]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blob - drivers/thunderbolt/xdomain.c
UBUNTU: upstream stable to v4.14.156, v4.19.86
[mirror_ubuntu-bionic-kernel.git] / drivers / thunderbolt / xdomain.c
1 /*
2 * Thunderbolt XDomain discovery protocol support
3 *
4 * Copyright (C) 2017, Intel Corporation
5 * Authors: Michael Jamet <michael.jamet@intel.com>
6 * Mika Westerberg <mika.westerberg@linux.intel.com>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2 as
10 * published by the Free Software Foundation.
11 */
12
13 #include <linux/device.h>
14 #include <linux/kmod.h>
15 #include <linux/module.h>
16 #include <linux/pm_runtime.h>
17 #include <linux/utsname.h>
18 #include <linux/uuid.h>
19 #include <linux/workqueue.h>
20
21 #include "tb.h"
22
23 #define XDOMAIN_DEFAULT_TIMEOUT 5000 /* ms */
24 #define XDOMAIN_PROPERTIES_RETRIES 60
25 #define XDOMAIN_PROPERTIES_CHANGED_RETRIES 10
26
27 struct xdomain_request_work {
28 struct work_struct work;
29 struct tb_xdp_header *pkg;
30 struct tb *tb;
31 };
32
33 /* Serializes access to the properties and protocol handlers below */
34 static DEFINE_MUTEX(xdomain_lock);
35
36 /* Properties exposed to the remote domains */
37 static struct tb_property_dir *xdomain_property_dir;
38 static u32 *xdomain_property_block;
39 static u32 xdomain_property_block_len;
40 static u32 xdomain_property_block_gen;
41
42 /* Additional protocol handlers */
43 static LIST_HEAD(protocol_handlers);
44
45 /* UUID for XDomain discovery protocol: b638d70e-42ff-40bb-97c2-90e2c0b2ff07 */
46 static const uuid_t tb_xdp_uuid =
47 UUID_INIT(0xb638d70e, 0x42ff, 0x40bb,
48 0x97, 0xc2, 0x90, 0xe2, 0xc0, 0xb2, 0xff, 0x07);
49
50 static bool tb_xdomain_match(const struct tb_cfg_request *req,
51 const struct ctl_pkg *pkg)
52 {
53 switch (pkg->frame.eof) {
54 case TB_CFG_PKG_ERROR:
55 return true;
56
57 case TB_CFG_PKG_XDOMAIN_RESP: {
58 const struct tb_xdp_header *res_hdr = pkg->buffer;
59 const struct tb_xdp_header *req_hdr = req->request;
60
61 if (pkg->frame.size < req->response_size / 4)
62 return false;
63
64 /* Make sure route matches */
65 if ((res_hdr->xd_hdr.route_hi & ~BIT(31)) !=
66 req_hdr->xd_hdr.route_hi)
67 return false;
68 if ((res_hdr->xd_hdr.route_lo) != req_hdr->xd_hdr.route_lo)
69 return false;
70
71 /* Check that the XDomain protocol matches */
72 if (!uuid_equal(&res_hdr->uuid, &req_hdr->uuid))
73 return false;
74
75 return true;
76 }
77
78 default:
79 return false;
80 }
81 }
82
83 static bool tb_xdomain_copy(struct tb_cfg_request *req,
84 const struct ctl_pkg *pkg)
85 {
86 memcpy(req->response, pkg->buffer, req->response_size);
87 req->result.err = 0;
88 return true;
89 }
90
91 static void response_ready(void *data)
92 {
93 tb_cfg_request_put(data);
94 }
95
96 static int __tb_xdomain_response(struct tb_ctl *ctl, const void *response,
97 size_t size, enum tb_cfg_pkg_type type)
98 {
99 struct tb_cfg_request *req;
100
101 req = tb_cfg_request_alloc();
102 if (!req)
103 return -ENOMEM;
104
105 req->match = tb_xdomain_match;
106 req->copy = tb_xdomain_copy;
107 req->request = response;
108 req->request_size = size;
109 req->request_type = type;
110
111 return tb_cfg_request(ctl, req, response_ready, req);
112 }
113
114 /**
115 * tb_xdomain_response() - Send a XDomain response message
116 * @xd: XDomain to send the message
117 * @response: Response to send
118 * @size: Size of the response
119 * @type: PDF type of the response
120 *
121 * This can be used to send a XDomain response message to the other
122 * domain. No response for the message is expected.
123 *
124 * Return: %0 in case of success and negative errno in case of failure
125 */
126 int tb_xdomain_response(struct tb_xdomain *xd, const void *response,
127 size_t size, enum tb_cfg_pkg_type type)
128 {
129 return __tb_xdomain_response(xd->tb->ctl, response, size, type);
130 }
131 EXPORT_SYMBOL_GPL(tb_xdomain_response);
132
133 static int __tb_xdomain_request(struct tb_ctl *ctl, const void *request,
134 size_t request_size, enum tb_cfg_pkg_type request_type, void *response,
135 size_t response_size, enum tb_cfg_pkg_type response_type,
136 unsigned int timeout_msec)
137 {
138 struct tb_cfg_request *req;
139 struct tb_cfg_result res;
140
141 req = tb_cfg_request_alloc();
142 if (!req)
143 return -ENOMEM;
144
145 req->match = tb_xdomain_match;
146 req->copy = tb_xdomain_copy;
147 req->request = request;
148 req->request_size = request_size;
149 req->request_type = request_type;
150 req->response = response;
151 req->response_size = response_size;
152 req->response_type = response_type;
153
154 res = tb_cfg_request_sync(ctl, req, timeout_msec);
155
156 tb_cfg_request_put(req);
157
158 return res.err == 1 ? -EIO : res.err;
159 }
160
161 /**
162 * tb_xdomain_request() - Send a XDomain request
163 * @xd: XDomain to send the request
164 * @request: Request to send
165 * @request_size: Size of the request in bytes
166 * @request_type: PDF type of the request
167 * @response: Response is copied here
168 * @response_size: Expected size of the response in bytes
169 * @response_type: Expected PDF type of the response
170 * @timeout_msec: Timeout in milliseconds to wait for the response
171 *
172 * This function can be used to send XDomain control channel messages to
173 * the other domain. The function waits until the response is received
174 * or when timeout triggers. Whichever comes first.
175 *
176 * Return: %0 in case of success and negative errno in case of failure
177 */
178 int tb_xdomain_request(struct tb_xdomain *xd, const void *request,
179 size_t request_size, enum tb_cfg_pkg_type request_type,
180 void *response, size_t response_size,
181 enum tb_cfg_pkg_type response_type, unsigned int timeout_msec)
182 {
183 return __tb_xdomain_request(xd->tb->ctl, request, request_size,
184 request_type, response, response_size,
185 response_type, timeout_msec);
186 }
187 EXPORT_SYMBOL_GPL(tb_xdomain_request);
188
189 static inline void tb_xdp_fill_header(struct tb_xdp_header *hdr, u64 route,
190 u8 sequence, enum tb_xdp_type type, size_t size)
191 {
192 u32 length_sn;
193
194 length_sn = (size - sizeof(hdr->xd_hdr)) / 4;
195 length_sn |= (sequence << TB_XDOMAIN_SN_SHIFT) & TB_XDOMAIN_SN_MASK;
196
197 hdr->xd_hdr.route_hi = upper_32_bits(route);
198 hdr->xd_hdr.route_lo = lower_32_bits(route);
199 hdr->xd_hdr.length_sn = length_sn;
200 hdr->type = type;
201 memcpy(&hdr->uuid, &tb_xdp_uuid, sizeof(tb_xdp_uuid));
202 }
203
204 static int tb_xdp_handle_error(const struct tb_xdp_header *hdr)
205 {
206 const struct tb_xdp_error_response *error;
207
208 if (hdr->type != ERROR_RESPONSE)
209 return 0;
210
211 error = (const struct tb_xdp_error_response *)hdr;
212
213 switch (error->error) {
214 case ERROR_UNKNOWN_PACKET:
215 case ERROR_UNKNOWN_DOMAIN:
216 return -EIO;
217 case ERROR_NOT_SUPPORTED:
218 return -ENOTSUPP;
219 case ERROR_NOT_READY:
220 return -EAGAIN;
221 default:
222 break;
223 }
224
225 return 0;
226 }
227
228 static int tb_xdp_error_response(struct tb_ctl *ctl, u64 route, u8 sequence,
229 enum tb_xdp_error error)
230 {
231 struct tb_xdp_error_response res;
232
233 memset(&res, 0, sizeof(res));
234 tb_xdp_fill_header(&res.hdr, route, sequence, ERROR_RESPONSE,
235 sizeof(res));
236 res.error = error;
237
238 return __tb_xdomain_response(ctl, &res, sizeof(res),
239 TB_CFG_PKG_XDOMAIN_RESP);
240 }
241
242 static int tb_xdp_properties_request(struct tb_ctl *ctl, u64 route,
243 const uuid_t *src_uuid, const uuid_t *dst_uuid, int retry,
244 u32 **block, u32 *generation)
245 {
246 struct tb_xdp_properties_response *res;
247 struct tb_xdp_properties req;
248 u16 data_len, len;
249 size_t total_size;
250 u32 *data = NULL;
251 int ret;
252
253 total_size = sizeof(*res) + TB_XDP_PROPERTIES_MAX_DATA_LENGTH * 4;
254 res = kzalloc(total_size, GFP_KERNEL);
255 if (!res)
256 return -ENOMEM;
257
258 memset(&req, 0, sizeof(req));
259 tb_xdp_fill_header(&req.hdr, route, retry % 4, PROPERTIES_REQUEST,
260 sizeof(req));
261 memcpy(&req.src_uuid, src_uuid, sizeof(*src_uuid));
262 memcpy(&req.dst_uuid, dst_uuid, sizeof(*dst_uuid));
263
264 len = 0;
265 data_len = 0;
266
267 do {
268 ret = __tb_xdomain_request(ctl, &req, sizeof(req),
269 TB_CFG_PKG_XDOMAIN_REQ, res,
270 total_size, TB_CFG_PKG_XDOMAIN_RESP,
271 XDOMAIN_DEFAULT_TIMEOUT);
272 if (ret)
273 goto err;
274
275 ret = tb_xdp_handle_error(&res->hdr);
276 if (ret)
277 goto err;
278
279 /*
280 * Package length includes the whole payload without the
281 * XDomain header. Validate first that the package is at
282 * least size of the response structure.
283 */
284 len = res->hdr.xd_hdr.length_sn & TB_XDOMAIN_LENGTH_MASK;
285 if (len < sizeof(*res) / 4) {
286 ret = -EINVAL;
287 goto err;
288 }
289
290 len += sizeof(res->hdr.xd_hdr) / 4;
291 len -= sizeof(*res) / 4;
292
293 if (res->offset != req.offset) {
294 ret = -EINVAL;
295 goto err;
296 }
297
298 /*
299 * First time allocate block that has enough space for
300 * the whole properties block.
301 */
302 if (!data) {
303 data_len = res->data_length;
304 if (data_len > TB_XDP_PROPERTIES_MAX_LENGTH) {
305 ret = -E2BIG;
306 goto err;
307 }
308
309 data = kcalloc(data_len, sizeof(u32), GFP_KERNEL);
310 if (!data) {
311 ret = -ENOMEM;
312 goto err;
313 }
314 }
315
316 memcpy(data + req.offset, res->data, len * 4);
317 req.offset += len;
318 } while (!data_len || req.offset < data_len);
319
320 *block = data;
321 *generation = res->generation;
322
323 kfree(res);
324
325 return data_len;
326
327 err:
328 kfree(data);
329 kfree(res);
330
331 return ret;
332 }
333
334 static int tb_xdp_properties_response(struct tb *tb, struct tb_ctl *ctl,
335 u64 route, u8 sequence, const uuid_t *src_uuid,
336 const struct tb_xdp_properties *req)
337 {
338 struct tb_xdp_properties_response *res;
339 size_t total_size;
340 u16 len;
341 int ret;
342
343 /*
344 * Currently we expect all requests to be directed to us. The
345 * protocol supports forwarding, though which we might add
346 * support later on.
347 */
348 if (!uuid_equal(src_uuid, &req->dst_uuid)) {
349 tb_xdp_error_response(ctl, route, sequence,
350 ERROR_UNKNOWN_DOMAIN);
351 return 0;
352 }
353
354 mutex_lock(&xdomain_lock);
355
356 if (req->offset >= xdomain_property_block_len) {
357 mutex_unlock(&xdomain_lock);
358 return -EINVAL;
359 }
360
361 len = xdomain_property_block_len - req->offset;
362 len = min_t(u16, len, TB_XDP_PROPERTIES_MAX_DATA_LENGTH);
363 total_size = sizeof(*res) + len * 4;
364
365 res = kzalloc(total_size, GFP_KERNEL);
366 if (!res) {
367 mutex_unlock(&xdomain_lock);
368 return -ENOMEM;
369 }
370
371 tb_xdp_fill_header(&res->hdr, route, sequence, PROPERTIES_RESPONSE,
372 total_size);
373 res->generation = xdomain_property_block_gen;
374 res->data_length = xdomain_property_block_len;
375 res->offset = req->offset;
376 uuid_copy(&res->src_uuid, src_uuid);
377 uuid_copy(&res->dst_uuid, &req->src_uuid);
378 memcpy(res->data, &xdomain_property_block[req->offset], len * 4);
379
380 mutex_unlock(&xdomain_lock);
381
382 ret = __tb_xdomain_response(ctl, res, total_size,
383 TB_CFG_PKG_XDOMAIN_RESP);
384
385 kfree(res);
386 return ret;
387 }
388
389 static int tb_xdp_properties_changed_request(struct tb_ctl *ctl, u64 route,
390 int retry, const uuid_t *uuid)
391 {
392 struct tb_xdp_properties_changed_response res;
393 struct tb_xdp_properties_changed req;
394 int ret;
395
396 memset(&req, 0, sizeof(req));
397 tb_xdp_fill_header(&req.hdr, route, retry % 4,
398 PROPERTIES_CHANGED_REQUEST, sizeof(req));
399 uuid_copy(&req.src_uuid, uuid);
400
401 memset(&res, 0, sizeof(res));
402 ret = __tb_xdomain_request(ctl, &req, sizeof(req),
403 TB_CFG_PKG_XDOMAIN_REQ, &res, sizeof(res),
404 TB_CFG_PKG_XDOMAIN_RESP,
405 XDOMAIN_DEFAULT_TIMEOUT);
406 if (ret)
407 return ret;
408
409 return tb_xdp_handle_error(&res.hdr);
410 }
411
412 static int
413 tb_xdp_properties_changed_response(struct tb_ctl *ctl, u64 route, u8 sequence)
414 {
415 struct tb_xdp_properties_changed_response res;
416
417 memset(&res, 0, sizeof(res));
418 tb_xdp_fill_header(&res.hdr, route, sequence,
419 PROPERTIES_CHANGED_RESPONSE, sizeof(res));
420 return __tb_xdomain_response(ctl, &res, sizeof(res),
421 TB_CFG_PKG_XDOMAIN_RESP);
422 }
423
424 /**
425 * tb_register_protocol_handler() - Register protocol handler
426 * @handler: Handler to register
427 *
428 * This allows XDomain service drivers to hook into incoming XDomain
429 * messages. After this function is called the service driver needs to
430 * be able to handle calls to callback whenever a package with the
431 * registered protocol is received.
432 */
433 int tb_register_protocol_handler(struct tb_protocol_handler *handler)
434 {
435 if (!handler->uuid || !handler->callback)
436 return -EINVAL;
437 if (uuid_equal(handler->uuid, &tb_xdp_uuid))
438 return -EINVAL;
439
440 mutex_lock(&xdomain_lock);
441 list_add_tail(&handler->list, &protocol_handlers);
442 mutex_unlock(&xdomain_lock);
443
444 return 0;
445 }
446 EXPORT_SYMBOL_GPL(tb_register_protocol_handler);
447
448 /**
449 * tb_unregister_protocol_handler() - Unregister protocol handler
450 * @handler: Handler to unregister
451 *
452 * Removes the previously registered protocol handler.
453 */
454 void tb_unregister_protocol_handler(struct tb_protocol_handler *handler)
455 {
456 mutex_lock(&xdomain_lock);
457 list_del_init(&handler->list);
458 mutex_unlock(&xdomain_lock);
459 }
460 EXPORT_SYMBOL_GPL(tb_unregister_protocol_handler);
461
462 static void tb_xdp_handle_request(struct work_struct *work)
463 {
464 struct xdomain_request_work *xw = container_of(work, typeof(*xw), work);
465 const struct tb_xdp_header *pkg = xw->pkg;
466 const struct tb_xdomain_header *xhdr = &pkg->xd_hdr;
467 struct tb *tb = xw->tb;
468 struct tb_ctl *ctl = tb->ctl;
469 const uuid_t *uuid;
470 int ret = 0;
471 u32 sequence;
472 u64 route;
473
474 route = ((u64)xhdr->route_hi << 32 | xhdr->route_lo) & ~BIT_ULL(63);
475 sequence = xhdr->length_sn & TB_XDOMAIN_SN_MASK;
476 sequence >>= TB_XDOMAIN_SN_SHIFT;
477
478 mutex_lock(&tb->lock);
479 if (tb->root_switch)
480 uuid = tb->root_switch->uuid;
481 else
482 uuid = NULL;
483 mutex_unlock(&tb->lock);
484
485 if (!uuid) {
486 tb_xdp_error_response(ctl, route, sequence, ERROR_NOT_READY);
487 goto out;
488 }
489
490 switch (pkg->type) {
491 case PROPERTIES_REQUEST:
492 ret = tb_xdp_properties_response(tb, ctl, route, sequence, uuid,
493 (const struct tb_xdp_properties *)pkg);
494 break;
495
496 case PROPERTIES_CHANGED_REQUEST: {
497 const struct tb_xdp_properties_changed *xchg =
498 (const struct tb_xdp_properties_changed *)pkg;
499 struct tb_xdomain *xd;
500
501 ret = tb_xdp_properties_changed_response(ctl, route, sequence);
502
503 /*
504 * Since the properties have been changed, let's update
505 * the xdomain related to this connection as well in
506 * case there is a change in services it offers.
507 */
508 xd = tb_xdomain_find_by_uuid_locked(tb, &xchg->src_uuid);
509 if (xd) {
510 queue_delayed_work(tb->wq, &xd->get_properties_work,
511 msecs_to_jiffies(50));
512 tb_xdomain_put(xd);
513 }
514
515 break;
516 }
517
518 default:
519 break;
520 }
521
522 if (ret) {
523 tb_warn(tb, "failed to send XDomain response for %#x\n",
524 pkg->type);
525 }
526
527 out:
528 kfree(xw->pkg);
529 kfree(xw);
530 }
531
532 static void
533 tb_xdp_schedule_request(struct tb *tb, const struct tb_xdp_header *hdr,
534 size_t size)
535 {
536 struct xdomain_request_work *xw;
537
538 xw = kmalloc(sizeof(*xw), GFP_KERNEL);
539 if (!xw)
540 return;
541
542 INIT_WORK(&xw->work, tb_xdp_handle_request);
543 xw->pkg = kmemdup(hdr, size, GFP_KERNEL);
544 xw->tb = tb;
545
546 queue_work(tb->wq, &xw->work);
547 }
548
549 /**
550 * tb_register_service_driver() - Register XDomain service driver
551 * @drv: Driver to register
552 *
553 * Registers new service driver from @drv to the bus.
554 */
555 int tb_register_service_driver(struct tb_service_driver *drv)
556 {
557 drv->driver.bus = &tb_bus_type;
558 return driver_register(&drv->driver);
559 }
560 EXPORT_SYMBOL_GPL(tb_register_service_driver);
561
562 /**
563 * tb_unregister_service_driver() - Unregister XDomain service driver
564 * @xdrv: Driver to unregister
565 *
566 * Unregisters XDomain service driver from the bus.
567 */
568 void tb_unregister_service_driver(struct tb_service_driver *drv)
569 {
570 driver_unregister(&drv->driver);
571 }
572 EXPORT_SYMBOL_GPL(tb_unregister_service_driver);
573
574 static ssize_t key_show(struct device *dev, struct device_attribute *attr,
575 char *buf)
576 {
577 struct tb_service *svc = container_of(dev, struct tb_service, dev);
578
579 /*
580 * It should be null terminated but anything else is pretty much
581 * allowed.
582 */
583 return sprintf(buf, "%*pEp\n", (int)strlen(svc->key), svc->key);
584 }
585 static DEVICE_ATTR_RO(key);
586
587 static int get_modalias(struct tb_service *svc, char *buf, size_t size)
588 {
589 return snprintf(buf, size, "tbsvc:k%sp%08Xv%08Xr%08X", svc->key,
590 svc->prtcid, svc->prtcvers, svc->prtcrevs);
591 }
592
593 static ssize_t modalias_show(struct device *dev, struct device_attribute *attr,
594 char *buf)
595 {
596 struct tb_service *svc = container_of(dev, struct tb_service, dev);
597
598 /* Full buffer size except new line and null termination */
599 get_modalias(svc, buf, PAGE_SIZE - 2);
600 return sprintf(buf, "%s\n", buf);
601 }
602 static DEVICE_ATTR_RO(modalias);
603
604 static ssize_t prtcid_show(struct device *dev, struct device_attribute *attr,
605 char *buf)
606 {
607 struct tb_service *svc = container_of(dev, struct tb_service, dev);
608
609 return sprintf(buf, "%u\n", svc->prtcid);
610 }
611 static DEVICE_ATTR_RO(prtcid);
612
613 static ssize_t prtcvers_show(struct device *dev, struct device_attribute *attr,
614 char *buf)
615 {
616 struct tb_service *svc = container_of(dev, struct tb_service, dev);
617
618 return sprintf(buf, "%u\n", svc->prtcvers);
619 }
620 static DEVICE_ATTR_RO(prtcvers);
621
622 static ssize_t prtcrevs_show(struct device *dev, struct device_attribute *attr,
623 char *buf)
624 {
625 struct tb_service *svc = container_of(dev, struct tb_service, dev);
626
627 return sprintf(buf, "%u\n", svc->prtcrevs);
628 }
629 static DEVICE_ATTR_RO(prtcrevs);
630
631 static ssize_t prtcstns_show(struct device *dev, struct device_attribute *attr,
632 char *buf)
633 {
634 struct tb_service *svc = container_of(dev, struct tb_service, dev);
635
636 return sprintf(buf, "0x%08x\n", svc->prtcstns);
637 }
638 static DEVICE_ATTR_RO(prtcstns);
639
640 static struct attribute *tb_service_attrs[] = {
641 &dev_attr_key.attr,
642 &dev_attr_modalias.attr,
643 &dev_attr_prtcid.attr,
644 &dev_attr_prtcvers.attr,
645 &dev_attr_prtcrevs.attr,
646 &dev_attr_prtcstns.attr,
647 NULL,
648 };
649
650 static struct attribute_group tb_service_attr_group = {
651 .attrs = tb_service_attrs,
652 };
653
654 static const struct attribute_group *tb_service_attr_groups[] = {
655 &tb_service_attr_group,
656 NULL,
657 };
658
659 static int tb_service_uevent(struct device *dev, struct kobj_uevent_env *env)
660 {
661 struct tb_service *svc = container_of(dev, struct tb_service, dev);
662 char modalias[64];
663
664 get_modalias(svc, modalias, sizeof(modalias));
665 return add_uevent_var(env, "MODALIAS=%s", modalias);
666 }
667
668 static void tb_service_release(struct device *dev)
669 {
670 struct tb_service *svc = container_of(dev, struct tb_service, dev);
671 struct tb_xdomain *xd = tb_service_parent(svc);
672
673 ida_simple_remove(&xd->service_ids, svc->id);
674 kfree(svc->key);
675 kfree(svc);
676 }
677
678 struct device_type tb_service_type = {
679 .name = "thunderbolt_service",
680 .groups = tb_service_attr_groups,
681 .uevent = tb_service_uevent,
682 .release = tb_service_release,
683 };
684 EXPORT_SYMBOL_GPL(tb_service_type);
685
686 static int remove_missing_service(struct device *dev, void *data)
687 {
688 struct tb_xdomain *xd = data;
689 struct tb_service *svc;
690
691 svc = tb_to_service(dev);
692 if (!svc)
693 return 0;
694
695 if (!tb_property_find(xd->properties, svc->key,
696 TB_PROPERTY_TYPE_DIRECTORY))
697 device_unregister(dev);
698
699 return 0;
700 }
701
702 static int find_service(struct device *dev, void *data)
703 {
704 const struct tb_property *p = data;
705 struct tb_service *svc;
706
707 svc = tb_to_service(dev);
708 if (!svc)
709 return 0;
710
711 return !strcmp(svc->key, p->key);
712 }
713
714 static int populate_service(struct tb_service *svc,
715 struct tb_property *property)
716 {
717 struct tb_property_dir *dir = property->value.dir;
718 struct tb_property *p;
719
720 /* Fill in standard properties */
721 p = tb_property_find(dir, "prtcid", TB_PROPERTY_TYPE_VALUE);
722 if (p)
723 svc->prtcid = p->value.immediate;
724 p = tb_property_find(dir, "prtcvers", TB_PROPERTY_TYPE_VALUE);
725 if (p)
726 svc->prtcvers = p->value.immediate;
727 p = tb_property_find(dir, "prtcrevs", TB_PROPERTY_TYPE_VALUE);
728 if (p)
729 svc->prtcrevs = p->value.immediate;
730 p = tb_property_find(dir, "prtcstns", TB_PROPERTY_TYPE_VALUE);
731 if (p)
732 svc->prtcstns = p->value.immediate;
733
734 svc->key = kstrdup(property->key, GFP_KERNEL);
735 if (!svc->key)
736 return -ENOMEM;
737
738 return 0;
739 }
740
741 static void enumerate_services(struct tb_xdomain *xd)
742 {
743 struct tb_service *svc;
744 struct tb_property *p;
745 struct device *dev;
746 int id;
747
748 /*
749 * First remove all services that are not available anymore in
750 * the updated property block.
751 */
752 device_for_each_child_reverse(&xd->dev, xd, remove_missing_service);
753
754 /* Then re-enumerate properties creating new services as we go */
755 tb_property_for_each(xd->properties, p) {
756 if (p->type != TB_PROPERTY_TYPE_DIRECTORY)
757 continue;
758
759 /* If the service exists already we are fine */
760 dev = device_find_child(&xd->dev, p, find_service);
761 if (dev) {
762 put_device(dev);
763 continue;
764 }
765
766 svc = kzalloc(sizeof(*svc), GFP_KERNEL);
767 if (!svc)
768 break;
769
770 if (populate_service(svc, p)) {
771 kfree(svc);
772 break;
773 }
774
775 id = ida_simple_get(&xd->service_ids, 0, 0, GFP_KERNEL);
776 if (id < 0) {
777 kfree(svc);
778 break;
779 }
780 svc->id = id;
781 svc->dev.bus = &tb_bus_type;
782 svc->dev.type = &tb_service_type;
783 svc->dev.parent = &xd->dev;
784 dev_set_name(&svc->dev, "%s.%d", dev_name(&xd->dev), svc->id);
785
786 if (device_register(&svc->dev)) {
787 put_device(&svc->dev);
788 break;
789 }
790 }
791 }
792
793 static int populate_properties(struct tb_xdomain *xd,
794 struct tb_property_dir *dir)
795 {
796 const struct tb_property *p;
797
798 /* Required properties */
799 p = tb_property_find(dir, "deviceid", TB_PROPERTY_TYPE_VALUE);
800 if (!p)
801 return -EINVAL;
802 xd->device = p->value.immediate;
803
804 p = tb_property_find(dir, "vendorid", TB_PROPERTY_TYPE_VALUE);
805 if (!p)
806 return -EINVAL;
807 xd->vendor = p->value.immediate;
808
809 kfree(xd->device_name);
810 xd->device_name = NULL;
811 kfree(xd->vendor_name);
812 xd->vendor_name = NULL;
813
814 /* Optional properties */
815 p = tb_property_find(dir, "deviceid", TB_PROPERTY_TYPE_TEXT);
816 if (p)
817 xd->device_name = kstrdup(p->value.text, GFP_KERNEL);
818 p = tb_property_find(dir, "vendorid", TB_PROPERTY_TYPE_TEXT);
819 if (p)
820 xd->vendor_name = kstrdup(p->value.text, GFP_KERNEL);
821
822 return 0;
823 }
824
825 /* Called with @xd->lock held */
826 static void tb_xdomain_restore_paths(struct tb_xdomain *xd)
827 {
828 if (!xd->resume)
829 return;
830
831 xd->resume = false;
832 if (xd->transmit_path) {
833 dev_dbg(&xd->dev, "re-establishing DMA path\n");
834 tb_domain_approve_xdomain_paths(xd->tb, xd);
835 }
836 }
837
838 static void tb_xdomain_get_properties(struct work_struct *work)
839 {
840 struct tb_xdomain *xd = container_of(work, typeof(*xd),
841 get_properties_work.work);
842 struct tb_property_dir *dir;
843 struct tb *tb = xd->tb;
844 bool update = false;
845 u32 *block = NULL;
846 u32 gen = 0;
847 int ret;
848
849 ret = tb_xdp_properties_request(tb->ctl, xd->route, xd->local_uuid,
850 xd->remote_uuid, xd->properties_retries,
851 &block, &gen);
852 if (ret < 0) {
853 if (xd->properties_retries-- > 0) {
854 queue_delayed_work(xd->tb->wq, &xd->get_properties_work,
855 msecs_to_jiffies(1000));
856 } else {
857 /* Give up now */
858 dev_err(&xd->dev,
859 "failed read XDomain properties from %pUb\n",
860 xd->remote_uuid);
861 }
862 return;
863 }
864
865 xd->properties_retries = XDOMAIN_PROPERTIES_RETRIES;
866
867 mutex_lock(&xd->lock);
868
869 /* Only accept newer generation properties */
870 if (xd->properties && gen <= xd->property_block_gen) {
871 /*
872 * On resume it is likely that the properties block is
873 * not changed (unless the other end added or removed
874 * services). However, we need to make sure the existing
875 * DMA paths are restored properly.
876 */
877 tb_xdomain_restore_paths(xd);
878 goto err_free_block;
879 }
880
881 dir = tb_property_parse_dir(block, ret);
882 if (!dir) {
883 dev_err(&xd->dev, "failed to parse XDomain properties\n");
884 goto err_free_block;
885 }
886
887 ret = populate_properties(xd, dir);
888 if (ret) {
889 dev_err(&xd->dev, "missing XDomain properties in response\n");
890 goto err_free_dir;
891 }
892
893 /* Release the existing one */
894 if (xd->properties) {
895 tb_property_free_dir(xd->properties);
896 update = true;
897 }
898
899 xd->properties = dir;
900 xd->property_block_gen = gen;
901
902 tb_xdomain_restore_paths(xd);
903
904 mutex_unlock(&xd->lock);
905
906 kfree(block);
907
908 /*
909 * Now the device should be ready enough so we can add it to the
910 * bus and let userspace know about it. If the device is already
911 * registered, we notify the userspace that it has changed.
912 */
913 if (!update) {
914 if (device_add(&xd->dev)) {
915 dev_err(&xd->dev, "failed to add XDomain device\n");
916 return;
917 }
918 } else {
919 kobject_uevent(&xd->dev.kobj, KOBJ_CHANGE);
920 }
921
922 enumerate_services(xd);
923 return;
924
925 err_free_dir:
926 tb_property_free_dir(dir);
927 err_free_block:
928 kfree(block);
929 mutex_unlock(&xd->lock);
930 }
931
932 static void tb_xdomain_properties_changed(struct work_struct *work)
933 {
934 struct tb_xdomain *xd = container_of(work, typeof(*xd),
935 properties_changed_work.work);
936 int ret;
937
938 ret = tb_xdp_properties_changed_request(xd->tb->ctl, xd->route,
939 xd->properties_changed_retries, xd->local_uuid);
940 if (ret) {
941 if (xd->properties_changed_retries-- > 0)
942 queue_delayed_work(xd->tb->wq,
943 &xd->properties_changed_work,
944 msecs_to_jiffies(1000));
945 return;
946 }
947
948 xd->properties_changed_retries = XDOMAIN_PROPERTIES_CHANGED_RETRIES;
949 }
950
951 static ssize_t device_show(struct device *dev, struct device_attribute *attr,
952 char *buf)
953 {
954 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
955
956 return sprintf(buf, "%#x\n", xd->device);
957 }
958 static DEVICE_ATTR_RO(device);
959
960 static ssize_t
961 device_name_show(struct device *dev, struct device_attribute *attr, char *buf)
962 {
963 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
964 int ret;
965
966 if (mutex_lock_interruptible(&xd->lock))
967 return -ERESTARTSYS;
968 ret = sprintf(buf, "%s\n", xd->device_name ? xd->device_name : "");
969 mutex_unlock(&xd->lock);
970
971 return ret;
972 }
973 static DEVICE_ATTR_RO(device_name);
974
975 static ssize_t vendor_show(struct device *dev, struct device_attribute *attr,
976 char *buf)
977 {
978 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
979
980 return sprintf(buf, "%#x\n", xd->vendor);
981 }
982 static DEVICE_ATTR_RO(vendor);
983
984 static ssize_t
985 vendor_name_show(struct device *dev, struct device_attribute *attr, char *buf)
986 {
987 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
988 int ret;
989
990 if (mutex_lock_interruptible(&xd->lock))
991 return -ERESTARTSYS;
992 ret = sprintf(buf, "%s\n", xd->vendor_name ? xd->vendor_name : "");
993 mutex_unlock(&xd->lock);
994
995 return ret;
996 }
997 static DEVICE_ATTR_RO(vendor_name);
998
999 static ssize_t unique_id_show(struct device *dev, struct device_attribute *attr,
1000 char *buf)
1001 {
1002 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
1003
1004 return sprintf(buf, "%pUb\n", xd->remote_uuid);
1005 }
1006 static DEVICE_ATTR_RO(unique_id);
1007
1008 static struct attribute *xdomain_attrs[] = {
1009 &dev_attr_device.attr,
1010 &dev_attr_device_name.attr,
1011 &dev_attr_unique_id.attr,
1012 &dev_attr_vendor.attr,
1013 &dev_attr_vendor_name.attr,
1014 NULL,
1015 };
1016
1017 static struct attribute_group xdomain_attr_group = {
1018 .attrs = xdomain_attrs,
1019 };
1020
1021 static const struct attribute_group *xdomain_attr_groups[] = {
1022 &xdomain_attr_group,
1023 NULL,
1024 };
1025
1026 static void tb_xdomain_release(struct device *dev)
1027 {
1028 struct tb_xdomain *xd = container_of(dev, struct tb_xdomain, dev);
1029
1030 put_device(xd->dev.parent);
1031
1032 tb_property_free_dir(xd->properties);
1033 ida_destroy(&xd->service_ids);
1034
1035 kfree(xd->local_uuid);
1036 kfree(xd->remote_uuid);
1037 kfree(xd->device_name);
1038 kfree(xd->vendor_name);
1039 kfree(xd);
1040 }
1041
1042 static void start_handshake(struct tb_xdomain *xd)
1043 {
1044 xd->properties_retries = XDOMAIN_PROPERTIES_RETRIES;
1045 xd->properties_changed_retries = XDOMAIN_PROPERTIES_CHANGED_RETRIES;
1046
1047 /* Start exchanging properties with the other host */
1048 queue_delayed_work(xd->tb->wq, &xd->properties_changed_work,
1049 msecs_to_jiffies(100));
1050 queue_delayed_work(xd->tb->wq, &xd->get_properties_work,
1051 msecs_to_jiffies(1000));
1052 }
1053
1054 static void stop_handshake(struct tb_xdomain *xd)
1055 {
1056 xd->properties_retries = 0;
1057 xd->properties_changed_retries = 0;
1058
1059 cancel_delayed_work_sync(&xd->get_properties_work);
1060 cancel_delayed_work_sync(&xd->properties_changed_work);
1061 }
1062
1063 static int __maybe_unused tb_xdomain_suspend(struct device *dev)
1064 {
1065 stop_handshake(tb_to_xdomain(dev));
1066 return 0;
1067 }
1068
1069 static int __maybe_unused tb_xdomain_resume(struct device *dev)
1070 {
1071 struct tb_xdomain *xd = tb_to_xdomain(dev);
1072
1073 /*
1074 * Ask tb_xdomain_get_properties() restore any existing DMA
1075 * paths after properties are re-read.
1076 */
1077 xd->resume = true;
1078 start_handshake(xd);
1079
1080 return 0;
1081 }
1082
1083 static const struct dev_pm_ops tb_xdomain_pm_ops = {
1084 SET_SYSTEM_SLEEP_PM_OPS(tb_xdomain_suspend, tb_xdomain_resume)
1085 };
1086
1087 struct device_type tb_xdomain_type = {
1088 .name = "thunderbolt_xdomain",
1089 .release = tb_xdomain_release,
1090 .pm = &tb_xdomain_pm_ops,
1091 };
1092 EXPORT_SYMBOL_GPL(tb_xdomain_type);
1093
1094 /**
1095 * tb_xdomain_alloc() - Allocate new XDomain object
1096 * @tb: Domain where the XDomain belongs
1097 * @parent: Parent device (the switch through the connection to the
1098 * other domain is reached).
1099 * @route: Route string used to reach the other domain
1100 * @local_uuid: Our local domain UUID
1101 * @remote_uuid: UUID of the other domain
1102 *
1103 * Allocates new XDomain structure and returns pointer to that. The
1104 * object must be released by calling tb_xdomain_put().
1105 */
1106 struct tb_xdomain *tb_xdomain_alloc(struct tb *tb, struct device *parent,
1107 u64 route, const uuid_t *local_uuid,
1108 const uuid_t *remote_uuid)
1109 {
1110 struct tb_xdomain *xd;
1111
1112 xd = kzalloc(sizeof(*xd), GFP_KERNEL);
1113 if (!xd)
1114 return NULL;
1115
1116 xd->tb = tb;
1117 xd->route = route;
1118 ida_init(&xd->service_ids);
1119 mutex_init(&xd->lock);
1120 INIT_DELAYED_WORK(&xd->get_properties_work, tb_xdomain_get_properties);
1121 INIT_DELAYED_WORK(&xd->properties_changed_work,
1122 tb_xdomain_properties_changed);
1123
1124 xd->local_uuid = kmemdup(local_uuid, sizeof(uuid_t), GFP_KERNEL);
1125 if (!xd->local_uuid)
1126 goto err_free;
1127
1128 xd->remote_uuid = kmemdup(remote_uuid, sizeof(uuid_t), GFP_KERNEL);
1129 if (!xd->remote_uuid)
1130 goto err_free_local_uuid;
1131
1132 device_initialize(&xd->dev);
1133 xd->dev.parent = get_device(parent);
1134 xd->dev.bus = &tb_bus_type;
1135 xd->dev.type = &tb_xdomain_type;
1136 xd->dev.groups = xdomain_attr_groups;
1137 dev_set_name(&xd->dev, "%u-%llx", tb->index, route);
1138
1139 /*
1140 * This keeps the DMA powered on as long as we have active
1141 * connection to another host.
1142 */
1143 pm_runtime_set_active(&xd->dev);
1144 pm_runtime_get_noresume(&xd->dev);
1145 pm_runtime_enable(&xd->dev);
1146
1147 return xd;
1148
1149 err_free_local_uuid:
1150 kfree(xd->local_uuid);
1151 err_free:
1152 kfree(xd);
1153
1154 return NULL;
1155 }
1156
1157 /**
1158 * tb_xdomain_add() - Add XDomain to the bus
1159 * @xd: XDomain to add
1160 *
1161 * This function starts XDomain discovery protocol handshake and
1162 * eventually adds the XDomain to the bus. After calling this function
1163 * the caller needs to call tb_xdomain_remove() in order to remove and
1164 * release the object regardless whether the handshake succeeded or not.
1165 */
1166 void tb_xdomain_add(struct tb_xdomain *xd)
1167 {
1168 /* Start exchanging properties with the other host */
1169 start_handshake(xd);
1170 }
1171
1172 static int unregister_service(struct device *dev, void *data)
1173 {
1174 device_unregister(dev);
1175 return 0;
1176 }
1177
1178 /**
1179 * tb_xdomain_remove() - Remove XDomain from the bus
1180 * @xd: XDomain to remove
1181 *
1182 * This will stop all ongoing configuration work and remove the XDomain
1183 * along with any services from the bus. When the last reference to @xd
1184 * is released the object will be released as well.
1185 */
1186 void tb_xdomain_remove(struct tb_xdomain *xd)
1187 {
1188 stop_handshake(xd);
1189
1190 device_for_each_child_reverse(&xd->dev, xd, unregister_service);
1191
1192 /*
1193 * Undo runtime PM here explicitly because it is possible that
1194 * the XDomain was never added to the bus and thus device_del()
1195 * is not called for it (device_del() would handle this otherwise).
1196 */
1197 pm_runtime_disable(&xd->dev);
1198 pm_runtime_put_noidle(&xd->dev);
1199 pm_runtime_set_suspended(&xd->dev);
1200
1201 if (!device_is_registered(&xd->dev))
1202 put_device(&xd->dev);
1203 else
1204 device_unregister(&xd->dev);
1205 }
1206
1207 /**
1208 * tb_xdomain_enable_paths() - Enable DMA paths for XDomain connection
1209 * @xd: XDomain connection
1210 * @transmit_path: HopID of the transmit path the other end is using to
1211 * send packets
1212 * @transmit_ring: DMA ring used to receive packets from the other end
1213 * @receive_path: HopID of the receive path the other end is using to
1214 * receive packets
1215 * @receive_ring: DMA ring used to send packets to the other end
1216 *
1217 * The function enables DMA paths accordingly so that after successful
1218 * return the caller can send and receive packets using high-speed DMA
1219 * path.
1220 *
1221 * Return: %0 in case of success and negative errno in case of error
1222 */
1223 int tb_xdomain_enable_paths(struct tb_xdomain *xd, u16 transmit_path,
1224 u16 transmit_ring, u16 receive_path,
1225 u16 receive_ring)
1226 {
1227 int ret;
1228
1229 mutex_lock(&xd->lock);
1230
1231 if (xd->transmit_path) {
1232 ret = xd->transmit_path == transmit_path ? 0 : -EBUSY;
1233 goto exit_unlock;
1234 }
1235
1236 xd->transmit_path = transmit_path;
1237 xd->transmit_ring = transmit_ring;
1238 xd->receive_path = receive_path;
1239 xd->receive_ring = receive_ring;
1240
1241 ret = tb_domain_approve_xdomain_paths(xd->tb, xd);
1242
1243 exit_unlock:
1244 mutex_unlock(&xd->lock);
1245
1246 return ret;
1247 }
1248 EXPORT_SYMBOL_GPL(tb_xdomain_enable_paths);
1249
1250 /**
1251 * tb_xdomain_disable_paths() - Disable DMA paths for XDomain connection
1252 * @xd: XDomain connection
1253 *
1254 * This does the opposite of tb_xdomain_enable_paths(). After call to
1255 * this the caller is not expected to use the rings anymore.
1256 *
1257 * Return: %0 in case of success and negative errno in case of error
1258 */
1259 int tb_xdomain_disable_paths(struct tb_xdomain *xd)
1260 {
1261 int ret = 0;
1262
1263 mutex_lock(&xd->lock);
1264 if (xd->transmit_path) {
1265 xd->transmit_path = 0;
1266 xd->transmit_ring = 0;
1267 xd->receive_path = 0;
1268 xd->receive_ring = 0;
1269
1270 ret = tb_domain_disconnect_xdomain_paths(xd->tb, xd);
1271 }
1272 mutex_unlock(&xd->lock);
1273
1274 return ret;
1275 }
1276 EXPORT_SYMBOL_GPL(tb_xdomain_disable_paths);
1277
1278 struct tb_xdomain_lookup {
1279 const uuid_t *uuid;
1280 u8 link;
1281 u8 depth;
1282 u64 route;
1283 };
1284
1285 static struct tb_xdomain *switch_find_xdomain(struct tb_switch *sw,
1286 const struct tb_xdomain_lookup *lookup)
1287 {
1288 int i;
1289
1290 for (i = 1; i <= sw->config.max_port_number; i++) {
1291 struct tb_port *port = &sw->ports[i];
1292 struct tb_xdomain *xd;
1293
1294 if (tb_is_upstream_port(port))
1295 continue;
1296
1297 if (port->xdomain) {
1298 xd = port->xdomain;
1299
1300 if (lookup->uuid) {
1301 if (uuid_equal(xd->remote_uuid, lookup->uuid))
1302 return xd;
1303 } else if (lookup->link &&
1304 lookup->link == xd->link &&
1305 lookup->depth == xd->depth) {
1306 return xd;
1307 } else if (lookup->route &&
1308 lookup->route == xd->route) {
1309 return xd;
1310 }
1311 } else if (port->remote) {
1312 xd = switch_find_xdomain(port->remote->sw, lookup);
1313 if (xd)
1314 return xd;
1315 }
1316 }
1317
1318 return NULL;
1319 }
1320
1321 /**
1322 * tb_xdomain_find_by_uuid() - Find an XDomain by UUID
1323 * @tb: Domain where the XDomain belongs to
1324 * @uuid: UUID to look for
1325 *
1326 * Finds XDomain by walking through the Thunderbolt topology below @tb.
1327 * The returned XDomain will have its reference count increased so the
1328 * caller needs to call tb_xdomain_put() when it is done with the
1329 * object.
1330 *
1331 * This will find all XDomains including the ones that are not yet added
1332 * to the bus (handshake is still in progress).
1333 *
1334 * The caller needs to hold @tb->lock.
1335 */
1336 struct tb_xdomain *tb_xdomain_find_by_uuid(struct tb *tb, const uuid_t *uuid)
1337 {
1338 struct tb_xdomain_lookup lookup;
1339 struct tb_xdomain *xd;
1340
1341 memset(&lookup, 0, sizeof(lookup));
1342 lookup.uuid = uuid;
1343
1344 xd = switch_find_xdomain(tb->root_switch, &lookup);
1345 return tb_xdomain_get(xd);
1346 }
1347 EXPORT_SYMBOL_GPL(tb_xdomain_find_by_uuid);
1348
1349 /**
1350 * tb_xdomain_find_by_link_depth() - Find an XDomain by link and depth
1351 * @tb: Domain where the XDomain belongs to
1352 * @link: Root switch link number
1353 * @depth: Depth in the link
1354 *
1355 * Finds XDomain by walking through the Thunderbolt topology below @tb.
1356 * The returned XDomain will have its reference count increased so the
1357 * caller needs to call tb_xdomain_put() when it is done with the
1358 * object.
1359 *
1360 * This will find all XDomains including the ones that are not yet added
1361 * to the bus (handshake is still in progress).
1362 *
1363 * The caller needs to hold @tb->lock.
1364 */
1365 struct tb_xdomain *tb_xdomain_find_by_link_depth(struct tb *tb, u8 link,
1366 u8 depth)
1367 {
1368 struct tb_xdomain_lookup lookup;
1369 struct tb_xdomain *xd;
1370
1371 memset(&lookup, 0, sizeof(lookup));
1372 lookup.link = link;
1373 lookup.depth = depth;
1374
1375 xd = switch_find_xdomain(tb->root_switch, &lookup);
1376 return tb_xdomain_get(xd);
1377 }
1378
1379 /**
1380 * tb_xdomain_find_by_route() - Find an XDomain by route string
1381 * @tb: Domain where the XDomain belongs to
1382 * @route: XDomain route string
1383 *
1384 * Finds XDomain by walking through the Thunderbolt topology below @tb.
1385 * The returned XDomain will have its reference count increased so the
1386 * caller needs to call tb_xdomain_put() when it is done with the
1387 * object.
1388 *
1389 * This will find all XDomains including the ones that are not yet added
1390 * to the bus (handshake is still in progress).
1391 *
1392 * The caller needs to hold @tb->lock.
1393 */
1394 struct tb_xdomain *tb_xdomain_find_by_route(struct tb *tb, u64 route)
1395 {
1396 struct tb_xdomain_lookup lookup;
1397 struct tb_xdomain *xd;
1398
1399 memset(&lookup, 0, sizeof(lookup));
1400 lookup.route = route;
1401
1402 xd = switch_find_xdomain(tb->root_switch, &lookup);
1403 return tb_xdomain_get(xd);
1404 }
1405 EXPORT_SYMBOL_GPL(tb_xdomain_find_by_route);
1406
1407 bool tb_xdomain_handle_request(struct tb *tb, enum tb_cfg_pkg_type type,
1408 const void *buf, size_t size)
1409 {
1410 const struct tb_protocol_handler *handler, *tmp;
1411 const struct tb_xdp_header *hdr = buf;
1412 unsigned int length;
1413 int ret = 0;
1414
1415 /* We expect the packet is at least size of the header */
1416 length = hdr->xd_hdr.length_sn & TB_XDOMAIN_LENGTH_MASK;
1417 if (length != size / 4 - sizeof(hdr->xd_hdr) / 4)
1418 return true;
1419 if (length < sizeof(*hdr) / 4 - sizeof(hdr->xd_hdr) / 4)
1420 return true;
1421
1422 /*
1423 * Handle XDomain discovery protocol packets directly here. For
1424 * other protocols (based on their UUID) we call registered
1425 * handlers in turn.
1426 */
1427 if (uuid_equal(&hdr->uuid, &tb_xdp_uuid)) {
1428 if (type == TB_CFG_PKG_XDOMAIN_REQ) {
1429 tb_xdp_schedule_request(tb, hdr, size);
1430 return true;
1431 }
1432 return false;
1433 }
1434
1435 mutex_lock(&xdomain_lock);
1436 list_for_each_entry_safe(handler, tmp, &protocol_handlers, list) {
1437 if (!uuid_equal(&hdr->uuid, handler->uuid))
1438 continue;
1439
1440 mutex_unlock(&xdomain_lock);
1441 ret = handler->callback(buf, size, handler->data);
1442 mutex_lock(&xdomain_lock);
1443
1444 if (ret)
1445 break;
1446 }
1447 mutex_unlock(&xdomain_lock);
1448
1449 return ret > 0;
1450 }
1451
1452 static int rebuild_property_block(void)
1453 {
1454 u32 *block, len;
1455 int ret;
1456
1457 ret = tb_property_format_dir(xdomain_property_dir, NULL, 0);
1458 if (ret < 0)
1459 return ret;
1460
1461 len = ret;
1462
1463 block = kcalloc(len, sizeof(u32), GFP_KERNEL);
1464 if (!block)
1465 return -ENOMEM;
1466
1467 ret = tb_property_format_dir(xdomain_property_dir, block, len);
1468 if (ret) {
1469 kfree(block);
1470 return ret;
1471 }
1472
1473 kfree(xdomain_property_block);
1474 xdomain_property_block = block;
1475 xdomain_property_block_len = len;
1476 xdomain_property_block_gen++;
1477
1478 return 0;
1479 }
1480
1481 static int update_xdomain(struct device *dev, void *data)
1482 {
1483 struct tb_xdomain *xd;
1484
1485 xd = tb_to_xdomain(dev);
1486 if (xd) {
1487 queue_delayed_work(xd->tb->wq, &xd->properties_changed_work,
1488 msecs_to_jiffies(50));
1489 }
1490
1491 return 0;
1492 }
1493
1494 static void update_all_xdomains(void)
1495 {
1496 bus_for_each_dev(&tb_bus_type, NULL, NULL, update_xdomain);
1497 }
1498
1499 static bool remove_directory(const char *key, const struct tb_property_dir *dir)
1500 {
1501 struct tb_property *p;
1502
1503 p = tb_property_find(xdomain_property_dir, key,
1504 TB_PROPERTY_TYPE_DIRECTORY);
1505 if (p && p->value.dir == dir) {
1506 tb_property_remove(p);
1507 return true;
1508 }
1509 return false;
1510 }
1511
1512 /**
1513 * tb_register_property_dir() - Register property directory to the host
1514 * @key: Key (name) of the directory to add
1515 * @dir: Directory to add
1516 *
1517 * Service drivers can use this function to add new property directory
1518 * to the host available properties. The other connected hosts are
1519 * notified so they can re-read properties of this host if they are
1520 * interested.
1521 *
1522 * Return: %0 on success and negative errno on failure
1523 */
1524 int tb_register_property_dir(const char *key, struct tb_property_dir *dir)
1525 {
1526 int ret;
1527
1528 if (WARN_ON(!xdomain_property_dir))
1529 return -EAGAIN;
1530
1531 if (!key || strlen(key) > 8)
1532 return -EINVAL;
1533
1534 mutex_lock(&xdomain_lock);
1535 if (tb_property_find(xdomain_property_dir, key,
1536 TB_PROPERTY_TYPE_DIRECTORY)) {
1537 ret = -EEXIST;
1538 goto err_unlock;
1539 }
1540
1541 ret = tb_property_add_dir(xdomain_property_dir, key, dir);
1542 if (ret)
1543 goto err_unlock;
1544
1545 ret = rebuild_property_block();
1546 if (ret) {
1547 remove_directory(key, dir);
1548 goto err_unlock;
1549 }
1550
1551 mutex_unlock(&xdomain_lock);
1552 update_all_xdomains();
1553 return 0;
1554
1555 err_unlock:
1556 mutex_unlock(&xdomain_lock);
1557 return ret;
1558 }
1559 EXPORT_SYMBOL_GPL(tb_register_property_dir);
1560
1561 /**
1562 * tb_unregister_property_dir() - Removes property directory from host
1563 * @key: Key (name) of the directory
1564 * @dir: Directory to remove
1565 *
1566 * This will remove the existing directory from this host and notify the
1567 * connected hosts about the change.
1568 */
1569 void tb_unregister_property_dir(const char *key, struct tb_property_dir *dir)
1570 {
1571 int ret = 0;
1572
1573 mutex_lock(&xdomain_lock);
1574 if (remove_directory(key, dir))
1575 ret = rebuild_property_block();
1576 mutex_unlock(&xdomain_lock);
1577
1578 if (!ret)
1579 update_all_xdomains();
1580 }
1581 EXPORT_SYMBOL_GPL(tb_unregister_property_dir);
1582
1583 int tb_xdomain_init(void)
1584 {
1585 int ret;
1586
1587 xdomain_property_dir = tb_property_create_dir(NULL);
1588 if (!xdomain_property_dir)
1589 return -ENOMEM;
1590
1591 /*
1592 * Initialize standard set of properties without any service
1593 * directories. Those will be added by service drivers
1594 * themselves when they are loaded.
1595 */
1596 tb_property_add_immediate(xdomain_property_dir, "vendorid",
1597 PCI_VENDOR_ID_INTEL);
1598 tb_property_add_text(xdomain_property_dir, "vendorid", "Intel Corp.");
1599 tb_property_add_immediate(xdomain_property_dir, "deviceid", 0x1);
1600 tb_property_add_text(xdomain_property_dir, "deviceid",
1601 utsname()->nodename);
1602 tb_property_add_immediate(xdomain_property_dir, "devicerv", 0x80000100);
1603
1604 ret = rebuild_property_block();
1605 if (ret) {
1606 tb_property_free_dir(xdomain_property_dir);
1607 xdomain_property_dir = NULL;
1608 }
1609
1610 return ret;
1611 }
1612
1613 void tb_xdomain_exit(void)
1614 {
1615 kfree(xdomain_property_block);
1616 tb_property_free_dir(xdomain_property_dir);
1617 }