]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - drivers/firewire/core-transaction.c
treewide: Use fallthrough pseudo-keyword
[mirror_ubuntu-jammy-kernel.git] / drivers / firewire / core-transaction.c
CommitLineData
1a59d1b8 1// SPDX-License-Identifier: GPL-2.0-or-later
c781c06d
KH
2/*
3 * Core IEEE1394 transaction logic
3038e353
KH
4 *
5 * Copyright (C) 2004-2006 Kristian Hoegsberg <krh@bitplanet.net>
3038e353
KH
6 */
7
e8ca9702 8#include <linux/bug.h>
2a0a2590 9#include <linux/completion.h>
e8ca9702
SR
10#include <linux/device.h>
11#include <linux/errno.h>
77c9a5da 12#include <linux/firewire.h>
e8ca9702
SR
13#include <linux/firewire-constants.h>
14#include <linux/fs.h>
15#include <linux/init.h>
d6053e08 16#include <linux/idr.h>
e8ca9702 17#include <linux/jiffies.h>
3038e353 18#include <linux/kernel.h>
3038e353 19#include <linux/list.h>
e8ca9702 20#include <linux/module.h>
35202f7d 21#include <linux/rculist.h>
e8ca9702
SR
22#include <linux/slab.h>
23#include <linux/spinlock.h>
24#include <linux/string.h>
25#include <linux/timer.h>
26#include <linux/types.h>
6ea9e7bb 27#include <linux/workqueue.h>
e8ca9702
SR
28
29#include <asm/byteorder.h>
3038e353 30
77c9a5da 31#include "core.h"
3038e353 32
a77754a7
KH
33#define HEADER_PRI(pri) ((pri) << 0)
34#define HEADER_TCODE(tcode) ((tcode) << 4)
35#define HEADER_RETRY(retry) ((retry) << 8)
36#define HEADER_TLABEL(tlabel) ((tlabel) << 10)
37#define HEADER_DESTINATION(destination) ((destination) << 16)
38#define HEADER_SOURCE(source) ((source) << 16)
39#define HEADER_RCODE(rcode) ((rcode) << 12)
40#define HEADER_OFFSET_HIGH(offset_high) ((offset_high) << 0)
41#define HEADER_DATA_LENGTH(length) ((length) << 16)
42#define HEADER_EXTENDED_TCODE(tcode) ((tcode) << 0)
43
44#define HEADER_GET_TCODE(q) (((q) >> 4) & 0x0f)
45#define HEADER_GET_TLABEL(q) (((q) >> 10) & 0x3f)
46#define HEADER_GET_RCODE(q) (((q) >> 12) & 0x0f)
47#define HEADER_GET_DESTINATION(q) (((q) >> 16) & 0xffff)
48#define HEADER_GET_SOURCE(q) (((q) >> 16) & 0xffff)
49#define HEADER_GET_OFFSET_HIGH(q) (((q) >> 0) & 0xffff)
50#define HEADER_GET_DATA_LENGTH(q) (((q) >> 16) & 0xffff)
51#define HEADER_GET_EXTENDED_TCODE(q) (((q) >> 0) & 0xffff)
52
a7ea6782
SR
53#define HEADER_DESTINATION_IS_BROADCAST(q) \
54 (((q) & HEADER_DESTINATION(0x3f)) == HEADER_DESTINATION(0x3f))
55
77c9a5da
SR
56#define PHY_PACKET_CONFIG 0x0
57#define PHY_PACKET_LINK_ON 0x1
58#define PHY_PACKET_SELF_ID 0x2
59
a77754a7
KH
60#define PHY_CONFIG_GAP_COUNT(gap_count) (((gap_count) << 16) | (1 << 22))
61#define PHY_CONFIG_ROOT_ID(node_id) ((((node_id) & 0x3f) << 24) | (1 << 23))
62#define PHY_IDENTIFIER(id) ((id) << 30)
3038e353 63
410cf2bd
CL
64/* returns 0 if the split timeout handler is already running */
65static int try_cancel_split_timeout(struct fw_transaction *t)
66{
67 if (t->is_split_transaction)
68 return del_timer(&t->split_timeout_timer);
69 else
70 return 1;
71}
72
53dca511 73static int close_transaction(struct fw_transaction *transaction,
a38a00fd 74 struct fw_card *card, int rcode)
3038e353 75{
730c32f5 76 struct fw_transaction *t;
3038e353
KH
77 unsigned long flags;
78
79 spin_lock_irqsave(&card->lock, flags);
730c32f5
KH
80 list_for_each_entry(t, &card->transaction_list, link) {
81 if (t == transaction) {
410cf2bd 82 if (!try_cancel_split_timeout(t)) {
2222bcb7
CL
83 spin_unlock_irqrestore(&card->lock, flags);
84 goto timed_out;
85 }
5c40cbfe 86 list_del_init(&t->link);
1e626fdc 87 card->tlabel_mask &= ~(1ULL << t->tlabel);
730c32f5
KH
88 break;
89 }
90 }
3038e353
KH
91 spin_unlock_irqrestore(&card->lock, flags);
92
730c32f5 93 if (&t->link != &card->transaction_list) {
a38a00fd 94 t->callback(card, rcode, NULL, 0, t->callback_data);
730c32f5
KH
95 return 0;
96 }
97
2222bcb7 98 timed_out:
730c32f5 99 return -ENOENT;
3038e353
KH
100}
101
c781c06d
KH
102/*
103 * Only valid for transactions that are potentially pending (ie have
104 * been sent).
105 */
53dca511
SR
106int fw_cancel_transaction(struct fw_card *card,
107 struct fw_transaction *transaction)
730c32f5 108{
c781c06d
KH
109 /*
110 * Cancel the packet transmission if it's still queued. That
730c32f5 111 * will call the packet transmission callback which cancels
c781c06d
KH
112 * the transaction.
113 */
730c32f5
KH
114
115 if (card->driver->cancel_packet(card, &transaction->packet) == 0)
116 return 0;
117
c781c06d
KH
118 /*
119 * If the request packet has already been sent, we need to see
120 * if the transaction is still pending and remove it in that case.
121 */
730c32f5 122
a38a00fd 123 return close_transaction(transaction, card, RCODE_CANCELLED);
730c32f5
KH
124}
125EXPORT_SYMBOL(fw_cancel_transaction);
126
9c6c273a 127static void split_transaction_timeout_callback(struct timer_list *timer)
5c40cbfe 128{
9c6c273a 129 struct fw_transaction *t = from_timer(t, timer, split_timeout_timer);
5c40cbfe
CL
130 struct fw_card *card = t->card;
131 unsigned long flags;
132
133 spin_lock_irqsave(&card->lock, flags);
134 if (list_empty(&t->link)) {
135 spin_unlock_irqrestore(&card->lock, flags);
136 return;
137 }
138 list_del(&t->link);
139 card->tlabel_mask &= ~(1ULL << t->tlabel);
140 spin_unlock_irqrestore(&card->lock, flags);
141
5c40cbfe
CL
142 t->callback(card, RCODE_CANCELLED, NULL, 0, t->callback_data);
143}
144
410cf2bd
CL
145static void start_split_transaction_timeout(struct fw_transaction *t,
146 struct fw_card *card)
147{
148 unsigned long flags;
149
150 spin_lock_irqsave(&card->lock, flags);
151
152 if (list_empty(&t->link) || WARN_ON(t->is_split_transaction)) {
153 spin_unlock_irqrestore(&card->lock, flags);
154 return;
155 }
156
157 t->is_split_transaction = true;
158 mod_timer(&t->split_timeout_timer,
159 jiffies + card->split_timeout_jiffies);
160
161 spin_unlock_irqrestore(&card->lock, flags);
162}
163
53dca511
SR
164static void transmit_complete_callback(struct fw_packet *packet,
165 struct fw_card *card, int status)
3038e353
KH
166{
167 struct fw_transaction *t =
168 container_of(packet, struct fw_transaction, packet);
169
170 switch (status) {
171 case ACK_COMPLETE:
a38a00fd 172 close_transaction(t, card, RCODE_COMPLETE);
3038e353
KH
173 break;
174 case ACK_PENDING:
410cf2bd 175 start_split_transaction_timeout(t, card);
3038e353
KH
176 break;
177 case ACK_BUSY_X:
178 case ACK_BUSY_A:
179 case ACK_BUSY_B:
a38a00fd 180 close_transaction(t, card, RCODE_BUSY);
3038e353
KH
181 break;
182 case ACK_DATA_ERROR:
a38a00fd 183 close_transaction(t, card, RCODE_DATA_ERROR);
e5f49c3b 184 break;
3038e353 185 case ACK_TYPE_ERROR:
a38a00fd 186 close_transaction(t, card, RCODE_TYPE_ERROR);
3038e353
KH
187 break;
188 default:
c781c06d
KH
189 /*
190 * In this case the ack is really a juju specific
191 * rcode, so just forward that to the callback.
192 */
a38a00fd 193 close_transaction(t, card, status);
3038e353
KH
194 break;
195 }
196}
197
53dca511 198static void fw_fill_request(struct fw_packet *packet, int tcode, int tlabel,
b9549bc6 199 int destination_id, int source_id, int generation, int speed,
36bfe49d 200 unsigned long long offset, void *payload, size_t length)
3038e353
KH
201{
202 int ext_tcode;
203
18e9b10f
SR
204 if (tcode == TCODE_STREAM_DATA) {
205 packet->header[0] =
206 HEADER_DATA_LENGTH(length) |
207 destination_id |
208 HEADER_TCODE(TCODE_STREAM_DATA);
209 packet->header_length = 4;
210 packet->payload = payload;
211 packet->payload_length = length;
212
213 goto common;
214 }
215
3038e353 216 if (tcode > 0x10) {
8f9f963e 217 ext_tcode = tcode & ~0x10;
3038e353
KH
218 tcode = TCODE_LOCK_REQUEST;
219 } else
220 ext_tcode = 0;
221
222 packet->header[0] =
a77754a7
KH
223 HEADER_RETRY(RETRY_X) |
224 HEADER_TLABEL(tlabel) |
225 HEADER_TCODE(tcode) |
b9549bc6 226 HEADER_DESTINATION(destination_id);
3038e353 227 packet->header[1] =
a77754a7 228 HEADER_OFFSET_HIGH(offset >> 32) | HEADER_SOURCE(source_id);
3038e353
KH
229 packet->header[2] =
230 offset;
231
232 switch (tcode) {
233 case TCODE_WRITE_QUADLET_REQUEST:
234 packet->header[3] = *(u32 *)payload;
235 packet->header_length = 16;
236 packet->payload_length = 0;
237 break;
238
239 case TCODE_LOCK_REQUEST:
240 case TCODE_WRITE_BLOCK_REQUEST:
241 packet->header[3] =
a77754a7
KH
242 HEADER_DATA_LENGTH(length) |
243 HEADER_EXTENDED_TCODE(ext_tcode);
3038e353
KH
244 packet->header_length = 16;
245 packet->payload = payload;
246 packet->payload_length = length;
247 break;
248
249 case TCODE_READ_QUADLET_REQUEST:
250 packet->header_length = 12;
251 packet->payload_length = 0;
252 break;
253
254 case TCODE_READ_BLOCK_REQUEST:
255 packet->header[3] =
a77754a7
KH
256 HEADER_DATA_LENGTH(length) |
257 HEADER_EXTENDED_TCODE(ext_tcode);
3038e353
KH
258 packet->header_length = 16;
259 packet->payload_length = 0;
260 break;
5b189bf3
SR
261
262 default:
5878730b 263 WARN(1, "wrong tcode %d\n", tcode);
3038e353 264 }
18e9b10f 265 common:
3038e353
KH
266 packet->speed = speed;
267 packet->generation = generation;
730c32f5 268 packet->ack = 0;
19593ffd 269 packet->payload_mapped = false;
3038e353
KH
270}
271
7906054f
CL
272static int allocate_tlabel(struct fw_card *card)
273{
274 int tlabel;
275
276 tlabel = card->current_tlabel;
277 while (card->tlabel_mask & (1ULL << tlabel)) {
278 tlabel = (tlabel + 1) & 0x3f;
279 if (tlabel == card->current_tlabel)
280 return -EBUSY;
281 }
282
283 card->current_tlabel = (tlabel + 1) & 0x3f;
284 card->tlabel_mask |= 1ULL << tlabel;
285
286 return tlabel;
287}
288
3038e353 289/**
656b7afd
SR
290 * fw_send_request() - submit a request packet for transmission
291 * @card: interface to send the request at
292 * @t: transaction instance to which the request belongs
293 * @tcode: transaction code
294 * @destination_id: destination node ID, consisting of bus_ID and phy_ID
295 * @generation: bus generation in which request and response are valid
296 * @speed: transmission speed
297 * @offset: 48bit wide offset into destination's address space
298 * @payload: data payload for the request subaction
299 * @length: length of the payload, in bytes
300 * @callback: function to be called when the transaction is completed
301 * @callback_data: data to be passed to the transaction completion callback
3038e353 302 *
656b7afd
SR
303 * Submit a request packet into the asynchronous request transmission queue.
304 * Can be called from atomic context. If you prefer a blocking API, use
305 * fw_run_transaction() in a context that can sleep.
3038e353 306 *
656b7afd
SR
307 * In case of lock requests, specify one of the firewire-core specific %TCODE_
308 * constants instead of %TCODE_LOCK_REQUEST in @tcode.
3038e353 309 *
656b7afd
SR
310 * Make sure that the value in @destination_id is not older than the one in
311 * @generation. Otherwise the request is in danger to be sent to a wrong node.
3038e353 312 *
656b7afd 313 * In case of asynchronous stream packets i.e. %TCODE_STREAM_DATA, the caller
18e9b10f 314 * needs to synthesize @destination_id with fw_stream_packet_destination_id().
656b7afd
SR
315 * It will contain tag, channel, and sy data instead of a node ID then.
316 *
317 * The payload buffer at @data is going to be DMA-mapped except in case of
f30e6d3e
SR
318 * @length <= 8 or of local (loopback) requests. Hence make sure that the
319 * buffer complies with the restrictions of the streaming DMA mapping API.
656b7afd
SR
320 * @payload must not be freed before the @callback is called.
321 *
322 * In case of request types without payload, @data is NULL and @length is 0.
323 *
324 * After the transaction is completed successfully or unsuccessfully, the
325 * @callback will be called. Among its parameters is the response code which
326 * is either one of the rcodes per IEEE 1394 or, in case of internal errors,
18d0cdfd
SR
327 * the firewire-core specific %RCODE_SEND_ERROR. The other firewire-core
328 * specific rcodes (%RCODE_CANCELLED, %RCODE_BUSY, %RCODE_GENERATION,
329 * %RCODE_NO_ACK) denote transaction timeout, busy responder, stale request
330 * generation, or missing ACK respectively.
656b7afd
SR
331 *
332 * Note some timing corner cases: fw_send_request() may complete much earlier
333 * than when the request packet actually hits the wire. On the other hand,
334 * transaction completion and hence execution of @callback may happen even
335 * before fw_send_request() returns.
3038e353 336 */
53dca511
SR
337void fw_send_request(struct fw_card *card, struct fw_transaction *t, int tcode,
338 int destination_id, int generation, int speed,
339 unsigned long long offset, void *payload, size_t length,
340 fw_transaction_callback_t callback, void *callback_data)
3038e353
KH
341{
342 unsigned long flags;
b9549bc6 343 int tlabel;
3038e353 344
c781c06d
KH
345 /*
346 * Allocate tlabel from the bitmap and put the transaction on
347 * the list while holding the card spinlock.
348 */
3038e353
KH
349
350 spin_lock_irqsave(&card->lock, flags);
351
7906054f
CL
352 tlabel = allocate_tlabel(card);
353 if (tlabel < 0) {
3038e353
KH
354 spin_unlock_irqrestore(&card->lock, flags);
355 callback(card, RCODE_SEND_ERROR, NULL, 0, callback_data);
356 return;
357 }
358
1e119fa9 359 t->node_id = destination_id;
3038e353 360 t->tlabel = tlabel;
5c40cbfe 361 t->card = card;
410cf2bd 362 t->is_split_transaction = false;
9c6c273a
KC
363 timer_setup(&t->split_timeout_timer,
364 split_transaction_timeout_callback, 0);
3038e353
KH
365 t->callback = callback;
366 t->callback_data = callback_data;
367
1e119fa9
JF
368 fw_fill_request(&t->packet, tcode, t->tlabel,
369 destination_id, card->node_id, generation,
370 speed, offset, payload, length);
3038e353
KH
371 t->packet.callback = transmit_complete_callback;
372
e9aeb46c
SR
373 list_add_tail(&t->link, &card->transaction_list);
374
375 spin_unlock_irqrestore(&card->lock, flags);
376
3038e353
KH
377 card->driver->send_request(card, &t->packet);
378}
379EXPORT_SYMBOL(fw_send_request);
380
1e119fa9
JF
381struct transaction_callback_data {
382 struct completion done;
383 void *payload;
384 int rcode;
385};
386
387static void transaction_callback(struct fw_card *card, int rcode,
388 void *payload, size_t length, void *data)
389{
390 struct transaction_callback_data *d = data;
391
392 if (rcode == RCODE_COMPLETE)
393 memcpy(d->payload, payload, length);
394 d->rcode = rcode;
395 complete(&d->done);
396}
397
398/**
656b7afd 399 * fw_run_transaction() - send request and sleep until transaction is completed
226b18ad
RD
400 * @card: card interface for this request
401 * @tcode: transaction code
402 * @destination_id: destination node ID, consisting of bus_ID and phy_ID
403 * @generation: bus generation in which request and response are valid
404 * @speed: transmission speed
405 * @offset: 48bit wide offset into destination's address space
406 * @payload: data payload for the request subaction
407 * @length: length of the payload, in bytes
1e119fa9 408 *
656b7afd
SR
409 * Returns the RCODE. See fw_send_request() for parameter documentation.
410 * Unlike fw_send_request(), @data points to the payload of the request or/and
f30e6d3e
SR
411 * to the payload of the response. DMA mapping restrictions apply to outbound
412 * request payloads of >= 8 bytes but not to inbound response payloads.
1e119fa9
JF
413 */
414int fw_run_transaction(struct fw_card *card, int tcode, int destination_id,
53dca511 415 int generation, int speed, unsigned long long offset,
ba27e1f7 416 void *payload, size_t length)
1e119fa9
JF
417{
418 struct transaction_callback_data d;
419 struct fw_transaction t;
420
9c6c273a 421 timer_setup_on_stack(&t.split_timeout_timer, NULL, 0);
1e119fa9 422 init_completion(&d.done);
ba27e1f7 423 d.payload = payload;
1e119fa9 424 fw_send_request(card, &t, tcode, destination_id, generation, speed,
ba27e1f7 425 offset, payload, length, transaction_callback, &d);
1e119fa9 426 wait_for_completion(&d.done);
5c40cbfe 427 destroy_timer_on_stack(&t.split_timeout_timer);
1e119fa9
JF
428
429 return d.rcode;
430}
431EXPORT_SYMBOL(fw_run_transaction);
432
c0220d68
SR
433static DEFINE_MUTEX(phy_config_mutex);
434static DECLARE_COMPLETION(phy_config_done);
ae1e5355
SR
435
436static void transmit_phy_packet_callback(struct fw_packet *packet,
437 struct fw_card *card, int status)
3038e353 438{
c0220d68 439 complete(&phy_config_done);
3038e353
KH
440}
441
c0220d68 442static struct fw_packet phy_config_packet = {
5b06db16
CL
443 .header_length = 12,
444 .header[0] = TCODE_LINK_INTERNAL << 4,
c0220d68
SR
445 .payload_length = 0,
446 .speed = SCODE_100,
447 .callback = transmit_phy_packet_callback,
448};
449
83db801c
KH
450void fw_send_phy_config(struct fw_card *card,
451 int node_id, int generation, int gap_count)
3038e353 452{
ae1e5355 453 long timeout = DIV_ROUND_UP(HZ, 10);
02d37bed
SR
454 u32 data = PHY_IDENTIFIER(PHY_PACKET_CONFIG);
455
456 if (node_id != FW_PHY_CONFIG_NO_NODE_ID)
457 data |= PHY_CONFIG_ROOT_ID(node_id);
458
459 if (gap_count == FW_PHY_CONFIG_CURRENT_GAP_COUNT) {
460 gap_count = card->driver->read_phy_reg(card, 1);
461 if (gap_count < 0)
462 return;
463
464 gap_count &= 63;
465 if (gap_count == 63)
466 return;
467 }
468 data |= PHY_CONFIG_GAP_COUNT(gap_count);
2a0a2590 469
c0220d68
SR
470 mutex_lock(&phy_config_mutex);
471
5b06db16
CL
472 phy_config_packet.header[1] = data;
473 phy_config_packet.header[2] = ~data;
c0220d68 474 phy_config_packet.generation = generation;
16735d02 475 reinit_completion(&phy_config_done);
c0220d68
SR
476
477 card->driver->send_request(card, &phy_config_packet);
478 wait_for_completion_timeout(&phy_config_done, timeout);
ae1e5355 479
c0220d68 480 mutex_unlock(&phy_config_mutex);
3038e353
KH
481}
482
53dca511
SR
483static struct fw_address_handler *lookup_overlapping_address_handler(
484 struct list_head *list, unsigned long long offset, size_t length)
3038e353
KH
485{
486 struct fw_address_handler *handler;
487
35202f7d 488 list_for_each_entry_rcu(handler, list, link) {
3038e353
KH
489 if (handler->offset < offset + length &&
490 offset < handler->offset + handler->length)
491 return handler;
492 }
493
494 return NULL;
495}
496
db5d247a
CL
497static bool is_enclosing_handler(struct fw_address_handler *handler,
498 unsigned long long offset, size_t length)
499{
500 return handler->offset <= offset &&
501 offset + length <= handler->offset + handler->length;
502}
503
53dca511
SR
504static struct fw_address_handler *lookup_enclosing_address_handler(
505 struct list_head *list, unsigned long long offset, size_t length)
3038e353
KH
506{
507 struct fw_address_handler *handler;
508
35202f7d 509 list_for_each_entry_rcu(handler, list, link) {
db5d247a 510 if (is_enclosing_handler(handler, offset, length))
3038e353
KH
511 return handler;
512 }
513
514 return NULL;
515}
516
4d50c443 517static DEFINE_SPINLOCK(address_handler_list_lock);
3038e353
KH
518static LIST_HEAD(address_handler_list);
519
21ebcd12 520const struct fw_address_region fw_high_memory_region =
fcd46b34 521 { .start = FW_MAX_PHYSICAL_RANGE, .end = 0xffffe0000000ULL, };
db8be076
AB
522EXPORT_SYMBOL(fw_high_memory_region);
523
f07d42ac 524static const struct fw_address_region low_memory_region =
fcd46b34 525 { .start = 0x000000000000ULL, .end = FW_MAX_PHYSICAL_RANGE, };
f07d42ac
CL
526
527#if 0
21ebcd12 528const struct fw_address_region fw_private_region =
5af4e5ea 529 { .start = 0xffffe0000000ULL, .end = 0xfffff0000000ULL, };
21ebcd12 530const struct fw_address_region fw_csr_region =
cca60977
JW
531 { .start = CSR_REGISTER_BASE,
532 .end = CSR_REGISTER_BASE | CSR_CONFIG_ROM_END, };
21ebcd12 533const struct fw_address_region fw_unit_space_region =
5af4e5ea 534 { .start = 0xfffff0000900ULL, .end = 0x1000000000000ULL, };
db8be076 535#endif /* 0 */
3038e353 536
db5d247a
CL
537static bool is_in_fcp_region(u64 offset, size_t length)
538{
539 return offset >= (CSR_REGISTER_BASE | CSR_FCP_COMMAND) &&
540 offset + length <= (CSR_REGISTER_BASE | CSR_FCP_END);
541}
542
3038e353 543/**
656b7afd
SR
544 * fw_core_add_address_handler() - register for incoming requests
545 * @handler: callback
546 * @region: region in the IEEE 1212 node space address range
3e0b5f0d
SR
547 *
548 * region->start, ->end, and handler->length have to be quadlet-aligned.
549 *
550 * When a request is received that falls within the specified address range,
551 * the specified callback is invoked. The parameters passed to the callback
552 * give the details of the particular request.
1415d918 553 *
4d50c443 554 * To be called in process context.
1415d918 555 * Return value: 0 on success, non-zero otherwise.
db5d247a 556 *
1415d918
SR
557 * The start offset of the handler's address region is determined by
558 * fw_core_add_address_handler() and is returned in handler->offset.
db5d247a
CL
559 *
560 * Address allocations are exclusive, except for the FCP registers.
3038e353 561 */
53dca511
SR
562int fw_core_add_address_handler(struct fw_address_handler *handler,
563 const struct fw_address_region *region)
3038e353
KH
564{
565 struct fw_address_handler *other;
3038e353
KH
566 int ret = -EBUSY;
567
3e0b5f0d 568 if (region->start & 0xffff000000000003ULL ||
3e0b5f0d 569 region->start >= region->end ||
0c9ae701 570 region->end > 0x0001000000000000ULL ||
3e0b5f0d
SR
571 handler->length & 3 ||
572 handler->length == 0)
573 return -EINVAL;
574
4d50c443 575 spin_lock(&address_handler_list_lock);
3038e353 576
3e0b5f0d 577 handler->offset = region->start;
3038e353 578 while (handler->offset + handler->length <= region->end) {
db5d247a
CL
579 if (is_in_fcp_region(handler->offset, handler->length))
580 other = NULL;
581 else
582 other = lookup_overlapping_address_handler
583 (&address_handler_list,
584 handler->offset, handler->length);
3038e353 585 if (other != NULL) {
3e0b5f0d 586 handler->offset += other->length;
3038e353 587 } else {
35202f7d 588 list_add_tail_rcu(&handler->link, &address_handler_list);
3038e353
KH
589 ret = 0;
590 break;
591 }
592 }
593
4d50c443 594 spin_unlock(&address_handler_list_lock);
3038e353
KH
595
596 return ret;
597}
3038e353
KH
598EXPORT_SYMBOL(fw_core_add_address_handler);
599
600/**
656b7afd 601 * fw_core_remove_address_handler() - unregister an address handler
226b18ad 602 * @handler: callback
90963f1c 603 *
4d50c443
SR
604 * To be called in process context.
605 *
90963f1c
SR
606 * When fw_core_remove_address_handler() returns, @handler->callback() is
607 * guaranteed to not run on any CPU anymore.
3038e353 608 */
3038e353
KH
609void fw_core_remove_address_handler(struct fw_address_handler *handler)
610{
4d50c443 611 spin_lock(&address_handler_list_lock);
35202f7d 612 list_del_rcu(&handler->link);
4d50c443 613 spin_unlock(&address_handler_list_lock);
35202f7d 614 synchronize_rcu();
3038e353 615}
3038e353
KH
616EXPORT_SYMBOL(fw_core_remove_address_handler);
617
618struct fw_request {
619 struct fw_packet response;
36bfe49d 620 u32 request_header[4];
3038e353
KH
621 int ack;
622 u32 length;
c38e7e21 623 u32 data[];
3038e353
KH
624};
625
53dca511
SR
626static void free_response_callback(struct fw_packet *packet,
627 struct fw_card *card, int status)
3038e353
KH
628{
629 struct fw_request *request;
630
631 request = container_of(packet, struct fw_request, response);
632 kfree(request);
633}
634
a10c0ce7
CL
635int fw_get_response_length(struct fw_request *r)
636{
637 int tcode, ext_tcode, data_length;
638
639 tcode = HEADER_GET_TCODE(r->request_header[0]);
640
641 switch (tcode) {
642 case TCODE_WRITE_QUADLET_REQUEST:
643 case TCODE_WRITE_BLOCK_REQUEST:
644 return 0;
645
646 case TCODE_READ_QUADLET_REQUEST:
647 return 4;
648
649 case TCODE_READ_BLOCK_REQUEST:
650 data_length = HEADER_GET_DATA_LENGTH(r->request_header[3]);
651 return data_length;
652
653 case TCODE_LOCK_REQUEST:
654 ext_tcode = HEADER_GET_EXTENDED_TCODE(r->request_header[3]);
655 data_length = HEADER_GET_DATA_LENGTH(r->request_header[3]);
656 switch (ext_tcode) {
657 case EXTCODE_FETCH_ADD:
658 case EXTCODE_LITTLE_ADD:
659 return data_length;
660 default:
661 return data_length / 2;
662 }
663
664 default:
5878730b 665 WARN(1, "wrong tcode %d\n", tcode);
a10c0ce7
CL
666 return 0;
667 }
668}
669
53dca511
SR
670void fw_fill_response(struct fw_packet *response, u32 *request_header,
671 int rcode, void *payload, size_t length)
3038e353
KH
672{
673 int tcode, tlabel, extended_tcode, source, destination;
674
a77754a7
KH
675 tcode = HEADER_GET_TCODE(request_header[0]);
676 tlabel = HEADER_GET_TLABEL(request_header[0]);
677 source = HEADER_GET_DESTINATION(request_header[0]);
678 destination = HEADER_GET_SOURCE(request_header[1]);
679 extended_tcode = HEADER_GET_EXTENDED_TCODE(request_header[3]);
3038e353
KH
680
681 response->header[0] =
a77754a7
KH
682 HEADER_RETRY(RETRY_1) |
683 HEADER_TLABEL(tlabel) |
684 HEADER_DESTINATION(destination);
36bfe49d 685 response->header[1] =
a77754a7
KH
686 HEADER_SOURCE(source) |
687 HEADER_RCODE(rcode);
3038e353
KH
688 response->header[2] = 0;
689
690 switch (tcode) {
691 case TCODE_WRITE_QUADLET_REQUEST:
692 case TCODE_WRITE_BLOCK_REQUEST:
a77754a7 693 response->header[0] |= HEADER_TCODE(TCODE_WRITE_RESPONSE);
3038e353
KH
694 response->header_length = 12;
695 response->payload_length = 0;
696 break;
697
698 case TCODE_READ_QUADLET_REQUEST:
699 response->header[0] |=
a77754a7 700 HEADER_TCODE(TCODE_READ_QUADLET_RESPONSE);
93c4cceb
KH
701 if (payload != NULL)
702 response->header[3] = *(u32 *)payload;
703 else
704 response->header[3] = 0;
3038e353
KH
705 response->header_length = 16;
706 response->payload_length = 0;
707 break;
708
709 case TCODE_READ_BLOCK_REQUEST:
710 case TCODE_LOCK_REQUEST:
a77754a7 711 response->header[0] |= HEADER_TCODE(tcode + 2);
3038e353 712 response->header[3] =
a77754a7
KH
713 HEADER_DATA_LENGTH(length) |
714 HEADER_EXTENDED_TCODE(extended_tcode);
3038e353 715 response->header_length = 16;
36bfe49d
KH
716 response->payload = payload;
717 response->payload_length = length;
3038e353
KH
718 break;
719
720 default:
5878730b 721 WARN(1, "wrong tcode %d\n", tcode);
3038e353 722 }
1d1dc5e8 723
19593ffd 724 response->payload_mapped = false;
3038e353 725}
93c4cceb 726EXPORT_SYMBOL(fw_fill_response);
3038e353 727
8e4b50f9
CL
728static u32 compute_split_timeout_timestamp(struct fw_card *card,
729 u32 request_timestamp)
730{
731 unsigned int cycles;
732 u32 timestamp;
733
734 cycles = card->split_timeout_cycles;
735 cycles += request_timestamp & 0x1fff;
736
737 timestamp = request_timestamp & ~0x1fff;
738 timestamp += (cycles / 8000) << 13;
739 timestamp |= cycles % 8000;
740
741 return timestamp;
742}
743
744static struct fw_request *allocate_request(struct fw_card *card,
745 struct fw_packet *p)
3038e353
KH
746{
747 struct fw_request *request;
748 u32 *data, length;
8e4b50f9 749 int request_tcode;
3038e353 750
a77754a7 751 request_tcode = HEADER_GET_TCODE(p->header[0]);
3038e353
KH
752 switch (request_tcode) {
753 case TCODE_WRITE_QUADLET_REQUEST:
2639a6fb 754 data = &p->header[3];
3038e353
KH
755 length = 4;
756 break;
757
758 case TCODE_WRITE_BLOCK_REQUEST:
759 case TCODE_LOCK_REQUEST:
2639a6fb 760 data = p->payload;
a77754a7 761 length = HEADER_GET_DATA_LENGTH(p->header[3]);
3038e353
KH
762 break;
763
764 case TCODE_READ_QUADLET_REQUEST:
765 data = NULL;
766 length = 4;
767 break;
768
769 case TCODE_READ_BLOCK_REQUEST:
770 data = NULL;
a77754a7 771 length = HEADER_GET_DATA_LENGTH(p->header[3]);
3038e353
KH
772 break;
773
774 default:
26b4950d 775 fw_notice(card, "ERROR - corrupt request received - %08x %08x %08x\n",
0bf607c5 776 p->header[0], p->header[1], p->header[2]);
3038e353
KH
777 return NULL;
778 }
779
2d826cc5 780 request = kmalloc(sizeof(*request) + length, GFP_ATOMIC);
3038e353
KH
781 if (request == NULL)
782 return NULL;
783
2639a6fb 784 request->response.speed = p->speed;
8e4b50f9
CL
785 request->response.timestamp =
786 compute_split_timeout_timestamp(card, p->timestamp);
2639a6fb 787 request->response.generation = p->generation;
730c32f5 788 request->response.ack = 0;
3038e353 789 request->response.callback = free_response_callback;
2639a6fb 790 request->ack = p->ack;
93c4cceb 791 request->length = length;
3038e353 792 if (data)
6e2e8424 793 memcpy(request->data, data, length);
3038e353 794
2d826cc5 795 memcpy(request->request_header, p->header, sizeof(p->header));
3038e353
KH
796
797 return request;
798}
799
53dca511
SR
800void fw_send_response(struct fw_card *card,
801 struct fw_request *request, int rcode)
3038e353 802{
db5d247a
CL
803 if (WARN_ONCE(!request, "invalid for FCP address handlers"))
804 return;
805
a7ea6782
SR
806 /* unified transaction or broadcast transaction: don't respond */
807 if (request->ack != ACK_PENDING ||
808 HEADER_DESTINATION_IS_BROADCAST(request->request_header[0])) {
9c9bdf4d 809 kfree(request);
3038e353 810 return;
9c9bdf4d 811 }
3038e353 812
36bfe49d
KH
813 if (rcode == RCODE_COMPLETE)
814 fw_fill_response(&request->response, request->request_header,
a10c0ce7
CL
815 rcode, request->data,
816 fw_get_response_length(request));
36bfe49d
KH
817 else
818 fw_fill_response(&request->response, request->request_header,
819 rcode, NULL, 0);
3038e353
KH
820
821 card->driver->send_response(card, &request->response);
822}
3038e353
KH
823EXPORT_SYMBOL(fw_send_response);
824
253d9237
CB
825/**
826 * fw_get_request_speed() - returns speed at which the @request was received
226b18ad 827 * @request: firewire request data
253d9237
CB
828 */
829int fw_get_request_speed(struct fw_request *request)
830{
831 return request->response.speed;
832}
833EXPORT_SYMBOL(fw_get_request_speed);
834
db5d247a
CL
835static void handle_exclusive_region_request(struct fw_card *card,
836 struct fw_packet *p,
837 struct fw_request *request,
838 unsigned long long offset)
3038e353
KH
839{
840 struct fw_address_handler *handler;
2639a6fb 841 int tcode, destination, source;
3038e353 842
a77754a7 843 destination = HEADER_GET_DESTINATION(p->header[0]);
478b233e 844 source = HEADER_GET_SOURCE(p->header[1]);
c82f91f2
JF
845 tcode = HEADER_GET_TCODE(p->header[0]);
846 if (tcode == TCODE_LOCK_REQUEST)
847 tcode = 0x10 + HEADER_GET_EXTENDED_TCODE(p->header[3]);
3038e353 848
35202f7d 849 rcu_read_lock();
3038e353
KH
850 handler = lookup_enclosing_address_handler(&address_handler_list,
851 offset, request->length);
90963f1c 852 if (handler)
3038e353
KH
853 handler->address_callback(card, request,
854 tcode, destination, source,
33e553fe 855 p->generation, offset,
3038e353
KH
856 request->data, request->length,
857 handler->callback_data);
35202f7d 858 rcu_read_unlock();
90963f1c
SR
859
860 if (!handler)
861 fw_send_response(card, request, RCODE_ADDRESS_ERROR);
3038e353 862}
db5d247a
CL
863
864static void handle_fcp_region_request(struct fw_card *card,
865 struct fw_packet *p,
866 struct fw_request *request,
867 unsigned long long offset)
868{
869 struct fw_address_handler *handler;
db5d247a
CL
870 int tcode, destination, source;
871
872 if ((offset != (CSR_REGISTER_BASE | CSR_FCP_COMMAND) &&
873 offset != (CSR_REGISTER_BASE | CSR_FCP_RESPONSE)) ||
874 request->length > 0x200) {
875 fw_send_response(card, request, RCODE_ADDRESS_ERROR);
876
877 return;
878 }
879
880 tcode = HEADER_GET_TCODE(p->header[0]);
881 destination = HEADER_GET_DESTINATION(p->header[0]);
882 source = HEADER_GET_SOURCE(p->header[1]);
883
884 if (tcode != TCODE_WRITE_QUADLET_REQUEST &&
885 tcode != TCODE_WRITE_BLOCK_REQUEST) {
886 fw_send_response(card, request, RCODE_TYPE_ERROR);
887
888 return;
889 }
890
35202f7d
PH
891 rcu_read_lock();
892 list_for_each_entry_rcu(handler, &address_handler_list, link) {
db5d247a
CL
893 if (is_enclosing_handler(handler, offset, request->length))
894 handler->address_callback(card, NULL, tcode,
895 destination, source,
33e553fe
SR
896 p->generation, offset,
897 request->data,
db5d247a
CL
898 request->length,
899 handler->callback_data);
900 }
35202f7d 901 rcu_read_unlock();
db5d247a
CL
902
903 fw_send_response(card, request, RCODE_COMPLETE);
904}
905
906void fw_core_handle_request(struct fw_card *card, struct fw_packet *p)
907{
908 struct fw_request *request;
909 unsigned long long offset;
910
911 if (p->ack != ACK_PENDING && p->ack != ACK_COMPLETE)
912 return;
913
bf54e146
SR
914 if (TCODE_IS_LINK_INTERNAL(HEADER_GET_TCODE(p->header[0]))) {
915 fw_cdev_handle_phy_packet(card, p);
916 return;
917 }
918
8e4b50f9 919 request = allocate_request(card, p);
db5d247a
CL
920 if (request == NULL) {
921 /* FIXME: send statically allocated busy packet. */
922 return;
923 }
924
925 offset = ((u64)HEADER_GET_OFFSET_HIGH(p->header[1]) << 32) |
926 p->header[2];
927
928 if (!is_in_fcp_region(offset, request->length))
929 handle_exclusive_region_request(card, p, request, offset);
930 else
931 handle_fcp_region_request(card, p, request, offset);
932
933}
3038e353
KH
934EXPORT_SYMBOL(fw_core_handle_request);
935
53dca511 936void fw_core_handle_response(struct fw_card *card, struct fw_packet *p)
3038e353
KH
937{
938 struct fw_transaction *t;
939 unsigned long flags;
940 u32 *data;
941 size_t data_length;
ae86e81e 942 int tcode, tlabel, source, rcode;
3038e353 943
ae86e81e
SR
944 tcode = HEADER_GET_TCODE(p->header[0]);
945 tlabel = HEADER_GET_TLABEL(p->header[0]);
946 source = HEADER_GET_SOURCE(p->header[1]);
947 rcode = HEADER_GET_RCODE(p->header[1]);
3038e353
KH
948
949 spin_lock_irqsave(&card->lock, flags);
950 list_for_each_entry(t, &card->transaction_list, link) {
951 if (t->node_id == source && t->tlabel == tlabel) {
410cf2bd 952 if (!try_cancel_split_timeout(t)) {
2222bcb7
CL
953 spin_unlock_irqrestore(&card->lock, flags);
954 goto timed_out;
955 }
5c40cbfe 956 list_del_init(&t->link);
753a8970 957 card->tlabel_mask &= ~(1ULL << t->tlabel);
3038e353
KH
958 break;
959 }
960 }
961 spin_unlock_irqrestore(&card->lock, flags);
962
963 if (&t->link == &card->transaction_list) {
2222bcb7 964 timed_out:
26b4950d 965 fw_notice(card, "unsolicited response (source %x, tlabel %x)\n",
32b46093 966 source, tlabel);
3038e353
KH
967 return;
968 }
969
c781c06d
KH
970 /*
971 * FIXME: sanity check packet, is length correct, does tcodes
972 * and addresses match.
973 */
3038e353
KH
974
975 switch (tcode) {
976 case TCODE_READ_QUADLET_RESPONSE:
2639a6fb 977 data = (u32 *) &p->header[3];
3038e353
KH
978 data_length = 4;
979 break;
980
981 case TCODE_WRITE_RESPONSE:
982 data = NULL;
983 data_length = 0;
984 break;
985
986 case TCODE_READ_BLOCK_RESPONSE:
987 case TCODE_LOCK_RESPONSE:
93c4cceb 988 data = p->payload;
a77754a7 989 data_length = HEADER_GET_DATA_LENGTH(p->header[3]);
3038e353
KH
990 break;
991
992 default:
993 /* Should never happen, this is just to shut up gcc. */
994 data = NULL;
995 data_length = 0;
996 break;
997 }
998
10a4c735
SR
999 /*
1000 * The response handler may be executed while the request handler
1001 * is still pending. Cancel the request handler.
1002 */
1003 card->driver->cancel_packet(card, &t->packet);
1004
3038e353
KH
1005 t->callback(card, rcode, data, data_length, t->callback_data);
1006}
3038e353
KH
1007EXPORT_SYMBOL(fw_core_handle_response);
1008
7bdbff67
CL
1009/**
1010 * fw_rcode_string - convert a firewire result code to an error description
1011 * @rcode: the result code
1012 */
1013const char *fw_rcode_string(int rcode)
1014{
1015 static const char *const names[] = {
1016 [RCODE_COMPLETE] = "no error",
1017 [RCODE_CONFLICT_ERROR] = "conflict error",
1018 [RCODE_DATA_ERROR] = "data error",
1019 [RCODE_TYPE_ERROR] = "type error",
1020 [RCODE_ADDRESS_ERROR] = "address error",
1021 [RCODE_SEND_ERROR] = "send error",
1022 [RCODE_CANCELLED] = "timeout",
1023 [RCODE_BUSY] = "busy",
1024 [RCODE_GENERATION] = "bus reset",
1025 [RCODE_NO_ACK] = "no ack",
1026 };
1027
1028 if ((unsigned int)rcode < ARRAY_SIZE(names) && names[rcode])
1029 return names[rcode];
1030 else
1031 return "unknown";
1032}
1033EXPORT_SYMBOL(fw_rcode_string);
1034
ae57988f 1035static const struct fw_address_region topology_map_region =
cca60977
JW
1036 { .start = CSR_REGISTER_BASE | CSR_TOPOLOGY_MAP,
1037 .end = CSR_REGISTER_BASE | CSR_TOPOLOGY_MAP_END, };
473d28c7 1038
53dca511
SR
1039static void handle_topology_map(struct fw_card *card, struct fw_request *request,
1040 int tcode, int destination, int source, int generation,
33e553fe
SR
1041 unsigned long long offset, void *payload, size_t length,
1042 void *callback_data)
473d28c7 1043{
cb7c96da 1044 int start;
473d28c7
KH
1045
1046 if (!TCODE_IS_READ_REQUEST(tcode)) {
1047 fw_send_response(card, request, RCODE_TYPE_ERROR);
1048 return;
1049 }
1050
1051 if ((offset & 3) > 0 || (length & 3) > 0) {
1052 fw_send_response(card, request, RCODE_ADDRESS_ERROR);
1053 return;
1054 }
1055
1056 start = (offset - topology_map_region.start) / 4;
cb7c96da 1057 memcpy(payload, &card->topology_map[start], length);
473d28c7
KH
1058
1059 fw_send_response(card, request, RCODE_COMPLETE);
1060}
1061
1062static struct fw_address_handler topology_map = {
85cb9b68 1063 .length = 0x400,
473d28c7
KH
1064 .address_callback = handle_topology_map,
1065};
1066
ae57988f 1067static const struct fw_address_region registers_region =
cca60977
JW
1068 { .start = CSR_REGISTER_BASE,
1069 .end = CSR_REGISTER_BASE | CSR_CONFIG_ROM, };
d60d7f1d 1070
8e4b50f9
CL
1071static void update_split_timeout(struct fw_card *card)
1072{
1073 unsigned int cycles;
1074
1075 cycles = card->split_timeout_hi * 8000 + (card->split_timeout_lo >> 19);
1076
4ec4a67a
SR
1077 /* minimum per IEEE 1394, maximum which doesn't overflow OHCI */
1078 cycles = clamp(cycles, 800u, 3u * 8000u);
8e4b50f9
CL
1079
1080 card->split_timeout_cycles = cycles;
1081 card->split_timeout_jiffies = DIV_ROUND_UP(cycles * HZ, 8000);
1082}
1083
53dca511
SR
1084static void handle_registers(struct fw_card *card, struct fw_request *request,
1085 int tcode, int destination, int source, int generation,
33e553fe
SR
1086 unsigned long long offset, void *payload, size_t length,
1087 void *callback_data)
d60d7f1d 1088{
15f0d833 1089 int reg = offset & ~CSR_REGISTER_BASE;
d60d7f1d 1090 __be32 *data = payload;
e534fe16 1091 int rcode = RCODE_COMPLETE;
8e4b50f9 1092 unsigned long flags;
d60d7f1d
KH
1093
1094 switch (reg) {
b384cf18
SR
1095 case CSR_PRIORITY_BUDGET:
1096 if (!card->priority_budget_implemented) {
1097 rcode = RCODE_ADDRESS_ERROR;
1098 break;
1099 }
df561f66 1100 fallthrough;
3e07ec0e 1101
506f1a31 1102 case CSR_NODE_IDS:
65b2742a
SR
1103 /*
1104 * per IEEE 1394-2008 8.3.22.3, not IEEE 1394.1-2004 3.2.8
1105 * and 9.6, but interoperable with IEEE 1394.1-2004 bridges
1106 */
df561f66 1107 fallthrough;
b384cf18
SR
1108
1109 case CSR_STATE_CLEAR:
1110 case CSR_STATE_SET:
1111 case CSR_CYCLE_TIME:
1112 case CSR_BUS_TIME:
1113 case CSR_BUSY_TIMEOUT:
506f1a31 1114 if (tcode == TCODE_READ_QUADLET_REQUEST)
0fcff4e3 1115 *data = cpu_to_be32(card->driver->read_csr(card, reg));
506f1a31 1116 else if (tcode == TCODE_WRITE_QUADLET_REQUEST)
0fcff4e3 1117 card->driver->write_csr(card, reg, be32_to_cpu(*data));
506f1a31
CL
1118 else
1119 rcode = RCODE_TYPE_ERROR;
1120 break;
1121
446eba0d 1122 case CSR_RESET_START:
7e0e314f 1123 if (tcode == TCODE_WRITE_QUADLET_REQUEST)
0fcff4e3
SR
1124 card->driver->write_csr(card, CSR_STATE_CLEAR,
1125 CSR_STATE_BIT_ABDICATE);
7e0e314f 1126 else
446eba0d
CL
1127 rcode = RCODE_TYPE_ERROR;
1128 break;
1129
8e4b50f9
CL
1130 case CSR_SPLIT_TIMEOUT_HI:
1131 if (tcode == TCODE_READ_QUADLET_REQUEST) {
1132 *data = cpu_to_be32(card->split_timeout_hi);
1133 } else if (tcode == TCODE_WRITE_QUADLET_REQUEST) {
1134 spin_lock_irqsave(&card->lock, flags);
1135 card->split_timeout_hi = be32_to_cpu(*data) & 7;
1136 update_split_timeout(card);
1137 spin_unlock_irqrestore(&card->lock, flags);
1138 } else {
1139 rcode = RCODE_TYPE_ERROR;
1140 }
1141 break;
1142
1143 case CSR_SPLIT_TIMEOUT_LO:
1144 if (tcode == TCODE_READ_QUADLET_REQUEST) {
1145 *data = cpu_to_be32(card->split_timeout_lo);
1146 } else if (tcode == TCODE_WRITE_QUADLET_REQUEST) {
1147 spin_lock_irqsave(&card->lock, flags);
1148 card->split_timeout_lo =
1149 be32_to_cpu(*data) & 0xfff80000;
1150 update_split_timeout(card);
1151 spin_unlock_irqrestore(&card->lock, flags);
1152 } else {
1153 rcode = RCODE_TYPE_ERROR;
1154 }
1155 break;
1156
3d1f46eb
CL
1157 case CSR_MAINT_UTILITY:
1158 if (tcode == TCODE_READ_QUADLET_REQUEST)
1159 *data = card->maint_utility_register;
1160 else if (tcode == TCODE_WRITE_QUADLET_REQUEST)
1161 card->maint_utility_register = *data;
1162 else
1163 rcode = RCODE_TYPE_ERROR;
1164 break;
1165
e534fe16
SR
1166 case CSR_BROADCAST_CHANNEL:
1167 if (tcode == TCODE_READ_QUADLET_REQUEST)
1168 *data = cpu_to_be32(card->broadcast_channel);
1169 else if (tcode == TCODE_WRITE_QUADLET_REQUEST)
1170 card->broadcast_channel =
1171 (be32_to_cpu(*data) & BROADCAST_CHANNEL_VALID) |
1172 BROADCAST_CHANNEL_INITIAL;
1173 else
1174 rcode = RCODE_TYPE_ERROR;
d60d7f1d
KH
1175 break;
1176
1177 case CSR_BUS_MANAGER_ID:
1178 case CSR_BANDWIDTH_AVAILABLE:
1179 case CSR_CHANNELS_AVAILABLE_HI:
1180 case CSR_CHANNELS_AVAILABLE_LO:
c781c06d
KH
1181 /*
1182 * FIXME: these are handled by the OHCI hardware and
d60d7f1d
KH
1183 * the stack never sees these request. If we add
1184 * support for a new type of controller that doesn't
1185 * handle this in hardware we need to deal with these
c781c06d
KH
1186 * transactions.
1187 */
d60d7f1d
KH
1188 BUG();
1189 break;
1190
d60d7f1d 1191 default:
e534fe16 1192 rcode = RCODE_ADDRESS_ERROR;
d60d7f1d
KH
1193 break;
1194 }
e534fe16
SR
1195
1196 fw_send_response(card, request, rcode);
d60d7f1d
KH
1197}
1198
1199static struct fw_address_handler registers = {
1200 .length = 0x400,
1201 .address_callback = handle_registers,
1202};
1203
f07d42ac
CL
1204static void handle_low_memory(struct fw_card *card, struct fw_request *request,
1205 int tcode, int destination, int source, int generation,
1206 unsigned long long offset, void *payload, size_t length,
1207 void *callback_data)
1208{
1209 /*
1210 * This catches requests not handled by the physical DMA unit,
1211 * i.e., wrong transaction types or unauthorized source nodes.
1212 */
1213 fw_send_response(card, request, RCODE_TYPE_ERROR);
1214}
1215
1216static struct fw_address_handler low_memory = {
fcd46b34 1217 .length = FW_MAX_PHYSICAL_RANGE,
f07d42ac
CL
1218 .address_callback = handle_low_memory,
1219};
1220
3038e353
KH
1221MODULE_AUTHOR("Kristian Hoegsberg <krh@bitplanet.net>");
1222MODULE_DESCRIPTION("Core IEEE1394 transaction logic");
1223MODULE_LICENSE("GPL");
1224
937f6879 1225static const u32 vendor_textual_descriptor[] = {
3038e353 1226 /* textual descriptor leaf () */
937f6879 1227 0x00060000,
3038e353
KH
1228 0x00000000,
1229 0x00000000,
1230 0x4c696e75, /* L i n u */
1231 0x78204669, /* x F i */
1232 0x72657769, /* r e w i */
937f6879 1233 0x72650000, /* r e */
3038e353
KH
1234};
1235
937f6879
KH
1236static const u32 model_textual_descriptor[] = {
1237 /* model descriptor leaf () */
1238 0x00030000,
1239 0x00000000,
1240 0x00000000,
1241 0x4a756a75, /* J u j u */
1242};
1243
1244static struct fw_descriptor vendor_id_descriptor = {
1245 .length = ARRAY_SIZE(vendor_textual_descriptor),
d71e6a11 1246 .immediate = 0x03001f11,
3038e353 1247 .key = 0x81000000,
937f6879
KH
1248 .data = vendor_textual_descriptor,
1249};
1250
1251static struct fw_descriptor model_id_descriptor = {
1252 .length = ARRAY_SIZE(model_textual_descriptor),
d71e6a11 1253 .immediate = 0x17023901,
937f6879
KH
1254 .key = 0x81000000,
1255 .data = model_textual_descriptor,
3038e353
KH
1256};
1257
3038e353
KH
1258static int __init fw_core_init(void)
1259{
2dbd7d7e 1260 int ret;
3038e353 1261
4e6b9319 1262 fw_workqueue = alloc_workqueue("firewire", WQ_MEM_RECLAIM, 0);
105e53f8 1263 if (!fw_workqueue)
6ea9e7bb
SR
1264 return -ENOMEM;
1265
2dbd7d7e 1266 ret = bus_register(&fw_bus_type);
6ea9e7bb 1267 if (ret < 0) {
105e53f8 1268 destroy_workqueue(fw_workqueue);
2dbd7d7e 1269 return ret;
6ea9e7bb 1270 }
3038e353 1271
a3aca3da
KH
1272 fw_cdev_major = register_chrdev(0, "firewire", &fw_device_ops);
1273 if (fw_cdev_major < 0) {
1274 bus_unregister(&fw_bus_type);
105e53f8 1275 destroy_workqueue(fw_workqueue);
a3aca3da
KH
1276 return fw_cdev_major;
1277 }
1278
c490a6de
SR
1279 fw_core_add_address_handler(&topology_map, &topology_map_region);
1280 fw_core_add_address_handler(&registers, &registers_region);
f07d42ac 1281 fw_core_add_address_handler(&low_memory, &low_memory_region);
c490a6de
SR
1282 fw_core_add_descriptor(&vendor_id_descriptor);
1283 fw_core_add_descriptor(&model_id_descriptor);
3038e353
KH
1284
1285 return 0;
1286}
1287
1288static void __exit fw_core_cleanup(void)
1289{
a3aca3da 1290 unregister_chrdev(fw_cdev_major, "firewire");
3038e353 1291 bus_unregister(&fw_bus_type);
105e53f8 1292 destroy_workqueue(fw_workqueue);
d6053e08 1293 idr_destroy(&fw_device_idr);
3038e353
KH
1294}
1295
1296module_init(fw_core_init);
1297module_exit(fw_core_cleanup);