]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/firewire/core-transaction.c
firewire: core: remove obsolete comment
[mirror_ubuntu-artful-kernel.git] / drivers / firewire / core-transaction.c
CommitLineData
c781c06d
KH
1/*
2 * Core IEEE1394 transaction logic
3038e353
KH
3 *
4 * Copyright (C) 2004-2006 Kristian Hoegsberg <krh@bitplanet.net>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software Foundation,
18 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
19 */
20
e8ca9702 21#include <linux/bug.h>
2a0a2590 22#include <linux/completion.h>
e8ca9702
SR
23#include <linux/device.h>
24#include <linux/errno.h>
77c9a5da 25#include <linux/firewire.h>
e8ca9702
SR
26#include <linux/firewire-constants.h>
27#include <linux/fs.h>
28#include <linux/init.h>
d6053e08 29#include <linux/idr.h>
e8ca9702 30#include <linux/jiffies.h>
3038e353 31#include <linux/kernel.h>
3038e353 32#include <linux/list.h>
e8ca9702
SR
33#include <linux/module.h>
34#include <linux/slab.h>
35#include <linux/spinlock.h>
36#include <linux/string.h>
37#include <linux/timer.h>
38#include <linux/types.h>
6ea9e7bb 39#include <linux/workqueue.h>
e8ca9702
SR
40
41#include <asm/byteorder.h>
3038e353 42
77c9a5da 43#include "core.h"
3038e353 44
a77754a7
KH
45#define HEADER_PRI(pri) ((pri) << 0)
46#define HEADER_TCODE(tcode) ((tcode) << 4)
47#define HEADER_RETRY(retry) ((retry) << 8)
48#define HEADER_TLABEL(tlabel) ((tlabel) << 10)
49#define HEADER_DESTINATION(destination) ((destination) << 16)
50#define HEADER_SOURCE(source) ((source) << 16)
51#define HEADER_RCODE(rcode) ((rcode) << 12)
52#define HEADER_OFFSET_HIGH(offset_high) ((offset_high) << 0)
53#define HEADER_DATA_LENGTH(length) ((length) << 16)
54#define HEADER_EXTENDED_TCODE(tcode) ((tcode) << 0)
55
56#define HEADER_GET_TCODE(q) (((q) >> 4) & 0x0f)
57#define HEADER_GET_TLABEL(q) (((q) >> 10) & 0x3f)
58#define HEADER_GET_RCODE(q) (((q) >> 12) & 0x0f)
59#define HEADER_GET_DESTINATION(q) (((q) >> 16) & 0xffff)
60#define HEADER_GET_SOURCE(q) (((q) >> 16) & 0xffff)
61#define HEADER_GET_OFFSET_HIGH(q) (((q) >> 0) & 0xffff)
62#define HEADER_GET_DATA_LENGTH(q) (((q) >> 16) & 0xffff)
63#define HEADER_GET_EXTENDED_TCODE(q) (((q) >> 0) & 0xffff)
64
a7ea6782
SR
65#define HEADER_DESTINATION_IS_BROADCAST(q) \
66 (((q) & HEADER_DESTINATION(0x3f)) == HEADER_DESTINATION(0x3f))
67
77c9a5da
SR
68#define PHY_PACKET_CONFIG 0x0
69#define PHY_PACKET_LINK_ON 0x1
70#define PHY_PACKET_SELF_ID 0x2
71
a77754a7
KH
72#define PHY_CONFIG_GAP_COUNT(gap_count) (((gap_count) << 16) | (1 << 22))
73#define PHY_CONFIG_ROOT_ID(node_id) ((((node_id) & 0x3f) << 24) | (1 << 23))
74#define PHY_IDENTIFIER(id) ((id) << 30)
3038e353 75
410cf2bd
CL
76/* returns 0 if the split timeout handler is already running */
77static int try_cancel_split_timeout(struct fw_transaction *t)
78{
79 if (t->is_split_transaction)
80 return del_timer(&t->split_timeout_timer);
81 else
82 return 1;
83}
84
53dca511 85static int close_transaction(struct fw_transaction *transaction,
a38a00fd 86 struct fw_card *card, int rcode)
3038e353 87{
730c32f5 88 struct fw_transaction *t;
3038e353
KH
89 unsigned long flags;
90
91 spin_lock_irqsave(&card->lock, flags);
730c32f5
KH
92 list_for_each_entry(t, &card->transaction_list, link) {
93 if (t == transaction) {
410cf2bd 94 if (!try_cancel_split_timeout(t)) {
2222bcb7
CL
95 spin_unlock_irqrestore(&card->lock, flags);
96 goto timed_out;
97 }
5c40cbfe 98 list_del_init(&t->link);
1e626fdc 99 card->tlabel_mask &= ~(1ULL << t->tlabel);
730c32f5
KH
100 break;
101 }
102 }
3038e353
KH
103 spin_unlock_irqrestore(&card->lock, flags);
104
730c32f5 105 if (&t->link != &card->transaction_list) {
a38a00fd 106 t->callback(card, rcode, NULL, 0, t->callback_data);
730c32f5
KH
107 return 0;
108 }
109
2222bcb7 110 timed_out:
730c32f5 111 return -ENOENT;
3038e353
KH
112}
113
c781c06d
KH
114/*
115 * Only valid for transactions that are potentially pending (ie have
116 * been sent).
117 */
53dca511
SR
118int fw_cancel_transaction(struct fw_card *card,
119 struct fw_transaction *transaction)
730c32f5 120{
c781c06d
KH
121 /*
122 * Cancel the packet transmission if it's still queued. That
730c32f5 123 * will call the packet transmission callback which cancels
c781c06d
KH
124 * the transaction.
125 */
730c32f5
KH
126
127 if (card->driver->cancel_packet(card, &transaction->packet) == 0)
128 return 0;
129
c781c06d
KH
130 /*
131 * If the request packet has already been sent, we need to see
132 * if the transaction is still pending and remove it in that case.
133 */
730c32f5 134
a38a00fd 135 return close_transaction(transaction, card, RCODE_CANCELLED);
730c32f5
KH
136}
137EXPORT_SYMBOL(fw_cancel_transaction);
138
5c40cbfe
CL
139static void split_transaction_timeout_callback(unsigned long data)
140{
141 struct fw_transaction *t = (struct fw_transaction *)data;
142 struct fw_card *card = t->card;
143 unsigned long flags;
144
145 spin_lock_irqsave(&card->lock, flags);
146 if (list_empty(&t->link)) {
147 spin_unlock_irqrestore(&card->lock, flags);
148 return;
149 }
150 list_del(&t->link);
151 card->tlabel_mask &= ~(1ULL << t->tlabel);
152 spin_unlock_irqrestore(&card->lock, flags);
153
5c40cbfe
CL
154 t->callback(card, RCODE_CANCELLED, NULL, 0, t->callback_data);
155}
156
410cf2bd
CL
157static void start_split_transaction_timeout(struct fw_transaction *t,
158 struct fw_card *card)
159{
160 unsigned long flags;
161
162 spin_lock_irqsave(&card->lock, flags);
163
164 if (list_empty(&t->link) || WARN_ON(t->is_split_transaction)) {
165 spin_unlock_irqrestore(&card->lock, flags);
166 return;
167 }
168
169 t->is_split_transaction = true;
170 mod_timer(&t->split_timeout_timer,
171 jiffies + card->split_timeout_jiffies);
172
173 spin_unlock_irqrestore(&card->lock, flags);
174}
175
53dca511
SR
176static void transmit_complete_callback(struct fw_packet *packet,
177 struct fw_card *card, int status)
3038e353
KH
178{
179 struct fw_transaction *t =
180 container_of(packet, struct fw_transaction, packet);
181
182 switch (status) {
183 case ACK_COMPLETE:
a38a00fd 184 close_transaction(t, card, RCODE_COMPLETE);
3038e353
KH
185 break;
186 case ACK_PENDING:
410cf2bd 187 start_split_transaction_timeout(t, card);
3038e353
KH
188 break;
189 case ACK_BUSY_X:
190 case ACK_BUSY_A:
191 case ACK_BUSY_B:
a38a00fd 192 close_transaction(t, card, RCODE_BUSY);
3038e353
KH
193 break;
194 case ACK_DATA_ERROR:
a38a00fd 195 close_transaction(t, card, RCODE_DATA_ERROR);
e5f49c3b 196 break;
3038e353 197 case ACK_TYPE_ERROR:
a38a00fd 198 close_transaction(t, card, RCODE_TYPE_ERROR);
3038e353
KH
199 break;
200 default:
c781c06d
KH
201 /*
202 * In this case the ack is really a juju specific
203 * rcode, so just forward that to the callback.
204 */
a38a00fd 205 close_transaction(t, card, status);
3038e353
KH
206 break;
207 }
208}
209
53dca511 210static void fw_fill_request(struct fw_packet *packet, int tcode, int tlabel,
b9549bc6 211 int destination_id, int source_id, int generation, int speed,
36bfe49d 212 unsigned long long offset, void *payload, size_t length)
3038e353
KH
213{
214 int ext_tcode;
215
18e9b10f
SR
216 if (tcode == TCODE_STREAM_DATA) {
217 packet->header[0] =
218 HEADER_DATA_LENGTH(length) |
219 destination_id |
220 HEADER_TCODE(TCODE_STREAM_DATA);
221 packet->header_length = 4;
222 packet->payload = payload;
223 packet->payload_length = length;
224
225 goto common;
226 }
227
3038e353 228 if (tcode > 0x10) {
8f9f963e 229 ext_tcode = tcode & ~0x10;
3038e353
KH
230 tcode = TCODE_LOCK_REQUEST;
231 } else
232 ext_tcode = 0;
233
234 packet->header[0] =
a77754a7
KH
235 HEADER_RETRY(RETRY_X) |
236 HEADER_TLABEL(tlabel) |
237 HEADER_TCODE(tcode) |
b9549bc6 238 HEADER_DESTINATION(destination_id);
3038e353 239 packet->header[1] =
a77754a7 240 HEADER_OFFSET_HIGH(offset >> 32) | HEADER_SOURCE(source_id);
3038e353
KH
241 packet->header[2] =
242 offset;
243
244 switch (tcode) {
245 case TCODE_WRITE_QUADLET_REQUEST:
246 packet->header[3] = *(u32 *)payload;
247 packet->header_length = 16;
248 packet->payload_length = 0;
249 break;
250
251 case TCODE_LOCK_REQUEST:
252 case TCODE_WRITE_BLOCK_REQUEST:
253 packet->header[3] =
a77754a7
KH
254 HEADER_DATA_LENGTH(length) |
255 HEADER_EXTENDED_TCODE(ext_tcode);
3038e353
KH
256 packet->header_length = 16;
257 packet->payload = payload;
258 packet->payload_length = length;
259 break;
260
261 case TCODE_READ_QUADLET_REQUEST:
262 packet->header_length = 12;
263 packet->payload_length = 0;
264 break;
265
266 case TCODE_READ_BLOCK_REQUEST:
267 packet->header[3] =
a77754a7
KH
268 HEADER_DATA_LENGTH(length) |
269 HEADER_EXTENDED_TCODE(ext_tcode);
3038e353
KH
270 packet->header_length = 16;
271 packet->payload_length = 0;
272 break;
5b189bf3
SR
273
274 default:
5878730b 275 WARN(1, "wrong tcode %d\n", tcode);
3038e353 276 }
18e9b10f 277 common:
3038e353
KH
278 packet->speed = speed;
279 packet->generation = generation;
730c32f5 280 packet->ack = 0;
19593ffd 281 packet->payload_mapped = false;
3038e353
KH
282}
283
7906054f
CL
284static int allocate_tlabel(struct fw_card *card)
285{
286 int tlabel;
287
288 tlabel = card->current_tlabel;
289 while (card->tlabel_mask & (1ULL << tlabel)) {
290 tlabel = (tlabel + 1) & 0x3f;
291 if (tlabel == card->current_tlabel)
292 return -EBUSY;
293 }
294
295 card->current_tlabel = (tlabel + 1) & 0x3f;
296 card->tlabel_mask |= 1ULL << tlabel;
297
298 return tlabel;
299}
300
3038e353 301/**
656b7afd
SR
302 * fw_send_request() - submit a request packet for transmission
303 * @card: interface to send the request at
304 * @t: transaction instance to which the request belongs
305 * @tcode: transaction code
306 * @destination_id: destination node ID, consisting of bus_ID and phy_ID
307 * @generation: bus generation in which request and response are valid
308 * @speed: transmission speed
309 * @offset: 48bit wide offset into destination's address space
310 * @payload: data payload for the request subaction
311 * @length: length of the payload, in bytes
312 * @callback: function to be called when the transaction is completed
313 * @callback_data: data to be passed to the transaction completion callback
3038e353 314 *
656b7afd
SR
315 * Submit a request packet into the asynchronous request transmission queue.
316 * Can be called from atomic context. If you prefer a blocking API, use
317 * fw_run_transaction() in a context that can sleep.
3038e353 318 *
656b7afd
SR
319 * In case of lock requests, specify one of the firewire-core specific %TCODE_
320 * constants instead of %TCODE_LOCK_REQUEST in @tcode.
3038e353 321 *
656b7afd
SR
322 * Make sure that the value in @destination_id is not older than the one in
323 * @generation. Otherwise the request is in danger to be sent to a wrong node.
3038e353 324 *
656b7afd 325 * In case of asynchronous stream packets i.e. %TCODE_STREAM_DATA, the caller
18e9b10f 326 * needs to synthesize @destination_id with fw_stream_packet_destination_id().
656b7afd
SR
327 * It will contain tag, channel, and sy data instead of a node ID then.
328 *
329 * The payload buffer at @data is going to be DMA-mapped except in case of
f30e6d3e
SR
330 * @length <= 8 or of local (loopback) requests. Hence make sure that the
331 * buffer complies with the restrictions of the streaming DMA mapping API.
656b7afd
SR
332 * @payload must not be freed before the @callback is called.
333 *
334 * In case of request types without payload, @data is NULL and @length is 0.
335 *
336 * After the transaction is completed successfully or unsuccessfully, the
337 * @callback will be called. Among its parameters is the response code which
338 * is either one of the rcodes per IEEE 1394 or, in case of internal errors,
18d0cdfd
SR
339 * the firewire-core specific %RCODE_SEND_ERROR. The other firewire-core
340 * specific rcodes (%RCODE_CANCELLED, %RCODE_BUSY, %RCODE_GENERATION,
341 * %RCODE_NO_ACK) denote transaction timeout, busy responder, stale request
342 * generation, or missing ACK respectively.
656b7afd
SR
343 *
344 * Note some timing corner cases: fw_send_request() may complete much earlier
345 * than when the request packet actually hits the wire. On the other hand,
346 * transaction completion and hence execution of @callback may happen even
347 * before fw_send_request() returns.
3038e353 348 */
53dca511
SR
349void fw_send_request(struct fw_card *card, struct fw_transaction *t, int tcode,
350 int destination_id, int generation, int speed,
351 unsigned long long offset, void *payload, size_t length,
352 fw_transaction_callback_t callback, void *callback_data)
3038e353
KH
353{
354 unsigned long flags;
b9549bc6 355 int tlabel;
3038e353 356
c781c06d
KH
357 /*
358 * Allocate tlabel from the bitmap and put the transaction on
359 * the list while holding the card spinlock.
360 */
3038e353
KH
361
362 spin_lock_irqsave(&card->lock, flags);
363
7906054f
CL
364 tlabel = allocate_tlabel(card);
365 if (tlabel < 0) {
3038e353
KH
366 spin_unlock_irqrestore(&card->lock, flags);
367 callback(card, RCODE_SEND_ERROR, NULL, 0, callback_data);
368 return;
369 }
370
1e119fa9 371 t->node_id = destination_id;
3038e353 372 t->tlabel = tlabel;
5c40cbfe 373 t->card = card;
410cf2bd 374 t->is_split_transaction = false;
5c40cbfe
CL
375 setup_timer(&t->split_timeout_timer,
376 split_transaction_timeout_callback, (unsigned long)t);
3038e353
KH
377 t->callback = callback;
378 t->callback_data = callback_data;
379
1e119fa9
JF
380 fw_fill_request(&t->packet, tcode, t->tlabel,
381 destination_id, card->node_id, generation,
382 speed, offset, payload, length);
3038e353
KH
383 t->packet.callback = transmit_complete_callback;
384
e9aeb46c
SR
385 list_add_tail(&t->link, &card->transaction_list);
386
387 spin_unlock_irqrestore(&card->lock, flags);
388
3038e353
KH
389 card->driver->send_request(card, &t->packet);
390}
391EXPORT_SYMBOL(fw_send_request);
392
1e119fa9
JF
393struct transaction_callback_data {
394 struct completion done;
395 void *payload;
396 int rcode;
397};
398
399static void transaction_callback(struct fw_card *card, int rcode,
400 void *payload, size_t length, void *data)
401{
402 struct transaction_callback_data *d = data;
403
404 if (rcode == RCODE_COMPLETE)
405 memcpy(d->payload, payload, length);
406 d->rcode = rcode;
407 complete(&d->done);
408}
409
410/**
656b7afd 411 * fw_run_transaction() - send request and sleep until transaction is completed
1e119fa9 412 *
656b7afd
SR
413 * Returns the RCODE. See fw_send_request() for parameter documentation.
414 * Unlike fw_send_request(), @data points to the payload of the request or/and
f30e6d3e
SR
415 * to the payload of the response. DMA mapping restrictions apply to outbound
416 * request payloads of >= 8 bytes but not to inbound response payloads.
1e119fa9
JF
417 */
418int fw_run_transaction(struct fw_card *card, int tcode, int destination_id,
53dca511 419 int generation, int speed, unsigned long long offset,
ba27e1f7 420 void *payload, size_t length)
1e119fa9
JF
421{
422 struct transaction_callback_data d;
423 struct fw_transaction t;
424
5c40cbfe 425 init_timer_on_stack(&t.split_timeout_timer);
1e119fa9 426 init_completion(&d.done);
ba27e1f7 427 d.payload = payload;
1e119fa9 428 fw_send_request(card, &t, tcode, destination_id, generation, speed,
ba27e1f7 429 offset, payload, length, transaction_callback, &d);
1e119fa9 430 wait_for_completion(&d.done);
5c40cbfe 431 destroy_timer_on_stack(&t.split_timeout_timer);
1e119fa9
JF
432
433 return d.rcode;
434}
435EXPORT_SYMBOL(fw_run_transaction);
436
c0220d68
SR
437static DEFINE_MUTEX(phy_config_mutex);
438static DECLARE_COMPLETION(phy_config_done);
ae1e5355
SR
439
440static void transmit_phy_packet_callback(struct fw_packet *packet,
441 struct fw_card *card, int status)
3038e353 442{
c0220d68 443 complete(&phy_config_done);
3038e353
KH
444}
445
c0220d68 446static struct fw_packet phy_config_packet = {
5b06db16
CL
447 .header_length = 12,
448 .header[0] = TCODE_LINK_INTERNAL << 4,
c0220d68
SR
449 .payload_length = 0,
450 .speed = SCODE_100,
451 .callback = transmit_phy_packet_callback,
452};
453
83db801c
KH
454void fw_send_phy_config(struct fw_card *card,
455 int node_id, int generation, int gap_count)
3038e353 456{
ae1e5355 457 long timeout = DIV_ROUND_UP(HZ, 10);
02d37bed
SR
458 u32 data = PHY_IDENTIFIER(PHY_PACKET_CONFIG);
459
460 if (node_id != FW_PHY_CONFIG_NO_NODE_ID)
461 data |= PHY_CONFIG_ROOT_ID(node_id);
462
463 if (gap_count == FW_PHY_CONFIG_CURRENT_GAP_COUNT) {
464 gap_count = card->driver->read_phy_reg(card, 1);
465 if (gap_count < 0)
466 return;
467
468 gap_count &= 63;
469 if (gap_count == 63)
470 return;
471 }
472 data |= PHY_CONFIG_GAP_COUNT(gap_count);
2a0a2590 473
c0220d68
SR
474 mutex_lock(&phy_config_mutex);
475
5b06db16
CL
476 phy_config_packet.header[1] = data;
477 phy_config_packet.header[2] = ~data;
c0220d68
SR
478 phy_config_packet.generation = generation;
479 INIT_COMPLETION(phy_config_done);
480
481 card->driver->send_request(card, &phy_config_packet);
482 wait_for_completion_timeout(&phy_config_done, timeout);
ae1e5355 483
c0220d68 484 mutex_unlock(&phy_config_mutex);
3038e353
KH
485}
486
53dca511
SR
487static struct fw_address_handler *lookup_overlapping_address_handler(
488 struct list_head *list, unsigned long long offset, size_t length)
3038e353
KH
489{
490 struct fw_address_handler *handler;
491
492 list_for_each_entry(handler, list, link) {
493 if (handler->offset < offset + length &&
494 offset < handler->offset + handler->length)
495 return handler;
496 }
497
498 return NULL;
499}
500
db5d247a
CL
501static bool is_enclosing_handler(struct fw_address_handler *handler,
502 unsigned long long offset, size_t length)
503{
504 return handler->offset <= offset &&
505 offset + length <= handler->offset + handler->length;
506}
507
53dca511
SR
508static struct fw_address_handler *lookup_enclosing_address_handler(
509 struct list_head *list, unsigned long long offset, size_t length)
3038e353
KH
510{
511 struct fw_address_handler *handler;
512
513 list_for_each_entry(handler, list, link) {
db5d247a 514 if (is_enclosing_handler(handler, offset, length))
3038e353
KH
515 return handler;
516 }
517
518 return NULL;
519}
520
521static DEFINE_SPINLOCK(address_handler_lock);
522static LIST_HEAD(address_handler_list);
523
21ebcd12 524const struct fw_address_region fw_high_memory_region =
5af4e5ea 525 { .start = 0x000100000000ULL, .end = 0xffffe0000000ULL, };
db8be076
AB
526EXPORT_SYMBOL(fw_high_memory_region);
527
528#if 0
529const struct fw_address_region fw_low_memory_region =
530 { .start = 0x000000000000ULL, .end = 0x000100000000ULL, };
21ebcd12 531const struct fw_address_region fw_private_region =
5af4e5ea 532 { .start = 0xffffe0000000ULL, .end = 0xfffff0000000ULL, };
21ebcd12 533const struct fw_address_region fw_csr_region =
cca60977
JW
534 { .start = CSR_REGISTER_BASE,
535 .end = CSR_REGISTER_BASE | CSR_CONFIG_ROM_END, };
21ebcd12 536const struct fw_address_region fw_unit_space_region =
5af4e5ea 537 { .start = 0xfffff0000900ULL, .end = 0x1000000000000ULL, };
db8be076 538#endif /* 0 */
3038e353 539
db5d247a
CL
540static bool is_in_fcp_region(u64 offset, size_t length)
541{
542 return offset >= (CSR_REGISTER_BASE | CSR_FCP_COMMAND) &&
543 offset + length <= (CSR_REGISTER_BASE | CSR_FCP_END);
544}
545
3038e353 546/**
656b7afd
SR
547 * fw_core_add_address_handler() - register for incoming requests
548 * @handler: callback
549 * @region: region in the IEEE 1212 node space address range
3e0b5f0d
SR
550 *
551 * region->start, ->end, and handler->length have to be quadlet-aligned.
552 *
553 * When a request is received that falls within the specified address range,
554 * the specified callback is invoked. The parameters passed to the callback
555 * give the details of the particular request.
1415d918
SR
556 *
557 * Return value: 0 on success, non-zero otherwise.
db5d247a 558 *
1415d918
SR
559 * The start offset of the handler's address region is determined by
560 * fw_core_add_address_handler() and is returned in handler->offset.
db5d247a
CL
561 *
562 * Address allocations are exclusive, except for the FCP registers.
3038e353 563 */
53dca511
SR
564int fw_core_add_address_handler(struct fw_address_handler *handler,
565 const struct fw_address_region *region)
3038e353
KH
566{
567 struct fw_address_handler *other;
568 unsigned long flags;
569 int ret = -EBUSY;
570
3e0b5f0d 571 if (region->start & 0xffff000000000003ULL ||
3e0b5f0d 572 region->start >= region->end ||
0c9ae701 573 region->end > 0x0001000000000000ULL ||
3e0b5f0d
SR
574 handler->length & 3 ||
575 handler->length == 0)
576 return -EINVAL;
577
3038e353
KH
578 spin_lock_irqsave(&address_handler_lock, flags);
579
3e0b5f0d 580 handler->offset = region->start;
3038e353 581 while (handler->offset + handler->length <= region->end) {
db5d247a
CL
582 if (is_in_fcp_region(handler->offset, handler->length))
583 other = NULL;
584 else
585 other = lookup_overlapping_address_handler
586 (&address_handler_list,
587 handler->offset, handler->length);
3038e353 588 if (other != NULL) {
3e0b5f0d 589 handler->offset += other->length;
3038e353
KH
590 } else {
591 list_add_tail(&handler->link, &address_handler_list);
592 ret = 0;
593 break;
594 }
595 }
596
597 spin_unlock_irqrestore(&address_handler_lock, flags);
598
599 return ret;
600}
3038e353
KH
601EXPORT_SYMBOL(fw_core_add_address_handler);
602
603/**
656b7afd 604 * fw_core_remove_address_handler() - unregister an address handler
3038e353 605 */
3038e353
KH
606void fw_core_remove_address_handler(struct fw_address_handler *handler)
607{
608 unsigned long flags;
609
610 spin_lock_irqsave(&address_handler_lock, flags);
611 list_del(&handler->link);
612 spin_unlock_irqrestore(&address_handler_lock, flags);
613}
3038e353
KH
614EXPORT_SYMBOL(fw_core_remove_address_handler);
615
616struct fw_request {
617 struct fw_packet response;
36bfe49d 618 u32 request_header[4];
3038e353
KH
619 int ack;
620 u32 length;
621 u32 data[0];
622};
623
53dca511
SR
624static void free_response_callback(struct fw_packet *packet,
625 struct fw_card *card, int status)
3038e353
KH
626{
627 struct fw_request *request;
628
629 request = container_of(packet, struct fw_request, response);
630 kfree(request);
631}
632
a10c0ce7
CL
633int fw_get_response_length(struct fw_request *r)
634{
635 int tcode, ext_tcode, data_length;
636
637 tcode = HEADER_GET_TCODE(r->request_header[0]);
638
639 switch (tcode) {
640 case TCODE_WRITE_QUADLET_REQUEST:
641 case TCODE_WRITE_BLOCK_REQUEST:
642 return 0;
643
644 case TCODE_READ_QUADLET_REQUEST:
645 return 4;
646
647 case TCODE_READ_BLOCK_REQUEST:
648 data_length = HEADER_GET_DATA_LENGTH(r->request_header[3]);
649 return data_length;
650
651 case TCODE_LOCK_REQUEST:
652 ext_tcode = HEADER_GET_EXTENDED_TCODE(r->request_header[3]);
653 data_length = HEADER_GET_DATA_LENGTH(r->request_header[3]);
654 switch (ext_tcode) {
655 case EXTCODE_FETCH_ADD:
656 case EXTCODE_LITTLE_ADD:
657 return data_length;
658 default:
659 return data_length / 2;
660 }
661
662 default:
5878730b 663 WARN(1, "wrong tcode %d\n", tcode);
a10c0ce7
CL
664 return 0;
665 }
666}
667
53dca511
SR
668void fw_fill_response(struct fw_packet *response, u32 *request_header,
669 int rcode, void *payload, size_t length)
3038e353
KH
670{
671 int tcode, tlabel, extended_tcode, source, destination;
672
a77754a7
KH
673 tcode = HEADER_GET_TCODE(request_header[0]);
674 tlabel = HEADER_GET_TLABEL(request_header[0]);
675 source = HEADER_GET_DESTINATION(request_header[0]);
676 destination = HEADER_GET_SOURCE(request_header[1]);
677 extended_tcode = HEADER_GET_EXTENDED_TCODE(request_header[3]);
3038e353
KH
678
679 response->header[0] =
a77754a7
KH
680 HEADER_RETRY(RETRY_1) |
681 HEADER_TLABEL(tlabel) |
682 HEADER_DESTINATION(destination);
36bfe49d 683 response->header[1] =
a77754a7
KH
684 HEADER_SOURCE(source) |
685 HEADER_RCODE(rcode);
3038e353
KH
686 response->header[2] = 0;
687
688 switch (tcode) {
689 case TCODE_WRITE_QUADLET_REQUEST:
690 case TCODE_WRITE_BLOCK_REQUEST:
a77754a7 691 response->header[0] |= HEADER_TCODE(TCODE_WRITE_RESPONSE);
3038e353
KH
692 response->header_length = 12;
693 response->payload_length = 0;
694 break;
695
696 case TCODE_READ_QUADLET_REQUEST:
697 response->header[0] |=
a77754a7 698 HEADER_TCODE(TCODE_READ_QUADLET_RESPONSE);
93c4cceb
KH
699 if (payload != NULL)
700 response->header[3] = *(u32 *)payload;
701 else
702 response->header[3] = 0;
3038e353
KH
703 response->header_length = 16;
704 response->payload_length = 0;
705 break;
706
707 case TCODE_READ_BLOCK_REQUEST:
708 case TCODE_LOCK_REQUEST:
a77754a7 709 response->header[0] |= HEADER_TCODE(tcode + 2);
3038e353 710 response->header[3] =
a77754a7
KH
711 HEADER_DATA_LENGTH(length) |
712 HEADER_EXTENDED_TCODE(extended_tcode);
3038e353 713 response->header_length = 16;
36bfe49d
KH
714 response->payload = payload;
715 response->payload_length = length;
3038e353
KH
716 break;
717
718 default:
5878730b 719 WARN(1, "wrong tcode %d\n", tcode);
3038e353 720 }
1d1dc5e8 721
19593ffd 722 response->payload_mapped = false;
3038e353 723}
93c4cceb 724EXPORT_SYMBOL(fw_fill_response);
3038e353 725
8e4b50f9
CL
726static u32 compute_split_timeout_timestamp(struct fw_card *card,
727 u32 request_timestamp)
728{
729 unsigned int cycles;
730 u32 timestamp;
731
732 cycles = card->split_timeout_cycles;
733 cycles += request_timestamp & 0x1fff;
734
735 timestamp = request_timestamp & ~0x1fff;
736 timestamp += (cycles / 8000) << 13;
737 timestamp |= cycles % 8000;
738
739 return timestamp;
740}
741
742static struct fw_request *allocate_request(struct fw_card *card,
743 struct fw_packet *p)
3038e353
KH
744{
745 struct fw_request *request;
746 u32 *data, length;
8e4b50f9 747 int request_tcode;
3038e353 748
a77754a7 749 request_tcode = HEADER_GET_TCODE(p->header[0]);
3038e353
KH
750 switch (request_tcode) {
751 case TCODE_WRITE_QUADLET_REQUEST:
2639a6fb 752 data = &p->header[3];
3038e353
KH
753 length = 4;
754 break;
755
756 case TCODE_WRITE_BLOCK_REQUEST:
757 case TCODE_LOCK_REQUEST:
2639a6fb 758 data = p->payload;
a77754a7 759 length = HEADER_GET_DATA_LENGTH(p->header[3]);
3038e353
KH
760 break;
761
762 case TCODE_READ_QUADLET_REQUEST:
763 data = NULL;
764 length = 4;
765 break;
766
767 case TCODE_READ_BLOCK_REQUEST:
768 data = NULL;
a77754a7 769 length = HEADER_GET_DATA_LENGTH(p->header[3]);
3038e353
KH
770 break;
771
772 default:
26b4950d 773 fw_notice(card, "ERROR - corrupt request received - %08x %08x %08x\n",
0bf607c5 774 p->header[0], p->header[1], p->header[2]);
3038e353
KH
775 return NULL;
776 }
777
2d826cc5 778 request = kmalloc(sizeof(*request) + length, GFP_ATOMIC);
3038e353
KH
779 if (request == NULL)
780 return NULL;
781
2639a6fb 782 request->response.speed = p->speed;
8e4b50f9
CL
783 request->response.timestamp =
784 compute_split_timeout_timestamp(card, p->timestamp);
2639a6fb 785 request->response.generation = p->generation;
730c32f5 786 request->response.ack = 0;
3038e353 787 request->response.callback = free_response_callback;
2639a6fb 788 request->ack = p->ack;
93c4cceb 789 request->length = length;
3038e353 790 if (data)
6e2e8424 791 memcpy(request->data, data, length);
3038e353 792
2d826cc5 793 memcpy(request->request_header, p->header, sizeof(p->header));
3038e353
KH
794
795 return request;
796}
797
53dca511
SR
798void fw_send_response(struct fw_card *card,
799 struct fw_request *request, int rcode)
3038e353 800{
db5d247a
CL
801 if (WARN_ONCE(!request, "invalid for FCP address handlers"))
802 return;
803
a7ea6782
SR
804 /* unified transaction or broadcast transaction: don't respond */
805 if (request->ack != ACK_PENDING ||
806 HEADER_DESTINATION_IS_BROADCAST(request->request_header[0])) {
9c9bdf4d 807 kfree(request);
3038e353 808 return;
9c9bdf4d 809 }
3038e353 810
36bfe49d
KH
811 if (rcode == RCODE_COMPLETE)
812 fw_fill_response(&request->response, request->request_header,
a10c0ce7
CL
813 rcode, request->data,
814 fw_get_response_length(request));
36bfe49d
KH
815 else
816 fw_fill_response(&request->response, request->request_header,
817 rcode, NULL, 0);
3038e353
KH
818
819 card->driver->send_response(card, &request->response);
820}
3038e353
KH
821EXPORT_SYMBOL(fw_send_response);
822
db5d247a
CL
823static void handle_exclusive_region_request(struct fw_card *card,
824 struct fw_packet *p,
825 struct fw_request *request,
826 unsigned long long offset)
3038e353
KH
827{
828 struct fw_address_handler *handler;
3038e353 829 unsigned long flags;
2639a6fb 830 int tcode, destination, source;
3038e353 831
a77754a7 832 destination = HEADER_GET_DESTINATION(p->header[0]);
478b233e 833 source = HEADER_GET_SOURCE(p->header[1]);
c82f91f2
JF
834 tcode = HEADER_GET_TCODE(p->header[0]);
835 if (tcode == TCODE_LOCK_REQUEST)
836 tcode = 0x10 + HEADER_GET_EXTENDED_TCODE(p->header[3]);
3038e353
KH
837
838 spin_lock_irqsave(&address_handler_lock, flags);
839 handler = lookup_enclosing_address_handler(&address_handler_list,
840 offset, request->length);
841 spin_unlock_irqrestore(&address_handler_lock, flags);
842
3038e353
KH
843 if (handler == NULL)
844 fw_send_response(card, request, RCODE_ADDRESS_ERROR);
845 else
846 handler->address_callback(card, request,
847 tcode, destination, source,
33e553fe 848 p->generation, offset,
3038e353
KH
849 request->data, request->length,
850 handler->callback_data);
851}
db5d247a
CL
852
853static void handle_fcp_region_request(struct fw_card *card,
854 struct fw_packet *p,
855 struct fw_request *request,
856 unsigned long long offset)
857{
858 struct fw_address_handler *handler;
859 unsigned long flags;
860 int tcode, destination, source;
861
862 if ((offset != (CSR_REGISTER_BASE | CSR_FCP_COMMAND) &&
863 offset != (CSR_REGISTER_BASE | CSR_FCP_RESPONSE)) ||
864 request->length > 0x200) {
865 fw_send_response(card, request, RCODE_ADDRESS_ERROR);
866
867 return;
868 }
869
870 tcode = HEADER_GET_TCODE(p->header[0]);
871 destination = HEADER_GET_DESTINATION(p->header[0]);
872 source = HEADER_GET_SOURCE(p->header[1]);
873
874 if (tcode != TCODE_WRITE_QUADLET_REQUEST &&
875 tcode != TCODE_WRITE_BLOCK_REQUEST) {
876 fw_send_response(card, request, RCODE_TYPE_ERROR);
877
878 return;
879 }
880
881 spin_lock_irqsave(&address_handler_lock, flags);
882 list_for_each_entry(handler, &address_handler_list, link) {
883 if (is_enclosing_handler(handler, offset, request->length))
884 handler->address_callback(card, NULL, tcode,
885 destination, source,
33e553fe
SR
886 p->generation, offset,
887 request->data,
db5d247a
CL
888 request->length,
889 handler->callback_data);
890 }
891 spin_unlock_irqrestore(&address_handler_lock, flags);
892
893 fw_send_response(card, request, RCODE_COMPLETE);
894}
895
896void fw_core_handle_request(struct fw_card *card, struct fw_packet *p)
897{
898 struct fw_request *request;
899 unsigned long long offset;
900
901 if (p->ack != ACK_PENDING && p->ack != ACK_COMPLETE)
902 return;
903
bf54e146
SR
904 if (TCODE_IS_LINK_INTERNAL(HEADER_GET_TCODE(p->header[0]))) {
905 fw_cdev_handle_phy_packet(card, p);
906 return;
907 }
908
8e4b50f9 909 request = allocate_request(card, p);
db5d247a
CL
910 if (request == NULL) {
911 /* FIXME: send statically allocated busy packet. */
912 return;
913 }
914
915 offset = ((u64)HEADER_GET_OFFSET_HIGH(p->header[1]) << 32) |
916 p->header[2];
917
918 if (!is_in_fcp_region(offset, request->length))
919 handle_exclusive_region_request(card, p, request, offset);
920 else
921 handle_fcp_region_request(card, p, request, offset);
922
923}
3038e353
KH
924EXPORT_SYMBOL(fw_core_handle_request);
925
53dca511 926void fw_core_handle_response(struct fw_card *card, struct fw_packet *p)
3038e353
KH
927{
928 struct fw_transaction *t;
929 unsigned long flags;
930 u32 *data;
931 size_t data_length;
ae86e81e 932 int tcode, tlabel, source, rcode;
3038e353 933
ae86e81e
SR
934 tcode = HEADER_GET_TCODE(p->header[0]);
935 tlabel = HEADER_GET_TLABEL(p->header[0]);
936 source = HEADER_GET_SOURCE(p->header[1]);
937 rcode = HEADER_GET_RCODE(p->header[1]);
3038e353
KH
938
939 spin_lock_irqsave(&card->lock, flags);
940 list_for_each_entry(t, &card->transaction_list, link) {
941 if (t->node_id == source && t->tlabel == tlabel) {
410cf2bd 942 if (!try_cancel_split_timeout(t)) {
2222bcb7
CL
943 spin_unlock_irqrestore(&card->lock, flags);
944 goto timed_out;
945 }
5c40cbfe 946 list_del_init(&t->link);
753a8970 947 card->tlabel_mask &= ~(1ULL << t->tlabel);
3038e353
KH
948 break;
949 }
950 }
951 spin_unlock_irqrestore(&card->lock, flags);
952
953 if (&t->link == &card->transaction_list) {
2222bcb7 954 timed_out:
26b4950d 955 fw_notice(card, "unsolicited response (source %x, tlabel %x)\n",
32b46093 956 source, tlabel);
3038e353
KH
957 return;
958 }
959
c781c06d
KH
960 /*
961 * FIXME: sanity check packet, is length correct, does tcodes
962 * and addresses match.
963 */
3038e353
KH
964
965 switch (tcode) {
966 case TCODE_READ_QUADLET_RESPONSE:
2639a6fb 967 data = (u32 *) &p->header[3];
3038e353
KH
968 data_length = 4;
969 break;
970
971 case TCODE_WRITE_RESPONSE:
972 data = NULL;
973 data_length = 0;
974 break;
975
976 case TCODE_READ_BLOCK_RESPONSE:
977 case TCODE_LOCK_RESPONSE:
93c4cceb 978 data = p->payload;
a77754a7 979 data_length = HEADER_GET_DATA_LENGTH(p->header[3]);
3038e353
KH
980 break;
981
982 default:
983 /* Should never happen, this is just to shut up gcc. */
984 data = NULL;
985 data_length = 0;
986 break;
987 }
988
10a4c735
SR
989 /*
990 * The response handler may be executed while the request handler
991 * is still pending. Cancel the request handler.
992 */
993 card->driver->cancel_packet(card, &t->packet);
994
3038e353
KH
995 t->callback(card, rcode, data, data_length, t->callback_data);
996}
3038e353
KH
997EXPORT_SYMBOL(fw_core_handle_response);
998
ae57988f 999static const struct fw_address_region topology_map_region =
cca60977
JW
1000 { .start = CSR_REGISTER_BASE | CSR_TOPOLOGY_MAP,
1001 .end = CSR_REGISTER_BASE | CSR_TOPOLOGY_MAP_END, };
473d28c7 1002
53dca511
SR
1003static void handle_topology_map(struct fw_card *card, struct fw_request *request,
1004 int tcode, int destination, int source, int generation,
33e553fe
SR
1005 unsigned long long offset, void *payload, size_t length,
1006 void *callback_data)
473d28c7 1007{
cb7c96da 1008 int start;
473d28c7
KH
1009
1010 if (!TCODE_IS_READ_REQUEST(tcode)) {
1011 fw_send_response(card, request, RCODE_TYPE_ERROR);
1012 return;
1013 }
1014
1015 if ((offset & 3) > 0 || (length & 3) > 0) {
1016 fw_send_response(card, request, RCODE_ADDRESS_ERROR);
1017 return;
1018 }
1019
1020 start = (offset - topology_map_region.start) / 4;
cb7c96da 1021 memcpy(payload, &card->topology_map[start], length);
473d28c7
KH
1022
1023 fw_send_response(card, request, RCODE_COMPLETE);
1024}
1025
1026static struct fw_address_handler topology_map = {
85cb9b68 1027 .length = 0x400,
473d28c7
KH
1028 .address_callback = handle_topology_map,
1029};
1030
ae57988f 1031static const struct fw_address_region registers_region =
cca60977
JW
1032 { .start = CSR_REGISTER_BASE,
1033 .end = CSR_REGISTER_BASE | CSR_CONFIG_ROM, };
d60d7f1d 1034
8e4b50f9
CL
1035static void update_split_timeout(struct fw_card *card)
1036{
1037 unsigned int cycles;
1038
1039 cycles = card->split_timeout_hi * 8000 + (card->split_timeout_lo >> 19);
1040
4ec4a67a
SR
1041 /* minimum per IEEE 1394, maximum which doesn't overflow OHCI */
1042 cycles = clamp(cycles, 800u, 3u * 8000u);
8e4b50f9
CL
1043
1044 card->split_timeout_cycles = cycles;
1045 card->split_timeout_jiffies = DIV_ROUND_UP(cycles * HZ, 8000);
1046}
1047
53dca511
SR
1048static void handle_registers(struct fw_card *card, struct fw_request *request,
1049 int tcode, int destination, int source, int generation,
33e553fe
SR
1050 unsigned long long offset, void *payload, size_t length,
1051 void *callback_data)
d60d7f1d 1052{
15f0d833 1053 int reg = offset & ~CSR_REGISTER_BASE;
d60d7f1d 1054 __be32 *data = payload;
e534fe16 1055 int rcode = RCODE_COMPLETE;
8e4b50f9 1056 unsigned long flags;
d60d7f1d
KH
1057
1058 switch (reg) {
b384cf18
SR
1059 case CSR_PRIORITY_BUDGET:
1060 if (!card->priority_budget_implemented) {
1061 rcode = RCODE_ADDRESS_ERROR;
1062 break;
1063 }
1064 /* else fall through */
3e07ec0e 1065
506f1a31 1066 case CSR_NODE_IDS:
65b2742a
SR
1067 /*
1068 * per IEEE 1394-2008 8.3.22.3, not IEEE 1394.1-2004 3.2.8
1069 * and 9.6, but interoperable with IEEE 1394.1-2004 bridges
1070 */
b384cf18
SR
1071 /* fall through */
1072
1073 case CSR_STATE_CLEAR:
1074 case CSR_STATE_SET:
1075 case CSR_CYCLE_TIME:
1076 case CSR_BUS_TIME:
1077 case CSR_BUSY_TIMEOUT:
506f1a31 1078 if (tcode == TCODE_READ_QUADLET_REQUEST)
0fcff4e3 1079 *data = cpu_to_be32(card->driver->read_csr(card, reg));
506f1a31 1080 else if (tcode == TCODE_WRITE_QUADLET_REQUEST)
0fcff4e3 1081 card->driver->write_csr(card, reg, be32_to_cpu(*data));
506f1a31
CL
1082 else
1083 rcode = RCODE_TYPE_ERROR;
1084 break;
1085
446eba0d 1086 case CSR_RESET_START:
7e0e314f 1087 if (tcode == TCODE_WRITE_QUADLET_REQUEST)
0fcff4e3
SR
1088 card->driver->write_csr(card, CSR_STATE_CLEAR,
1089 CSR_STATE_BIT_ABDICATE);
7e0e314f 1090 else
446eba0d
CL
1091 rcode = RCODE_TYPE_ERROR;
1092 break;
1093
8e4b50f9
CL
1094 case CSR_SPLIT_TIMEOUT_HI:
1095 if (tcode == TCODE_READ_QUADLET_REQUEST) {
1096 *data = cpu_to_be32(card->split_timeout_hi);
1097 } else if (tcode == TCODE_WRITE_QUADLET_REQUEST) {
1098 spin_lock_irqsave(&card->lock, flags);
1099 card->split_timeout_hi = be32_to_cpu(*data) & 7;
1100 update_split_timeout(card);
1101 spin_unlock_irqrestore(&card->lock, flags);
1102 } else {
1103 rcode = RCODE_TYPE_ERROR;
1104 }
1105 break;
1106
1107 case CSR_SPLIT_TIMEOUT_LO:
1108 if (tcode == TCODE_READ_QUADLET_REQUEST) {
1109 *data = cpu_to_be32(card->split_timeout_lo);
1110 } else if (tcode == TCODE_WRITE_QUADLET_REQUEST) {
1111 spin_lock_irqsave(&card->lock, flags);
1112 card->split_timeout_lo =
1113 be32_to_cpu(*data) & 0xfff80000;
1114 update_split_timeout(card);
1115 spin_unlock_irqrestore(&card->lock, flags);
1116 } else {
1117 rcode = RCODE_TYPE_ERROR;
1118 }
1119 break;
1120
3d1f46eb
CL
1121 case CSR_MAINT_UTILITY:
1122 if (tcode == TCODE_READ_QUADLET_REQUEST)
1123 *data = card->maint_utility_register;
1124 else if (tcode == TCODE_WRITE_QUADLET_REQUEST)
1125 card->maint_utility_register = *data;
1126 else
1127 rcode = RCODE_TYPE_ERROR;
1128 break;
1129
e534fe16
SR
1130 case CSR_BROADCAST_CHANNEL:
1131 if (tcode == TCODE_READ_QUADLET_REQUEST)
1132 *data = cpu_to_be32(card->broadcast_channel);
1133 else if (tcode == TCODE_WRITE_QUADLET_REQUEST)
1134 card->broadcast_channel =
1135 (be32_to_cpu(*data) & BROADCAST_CHANNEL_VALID) |
1136 BROADCAST_CHANNEL_INITIAL;
1137 else
1138 rcode = RCODE_TYPE_ERROR;
d60d7f1d
KH
1139 break;
1140
1141 case CSR_BUS_MANAGER_ID:
1142 case CSR_BANDWIDTH_AVAILABLE:
1143 case CSR_CHANNELS_AVAILABLE_HI:
1144 case CSR_CHANNELS_AVAILABLE_LO:
c781c06d
KH
1145 /*
1146 * FIXME: these are handled by the OHCI hardware and
d60d7f1d
KH
1147 * the stack never sees these request. If we add
1148 * support for a new type of controller that doesn't
1149 * handle this in hardware we need to deal with these
c781c06d
KH
1150 * transactions.
1151 */
d60d7f1d
KH
1152 BUG();
1153 break;
1154
d60d7f1d 1155 default:
e534fe16 1156 rcode = RCODE_ADDRESS_ERROR;
d60d7f1d
KH
1157 break;
1158 }
e534fe16
SR
1159
1160 fw_send_response(card, request, rcode);
d60d7f1d
KH
1161}
1162
1163static struct fw_address_handler registers = {
1164 .length = 0x400,
1165 .address_callback = handle_registers,
1166};
1167
3038e353
KH
1168MODULE_AUTHOR("Kristian Hoegsberg <krh@bitplanet.net>");
1169MODULE_DESCRIPTION("Core IEEE1394 transaction logic");
1170MODULE_LICENSE("GPL");
1171
937f6879 1172static const u32 vendor_textual_descriptor[] = {
3038e353 1173 /* textual descriptor leaf () */
937f6879 1174 0x00060000,
3038e353
KH
1175 0x00000000,
1176 0x00000000,
1177 0x4c696e75, /* L i n u */
1178 0x78204669, /* x F i */
1179 0x72657769, /* r e w i */
937f6879 1180 0x72650000, /* r e */
3038e353
KH
1181};
1182
937f6879
KH
1183static const u32 model_textual_descriptor[] = {
1184 /* model descriptor leaf () */
1185 0x00030000,
1186 0x00000000,
1187 0x00000000,
1188 0x4a756a75, /* J u j u */
1189};
1190
1191static struct fw_descriptor vendor_id_descriptor = {
1192 .length = ARRAY_SIZE(vendor_textual_descriptor),
1193 .immediate = 0x03d00d1e,
3038e353 1194 .key = 0x81000000,
937f6879
KH
1195 .data = vendor_textual_descriptor,
1196};
1197
1198static struct fw_descriptor model_id_descriptor = {
1199 .length = ARRAY_SIZE(model_textual_descriptor),
1200 .immediate = 0x17000001,
1201 .key = 0x81000000,
1202 .data = model_textual_descriptor,
3038e353
KH
1203};
1204
3038e353
KH
1205static int __init fw_core_init(void)
1206{
2dbd7d7e 1207 int ret;
3038e353 1208
105e53f8
SR
1209 fw_workqueue = alloc_workqueue("firewire",
1210 WQ_NON_REENTRANT | WQ_MEM_RECLAIM, 0);
1211 if (!fw_workqueue)
6ea9e7bb
SR
1212 return -ENOMEM;
1213
2dbd7d7e 1214 ret = bus_register(&fw_bus_type);
6ea9e7bb 1215 if (ret < 0) {
105e53f8 1216 destroy_workqueue(fw_workqueue);
2dbd7d7e 1217 return ret;
6ea9e7bb 1218 }
3038e353 1219
a3aca3da
KH
1220 fw_cdev_major = register_chrdev(0, "firewire", &fw_device_ops);
1221 if (fw_cdev_major < 0) {
1222 bus_unregister(&fw_bus_type);
105e53f8 1223 destroy_workqueue(fw_workqueue);
a3aca3da
KH
1224 return fw_cdev_major;
1225 }
1226
c490a6de
SR
1227 fw_core_add_address_handler(&topology_map, &topology_map_region);
1228 fw_core_add_address_handler(&registers, &registers_region);
1229 fw_core_add_descriptor(&vendor_id_descriptor);
1230 fw_core_add_descriptor(&model_id_descriptor);
3038e353
KH
1231
1232 return 0;
1233}
1234
1235static void __exit fw_core_cleanup(void)
1236{
a3aca3da 1237 unregister_chrdev(fw_cdev_major, "firewire");
3038e353 1238 bus_unregister(&fw_bus_type);
105e53f8 1239 destroy_workqueue(fw_workqueue);
d6053e08 1240 idr_destroy(&fw_device_idr);
3038e353
KH
1241}
1242
1243module_init(fw_core_init);
1244module_exit(fw_core_cleanup);