1c167b9c7SMaximilian Luz // SPDX-License-Identifier: GPL-2.0+
2c167b9c7SMaximilian Luz /*
3c167b9c7SMaximilian Luz * SSH request transport layer.
4c167b9c7SMaximilian Luz *
5221756e6SMaximilian Luz * Copyright (C) 2019-2022 Maximilian Luz <[email protected]>
6c167b9c7SMaximilian Luz */
7c167b9c7SMaximilian Luz
8*5f60d5f6SAl Viro #include <linux/unaligned.h>
9c167b9c7SMaximilian Luz #include <linux/atomic.h>
10c167b9c7SMaximilian Luz #include <linux/completion.h>
1102be44f6SMaximilian Luz #include <linux/error-injection.h>
12c167b9c7SMaximilian Luz #include <linux/ktime.h>
13c167b9c7SMaximilian Luz #include <linux/limits.h>
14c167b9c7SMaximilian Luz #include <linux/list.h>
15c167b9c7SMaximilian Luz #include <linux/slab.h>
16c167b9c7SMaximilian Luz #include <linux/spinlock.h>
17c167b9c7SMaximilian Luz #include <linux/types.h>
18c167b9c7SMaximilian Luz #include <linux/workqueue.h>
19c167b9c7SMaximilian Luz
20c167b9c7SMaximilian Luz #include <linux/surface_aggregator/serial_hub.h>
21c167b9c7SMaximilian Luz #include <linux/surface_aggregator/controller.h>
22c167b9c7SMaximilian Luz
23c167b9c7SMaximilian Luz #include "ssh_packet_layer.h"
24c167b9c7SMaximilian Luz #include "ssh_request_layer.h"
25c167b9c7SMaximilian Luz
260d21bb85SMaximilian Luz #include "trace.h"
270d21bb85SMaximilian Luz
28c167b9c7SMaximilian Luz /*
29c167b9c7SMaximilian Luz * SSH_RTL_REQUEST_TIMEOUT - Request timeout.
30c167b9c7SMaximilian Luz *
31c167b9c7SMaximilian Luz * Timeout as ktime_t delta for request responses. If we have not received a
32c167b9c7SMaximilian Luz * response in this time-frame after finishing the underlying packet
33c167b9c7SMaximilian Luz * transmission, the request will be completed with %-ETIMEDOUT as status
34c167b9c7SMaximilian Luz * code.
35c167b9c7SMaximilian Luz */
36c167b9c7SMaximilian Luz #define SSH_RTL_REQUEST_TIMEOUT ms_to_ktime(3000)
37c167b9c7SMaximilian Luz
38c167b9c7SMaximilian Luz /*
39c167b9c7SMaximilian Luz * SSH_RTL_REQUEST_TIMEOUT_RESOLUTION - Request timeout granularity.
40c167b9c7SMaximilian Luz *
41c167b9c7SMaximilian Luz * Time-resolution for timeouts. Should be larger than one jiffy to avoid
42c167b9c7SMaximilian Luz * direct re-scheduling of reaper work_struct.
43c167b9c7SMaximilian Luz */
44c167b9c7SMaximilian Luz #define SSH_RTL_REQUEST_TIMEOUT_RESOLUTION ms_to_ktime(max(2000 / HZ, 50))
45c167b9c7SMaximilian Luz
46c167b9c7SMaximilian Luz /*
47c167b9c7SMaximilian Luz * SSH_RTL_MAX_PENDING - Maximum number of pending requests.
48c167b9c7SMaximilian Luz *
49c167b9c7SMaximilian Luz * Maximum number of requests concurrently waiting to be completed (i.e.
50c167b9c7SMaximilian Luz * waiting for the corresponding packet transmission to finish if they don't
51c167b9c7SMaximilian Luz * have a response or waiting for a response if they have one).
52c167b9c7SMaximilian Luz */
53c167b9c7SMaximilian Luz #define SSH_RTL_MAX_PENDING 3
54c167b9c7SMaximilian Luz
55c167b9c7SMaximilian Luz /*
56c167b9c7SMaximilian Luz * SSH_RTL_TX_BATCH - Maximum number of requests processed per work execution.
57c167b9c7SMaximilian Luz * Used to prevent livelocking of the workqueue. Value chosen via educated
58c167b9c7SMaximilian Luz * guess, may be adjusted.
59c167b9c7SMaximilian Luz */
60c167b9c7SMaximilian Luz #define SSH_RTL_TX_BATCH 10
61c167b9c7SMaximilian Luz
6202be44f6SMaximilian Luz #ifdef CONFIG_SURFACE_AGGREGATOR_ERROR_INJECTION
6302be44f6SMaximilian Luz
6402be44f6SMaximilian Luz /**
6502be44f6SMaximilian Luz * ssh_rtl_should_drop_response() - Error injection hook to drop request
6602be44f6SMaximilian Luz * responses.
6702be44f6SMaximilian Luz *
6802be44f6SMaximilian Luz * Useful to cause request transmission timeouts in the driver by dropping the
6902be44f6SMaximilian Luz * response to a request.
7002be44f6SMaximilian Luz */
ssh_rtl_should_drop_response(void)7102be44f6SMaximilian Luz static noinline bool ssh_rtl_should_drop_response(void)
7202be44f6SMaximilian Luz {
7302be44f6SMaximilian Luz return false;
7402be44f6SMaximilian Luz }
7502be44f6SMaximilian Luz ALLOW_ERROR_INJECTION(ssh_rtl_should_drop_response, TRUE);
7602be44f6SMaximilian Luz
7702be44f6SMaximilian Luz #else
7802be44f6SMaximilian Luz
ssh_rtl_should_drop_response(void)7902be44f6SMaximilian Luz static inline bool ssh_rtl_should_drop_response(void)
8002be44f6SMaximilian Luz {
8102be44f6SMaximilian Luz return false;
8202be44f6SMaximilian Luz }
8302be44f6SMaximilian Luz
8402be44f6SMaximilian Luz #endif
8502be44f6SMaximilian Luz
ssh_request_get_rqid(struct ssh_request * rqst)86c167b9c7SMaximilian Luz static u16 ssh_request_get_rqid(struct ssh_request *rqst)
87c167b9c7SMaximilian Luz {
88c167b9c7SMaximilian Luz return get_unaligned_le16(rqst->packet.data.ptr
89c167b9c7SMaximilian Luz + SSH_MSGOFFSET_COMMAND(rqid));
90c167b9c7SMaximilian Luz }
91c167b9c7SMaximilian Luz
ssh_request_get_rqid_safe(struct ssh_request * rqst)92c167b9c7SMaximilian Luz static u32 ssh_request_get_rqid_safe(struct ssh_request *rqst)
93c167b9c7SMaximilian Luz {
94c167b9c7SMaximilian Luz if (!rqst->packet.data.ptr)
95c167b9c7SMaximilian Luz return U32_MAX;
96c167b9c7SMaximilian Luz
97c167b9c7SMaximilian Luz return ssh_request_get_rqid(rqst);
98c167b9c7SMaximilian Luz }
99c167b9c7SMaximilian Luz
ssh_rtl_queue_remove(struct ssh_request * rqst)100c167b9c7SMaximilian Luz static void ssh_rtl_queue_remove(struct ssh_request *rqst)
101c167b9c7SMaximilian Luz {
102c167b9c7SMaximilian Luz struct ssh_rtl *rtl = ssh_request_rtl(rqst);
103c167b9c7SMaximilian Luz
104c167b9c7SMaximilian Luz spin_lock(&rtl->queue.lock);
105c167b9c7SMaximilian Luz
106c167b9c7SMaximilian Luz if (!test_and_clear_bit(SSH_REQUEST_SF_QUEUED_BIT, &rqst->state)) {
107c167b9c7SMaximilian Luz spin_unlock(&rtl->queue.lock);
108c167b9c7SMaximilian Luz return;
109c167b9c7SMaximilian Luz }
110c167b9c7SMaximilian Luz
111c167b9c7SMaximilian Luz list_del(&rqst->node);
112c167b9c7SMaximilian Luz
113c167b9c7SMaximilian Luz spin_unlock(&rtl->queue.lock);
114c167b9c7SMaximilian Luz ssh_request_put(rqst);
115c167b9c7SMaximilian Luz }
116c167b9c7SMaximilian Luz
ssh_rtl_queue_empty(struct ssh_rtl * rtl)117c167b9c7SMaximilian Luz static bool ssh_rtl_queue_empty(struct ssh_rtl *rtl)
118c167b9c7SMaximilian Luz {
119c167b9c7SMaximilian Luz bool empty;
120c167b9c7SMaximilian Luz
121c167b9c7SMaximilian Luz spin_lock(&rtl->queue.lock);
122c167b9c7SMaximilian Luz empty = list_empty(&rtl->queue.head);
123c167b9c7SMaximilian Luz spin_unlock(&rtl->queue.lock);
124c167b9c7SMaximilian Luz
125c167b9c7SMaximilian Luz return empty;
126c167b9c7SMaximilian Luz }
127c167b9c7SMaximilian Luz
ssh_rtl_pending_remove(struct ssh_request * rqst)128c167b9c7SMaximilian Luz static void ssh_rtl_pending_remove(struct ssh_request *rqst)
129c167b9c7SMaximilian Luz {
130c167b9c7SMaximilian Luz struct ssh_rtl *rtl = ssh_request_rtl(rqst);
131c167b9c7SMaximilian Luz
132c167b9c7SMaximilian Luz spin_lock(&rtl->pending.lock);
133c167b9c7SMaximilian Luz
134c167b9c7SMaximilian Luz if (!test_and_clear_bit(SSH_REQUEST_SF_PENDING_BIT, &rqst->state)) {
135c167b9c7SMaximilian Luz spin_unlock(&rtl->pending.lock);
136c167b9c7SMaximilian Luz return;
137c167b9c7SMaximilian Luz }
138c167b9c7SMaximilian Luz
139c167b9c7SMaximilian Luz atomic_dec(&rtl->pending.count);
140c167b9c7SMaximilian Luz list_del(&rqst->node);
141c167b9c7SMaximilian Luz
142c167b9c7SMaximilian Luz spin_unlock(&rtl->pending.lock);
143c167b9c7SMaximilian Luz
144c167b9c7SMaximilian Luz ssh_request_put(rqst);
145c167b9c7SMaximilian Luz }
146c167b9c7SMaximilian Luz
ssh_rtl_tx_pending_push(struct ssh_request * rqst)147c167b9c7SMaximilian Luz static int ssh_rtl_tx_pending_push(struct ssh_request *rqst)
148c167b9c7SMaximilian Luz {
149c167b9c7SMaximilian Luz struct ssh_rtl *rtl = ssh_request_rtl(rqst);
150c167b9c7SMaximilian Luz
151c167b9c7SMaximilian Luz spin_lock(&rtl->pending.lock);
152c167b9c7SMaximilian Luz
153c167b9c7SMaximilian Luz if (test_bit(SSH_REQUEST_SF_LOCKED_BIT, &rqst->state)) {
154c167b9c7SMaximilian Luz spin_unlock(&rtl->pending.lock);
155c167b9c7SMaximilian Luz return -EINVAL;
156c167b9c7SMaximilian Luz }
157c167b9c7SMaximilian Luz
158c167b9c7SMaximilian Luz if (test_and_set_bit(SSH_REQUEST_SF_PENDING_BIT, &rqst->state)) {
159c167b9c7SMaximilian Luz spin_unlock(&rtl->pending.lock);
160c167b9c7SMaximilian Luz return -EALREADY;
161c167b9c7SMaximilian Luz }
162c167b9c7SMaximilian Luz
163c167b9c7SMaximilian Luz atomic_inc(&rtl->pending.count);
164c167b9c7SMaximilian Luz list_add_tail(&ssh_request_get(rqst)->node, &rtl->pending.head);
165c167b9c7SMaximilian Luz
166c167b9c7SMaximilian Luz spin_unlock(&rtl->pending.lock);
167c167b9c7SMaximilian Luz return 0;
168c167b9c7SMaximilian Luz }
169c167b9c7SMaximilian Luz
ssh_rtl_complete_with_status(struct ssh_request * rqst,int status)170c167b9c7SMaximilian Luz static void ssh_rtl_complete_with_status(struct ssh_request *rqst, int status)
171c167b9c7SMaximilian Luz {
172c167b9c7SMaximilian Luz struct ssh_rtl *rtl = ssh_request_rtl(rqst);
173c167b9c7SMaximilian Luz
1740d21bb85SMaximilian Luz trace_ssam_request_complete(rqst, status);
1750d21bb85SMaximilian Luz
176c167b9c7SMaximilian Luz /* rtl/ptl may not be set if we're canceling before submitting. */
177c167b9c7SMaximilian Luz rtl_dbg_cond(rtl, "rtl: completing request (rqid: %#06x, status: %d)\n",
178c167b9c7SMaximilian Luz ssh_request_get_rqid_safe(rqst), status);
179c167b9c7SMaximilian Luz
180c167b9c7SMaximilian Luz rqst->ops->complete(rqst, NULL, NULL, status);
181c167b9c7SMaximilian Luz }
182c167b9c7SMaximilian Luz
ssh_rtl_complete_with_rsp(struct ssh_request * rqst,const struct ssh_command * cmd,const struct ssam_span * data)183c167b9c7SMaximilian Luz static void ssh_rtl_complete_with_rsp(struct ssh_request *rqst,
184c167b9c7SMaximilian Luz const struct ssh_command *cmd,
185c167b9c7SMaximilian Luz const struct ssam_span *data)
186c167b9c7SMaximilian Luz {
187c167b9c7SMaximilian Luz struct ssh_rtl *rtl = ssh_request_rtl(rqst);
188c167b9c7SMaximilian Luz
1890d21bb85SMaximilian Luz trace_ssam_request_complete(rqst, 0);
1900d21bb85SMaximilian Luz
191c167b9c7SMaximilian Luz rtl_dbg(rtl, "rtl: completing request with response (rqid: %#06x)\n",
192c167b9c7SMaximilian Luz ssh_request_get_rqid(rqst));
193c167b9c7SMaximilian Luz
194c167b9c7SMaximilian Luz rqst->ops->complete(rqst, cmd, data, 0);
195c167b9c7SMaximilian Luz }
196c167b9c7SMaximilian Luz
ssh_rtl_tx_can_process(struct ssh_request * rqst)197c167b9c7SMaximilian Luz static bool ssh_rtl_tx_can_process(struct ssh_request *rqst)
198c167b9c7SMaximilian Luz {
199c167b9c7SMaximilian Luz struct ssh_rtl *rtl = ssh_request_rtl(rqst);
200c167b9c7SMaximilian Luz
201c167b9c7SMaximilian Luz if (test_bit(SSH_REQUEST_TY_FLUSH_BIT, &rqst->state))
202c167b9c7SMaximilian Luz return !atomic_read(&rtl->pending.count);
203c167b9c7SMaximilian Luz
204c167b9c7SMaximilian Luz return atomic_read(&rtl->pending.count) < SSH_RTL_MAX_PENDING;
205c167b9c7SMaximilian Luz }
206c167b9c7SMaximilian Luz
ssh_rtl_tx_next(struct ssh_rtl * rtl)207c167b9c7SMaximilian Luz static struct ssh_request *ssh_rtl_tx_next(struct ssh_rtl *rtl)
208c167b9c7SMaximilian Luz {
209c167b9c7SMaximilian Luz struct ssh_request *rqst = ERR_PTR(-ENOENT);
210c167b9c7SMaximilian Luz struct ssh_request *p, *n;
211c167b9c7SMaximilian Luz
212c167b9c7SMaximilian Luz spin_lock(&rtl->queue.lock);
213c167b9c7SMaximilian Luz
214c167b9c7SMaximilian Luz /* Find first non-locked request and remove it. */
215c167b9c7SMaximilian Luz list_for_each_entry_safe(p, n, &rtl->queue.head, node) {
216c167b9c7SMaximilian Luz if (unlikely(test_bit(SSH_REQUEST_SF_LOCKED_BIT, &p->state)))
217c167b9c7SMaximilian Luz continue;
218c167b9c7SMaximilian Luz
219c167b9c7SMaximilian Luz if (!ssh_rtl_tx_can_process(p)) {
220c167b9c7SMaximilian Luz rqst = ERR_PTR(-EBUSY);
221c167b9c7SMaximilian Luz break;
222c167b9c7SMaximilian Luz }
223c167b9c7SMaximilian Luz
224c167b9c7SMaximilian Luz /* Remove from queue and mark as transmitting. */
225c167b9c7SMaximilian Luz set_bit(SSH_REQUEST_SF_TRANSMITTING_BIT, &p->state);
226c167b9c7SMaximilian Luz /* Ensure state never gets zero. */
227c167b9c7SMaximilian Luz smp_mb__before_atomic();
228c167b9c7SMaximilian Luz clear_bit(SSH_REQUEST_SF_QUEUED_BIT, &p->state);
229c167b9c7SMaximilian Luz
230c167b9c7SMaximilian Luz list_del(&p->node);
231c167b9c7SMaximilian Luz
232c167b9c7SMaximilian Luz rqst = p;
233c167b9c7SMaximilian Luz break;
234c167b9c7SMaximilian Luz }
235c167b9c7SMaximilian Luz
236c167b9c7SMaximilian Luz spin_unlock(&rtl->queue.lock);
237c167b9c7SMaximilian Luz return rqst;
238c167b9c7SMaximilian Luz }
239c167b9c7SMaximilian Luz
ssh_rtl_tx_try_process_one(struct ssh_rtl * rtl)240c167b9c7SMaximilian Luz static int ssh_rtl_tx_try_process_one(struct ssh_rtl *rtl)
241c167b9c7SMaximilian Luz {
242c167b9c7SMaximilian Luz struct ssh_request *rqst;
243c167b9c7SMaximilian Luz int status;
244c167b9c7SMaximilian Luz
245c167b9c7SMaximilian Luz /* Get and prepare next request for transmit. */
246c167b9c7SMaximilian Luz rqst = ssh_rtl_tx_next(rtl);
247c167b9c7SMaximilian Luz if (IS_ERR(rqst))
248c167b9c7SMaximilian Luz return PTR_ERR(rqst);
249c167b9c7SMaximilian Luz
250c167b9c7SMaximilian Luz /* Add it to/mark it as pending. */
251c167b9c7SMaximilian Luz status = ssh_rtl_tx_pending_push(rqst);
252c167b9c7SMaximilian Luz if (status) {
253c167b9c7SMaximilian Luz ssh_request_put(rqst);
254c167b9c7SMaximilian Luz return -EAGAIN;
255c167b9c7SMaximilian Luz }
256c167b9c7SMaximilian Luz
257c167b9c7SMaximilian Luz /* Submit packet. */
258c167b9c7SMaximilian Luz status = ssh_ptl_submit(&rtl->ptl, &rqst->packet);
259c167b9c7SMaximilian Luz if (status == -ESHUTDOWN) {
260c167b9c7SMaximilian Luz /*
261c167b9c7SMaximilian Luz * Packet has been refused due to the packet layer shutting
262c167b9c7SMaximilian Luz * down. Complete it here.
263c167b9c7SMaximilian Luz */
264c167b9c7SMaximilian Luz set_bit(SSH_REQUEST_SF_LOCKED_BIT, &rqst->state);
265c167b9c7SMaximilian Luz /*
266c167b9c7SMaximilian Luz * Note: A barrier is not required here, as there are only two
267c167b9c7SMaximilian Luz * references in the system at this point: The one that we have,
268c167b9c7SMaximilian Luz * and the other one that belongs to the pending set. Due to the
269c167b9c7SMaximilian Luz * request being marked as "transmitting", our process is the
270c167b9c7SMaximilian Luz * only one allowed to remove the pending node and change the
271c167b9c7SMaximilian Luz * state. Normally, the task would fall to the packet callback,
272c167b9c7SMaximilian Luz * but as this is a path where submission failed, this callback
273c167b9c7SMaximilian Luz * will never be executed.
274c167b9c7SMaximilian Luz */
275c167b9c7SMaximilian Luz
276c167b9c7SMaximilian Luz ssh_rtl_pending_remove(rqst);
277c167b9c7SMaximilian Luz ssh_rtl_complete_with_status(rqst, -ESHUTDOWN);
278c167b9c7SMaximilian Luz
279c167b9c7SMaximilian Luz ssh_request_put(rqst);
280c167b9c7SMaximilian Luz return -ESHUTDOWN;
281c167b9c7SMaximilian Luz
282c167b9c7SMaximilian Luz } else if (status) {
283c167b9c7SMaximilian Luz /*
284c167b9c7SMaximilian Luz * If submitting the packet failed and the packet layer isn't
285c167b9c7SMaximilian Luz * shutting down, the packet has either been submitted/queued
286c167b9c7SMaximilian Luz * before (-EALREADY, which cannot happen as we have
287c167b9c7SMaximilian Luz * guaranteed that requests cannot be re-submitted), or the
288c167b9c7SMaximilian Luz * packet was marked as locked (-EINVAL). To mark the packet
289c167b9c7SMaximilian Luz * locked at this stage, the request, and thus the packets
290c167b9c7SMaximilian Luz * itself, had to have been canceled. Simply drop the
291c167b9c7SMaximilian Luz * reference. Cancellation itself will remove it from the set
292c167b9c7SMaximilian Luz * of pending requests.
293c167b9c7SMaximilian Luz */
294c167b9c7SMaximilian Luz
295c167b9c7SMaximilian Luz WARN_ON(status != -EINVAL);
296c167b9c7SMaximilian Luz
297c167b9c7SMaximilian Luz ssh_request_put(rqst);
298c167b9c7SMaximilian Luz return -EAGAIN;
299c167b9c7SMaximilian Luz }
300c167b9c7SMaximilian Luz
301c167b9c7SMaximilian Luz ssh_request_put(rqst);
302c167b9c7SMaximilian Luz return 0;
303c167b9c7SMaximilian Luz }
304c167b9c7SMaximilian Luz
ssh_rtl_tx_schedule(struct ssh_rtl * rtl)305c167b9c7SMaximilian Luz static bool ssh_rtl_tx_schedule(struct ssh_rtl *rtl)
306c167b9c7SMaximilian Luz {
307c167b9c7SMaximilian Luz if (atomic_read(&rtl->pending.count) >= SSH_RTL_MAX_PENDING)
308c167b9c7SMaximilian Luz return false;
309c167b9c7SMaximilian Luz
310c167b9c7SMaximilian Luz if (ssh_rtl_queue_empty(rtl))
311c167b9c7SMaximilian Luz return false;
312c167b9c7SMaximilian Luz
313c167b9c7SMaximilian Luz return schedule_work(&rtl->tx.work);
314c167b9c7SMaximilian Luz }
315c167b9c7SMaximilian Luz
ssh_rtl_tx_work_fn(struct work_struct * work)316c167b9c7SMaximilian Luz static void ssh_rtl_tx_work_fn(struct work_struct *work)
317c167b9c7SMaximilian Luz {
318c167b9c7SMaximilian Luz struct ssh_rtl *rtl = to_ssh_rtl(work, tx.work);
319c167b9c7SMaximilian Luz unsigned int iterations = SSH_RTL_TX_BATCH;
320c167b9c7SMaximilian Luz int status;
321c167b9c7SMaximilian Luz
322c167b9c7SMaximilian Luz /*
323c167b9c7SMaximilian Luz * Try to be nice and not block/live-lock the workqueue: Run a maximum
324c167b9c7SMaximilian Luz * of 10 tries, then re-submit if necessary. This should not be
325c167b9c7SMaximilian Luz * necessary for normal execution, but guarantee it anyway.
326c167b9c7SMaximilian Luz */
327c167b9c7SMaximilian Luz do {
328c167b9c7SMaximilian Luz status = ssh_rtl_tx_try_process_one(rtl);
329c167b9c7SMaximilian Luz if (status == -ENOENT || status == -EBUSY)
330c167b9c7SMaximilian Luz return; /* No more requests to process. */
331c167b9c7SMaximilian Luz
332c167b9c7SMaximilian Luz if (status == -ESHUTDOWN) {
333c167b9c7SMaximilian Luz /*
334c167b9c7SMaximilian Luz * Packet system shutting down. No new packets can be
335c167b9c7SMaximilian Luz * transmitted. Return silently, the party initiating
336c167b9c7SMaximilian Luz * the shutdown should handle the rest.
337c167b9c7SMaximilian Luz */
338c167b9c7SMaximilian Luz return;
339c167b9c7SMaximilian Luz }
340c167b9c7SMaximilian Luz
341c167b9c7SMaximilian Luz WARN_ON(status != 0 && status != -EAGAIN);
342c167b9c7SMaximilian Luz } while (--iterations);
343c167b9c7SMaximilian Luz
344c167b9c7SMaximilian Luz /* Out of tries, reschedule. */
345c167b9c7SMaximilian Luz ssh_rtl_tx_schedule(rtl);
346c167b9c7SMaximilian Luz }
347c167b9c7SMaximilian Luz
348c167b9c7SMaximilian Luz /**
349c167b9c7SMaximilian Luz * ssh_rtl_submit() - Submit a request to the transport layer.
350c167b9c7SMaximilian Luz * @rtl: The request transport layer.
351c167b9c7SMaximilian Luz * @rqst: The request to submit.
352c167b9c7SMaximilian Luz *
353c167b9c7SMaximilian Luz * Submits a request to the transport layer. A single request may not be
354c167b9c7SMaximilian Luz * submitted multiple times without reinitializing it.
355c167b9c7SMaximilian Luz *
356c167b9c7SMaximilian Luz * Return: Returns zero on success, %-EINVAL if the request type is invalid or
357c167b9c7SMaximilian Luz * the request has been canceled prior to submission, %-EALREADY if the
358c167b9c7SMaximilian Luz * request has already been submitted, or %-ESHUTDOWN in case the request
359c167b9c7SMaximilian Luz * transport layer has been shut down.
360c167b9c7SMaximilian Luz */
ssh_rtl_submit(struct ssh_rtl * rtl,struct ssh_request * rqst)361c167b9c7SMaximilian Luz int ssh_rtl_submit(struct ssh_rtl *rtl, struct ssh_request *rqst)
362c167b9c7SMaximilian Luz {
3630d21bb85SMaximilian Luz trace_ssam_request_submit(rqst);
3640d21bb85SMaximilian Luz
365c167b9c7SMaximilian Luz /*
366c167b9c7SMaximilian Luz * Ensure that requests expecting a response are sequenced. If this
367c167b9c7SMaximilian Luz * invariant ever changes, see the comment in ssh_rtl_complete() on what
368c167b9c7SMaximilian Luz * is required to be changed in the code.
369c167b9c7SMaximilian Luz */
370c167b9c7SMaximilian Luz if (test_bit(SSH_REQUEST_TY_HAS_RESPONSE_BIT, &rqst->state))
371c167b9c7SMaximilian Luz if (!test_bit(SSH_PACKET_TY_SEQUENCED_BIT, &rqst->packet.state))
372c167b9c7SMaximilian Luz return -EINVAL;
373c167b9c7SMaximilian Luz
374c167b9c7SMaximilian Luz spin_lock(&rtl->queue.lock);
375c167b9c7SMaximilian Luz
376c167b9c7SMaximilian Luz /*
377c167b9c7SMaximilian Luz * Try to set ptl and check if this request has already been submitted.
378c167b9c7SMaximilian Luz *
379c167b9c7SMaximilian Luz * Must be inside lock as we might run into a lost update problem
380c167b9c7SMaximilian Luz * otherwise: If this were outside of the lock, cancellation in
381c167b9c7SMaximilian Luz * ssh_rtl_cancel_nonpending() may run after we've set the ptl
382c167b9c7SMaximilian Luz * reference but before we enter the lock. In that case, we'd detect
383c167b9c7SMaximilian Luz * that the request is being added to the queue and would try to remove
384c167b9c7SMaximilian Luz * it from that, but removal might fail because it hasn't actually been
385c167b9c7SMaximilian Luz * added yet. By putting this cmpxchg in the critical section, we
386c167b9c7SMaximilian Luz * ensure that the queuing detection only triggers when we are already
387c167b9c7SMaximilian Luz * in the critical section and the remove process will wait until the
388c167b9c7SMaximilian Luz * push operation has been completed (via lock) due to that. Only then,
389c167b9c7SMaximilian Luz * we can safely try to remove it.
390c167b9c7SMaximilian Luz */
391c167b9c7SMaximilian Luz if (cmpxchg(&rqst->packet.ptl, NULL, &rtl->ptl)) {
392c167b9c7SMaximilian Luz spin_unlock(&rtl->queue.lock);
393c167b9c7SMaximilian Luz return -EALREADY;
394c167b9c7SMaximilian Luz }
395c167b9c7SMaximilian Luz
396c167b9c7SMaximilian Luz /*
397c167b9c7SMaximilian Luz * Ensure that we set ptl reference before we continue modifying state.
398c167b9c7SMaximilian Luz * This is required for non-pending cancellation. This barrier is paired
399c167b9c7SMaximilian Luz * with the one in ssh_rtl_cancel_nonpending().
400c167b9c7SMaximilian Luz *
401c167b9c7SMaximilian Luz * By setting the ptl reference before we test for "locked", we can
402c167b9c7SMaximilian Luz * check if the "locked" test may have already run. See comments in
403c167b9c7SMaximilian Luz * ssh_rtl_cancel_nonpending() for more detail.
404c167b9c7SMaximilian Luz */
405c167b9c7SMaximilian Luz smp_mb__after_atomic();
406c167b9c7SMaximilian Luz
407c167b9c7SMaximilian Luz if (test_bit(SSH_RTL_SF_SHUTDOWN_BIT, &rtl->state)) {
408c167b9c7SMaximilian Luz spin_unlock(&rtl->queue.lock);
409c167b9c7SMaximilian Luz return -ESHUTDOWN;
410c167b9c7SMaximilian Luz }
411c167b9c7SMaximilian Luz
412c167b9c7SMaximilian Luz if (test_bit(SSH_REQUEST_SF_LOCKED_BIT, &rqst->state)) {
413c167b9c7SMaximilian Luz spin_unlock(&rtl->queue.lock);
414c167b9c7SMaximilian Luz return -EINVAL;
415c167b9c7SMaximilian Luz }
416c167b9c7SMaximilian Luz
417c167b9c7SMaximilian Luz set_bit(SSH_REQUEST_SF_QUEUED_BIT, &rqst->state);
418c167b9c7SMaximilian Luz list_add_tail(&ssh_request_get(rqst)->node, &rtl->queue.head);
419c167b9c7SMaximilian Luz
420c167b9c7SMaximilian Luz spin_unlock(&rtl->queue.lock);
421c167b9c7SMaximilian Luz
422c167b9c7SMaximilian Luz ssh_rtl_tx_schedule(rtl);
423c167b9c7SMaximilian Luz return 0;
424c167b9c7SMaximilian Luz }
425c167b9c7SMaximilian Luz
ssh_rtl_timeout_reaper_mod(struct ssh_rtl * rtl,ktime_t now,ktime_t expires)426c167b9c7SMaximilian Luz static void ssh_rtl_timeout_reaper_mod(struct ssh_rtl *rtl, ktime_t now,
427c167b9c7SMaximilian Luz ktime_t expires)
428c167b9c7SMaximilian Luz {
429c167b9c7SMaximilian Luz unsigned long delta = msecs_to_jiffies(ktime_ms_delta(expires, now));
430c167b9c7SMaximilian Luz ktime_t aexp = ktime_add(expires, SSH_RTL_REQUEST_TIMEOUT_RESOLUTION);
431c167b9c7SMaximilian Luz
432c167b9c7SMaximilian Luz spin_lock(&rtl->rtx_timeout.lock);
433c167b9c7SMaximilian Luz
434c167b9c7SMaximilian Luz /* Re-adjust / schedule reaper only if it is above resolution delta. */
435c167b9c7SMaximilian Luz if (ktime_before(aexp, rtl->rtx_timeout.expires)) {
436c167b9c7SMaximilian Luz rtl->rtx_timeout.expires = expires;
437c167b9c7SMaximilian Luz mod_delayed_work(system_wq, &rtl->rtx_timeout.reaper, delta);
438c167b9c7SMaximilian Luz }
439c167b9c7SMaximilian Luz
440c167b9c7SMaximilian Luz spin_unlock(&rtl->rtx_timeout.lock);
441c167b9c7SMaximilian Luz }
442c167b9c7SMaximilian Luz
ssh_rtl_timeout_start(struct ssh_request * rqst)443c167b9c7SMaximilian Luz static void ssh_rtl_timeout_start(struct ssh_request *rqst)
444c167b9c7SMaximilian Luz {
445c167b9c7SMaximilian Luz struct ssh_rtl *rtl = ssh_request_rtl(rqst);
446c167b9c7SMaximilian Luz ktime_t timestamp = ktime_get_coarse_boottime();
447c167b9c7SMaximilian Luz ktime_t timeout = rtl->rtx_timeout.timeout;
448c167b9c7SMaximilian Luz
449c167b9c7SMaximilian Luz if (test_bit(SSH_REQUEST_SF_LOCKED_BIT, &rqst->state))
450c167b9c7SMaximilian Luz return;
451c167b9c7SMaximilian Luz
452c167b9c7SMaximilian Luz /*
453c167b9c7SMaximilian Luz * Note: The timestamp gets set only once. This happens on the packet
454c167b9c7SMaximilian Luz * callback. All other access to it is read-only.
455c167b9c7SMaximilian Luz */
456c167b9c7SMaximilian Luz WRITE_ONCE(rqst->timestamp, timestamp);
457c167b9c7SMaximilian Luz /*
458c167b9c7SMaximilian Luz * Ensure timestamp is set before starting the reaper. Paired with
459c167b9c7SMaximilian Luz * implicit barrier following check on ssh_request_get_expiration() in
460c167b9c7SMaximilian Luz * ssh_rtl_timeout_reap.
461c167b9c7SMaximilian Luz */
462c167b9c7SMaximilian Luz smp_mb__after_atomic();
463c167b9c7SMaximilian Luz
464c167b9c7SMaximilian Luz ssh_rtl_timeout_reaper_mod(rtl, timestamp, timestamp + timeout);
465c167b9c7SMaximilian Luz }
466c167b9c7SMaximilian Luz
ssh_rtl_complete(struct ssh_rtl * rtl,const struct ssh_command * command,const struct ssam_span * command_data)467c167b9c7SMaximilian Luz static void ssh_rtl_complete(struct ssh_rtl *rtl,
468c167b9c7SMaximilian Luz const struct ssh_command *command,
469c167b9c7SMaximilian Luz const struct ssam_span *command_data)
470c167b9c7SMaximilian Luz {
471c167b9c7SMaximilian Luz struct ssh_request *r = NULL;
472c167b9c7SMaximilian Luz struct ssh_request *p, *n;
473c167b9c7SMaximilian Luz u16 rqid = get_unaligned_le16(&command->rqid);
474c167b9c7SMaximilian Luz
4750d21bb85SMaximilian Luz trace_ssam_rx_response_received(command, command_data->len);
4760d21bb85SMaximilian Luz
477c167b9c7SMaximilian Luz /*
478c167b9c7SMaximilian Luz * Get request from pending based on request ID and mark it as response
479c167b9c7SMaximilian Luz * received and locked.
480c167b9c7SMaximilian Luz */
481c167b9c7SMaximilian Luz spin_lock(&rtl->pending.lock);
482c167b9c7SMaximilian Luz list_for_each_entry_safe(p, n, &rtl->pending.head, node) {
483c167b9c7SMaximilian Luz /* We generally expect requests to be processed in order. */
484c167b9c7SMaximilian Luz if (unlikely(ssh_request_get_rqid(p) != rqid))
485c167b9c7SMaximilian Luz continue;
486c167b9c7SMaximilian Luz
48702be44f6SMaximilian Luz /* Simulate response timeout. */
48802be44f6SMaximilian Luz if (ssh_rtl_should_drop_response()) {
48902be44f6SMaximilian Luz spin_unlock(&rtl->pending.lock);
49002be44f6SMaximilian Luz
49102be44f6SMaximilian Luz trace_ssam_ei_rx_drop_response(p);
49202be44f6SMaximilian Luz rtl_info(rtl, "request error injection: dropping response for request %p\n",
49302be44f6SMaximilian Luz &p->packet);
49402be44f6SMaximilian Luz return;
49502be44f6SMaximilian Luz }
49602be44f6SMaximilian Luz
497c167b9c7SMaximilian Luz /*
498c167b9c7SMaximilian Luz * Mark as "response received" and "locked" as we're going to
499c167b9c7SMaximilian Luz * complete it.
500c167b9c7SMaximilian Luz */
501c167b9c7SMaximilian Luz set_bit(SSH_REQUEST_SF_LOCKED_BIT, &p->state);
502c167b9c7SMaximilian Luz set_bit(SSH_REQUEST_SF_RSPRCVD_BIT, &p->state);
503c167b9c7SMaximilian Luz /* Ensure state never gets zero. */
504c167b9c7SMaximilian Luz smp_mb__before_atomic();
505c167b9c7SMaximilian Luz clear_bit(SSH_REQUEST_SF_PENDING_BIT, &p->state);
506c167b9c7SMaximilian Luz
507c167b9c7SMaximilian Luz atomic_dec(&rtl->pending.count);
508c167b9c7SMaximilian Luz list_del(&p->node);
509c167b9c7SMaximilian Luz
510c167b9c7SMaximilian Luz r = p;
511c167b9c7SMaximilian Luz break;
512c167b9c7SMaximilian Luz }
513c167b9c7SMaximilian Luz spin_unlock(&rtl->pending.lock);
514c167b9c7SMaximilian Luz
515c167b9c7SMaximilian Luz if (!r) {
516c167b9c7SMaximilian Luz rtl_warn(rtl, "rtl: dropping unexpected command message (rqid = %#06x)\n",
517c167b9c7SMaximilian Luz rqid);
518c167b9c7SMaximilian Luz return;
519c167b9c7SMaximilian Luz }
520c167b9c7SMaximilian Luz
521c167b9c7SMaximilian Luz /* If the request hasn't been completed yet, we will do this now. */
522c167b9c7SMaximilian Luz if (test_and_set_bit(SSH_REQUEST_SF_COMPLETED_BIT, &r->state)) {
523c167b9c7SMaximilian Luz ssh_request_put(r);
524c167b9c7SMaximilian Luz ssh_rtl_tx_schedule(rtl);
525c167b9c7SMaximilian Luz return;
526c167b9c7SMaximilian Luz }
527c167b9c7SMaximilian Luz
528c167b9c7SMaximilian Luz /*
529c167b9c7SMaximilian Luz * Make sure the request has been transmitted. In case of a sequenced
530c167b9c7SMaximilian Luz * request, we are guaranteed that the completion callback will run on
531c167b9c7SMaximilian Luz * the receiver thread directly when the ACK for the packet has been
532c167b9c7SMaximilian Luz * received. Similarly, this function is guaranteed to run on the
533c167b9c7SMaximilian Luz * receiver thread. Thus we are guaranteed that if the packet has been
534c167b9c7SMaximilian Luz * successfully transmitted and received an ACK, the transmitted flag
535c167b9c7SMaximilian Luz * has been set and is visible here.
536c167b9c7SMaximilian Luz *
537c167b9c7SMaximilian Luz * We are currently not handling unsequenced packets here, as those
538c167b9c7SMaximilian Luz * should never expect a response as ensured in ssh_rtl_submit. If this
539c167b9c7SMaximilian Luz * ever changes, one would have to test for
540c167b9c7SMaximilian Luz *
541c167b9c7SMaximilian Luz * (r->state & (transmitting | transmitted))
542c167b9c7SMaximilian Luz *
543c167b9c7SMaximilian Luz * on unsequenced packets to determine if they could have been
544c167b9c7SMaximilian Luz * transmitted. There are no synchronization guarantees as in the
545c167b9c7SMaximilian Luz * sequenced case, since, in this case, the callback function will not
546c167b9c7SMaximilian Luz * run on the same thread. Thus an exact determination is impossible.
547c167b9c7SMaximilian Luz */
548c167b9c7SMaximilian Luz if (!test_bit(SSH_REQUEST_SF_TRANSMITTED_BIT, &r->state)) {
549c167b9c7SMaximilian Luz rtl_err(rtl, "rtl: received response before ACK for request (rqid = %#06x)\n",
550c167b9c7SMaximilian Luz rqid);
551c167b9c7SMaximilian Luz
552c167b9c7SMaximilian Luz /*
553c167b9c7SMaximilian Luz * NB: Timeout has already been canceled, request already been
554c167b9c7SMaximilian Luz * removed from pending and marked as locked and completed. As
555c167b9c7SMaximilian Luz * we receive a "false" response, the packet might still be
556c167b9c7SMaximilian Luz * queued though.
557c167b9c7SMaximilian Luz */
558c167b9c7SMaximilian Luz ssh_rtl_queue_remove(r);
559c167b9c7SMaximilian Luz
560c167b9c7SMaximilian Luz ssh_rtl_complete_with_status(r, -EREMOTEIO);
561c167b9c7SMaximilian Luz ssh_request_put(r);
562c167b9c7SMaximilian Luz
563c167b9c7SMaximilian Luz ssh_rtl_tx_schedule(rtl);
564c167b9c7SMaximilian Luz return;
565c167b9c7SMaximilian Luz }
566c167b9c7SMaximilian Luz
567c167b9c7SMaximilian Luz /*
568c167b9c7SMaximilian Luz * NB: Timeout has already been canceled, request already been
569c167b9c7SMaximilian Luz * removed from pending and marked as locked and completed. The request
570c167b9c7SMaximilian Luz * can also not be queued any more, as it has been marked as
571c167b9c7SMaximilian Luz * transmitting and later transmitted. Thus no need to remove it from
572c167b9c7SMaximilian Luz * anywhere.
573c167b9c7SMaximilian Luz */
574c167b9c7SMaximilian Luz
575c167b9c7SMaximilian Luz ssh_rtl_complete_with_rsp(r, command, command_data);
576c167b9c7SMaximilian Luz ssh_request_put(r);
577c167b9c7SMaximilian Luz
578c167b9c7SMaximilian Luz ssh_rtl_tx_schedule(rtl);
579c167b9c7SMaximilian Luz }
580c167b9c7SMaximilian Luz
ssh_rtl_cancel_nonpending(struct ssh_request * r)581c167b9c7SMaximilian Luz static bool ssh_rtl_cancel_nonpending(struct ssh_request *r)
582c167b9c7SMaximilian Luz {
583c167b9c7SMaximilian Luz struct ssh_rtl *rtl;
584c167b9c7SMaximilian Luz unsigned long flags, fixed;
585c167b9c7SMaximilian Luz bool remove;
586c167b9c7SMaximilian Luz
587c167b9c7SMaximilian Luz /*
588c167b9c7SMaximilian Luz * Handle unsubmitted request: Try to mark the packet as locked,
589c167b9c7SMaximilian Luz * expecting the state to be zero (i.e. unsubmitted). Note that, if
590c167b9c7SMaximilian Luz * setting the state worked, we might still be adding the packet to the
591c167b9c7SMaximilian Luz * queue in a currently executing submit call. In that case, however,
592c167b9c7SMaximilian Luz * ptl reference must have been set previously, as locked is checked
593c167b9c7SMaximilian Luz * after setting ptl. Furthermore, when the ptl reference is set, the
594c167b9c7SMaximilian Luz * submission process is guaranteed to have entered the critical
595c167b9c7SMaximilian Luz * section. Thus only if we successfully locked this request and ptl is
596c167b9c7SMaximilian Luz * NULL, we have successfully removed the request, i.e. we are
597c167b9c7SMaximilian Luz * guaranteed that, due to the "locked" check in ssh_rtl_submit(), the
598c167b9c7SMaximilian Luz * packet will never be added. Otherwise, we need to try and grab it
599c167b9c7SMaximilian Luz * from the queue, where we are now guaranteed that the packet is or has
600c167b9c7SMaximilian Luz * been due to the critical section.
601c167b9c7SMaximilian Luz *
602c167b9c7SMaximilian Luz * Note that if the cmpxchg() fails, we are guaranteed that ptl has
603c167b9c7SMaximilian Luz * been set and is non-NULL, as states can only be nonzero after this
604c167b9c7SMaximilian Luz * has been set. Also note that we need to fetch the static (type)
605c167b9c7SMaximilian Luz * flags to ensure that they don't cause the cmpxchg() to fail.
606c167b9c7SMaximilian Luz */
607c167b9c7SMaximilian Luz fixed = READ_ONCE(r->state) & SSH_REQUEST_FLAGS_TY_MASK;
608c167b9c7SMaximilian Luz flags = cmpxchg(&r->state, fixed, SSH_REQUEST_SF_LOCKED_BIT);
609c167b9c7SMaximilian Luz
610c167b9c7SMaximilian Luz /*
611c167b9c7SMaximilian Luz * Force correct ordering with regards to state and ptl reference access
612c167b9c7SMaximilian Luz * to safe-guard cancellation to concurrent submission against a
613c167b9c7SMaximilian Luz * lost-update problem. First try to exchange state, then also check
614c167b9c7SMaximilian Luz * ptl if that worked. This barrier is paired with the
615c167b9c7SMaximilian Luz * one in ssh_rtl_submit().
616c167b9c7SMaximilian Luz */
617c167b9c7SMaximilian Luz smp_mb__after_atomic();
618c167b9c7SMaximilian Luz
619c167b9c7SMaximilian Luz if (flags == fixed && !READ_ONCE(r->packet.ptl)) {
620c167b9c7SMaximilian Luz if (test_and_set_bit(SSH_REQUEST_SF_COMPLETED_BIT, &r->state))
621c167b9c7SMaximilian Luz return true;
622c167b9c7SMaximilian Luz
623c167b9c7SMaximilian Luz ssh_rtl_complete_with_status(r, -ECANCELED);
624c167b9c7SMaximilian Luz return true;
625c167b9c7SMaximilian Luz }
626c167b9c7SMaximilian Luz
627c167b9c7SMaximilian Luz rtl = ssh_request_rtl(r);
628c167b9c7SMaximilian Luz spin_lock(&rtl->queue.lock);
629c167b9c7SMaximilian Luz
630c167b9c7SMaximilian Luz /*
631c167b9c7SMaximilian Luz * Note: 1) Requests cannot be re-submitted. 2) If a request is
632c167b9c7SMaximilian Luz * queued, it cannot be "transmitting"/"pending" yet. Thus, if we
633c167b9c7SMaximilian Luz * successfully remove the request here, we have removed all its
634c167b9c7SMaximilian Luz * occurrences in the system.
635c167b9c7SMaximilian Luz */
636c167b9c7SMaximilian Luz
637c167b9c7SMaximilian Luz remove = test_and_clear_bit(SSH_REQUEST_SF_QUEUED_BIT, &r->state);
638c167b9c7SMaximilian Luz if (!remove) {
639c167b9c7SMaximilian Luz spin_unlock(&rtl->queue.lock);
640c167b9c7SMaximilian Luz return false;
641c167b9c7SMaximilian Luz }
642c167b9c7SMaximilian Luz
643c167b9c7SMaximilian Luz set_bit(SSH_REQUEST_SF_LOCKED_BIT, &r->state);
644c167b9c7SMaximilian Luz list_del(&r->node);
645c167b9c7SMaximilian Luz
646c167b9c7SMaximilian Luz spin_unlock(&rtl->queue.lock);
647c167b9c7SMaximilian Luz
648c167b9c7SMaximilian Luz ssh_request_put(r); /* Drop reference obtained from queue. */
649c167b9c7SMaximilian Luz
650c167b9c7SMaximilian Luz if (test_and_set_bit(SSH_REQUEST_SF_COMPLETED_BIT, &r->state))
651c167b9c7SMaximilian Luz return true;
652c167b9c7SMaximilian Luz
653c167b9c7SMaximilian Luz ssh_rtl_complete_with_status(r, -ECANCELED);
654c167b9c7SMaximilian Luz return true;
655c167b9c7SMaximilian Luz }
656c167b9c7SMaximilian Luz
ssh_rtl_cancel_pending(struct ssh_request * r)657c167b9c7SMaximilian Luz static bool ssh_rtl_cancel_pending(struct ssh_request *r)
658c167b9c7SMaximilian Luz {
659c167b9c7SMaximilian Luz /* If the packet is already locked, it's going to be removed shortly. */
660c167b9c7SMaximilian Luz if (test_and_set_bit(SSH_REQUEST_SF_LOCKED_BIT, &r->state))
661c167b9c7SMaximilian Luz return true;
662c167b9c7SMaximilian Luz
663c167b9c7SMaximilian Luz /*
664c167b9c7SMaximilian Luz * Now that we have locked the packet, we have guaranteed that it can't
665c167b9c7SMaximilian Luz * be added to the system any more. If ptl is NULL, the locked
666c167b9c7SMaximilian Luz * check in ssh_rtl_submit() has not been run and any submission,
667c167b9c7SMaximilian Luz * currently in progress or called later, won't add the packet. Thus we
668c167b9c7SMaximilian Luz * can directly complete it.
669c167b9c7SMaximilian Luz *
670c167b9c7SMaximilian Luz * The implicit memory barrier of test_and_set_bit() should be enough
671c167b9c7SMaximilian Luz * to ensure that the correct order (first lock, then check ptl) is
672c167b9c7SMaximilian Luz * ensured. This is paired with the barrier in ssh_rtl_submit().
673c167b9c7SMaximilian Luz */
674c167b9c7SMaximilian Luz if (!READ_ONCE(r->packet.ptl)) {
675c167b9c7SMaximilian Luz if (test_and_set_bit(SSH_REQUEST_SF_COMPLETED_BIT, &r->state))
676c167b9c7SMaximilian Luz return true;
677c167b9c7SMaximilian Luz
678c167b9c7SMaximilian Luz ssh_rtl_complete_with_status(r, -ECANCELED);
679c167b9c7SMaximilian Luz return true;
680c167b9c7SMaximilian Luz }
681c167b9c7SMaximilian Luz
682c167b9c7SMaximilian Luz /*
683c167b9c7SMaximilian Luz * Try to cancel the packet. If the packet has not been completed yet,
684c167b9c7SMaximilian Luz * this will subsequently (and synchronously) call the completion
685c167b9c7SMaximilian Luz * callback of the packet, which will complete the request.
686c167b9c7SMaximilian Luz */
687c167b9c7SMaximilian Luz ssh_ptl_cancel(&r->packet);
688c167b9c7SMaximilian Luz
689c167b9c7SMaximilian Luz /*
690c167b9c7SMaximilian Luz * If the packet has been completed with success, i.e. has not been
691c167b9c7SMaximilian Luz * canceled by the above call, the request may not have been completed
692c167b9c7SMaximilian Luz * yet (may be waiting for a response). Check if we need to do this
693c167b9c7SMaximilian Luz * here.
694c167b9c7SMaximilian Luz */
695c167b9c7SMaximilian Luz if (test_and_set_bit(SSH_REQUEST_SF_COMPLETED_BIT, &r->state))
696c167b9c7SMaximilian Luz return true;
697c167b9c7SMaximilian Luz
698c167b9c7SMaximilian Luz ssh_rtl_queue_remove(r);
699c167b9c7SMaximilian Luz ssh_rtl_pending_remove(r);
700c167b9c7SMaximilian Luz ssh_rtl_complete_with_status(r, -ECANCELED);
701c167b9c7SMaximilian Luz
702c167b9c7SMaximilian Luz return true;
703c167b9c7SMaximilian Luz }
704c167b9c7SMaximilian Luz
705c167b9c7SMaximilian Luz /**
706c167b9c7SMaximilian Luz * ssh_rtl_cancel() - Cancel request.
707c167b9c7SMaximilian Luz * @rqst: The request to cancel.
708c167b9c7SMaximilian Luz * @pending: Whether to also cancel pending requests.
709c167b9c7SMaximilian Luz *
710c167b9c7SMaximilian Luz * Cancels the given request. If @pending is %false, this will not cancel
711c167b9c7SMaximilian Luz * pending requests, i.e. requests that have already been submitted to the
712c167b9c7SMaximilian Luz * packet layer but not been completed yet. If @pending is %true, this will
713c167b9c7SMaximilian Luz * cancel the given request regardless of the state it is in.
714c167b9c7SMaximilian Luz *
715c167b9c7SMaximilian Luz * If the request has been canceled by calling this function, both completion
716c167b9c7SMaximilian Luz * and release callbacks of the request will be executed in a reasonable
717c167b9c7SMaximilian Luz * time-frame. This may happen during execution of this function, however,
718c167b9c7SMaximilian Luz * there is no guarantee for this. For example, a request currently
719c167b9c7SMaximilian Luz * transmitting will be canceled/completed only after transmission has
720c167b9c7SMaximilian Luz * completed, and the respective callbacks will be executed on the transmitter
721c167b9c7SMaximilian Luz * thread, which may happen during, but also some time after execution of the
722c167b9c7SMaximilian Luz * cancel function.
723c167b9c7SMaximilian Luz *
724c167b9c7SMaximilian Luz * Return: Returns %true if the given request has been canceled or completed,
725c167b9c7SMaximilian Luz * either by this function or prior to calling this function, %false
726c167b9c7SMaximilian Luz * otherwise. If @pending is %true, this function will always return %true.
727c167b9c7SMaximilian Luz */
ssh_rtl_cancel(struct ssh_request * rqst,bool pending)728c167b9c7SMaximilian Luz bool ssh_rtl_cancel(struct ssh_request *rqst, bool pending)
729c167b9c7SMaximilian Luz {
730c167b9c7SMaximilian Luz struct ssh_rtl *rtl;
731c167b9c7SMaximilian Luz bool canceled;
732c167b9c7SMaximilian Luz
733c167b9c7SMaximilian Luz if (test_and_set_bit(SSH_REQUEST_SF_CANCELED_BIT, &rqst->state))
734c167b9c7SMaximilian Luz return true;
735c167b9c7SMaximilian Luz
7360d21bb85SMaximilian Luz trace_ssam_request_cancel(rqst);
7370d21bb85SMaximilian Luz
738c167b9c7SMaximilian Luz if (pending)
739c167b9c7SMaximilian Luz canceled = ssh_rtl_cancel_pending(rqst);
740c167b9c7SMaximilian Luz else
741c167b9c7SMaximilian Luz canceled = ssh_rtl_cancel_nonpending(rqst);
742c167b9c7SMaximilian Luz
743c167b9c7SMaximilian Luz /* Note: rtl may be NULL if request has not been submitted yet. */
744c167b9c7SMaximilian Luz rtl = ssh_request_rtl(rqst);
745c167b9c7SMaximilian Luz if (canceled && rtl)
746c167b9c7SMaximilian Luz ssh_rtl_tx_schedule(rtl);
747c167b9c7SMaximilian Luz
748c167b9c7SMaximilian Luz return canceled;
749c167b9c7SMaximilian Luz }
750c167b9c7SMaximilian Luz
ssh_rtl_packet_callback(struct ssh_packet * p,int status)751c167b9c7SMaximilian Luz static void ssh_rtl_packet_callback(struct ssh_packet *p, int status)
752c167b9c7SMaximilian Luz {
753c167b9c7SMaximilian Luz struct ssh_request *r = to_ssh_request(p);
754c167b9c7SMaximilian Luz
755c167b9c7SMaximilian Luz if (unlikely(status)) {
756c167b9c7SMaximilian Luz set_bit(SSH_REQUEST_SF_LOCKED_BIT, &r->state);
757c167b9c7SMaximilian Luz
758c167b9c7SMaximilian Luz if (test_and_set_bit(SSH_REQUEST_SF_COMPLETED_BIT, &r->state))
759c167b9c7SMaximilian Luz return;
760c167b9c7SMaximilian Luz
761c167b9c7SMaximilian Luz /*
762c167b9c7SMaximilian Luz * The packet may get canceled even though it has not been
763c167b9c7SMaximilian Luz * submitted yet. The request may still be queued. Check the
764c167b9c7SMaximilian Luz * queue and remove it if necessary. As the timeout would have
765c167b9c7SMaximilian Luz * been started in this function on success, there's no need
766c167b9c7SMaximilian Luz * to cancel it here.
767c167b9c7SMaximilian Luz */
768c167b9c7SMaximilian Luz ssh_rtl_queue_remove(r);
769c167b9c7SMaximilian Luz ssh_rtl_pending_remove(r);
770c167b9c7SMaximilian Luz ssh_rtl_complete_with_status(r, status);
771c167b9c7SMaximilian Luz
772c167b9c7SMaximilian Luz ssh_rtl_tx_schedule(ssh_request_rtl(r));
773c167b9c7SMaximilian Luz return;
774c167b9c7SMaximilian Luz }
775c167b9c7SMaximilian Luz
776c167b9c7SMaximilian Luz /* Update state: Mark as transmitted and clear transmitting. */
777c167b9c7SMaximilian Luz set_bit(SSH_REQUEST_SF_TRANSMITTED_BIT, &r->state);
778c167b9c7SMaximilian Luz /* Ensure state never gets zero. */
779c167b9c7SMaximilian Luz smp_mb__before_atomic();
780c167b9c7SMaximilian Luz clear_bit(SSH_REQUEST_SF_TRANSMITTING_BIT, &r->state);
781c167b9c7SMaximilian Luz
782c167b9c7SMaximilian Luz /* If we expect a response, we just need to start the timeout. */
783c167b9c7SMaximilian Luz if (test_bit(SSH_REQUEST_TY_HAS_RESPONSE_BIT, &r->state)) {
784c167b9c7SMaximilian Luz /*
785c167b9c7SMaximilian Luz * Note: This is the only place where the timestamp gets set,
786c167b9c7SMaximilian Luz * all other access to it is read-only.
787c167b9c7SMaximilian Luz */
788c167b9c7SMaximilian Luz ssh_rtl_timeout_start(r);
789c167b9c7SMaximilian Luz return;
790c167b9c7SMaximilian Luz }
791c167b9c7SMaximilian Luz
792c167b9c7SMaximilian Luz /*
793c167b9c7SMaximilian Luz * If we don't expect a response, lock, remove, and complete the
794c167b9c7SMaximilian Luz * request. Note that, at this point, the request is guaranteed to have
795c167b9c7SMaximilian Luz * left the queue and no timeout has been started. Thus we only need to
796c167b9c7SMaximilian Luz * remove it from pending. If the request has already been completed (it
797c167b9c7SMaximilian Luz * may have been canceled) return.
798c167b9c7SMaximilian Luz */
799c167b9c7SMaximilian Luz
800c167b9c7SMaximilian Luz set_bit(SSH_REQUEST_SF_LOCKED_BIT, &r->state);
801c167b9c7SMaximilian Luz if (test_and_set_bit(SSH_REQUEST_SF_COMPLETED_BIT, &r->state))
802c167b9c7SMaximilian Luz return;
803c167b9c7SMaximilian Luz
804c167b9c7SMaximilian Luz ssh_rtl_pending_remove(r);
805c167b9c7SMaximilian Luz ssh_rtl_complete_with_status(r, 0);
806c167b9c7SMaximilian Luz
807c167b9c7SMaximilian Luz ssh_rtl_tx_schedule(ssh_request_rtl(r));
808c167b9c7SMaximilian Luz }
809c167b9c7SMaximilian Luz
ssh_request_get_expiration(struct ssh_request * r,ktime_t timeout)810c167b9c7SMaximilian Luz static ktime_t ssh_request_get_expiration(struct ssh_request *r, ktime_t timeout)
811c167b9c7SMaximilian Luz {
812c167b9c7SMaximilian Luz ktime_t timestamp = READ_ONCE(r->timestamp);
813c167b9c7SMaximilian Luz
814c167b9c7SMaximilian Luz if (timestamp != KTIME_MAX)
815c167b9c7SMaximilian Luz return ktime_add(timestamp, timeout);
816c167b9c7SMaximilian Luz else
817c167b9c7SMaximilian Luz return KTIME_MAX;
818c167b9c7SMaximilian Luz }
819c167b9c7SMaximilian Luz
ssh_rtl_timeout_reap(struct work_struct * work)820c167b9c7SMaximilian Luz static void ssh_rtl_timeout_reap(struct work_struct *work)
821c167b9c7SMaximilian Luz {
822c167b9c7SMaximilian Luz struct ssh_rtl *rtl = to_ssh_rtl(work, rtx_timeout.reaper.work);
823c167b9c7SMaximilian Luz struct ssh_request *r, *n;
824c167b9c7SMaximilian Luz LIST_HEAD(claimed);
825c167b9c7SMaximilian Luz ktime_t now = ktime_get_coarse_boottime();
826c167b9c7SMaximilian Luz ktime_t timeout = rtl->rtx_timeout.timeout;
827c167b9c7SMaximilian Luz ktime_t next = KTIME_MAX;
828c167b9c7SMaximilian Luz
8290d21bb85SMaximilian Luz trace_ssam_rtl_timeout_reap(atomic_read(&rtl->pending.count));
8300d21bb85SMaximilian Luz
831c167b9c7SMaximilian Luz /*
832c167b9c7SMaximilian Luz * Mark reaper as "not pending". This is done before checking any
833c167b9c7SMaximilian Luz * requests to avoid lost-update type problems.
834c167b9c7SMaximilian Luz */
835c167b9c7SMaximilian Luz spin_lock(&rtl->rtx_timeout.lock);
836c167b9c7SMaximilian Luz rtl->rtx_timeout.expires = KTIME_MAX;
837c167b9c7SMaximilian Luz spin_unlock(&rtl->rtx_timeout.lock);
838c167b9c7SMaximilian Luz
839c167b9c7SMaximilian Luz spin_lock(&rtl->pending.lock);
840c167b9c7SMaximilian Luz list_for_each_entry_safe(r, n, &rtl->pending.head, node) {
841c167b9c7SMaximilian Luz ktime_t expires = ssh_request_get_expiration(r, timeout);
842c167b9c7SMaximilian Luz
843c167b9c7SMaximilian Luz /*
844c167b9c7SMaximilian Luz * Check if the timeout hasn't expired yet. Find out next
845c167b9c7SMaximilian Luz * expiration date to be handled after this run.
846c167b9c7SMaximilian Luz */
847c167b9c7SMaximilian Luz if (ktime_after(expires, now)) {
848c167b9c7SMaximilian Luz next = ktime_before(expires, next) ? expires : next;
849c167b9c7SMaximilian Luz continue;
850c167b9c7SMaximilian Luz }
851c167b9c7SMaximilian Luz
852c167b9c7SMaximilian Luz /* Avoid further transitions if locked. */
853c167b9c7SMaximilian Luz if (test_and_set_bit(SSH_REQUEST_SF_LOCKED_BIT, &r->state))
854c167b9c7SMaximilian Luz continue;
855c167b9c7SMaximilian Luz
856c167b9c7SMaximilian Luz /*
857c167b9c7SMaximilian Luz * We have now marked the packet as locked. Thus it cannot be
858c167b9c7SMaximilian Luz * added to the pending or queued lists again after we've
859c167b9c7SMaximilian Luz * removed it here. We can therefore re-use the node of this
860c167b9c7SMaximilian Luz * packet temporarily.
861c167b9c7SMaximilian Luz */
862c167b9c7SMaximilian Luz
863c167b9c7SMaximilian Luz clear_bit(SSH_REQUEST_SF_PENDING_BIT, &r->state);
864c167b9c7SMaximilian Luz
865c167b9c7SMaximilian Luz atomic_dec(&rtl->pending.count);
866a8aedd45SBaokun Li list_move_tail(&r->node, &claimed);
867c167b9c7SMaximilian Luz }
868c167b9c7SMaximilian Luz spin_unlock(&rtl->pending.lock);
869c167b9c7SMaximilian Luz
870c167b9c7SMaximilian Luz /* Cancel and complete the request. */
871c167b9c7SMaximilian Luz list_for_each_entry_safe(r, n, &claimed, node) {
8720d21bb85SMaximilian Luz trace_ssam_request_timeout(r);
8730d21bb85SMaximilian Luz
874c167b9c7SMaximilian Luz /*
875c167b9c7SMaximilian Luz * At this point we've removed the packet from pending. This
876c167b9c7SMaximilian Luz * means that we've obtained the last (only) reference of the
877c167b9c7SMaximilian Luz * system to it. Thus we can just complete it.
878c167b9c7SMaximilian Luz */
879c167b9c7SMaximilian Luz if (!test_and_set_bit(SSH_REQUEST_SF_COMPLETED_BIT, &r->state))
880c167b9c7SMaximilian Luz ssh_rtl_complete_with_status(r, -ETIMEDOUT);
881c167b9c7SMaximilian Luz
882c167b9c7SMaximilian Luz /*
883c167b9c7SMaximilian Luz * Drop the reference we've obtained by removing it from the
884c167b9c7SMaximilian Luz * pending set.
885c167b9c7SMaximilian Luz */
886c167b9c7SMaximilian Luz list_del(&r->node);
887c167b9c7SMaximilian Luz ssh_request_put(r);
888c167b9c7SMaximilian Luz }
889c167b9c7SMaximilian Luz
890c167b9c7SMaximilian Luz /* Ensure that the reaper doesn't run again immediately. */
891c167b9c7SMaximilian Luz next = max(next, ktime_add(now, SSH_RTL_REQUEST_TIMEOUT_RESOLUTION));
892c167b9c7SMaximilian Luz if (next != KTIME_MAX)
893c167b9c7SMaximilian Luz ssh_rtl_timeout_reaper_mod(rtl, now, next);
894c167b9c7SMaximilian Luz
895c167b9c7SMaximilian Luz ssh_rtl_tx_schedule(rtl);
896c167b9c7SMaximilian Luz }
897c167b9c7SMaximilian Luz
ssh_rtl_rx_event(struct ssh_rtl * rtl,const struct ssh_command * cmd,const struct ssam_span * data)898c167b9c7SMaximilian Luz static void ssh_rtl_rx_event(struct ssh_rtl *rtl, const struct ssh_command *cmd,
899c167b9c7SMaximilian Luz const struct ssam_span *data)
900c167b9c7SMaximilian Luz {
9010d21bb85SMaximilian Luz trace_ssam_rx_event_received(cmd, data->len);
9020d21bb85SMaximilian Luz
903c167b9c7SMaximilian Luz rtl_dbg(rtl, "rtl: handling event (rqid: %#06x)\n",
904c167b9c7SMaximilian Luz get_unaligned_le16(&cmd->rqid));
905c167b9c7SMaximilian Luz
906c167b9c7SMaximilian Luz rtl->ops.handle_event(rtl, cmd, data);
907c167b9c7SMaximilian Luz }
908c167b9c7SMaximilian Luz
ssh_rtl_rx_command(struct ssh_ptl * p,const struct ssam_span * data)909c167b9c7SMaximilian Luz static void ssh_rtl_rx_command(struct ssh_ptl *p, const struct ssam_span *data)
910c167b9c7SMaximilian Luz {
911c167b9c7SMaximilian Luz struct ssh_rtl *rtl = to_ssh_rtl(p, ptl);
912c167b9c7SMaximilian Luz struct device *dev = &p->serdev->dev;
913c167b9c7SMaximilian Luz struct ssh_command *command;
914c167b9c7SMaximilian Luz struct ssam_span command_data;
915c167b9c7SMaximilian Luz
916c167b9c7SMaximilian Luz if (sshp_parse_command(dev, data, &command, &command_data))
917c167b9c7SMaximilian Luz return;
918c167b9c7SMaximilian Luz
919ae0fa0a3SMaximilian Luz /*
920ae0fa0a3SMaximilian Luz * Check if the message was intended for us. If not, drop it.
921ae0fa0a3SMaximilian Luz *
922ae0fa0a3SMaximilian Luz * Note: We will need to change this to handle debug messages. On newer
9233f88b459SMaximilian Luz * generation devices, these seem to be sent to SSAM_SSH_TID_DEBUG. We
9243f88b459SMaximilian Luz * as host can still receive them as they can be forwarded via an
9253f88b459SMaximilian Luz * override option on SAM, but doing so does not change the target ID
9263f88b459SMaximilian Luz * to SSAM_SSH_TID_HOST.
927ae0fa0a3SMaximilian Luz */
9283f88b459SMaximilian Luz if (command->tid != SSAM_SSH_TID_HOST) {
929ae0fa0a3SMaximilian Luz rtl_warn(rtl, "rtl: dropping message not intended for us (tid = %#04x)\n",
9303f88b459SMaximilian Luz command->tid);
931ae0fa0a3SMaximilian Luz return;
932ae0fa0a3SMaximilian Luz }
933ae0fa0a3SMaximilian Luz
934c167b9c7SMaximilian Luz if (ssh_rqid_is_event(get_unaligned_le16(&command->rqid)))
935c167b9c7SMaximilian Luz ssh_rtl_rx_event(rtl, command, &command_data);
936c167b9c7SMaximilian Luz else
937c167b9c7SMaximilian Luz ssh_rtl_complete(rtl, command, &command_data);
938c167b9c7SMaximilian Luz }
939c167b9c7SMaximilian Luz
ssh_rtl_rx_data(struct ssh_ptl * p,const struct ssam_span * data)940c167b9c7SMaximilian Luz static void ssh_rtl_rx_data(struct ssh_ptl *p, const struct ssam_span *data)
941c167b9c7SMaximilian Luz {
942c167b9c7SMaximilian Luz if (!data->len) {
943c167b9c7SMaximilian Luz ptl_err(p, "rtl: rx: no data frame payload\n");
944c167b9c7SMaximilian Luz return;
945c167b9c7SMaximilian Luz }
946c167b9c7SMaximilian Luz
947c167b9c7SMaximilian Luz switch (data->ptr[0]) {
948c167b9c7SMaximilian Luz case SSH_PLD_TYPE_CMD:
949c167b9c7SMaximilian Luz ssh_rtl_rx_command(p, data);
950c167b9c7SMaximilian Luz break;
951c167b9c7SMaximilian Luz
952c167b9c7SMaximilian Luz default:
953c167b9c7SMaximilian Luz ptl_err(p, "rtl: rx: unknown frame payload type (type: %#04x)\n",
954c167b9c7SMaximilian Luz data->ptr[0]);
955c167b9c7SMaximilian Luz break;
956c167b9c7SMaximilian Luz }
957c167b9c7SMaximilian Luz }
958c167b9c7SMaximilian Luz
ssh_rtl_packet_release(struct ssh_packet * p)959c167b9c7SMaximilian Luz static void ssh_rtl_packet_release(struct ssh_packet *p)
960c167b9c7SMaximilian Luz {
961c167b9c7SMaximilian Luz struct ssh_request *rqst;
962c167b9c7SMaximilian Luz
963c167b9c7SMaximilian Luz rqst = to_ssh_request(p);
964c167b9c7SMaximilian Luz rqst->ops->release(rqst);
965c167b9c7SMaximilian Luz }
966c167b9c7SMaximilian Luz
967c167b9c7SMaximilian Luz static const struct ssh_packet_ops ssh_rtl_packet_ops = {
968c167b9c7SMaximilian Luz .complete = ssh_rtl_packet_callback,
969c167b9c7SMaximilian Luz .release = ssh_rtl_packet_release,
970c167b9c7SMaximilian Luz };
971c167b9c7SMaximilian Luz
972c167b9c7SMaximilian Luz /**
973c167b9c7SMaximilian Luz * ssh_request_init() - Initialize SSH request.
974c167b9c7SMaximilian Luz * @rqst: The request to initialize.
975c167b9c7SMaximilian Luz * @flags: Request flags, determining the type of the request.
976c167b9c7SMaximilian Luz * @ops: Request operations.
977c167b9c7SMaximilian Luz *
978c167b9c7SMaximilian Luz * Initializes the given SSH request and underlying packet. Sets the message
979c167b9c7SMaximilian Luz * buffer pointer to %NULL and the message buffer length to zero. This buffer
980c167b9c7SMaximilian Luz * has to be set separately via ssh_request_set_data() before submission and
981c167b9c7SMaximilian Luz * must contain a valid SSH request message.
982c167b9c7SMaximilian Luz *
983c167b9c7SMaximilian Luz * Return: Returns zero on success or %-EINVAL if the given flags are invalid.
984c167b9c7SMaximilian Luz */
ssh_request_init(struct ssh_request * rqst,enum ssam_request_flags flags,const struct ssh_request_ops * ops)985c167b9c7SMaximilian Luz int ssh_request_init(struct ssh_request *rqst, enum ssam_request_flags flags,
986c167b9c7SMaximilian Luz const struct ssh_request_ops *ops)
987c167b9c7SMaximilian Luz {
988c167b9c7SMaximilian Luz unsigned long type = BIT(SSH_PACKET_TY_BLOCKING_BIT);
989c167b9c7SMaximilian Luz
990c167b9c7SMaximilian Luz /* Unsequenced requests cannot have a response. */
991c167b9c7SMaximilian Luz if (flags & SSAM_REQUEST_UNSEQUENCED && flags & SSAM_REQUEST_HAS_RESPONSE)
992c167b9c7SMaximilian Luz return -EINVAL;
993c167b9c7SMaximilian Luz
994c167b9c7SMaximilian Luz if (!(flags & SSAM_REQUEST_UNSEQUENCED))
995c167b9c7SMaximilian Luz type |= BIT(SSH_PACKET_TY_SEQUENCED_BIT);
996c167b9c7SMaximilian Luz
997c167b9c7SMaximilian Luz ssh_packet_init(&rqst->packet, type, SSH_PACKET_PRIORITY(DATA, 0),
998c167b9c7SMaximilian Luz &ssh_rtl_packet_ops);
999c167b9c7SMaximilian Luz
1000c167b9c7SMaximilian Luz INIT_LIST_HEAD(&rqst->node);
1001c167b9c7SMaximilian Luz
1002c167b9c7SMaximilian Luz rqst->state = 0;
1003c167b9c7SMaximilian Luz if (flags & SSAM_REQUEST_HAS_RESPONSE)
1004c167b9c7SMaximilian Luz rqst->state |= BIT(SSH_REQUEST_TY_HAS_RESPONSE_BIT);
1005c167b9c7SMaximilian Luz
1006c167b9c7SMaximilian Luz rqst->timestamp = KTIME_MAX;
1007c167b9c7SMaximilian Luz rqst->ops = ops;
1008c167b9c7SMaximilian Luz
1009c167b9c7SMaximilian Luz return 0;
1010c167b9c7SMaximilian Luz }
1011c167b9c7SMaximilian Luz
1012c167b9c7SMaximilian Luz /**
1013c167b9c7SMaximilian Luz * ssh_rtl_init() - Initialize request transport layer.
1014c167b9c7SMaximilian Luz * @rtl: The request transport layer to initialize.
1015c167b9c7SMaximilian Luz * @serdev: The underlying serial device, i.e. the lower-level transport.
1016c167b9c7SMaximilian Luz * @ops: Request transport layer operations.
1017c167b9c7SMaximilian Luz *
1018c167b9c7SMaximilian Luz * Initializes the given request transport layer and associated packet
1019c167b9c7SMaximilian Luz * transport layer. Transmitter and receiver threads must be started
1020e5da18d3SMaximilian Luz * separately via ssh_rtl_start(), after the request-layer has been
1021e5da18d3SMaximilian Luz * initialized and the lower-level serial device layer has been set up.
1022c167b9c7SMaximilian Luz *
1023c167b9c7SMaximilian Luz * Return: Returns zero on success and a nonzero error code on failure.
1024c167b9c7SMaximilian Luz */
ssh_rtl_init(struct ssh_rtl * rtl,struct serdev_device * serdev,const struct ssh_rtl_ops * ops)1025c167b9c7SMaximilian Luz int ssh_rtl_init(struct ssh_rtl *rtl, struct serdev_device *serdev,
1026c167b9c7SMaximilian Luz const struct ssh_rtl_ops *ops)
1027c167b9c7SMaximilian Luz {
1028c167b9c7SMaximilian Luz struct ssh_ptl_ops ptl_ops;
1029c167b9c7SMaximilian Luz int status;
1030c167b9c7SMaximilian Luz
1031c167b9c7SMaximilian Luz ptl_ops.data_received = ssh_rtl_rx_data;
1032c167b9c7SMaximilian Luz
1033c167b9c7SMaximilian Luz status = ssh_ptl_init(&rtl->ptl, serdev, &ptl_ops);
1034c167b9c7SMaximilian Luz if (status)
1035c167b9c7SMaximilian Luz return status;
1036c167b9c7SMaximilian Luz
1037c167b9c7SMaximilian Luz spin_lock_init(&rtl->queue.lock);
1038c167b9c7SMaximilian Luz INIT_LIST_HEAD(&rtl->queue.head);
1039c167b9c7SMaximilian Luz
1040c167b9c7SMaximilian Luz spin_lock_init(&rtl->pending.lock);
1041c167b9c7SMaximilian Luz INIT_LIST_HEAD(&rtl->pending.head);
1042c167b9c7SMaximilian Luz atomic_set_release(&rtl->pending.count, 0);
1043c167b9c7SMaximilian Luz
1044c167b9c7SMaximilian Luz INIT_WORK(&rtl->tx.work, ssh_rtl_tx_work_fn);
1045c167b9c7SMaximilian Luz
1046c167b9c7SMaximilian Luz spin_lock_init(&rtl->rtx_timeout.lock);
1047c167b9c7SMaximilian Luz rtl->rtx_timeout.timeout = SSH_RTL_REQUEST_TIMEOUT;
1048c167b9c7SMaximilian Luz rtl->rtx_timeout.expires = KTIME_MAX;
1049c167b9c7SMaximilian Luz INIT_DELAYED_WORK(&rtl->rtx_timeout.reaper, ssh_rtl_timeout_reap);
1050c167b9c7SMaximilian Luz
1051c167b9c7SMaximilian Luz rtl->ops = *ops;
1052c167b9c7SMaximilian Luz
1053c167b9c7SMaximilian Luz return 0;
1054c167b9c7SMaximilian Luz }
1055c167b9c7SMaximilian Luz
1056c167b9c7SMaximilian Luz /**
1057c167b9c7SMaximilian Luz * ssh_rtl_destroy() - Deinitialize request transport layer.
1058c167b9c7SMaximilian Luz * @rtl: The request transport layer to deinitialize.
1059c167b9c7SMaximilian Luz *
1060c167b9c7SMaximilian Luz * Deinitializes the given request transport layer and frees resources
1061c167b9c7SMaximilian Luz * associated with it. If receiver and/or transmitter threads have been
1062c167b9c7SMaximilian Luz * started, the layer must first be shut down via ssh_rtl_shutdown() before
1063c167b9c7SMaximilian Luz * this function can be called.
1064c167b9c7SMaximilian Luz */
ssh_rtl_destroy(struct ssh_rtl * rtl)1065c167b9c7SMaximilian Luz void ssh_rtl_destroy(struct ssh_rtl *rtl)
1066c167b9c7SMaximilian Luz {
1067c167b9c7SMaximilian Luz ssh_ptl_destroy(&rtl->ptl);
1068c167b9c7SMaximilian Luz }
1069c167b9c7SMaximilian Luz
1070c167b9c7SMaximilian Luz /**
1071025fe94bSMauro Carvalho Chehab * ssh_rtl_start() - Start request transmitter and receiver.
1072c167b9c7SMaximilian Luz * @rtl: The request transport layer.
1073c167b9c7SMaximilian Luz *
1074c167b9c7SMaximilian Luz * Return: Returns zero on success, a negative error code on failure.
1075c167b9c7SMaximilian Luz */
ssh_rtl_start(struct ssh_rtl * rtl)1076c167b9c7SMaximilian Luz int ssh_rtl_start(struct ssh_rtl *rtl)
1077c167b9c7SMaximilian Luz {
1078c167b9c7SMaximilian Luz int status;
1079c167b9c7SMaximilian Luz
1080c167b9c7SMaximilian Luz status = ssh_ptl_tx_start(&rtl->ptl);
1081c167b9c7SMaximilian Luz if (status)
1082c167b9c7SMaximilian Luz return status;
1083c167b9c7SMaximilian Luz
1084c167b9c7SMaximilian Luz ssh_rtl_tx_schedule(rtl);
1085c167b9c7SMaximilian Luz
1086c167b9c7SMaximilian Luz status = ssh_ptl_rx_start(&rtl->ptl);
1087c167b9c7SMaximilian Luz if (status) {
1088c167b9c7SMaximilian Luz ssh_rtl_flush(rtl, msecs_to_jiffies(5000));
1089c167b9c7SMaximilian Luz ssh_ptl_tx_stop(&rtl->ptl);
1090c167b9c7SMaximilian Luz return status;
1091c167b9c7SMaximilian Luz }
1092c167b9c7SMaximilian Luz
1093c167b9c7SMaximilian Luz return 0;
1094c167b9c7SMaximilian Luz }
1095c167b9c7SMaximilian Luz
1096c167b9c7SMaximilian Luz struct ssh_flush_request {
1097c167b9c7SMaximilian Luz struct ssh_request base;
1098c167b9c7SMaximilian Luz struct completion completion;
1099c167b9c7SMaximilian Luz int status;
1100c167b9c7SMaximilian Luz };
1101c167b9c7SMaximilian Luz
ssh_rtl_flush_request_complete(struct ssh_request * r,const struct ssh_command * cmd,const struct ssam_span * data,int status)1102c167b9c7SMaximilian Luz static void ssh_rtl_flush_request_complete(struct ssh_request *r,
1103c167b9c7SMaximilian Luz const struct ssh_command *cmd,
1104c167b9c7SMaximilian Luz const struct ssam_span *data,
1105c167b9c7SMaximilian Luz int status)
1106c167b9c7SMaximilian Luz {
1107c167b9c7SMaximilian Luz struct ssh_flush_request *rqst;
1108c167b9c7SMaximilian Luz
1109c167b9c7SMaximilian Luz rqst = container_of(r, struct ssh_flush_request, base);
1110c167b9c7SMaximilian Luz rqst->status = status;
1111c167b9c7SMaximilian Luz }
1112c167b9c7SMaximilian Luz
ssh_rtl_flush_request_release(struct ssh_request * r)1113c167b9c7SMaximilian Luz static void ssh_rtl_flush_request_release(struct ssh_request *r)
1114c167b9c7SMaximilian Luz {
1115c167b9c7SMaximilian Luz struct ssh_flush_request *rqst;
1116c167b9c7SMaximilian Luz
1117c167b9c7SMaximilian Luz rqst = container_of(r, struct ssh_flush_request, base);
1118c167b9c7SMaximilian Luz complete_all(&rqst->completion);
1119c167b9c7SMaximilian Luz }
1120c167b9c7SMaximilian Luz
1121c167b9c7SMaximilian Luz static const struct ssh_request_ops ssh_rtl_flush_request_ops = {
1122c167b9c7SMaximilian Luz .complete = ssh_rtl_flush_request_complete,
1123c167b9c7SMaximilian Luz .release = ssh_rtl_flush_request_release,
1124c167b9c7SMaximilian Luz };
1125c167b9c7SMaximilian Luz
1126c167b9c7SMaximilian Luz /**
1127c167b9c7SMaximilian Luz * ssh_rtl_flush() - Flush the request transport layer.
1128c167b9c7SMaximilian Luz * @rtl: request transport layer
1129c167b9c7SMaximilian Luz * @timeout: timeout for the flush operation in jiffies
1130c167b9c7SMaximilian Luz *
1131c167b9c7SMaximilian Luz * Queue a special flush request and wait for its completion. This request
1132c167b9c7SMaximilian Luz * will be completed after all other currently queued and pending requests
1133c167b9c7SMaximilian Luz * have been completed. Instead of a normal data packet, this request submits
1134c167b9c7SMaximilian Luz * a special flush packet, meaning that upon completion, also the underlying
1135c167b9c7SMaximilian Luz * packet transport layer has been flushed.
1136c167b9c7SMaximilian Luz *
1137c167b9c7SMaximilian Luz * Flushing the request layer guarantees that all previously submitted
1138c167b9c7SMaximilian Luz * requests have been fully completed before this call returns. Additionally,
1139c167b9c7SMaximilian Luz * flushing blocks execution of all later submitted requests until the flush
1140c167b9c7SMaximilian Luz * has been completed.
1141c167b9c7SMaximilian Luz *
1142c167b9c7SMaximilian Luz * If the caller ensures that no new requests are submitted after a call to
1143c167b9c7SMaximilian Luz * this function, the request transport layer is guaranteed to have no
1144c167b9c7SMaximilian Luz * remaining requests when this call returns. The same guarantee does not hold
1145c167b9c7SMaximilian Luz * for the packet layer, on which control packets may still be queued after
1146c167b9c7SMaximilian Luz * this call.
1147c167b9c7SMaximilian Luz *
1148c167b9c7SMaximilian Luz * Return: Returns zero on success, %-ETIMEDOUT if the flush timed out and has
1149c167b9c7SMaximilian Luz * been canceled as a result of the timeout, or %-ESHUTDOWN if the packet
1150c167b9c7SMaximilian Luz * and/or request transport layer has been shut down before this call. May
1151c167b9c7SMaximilian Luz * also return %-EINTR if the underlying packet transmission has been
1152c167b9c7SMaximilian Luz * interrupted.
1153c167b9c7SMaximilian Luz */
ssh_rtl_flush(struct ssh_rtl * rtl,unsigned long timeout)1154c167b9c7SMaximilian Luz int ssh_rtl_flush(struct ssh_rtl *rtl, unsigned long timeout)
1155c167b9c7SMaximilian Luz {
1156c167b9c7SMaximilian Luz const unsigned int init_flags = SSAM_REQUEST_UNSEQUENCED;
1157c167b9c7SMaximilian Luz struct ssh_flush_request rqst;
1158c167b9c7SMaximilian Luz int status;
1159c167b9c7SMaximilian Luz
1160c167b9c7SMaximilian Luz ssh_request_init(&rqst.base, init_flags, &ssh_rtl_flush_request_ops);
1161c167b9c7SMaximilian Luz rqst.base.packet.state |= BIT(SSH_PACKET_TY_FLUSH_BIT);
1162c167b9c7SMaximilian Luz rqst.base.packet.priority = SSH_PACKET_PRIORITY(FLUSH, 0);
1163c167b9c7SMaximilian Luz rqst.base.state |= BIT(SSH_REQUEST_TY_FLUSH_BIT);
1164c167b9c7SMaximilian Luz
1165c167b9c7SMaximilian Luz init_completion(&rqst.completion);
1166c167b9c7SMaximilian Luz
1167c167b9c7SMaximilian Luz status = ssh_rtl_submit(rtl, &rqst.base);
1168c167b9c7SMaximilian Luz if (status)
1169c167b9c7SMaximilian Luz return status;
1170c167b9c7SMaximilian Luz
1171c167b9c7SMaximilian Luz ssh_request_put(&rqst.base);
1172c167b9c7SMaximilian Luz
1173c167b9c7SMaximilian Luz if (!wait_for_completion_timeout(&rqst.completion, timeout)) {
1174c167b9c7SMaximilian Luz ssh_rtl_cancel(&rqst.base, true);
1175c167b9c7SMaximilian Luz wait_for_completion(&rqst.completion);
1176c167b9c7SMaximilian Luz }
1177c167b9c7SMaximilian Luz
1178c167b9c7SMaximilian Luz WARN_ON(rqst.status != 0 && rqst.status != -ECANCELED &&
1179c167b9c7SMaximilian Luz rqst.status != -ESHUTDOWN && rqst.status != -EINTR);
1180c167b9c7SMaximilian Luz
1181c167b9c7SMaximilian Luz return rqst.status == -ECANCELED ? -ETIMEDOUT : rqst.status;
1182c167b9c7SMaximilian Luz }
1183c167b9c7SMaximilian Luz
1184c167b9c7SMaximilian Luz /**
1185c167b9c7SMaximilian Luz * ssh_rtl_shutdown() - Shut down request transport layer.
1186c167b9c7SMaximilian Luz * @rtl: The request transport layer.
1187c167b9c7SMaximilian Luz *
1188c167b9c7SMaximilian Luz * Shuts down the request transport layer, removing and canceling all queued
1189c167b9c7SMaximilian Luz * and pending requests. Requests canceled by this operation will be completed
1190c167b9c7SMaximilian Luz * with %-ESHUTDOWN as status. Receiver and transmitter threads will be
1191c167b9c7SMaximilian Luz * stopped, the lower-level packet layer will be shutdown.
1192c167b9c7SMaximilian Luz *
1193c167b9c7SMaximilian Luz * As a result of this function, the transport layer will be marked as shut
1194c167b9c7SMaximilian Luz * down. Submission of requests after the transport layer has been shut down
1195c167b9c7SMaximilian Luz * will fail with %-ESHUTDOWN.
1196c167b9c7SMaximilian Luz */
ssh_rtl_shutdown(struct ssh_rtl * rtl)1197c167b9c7SMaximilian Luz void ssh_rtl_shutdown(struct ssh_rtl *rtl)
1198c167b9c7SMaximilian Luz {
1199c167b9c7SMaximilian Luz struct ssh_request *r, *n;
1200c167b9c7SMaximilian Luz LIST_HEAD(claimed);
1201c167b9c7SMaximilian Luz int pending;
1202c167b9c7SMaximilian Luz
1203c167b9c7SMaximilian Luz set_bit(SSH_RTL_SF_SHUTDOWN_BIT, &rtl->state);
1204c167b9c7SMaximilian Luz /*
1205c167b9c7SMaximilian Luz * Ensure that the layer gets marked as shut-down before actually
1206c167b9c7SMaximilian Luz * stopping it. In combination with the check in ssh_rtl_submit(),
1207c167b9c7SMaximilian Luz * this guarantees that no new requests can be added and all already
1208c167b9c7SMaximilian Luz * queued requests are properly canceled.
1209c167b9c7SMaximilian Luz */
1210c167b9c7SMaximilian Luz smp_mb__after_atomic();
1211c167b9c7SMaximilian Luz
1212c167b9c7SMaximilian Luz /* Remove requests from queue. */
1213c167b9c7SMaximilian Luz spin_lock(&rtl->queue.lock);
1214c167b9c7SMaximilian Luz list_for_each_entry_safe(r, n, &rtl->queue.head, node) {
1215c167b9c7SMaximilian Luz set_bit(SSH_REQUEST_SF_LOCKED_BIT, &r->state);
1216c167b9c7SMaximilian Luz /* Ensure state never gets zero. */
1217c167b9c7SMaximilian Luz smp_mb__before_atomic();
1218c167b9c7SMaximilian Luz clear_bit(SSH_REQUEST_SF_QUEUED_BIT, &r->state);
1219c167b9c7SMaximilian Luz
1220a8aedd45SBaokun Li list_move_tail(&r->node, &claimed);
1221c167b9c7SMaximilian Luz }
1222c167b9c7SMaximilian Luz spin_unlock(&rtl->queue.lock);
1223c167b9c7SMaximilian Luz
1224c167b9c7SMaximilian Luz /*
1225c167b9c7SMaximilian Luz * We have now guaranteed that the queue is empty and no more new
1226c167b9c7SMaximilian Luz * requests can be submitted (i.e. it will stay empty). This means that
1227c167b9c7SMaximilian Luz * calling ssh_rtl_tx_schedule() will not schedule tx.work any more. So
1228c167b9c7SMaximilian Luz * we can simply call cancel_work_sync() on tx.work here and when that
1229c167b9c7SMaximilian Luz * returns, we've locked it down. This also means that after this call,
1230c167b9c7SMaximilian Luz * we don't submit any more packets to the underlying packet layer, so
1231c167b9c7SMaximilian Luz * we can also shut that down.
1232c167b9c7SMaximilian Luz */
1233c167b9c7SMaximilian Luz
1234c167b9c7SMaximilian Luz cancel_work_sync(&rtl->tx.work);
1235c167b9c7SMaximilian Luz ssh_ptl_shutdown(&rtl->ptl);
1236c167b9c7SMaximilian Luz cancel_delayed_work_sync(&rtl->rtx_timeout.reaper);
1237c167b9c7SMaximilian Luz
1238c167b9c7SMaximilian Luz /*
1239c167b9c7SMaximilian Luz * Shutting down the packet layer should also have canceled all
1240c167b9c7SMaximilian Luz * requests. Thus the pending set should be empty. Attempt to handle
1241c167b9c7SMaximilian Luz * this gracefully anyways, even though this should be dead code.
1242c167b9c7SMaximilian Luz */
1243c167b9c7SMaximilian Luz
1244c167b9c7SMaximilian Luz pending = atomic_read(&rtl->pending.count);
1245c167b9c7SMaximilian Luz if (WARN_ON(pending)) {
1246c167b9c7SMaximilian Luz spin_lock(&rtl->pending.lock);
1247c167b9c7SMaximilian Luz list_for_each_entry_safe(r, n, &rtl->pending.head, node) {
1248c167b9c7SMaximilian Luz set_bit(SSH_REQUEST_SF_LOCKED_BIT, &r->state);
1249c167b9c7SMaximilian Luz /* Ensure state never gets zero. */
1250c167b9c7SMaximilian Luz smp_mb__before_atomic();
1251c167b9c7SMaximilian Luz clear_bit(SSH_REQUEST_SF_PENDING_BIT, &r->state);
1252c167b9c7SMaximilian Luz
1253a8aedd45SBaokun Li list_move_tail(&r->node, &claimed);
1254c167b9c7SMaximilian Luz }
1255c167b9c7SMaximilian Luz spin_unlock(&rtl->pending.lock);
1256c167b9c7SMaximilian Luz }
1257c167b9c7SMaximilian Luz
1258c167b9c7SMaximilian Luz /* Finally, cancel and complete the requests we claimed before. */
1259c167b9c7SMaximilian Luz list_for_each_entry_safe(r, n, &claimed, node) {
1260c167b9c7SMaximilian Luz /*
1261c167b9c7SMaximilian Luz * We need test_and_set() because we still might compete with
1262c167b9c7SMaximilian Luz * cancellation.
1263c167b9c7SMaximilian Luz */
1264c167b9c7SMaximilian Luz if (!test_and_set_bit(SSH_REQUEST_SF_COMPLETED_BIT, &r->state))
1265c167b9c7SMaximilian Luz ssh_rtl_complete_with_status(r, -ESHUTDOWN);
1266c167b9c7SMaximilian Luz
1267c167b9c7SMaximilian Luz /*
1268c167b9c7SMaximilian Luz * Drop the reference we've obtained by removing it from the
1269c167b9c7SMaximilian Luz * lists.
1270c167b9c7SMaximilian Luz */
1271c167b9c7SMaximilian Luz list_del(&r->node);
1272c167b9c7SMaximilian Luz ssh_request_put(r);
1273c167b9c7SMaximilian Luz }
1274c167b9c7SMaximilian Luz }
1275