]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/firewire/core-transaction.c
firewire: optimize iso queueing by setting wake only after the last packet
[mirror_ubuntu-artful-kernel.git] / drivers / firewire / core-transaction.c
CommitLineData
c781c06d
KH
1/*
2 * Core IEEE1394 transaction logic
3038e353
KH
3 *
4 * Copyright (C) 2004-2006 Kristian Hoegsberg <krh@bitplanet.net>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software Foundation,
18 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
19 */
20
e8ca9702 21#include <linux/bug.h>
2a0a2590 22#include <linux/completion.h>
e8ca9702
SR
23#include <linux/device.h>
24#include <linux/errno.h>
77c9a5da 25#include <linux/firewire.h>
e8ca9702
SR
26#include <linux/firewire-constants.h>
27#include <linux/fs.h>
28#include <linux/init.h>
d6053e08 29#include <linux/idr.h>
e8ca9702 30#include <linux/jiffies.h>
3038e353 31#include <linux/kernel.h>
3038e353 32#include <linux/list.h>
e8ca9702
SR
33#include <linux/module.h>
34#include <linux/slab.h>
35#include <linux/spinlock.h>
36#include <linux/string.h>
37#include <linux/timer.h>
38#include <linux/types.h>
39
40#include <asm/byteorder.h>
3038e353 41
77c9a5da 42#include "core.h"
3038e353 43
a77754a7
KH
44#define HEADER_PRI(pri) ((pri) << 0)
45#define HEADER_TCODE(tcode) ((tcode) << 4)
46#define HEADER_RETRY(retry) ((retry) << 8)
47#define HEADER_TLABEL(tlabel) ((tlabel) << 10)
48#define HEADER_DESTINATION(destination) ((destination) << 16)
49#define HEADER_SOURCE(source) ((source) << 16)
50#define HEADER_RCODE(rcode) ((rcode) << 12)
51#define HEADER_OFFSET_HIGH(offset_high) ((offset_high) << 0)
52#define HEADER_DATA_LENGTH(length) ((length) << 16)
53#define HEADER_EXTENDED_TCODE(tcode) ((tcode) << 0)
54
55#define HEADER_GET_TCODE(q) (((q) >> 4) & 0x0f)
56#define HEADER_GET_TLABEL(q) (((q) >> 10) & 0x3f)
57#define HEADER_GET_RCODE(q) (((q) >> 12) & 0x0f)
58#define HEADER_GET_DESTINATION(q) (((q) >> 16) & 0xffff)
59#define HEADER_GET_SOURCE(q) (((q) >> 16) & 0xffff)
60#define HEADER_GET_OFFSET_HIGH(q) (((q) >> 0) & 0xffff)
61#define HEADER_GET_DATA_LENGTH(q) (((q) >> 16) & 0xffff)
62#define HEADER_GET_EXTENDED_TCODE(q) (((q) >> 0) & 0xffff)
63
a7ea6782
SR
64#define HEADER_DESTINATION_IS_BROADCAST(q) \
65 (((q) & HEADER_DESTINATION(0x3f)) == HEADER_DESTINATION(0x3f))
66
77c9a5da
SR
67#define PHY_PACKET_CONFIG 0x0
68#define PHY_PACKET_LINK_ON 0x1
69#define PHY_PACKET_SELF_ID 0x2
70
a77754a7
KH
71#define PHY_CONFIG_GAP_COUNT(gap_count) (((gap_count) << 16) | (1 << 22))
72#define PHY_CONFIG_ROOT_ID(node_id) ((((node_id) & 0x3f) << 24) | (1 << 23))
73#define PHY_IDENTIFIER(id) ((id) << 30)
3038e353 74
410cf2bd
CL
75/* returns 0 if the split timeout handler is already running */
76static int try_cancel_split_timeout(struct fw_transaction *t)
77{
78 if (t->is_split_transaction)
79 return del_timer(&t->split_timeout_timer);
80 else
81 return 1;
82}
83
53dca511 84static int close_transaction(struct fw_transaction *transaction,
a38a00fd 85 struct fw_card *card, int rcode)
3038e353 86{
730c32f5 87 struct fw_transaction *t;
3038e353
KH
88 unsigned long flags;
89
90 spin_lock_irqsave(&card->lock, flags);
730c32f5
KH
91 list_for_each_entry(t, &card->transaction_list, link) {
92 if (t == transaction) {
410cf2bd 93 if (!try_cancel_split_timeout(t)) {
2222bcb7
CL
94 spin_unlock_irqrestore(&card->lock, flags);
95 goto timed_out;
96 }
5c40cbfe 97 list_del_init(&t->link);
1e626fdc 98 card->tlabel_mask &= ~(1ULL << t->tlabel);
730c32f5
KH
99 break;
100 }
101 }
3038e353
KH
102 spin_unlock_irqrestore(&card->lock, flags);
103
730c32f5 104 if (&t->link != &card->transaction_list) {
a38a00fd 105 t->callback(card, rcode, NULL, 0, t->callback_data);
730c32f5
KH
106 return 0;
107 }
108
2222bcb7 109 timed_out:
730c32f5 110 return -ENOENT;
3038e353
KH
111}
112
c781c06d
KH
113/*
114 * Only valid for transactions that are potentially pending (ie have
115 * been sent).
116 */
53dca511
SR
117int fw_cancel_transaction(struct fw_card *card,
118 struct fw_transaction *transaction)
730c32f5 119{
c781c06d
KH
120 /*
121 * Cancel the packet transmission if it's still queued. That
730c32f5 122 * will call the packet transmission callback which cancels
c781c06d
KH
123 * the transaction.
124 */
730c32f5
KH
125
126 if (card->driver->cancel_packet(card, &transaction->packet) == 0)
127 return 0;
128
c781c06d
KH
129 /*
130 * If the request packet has already been sent, we need to see
131 * if the transaction is still pending and remove it in that case.
132 */
730c32f5 133
a38a00fd 134 return close_transaction(transaction, card, RCODE_CANCELLED);
730c32f5
KH
135}
136EXPORT_SYMBOL(fw_cancel_transaction);
137
5c40cbfe
CL
138static void split_transaction_timeout_callback(unsigned long data)
139{
140 struct fw_transaction *t = (struct fw_transaction *)data;
141 struct fw_card *card = t->card;
142 unsigned long flags;
143
144 spin_lock_irqsave(&card->lock, flags);
145 if (list_empty(&t->link)) {
146 spin_unlock_irqrestore(&card->lock, flags);
147 return;
148 }
149 list_del(&t->link);
150 card->tlabel_mask &= ~(1ULL << t->tlabel);
151 spin_unlock_irqrestore(&card->lock, flags);
152
5c40cbfe
CL
153 t->callback(card, RCODE_CANCELLED, NULL, 0, t->callback_data);
154}
155
410cf2bd
CL
156static void start_split_transaction_timeout(struct fw_transaction *t,
157 struct fw_card *card)
158{
159 unsigned long flags;
160
161 spin_lock_irqsave(&card->lock, flags);
162
163 if (list_empty(&t->link) || WARN_ON(t->is_split_transaction)) {
164 spin_unlock_irqrestore(&card->lock, flags);
165 return;
166 }
167
168 t->is_split_transaction = true;
169 mod_timer(&t->split_timeout_timer,
170 jiffies + card->split_timeout_jiffies);
171
172 spin_unlock_irqrestore(&card->lock, flags);
173}
174
53dca511
SR
175static void transmit_complete_callback(struct fw_packet *packet,
176 struct fw_card *card, int status)
3038e353
KH
177{
178 struct fw_transaction *t =
179 container_of(packet, struct fw_transaction, packet);
180
181 switch (status) {
182 case ACK_COMPLETE:
a38a00fd 183 close_transaction(t, card, RCODE_COMPLETE);
3038e353
KH
184 break;
185 case ACK_PENDING:
410cf2bd 186 start_split_transaction_timeout(t, card);
3038e353
KH
187 break;
188 case ACK_BUSY_X:
189 case ACK_BUSY_A:
190 case ACK_BUSY_B:
a38a00fd 191 close_transaction(t, card, RCODE_BUSY);
3038e353
KH
192 break;
193 case ACK_DATA_ERROR:
a38a00fd 194 close_transaction(t, card, RCODE_DATA_ERROR);
e5f49c3b 195 break;
3038e353 196 case ACK_TYPE_ERROR:
a38a00fd 197 close_transaction(t, card, RCODE_TYPE_ERROR);
3038e353
KH
198 break;
199 default:
c781c06d
KH
200 /*
201 * In this case the ack is really a juju specific
202 * rcode, so just forward that to the callback.
203 */
a38a00fd 204 close_transaction(t, card, status);
3038e353
KH
205 break;
206 }
207}
208
53dca511 209static void fw_fill_request(struct fw_packet *packet, int tcode, int tlabel,
b9549bc6 210 int destination_id, int source_id, int generation, int speed,
36bfe49d 211 unsigned long long offset, void *payload, size_t length)
3038e353
KH
212{
213 int ext_tcode;
214
18e9b10f
SR
215 if (tcode == TCODE_STREAM_DATA) {
216 packet->header[0] =
217 HEADER_DATA_LENGTH(length) |
218 destination_id |
219 HEADER_TCODE(TCODE_STREAM_DATA);
220 packet->header_length = 4;
221 packet->payload = payload;
222 packet->payload_length = length;
223
224 goto common;
225 }
226
3038e353 227 if (tcode > 0x10) {
8f9f963e 228 ext_tcode = tcode & ~0x10;
3038e353
KH
229 tcode = TCODE_LOCK_REQUEST;
230 } else
231 ext_tcode = 0;
232
233 packet->header[0] =
a77754a7
KH
234 HEADER_RETRY(RETRY_X) |
235 HEADER_TLABEL(tlabel) |
236 HEADER_TCODE(tcode) |
b9549bc6 237 HEADER_DESTINATION(destination_id);
3038e353 238 packet->header[1] =
a77754a7 239 HEADER_OFFSET_HIGH(offset >> 32) | HEADER_SOURCE(source_id);
3038e353
KH
240 packet->header[2] =
241 offset;
242
243 switch (tcode) {
244 case TCODE_WRITE_QUADLET_REQUEST:
245 packet->header[3] = *(u32 *)payload;
246 packet->header_length = 16;
247 packet->payload_length = 0;
248 break;
249
250 case TCODE_LOCK_REQUEST:
251 case TCODE_WRITE_BLOCK_REQUEST:
252 packet->header[3] =
a77754a7
KH
253 HEADER_DATA_LENGTH(length) |
254 HEADER_EXTENDED_TCODE(ext_tcode);
3038e353
KH
255 packet->header_length = 16;
256 packet->payload = payload;
257 packet->payload_length = length;
258 break;
259
260 case TCODE_READ_QUADLET_REQUEST:
261 packet->header_length = 12;
262 packet->payload_length = 0;
263 break;
264
265 case TCODE_READ_BLOCK_REQUEST:
266 packet->header[3] =
a77754a7
KH
267 HEADER_DATA_LENGTH(length) |
268 HEADER_EXTENDED_TCODE(ext_tcode);
3038e353
KH
269 packet->header_length = 16;
270 packet->payload_length = 0;
271 break;
5b189bf3
SR
272
273 default:
5878730b 274 WARN(1, "wrong tcode %d\n", tcode);
3038e353 275 }
18e9b10f 276 common:
3038e353
KH
277 packet->speed = speed;
278 packet->generation = generation;
730c32f5 279 packet->ack = 0;
19593ffd 280 packet->payload_mapped = false;
3038e353
KH
281}
282
7906054f
CL
283static int allocate_tlabel(struct fw_card *card)
284{
285 int tlabel;
286
287 tlabel = card->current_tlabel;
288 while (card->tlabel_mask & (1ULL << tlabel)) {
289 tlabel = (tlabel + 1) & 0x3f;
290 if (tlabel == card->current_tlabel)
291 return -EBUSY;
292 }
293
294 card->current_tlabel = (tlabel + 1) & 0x3f;
295 card->tlabel_mask |= 1ULL << tlabel;
296
297 return tlabel;
298}
299
3038e353 300/**
656b7afd
SR
301 * fw_send_request() - submit a request packet for transmission
302 * @card: interface to send the request at
303 * @t: transaction instance to which the request belongs
304 * @tcode: transaction code
305 * @destination_id: destination node ID, consisting of bus_ID and phy_ID
306 * @generation: bus generation in which request and response are valid
307 * @speed: transmission speed
308 * @offset: 48bit wide offset into destination's address space
309 * @payload: data payload for the request subaction
310 * @length: length of the payload, in bytes
311 * @callback: function to be called when the transaction is completed
312 * @callback_data: data to be passed to the transaction completion callback
3038e353 313 *
656b7afd
SR
314 * Submit a request packet into the asynchronous request transmission queue.
315 * Can be called from atomic context. If you prefer a blocking API, use
316 * fw_run_transaction() in a context that can sleep.
3038e353 317 *
656b7afd
SR
318 * In case of lock requests, specify one of the firewire-core specific %TCODE_
319 * constants instead of %TCODE_LOCK_REQUEST in @tcode.
3038e353 320 *
656b7afd
SR
321 * Make sure that the value in @destination_id is not older than the one in
322 * @generation. Otherwise the request is in danger to be sent to a wrong node.
3038e353 323 *
656b7afd 324 * In case of asynchronous stream packets i.e. %TCODE_STREAM_DATA, the caller
18e9b10f 325 * needs to synthesize @destination_id with fw_stream_packet_destination_id().
656b7afd
SR
326 * It will contain tag, channel, and sy data instead of a node ID then.
327 *
328 * The payload buffer at @data is going to be DMA-mapped except in case of
f30e6d3e
SR
329 * @length <= 8 or of local (loopback) requests. Hence make sure that the
330 * buffer complies with the restrictions of the streaming DMA mapping API.
656b7afd
SR
331 * @payload must not be freed before the @callback is called.
332 *
333 * In case of request types without payload, @data is NULL and @length is 0.
334 *
335 * After the transaction is completed successfully or unsuccessfully, the
336 * @callback will be called. Among its parameters is the response code which
337 * is either one of the rcodes per IEEE 1394 or, in case of internal errors,
18d0cdfd
SR
338 * the firewire-core specific %RCODE_SEND_ERROR. The other firewire-core
339 * specific rcodes (%RCODE_CANCELLED, %RCODE_BUSY, %RCODE_GENERATION,
340 * %RCODE_NO_ACK) denote transaction timeout, busy responder, stale request
341 * generation, or missing ACK respectively.
656b7afd
SR
342 *
343 * Note some timing corner cases: fw_send_request() may complete much earlier
344 * than when the request packet actually hits the wire. On the other hand,
345 * transaction completion and hence execution of @callback may happen even
346 * before fw_send_request() returns.
3038e353 347 */
53dca511
SR
348void fw_send_request(struct fw_card *card, struct fw_transaction *t, int tcode,
349 int destination_id, int generation, int speed,
350 unsigned long long offset, void *payload, size_t length,
351 fw_transaction_callback_t callback, void *callback_data)
3038e353
KH
352{
353 unsigned long flags;
b9549bc6 354 int tlabel;
3038e353 355
c781c06d
KH
356 /*
357 * Allocate tlabel from the bitmap and put the transaction on
358 * the list while holding the card spinlock.
359 */
3038e353
KH
360
361 spin_lock_irqsave(&card->lock, flags);
362
7906054f
CL
363 tlabel = allocate_tlabel(card);
364 if (tlabel < 0) {
3038e353
KH
365 spin_unlock_irqrestore(&card->lock, flags);
366 callback(card, RCODE_SEND_ERROR, NULL, 0, callback_data);
367 return;
368 }
369
1e119fa9 370 t->node_id = destination_id;
3038e353 371 t->tlabel = tlabel;
5c40cbfe 372 t->card = card;
410cf2bd 373 t->is_split_transaction = false;
5c40cbfe
CL
374 setup_timer(&t->split_timeout_timer,
375 split_transaction_timeout_callback, (unsigned long)t);
3038e353
KH
376 t->callback = callback;
377 t->callback_data = callback_data;
378
1e119fa9
JF
379 fw_fill_request(&t->packet, tcode, t->tlabel,
380 destination_id, card->node_id, generation,
381 speed, offset, payload, length);
3038e353
KH
382 t->packet.callback = transmit_complete_callback;
383
e9aeb46c
SR
384 list_add_tail(&t->link, &card->transaction_list);
385
386 spin_unlock_irqrestore(&card->lock, flags);
387
3038e353
KH
388 card->driver->send_request(card, &t->packet);
389}
390EXPORT_SYMBOL(fw_send_request);
391
1e119fa9
JF
392struct transaction_callback_data {
393 struct completion done;
394 void *payload;
395 int rcode;
396};
397
398static void transaction_callback(struct fw_card *card, int rcode,
399 void *payload, size_t length, void *data)
400{
401 struct transaction_callback_data *d = data;
402
403 if (rcode == RCODE_COMPLETE)
404 memcpy(d->payload, payload, length);
405 d->rcode = rcode;
406 complete(&d->done);
407}
408
409/**
656b7afd 410 * fw_run_transaction() - send request and sleep until transaction is completed
1e119fa9 411 *
656b7afd
SR
412 * Returns the RCODE. See fw_send_request() for parameter documentation.
413 * Unlike fw_send_request(), @data points to the payload of the request or/and
f30e6d3e
SR
414 * to the payload of the response. DMA mapping restrictions apply to outbound
415 * request payloads of >= 8 bytes but not to inbound response payloads.
1e119fa9
JF
416 */
417int fw_run_transaction(struct fw_card *card, int tcode, int destination_id,
53dca511 418 int generation, int speed, unsigned long long offset,
ba27e1f7 419 void *payload, size_t length)
1e119fa9
JF
420{
421 struct transaction_callback_data d;
422 struct fw_transaction t;
423
5c40cbfe 424 init_timer_on_stack(&t.split_timeout_timer);
1e119fa9 425 init_completion(&d.done);
ba27e1f7 426 d.payload = payload;
1e119fa9 427 fw_send_request(card, &t, tcode, destination_id, generation, speed,
ba27e1f7 428 offset, payload, length, transaction_callback, &d);
1e119fa9 429 wait_for_completion(&d.done);
5c40cbfe 430 destroy_timer_on_stack(&t.split_timeout_timer);
1e119fa9
JF
431
432 return d.rcode;
433}
434EXPORT_SYMBOL(fw_run_transaction);
435
c0220d68
SR
436static DEFINE_MUTEX(phy_config_mutex);
437static DECLARE_COMPLETION(phy_config_done);
ae1e5355
SR
438
439static void transmit_phy_packet_callback(struct fw_packet *packet,
440 struct fw_card *card, int status)
3038e353 441{
c0220d68 442 complete(&phy_config_done);
3038e353
KH
443}
444
c0220d68 445static struct fw_packet phy_config_packet = {
5b06db16
CL
446 .header_length = 12,
447 .header[0] = TCODE_LINK_INTERNAL << 4,
c0220d68
SR
448 .payload_length = 0,
449 .speed = SCODE_100,
450 .callback = transmit_phy_packet_callback,
451};
452
83db801c
KH
453void fw_send_phy_config(struct fw_card *card,
454 int node_id, int generation, int gap_count)
3038e353 455{
ae1e5355 456 long timeout = DIV_ROUND_UP(HZ, 10);
02d37bed
SR
457 u32 data = PHY_IDENTIFIER(PHY_PACKET_CONFIG);
458
459 if (node_id != FW_PHY_CONFIG_NO_NODE_ID)
460 data |= PHY_CONFIG_ROOT_ID(node_id);
461
462 if (gap_count == FW_PHY_CONFIG_CURRENT_GAP_COUNT) {
463 gap_count = card->driver->read_phy_reg(card, 1);
464 if (gap_count < 0)
465 return;
466
467 gap_count &= 63;
468 if (gap_count == 63)
469 return;
470 }
471 data |= PHY_CONFIG_GAP_COUNT(gap_count);
2a0a2590 472
c0220d68
SR
473 mutex_lock(&phy_config_mutex);
474
5b06db16
CL
475 phy_config_packet.header[1] = data;
476 phy_config_packet.header[2] = ~data;
c0220d68
SR
477 phy_config_packet.generation = generation;
478 INIT_COMPLETION(phy_config_done);
479
480 card->driver->send_request(card, &phy_config_packet);
481 wait_for_completion_timeout(&phy_config_done, timeout);
ae1e5355 482
c0220d68 483 mutex_unlock(&phy_config_mutex);
3038e353
KH
484}
485
53dca511
SR
486static struct fw_address_handler *lookup_overlapping_address_handler(
487 struct list_head *list, unsigned long long offset, size_t length)
3038e353
KH
488{
489 struct fw_address_handler *handler;
490
491 list_for_each_entry(handler, list, link) {
492 if (handler->offset < offset + length &&
493 offset < handler->offset + handler->length)
494 return handler;
495 }
496
497 return NULL;
498}
499
db5d247a
CL
500static bool is_enclosing_handler(struct fw_address_handler *handler,
501 unsigned long long offset, size_t length)
502{
503 return handler->offset <= offset &&
504 offset + length <= handler->offset + handler->length;
505}
506
53dca511
SR
507static struct fw_address_handler *lookup_enclosing_address_handler(
508 struct list_head *list, unsigned long long offset, size_t length)
3038e353
KH
509{
510 struct fw_address_handler *handler;
511
512 list_for_each_entry(handler, list, link) {
db5d247a 513 if (is_enclosing_handler(handler, offset, length))
3038e353
KH
514 return handler;
515 }
516
517 return NULL;
518}
519
520static DEFINE_SPINLOCK(address_handler_lock);
521static LIST_HEAD(address_handler_list);
522
21ebcd12 523const struct fw_address_region fw_high_memory_region =
5af4e5ea 524 { .start = 0x000100000000ULL, .end = 0xffffe0000000ULL, };
db8be076
AB
525EXPORT_SYMBOL(fw_high_memory_region);
526
527#if 0
528const struct fw_address_region fw_low_memory_region =
529 { .start = 0x000000000000ULL, .end = 0x000100000000ULL, };
21ebcd12 530const struct fw_address_region fw_private_region =
5af4e5ea 531 { .start = 0xffffe0000000ULL, .end = 0xfffff0000000ULL, };
21ebcd12 532const struct fw_address_region fw_csr_region =
cca60977
JW
533 { .start = CSR_REGISTER_BASE,
534 .end = CSR_REGISTER_BASE | CSR_CONFIG_ROM_END, };
21ebcd12 535const struct fw_address_region fw_unit_space_region =
5af4e5ea 536 { .start = 0xfffff0000900ULL, .end = 0x1000000000000ULL, };
db8be076 537#endif /* 0 */
3038e353 538
db5d247a
CL
539static bool is_in_fcp_region(u64 offset, size_t length)
540{
541 return offset >= (CSR_REGISTER_BASE | CSR_FCP_COMMAND) &&
542 offset + length <= (CSR_REGISTER_BASE | CSR_FCP_END);
543}
544
3038e353 545/**
656b7afd
SR
546 * fw_core_add_address_handler() - register for incoming requests
547 * @handler: callback
548 * @region: region in the IEEE 1212 node space address range
3e0b5f0d
SR
549 *
550 * region->start, ->end, and handler->length have to be quadlet-aligned.
551 *
552 * When a request is received that falls within the specified address range,
553 * the specified callback is invoked. The parameters passed to the callback
554 * give the details of the particular request.
1415d918
SR
555 *
556 * Return value: 0 on success, non-zero otherwise.
db5d247a 557 *
1415d918
SR
558 * The start offset of the handler's address region is determined by
559 * fw_core_add_address_handler() and is returned in handler->offset.
db5d247a
CL
560 *
561 * Address allocations are exclusive, except for the FCP registers.
3038e353 562 */
53dca511
SR
563int fw_core_add_address_handler(struct fw_address_handler *handler,
564 const struct fw_address_region *region)
3038e353
KH
565{
566 struct fw_address_handler *other;
567 unsigned long flags;
568 int ret = -EBUSY;
569
3e0b5f0d 570 if (region->start & 0xffff000000000003ULL ||
3e0b5f0d 571 region->start >= region->end ||
0c9ae701 572 region->end > 0x0001000000000000ULL ||
3e0b5f0d
SR
573 handler->length & 3 ||
574 handler->length == 0)
575 return -EINVAL;
576
3038e353
KH
577 spin_lock_irqsave(&address_handler_lock, flags);
578
3e0b5f0d 579 handler->offset = region->start;
3038e353 580 while (handler->offset + handler->length <= region->end) {
db5d247a
CL
581 if (is_in_fcp_region(handler->offset, handler->length))
582 other = NULL;
583 else
584 other = lookup_overlapping_address_handler
585 (&address_handler_list,
586 handler->offset, handler->length);
3038e353 587 if (other != NULL) {
3e0b5f0d 588 handler->offset += other->length;
3038e353
KH
589 } else {
590 list_add_tail(&handler->link, &address_handler_list);
591 ret = 0;
592 break;
593 }
594 }
595
596 spin_unlock_irqrestore(&address_handler_lock, flags);
597
598 return ret;
599}
3038e353
KH
600EXPORT_SYMBOL(fw_core_add_address_handler);
601
602/**
656b7afd 603 * fw_core_remove_address_handler() - unregister an address handler
3038e353 604 */
3038e353
KH
605void fw_core_remove_address_handler(struct fw_address_handler *handler)
606{
607 unsigned long flags;
608
609 spin_lock_irqsave(&address_handler_lock, flags);
610 list_del(&handler->link);
611 spin_unlock_irqrestore(&address_handler_lock, flags);
612}
3038e353
KH
613EXPORT_SYMBOL(fw_core_remove_address_handler);
614
615struct fw_request {
616 struct fw_packet response;
36bfe49d 617 u32 request_header[4];
3038e353
KH
618 int ack;
619 u32 length;
620 u32 data[0];
621};
622
53dca511
SR
623static void free_response_callback(struct fw_packet *packet,
624 struct fw_card *card, int status)
3038e353
KH
625{
626 struct fw_request *request;
627
628 request = container_of(packet, struct fw_request, response);
629 kfree(request);
630}
631
a10c0ce7
CL
632int fw_get_response_length(struct fw_request *r)
633{
634 int tcode, ext_tcode, data_length;
635
636 tcode = HEADER_GET_TCODE(r->request_header[0]);
637
638 switch (tcode) {
639 case TCODE_WRITE_QUADLET_REQUEST:
640 case TCODE_WRITE_BLOCK_REQUEST:
641 return 0;
642
643 case TCODE_READ_QUADLET_REQUEST:
644 return 4;
645
646 case TCODE_READ_BLOCK_REQUEST:
647 data_length = HEADER_GET_DATA_LENGTH(r->request_header[3]);
648 return data_length;
649
650 case TCODE_LOCK_REQUEST:
651 ext_tcode = HEADER_GET_EXTENDED_TCODE(r->request_header[3]);
652 data_length = HEADER_GET_DATA_LENGTH(r->request_header[3]);
653 switch (ext_tcode) {
654 case EXTCODE_FETCH_ADD:
655 case EXTCODE_LITTLE_ADD:
656 return data_length;
657 default:
658 return data_length / 2;
659 }
660
661 default:
5878730b 662 WARN(1, "wrong tcode %d\n", tcode);
a10c0ce7
CL
663 return 0;
664 }
665}
666
53dca511
SR
667void fw_fill_response(struct fw_packet *response, u32 *request_header,
668 int rcode, void *payload, size_t length)
3038e353
KH
669{
670 int tcode, tlabel, extended_tcode, source, destination;
671
a77754a7
KH
672 tcode = HEADER_GET_TCODE(request_header[0]);
673 tlabel = HEADER_GET_TLABEL(request_header[0]);
674 source = HEADER_GET_DESTINATION(request_header[0]);
675 destination = HEADER_GET_SOURCE(request_header[1]);
676 extended_tcode = HEADER_GET_EXTENDED_TCODE(request_header[3]);
3038e353
KH
677
678 response->header[0] =
a77754a7
KH
679 HEADER_RETRY(RETRY_1) |
680 HEADER_TLABEL(tlabel) |
681 HEADER_DESTINATION(destination);
36bfe49d 682 response->header[1] =
a77754a7
KH
683 HEADER_SOURCE(source) |
684 HEADER_RCODE(rcode);
3038e353
KH
685 response->header[2] = 0;
686
687 switch (tcode) {
688 case TCODE_WRITE_QUADLET_REQUEST:
689 case TCODE_WRITE_BLOCK_REQUEST:
a77754a7 690 response->header[0] |= HEADER_TCODE(TCODE_WRITE_RESPONSE);
3038e353
KH
691 response->header_length = 12;
692 response->payload_length = 0;
693 break;
694
695 case TCODE_READ_QUADLET_REQUEST:
696 response->header[0] |=
a77754a7 697 HEADER_TCODE(TCODE_READ_QUADLET_RESPONSE);
93c4cceb
KH
698 if (payload != NULL)
699 response->header[3] = *(u32 *)payload;
700 else
701 response->header[3] = 0;
3038e353
KH
702 response->header_length = 16;
703 response->payload_length = 0;
704 break;
705
706 case TCODE_READ_BLOCK_REQUEST:
707 case TCODE_LOCK_REQUEST:
a77754a7 708 response->header[0] |= HEADER_TCODE(tcode + 2);
3038e353 709 response->header[3] =
a77754a7
KH
710 HEADER_DATA_LENGTH(length) |
711 HEADER_EXTENDED_TCODE(extended_tcode);
3038e353 712 response->header_length = 16;
36bfe49d
KH
713 response->payload = payload;
714 response->payload_length = length;
3038e353
KH
715 break;
716
717 default:
5878730b 718 WARN(1, "wrong tcode %d\n", tcode);
3038e353 719 }
1d1dc5e8 720
19593ffd 721 response->payload_mapped = false;
3038e353 722}
93c4cceb 723EXPORT_SYMBOL(fw_fill_response);
3038e353 724
8e4b50f9
CL
725static u32 compute_split_timeout_timestamp(struct fw_card *card,
726 u32 request_timestamp)
727{
728 unsigned int cycles;
729 u32 timestamp;
730
731 cycles = card->split_timeout_cycles;
732 cycles += request_timestamp & 0x1fff;
733
734 timestamp = request_timestamp & ~0x1fff;
735 timestamp += (cycles / 8000) << 13;
736 timestamp |= cycles % 8000;
737
738 return timestamp;
739}
740
741static struct fw_request *allocate_request(struct fw_card *card,
742 struct fw_packet *p)
3038e353
KH
743{
744 struct fw_request *request;
745 u32 *data, length;
8e4b50f9 746 int request_tcode;
3038e353 747
a77754a7 748 request_tcode = HEADER_GET_TCODE(p->header[0]);
3038e353
KH
749 switch (request_tcode) {
750 case TCODE_WRITE_QUADLET_REQUEST:
2639a6fb 751 data = &p->header[3];
3038e353
KH
752 length = 4;
753 break;
754
755 case TCODE_WRITE_BLOCK_REQUEST:
756 case TCODE_LOCK_REQUEST:
2639a6fb 757 data = p->payload;
a77754a7 758 length = HEADER_GET_DATA_LENGTH(p->header[3]);
3038e353
KH
759 break;
760
761 case TCODE_READ_QUADLET_REQUEST:
762 data = NULL;
763 length = 4;
764 break;
765
766 case TCODE_READ_BLOCK_REQUEST:
767 data = NULL;
a77754a7 768 length = HEADER_GET_DATA_LENGTH(p->header[3]);
3038e353
KH
769 break;
770
771 default:
0bf607c5
SR
772 fw_error("ERROR - corrupt request received - %08x %08x %08x\n",
773 p->header[0], p->header[1], p->header[2]);
3038e353
KH
774 return NULL;
775 }
776
2d826cc5 777 request = kmalloc(sizeof(*request) + length, GFP_ATOMIC);
3038e353
KH
778 if (request == NULL)
779 return NULL;
780
2639a6fb 781 request->response.speed = p->speed;
8e4b50f9
CL
782 request->response.timestamp =
783 compute_split_timeout_timestamp(card, p->timestamp);
2639a6fb 784 request->response.generation = p->generation;
730c32f5 785 request->response.ack = 0;
3038e353 786 request->response.callback = free_response_callback;
2639a6fb 787 request->ack = p->ack;
93c4cceb 788 request->length = length;
3038e353 789 if (data)
6e2e8424 790 memcpy(request->data, data, length);
3038e353 791
2d826cc5 792 memcpy(request->request_header, p->header, sizeof(p->header));
3038e353
KH
793
794 return request;
795}
796
53dca511
SR
797void fw_send_response(struct fw_card *card,
798 struct fw_request *request, int rcode)
3038e353 799{
db5d247a
CL
800 if (WARN_ONCE(!request, "invalid for FCP address handlers"))
801 return;
802
a7ea6782
SR
803 /* unified transaction or broadcast transaction: don't respond */
804 if (request->ack != ACK_PENDING ||
805 HEADER_DESTINATION_IS_BROADCAST(request->request_header[0])) {
9c9bdf4d 806 kfree(request);
3038e353 807 return;
9c9bdf4d 808 }
3038e353 809
36bfe49d
KH
810 if (rcode == RCODE_COMPLETE)
811 fw_fill_response(&request->response, request->request_header,
a10c0ce7
CL
812 rcode, request->data,
813 fw_get_response_length(request));
36bfe49d
KH
814 else
815 fw_fill_response(&request->response, request->request_header,
816 rcode, NULL, 0);
3038e353
KH
817
818 card->driver->send_response(card, &request->response);
819}
3038e353
KH
820EXPORT_SYMBOL(fw_send_response);
821
db5d247a
CL
822static void handle_exclusive_region_request(struct fw_card *card,
823 struct fw_packet *p,
824 struct fw_request *request,
825 unsigned long long offset)
3038e353
KH
826{
827 struct fw_address_handler *handler;
3038e353 828 unsigned long flags;
2639a6fb 829 int tcode, destination, source;
3038e353 830
a77754a7 831 destination = HEADER_GET_DESTINATION(p->header[0]);
478b233e 832 source = HEADER_GET_SOURCE(p->header[1]);
c82f91f2
JF
833 tcode = HEADER_GET_TCODE(p->header[0]);
834 if (tcode == TCODE_LOCK_REQUEST)
835 tcode = 0x10 + HEADER_GET_EXTENDED_TCODE(p->header[3]);
3038e353
KH
836
837 spin_lock_irqsave(&address_handler_lock, flags);
838 handler = lookup_enclosing_address_handler(&address_handler_list,
839 offset, request->length);
840 spin_unlock_irqrestore(&address_handler_lock, flags);
841
c781c06d
KH
842 /*
843 * FIXME: lookup the fw_node corresponding to the sender of
3038e353
KH
844 * this request and pass that to the address handler instead
845 * of the node ID. We may also want to move the address
846 * allocations to fw_node so we only do this callback if the
c781c06d
KH
847 * upper layers registered it for this node.
848 */
3038e353
KH
849
850 if (handler == NULL)
851 fw_send_response(card, request, RCODE_ADDRESS_ERROR);
852 else
853 handler->address_callback(card, request,
854 tcode, destination, source,
33e553fe 855 p->generation, offset,
3038e353
KH
856 request->data, request->length,
857 handler->callback_data);
858}
db5d247a
CL
859
860static void handle_fcp_region_request(struct fw_card *card,
861 struct fw_packet *p,
862 struct fw_request *request,
863 unsigned long long offset)
864{
865 struct fw_address_handler *handler;
866 unsigned long flags;
867 int tcode, destination, source;
868
869 if ((offset != (CSR_REGISTER_BASE | CSR_FCP_COMMAND) &&
870 offset != (CSR_REGISTER_BASE | CSR_FCP_RESPONSE)) ||
871 request->length > 0x200) {
872 fw_send_response(card, request, RCODE_ADDRESS_ERROR);
873
874 return;
875 }
876
877 tcode = HEADER_GET_TCODE(p->header[0]);
878 destination = HEADER_GET_DESTINATION(p->header[0]);
879 source = HEADER_GET_SOURCE(p->header[1]);
880
881 if (tcode != TCODE_WRITE_QUADLET_REQUEST &&
882 tcode != TCODE_WRITE_BLOCK_REQUEST) {
883 fw_send_response(card, request, RCODE_TYPE_ERROR);
884
885 return;
886 }
887
888 spin_lock_irqsave(&address_handler_lock, flags);
889 list_for_each_entry(handler, &address_handler_list, link) {
890 if (is_enclosing_handler(handler, offset, request->length))
891 handler->address_callback(card, NULL, tcode,
892 destination, source,
33e553fe
SR
893 p->generation, offset,
894 request->data,
db5d247a
CL
895 request->length,
896 handler->callback_data);
897 }
898 spin_unlock_irqrestore(&address_handler_lock, flags);
899
900 fw_send_response(card, request, RCODE_COMPLETE);
901}
902
903void fw_core_handle_request(struct fw_card *card, struct fw_packet *p)
904{
905 struct fw_request *request;
906 unsigned long long offset;
907
908 if (p->ack != ACK_PENDING && p->ack != ACK_COMPLETE)
909 return;
910
bf54e146
SR
911 if (TCODE_IS_LINK_INTERNAL(HEADER_GET_TCODE(p->header[0]))) {
912 fw_cdev_handle_phy_packet(card, p);
913 return;
914 }
915
8e4b50f9 916 request = allocate_request(card, p);
db5d247a
CL
917 if (request == NULL) {
918 /* FIXME: send statically allocated busy packet. */
919 return;
920 }
921
922 offset = ((u64)HEADER_GET_OFFSET_HIGH(p->header[1]) << 32) |
923 p->header[2];
924
925 if (!is_in_fcp_region(offset, request->length))
926 handle_exclusive_region_request(card, p, request, offset);
927 else
928 handle_fcp_region_request(card, p, request, offset);
929
930}
3038e353
KH
931EXPORT_SYMBOL(fw_core_handle_request);
932
53dca511 933void fw_core_handle_response(struct fw_card *card, struct fw_packet *p)
3038e353
KH
934{
935 struct fw_transaction *t;
936 unsigned long flags;
937 u32 *data;
938 size_t data_length;
ae86e81e 939 int tcode, tlabel, source, rcode;
3038e353 940
ae86e81e
SR
941 tcode = HEADER_GET_TCODE(p->header[0]);
942 tlabel = HEADER_GET_TLABEL(p->header[0]);
943 source = HEADER_GET_SOURCE(p->header[1]);
944 rcode = HEADER_GET_RCODE(p->header[1]);
3038e353
KH
945
946 spin_lock_irqsave(&card->lock, flags);
947 list_for_each_entry(t, &card->transaction_list, link) {
948 if (t->node_id == source && t->tlabel == tlabel) {
410cf2bd 949 if (!try_cancel_split_timeout(t)) {
2222bcb7
CL
950 spin_unlock_irqrestore(&card->lock, flags);
951 goto timed_out;
952 }
5c40cbfe 953 list_del_init(&t->link);
753a8970 954 card->tlabel_mask &= ~(1ULL << t->tlabel);
3038e353
KH
955 break;
956 }
957 }
958 spin_unlock_irqrestore(&card->lock, flags);
959
960 if (&t->link == &card->transaction_list) {
2222bcb7 961 timed_out:
32b46093
KH
962 fw_notify("Unsolicited response (source %x, tlabel %x)\n",
963 source, tlabel);
3038e353
KH
964 return;
965 }
966
c781c06d
KH
967 /*
968 * FIXME: sanity check packet, is length correct, does tcodes
969 * and addresses match.
970 */
3038e353
KH
971
972 switch (tcode) {
973 case TCODE_READ_QUADLET_RESPONSE:
2639a6fb 974 data = (u32 *) &p->header[3];
3038e353
KH
975 data_length = 4;
976 break;
977
978 case TCODE_WRITE_RESPONSE:
979 data = NULL;
980 data_length = 0;
981 break;
982
983 case TCODE_READ_BLOCK_RESPONSE:
984 case TCODE_LOCK_RESPONSE:
93c4cceb 985 data = p->payload;
a77754a7 986 data_length = HEADER_GET_DATA_LENGTH(p->header[3]);
3038e353
KH
987 break;
988
989 default:
990 /* Should never happen, this is just to shut up gcc. */
991 data = NULL;
992 data_length = 0;
993 break;
994 }
995
10a4c735
SR
996 /*
997 * The response handler may be executed while the request handler
998 * is still pending. Cancel the request handler.
999 */
1000 card->driver->cancel_packet(card, &t->packet);
1001
3038e353
KH
1002 t->callback(card, rcode, data, data_length, t->callback_data);
1003}
3038e353
KH
1004EXPORT_SYMBOL(fw_core_handle_response);
1005
ae57988f 1006static const struct fw_address_region topology_map_region =
cca60977
JW
1007 { .start = CSR_REGISTER_BASE | CSR_TOPOLOGY_MAP,
1008 .end = CSR_REGISTER_BASE | CSR_TOPOLOGY_MAP_END, };
473d28c7 1009
53dca511
SR
1010static void handle_topology_map(struct fw_card *card, struct fw_request *request,
1011 int tcode, int destination, int source, int generation,
33e553fe
SR
1012 unsigned long long offset, void *payload, size_t length,
1013 void *callback_data)
473d28c7 1014{
cb7c96da 1015 int start;
473d28c7
KH
1016
1017 if (!TCODE_IS_READ_REQUEST(tcode)) {
1018 fw_send_response(card, request, RCODE_TYPE_ERROR);
1019 return;
1020 }
1021
1022 if ((offset & 3) > 0 || (length & 3) > 0) {
1023 fw_send_response(card, request, RCODE_ADDRESS_ERROR);
1024 return;
1025 }
1026
1027 start = (offset - topology_map_region.start) / 4;
cb7c96da 1028 memcpy(payload, &card->topology_map[start], length);
473d28c7
KH
1029
1030 fw_send_response(card, request, RCODE_COMPLETE);
1031}
1032
1033static struct fw_address_handler topology_map = {
85cb9b68 1034 .length = 0x400,
473d28c7
KH
1035 .address_callback = handle_topology_map,
1036};
1037
ae57988f 1038static const struct fw_address_region registers_region =
cca60977
JW
1039 { .start = CSR_REGISTER_BASE,
1040 .end = CSR_REGISTER_BASE | CSR_CONFIG_ROM, };
d60d7f1d 1041
8e4b50f9
CL
1042static void update_split_timeout(struct fw_card *card)
1043{
1044 unsigned int cycles;
1045
1046 cycles = card->split_timeout_hi * 8000 + (card->split_timeout_lo >> 19);
1047
1048 cycles = max(cycles, 800u); /* minimum as per the spec */
1049 cycles = min(cycles, 3u * 8000u); /* maximum OHCI timeout */
1050
1051 card->split_timeout_cycles = cycles;
1052 card->split_timeout_jiffies = DIV_ROUND_UP(cycles * HZ, 8000);
1053}
1054
53dca511
SR
1055static void handle_registers(struct fw_card *card, struct fw_request *request,
1056 int tcode, int destination, int source, int generation,
33e553fe
SR
1057 unsigned long long offset, void *payload, size_t length,
1058 void *callback_data)
d60d7f1d 1059{
15f0d833 1060 int reg = offset & ~CSR_REGISTER_BASE;
d60d7f1d 1061 __be32 *data = payload;
e534fe16 1062 int rcode = RCODE_COMPLETE;
8e4b50f9 1063 unsigned long flags;
d60d7f1d
KH
1064
1065 switch (reg) {
b384cf18
SR
1066 case CSR_PRIORITY_BUDGET:
1067 if (!card->priority_budget_implemented) {
1068 rcode = RCODE_ADDRESS_ERROR;
1069 break;
1070 }
1071 /* else fall through */
3e07ec0e 1072
506f1a31 1073 case CSR_NODE_IDS:
65b2742a
SR
1074 /*
1075 * per IEEE 1394-2008 8.3.22.3, not IEEE 1394.1-2004 3.2.8
1076 * and 9.6, but interoperable with IEEE 1394.1-2004 bridges
1077 */
b384cf18
SR
1078 /* fall through */
1079
1080 case CSR_STATE_CLEAR:
1081 case CSR_STATE_SET:
1082 case CSR_CYCLE_TIME:
1083 case CSR_BUS_TIME:
1084 case CSR_BUSY_TIMEOUT:
506f1a31 1085 if (tcode == TCODE_READ_QUADLET_REQUEST)
0fcff4e3 1086 *data = cpu_to_be32(card->driver->read_csr(card, reg));
506f1a31 1087 else if (tcode == TCODE_WRITE_QUADLET_REQUEST)
0fcff4e3 1088 card->driver->write_csr(card, reg, be32_to_cpu(*data));
506f1a31
CL
1089 else
1090 rcode = RCODE_TYPE_ERROR;
1091 break;
1092
446eba0d 1093 case CSR_RESET_START:
7e0e314f 1094 if (tcode == TCODE_WRITE_QUADLET_REQUEST)
0fcff4e3
SR
1095 card->driver->write_csr(card, CSR_STATE_CLEAR,
1096 CSR_STATE_BIT_ABDICATE);
7e0e314f 1097 else
446eba0d
CL
1098 rcode = RCODE_TYPE_ERROR;
1099 break;
1100
8e4b50f9
CL
1101 case CSR_SPLIT_TIMEOUT_HI:
1102 if (tcode == TCODE_READ_QUADLET_REQUEST) {
1103 *data = cpu_to_be32(card->split_timeout_hi);
1104 } else if (tcode == TCODE_WRITE_QUADLET_REQUEST) {
1105 spin_lock_irqsave(&card->lock, flags);
1106 card->split_timeout_hi = be32_to_cpu(*data) & 7;
1107 update_split_timeout(card);
1108 spin_unlock_irqrestore(&card->lock, flags);
1109 } else {
1110 rcode = RCODE_TYPE_ERROR;
1111 }
1112 break;
1113
1114 case CSR_SPLIT_TIMEOUT_LO:
1115 if (tcode == TCODE_READ_QUADLET_REQUEST) {
1116 *data = cpu_to_be32(card->split_timeout_lo);
1117 } else if (tcode == TCODE_WRITE_QUADLET_REQUEST) {
1118 spin_lock_irqsave(&card->lock, flags);
1119 card->split_timeout_lo =
1120 be32_to_cpu(*data) & 0xfff80000;
1121 update_split_timeout(card);
1122 spin_unlock_irqrestore(&card->lock, flags);
1123 } else {
1124 rcode = RCODE_TYPE_ERROR;
1125 }
1126 break;
1127
3d1f46eb
CL
1128 case CSR_MAINT_UTILITY:
1129 if (tcode == TCODE_READ_QUADLET_REQUEST)
1130 *data = card->maint_utility_register;
1131 else if (tcode == TCODE_WRITE_QUADLET_REQUEST)
1132 card->maint_utility_register = *data;
1133 else
1134 rcode = RCODE_TYPE_ERROR;
1135 break;
1136
e534fe16
SR
1137 case CSR_BROADCAST_CHANNEL:
1138 if (tcode == TCODE_READ_QUADLET_REQUEST)
1139 *data = cpu_to_be32(card->broadcast_channel);
1140 else if (tcode == TCODE_WRITE_QUADLET_REQUEST)
1141 card->broadcast_channel =
1142 (be32_to_cpu(*data) & BROADCAST_CHANNEL_VALID) |
1143 BROADCAST_CHANNEL_INITIAL;
1144 else
1145 rcode = RCODE_TYPE_ERROR;
d60d7f1d
KH
1146 break;
1147
1148 case CSR_BUS_MANAGER_ID:
1149 case CSR_BANDWIDTH_AVAILABLE:
1150 case CSR_CHANNELS_AVAILABLE_HI:
1151 case CSR_CHANNELS_AVAILABLE_LO:
c781c06d
KH
1152 /*
1153 * FIXME: these are handled by the OHCI hardware and
d60d7f1d
KH
1154 * the stack never sees these request. If we add
1155 * support for a new type of controller that doesn't
1156 * handle this in hardware we need to deal with these
c781c06d
KH
1157 * transactions.
1158 */
d60d7f1d
KH
1159 BUG();
1160 break;
1161
d60d7f1d 1162 default:
e534fe16 1163 rcode = RCODE_ADDRESS_ERROR;
d60d7f1d
KH
1164 break;
1165 }
e534fe16
SR
1166
1167 fw_send_response(card, request, rcode);
d60d7f1d
KH
1168}
1169
1170static struct fw_address_handler registers = {
1171 .length = 0x400,
1172 .address_callback = handle_registers,
1173};
1174
3038e353
KH
1175MODULE_AUTHOR("Kristian Hoegsberg <krh@bitplanet.net>");
1176MODULE_DESCRIPTION("Core IEEE1394 transaction logic");
1177MODULE_LICENSE("GPL");
1178
937f6879 1179static const u32 vendor_textual_descriptor[] = {
3038e353 1180 /* textual descriptor leaf () */
937f6879 1181 0x00060000,
3038e353
KH
1182 0x00000000,
1183 0x00000000,
1184 0x4c696e75, /* L i n u */
1185 0x78204669, /* x F i */
1186 0x72657769, /* r e w i */
937f6879 1187 0x72650000, /* r e */
3038e353
KH
1188};
1189
937f6879
KH
1190static const u32 model_textual_descriptor[] = {
1191 /* model descriptor leaf () */
1192 0x00030000,
1193 0x00000000,
1194 0x00000000,
1195 0x4a756a75, /* J u j u */
1196};
1197
1198static struct fw_descriptor vendor_id_descriptor = {
1199 .length = ARRAY_SIZE(vendor_textual_descriptor),
1200 .immediate = 0x03d00d1e,
3038e353 1201 .key = 0x81000000,
937f6879
KH
1202 .data = vendor_textual_descriptor,
1203};
1204
1205static struct fw_descriptor model_id_descriptor = {
1206 .length = ARRAY_SIZE(model_textual_descriptor),
1207 .immediate = 0x17000001,
1208 .key = 0x81000000,
1209 .data = model_textual_descriptor,
3038e353
KH
1210};
1211
3038e353
KH
1212static int __init fw_core_init(void)
1213{
2dbd7d7e 1214 int ret;
3038e353 1215
2dbd7d7e
SR
1216 ret = bus_register(&fw_bus_type);
1217 if (ret < 0)
1218 return ret;
3038e353 1219
a3aca3da
KH
1220 fw_cdev_major = register_chrdev(0, "firewire", &fw_device_ops);
1221 if (fw_cdev_major < 0) {
1222 bus_unregister(&fw_bus_type);
1223 return fw_cdev_major;
1224 }
1225
c490a6de
SR
1226 fw_core_add_address_handler(&topology_map, &topology_map_region);
1227 fw_core_add_address_handler(&registers, &registers_region);
1228 fw_core_add_descriptor(&vendor_id_descriptor);
1229 fw_core_add_descriptor(&model_id_descriptor);
3038e353
KH
1230
1231 return 0;
1232}
1233
1234static void __exit fw_core_cleanup(void)
1235{
a3aca3da 1236 unregister_chrdev(fw_cdev_major, "firewire");
3038e353 1237 bus_unregister(&fw_bus_type);
d6053e08 1238 idr_destroy(&fw_device_idr);
3038e353
KH
1239}
1240
1241module_init(fw_core_init);
1242module_exit(fw_core_cleanup);