tb_xdp_uuid, sizeof(tb_xdp_uuid)); 241 } 242 243 static int tb_xdp_handle_error(const struct tb_xdp_error_response *res) 244 { 245 if (res->hdr.type != ERROR_RESPONSE) 246 return 0; 247 248 switch (res->error) { 249 case ERROR_UNKNOWN_PACKET: 250 case ERROR_UNKNOWN_DOMAIN: 251 return -EIO; 252 case ERROR_NOT_SUPPORTED: 253 return -ENOTSUPP; 254 case ERROR_NOT_READY: 255 return -EAGAIN; 256 default: 257 break; 258 } 259 260 return 0; 261 } 262 263 static int tb_xdp_uuid_request(struct tb_ctl *ctl, u64 route, int retry, 264 uuid_t *uuid, u64 *remote_route) 265 { 266 struct tb_xdp_uuid_response res; 267 struct tb_xdp_uuid req; 268 int ret; 269 270 memset(&req, 0, sizeof(req)); 271 tb_xdp_fill_header(&req.hdr, route, retry % 4, UUID_REQUEST, 272 sizeof(req)); 273 274 memset(&res, 0, sizeof(res)); 275 ret = __tb_xdomain_request(ctl, &req, sizeof(req), 276 TB_CFG_PKG_XDOMAIN_REQ, &res, sizeof(res), 277 TB_CFG_PKG_XDOMAIN_RESP, 278 XDOMAIN_DEFAULT_TIMEOUT); 279 if (ret) 280 return ret; 281 282 ret = tb_xdp_handle_error(&res.err); 283 if (ret) 284 return ret; 285 286 uuid_copy(uuid, &res.src_uuid); 287 *remote_route = (u64)res.src_route_hi << 32 | res.src_route_lo; 288 289 return 0; 290 } 291 292 static int tb_xdp_uuid_response(struct tb_ctl *ctl, u64 route, u8 sequence, 293 const uuid_t *uuid) 294 { 295 struct tb_xdp_uuid_response res; 296 297 memset(&res, 0, sizeof(res)); 298 tb_xdp_fill_header(&res.hdr, route, sequence, UUID_RESPONSE, 299 sizeof(res)); 300 301 uuid_copy(&res.src_uuid, uuid); 302 res.src_route_hi = upper_32_bits(route); 303 res.src_route_lo = lower_32_bits(route); 304 305 return __tb_xdomain_response(ctl, &res, sizeof(res), 306 TB_CFG_PKG_XDOMAIN_RESP); 307 } 308 309 static int tb_xdp_error_response(struct tb_ctl *ctl, u64 route, u8 sequence, 310 enum tb_xdp_error error) 311 { 312 struct tb_xdp_error_response res; 313 314 memset(&res, 0, sizeof(res)); 315 tb_xdp_fill_header(&res.hdr, route, sequence, ERROR_RESPONSE, 316 sizeof(res)); 317 res.error = error; 318 319 return __tb_xdomain_response(ctl, &res, sizeof(res), 320 TB_CFG_PKG_XDOMAIN_RESP); 321 } 322 323 static int tb_xdp_properties_request(struct tb_ctl *ctl, u64 route, 324 const uuid_t *src_uuid, const uuid_t *dst_uuid, int retry, 325 u32 **block, u32 *generation) 326 { 327 struct tb_xdp_properties_response *res; 328 struct tb_xdp_properties req; 329 u16 data_len, len; 330 size_t total_size; 331 u32 *data = NULL; 332 int ret; 333 334 total_size = sizeof(*res) + TB_XDP_PROPERTIES_MAX_DATA_LENGTH * 4; 335 res = kzalloc(total_size, GFP_KERNEL); 336 if (!res) 337 return -ENOMEM; 338 339 memset(&req, 0, sizeof(req)); 340 tb_xdp_fill_header(&req.hdr, route, retry % 4, PROPERTIES_REQUEST, 341 sizeof(req)); 342 memcpy(&req.src_uuid, src_uuid, sizeof(*src_uuid)); 343 memcpy(&req.dst_uuid, dst_uuid, sizeof(*dst_uuid)); 344 345 data_len = 0; 346 347 do { 348 ret = __tb_xdomain_request(ctl, &req, sizeof(req), 349 TB_CFG_PKG_XDOMAIN_REQ, res, 350 total_size, TB_CFG_PKG_XDOMAIN_RESP, 351 XDOMAIN_DEFAULT_TIMEOUT); 352 if (ret) 353 goto err; 354 355 ret = tb_xdp_handle_error(&res->err); 356 if (ret) 357 goto err; 358 359 /* 360 * Package length includes the whole payload without the 361 * XDomain header. Validate first that the package is at 362 * least size of the response structure. 363 */ 364 len = res->hdr.xd_hdr.length_sn & TB_XDOMAIN_LENGTH_MASK; 365 if (len < sizeof(*res) / 4) { 366 ret = -EINVAL; 367 goto err; 368 } 369 370 len += sizeof(res->hdr.xd_hdr) / 4; 371 len -= sizeof(*res) / 4; 372 373 if (res->offset != req.offset) { 374 ret = -EINVAL; 375 goto err; 376 } 377 378 /* 379 * First time allocate block that has enough space for 380 * the whole properties block. 381 */ 382 if (!data) { 383 data_len = res->data_length; 384 if (data_len > TB_XDP_PROPERTIES_MAX_LENGTH) { 385 ret = -E2BIG; 386 goto err; 387 } 388 389 data = kcalloc(data_len, sizeof(u32), GFP_KERNEL); 390 if (!data) { 391 ret = -ENOMEM; 392 goto err; 393 } 394 } 395 396 memcpy(data + req.offset, res->data, len * 4); 397 req.offset += len; 398 } while (!data_len || req.offset < data_len); 399 400 *block = data; 401 *generation = res->generation; 402 403 kfree(res); 404 405 return data_len; 406 407 err: 408 kfree(data); 409 kfree(res); 410 411 return ret; 412 } 413 414 static int tb_xdp_properties_response(struct tb *tb, struct tb_ctl *ctl, 415 struct tb_xdomain *xd, u8 sequence, const struct tb_xdp_properties *req) 416 { 417 struct tb_xdp_properties_response *res; 418 size_t total_size; 419 u16 len; 420 int ret; 421 422 /* 423 * Currently we expect all requests to be directed to us. The 424 * protocol supports forwarding, though which we might add 425 * support later on. 426 */ 427 if (!uuid_equal(xd->local_uuid, &req->dst_uuid)) { 428 tb_xdp_error_response(ctl, xd->route, sequence, 429 ERROR_UNKNOWN_DOMAIN); 430 return 0; 431 } 432 433 mutex_lock(&xd->lock); 434 435 if (req->offset >= xd->local_property_block_len) { 436 mutex_unlock(&xd->lock); 437 return -EINVAL; 438 } 439 440 len = xd->local_property_block_len - req->offset; 441 len = min_t(u16, len, TB_XDP_PROPERTIES_MAX_DATA_LENGTH); 442 total_size = sizeof(*res) + len * 4; 443 444 res = kzalloc(total_size, GFP_KERNEL); 445 if (!res) { 446 mutex_unlock(&xd->lock); 447 return -ENOMEM; 448 } 449 450 tb_xdp_fill_header(&res->hdr, xd->route, sequence, PROPERTIES_RESPONSE, 451 total_size); 452 res->generation = xd->local_property_block_gen; 453 res->data_length = xd->local_property_block_len; 454 res->offset = req->offset; 455 uuid_copy(&res->src_uuid, xd->local_uuid); 456 uuid_copy(&res->dst_uuid, &req->src_uuid); 457 memcpy(res->data, &xd->local_property_block[req->offset], len * 4); 458 459 mutex_unlock(&xd->lock); 460 461 ret = __tb_xdomain_response(ctl, res, total_size, 462 TB_CFG_PKG_XDOMAIN_RESP); 463 464 kfree(res); 465 return ret; 466 } 467 468 static int tb_xdp_properties_changed_request(struct tb_ctl *ctl, u64 route, 469 int retry, const uuid_t *uuid) 470 { 471 struct tb_xdp_properties_changed_response res; 472 struct tb_xdp_properties_changed req; 473 int ret; 474 475 memset(&req, 0, sizeof(req)); 476 tb_xdp_fill_header(&req.hdr, route, retry % 4, 477 PROPERTIES_CHANGED_REQUEST, sizeof(req)); 478 uuid_copy(&req.src_uuid, uuid); 479 480 memset(&res, 0, sizeof(res)); 481 ret = __tb_xdomain_request(ctl, &req, sizeof(req), 482 TB_CFG_PKG_XDOMAIN_REQ, &res, sizeof(res), 483 TB_CFG_PKG_XDOMAIN_RESP, 484 XDOMAIN_DEFAULT_TIMEOUT); 485 if (ret) 486 return ret; 487 488 return tb_xdp_handle_error(&res.err); 489 } 490 491 static int 492 tb_xdp_properties_changed_response(struct tb_ctl *ctl, u64 route, u8 sequence) 493 { 494 struct tb_xdp_properties_changed_response res; 495 496 memset(&res, 0, sizeof(res)); 497 tb_xdp_fill_header(&res.hdr, route, sequence, 498 PROPERTIES_CHANGED_RESPONSE, sizeof(res)); 499 return __tb_xdomain_response(ctl, &res, sizeof(res), 500 TB_CFG_PKG_XDOMAIN_RESP); 501 } 502 503 static int tb_xdp_link_state_status_request(struct tb_ctl *ctl, u64 route, 504 u8 sequence, u8 *slw, u8 *tlw, 505 u8 *sls, u8 *tls) 506 { 507 struct tb_xdp_link_state_status_response res; 508 struct tb_xdp_link_state_status req; 509 int ret; 510 511 memset(&req, 0, sizeof(req)); 512 tb_xdp_fill_header(&req.hdr, route, sequence, LINK_STATE_STATUS_REQUEST, 513 sizeof(req)); 514 515 memset(&res, 0, sizeof(res)); 516 ret = __tb_xdomain_request(ctl, &req, sizeof(req), TB_CFG_PKG_XDOMAIN_REQ, 517 &res, sizeof(res), TB_CFG_PKG_XDOMAIN_RESP, 518 XDOMAIN_DEFAULT_TIMEOUT); 519 if (ret) 520 return ret; 521 522 ret = tb_xdp_handle_error(&res.err); 523 if (ret) 524 return ret; 525 526 if (res.status != 0) 527 return -EREMOTEIO; 528 529 *slw = res.slw; 530 *tlw = res.tlw; 531 *sls = res.sls; 532 *tls = res.tls; 533 534 return 0; 535 } 536 537 static int tb_xdp_link_state_status_response(struct tb *tb, struct tb_ctl *ctl, 538 struct tb_xdomain *xd, u8 sequence) 539 { 540 struct tb_switch *sw = tb_to_switch(xd->dev.parent); 541 struct tb_xdp_link_state_status_response res; 542 struct tb_port *port = tb_port_at(xd->route, sw); 543 u32 val[2]; 544 int ret; 545 546 memset(&res, 0, sizeof(res)); 547 tb_xdp_fill_header(&res.hdr, xd->route, sequence, 548 LINK_STATE_STATUS_RESPONSE, sizeof(res)); 549 550 ret = tb_port_read(port, val, TB_CFG_PORT, 551 port->cap_phy + LANE_ADP_CS_0, ARRAY_SIZE(val)); 552 if (ret) 553 return ret; 554 555 res.slw = (val[0] & LANE_ADP_CS_0_SUPPORTED_WIDTH_MASK) >> 556 LANE_ADP_CS_0_SUPPORTED_WIDTH_SHIFT; 557 res.sls = (val[0] & LANE_ADP_CS_0_SUPPORTED_SPEED_MASK) >> 558 LANE_ADP_CS_0_SUPPORTED_SPEED_SHIFT; 559 res.tls = val[1] & LANE_ADP_CS_1_TARGET_SPEED_MASK; 560 res.tlw = (val[1] & LANE_ADP_CS_1_TARGET_WIDTH_MASK) >> 561 LANE_ADP_CS_1_TARGET_WIDTH_SHIFT; 562 563 return __tb_xdomain_response(ctl, &res, sizeof(res), 564 TB_CFG_PKG_XDOMAIN_RESP); 565 } 566 567 static int tb_xdp_link_state_change_request(struct tb_ctl *ctl, u64 route, 568 u8 sequence, u8 tlw, u8 tls) 569 { 570 struct tb_xdp_link_state_change_response res; 571 struct tb_xdp_link_state_change req; 572 int ret; 573 574 memset(&req, 0, sizeof(req)); 575 tb_xdp_fill_header(&req.hdr, route, sequence, LINK_STATE_CHANGE_REQUEST, 576 sizeof(req)); 577 req.tlw = tlw; 578 req.tls = tls; 579 580 memset(&res, 0, sizeof(res)); 581 ret = __tb_xdomain_request(ctl, &req, sizeof(req), TB_CFG_PKG_XDOMAIN_REQ, 582 &res, sizeof(res), TB_CFG_PKG_XDOMAIN_RESP, 583 XDOMAIN_DEFAULT_TIMEOUT); 584 if (ret) 585 return ret; 586 587 ret = tb_xdp_handle_error(&res.err); 588 if (ret) 589 return ret; 590 591 return res.status != 0 ? -EREMOTEIO : 0; 592 } 593 594 static int tb_xdp_link_state_change_response(struct tb_ctl *ctl, u64 route, 595 u8 sequence, u32 status) 596 { 597 struct tb_xdp_link_state_change_response res; 598 599 memset(&res, 0, sizeof(res)); 600 tb_xdp_fill_header(&res.hdr, route, sequence, LINK_STATE_CHANGE_RESPONSE, 601 sizeof(res)); 602 603 res.status = status; 604 605 return __tb_xdomain_response(ctl, &res, sizeof(res), 606 TB_CFG_PKG_XDOMAIN_RESP); 607 } 608 609 /** 610 * tb_register_protocol_handler() - Register protocol handler 611 * @handler: Handler to register 612 * 613 * This allows XDomain service drivers to hook into incoming XDomain 614 * messages. After this function is called the service driver needs to 615 * be able to handle calls to callback whenever a package with the 616 * registered protocol is received. 617 */ 618 int tb_register_protocol_handler(struct tb_protocol_handler *handler) 619 { 620 if (!handler->uuid || !handler->callback) 621 return -EINVAL; 622 if (uuid_equal(handler->uuid, &tb_xdp_uuid)) 623 return -EINVAL; 624 625 mutex_lock(&xdomain_lock); 626 list_add_tail(&handler->list, &protocol_handlers); 627 mutex_unlock(&xdomain_lock); 628 629 return 0; 630 } 631 EXPORT_SYMBOL_GPL(tb_register_protocol_handler); 632 633 /** 634 * tb_unregister_protocol_handler() - Unregister protocol handler 635 * @handler: Handler to unregister 636 * 637 * Removes the previously registered protocol handler. 638 */ 639 void tb_unregister_protocol_handler(struct tb_protocol_handler *handler) 640 { 641 mutex_lock(&xdomain_lock); 642 list_del_init(&handler->list); 643 mutex_unlock(&xdomain_lock); 644 } 645 EXPORT_SYMBOL_GPL(tb_unregister_protocol_handler); 646 647 static void update_property_block(struct tb_xdomain *xd) 648 { 649 mutex_lock(&xdomain_lock); 650 mutex_lock(&xd->lock); 651 /* 652 * If the local property block is not up-to-date, rebuild it now 653 * based on the global property template. 654 */ 655 if (!xd->local_property_block || 656 xd->local_property_block_gen < xdomain_property_block_gen) { 657 struct tb_property_dir *dir; 658 int ret, block_len; 659 u32 *block; 660 661 dir = tb_property_copy_dir(xdomain_property_dir); 662 if (!dir) { 663 dev_warn(&xd->dev, "failed to copy properties\n"); 664 goto out_unlock; 665 } 666 667 /* Fill in non-static properties now */ 668 tb_property_add_text(dir, "deviceid", utsname()->nodename); 669 tb_property_add_immediate(dir, "maxhopid", xd->local_max_hopid); 670 671 ret = tb_property_format_dir(dir, NULL, 0); 672 if (ret < 0) { 673 dev_warn(&xd->dev, "local property block creation failed\n"); 674 tb_property_free_dir(dir); 675 goto out_unlock; 676 } 677 678 block_len = ret; 679 block = kcalloc(block_len, sizeof(*block), GFP_KERNEL); 680 if (!block) { 681 tb_property_free_dir(dir); 682 goto out_unlock; 683 } 684 685 ret = tb_property_format_dir(dir, block, block_len); 686 if (ret) { 687 dev_warn(&xd->dev, "property block generation failed\n"); 688 tb_property_free_dir(dir); 689 kfree(block); 690 goto out_unlock; 691 } 692 693 tb_property_free_dir(dir); 694 /* Release the previous block */ 695 kfree(xd->local_property_block); 696 /* Assign new one */ 697 xd->local_property_block = block; 698 xd->local_property_block_len = block_len; 699 xd->local_property_block_gen = xdomain_property_block_gen; 700 } 701 702 out_unlock: 703 mutex_unlock(&xd->lock); 704 mutex_unlock(&xdomain_lock); 705 } 706 707 static void tb_xdp_handle_request(struct work_struct *work) 708 { 709 struct xdomain_request_work *xw = container_of(work, typeof(*xw), work); 710 const struct tb_xdp_header *pkg = xw->pkg; 711 const struct tb_xdomain_header *xhdr = &pkg->xd_hdr; 712 struct tb *tb = xw->tb; 713 struct tb_ctl *ctl = tb->ctl; 714 struct tb_xdomain *xd; 715 const uuid_t *uuid; 716 int ret = 0; 717 u32 sequence; 718 u64 route; 719 720 route = ((u64)xhdr->route_hi << 32 | xhdr->route_lo) & ~BIT_ULL(63); 721 sequence = xhdr->length_sn & TB_XDOMAIN_SN_MASK; 722 sequence >>= TB_XDOMAIN_SN_SHIFT; 723 724 mutex_lock(&tb->lock); 725 if (tb->root_switch) 726 uuid = tb->root_switch->uuid; 727 else 728 uuid = NULL; 729 mutex_unlock(&tb->lock); 730 731 if (!uuid) { 732 tb_xdp_error_response(ctl, route, sequence, ERROR_NOT_READY); 733 goto out; 734 } 735 736 xd = tb_xdomain_find_by_route_locked(tb, route); 737 if (xd) 738 update_property_block(xd); 739 740 switch (pkg->type) { 741 case PROPERTIES_REQUEST: 742 tb_dbg(tb, "%llx: received XDomain properties request\n", route); 743 if (xd) { 744 ret = tb_xdp_properties_response(tb, ctl, xd, sequence, 745 (const struct tb_xdp_properties *)pkg); 746 } 747 break; 748 749 case PROPERTIES_CHANGED_REQUEST: 750 tb_dbg(tb, "%llx: received XDomain properties changed request\n", 751 route); 752 753 ret = tb_xdp_properties_changed_response(ctl, route, sequence); 754 755 /* 756 * Since the properties have been changed, let's update 757 * the xdomain related to this connection as well in 758 * case there is a change in services it offers. 759 */ 760 if (xd && device_is_registered(&xd->dev)) 761 queue_delayed_work(tb->wq, &xd->state_work, 762 msecs_to_jiffies(XDOMAIN_SHORT_TIMEOUT)); 763 break; 764 765 case UUID_REQUEST_OLD: 766 case UUID_REQUEST: 767 tb_dbg(tb, "%llx: received XDomain UUID request\n", route); 768 ret = tb_xdp_uuid_response(ctl, route, sequence, uuid); 769 break; 770 771 case LINK_STATE_STATUS_REQUEST: 772 tb_dbg(tb, "%llx: received XDomain link state status request\n", 773 route); 774 775 if (xd) { 776 ret = tb_xdp_link_state_status_response(tb, ctl, xd, 777 sequence); 778 } else { 779 tb_xdp_error_response(ctl, route, sequence, 780 ERROR_NOT_READY); 781 } 782 break; 783 784 case LINK_STATE_CHANGE_REQUEST: 785 tb_dbg(tb, "%llx: received XDomain link state change request\n", 786 route); 787 788 if (xd && xd->state == XDOMAIN_STATE_BONDING_UUID_HIGH) { 789 const struct tb_xdp_link_state_change *lsc = 790 (const struct tb_xdp_link_state_change *)pkg; 791 792 ret = tb_xdp_link_state_change_response(ctl, route, 793 sequence, 0); 794 xd->target_link_width = lsc->tlw; 795 queue_delayed_work(tb->wq, &xd->state_work, 796 msecs_to_jiffies(XDOMAIN_SHORT_TIMEOUT)); 797 } else { 798 tb_xdp_error_response(ctl, route, sequence, 799 ERROR_NOT_READY); 800 } 801 break; 802 803 default: 804 tb_dbg(tb, "%llx: unknown XDomain request %#x\n", route, pkg->type); 805 tb_xdp_error_response(ctl, route, sequence, 806 ERROR_NOT_SUPPORTED); 807 break; 808 } 809 810 tb_xdomain_put(xd); 811 812 if (ret) { 813 tb_warn(tb, "failed to send XDomain response for %#x\n", 814 pkg->type); 815 } 816 817 out: 818 kfree(xw->pkg); 819 kfree(xw); 820 821 tb_domain_put(tb); 822 } 823 824 static bool 825 tb_xdp_schedule_request(struct tb *tb, const struct tb_xdp_header *hdr, 826 size_t size) 827 { 828 struct xdomain_request_work *xw; 829 830 xw = kmalloc(sizeof(*xw), GFP_KERNEL); 831 if (!xw) 832 return false; 833 834 INIT_WORK(&xw->work, tb_xdp_handle_request); 835 xw->pkg = kmemdup(hdr, size, GFP_KERNEL); 836 if (!xw->pkg) { 837 kfree(xw); 838 return false; 839 } 840 xw->tb = tb_domain_get(tb); 841 842 schedule_work(&xw->work); 843 return true; 844 } 845 846 /** 847 * tb_register_service_driver() - Register XDomain service driver 848 * @drv: Driver to register 849 * 850 * Registers new service driver from @drv to the bus. 851 */ 852 int tb_register_service_driver(struct tb_service_driver *drv) 853 { 854 drv->driver.bus = &tb_bus_type; 855 return driver_register(&drv->driver); 856 } 857 EXPORT_SYMBOL_GPL(tb_register_service_driver); 858 859 /** 860 * tb_unregister_service_driver() - Unregister XDomain service driver 861 * @drv: Driver to unregister 862 * 863 * Unregisters XDomain service driver from the bus. 864 */ 865 void tb_unregister_service_driver(struct tb_service_driver *drv) 866 { 867 driver_unregister(&drv->driver); 868 } 869 EXPORT_SYMBOL_GPL(tb_unregister_service_driver); 870 871 static ssize_t key_show(struct device *dev, struct device_attribute *attr, 872 char *buf) 873 { 874 struct tb_service *svc = container_of(dev, struct tb_service, dev); 875 876 /* 877 * It should be null terminated but anything else is pretty much 878 * allowed. 879 */ 880 return sysfs_emit(buf, "%*pE\n", (int)strlen(svc->key), svc->key); 881 } 882 static DEVICE_ATTR_RO(key); 883 884 static int get_modalias(const struct tb_service *svc, char *buf, size_t size) 885 { 886 return snprintf(buf, size, "tbsvc:k%sp%08Xv%08Xr%08X", svc->key, 887 svc->prtcid, svc->prtcvers, svc->prtcrevs); 888 } 889 890 static ssize_t modalias_show(struct device *dev, struct device_attribute *attr, 891 char *buf) 892 { 893 struct tb_service *svc = container_of(dev, struct tb_service, dev); 894 895 /* Full buffer size except new line and null termination */ 896 get_modalias(svc, buf, PAGE_SIZE - 2); 897 return strlen(strcat(buf, "\n")); 898 } 899 static DEVICE_ATTR_RO(modalias); 900 901 static ssize_t prtcid_show(struct device *dev, struct device_attribute *attr, 902 char *buf) 903 { 904 struct tb_service *svc = container_of(dev, struct tb_service, dev); 905 906 return sysfs_emit(buf, "%u\n", svc->prtcid); 907 } 908 static DEVICE_ATTR_RO(prtcid); 909 910 static ssize_t prtcvers_show(struct device *dev, struct device_attribute *attr, 911 char *buf) 912 { 913 struct tb_service *svc = container_of(dev, struct tb_service, dev); 914 915 return sysfs_emit(buf, "%u\n", svc->prtcvers); 916 } 917 static DEVICE_ATTR_RO(prtcvers); 918 919 static ssize_t prtcrevs_show(struct device *dev, struct device_attribute *attr, 920 char *buf) 921 { 922 struct tb_service *svc = container_of(dev, struct tb_service, dev); 923 924 return sysfs_emit(buf, "%u\n", svc->prtcrevs); 925 } 926 static DEVICE_ATTR_RO(prtcrevs); 927 928 static ssize_t prtcstns_show(struct device *dev, struct device_attribute *attr, 929 char *buf) 930 { 931 struct tb_service *svc = container_of(dev, struct tb_service, dev); 932 933 return sysfs_emit(buf, "0x%08x\n", svc->prtcstns); 934 } 935 static DEVICE_ATTR_RO(prtcstns); 936 937 static struct attribute *tb_service_attrs[] = { 938 &dev_attr_key.attr, 939 &dev_attr_modalias.attr, 940 &dev_attr_prtcid.attr, 941 &dev_attr_prtcvers.attr, 942 &dev_attr_prtcrevs.attr, 943 &dev_attr_prtcstns.attr, 944 NULL, 945 }; 946 947 static const struct attribute_group tb_service_attr_group = { 948 .attrs = tb_service_attrs, 949 }; 950 951 static const struct attribute_group *tb_service_attr_groups[] = { 952 &tb_service_attr_group, 953 NULL, 954 }; 955 956 static int tb_service_uevent(const struct device *dev, struct kobj_uevent_env *env) 957 { 958 const struct tb_service *svc = container_of_const(dev, struct tb_service, dev); 959 char modalias[64]; 960 961 get_modalias(svc, modalias, sizeof(modalias)); 962 return add_uevent_var(env, "MODALIAS=%s", modalias); 963 } 964 965 static void tb_service_release(struct device *dev) 966 { 967 struct tb_service *svc = container_of(dev, struct tb_service, dev); 968 struct tb_xdomain *xd = tb_service_parent(svc); 969 970 tb_service_debugfs_remove(svc); 971 ida_simple_remove(&xd->service_ids, svc->id); 972 kfree(svc->key); 973 kfree(svc); 974 } 975 976 struct device_type tb_service_type = { 977 .name = "thunderbolt_service", 978 .groups = tb_service_attr_groups, 979 .uevent = tb_service_uevent, 980 .release = tb_service_release, 981 }; 982 EXPORT_SYMBOL_GPL(tb_service_type); 983 984 static int remove_missing_service(struct device *dev, void *data) 985 { 986 struct tb_xdomain *xd = data; 987 struct tb_service *svc; 988 989 svc = tb_to_service(dev); 990 if (!svc) 991 return 0; 992 993 if (!tb_property_find(xd->remote_properties, svc->key, 994 TB_PROPERTY_TYPE_DIRECTORY)) 995 device_unregister(dev); 996 997 return 0; 998 } 999 1000 static int find_service(struct device *dev, void *data) 1001 { 1002 const struct tb_property *p = data; 1003 struct tb_service *svc; 1004 1005 svc = tb_to_service(dev); 1006 if (!svc) 1007 return 0; 1008 1009 return !strcmp(svc->key, p->key); 1010 } 1011 1012 static int populate_service(struct tb_service *svc, 1013 struct tb_property *property) 1014 { 1015 struct tb_property_dir *dir = property->value.dir; 1016 struct tb_property *p; 1017 1018 /* Fill in standard properties */ 1019 p = tb_property_find(dir, "prtcid", TB_PROPERTY_TYPE_VALUE); 1020 if (p) 1021 svc->prtcid = p->value.immediate; 1022 p = tb_property_find(dir, "prtcvers", TB_PROPERTY_TYPE_VALUE); 1023 if (p) 1024 svc->prtcvers = p->value.immediate; 1025 p = tb_property_find(dir, "prtcrevs", TB_PROPERTY_TYPE_VALUE); 1026 if (p) 1027 svc->prtcrevs = p->value.immediate; 1028 p = tb_property_find(dir, "prtcstns", TB_PROPERTY_TYPE_VALUE); 1029 if (p) 1030 svc->prtcstns = p->value.immediate; 1031 1032 svc->key = kstrdup(property->key, GFP_KERNEL); 1033 if (!svc->key) 1034 return -ENOMEM; 1035 1036 return 0; 1037 } 1038 1039 static void enumerate_services(struct tb_xdomain *xd) 1040 { 1041 struct tb_service *svc; 1042 struct tb_property *p; 1043 struct device *dev; 1044 int id; 1045 1046 /* 1047 * First remove all services that are not available anymore in 1048 * the updated property block. 1049 */ 1050 device_for_each_child_reverse(&xd->dev, xd, remove_missing_service); 1051 1052 /* Then re-enumerate properties creating new services as we go */ 1053 tb_property_for_each(xd->remote_properties, p) { 1054 if (p->type != TB_PROPERTY_TYPE_DIRECTORY) 1055 continue; 1056 1057 /* If the service exists already we are fine */ 1058 dev = device_find_child(&xd->dev, p, find_service); 1059 if (dev) { 1060 put_device(dev); 1061 continue; 1062 } 1063 1064 svc = kzalloc(sizeof(*svc), GFP_KERNEL); 1065 if (!svc) 1066 break; 1067 1068 if (populate_service(svc, p)) { 1069 kfree(svc); 1070 break; 1071 } 1072 1073 id = ida_simple_get(&xd->service_ids, 0, 0, GFP_KERNEL); 1074 if (id < 0) { 1075 kfree(svc->key); 1076 kfree(svc); 1077 break; 1078 } 1079 svc->id = id; 1080 svc->dev.bus = &tb_bus_type; 1081 svc->dev.type = &tb_service_type; 1082 svc->dev.parent = &xd->dev; 1083 dev_set_name(&svc->dev, "%s.%d", dev_name(&xd->dev), svc->id); 1084 1085 tb_service_debugfs_init(svc); 1086 1087 if (device_register(&svc->dev)) { 1088 put_device(&svc->dev); 1089 break; 1090 } 1091 } 1092 } 1093 1094 static int populate_properties(struct tb_xdomain *xd, 1095 struct tb_property_dir *dir) 1096 { 1097 const struct tb_property *p; 1098 1099 /* Required properties */ 1100 p = tb_property_find(dir, "deviceid", TB_PROPERTY_TYPE_VALUE); 1101 if (!p) 1102 return -EINVAL; 1103 xd->device = p->value.immediate; 1104 1105 p = tb_property_find(dir, "vendorid", TB_PROPERTY_TYPE_VALUE); 1106 if (!p) 1107 return -EINVAL; 1108 xd->vendor = p->value.immediate; 1109 1110 p = tb_property_find(dir, "maxhopid", TB_PROPERTY_TYPE_VALUE); 1111 /* 1112 * USB4 inter-domain spec suggests using 15 as HopID if the 1113 * other end does not announce it in a property. This is for 1114 * TBT3 compatibility. 1115 */ 1116 xd->remote_max_hopid = p ? p->value.immediate : XDOMAIN_DEFAULT_MAX_HOPID; 1117 1118 kfree(xd->device_name); 1119 xd->device_name = NULL; 1120 kfree(xd->vendor_name); 1121 xd->vendor_name = NULL; 1122 1123 /* Optional properties */ 1124 p = tb_property_find(dir, "deviceid", TB_PROPERTY_TYPE_TEXT); 1125 if (p) 1126 xd->device_name = kstrdup(p->value.text, GFP_KERNEL); 1127 p = tb_property_find(dir, "vendorid", TB_PROPERTY_TYPE_TEXT); 1128 if (p) 1129 xd->vendor_name = kstrdup(p->value.text, GFP_KERNEL); 1130 1131 return 0; 1132 } 1133 1134 static int tb_xdomain_update_link_attributes(struct tb_xdomain *xd) 1135 { 1136 bool change = false; 1137 struct tb_port *port; 1138 int ret; 1139 1140 port = tb_port_at(xd->route, tb_xdomain_parent(xd)); 1141 1142 ret = tb_port_get_link_speed(port); 1143 if (ret < 0) 1144 return ret; 1145 1146 if (xd->link_speed != ret) 1147 change = true; 1148 1149 xd->link_speed = ret; 1150 1151 ret = tb_port_get_link_width(port); 1152 if (ret < 0) 1153 return ret; 1154 1155 if (xd->link_width != ret) 1156 change = true; 1157 1158 xd->link_width = ret; 1159 1160 if (change) 1161 kobject_uevent(&xd->dev.kobj, KOBJ_CHANGE); 1162 1163 return 0; 1164 } 1165 1166 static int tb_xdomain_get_uuid(struct tb_xdomain *xd) 1167 { 1168 struct tb *tb = xd->tb; 1169 uuid_t uuid; 1170 u64 route; 1171 int ret; 1172 1173 dev_dbg(&xd->dev, "requesting remote UUID\n"); 1174 1175 ret = tb_xdp_uuid_request(tb->ctl, xd->route, xd->state_retries, &uuid, 1176 &route); 1177 if (ret < 0) { 1178 if (xd->state_retries-- > 0) { 1179 dev_dbg(&xd->dev, "failed to request UUID, retrying\n"); 1180 return -EAGAIN; 1181 } else { 1182 dev_dbg(&xd->dev, "failed to read remote UUID\n"); 1183 } 1184 return ret; 1185 } 1186 1187 dev_dbg(&xd->dev, "got remote UUID %pUb\n", &uuid); 1188 1189 if (uuid_equal(&uuid, xd->local_uuid)) { 1190 if (route == xd->route) 1191 dev_dbg(&xd->dev, "loop back detected\n"); 1192 else 1193 dev_dbg(&xd->dev, "intra-domain loop detected\n"); 1194 1195 /* Don't bond lanes automatically for loops */ 1196 xd->bonding_possible = false; 1197 } 1198 1199 /* 1200 * If the UUID is different, there is another domain connected 1201 * so mark this one unplugged and wait for the connection 1202 * manager to replace it. 1203 */ 1204 if (xd->remote_uuid && !uuid_equal(&uuid, xd->remote_uuid)) { 1205 dev_dbg(&xd->dev, "remote UUID is different, unplugging\n"); 1206 xd->is_unplugged = true; 1207 return -ENODEV; 1208 } 1209 1210 /* First time fill in the missing UUID */ 1211 if (!xd->remote_uuid) { 1212 xd->remote_uuid = kmemdup(&uuid, sizeof(uuid_t), GFP_KERNEL); 1213 if (!xd->remote_uuid) 1214 return -ENOMEM; 1215 } 1216 1217 return 0; 1218 } 1219 1220 static int tb_xdomain_get_link_status(struct tb_xdomain *xd) 1221 { 1222 struct tb *tb = xd->tb; 1223 u8 slw, tlw, sls, tls; 1224 int ret; 1225 1226 dev_dbg(&xd->dev, "sending link state status request to %pUb\n", 1227 xd->remote_uuid); 1228 1229 ret = tb_xdp_link_state_status_request(tb->ctl, xd->route, 1230 xd->state_retries, &slw, &tlw, &sls, 1231 &tls); 1232 if (ret) { 1233 if (ret != -EOPNOTSUPP && xd->state_retries-- > 0) { 1234 dev_dbg(&xd->dev, 1235 "failed to request remote link status, retrying\n"); 1236 return -EAGAIN; 1237 } 1238 dev_dbg(&xd->dev, "failed to receive remote link status\n"); 1239 return ret; 1240 } 1241 1242 dev_dbg(&xd->dev, "remote link supports width %#x speed %#x\n", slw, sls); 1243 1244 if (slw < LANE_ADP_CS_0_SUPPORTED_WIDTH_DUAL) { 1245 dev_dbg(&xd->dev, "remote adapter is single lane only\n"); 1246 return -EOPNOTSUPP; 1247 } 1248 1249 return 0; 1250 } 1251 1252 static int tb_xdomain_link_state_change(struct tb_xdomain *xd, 1253 unsigned int width) 1254 { 1255 struct tb_switch *sw = tb_to_switch(xd->dev.parent); 1256 struct tb_port *port = tb_port_at(xd->route, sw); 1257 struct tb *tb = xd->tb; 1258 u8 tlw, tls; 1259 u32 val; 1260 int ret; 1261 1262 if (width == 2) 1263 tlw = LANE_ADP_CS_1_TARGET_WIDTH_DUAL; 1264 else if (width == 1) 1265 tlw = LANE_ADP_CS_1_TARGET_WIDTH_SINGLE; 1266 else 1267 return -EINVAL; 1268 1269 /* Use the current target speed */ 1270 ret = tb_port_read(port, &val, TB_CFG_PORT, port->cap_phy + LANE_ADP_CS_1, 1); 1271 if (ret) 1272 return ret; 1273 tls = val & LANE_ADP_CS_1_TARGET_SPEED_MASK; 1274 1275 dev_dbg(&xd->dev, "sending link state change request with width %#x speed %#x\n", 1276 tlw, tls); 1277 1278 ret = tb_xdp_link_state_change_request(tb->ctl, xd->route, 1279 xd->state_retries, tlw, tls); 1280 if (ret) { 1281 if (ret != -EOPNOTSUPP && xd->state_retries-- > 0) { 1282 dev_dbg(&xd->dev, 1283 "failed to change remote link state, retrying\n"); 1284 return -EAGAIN; 1285 } 1286 dev_err(&xd->dev, "failed request link state change, aborting\n"); 1287 return ret; 1288 } 1289 1290 dev_dbg(&xd->dev, "received link state change response\n"); 1291 return 0; 1292 } 1293 1294 static int tb_xdomain_bond_lanes_uuid_high(struct tb_xdomain *xd) 1295 { 1296 struct tb_port *port; 1297 int ret, width; 1298 1299 if (xd->target_link_width == LANE_ADP_CS_1_TARGET_WIDTH_SINGLE) { 1300 width = 1; 1301 } else if (xd->target_link_width == LANE_ADP_CS_1_TARGET_WIDTH_DUAL) { 1302 width = 2; 1303 } else { 1304 if (xd->state_retries-- > 0) { 1305 dev_dbg(&xd->dev, 1306 "link state change request not received yet, retrying\n"); 1307 return -EAGAIN; 1308 } 1309 dev_dbg(&xd->dev, "timeout waiting for link change request\n"); 1310 return -ETIMEDOUT; 1311 } 1312 1313 port = tb_port_at(xd->route, tb_xdomain_parent(xd)); 1314 1315 /* 1316 * We can't use tb_xdomain_lane_bonding_enable() here because it 1317 * is the other side that initiates lane bonding. So here we 1318 * just set the width to both lane adapters and wait for the 1319 * link to transition bonded. 1320 */ 1321 ret = tb_port_set_link_width(port->dual_link_port, width); 1322 if (ret) { 1323 tb_port_warn(port->dual_link_port, 1324 "failed to set link width to %d\n", width); 1325 return ret; 1326 } 1327 1328 ret = tb_port_set_link_width(port, width); 1329 if (ret) { 1330 tb_port_warn(port, "failed to set link width to %d\n", width); 1331 return ret; 1332 } 1333 1334 ret = tb_port_wait_for_link_width(port, width, XDOMAIN_BONDING_TIMEOUT); 1335 if (ret) { 1336 dev_warn(&xd->dev, "error waiting for link width to become %d\n", 1337 width); 1338 return ret; 1339 } 1340 1341 port->bonded = width == 2; 1342 port->dual_link_port->bonded = width == 2; 1343 1344 tb_port_update_credits(port); 1345 tb_xdomain_update_link_attributes(xd); 1346 1347 dev_dbg(&xd->dev, "lane bonding %s\n", str_enabled_disabled(width == 2)); 1348 return 0; 1349 } 1350 1351 static int tb_xdomain_get_properties(struct tb_xdomain *xd) 1352 { 1353 struct tb_property_dir *dir; 1354 struct tb *tb = xd->tb; 1355 bool update = false; 1356 u32 *block = NULL; 1357 u32 gen = 0; 1358 int ret; 1359 1360 dev_dbg(&xd->dev, "requesting remote properties\n"); 1361 1362 ret = tb_xdp_properties_request(tb->ctl, xd->route, xd->local_uuid, 1363 xd->remote_uuid, xd->state_retries, 1364 &block, &gen); 1365 if (ret < 0) { 1366 if (xd->state_retries-- > 0) { 1367 dev_dbg(&xd->dev, 1368 "failed to request remote properties, retrying\n"); 1369 return -EAGAIN; 1370 } else { 1371 /* Give up now */ 1372 dev_err(&xd->dev, 1373 "failed read XDomain properties from %pUb\n", 1374 xd->remote_uuid); 1375 } 1376 1377 return ret; 1378 } 1379 1380 mutex_lock(&xd->lock); 1381 1382 /* Only accept newer generation properties */ 1383 if (xd->remote_properties && gen <= xd->remote_property_block_gen) { 1384 ret = 0; 1385 goto err_free_block; 1386 } 1387 1388 dir = tb_property_parse_dir(block, ret); 1389 if (!dir) { 1390 dev_err(&xd->dev, "failed to parse XDomain properties\n"); 1391 ret = -ENOMEM; 1392 goto err_free_block; 1393 } 1394 1395 ret = populate_properties(xd, dir); 1396 if (ret) { 1397 dev_err(&xd->dev, "missing XDomain properties in response\n"); 1398 goto err_free_dir; 1399 } 1400 1401 /* Release the existing one */ 1402 if (xd->remote_properties) { 1403 tb_property_free_dir(xd->remote_properties); 1404 update = true; 1405 } 1406 1407 xd->remote_properties = dir; 1408 xd->remote_property_block_gen = gen; 1409 1410 tb_xdomain_update_link_attributes(xd); 1411 1412 mutex_unlock(&xd->lock); 1413 1414 kfree(block); 1415 1416 /* 1417 * Now the device should be ready enough so we can add it to the 1418 * bus and let userspace know about it. If the device is already 1419 * registered, we notify the userspace that it has changed. 1420 */ 1421 if (!update) { 1422 /* 1423 * Now disable lane 1 if bonding was not enabled. Do 1424 * this only if bonding was possible at the beginning 1425 * (that is we are the connection manager and there are 1426 * two lanes). 1427 */ 1428 if (xd->bonding_possible) { 1429 struct tb_port *port; 1430 1431 port = tb_port_at(xd->route, tb_xdomain_parent(xd)); 1432 if (!port->bonded) 1433 tb_port_disable(port->dual_link_port); 1434 } 1435 1436 if (device_add(&xd->dev)) { 1437 dev_err(&xd->dev, "failed to add XDomain device\n"); 1438 return -ENODEV; 1439 } 1440 dev_info(&xd->dev, "new host found, vendor=%#x device=%#x\n", 1441 xd->vendor, xd->device); 1442 if (xd->vendor_name && xd->device_name) 1443 dev_info(&xd->dev, "%s %s\n", xd->vendor_name, 1444 xd->device_name); 1445 1446 tb_xdomain_debugfs_init(xd); 1447 } else { 1448 kobject_uevent(&xd->dev.kobj, KOBJ_CHANGE); 1449 } 1450 1451 enumerate_services(xd); 1452 return 0; 1453 1454 err_free_dir: 1455 tb_property_free_dir(dir); 1456 err_free_block: 1457 kfree(block); 1458 mutex_unlock(&xd->lock); 1459 1460 return ret; 1461 } 1462 1463 static void tb_xdomain_queue_uuid(struct tb_xdomain *xd) 1464 { 1465 xd->state = XDOMAIN_STATE_UUID; 1466 xd->state_retries = XDOMAIN_RETRIES; 1467 queue_delayed_work(xd->tb->wq, &xd->state_work, 1468 msecs_to_jiffies(XDOMAIN_SHORT_TIMEOUT)); 1469 } 1470 1471 static void tb_xdomain_queue_link_status(struct tb_xdomain *xd) 1472 { 1473 xd->state = XDOMAIN_STATE_LINK_STATUS; 1474 xd->state_retries = XDOMAIN_RETRIES; 1475 queue_delayed_work(xd->tb->wq, &xd->state_work, 1476 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT)); 1477 } 1478 1479 static void tb_xdomain_queue_link_status2(struct tb_xdomain *xd) 1480 { 1481 xd->state = XDOMAIN_STATE_LINK_STATUS2; 1482 xd->state_retries = XDOMAIN_RETRIES; 1483 queue_delayed_work(xd->tb->wq, &xd->state_work, 1484 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT)); 1485 } 1486 1487 static void tb_xdomain_queue_bonding(struct tb_xdomain *xd) 1488 { 1489 if (memcmp(xd->local_uuid, xd->remote_uuid, UUID_SIZE) > 0) { 1490 dev_dbg(&xd->dev, "we have higher UUID, other side bonds the lanes\n"); 1491 xd->state = XDOMAIN_STATE_BONDING_UUID_HIGH; 1492 } else { 1493 dev_dbg(&xd->dev, "we have lower UUID, bonding lanes\n"); 1494 xd->state = XDOMAIN_STATE_LINK_STATE_CHANGE; 1495 } 1496 1497 xd->state_retries = XDOMAIN_RETRIES; 1498 queue_delayed_work(xd->tb->wq, &xd->state_work, 1499 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT)); 1500 } 1501 1502 static void tb_xdomain_queue_bonding_uuid_low(struct tb_xdomain *xd) 1503 { 1504 xd->state = XDOMAIN_STATE_BONDING_UUID_LOW; 1505 xd->state_retries = XDOMAIN_RETRIES; 1506 queue_delayed_work(xd->tb->wq, &xd->state_work, 1507 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT)); 1508 } 1509 1510 static void tb_xdomain_queue_properties(struct tb_xdomain *xd) 1511 { 1512 xd->state = XDOMAIN_STATE_PROPERTIES; 1513 xd->state_retries = XDOMAIN_RETRIES; 1514 queue_delayed_work(xd->tb->wq, &xd->state_work, 1515 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT)); 1516 } 1517 1518 static void tb_xdomain_queue_properties_changed(struct tb_xdomain *xd) 1519 { 1520 xd->properties_changed_retries = XDOMAIN_RETRIES; 1521 queue_delayed_work(xd->tb->wq, &xd->properties_changed_work, 1522 msecs_to_jiffies(XDOMAIN_SHORT_TIMEOUT)); 1523 } 1524 1525 static void tb_xdomain_state_work(struct work_struct *work) 1526 { 1527 struct tb_xdomain *xd = container_of(work, typeof(*xd), state_work.work); 1528 int ret, state = xd->state; 1529 1530 if (WARN_ON_ONCE(state < XDOMAIN_STATE_INIT || 1531 state > XDOMAIN_STATE_ERROR)) 1532 return; 1533 1534 dev_dbg(&xd->dev, "running state %s\n", state_names[state]); 1535 1536 switch (state) { 1537 case XDOMAIN_STATE_INIT: 1538 if (xd->needs_uuid) { 1539 tb_xdomain_queue_uuid(xd); 1540 } else { 1541 tb_xdomain_queue_properties_changed(xd); 1542 tb_xdomain_queue_properties(xd); 1543 } 1544 break; 1545 1546 case XDOMAIN_STATE_UUID: 1547 ret = tb_xdomain_get_uuid(xd); 1548 if (ret) { 1549 if (ret == -EAGAIN) 1550 goto retry_state; 1551 xd->state = XDOMAIN_STATE_ERROR; 1552 } else { 1553 tb_xdomain_queue_properties_changed(xd); 1554 if (xd->bonding_possible) 1555 tb_xdomain_queue_link_status(xd); 1556 else 1557 tb_xdomain_queue_properties(xd); 1558 } 1559 break; 1560 1561 case XDOMAIN_STATE_LINK_STATUS: 1562 ret = tb_xdomain_get_link_status(xd); 1563 if (ret) { 1564 if (ret == -EAGAIN) 1565 goto retry_state; 1566 1567 /* 1568 * If any of the lane bonding states fail we skip 1569 * bonding completely and try to continue from 1570 * reading properties. 1571 */ 1572 tb_xdomain_queue_properties(xd); 1573 } else { 1574 tb_xdomain_queue_bonding(xd); 1575 } 1576 break; 1577 1578 case XDOMAIN_STATE_LINK_STATE_CHANGE: 1579 ret = tb_xdomain_link_state_change(xd, 2); 1580 if (ret) { 1581 if (ret == -EAGAIN) 1582 goto retry_state; 1583 tb_xdomain_queue_properties(xd); 1584 } else { 1585 tb_xdomain_queue_link_status2(xd); 1586 } 1587 break; 1588 1589 case XDOMAIN_STATE_LINK_STATUS2: 1590 ret = tb_xdomain_get_link_status(xd); 1591 if (ret) { 1592 if (ret == -EAGAIN) 1593 goto retry_state; 1594 tb_xdomain_queue_properties(xd); 1595 } else { 1596 tb_xdomain_queue_bonding_uuid_low(xd); 1597 } 1598 break; 1599 1600 case XDOMAIN_STATE_BONDING_UUID_LOW: 1601 tb_xdomain_lane_bonding_enable(xd); 1602 tb_xdomain_queue_properties(xd); 1603 break; 1604 1605 case XDOMAIN_STATE_BONDING_UUID_HIGH: 1606 if (tb_xdomain_bond_lanes_uuid_high(xd) == -EAGAIN) 1607 goto retry_state; 1608 tb_xdomain_queue_properties(xd); 1609 break; 1610 1611 case XDOMAIN_STATE_PROPERTIES: 1612 ret = tb_xdomain_get_properties(xd); 1613 if (ret) { 1614 if (ret == -EAGAIN) 1615 goto retry_state; 1616 xd->state = XDOMAIN_STATE_ERROR; 1617 } else { 1618 xd->state = XDOMAIN_STATE_ENUMERATED; 1619 } 1620 break; 1621 1622 case XDOMAIN_STATE_ENUMERATED: 1623 tb_xdomain_queue_properties(xd); 1624 break; 1625 1626 case XDOMAIN_STATE_ERROR: 1627 break; 1628 1629 default: 1630 dev_warn(&xd->dev, "unexpected state %d\n", state); 1631 break; 1632 } 1633 1634 return; 1635 1636 retry_state: 1637 queue_delayed_work(xd->tb->wq, &xd->state_work, 1638 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT)); 1639 } 1640 1641 static void tb_xdomain_properties_changed(struct work_struct *work) 1642 { 1643 struct tb_xdomain *xd = container_of(work, typeof(*xd), 1644 properties_changed_work.work); 1645 int ret; 1646 1647 dev_dbg(&xd->dev, "sending properties changed notification\n"); 1648 1649 ret = tb_xdp_properties_changed_request(xd->tb->ctl, xd->route, 1650 xd->properties_changed_retries, xd->local_uuid); 1651 if (ret) { 1652 if (xd->properties_changed_retries-- > 0) { 1653 dev_dbg(&xd->dev, 1654 "failed to send properties changed notification, retrying\n"); 1655 queue_delayed_work(xd->tb->wq, 1656 &xd->properties_changed_work, 1657 msecs_to_jiffies(XDOMAIN_DEFAULT_TIMEOUT)); 1658 } 1659 dev_err(&xd->dev, "failed to send properties changed notification\n"); 1660 return; 1661 } 1662 1663 xd->properties_changed_retries = XDOMAIN_RETRIES; 1664 } 1665 1666 static ssize_t device_show(struct device *dev, struct device_attribute *attr, 1667 char *buf) 1668 { 1669 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev); 1670 1671 return sysfs_emit(buf, "%#x\n", xd->device); 1672 } 1673 static DEVICE_ATTR_RO(device); 1674 1675 static ssize_t 1676 device_name_show(struct device *dev, struct device_attribute *attr, char *buf) 1677 { 1678 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev); 1679 int ret; 1680 1681 if (mutex_lock_interruptible(&xd->lock)) 1682 return -ERESTARTSYS; 1683 ret = sysfs_emit(buf, "%s\n", xd->device_name ?: ""); 1684 mutex_unlock(&xd->lock); 1685 1686 return ret; 1687 } 1688 static DEVICE_ATTR_RO(device_name); 1689 1690 static ssize_t maxhopid_show(struct device *dev, struct device_attribute *attr, 1691 char *buf) 1692 { 1693 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev); 1694 1695 return sysfs_emit(buf, "%d\n", xd->remote_max_hopid); 1696 } 1697 static DEVICE_ATTR_RO(maxhopid); 1698 1699 static ssize_t vendor_show(struct device *dev, struct device_attribute *attr, 1700 char *buf) 1701 { 1702 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev); 1703 1704 return sysfs_emit(buf, "%#x\n", xd->vendor); 1705 } 1706 static DEVICE_ATTR_RO(vendor); 1707 1708 static ssize_t 1709 vendor_name_show(struct device *dev, struct device_attribute *attr, char *buf) 1710 { 1711 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev); 1712 int ret; 1713 1714 if (mutex_lock_interruptible(&xd->lock)) 1715 return -ERESTARTSYS; 1716 ret = sysfs_emit(buf, "%s\n", xd->vendor_name ?: ""); 1717 mutex_unlock(&xd->lock); 1718 1719 return ret; 1720 } 1721 static DEVICE_ATTR_RO(vendor_name); 1722 1723 static ssize_t unique_id_show(struct device *dev, struct device_attribute *attr, 1724 char *buf) 1725 { 1726 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev); 1727 1728 return sysfs_emit(buf, "%pUb\n", xd->remote_uuid); 1729 } 1730 static DEVICE_ATTR_RO(unique_id); 1731 1732 static ssize_t speed_show(struct device *dev, struct device_attribute *attr, 1733 char *buf) 1734 { 1735 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev); 1736 1737 return sysfs_emit(buf, "%u.0 Gb/s\n", xd->link_speed); 1738 } 1739 1740 static DEVICE_ATTR(rx_speed, 0444, speed_show, NULL); 1741 static DEVICE_ATTR(tx_speed, 0444, speed_show, NULL); 1742 1743 static ssize_t lanes_show(struct device *dev, struct device_attribute *attr, 1744 char *buf) 1745 { 1746 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev); 1747 1748 return sysfs_emit(buf, "%u\n", xd->link_width); 1749 } 1750 1751 static DEVICE_ATTR(rx_lanes, 0444, lanes_show, NULL); 1752 static DEVICE_ATTR(tx_lanes, 0444, lanes_show, NULL); 1753 1754 static struct attribute *xdomain_attrs[] = { 1755 &dev_attr_device.attr, 1756 &dev_attr_device_name.attr, 1757 &dev_attr_maxhopid.attr, 1758 &dev_attr_rx_lanes.attr, 1759 &dev_attr_rx_speed.attr, 1760 &dev_attr_tx_lanes.attr, 1761 &dev_attr_tx_speed.attr, 1762 &dev_attr_unique_id.attr, 1763 &dev_attr_vendor.attr, 1764 &dev_attr_vendor_name.attr, 1765 NULL, 1766 }; 1767 1768 static const struct attribute_group xdomain_attr_group = { 1769 .attrs = xdomain_attrs, 1770 }; 1771 1772 static const struct attribute_group *xdomain_attr_groups[] = { 1773 &xdomain_attr_group, 1774 NULL, 1775 }; 1776 1777 static void tb_xdomain_release(struct device *dev) 1778 { 1779 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev); 1780 1781 put_device(xd->dev.parent); 1782 1783 kfree(xd->local_property_block); 1784 tb_property_free_dir(xd->remote_properties); 1785 ida_destroy(&xd->out_hopids); 1786 ida_destroy(&xd->in_hopids); 1787 ida_destroy(&xd->service_ids); 1788 1789 kfree(xd->local_uuid); 1790 kfree(xd->remote_uuid); 1791 kfree(xd->device_name); 1792 kfree(xd->vendor_name); 1793 kfree(xd); 1794 } 1795 1796 static void start_handshake(struct tb_xdomain *xd) 1797 { 1798 xd->state = XDOMAIN_STATE_INIT; 1799 queue_delayed_work(xd->tb->wq, &xd->state_work, 1800 msecs_to_jiffies(XDOMAIN_SHORT_TIMEOUT)); 1801 } 1802 1803 static void stop_handshake(struct tb_xdomain *xd) 1804 { 1805 cancel_delayed_work_sync(&xd->properties_changed_work); 1806 cancel_delayed_work_sync(&xd->state_work); 1807 xd->properties_changed_retries = 0; 1808 xd->state_retries = 0; 1809 } 1810 1811 static int __maybe_unused tb_xdomain_suspend(struct device *dev) 1812 { 1813 stop_handshake(tb_to_xdomain(dev)); 1814 return 0; 1815 } 1816 1817 static int __maybe_unused tb_xdomain_resume(struct device *dev) 1818 { 1819 start_handshake(tb_to_xdomain(dev)); 1820 return 0; 1821 } 1822 1823 static const struct dev_pm_ops tb_xdomain_pm_ops = { 1824 SET_SYSTEM_SLEEP_PM_OPS(tb_xdomain_suspend, tb_xdomain_resume) 1825 }; 1826 1827 struct device_type tb_xdomain_type = { 1828 .name = "thunderbolt_xdomain", 1829 .release = tb_xdomain_release, 1830 .pm = &tb_xdomain_pm_ops, 1831 }; 1832 EXPORT_SYMBOL_GPL(tb_xdomain_type); 1833 1834 /** 1835 * tb_xdomain_alloc() - Allocate new XDomain object 1836 * @tb: Domain where the XDomain belongs 1837 * @parent: Parent device (the switch through the connection to the 1838 * other domain is reached). 1839 * @route: Route string used to reach the other domain 1840 * @local_uuid: Our local domain UUID 1841 * @remote_uuid: UUID of the other domain (optional) 1842 * 1843 * Allocates new XDomain structure and returns pointer to that. The 1844 * object must be released by calling tb_xdomain_put(). 1845 */ 1846 struct tb_xdomain *tb_xdomain_alloc(struct tb *tb, struct device *parent, 1847 u64 route, const uuid_t *local_uuid, 1848 const uuid_t *remote_uuid) 1849 { 1850 struct tb_switch *parent_sw = tb_to_switch(parent); 1851 struct tb_xdomain *xd; 1852 struct tb_port *down; 1853 1854 /* Make sure the downstream domain is accessible */ 1855 down = tb_port_at(route, parent_sw); 1856 tb_port_unlock(down); 1857 1858 xd = kzalloc(sizeof(*xd), GFP_KERNEL); 1859 if (!xd) 1860 return NULL; 1861 1862 xd->tb = tb; 1863 xd->route = route; 1864 xd->local_max_hopid = down->config.max_in_hop_id; 1865 ida_init(&xd->service_ids); 1866 ida_init(&xd->in_hopids); 1867 ida_init(&xd->out_hopids); 1868 mutex_init(&xd->lock); 1869 INIT_DELAYED_WORK(&xd->state_work, tb_xdomain_state_work); 1870 INIT_DELAYED_WORK(&xd->properties_changed_work, 1871 tb_xdomain_properties_changed); 1872 1873 xd->local_uuid = kmemdup(local_uuid, sizeof(uuid_t), GFP_KERNEL); 1874 if (!xd->local_uuid) 1875 goto err_free; 1876 1877 if (remote_uuid) { 1878 xd->remote_uuid = kmemdup(remote_uuid, sizeof(uuid_t), 1879 GFP_KERNEL); 1880 if (!xd->remote_uuid) 1881 goto err_free_local_uuid; 1882 } else { 1883 xd->needs_uuid = true; 1884 xd->bonding_possible = !!down->dual_link_port; 1885 } 1886 1887 device_initialize(&xd->dev); 1888 xd->dev.parent = get_device(parent); 1889 xd->dev.bus = &tb_bus_type; 1890 xd->dev.type = &tb_xdomain_type; 1891 xd->dev.groups = xdomain_attr_groups; 1892 dev_set_name(&xd->dev, "%u-%llx", tb->index, route); 1893 1894 dev_dbg(&xd->dev, "local UUID %pUb\n", local_uuid); 1895 if (remote_uuid) 1896 dev_dbg(&xd->dev, "remote UUID %pUb\n", remote_uuid); 1897 1898 /* 1899 * This keeps the DMA powered on as long as we have active 1900 * connection to another host. 1901 */ 1902 pm_runtime_set_active(&xd->dev); 1903 pm_runtime_get_noresume(&xd->dev); 1904 pm_runtime_enable(&xd->dev); 1905 1906 return xd; 1907 1908 err_free_local_uuid: 1909 kfree(xd->local_uuid); 1910 err_free: 1911 kfree(xd); 1912 1913 return NULL; 1914 } 1915 1916 /** 1917 * tb_xdomain_add() - Add XDomain to the bus 1918 * @xd: XDomain to add 1919 * 1920 * This function starts XDomain discovery protocol handshake and 1921 * eventually adds the XDomain to the bus. After calling this function 1922 * the caller needs to call tb_xdomain_remove() in order to remove and 1923 * release the object regardless whether the handshake succeeded or not. 1924 */ 1925 void tb_xdomain_add(struct tb_xdomain *xd) 1926 { 1927 /* Start exchanging properties with the other host */ 1928 start_handshake(xd); 1929 } 1930 1931 static int unregister_service(struct device *dev, void *data) 1932 { 1933 device_unregister(dev); 1934 return 0; 1935 } 1936 1937 /** 1938 * tb_xdomain_remove() - Remove XDomain from the bus 1939 * @xd: XDomain to remove 1940 * 1941 * This will stop all ongoing configuration work and remove the XDomain 1942 * along with any services from the bus. When the last reference to @xd 1943 * is released the object will be released as well. 1944 */ 1945 void tb_xdomain_remove(struct tb_xdomain *xd) 1946 { 1947 tb_xdomain_debugfs_remove(xd); 1948 1949 stop_handshake(xd); 1950 1951 device_for_each_child_reverse(&xd->dev, xd, unregister_service); 1952 1953 /* 1954 * Undo runtime PM here explicitly because it is possible that 1955 * the XDomain was never added to the bus and thus device_del() 1956 * is not called for it (device_del() would handle this otherwise). 1957 */ 1958 pm_runtime_disable(&xd->dev); 1959 pm_runtime_put_noidle(&xd->dev); 1960 pm_runtime_set_suspended(&xd->dev); 1961 1962 if (!device_is_registered(&xd->dev)) { 1963 put_device(&xd->dev); 1964 } else { 1965 dev_info(&xd->dev, "host disconnected\n"); 1966 device_unregister(&xd->dev); 1967 } 1968 } 1969 1970 /** 1971 * tb_xdomain_lane_bonding_enable() - Enable lane bonding on XDomain 1972 * @xd: XDomain connection 1973 * 1974 * Lane bonding is disabled by default for XDomains. This function tries 1975 * to enable bonding by first enabling the port and waiting for the CL0 1976 * state. 1977 * 1978 * Return: %0 in case of success and negative errno in case of error. 1979 */ 1980 int tb_xdomain_lane_bonding_enable(struct tb_xdomain *xd) 1981 { 1982 struct tb_port *port; 1983 int ret; 1984 1985 port = tb_port_at(xd->route, tb_xdomain_parent(xd)); 1986 if (!port->dual_link_port) 1987 return -ENODEV; 1988 1989 ret = tb_port_enable(port->dual_link_port); 1990 if (ret) 1991 return ret; 1992 1993 ret = tb_wait_for_port(port->dual_link_port, true); 1994 if (ret < 0) 1995 return ret; 1996 if (!ret) 1997 return -ENOTCONN; 1998 1999 ret = tb_port_lane_bonding_enable(port); 2000 if (ret) { 2001 tb_port_warn(port, "failed to enable lane bonding\n"); 2002 return ret; 2003 } 2004 2005 ret = tb_port_wait_for_link_width(port, 2, XDOMAIN_BONDING_TIMEOUT); 2006 if (ret) { 2007 tb_port_warn(port, "failed to enable lane bonding\n"); 2008 return ret; 2009 } 2010 2011 tb_port_update_credits(port); 2012 tb_xdomain_update_link_attributes(xd); 2013 2014 dev_dbg(&xd->dev, "lane bonding enabled\n"); 2015 return 0; 2016 } 2017 EXPORT_SYMBOL_GPL(tb_xdomain_lane_bonding_enable); 2018 2019 /** 2020 * tb_xdomain_lane_bonding_disable() - Disable lane bonding 2021 * @xd: XDomain connection 2022 * 2023 * Lane bonding is disabled by default for XDomains. If bonding has been 2024 * enabled, this function can be used to disable it. 2025 */ 2026 void tb_xdomain_lane_bonding_disable(struct tb_xdomain *xd) 2027 { 2028 struct tb_port *port; 2029 2030 port = tb_port_at(xd->route, tb_xdomain_parent(xd)); 2031 if (port->dual_link_port) { 2032 tb_port_lane_bonding_disable(port); 2033 if (tb_port_wait_for_link_width(port, 1, 100) == -ETIMEDOUT) 2034 tb_port_warn(port, "timeout disabling lane bonding\n"); 2035 tb_port_disable(port->dual_link_port); 2036 tb_port_update_credits(port); 2037 tb_xdomain_update_link_attributes(xd); 2038 2039 dev_dbg(&xd->dev, "lane bonding disabled\n"); 2040 } 2041 } 2042 EXPORT_SYMBOL_GPL(tb_xdomain_lane_bonding_disable); 2043 2044 /** 2045 * tb_xdomain_alloc_in_hopid() - Allocate input HopID for tunneling 2046 * @xd: XDomain connection 2047 * @hopid: Preferred HopID or %-1 for next available 2048 * 2049 * Returns allocated HopID or negative errno. Specifically returns 2050 * %-ENOSPC if there are no more available HopIDs. Returned HopID is 2051 * guaranteed to be within range supported by the input lane adapter. 2052 * Call tb_xdomain_release_in_hopid() to release the allocated HopID. 2053 */ 2054 int tb_xdomain_alloc_in_hopid(struct tb_xdomain *xd, int hopid) 2055 { 2056 if (hopid < 0) 2057 hopid = TB_PATH_MIN_HOPID; 2058 if (hopid < TB_PATH_MIN_HOPID || hopid > xd->local_max_hopid) 2059 return -EINVAL; 2060 2061 return ida_alloc_range(&xd->in_hopids, hopid, xd->local_max_hopid, 2062 GFP_KERNEL); 2063 } 2064 EXPORT_SYMBOL_GPL(tb_xdomain_alloc_in_hopid); 2065 2066 /** 2067 * tb_xdomain_alloc_out_hopid() - Allocate output HopID for tunneling 2068 * @xd: XDomain connection 2069 * @hopid: Preferred HopID or %-1 for next available 2070 * 2071 * Returns allocated HopID or negative errno. Specifically returns 2072 * %-ENOSPC if there are no more available HopIDs. Returned HopID is 2073 * guaranteed to be within range supported by the output lane adapter. 2074 * Call tb_xdomain_release_in_hopid() to release the allocated HopID. 2075 */ 2076 int tb_xdomain_alloc_out_hopid(struct tb_xdomain *xd, int hopid) 2077 { 2078 if (hopid < 0) 2079 hopid = TB_PATH_MIN_HOPID; 2080 if (hopid < TB_PATH_MIN_HOPID || hopid > xd->remote_max_hopid) 2081 return -EINVAL; 2082 2083 return ida_alloc_range(&xd->out_hopids, hopid, xd->remote_max_hopid, 2084 GFP_KERNEL); 2085 } 2086 EXPORT_SYMBOL_GPL(tb_xdomain_alloc_out_hopid); 2087 2088 /** 2089 * tb_xdomain_release_in_hopid() - Release input HopID 2090 * @xd: XDomain connection 2091 * @hopid: HopID to release 2092 */ 2093 void tb_xdomain_release_in_hopid(struct tb_xdomain *xd, int hopid) 2094 { 2095 ida_free(&xd->in_hopids, hopid); 2096 } 2097 EXPORT_SYMBOL_GPL(tb_xdomain_release_in_hopid); 2098 2099 /** 2100 * tb_xdomain_release_out_hopid() - Release output HopID 2101 * @xd: XDomain connection 2102 * @hopid: HopID to release 2103 */ 2104 void tb_xdomain_release_out_hopid(struct tb_xdomain *xd, int hopid) 2105 { 2106 ida_free(&xd->out_hopids, hopid); 2107 } 2108 EXPORT_SYMBOL_GPL(tb_xdomain_release_out_hopid); 2109 2110 /** 2111 * tb_xdomain_enable_paths() - Enable DMA paths for XDomain connection 2112 * @xd: XDomain connection 2113 * @transmit_path: HopID we are using to send out packets 2114 * @transmit_ring: DMA ring used to send out packets 2115 * @receive_path: HopID the other end is using to send packets to us 2116 * @receive_ring: DMA ring used to receive packets from @receive_path 2117 * 2118 * The function enables DMA paths accordingly so that after successful 2119 * return the caller can send and receive packets using high-speed DMA 2120 * path. If a transmit or receive path is not needed, pass %-1 for those 2121 * parameters. 2122 * 2123 * Return: %0 in case of success and negative errno in case of error 2124 */ 2125 int tb_xdomain_enable_paths(struct tb_xdomain *xd, int transmit_path, 2126 int transmit_ring, int receive_path, 2127 int receive_ring) 2128 { 2129 return tb_domain_approve_xdomain_paths(xd->tb, xd, transmit_path, 2130 transmit_ring, receive_path, 2131 receive_ring); 2132 } 2133 EXPORT_SYMBOL_GPL(tb_xdomain_enable_paths); 2134 2135 /** 2136 * tb_xdomain_disable_paths() - Disable DMA paths for XDomain connection 2137 * @xd: XDomain connection 2138 * @transmit_path: HopID we are using to send out packets 2139 * @transmit_ring: DMA ring used to send out packets 2140 * @receive_path: HopID the other end is using to send packets to us 2141 * @receive_ring: DMA ring used to receive packets from @receive_path 2142 * 2143 * This does the opposite of tb_xdomain_enable_paths(). After call to 2144 * this the caller is not expected to use the rings anymore. Passing %-1 2145 * as path/ring parameter means don't care. Normally the callers should 2146 * pass the same values here as they do when paths are enabled. 2147 * 2148 * Return: %0 in case of success and negative errno in case of error 2149 */ 2150 int tb_xdomain_disable_paths(struct tb_xdomain *xd, int transmit_path, 2151 int transmit_ring, int receive_path, 2152 int receive_ring) 2153 { 2154 return tb_domain_disconnect_xdomain_paths(xd->tb, xd, transmit_path, 2155 transmit_ring, receive_path, 2156 receive_ring); 2157 } 2158 EXPORT_SYMBOL_GPL(tb_xdomain_disable_paths); 2159 2160 struct tb_xdomain_lookup { 2161 const uuid_t *uuid; 2162 u8 link; 2163 u8 depth; 2164 u64 route; 2165 }; 2166 2167 static struct tb_xdomain *switch_find_xdomain(struct tb_switch *sw, 2168 const struct tb_xdomain_lookup *lookup) 2169 { 2170 struct tb_port *port; 2171 2172 tb_switch_for_each_port(sw, port) { 2173 struct tb_xdomain *xd; 2174 2175 if (port->xdomain) { 2176 xd = port->xdomain; 2177 2178 if (lookup->uuid) { 2179 if (xd->remote_uuid && 2180 uuid_equal(xd->remote_uuid, lookup->uuid)) 2181 return xd; 2182 } else if (lookup->link && 2183 lookup->link == xd->link && 2184 lookup->depth == xd->depth) { 2185 return xd; 2186 } else if (lookup->route && 2187 lookup->route == xd->route) { 2188 return xd; 2189 } 2190 } else if (tb_port_has_remote(port)) { 2191 xd = switch_find_xdomain(port->remote->sw, lookup); 2192 if (xd) 2193 return xd; 2194 } 2195 } 2196 2197 return NULL; 2198 } 2199 2200 /** 2201 * tb_xdomain_find_by_uuid() - Find an XDomain by UUID 2202 * @tb: Domain where the XDomain belongs to 2203 * @uuid: UUID to look for 2204 * 2205 * Finds XDomain by walking through the Thunderbolt topology below @tb. 2206 * The returned XDomain will have its reference count increased so the 2207 * caller needs to call tb_xdomain_put() when it is done with the 2208 * object. 2209 * 2210 * This will find all XDomains including the ones that are not yet added 2211 * to the bus (handshake is still in progress). 2212 * 2213 * The caller needs to hold @tb->lock. 2214 */ 2215 struct tb_xdomain *tb_xdomain_find_by_uuid(struct tb *tb, const uuid_t *uuid) 2216 { 2217 struct tb_xdomain_lookup lookup; 2218 struct tb_xdomain *xd; 2219 2220 memset(&lookup, 0, sizeof(lookup)); 2221 lookup.uuid = uuid; 2222 2223 xd = switch_find_xdomain(tb->root_switch, &lookup); 2224 return tb_xdomain_get(xd); 2225 } 2226 EXPORT_SYMBOL_GPL(tb_xdomain_find_by_uuid); 2227 2228 /** 2229 * tb_xdomain_find_by_link_depth() - Find an XDomain by link and depth 2230 * @tb: Domain where the XDomain belongs to 2231 * @link: Root switch link number 2232 * @depth: Depth in the link 2233 * 2234 * Finds XDomain by walking through the Thunderbolt topology below @tb. 2235 * The returned XDomain will have its reference count increased so the 2236 * caller needs to call tb_xdomain_put() when it is done with the 2237 * object. 2238 * 2239 * This will find all XDomains including the ones that are not yet added 2240 * to the bus (handshake is still in progress). 2241 * 2242 * The caller needs to hold @tb->lock. 2243 */ 2244 struct tb_xdomain *tb_xdomain_find_by_link_depth(struct tb *tb, u8 link, 2245 u8 depth) 2246 { 2247 struct tb_xdomain_lookup lookup; 2248 struct tb_xdomain *xd; 2249 2250 memset(&lookup, 0, sizeof(lookup)); 2251 lookup.link = link; 2252 lookup.depth = depth; 2253 2254 xd = switch_find_xdomain(tb->root_switch, &lookup); 2255 return tb_xdomain_get(xd); 2256 } 2257 2258 /** 2259 * tb_xdomain_find_by_route() - Find an XDomain by route string 2260 * @tb: Domain where the XDomain belongs to 2261 * @route: XDomain route string 2262 * 2263 * Finds XDomain by walking through the Thunderbolt topology below @tb. 2264 * The returned XDomain will have its reference count increased so the 2265 * caller needs to call tb_xdomain_put() when it is done with the 2266 * object. 2267 * 2268 * This will find all XDomains including the ones that are not yet added 2269 * to the bus (handshake is still in progress). 2270 * 2271 * The caller needs to hold @tb->lock. 2272 */ 2273 struct tb_xdomain *tb_xdomain_find_by_route(struct tb *tb, u64 route) 2274 { 2275 struct tb_xdomain_lookup lookup; 2276 struct tb_xdomain *xd; 2277 2278 memset(&lookup, 0, sizeof(lookup)); 2279 lookup.route = route; 2280 2281 xd = switch_find_xdomain(tb->root_switch, &lookup); 2282 return tb_xdomain_get(xd); 2283 } 2284 EXPORT_SYMBOL_GPL(tb_xdomain_find_by_route); 2285 2286 bool tb_xdomain_handle_request(struct tb *tb, enum tb_cfg_pkg_type type, 2287 const void *buf, size_t size) 2288 { 2289 const struct tb_protocol_handler *handler, *tmp; 2290 const struct tb_xdp_header *hdr = buf; 2291 unsigned int length; 2292 int ret = 0; 2293 2294 /* We expect the packet is at least size of the header */ 2295 length = hdr->xd_hdr.length_sn & TB_XDOMAIN_LENGTH_MASK; 2296 if (length != size / 4 - sizeof(hdr->xd_hdr) / 4) 2297 return true; 2298 if (length < sizeof(*hdr) / 4 - sizeof(hdr->xd_hdr) / 4) 2299 return true; 2300 2301 /* 2302 * Handle XDomain discovery protocol packets directly here. For 2303 * other protocols (based on their UUID) we call registered 2304 * handlers in turn. 2305 */ 2306 if (uuid_equal(&hdr->uuid, &tb_xdp_uuid)) { 2307 if (type == TB_CFG_PKG_XDOMAIN_REQ) 2308 return tb_xdp_schedule_request(tb, hdr, size); 2309 return false; 2310 } 2311 2312 mutex_lock(&xdomain_lock); 2313 list_for_each_entry_safe(handler, tmp, &protocol_handlers, list) { 2314 if (!uuid_equal(&hdr->uuid, handler->uuid)) 2315 continue; 2316 2317 mutex_unlock(&xdomain_lock); 2318 ret = handler->callback(buf, size, handler->data); 2319 mutex_lock(&xdomain_lock); 2320 2321 if (ret) 2322 break; 2323 } 2324 mutex_unlock(&xdomain_lock); 2325 2326 return ret > 0; 2327 } 2328 2329 static int update_xdomain(struct device *dev, void *data) 2330 { 2331 struct tb_xdomain *xd; 2332 2333 xd = tb_to_xdomain(dev); 2334 if (xd) { 2335 queue_delayed_work(xd->tb->wq, &xd->properties_changed_work, 2336 msecs_to_jiffies(50)); 2337 } 2338 2339 return 0; 2340 } 2341 2342 static void update_all_xdomains(void) 2343 { 2344 bus_for_each_dev(&tb_bus_type, NULL, NULL, update_xdomain); 2345 } 2346 2347 static bool remove_directory(const char *key, const struct tb_property_dir *dir) 2348 { 2349 struct tb_property *p; 2350 2351 p = tb_property_find(xdomain_property_dir, key, 2352 TB_PROPERTY_TYPE_DIRECTORY); 2353 if (p && p->value.dir == dir) { 2354 tb_property_remove(p); 2355 return true; 2356 } 2357 return false; 2358 } 2359 2360 /** 2361 * tb_register_property_dir() - Register property directory to the host 2362 * @key: Key (name) of the directory to add 2363 * @dir: Directory to add 2364 * 2365 * Service drivers can use this function to add new property directory 2366 * to the host available properties. The other connected hosts are 2367 * notified so they can re-read properties of this host if they are 2368 * interested. 2369 * 2370 * Return: %0 on success and negative errno on failure 2371 */ 2372 int tb_register_property_dir(const char *key, struct tb_property_dir *dir) 2373 { 2374 int ret; 2375 2376 if (WARN_ON(!xdomain_property_dir)) 2377 return -EAGAIN; 2378 2379 if (!key || strlen(key) > 8) 2380 return -EINVAL; 2381 2382 mutex_lock(&xdomain_lock); 2383 if (tb_property_find(xdomain_property_dir, key, 2384 TB_PROPERTY_TYPE_DIRECTORY)) { 2385 ret = -EEXIST; 2386 goto err_unlock; 2387 } 2388 2389 ret = tb_property_add_dir(xdomain_property_dir, key, dir); 2390 if (ret) 2391 goto err_unlock; 2392 2393 xdomain_property_block_gen++; 2394 2395 mutex_unlock(&xdomain_lock); 2396 update_all_xdomains(); 2397 return 0; 2398 2399 err_unlock: 2400 mutex_unlock(&xdomain_lock); 2401 return ret; 2402 } 2403 EXPORT_SYMBOL_GPL(tb_register_property_dir); 2404 2405 /** 2406 * tb_unregister_property_dir() - Removes property directory from host 2407 * @key: Key (name) of the directory 2408 * @dir: Directory to remove 2409 * 2410 * This will remove the existing directory from this host and notify the 2411 * connected hosts about the change. 2412 */ 2413 void tb_unregister_property_dir(const char *key, struct tb_property_dir *dir) 2414 { 2415 int ret = 0; 2416 2417 mutex_lock(&xdomain_lock); 2418 if (remove_directory(key, dir)) 2419 xdomain_property_block_gen++; 2420 mutex_unlock(&xdomain_lock); 2421 2422 if (!ret) 2423 update_all_xdomains(); 2424 } 2425 EXPORT_SYMBOL_GPL(tb_unregister_property_dir); 2426 2427 int tb_xdomain_init(void) 2428 { 2429 xdomain_property_dir = tb_property_create_dir(NULL); 2430 if (!xdomain_property_dir) 2431 return -ENOMEM; 2432 2433 /* 2434 * Initialize standard set of properties without any service 2435 * directories. Those will be added by service drivers 2436 * themselves when they are loaded. 2437 * 2438 * Rest of the properties are filled dynamically based on these 2439 * when the P2P connection is made. 2440 */ 2441 tb_property_add_immediate(xdomain_property_dir, "vendorid", 2442 PCI_VENDOR_ID_INTEL); 2443 tb_property_add_text(xdomain_property_dir, "vendorid", "Intel Corp."); 2444 tb_property_add_immediate(xdomain_property_dir, "deviceid", 0x1); 2445 tb_property_add_immediate(xdomain_property_dir, "devicerv", 0x80000100); 2446 2447 xdomain_property_block_gen = get_random_u32(); 2448 return 0; 2449 } 2450 2451 void tb_xdomain_exit(void) 2452 { 2453 tb_property_free_dir(xdomain_property_dir); 2454 } 2455