xref: /linux/drivers/platform/surface/aggregator/controller.c (revision bb9a9bf2787fbe1a4e003daabc8f7a31c17740d6)
1 // SPDX-License-Identifier: GPL-2.0+
2 /*
3  * Main SSAM/SSH controller structure and functionality.
4  *
5  * Copyright (C) 2019-2022 Maximilian Luz <luzmaximilian@gmail.com>
6  */
7 
8 #include <linux/acpi.h>
9 #include <linux/atomic.h>
10 #include <linux/completion.h>
11 #include <linux/gpio/consumer.h>
12 #include <linux/interrupt.h>
13 #include <linux/kref.h>
14 #include <linux/limits.h>
15 #include <linux/list.h>
16 #include <linux/lockdep.h>
17 #include <linux/mutex.h>
18 #include <linux/rculist.h>
19 #include <linux/rbtree.h>
20 #include <linux/rwsem.h>
21 #include <linux/serdev.h>
22 #include <linux/slab.h>
23 #include <linux/spinlock.h>
24 #include <linux/srcu.h>
25 #include <linux/types.h>
26 #include <linux/workqueue.h>
27 
28 #include <linux/surface_aggregator/controller.h>
29 #include <linux/surface_aggregator/serial_hub.h>
30 
31 #include "controller.h"
32 #include "ssh_msgb.h"
33 #include "ssh_request_layer.h"
34 
35 #include "trace.h"
36 
37 
38 /* -- Safe counters. -------------------------------------------------------- */
39 
40 /**
41  * ssh_seq_reset() - Reset/initialize sequence ID counter.
42  * @c: The counter to reset.
43  */
44 static void ssh_seq_reset(struct ssh_seq_counter *c)
45 {
46 	WRITE_ONCE(c->value, 0);
47 }
48 
49 /**
50  * ssh_seq_next() - Get next sequence ID.
51  * @c: The counter providing the sequence IDs.
52  *
53  * Return: Returns the next sequence ID of the counter.
54  */
55 static u8 ssh_seq_next(struct ssh_seq_counter *c)
56 {
57 	u8 old = READ_ONCE(c->value);
58 	u8 new = old + 1;
59 	u8 ret;
60 
61 	while (unlikely((ret = cmpxchg(&c->value, old, new)) != old)) {
62 		old = ret;
63 		new = old + 1;
64 	}
65 
66 	return old;
67 }
68 
69 /**
70  * ssh_rqid_reset() - Reset/initialize request ID counter.
71  * @c: The counter to reset.
72  */
73 static void ssh_rqid_reset(struct ssh_rqid_counter *c)
74 {
75 	WRITE_ONCE(c->value, 0);
76 }
77 
78 /**
79  * ssh_rqid_next() - Get next request ID.
80  * @c: The counter providing the request IDs.
81  *
82  * Return: Returns the next request ID of the counter, skipping any reserved
83  * request IDs.
84  */
85 static u16 ssh_rqid_next(struct ssh_rqid_counter *c)
86 {
87 	u16 old = READ_ONCE(c->value);
88 	u16 new = ssh_rqid_next_valid(old);
89 	u16 ret;
90 
91 	while (unlikely((ret = cmpxchg(&c->value, old, new)) != old)) {
92 		old = ret;
93 		new = ssh_rqid_next_valid(old);
94 	}
95 
96 	return old;
97 }
98 
99 
100 /* -- Event notifier/callbacks. --------------------------------------------- */
101 /*
102  * The notifier system is based on linux/notifier.h, specifically the SRCU
103  * implementation. The difference to that is, that some bits of the notifier
104  * call return value can be tracked across multiple calls. This is done so
105  * that handling of events can be tracked and a warning can be issued in case
106  * an event goes unhandled. The idea of that warning is that it should help
107  * discover and identify new/currently unimplemented features.
108  */
109 
110 /**
111  * ssam_event_matches_notifier() - Test if an event matches a notifier.
112  * @n: The event notifier to test against.
113  * @event: The event to test.
114  *
115  * Return: Returns %true if the given event matches the given notifier
116  * according to the rules set in the notifier's event mask, %false otherwise.
117  */
118 static bool ssam_event_matches_notifier(const struct ssam_event_notifier *n,
119 					const struct ssam_event *event)
120 {
121 	bool match = n->event.id.target_category == event->target_category;
122 
123 	if (n->event.mask & SSAM_EVENT_MASK_TARGET)
124 		match &= n->event.reg.target_id == event->target_id;
125 
126 	if (n->event.mask & SSAM_EVENT_MASK_INSTANCE)
127 		match &= n->event.id.instance == event->instance_id;
128 
129 	return match;
130 }
131 
132 /**
133  * ssam_nfblk_call_chain() - Call event notifier callbacks of the given chain.
134  * @nh:    The notifier head for which the notifier callbacks should be called.
135  * @event: The event data provided to the callbacks.
136  *
137  * Call all registered notifier callbacks in order of their priority until
138  * either no notifier is left or a notifier returns a value with the
139  * %SSAM_NOTIF_STOP bit set. Note that this bit is automatically set via
140  * ssam_notifier_from_errno() on any non-zero error value.
141  *
142  * Return: Returns the notifier status value, which contains the notifier
143  * status bits (%SSAM_NOTIF_HANDLED and %SSAM_NOTIF_STOP) as well as a
144  * potential error value returned from the last executed notifier callback.
145  * Use ssam_notifier_to_errno() to convert this value to the original error
146  * value.
147  */
148 static int ssam_nfblk_call_chain(struct ssam_nf_head *nh, struct ssam_event *event)
149 {
150 	struct ssam_event_notifier *nf;
151 	int ret = 0, idx;
152 
153 	idx = srcu_read_lock(&nh->srcu);
154 
155 	list_for_each_entry_rcu(nf, &nh->head, base.node,
156 				srcu_read_lock_held(&nh->srcu)) {
157 		if (ssam_event_matches_notifier(nf, event)) {
158 			ret = (ret & SSAM_NOTIF_STATE_MASK) | nf->base.fn(nf, event);
159 			if (ret & SSAM_NOTIF_STOP)
160 				break;
161 		}
162 	}
163 
164 	srcu_read_unlock(&nh->srcu, idx);
165 	return ret;
166 }
167 
168 /**
169  * ssam_nfblk_insert() - Insert a new notifier block into the given notifier
170  * list.
171  * @nh: The notifier head into which the block should be inserted.
172  * @nb: The notifier block to add.
173  *
174  * Note: This function must be synchronized by the caller with respect to other
175  * insert, find, and/or remove calls by holding ``struct ssam_nf.lock``.
176  *
177  * Return: Returns zero on success, %-EEXIST if the notifier block has already
178  * been registered.
179  */
180 static int ssam_nfblk_insert(struct ssam_nf_head *nh, struct ssam_notifier_block *nb)
181 {
182 	struct ssam_notifier_block *p;
183 	struct list_head *h;
184 
185 	/* Runs under lock, no need for RCU variant. */
186 	list_for_each(h, &nh->head) {
187 		p = list_entry(h, struct ssam_notifier_block, node);
188 
189 		if (unlikely(p == nb)) {
190 			WARN(1, "double register detected");
191 			return -EEXIST;
192 		}
193 
194 		if (nb->priority > p->priority)
195 			break;
196 	}
197 
198 	list_add_tail_rcu(&nb->node, h);
199 	return 0;
200 }
201 
202 /**
203  * ssam_nfblk_find() - Check if a notifier block is registered on the given
204  * notifier head.
205  * list.
206  * @nh: The notifier head on which to search.
207  * @nb: The notifier block to search for.
208  *
209  * Note: This function must be synchronized by the caller with respect to other
210  * insert, find, and/or remove calls by holding ``struct ssam_nf.lock``.
211  *
212  * Return: Returns true if the given notifier block is registered on the given
213  * notifier head, false otherwise.
214  */
215 static bool ssam_nfblk_find(struct ssam_nf_head *nh, struct ssam_notifier_block *nb)
216 {
217 	struct ssam_notifier_block *p;
218 
219 	/* Runs under lock, no need for RCU variant. */
220 	list_for_each_entry(p, &nh->head, node) {
221 		if (p == nb)
222 			return true;
223 	}
224 
225 	return false;
226 }
227 
228 /**
229  * ssam_nfblk_remove() - Remove a notifier block from its notifier list.
230  * @nb: The notifier block to be removed.
231  *
232  * Note: This function must be synchronized by the caller with respect to
233  * other insert, find, and/or remove calls by holding ``struct ssam_nf.lock``.
234  * Furthermore, the caller _must_ ensure SRCU synchronization by calling
235  * synchronize_srcu() with ``nh->srcu`` after leaving the critical section, to
236  * ensure that the removed notifier block is not in use any more.
237  */
238 static void ssam_nfblk_remove(struct ssam_notifier_block *nb)
239 {
240 	list_del_rcu(&nb->node);
241 }
242 
243 /**
244  * ssam_nf_head_init() - Initialize the given notifier head.
245  * @nh: The notifier head to initialize.
246  */
247 static int ssam_nf_head_init(struct ssam_nf_head *nh)
248 {
249 	int status;
250 
251 	status = init_srcu_struct(&nh->srcu);
252 	if (status)
253 		return status;
254 
255 	INIT_LIST_HEAD(&nh->head);
256 	return 0;
257 }
258 
259 /**
260  * ssam_nf_head_destroy() - Deinitialize the given notifier head.
261  * @nh: The notifier head to deinitialize.
262  */
263 static void ssam_nf_head_destroy(struct ssam_nf_head *nh)
264 {
265 	cleanup_srcu_struct(&nh->srcu);
266 }
267 
268 
269 /* -- Event/notification registry. ------------------------------------------ */
270 
271 /**
272  * struct ssam_nf_refcount_key - Key used for event activation reference
273  * counting.
274  * @reg: The registry via which the event is enabled/disabled.
275  * @id:  The ID uniquely describing the event.
276  */
277 struct ssam_nf_refcount_key {
278 	struct ssam_event_registry reg;
279 	struct ssam_event_id id;
280 };
281 
282 /**
283  * struct ssam_nf_refcount_entry - RB-tree entry for reference counting event
284  * activations.
285  * @node:     The node of this entry in the rb-tree.
286  * @key:      The key of the event.
287  * @refcount: The reference-count of the event.
288  * @flags:    The flags used when enabling the event.
289  */
290 struct ssam_nf_refcount_entry {
291 	struct rb_node node;
292 	struct ssam_nf_refcount_key key;
293 	int refcount;
294 	u8 flags;
295 };
296 
297 /**
298  * ssam_nf_refcount_inc() - Increment reference-/activation-count of the given
299  * event.
300  * @nf:  The notifier system reference.
301  * @reg: The registry used to enable/disable the event.
302  * @id:  The event ID.
303  *
304  * Increments the reference-/activation-count associated with the specified
305  * event type/ID, allocating a new entry for this event ID if necessary. A
306  * newly allocated entry will have a refcount of one.
307  *
308  * Note: ``nf->lock`` must be held when calling this function.
309  *
310  * Return: Returns the refcount entry on success. Returns an error pointer
311  * with %-ENOSPC if there have already been %INT_MAX events of the specified
312  * ID and type registered, or %-ENOMEM if the entry could not be allocated.
313  */
314 static struct ssam_nf_refcount_entry *
315 ssam_nf_refcount_inc(struct ssam_nf *nf, struct ssam_event_registry reg,
316 		     struct ssam_event_id id)
317 {
318 	struct ssam_nf_refcount_entry *entry;
319 	struct ssam_nf_refcount_key key;
320 	struct rb_node **link = &nf->refcount.rb_node;
321 	struct rb_node *parent = NULL;
322 	int cmp;
323 
324 	lockdep_assert_held(&nf->lock);
325 
326 	key.reg = reg;
327 	key.id = id;
328 
329 	while (*link) {
330 		entry = rb_entry(*link, struct ssam_nf_refcount_entry, node);
331 		parent = *link;
332 
333 		cmp = memcmp(&key, &entry->key, sizeof(key));
334 		if (cmp < 0) {
335 			link = &(*link)->rb_left;
336 		} else if (cmp > 0) {
337 			link = &(*link)->rb_right;
338 		} else if (entry->refcount < INT_MAX) {
339 			entry->refcount++;
340 			return entry;
341 		} else {
342 			WARN_ON(1);
343 			return ERR_PTR(-ENOSPC);
344 		}
345 	}
346 
347 	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
348 	if (!entry)
349 		return ERR_PTR(-ENOMEM);
350 
351 	entry->key = key;
352 	entry->refcount = 1;
353 
354 	rb_link_node(&entry->node, parent, link);
355 	rb_insert_color(&entry->node, &nf->refcount);
356 
357 	return entry;
358 }
359 
360 /**
361  * ssam_nf_refcount_dec() - Decrement reference-/activation-count of the given
362  * event.
363  * @nf:  The notifier system reference.
364  * @reg: The registry used to enable/disable the event.
365  * @id:  The event ID.
366  *
367  * Decrements the reference-/activation-count of the specified event,
368  * returning its entry. If the returned entry has a refcount of zero, the
369  * caller is responsible for freeing it using kfree().
370  *
371  * Note: ``nf->lock`` must be held when calling this function.
372  *
373  * Return: Returns the refcount entry on success or %NULL if the entry has not
374  * been found.
375  */
376 static struct ssam_nf_refcount_entry *
377 ssam_nf_refcount_dec(struct ssam_nf *nf, struct ssam_event_registry reg,
378 		     struct ssam_event_id id)
379 {
380 	struct ssam_nf_refcount_entry *entry;
381 	struct ssam_nf_refcount_key key;
382 	struct rb_node *node = nf->refcount.rb_node;
383 	int cmp;
384 
385 	lockdep_assert_held(&nf->lock);
386 
387 	key.reg = reg;
388 	key.id = id;
389 
390 	while (node) {
391 		entry = rb_entry(node, struct ssam_nf_refcount_entry, node);
392 
393 		cmp = memcmp(&key, &entry->key, sizeof(key));
394 		if (cmp < 0) {
395 			node = node->rb_left;
396 		} else if (cmp > 0) {
397 			node = node->rb_right;
398 		} else {
399 			entry->refcount--;
400 			if (entry->refcount == 0)
401 				rb_erase(&entry->node, &nf->refcount);
402 
403 			return entry;
404 		}
405 	}
406 
407 	return NULL;
408 }
409 
410 /**
411  * ssam_nf_refcount_dec_free() - Decrement reference-/activation-count of the
412  * given event and free its entry if the reference count reaches zero.
413  * @nf:  The notifier system reference.
414  * @reg: The registry used to enable/disable the event.
415  * @id:  The event ID.
416  *
417  * Decrements the reference-/activation-count of the specified event, freeing
418  * its entry if it reaches zero.
419  *
420  * Note: ``nf->lock`` must be held when calling this function.
421  */
422 static void ssam_nf_refcount_dec_free(struct ssam_nf *nf,
423 				      struct ssam_event_registry reg,
424 				      struct ssam_event_id id)
425 {
426 	struct ssam_nf_refcount_entry *entry;
427 
428 	lockdep_assert_held(&nf->lock);
429 
430 	entry = ssam_nf_refcount_dec(nf, reg, id);
431 	if (entry && entry->refcount == 0)
432 		kfree(entry);
433 }
434 
435 /**
436  * ssam_nf_refcount_empty() - Test if the notification system has any
437  * enabled/active events.
438  * @nf: The notification system.
439  */
440 static bool ssam_nf_refcount_empty(struct ssam_nf *nf)
441 {
442 	return RB_EMPTY_ROOT(&nf->refcount);
443 }
444 
445 /**
446  * ssam_nf_call() - Call notification callbacks for the provided event.
447  * @nf:    The notifier system
448  * @dev:   The associated device, only used for logging.
449  * @rqid:  The request ID of the event.
450  * @event: The event provided to the callbacks.
451  *
452  * Execute registered callbacks in order of their priority until either no
453  * callback is left or a callback returns a value with the %SSAM_NOTIF_STOP
454  * bit set. Note that this bit is set automatically when converting non-zero
455  * error values via ssam_notifier_from_errno() to notifier values.
456  *
457  * Also note that any callback that could handle an event should return a value
458  * with bit %SSAM_NOTIF_HANDLED set, indicating that the event does not go
459  * unhandled/ignored. In case no registered callback could handle an event,
460  * this function will emit a warning.
461  *
462  * In case a callback failed, this function will emit an error message.
463  */
464 static void ssam_nf_call(struct ssam_nf *nf, struct device *dev, u16 rqid,
465 			 struct ssam_event *event)
466 {
467 	struct ssam_nf_head *nf_head;
468 	int status, nf_ret;
469 
470 	if (!ssh_rqid_is_event(rqid)) {
471 		dev_warn(dev, "event: unsupported rqid: %#06x\n", rqid);
472 		return;
473 	}
474 
475 	nf_head = &nf->head[ssh_rqid_to_event(rqid)];
476 	nf_ret = ssam_nfblk_call_chain(nf_head, event);
477 	status = ssam_notifier_to_errno(nf_ret);
478 
479 	if (status < 0) {
480 		dev_err(dev,
481 			"event: error handling event: %d (tc: %#04x, tid: %#04x, cid: %#04x, iid: %#04x)\n",
482 			status, event->target_category, event->target_id,
483 			event->command_id, event->instance_id);
484 	} else if (!(nf_ret & SSAM_NOTIF_HANDLED)) {
485 		dev_warn(dev,
486 			 "event: unhandled event (rqid: %#04x, tc: %#04x, tid: %#04x, cid: %#04x, iid: %#04x)\n",
487 			 rqid, event->target_category, event->target_id,
488 			 event->command_id, event->instance_id);
489 	}
490 }
491 
492 /**
493  * ssam_nf_init() - Initialize the notifier system.
494  * @nf: The notifier system to initialize.
495  */
496 static int ssam_nf_init(struct ssam_nf *nf)
497 {
498 	int i, status;
499 
500 	for (i = 0; i < SSH_NUM_EVENTS; i++) {
501 		status = ssam_nf_head_init(&nf->head[i]);
502 		if (status)
503 			break;
504 	}
505 
506 	if (status) {
507 		while (i--)
508 			ssam_nf_head_destroy(&nf->head[i]);
509 
510 		return status;
511 	}
512 
513 	mutex_init(&nf->lock);
514 	return 0;
515 }
516 
517 /**
518  * ssam_nf_destroy() - Deinitialize the notifier system.
519  * @nf: The notifier system to deinitialize.
520  */
521 static void ssam_nf_destroy(struct ssam_nf *nf)
522 {
523 	int i;
524 
525 	for (i = 0; i < SSH_NUM_EVENTS; i++)
526 		ssam_nf_head_destroy(&nf->head[i]);
527 
528 	mutex_destroy(&nf->lock);
529 }
530 
531 
532 /* -- Event/async request completion system. -------------------------------- */
533 
534 #define SSAM_CPLT_WQ_NAME	"ssam_cpltq"
535 
536 /*
537  * SSAM_CPLT_WQ_BATCH - Maximum number of event item completions executed per
538  * work execution. Used to prevent livelocking of the workqueue. Value chosen
539  * via educated guess, may be adjusted.
540  */
541 #define SSAM_CPLT_WQ_BATCH	10
542 
543 /*
544  * SSAM_EVENT_ITEM_CACHE_PAYLOAD_LEN - Maximum payload length for a cached
545  * &struct ssam_event_item.
546  *
547  * This length has been chosen to be accommodate standard touchpad and
548  * keyboard input events. Events with larger payloads will be allocated
549  * separately.
550  */
551 #define SSAM_EVENT_ITEM_CACHE_PAYLOAD_LEN	32
552 
553 static struct kmem_cache *ssam_event_item_cache;
554 
555 /**
556  * ssam_event_item_cache_init() - Initialize the event item cache.
557  */
558 int ssam_event_item_cache_init(void)
559 {
560 	const unsigned int size = sizeof(struct ssam_event_item)
561 				  + SSAM_EVENT_ITEM_CACHE_PAYLOAD_LEN;
562 	const unsigned int align = __alignof__(struct ssam_event_item);
563 	struct kmem_cache *cache;
564 
565 	cache = kmem_cache_create("ssam_event_item", size, align, 0, NULL);
566 	if (!cache)
567 		return -ENOMEM;
568 
569 	ssam_event_item_cache = cache;
570 	return 0;
571 }
572 
573 /**
574  * ssam_event_item_cache_destroy() - Deinitialize the event item cache.
575  */
576 void ssam_event_item_cache_destroy(void)
577 {
578 	kmem_cache_destroy(ssam_event_item_cache);
579 	ssam_event_item_cache = NULL;
580 }
581 
582 static void __ssam_event_item_free_cached(struct ssam_event_item *item)
583 {
584 	kmem_cache_free(ssam_event_item_cache, item);
585 }
586 
587 static void __ssam_event_item_free_generic(struct ssam_event_item *item)
588 {
589 	kfree(item);
590 }
591 
592 /**
593  * ssam_event_item_free() - Free the provided event item.
594  * @item: The event item to free.
595  */
596 static void ssam_event_item_free(struct ssam_event_item *item)
597 {
598 	trace_ssam_event_item_free(item);
599 	item->ops.free(item);
600 }
601 
602 /**
603  * ssam_event_item_alloc() - Allocate an event item with the given payload size.
604  * @len:   The event payload length.
605  * @flags: The flags used for allocation.
606  *
607  * Allocate an event item with the given payload size, preferring allocation
608  * from the event item cache if the payload is small enough (i.e. smaller than
609  * %SSAM_EVENT_ITEM_CACHE_PAYLOAD_LEN). Sets the item operations and payload
610  * length values. The item free callback (``ops.free``) should not be
611  * overwritten after this call.
612  *
613  * Return: Returns the newly allocated event item.
614  */
615 static struct ssam_event_item *ssam_event_item_alloc(size_t len, gfp_t flags)
616 {
617 	struct ssam_event_item *item;
618 
619 	if (len <= SSAM_EVENT_ITEM_CACHE_PAYLOAD_LEN) {
620 		item = kmem_cache_alloc(ssam_event_item_cache, flags);
621 		if (!item)
622 			return NULL;
623 
624 		item->ops.free = __ssam_event_item_free_cached;
625 	} else {
626 		item = kzalloc(struct_size(item, event.data, len), flags);
627 		if (!item)
628 			return NULL;
629 
630 		item->ops.free = __ssam_event_item_free_generic;
631 	}
632 
633 	item->event.length = len;
634 
635 	trace_ssam_event_item_alloc(item, len);
636 	return item;
637 }
638 
639 /**
640  * ssam_event_queue_push() - Push an event item to the event queue.
641  * @q:    The event queue.
642  * @item: The item to add.
643  */
644 static void ssam_event_queue_push(struct ssam_event_queue *q,
645 				  struct ssam_event_item *item)
646 {
647 	spin_lock(&q->lock);
648 	list_add_tail(&item->node, &q->head);
649 	spin_unlock(&q->lock);
650 }
651 
652 /**
653  * ssam_event_queue_pop() - Pop the next event item from the event queue.
654  * @q: The event queue.
655  *
656  * Returns and removes the next event item from the queue. Returns %NULL If
657  * there is no event item left.
658  */
659 static struct ssam_event_item *ssam_event_queue_pop(struct ssam_event_queue *q)
660 {
661 	struct ssam_event_item *item;
662 
663 	spin_lock(&q->lock);
664 	item = list_first_entry_or_null(&q->head, struct ssam_event_item, node);
665 	if (item)
666 		list_del(&item->node);
667 	spin_unlock(&q->lock);
668 
669 	return item;
670 }
671 
672 /**
673  * ssam_event_queue_is_empty() - Check if the event queue is empty.
674  * @q: The event queue.
675  */
676 static bool ssam_event_queue_is_empty(struct ssam_event_queue *q)
677 {
678 	bool empty;
679 
680 	spin_lock(&q->lock);
681 	empty = list_empty(&q->head);
682 	spin_unlock(&q->lock);
683 
684 	return empty;
685 }
686 
687 /**
688  * ssam_cplt_get_event_queue() - Get the event queue for the given parameters.
689  * @cplt: The completion system on which to look for the queue.
690  * @tid:  The target ID of the queue.
691  * @rqid: The request ID representing the event ID for which to get the queue.
692  *
693  * Return: Returns the event queue corresponding to the event type described
694  * by the given parameters. If the request ID does not represent an event,
695  * this function returns %NULL. If the target ID is not supported, this
696  * function will fall back to the default target ID (``tid = 1``).
697  */
698 static
699 struct ssam_event_queue *ssam_cplt_get_event_queue(struct ssam_cplt *cplt,
700 						   u8 tid, u16 rqid)
701 {
702 	u16 event = ssh_rqid_to_event(rqid);
703 	u16 tidx = ssh_tid_to_index(tid);
704 
705 	if (!ssh_rqid_is_event(rqid)) {
706 		dev_err(cplt->dev, "event: unsupported request ID: %#06x\n", rqid);
707 		return NULL;
708 	}
709 
710 	if (!ssh_tid_is_valid(tid)) {
711 		dev_warn(cplt->dev, "event: unsupported target ID: %u\n", tid);
712 		tidx = 0;
713 	}
714 
715 	return &cplt->event.target[tidx].queue[event];
716 }
717 
718 /**
719  * ssam_cplt_submit() - Submit a work item to the completion system workqueue.
720  * @cplt: The completion system.
721  * @work: The work item to submit.
722  */
723 static bool ssam_cplt_submit(struct ssam_cplt *cplt, struct work_struct *work)
724 {
725 	return queue_work(cplt->wq, work);
726 }
727 
728 /**
729  * ssam_cplt_submit_event() - Submit an event to the completion system.
730  * @cplt: The completion system.
731  * @item: The event item to submit.
732  *
733  * Submits the event to the completion system by queuing it on the event item
734  * queue and queuing the respective event queue work item on the completion
735  * workqueue, which will eventually complete the event.
736  *
737  * Return: Returns zero on success, %-EINVAL if there is no event queue that
738  * can handle the given event item.
739  */
740 static int ssam_cplt_submit_event(struct ssam_cplt *cplt,
741 				  struct ssam_event_item *item)
742 {
743 	struct ssam_event_queue *evq;
744 
745 	evq = ssam_cplt_get_event_queue(cplt, item->event.target_id, item->rqid);
746 	if (!evq)
747 		return -EINVAL;
748 
749 	ssam_event_queue_push(evq, item);
750 	ssam_cplt_submit(cplt, &evq->work);
751 	return 0;
752 }
753 
754 /**
755  * ssam_cplt_flush() - Flush the completion system.
756  * @cplt: The completion system.
757  *
758  * Flush the completion system by waiting until all currently submitted work
759  * items have been completed.
760  *
761  * Note: This function does not guarantee that all events will have been
762  * handled once this call terminates. In case of a larger number of
763  * to-be-completed events, the event queue work function may re-schedule its
764  * work item, which this flush operation will ignore.
765  *
766  * This operation is only intended to, during normal operation prior to
767  * shutdown, try to complete most events and requests to get them out of the
768  * system while the system is still fully operational. It does not aim to
769  * provide any guarantee that all of them have been handled.
770  */
771 static void ssam_cplt_flush(struct ssam_cplt *cplt)
772 {
773 	flush_workqueue(cplt->wq);
774 }
775 
776 static void ssam_event_queue_work_fn(struct work_struct *work)
777 {
778 	struct ssam_event_queue *queue;
779 	struct ssam_event_item *item;
780 	struct ssam_nf *nf;
781 	struct device *dev;
782 	unsigned int iterations = SSAM_CPLT_WQ_BATCH;
783 
784 	queue = container_of(work, struct ssam_event_queue, work);
785 	nf = &queue->cplt->event.notif;
786 	dev = queue->cplt->dev;
787 
788 	/* Limit number of processed events to avoid livelocking. */
789 	do {
790 		item = ssam_event_queue_pop(queue);
791 		if (!item)
792 			return;
793 
794 		ssam_nf_call(nf, dev, item->rqid, &item->event);
795 		ssam_event_item_free(item);
796 	} while (--iterations);
797 
798 	if (!ssam_event_queue_is_empty(queue))
799 		ssam_cplt_submit(queue->cplt, &queue->work);
800 }
801 
802 /**
803  * ssam_event_queue_init() - Initialize an event queue.
804  * @cplt: The completion system on which the queue resides.
805  * @evq:  The event queue to initialize.
806  */
807 static void ssam_event_queue_init(struct ssam_cplt *cplt,
808 				  struct ssam_event_queue *evq)
809 {
810 	evq->cplt = cplt;
811 	spin_lock_init(&evq->lock);
812 	INIT_LIST_HEAD(&evq->head);
813 	INIT_WORK(&evq->work, ssam_event_queue_work_fn);
814 }
815 
816 /**
817  * ssam_cplt_init() - Initialize completion system.
818  * @cplt: The completion system to initialize.
819  * @dev:  The device used for logging.
820  */
821 static int ssam_cplt_init(struct ssam_cplt *cplt, struct device *dev)
822 {
823 	struct ssam_event_target *target;
824 	int status, c, i;
825 
826 	cplt->dev = dev;
827 
828 	cplt->wq = alloc_workqueue(SSAM_CPLT_WQ_NAME, WQ_UNBOUND | WQ_MEM_RECLAIM, 0);
829 	if (!cplt->wq)
830 		return -ENOMEM;
831 
832 	for (c = 0; c < ARRAY_SIZE(cplt->event.target); c++) {
833 		target = &cplt->event.target[c];
834 
835 		for (i = 0; i < ARRAY_SIZE(target->queue); i++)
836 			ssam_event_queue_init(cplt, &target->queue[i]);
837 	}
838 
839 	status = ssam_nf_init(&cplt->event.notif);
840 	if (status)
841 		destroy_workqueue(cplt->wq);
842 
843 	return status;
844 }
845 
846 /**
847  * ssam_cplt_destroy() - Deinitialize the completion system.
848  * @cplt: The completion system to deinitialize.
849  *
850  * Deinitialize the given completion system and ensure that all pending, i.e.
851  * yet-to-be-completed, event items and requests have been handled.
852  */
853 static void ssam_cplt_destroy(struct ssam_cplt *cplt)
854 {
855 	/*
856 	 * Note: destroy_workqueue ensures that all currently queued work will
857 	 * be fully completed and the workqueue drained. This means that this
858 	 * call will inherently also free any queued ssam_event_items, thus we
859 	 * don't have to take care of that here explicitly.
860 	 */
861 	destroy_workqueue(cplt->wq);
862 	ssam_nf_destroy(&cplt->event.notif);
863 }
864 
865 
866 /* -- Main SSAM device structures. ------------------------------------------ */
867 
868 /**
869  * ssam_controller_device() - Get the &struct device associated with this
870  * controller.
871  * @c: The controller for which to get the device.
872  *
873  * Return: Returns the &struct device associated with this controller,
874  * providing its lower-level transport.
875  */
876 struct device *ssam_controller_device(struct ssam_controller *c)
877 {
878 	return ssh_rtl_get_device(&c->rtl);
879 }
880 EXPORT_SYMBOL_GPL(ssam_controller_device);
881 
882 static void __ssam_controller_release(struct kref *kref)
883 {
884 	struct ssam_controller *ctrl = to_ssam_controller(kref, kref);
885 
886 	/*
887 	 * The lock-call here is to satisfy lockdep. At this point we really
888 	 * expect this to be the last remaining reference to the controller.
889 	 * Anything else is a bug.
890 	 */
891 	ssam_controller_lock(ctrl);
892 	ssam_controller_destroy(ctrl);
893 	ssam_controller_unlock(ctrl);
894 
895 	kfree(ctrl);
896 }
897 
898 /**
899  * ssam_controller_get() - Increment reference count of controller.
900  * @c: The controller.
901  *
902  * Return: Returns the controller provided as input.
903  */
904 struct ssam_controller *ssam_controller_get(struct ssam_controller *c)
905 {
906 	if (c)
907 		kref_get(&c->kref);
908 	return c;
909 }
910 EXPORT_SYMBOL_GPL(ssam_controller_get);
911 
912 /**
913  * ssam_controller_put() - Decrement reference count of controller.
914  * @c: The controller.
915  */
916 void ssam_controller_put(struct ssam_controller *c)
917 {
918 	if (c)
919 		kref_put(&c->kref, __ssam_controller_release);
920 }
921 EXPORT_SYMBOL_GPL(ssam_controller_put);
922 
923 /**
924  * ssam_controller_statelock() - Lock the controller against state transitions.
925  * @c: The controller to lock.
926  *
927  * Lock the controller against state transitions. Holding this lock guarantees
928  * that the controller will not transition between states, i.e. if the
929  * controller is in state "started", when this lock has been acquired, it will
930  * remain in this state at least until the lock has been released.
931  *
932  * Multiple clients may concurrently hold this lock. In other words: The
933  * ``statelock`` functions represent the read-lock part of a r/w-semaphore.
934  * Actions causing state transitions of the controller must be executed while
935  * holding the write-part of this r/w-semaphore (see ssam_controller_lock()
936  * and ssam_controller_unlock() for that).
937  *
938  * See ssam_controller_stateunlock() for the corresponding unlock function.
939  */
940 void ssam_controller_statelock(struct ssam_controller *c)
941 {
942 	down_read(&c->lock);
943 }
944 EXPORT_SYMBOL_GPL(ssam_controller_statelock);
945 
946 /**
947  * ssam_controller_stateunlock() - Unlock controller state transitions.
948  * @c: The controller to unlock.
949  *
950  * See ssam_controller_statelock() for the corresponding lock function.
951  */
952 void ssam_controller_stateunlock(struct ssam_controller *c)
953 {
954 	up_read(&c->lock);
955 }
956 EXPORT_SYMBOL_GPL(ssam_controller_stateunlock);
957 
958 /**
959  * ssam_controller_lock() - Acquire the main controller lock.
960  * @c: The controller to lock.
961  *
962  * This lock must be held for any state transitions, including transition to
963  * suspend/resumed states and during shutdown. See ssam_controller_statelock()
964  * for more details on controller locking.
965  *
966  * See ssam_controller_unlock() for the corresponding unlock function.
967  */
968 void ssam_controller_lock(struct ssam_controller *c)
969 {
970 	down_write(&c->lock);
971 }
972 
973 /*
974  * ssam_controller_unlock() - Release the main controller lock.
975  * @c: The controller to unlock.
976  *
977  * See ssam_controller_lock() for the corresponding lock function.
978  */
979 void ssam_controller_unlock(struct ssam_controller *c)
980 {
981 	up_write(&c->lock);
982 }
983 
984 static void ssam_handle_event(struct ssh_rtl *rtl,
985 			      const struct ssh_command *cmd,
986 			      const struct ssam_span *data)
987 {
988 	struct ssam_controller *ctrl = to_ssam_controller(rtl, rtl);
989 	struct ssam_event_item *item;
990 
991 	item = ssam_event_item_alloc(data->len, GFP_KERNEL);
992 	if (!item)
993 		return;
994 
995 	item->rqid = get_unaligned_le16(&cmd->rqid);
996 	item->event.target_category = cmd->tc;
997 	item->event.target_id = cmd->sid;
998 	item->event.command_id = cmd->cid;
999 	item->event.instance_id = cmd->iid;
1000 	memcpy(&item->event.data[0], data->ptr, data->len);
1001 
1002 	if (WARN_ON(ssam_cplt_submit_event(&ctrl->cplt, item)))
1003 		ssam_event_item_free(item);
1004 }
1005 
1006 static const struct ssh_rtl_ops ssam_rtl_ops = {
1007 	.handle_event = ssam_handle_event,
1008 };
1009 
1010 static bool ssam_notifier_is_empty(struct ssam_controller *ctrl);
1011 static void ssam_notifier_unregister_all(struct ssam_controller *ctrl);
1012 
1013 #define SSAM_SSH_DSM_REVISION	0
1014 
1015 /* d5e383e1-d892-4a76-89fc-f6aaae7ed5b5 */
1016 static const guid_t SSAM_SSH_DSM_GUID =
1017 	GUID_INIT(0xd5e383e1, 0xd892, 0x4a76,
1018 		  0x89, 0xfc, 0xf6, 0xaa, 0xae, 0x7e, 0xd5, 0xb5);
1019 
1020 enum ssh_dsm_fn {
1021 	SSH_DSM_FN_SSH_POWER_PROFILE             = 0x05,
1022 	SSH_DSM_FN_SCREEN_ON_SLEEP_IDLE_TIMEOUT  = 0x06,
1023 	SSH_DSM_FN_SCREEN_OFF_SLEEP_IDLE_TIMEOUT = 0x07,
1024 	SSH_DSM_FN_D3_CLOSES_HANDLE              = 0x08,
1025 	SSH_DSM_FN_SSH_BUFFER_SIZE               = 0x09,
1026 };
1027 
1028 static int ssam_dsm_get_functions(acpi_handle handle, u64 *funcs)
1029 {
1030 	union acpi_object *obj;
1031 	u64 mask = 0;
1032 	int i;
1033 
1034 	*funcs = 0;
1035 
1036 	/*
1037 	 * The _DSM function is only present on newer models. It is not
1038 	 * present on 5th and 6th generation devices (i.e. up to and including
1039 	 * Surface Pro 6, Surface Laptop 2, Surface Book 2).
1040 	 *
1041 	 * If the _DSM is not present, indicate that no function is supported.
1042 	 * This will result in default values being set.
1043 	 */
1044 	if (!acpi_has_method(handle, "_DSM"))
1045 		return 0;
1046 
1047 	obj = acpi_evaluate_dsm_typed(handle, &SSAM_SSH_DSM_GUID,
1048 				      SSAM_SSH_DSM_REVISION, 0, NULL,
1049 				      ACPI_TYPE_BUFFER);
1050 	if (!obj)
1051 		return -EIO;
1052 
1053 	for (i = 0; i < obj->buffer.length && i < 8; i++)
1054 		mask |= (((u64)obj->buffer.pointer[i]) << (i * 8));
1055 
1056 	if (mask & BIT(0))
1057 		*funcs = mask;
1058 
1059 	ACPI_FREE(obj);
1060 	return 0;
1061 }
1062 
1063 static int ssam_dsm_load_u32(acpi_handle handle, u64 funcs, u64 func, u32 *ret)
1064 {
1065 	union acpi_object *obj;
1066 	u64 val;
1067 
1068 	if (!(funcs & BIT_ULL(func)))
1069 		return 0; /* Not supported, leave *ret at its default value */
1070 
1071 	obj = acpi_evaluate_dsm_typed(handle, &SSAM_SSH_DSM_GUID,
1072 				      SSAM_SSH_DSM_REVISION, func, NULL,
1073 				      ACPI_TYPE_INTEGER);
1074 	if (!obj)
1075 		return -EIO;
1076 
1077 	val = obj->integer.value;
1078 	ACPI_FREE(obj);
1079 
1080 	if (val > U32_MAX)
1081 		return -ERANGE;
1082 
1083 	*ret = val;
1084 	return 0;
1085 }
1086 
1087 /**
1088  * ssam_controller_caps_load_from_acpi() - Load controller capabilities from
1089  * ACPI _DSM.
1090  * @handle: The handle of the ACPI controller/SSH device.
1091  * @caps:   Where to store the capabilities in.
1092  *
1093  * Initializes the given controller capabilities with default values, then
1094  * checks and, if the respective _DSM functions are available, loads the
1095  * actual capabilities from the _DSM.
1096  *
1097  * Return: Returns zero on success, a negative error code on failure.
1098  */
1099 static
1100 int ssam_controller_caps_load_from_acpi(acpi_handle handle,
1101 					struct ssam_controller_caps *caps)
1102 {
1103 	u32 d3_closes_handle = false;
1104 	u64 funcs;
1105 	int status;
1106 
1107 	/* Pre-load supported DSM functions. */
1108 	status = ssam_dsm_get_functions(handle, &funcs);
1109 	if (status)
1110 		return status;
1111 
1112 	/* Load actual values from ACPI, if present. */
1113 	status = ssam_dsm_load_u32(handle, funcs, SSH_DSM_FN_SSH_POWER_PROFILE,
1114 				   &caps->ssh_power_profile);
1115 	if (status)
1116 		return status;
1117 
1118 	status = ssam_dsm_load_u32(handle, funcs,
1119 				   SSH_DSM_FN_SCREEN_ON_SLEEP_IDLE_TIMEOUT,
1120 				   &caps->screen_on_sleep_idle_timeout);
1121 	if (status)
1122 		return status;
1123 
1124 	status = ssam_dsm_load_u32(handle, funcs,
1125 				   SSH_DSM_FN_SCREEN_OFF_SLEEP_IDLE_TIMEOUT,
1126 				   &caps->screen_off_sleep_idle_timeout);
1127 	if (status)
1128 		return status;
1129 
1130 	status = ssam_dsm_load_u32(handle, funcs, SSH_DSM_FN_D3_CLOSES_HANDLE,
1131 				   &d3_closes_handle);
1132 	if (status)
1133 		return status;
1134 
1135 	caps->d3_closes_handle = !!d3_closes_handle;
1136 
1137 	status = ssam_dsm_load_u32(handle, funcs, SSH_DSM_FN_SSH_BUFFER_SIZE,
1138 				   &caps->ssh_buffer_size);
1139 	if (status)
1140 		return status;
1141 
1142 	return 0;
1143 }
1144 
1145 /**
1146  * ssam_controller_caps_load_from_of() - Load controller capabilities from OF/DT.
1147  * @dev:  A pointer to the controller device
1148  * @caps: Where to store the capabilities in.
1149  *
1150  * Return: Returns zero on success, a negative error code on failure.
1151  */
1152 static int ssam_controller_caps_load_from_of(struct device *dev, struct ssam_controller_caps *caps)
1153 {
1154 	/*
1155 	 * Every device starting with Surface Pro X through Laptop 7 uses these
1156 	 * identical values, which makes them good defaults.
1157 	 */
1158 	caps->d3_closes_handle = true;
1159 	caps->screen_on_sleep_idle_timeout = 5000;
1160 	caps->screen_off_sleep_idle_timeout = 30;
1161 	caps->ssh_buffer_size = 48;
1162 	/* TODO: figure out power profile */
1163 
1164 	return 0;
1165 }
1166 
1167 /**
1168  * ssam_controller_caps_load() - Load controller capabilities
1169  * @dev:  A pointer to the controller device
1170  * @caps: Where to store the capabilities in.
1171  *
1172  * Return: Returns zero on success, a negative error code on failure.
1173  */
1174 static int ssam_controller_caps_load(struct device *dev, struct ssam_controller_caps *caps)
1175 {
1176 	acpi_handle handle = ACPI_HANDLE(dev);
1177 
1178 	/* Set defaults. */
1179 	caps->ssh_power_profile = U32_MAX;
1180 	caps->screen_on_sleep_idle_timeout = U32_MAX;
1181 	caps->screen_off_sleep_idle_timeout = U32_MAX;
1182 	caps->d3_closes_handle = false;
1183 	caps->ssh_buffer_size = U32_MAX;
1184 
1185 	if (handle)
1186 		return ssam_controller_caps_load_from_acpi(handle, caps);
1187 	else
1188 		return ssam_controller_caps_load_from_of(dev, caps);
1189 }
1190 
1191 /**
1192  * ssam_controller_init() - Initialize SSAM controller.
1193  * @ctrl:   The controller to initialize.
1194  * @serdev: The serial device representing the underlying data transport.
1195  *
1196  * Initializes the given controller. Does neither start receiver nor
1197  * transmitter threads. After this call, the controller has to be hooked up to
1198  * the serdev core separately via &struct serdev_device_ops, relaying calls to
1199  * ssam_controller_receive_buf() and ssam_controller_write_wakeup(). Once the
1200  * controller has been hooked up, transmitter and receiver threads may be
1201  * started via ssam_controller_start(). These setup steps need to be completed
1202  * before controller can be used for requests.
1203  */
1204 int ssam_controller_init(struct ssam_controller *ctrl,
1205 			 struct serdev_device *serdev)
1206 {
1207 	int status;
1208 
1209 	init_rwsem(&ctrl->lock);
1210 	kref_init(&ctrl->kref);
1211 
1212 	status = ssam_controller_caps_load(&serdev->dev, &ctrl->caps);
1213 	if (status)
1214 		return status;
1215 
1216 	dev_dbg(&serdev->dev,
1217 		"device capabilities:\n"
1218 		"  ssh_power_profile:             %u\n"
1219 		"  ssh_buffer_size:               %u\n"
1220 		"  screen_on_sleep_idle_timeout:  %u\n"
1221 		"  screen_off_sleep_idle_timeout: %u\n"
1222 		"  d3_closes_handle:              %u\n",
1223 		ctrl->caps.ssh_power_profile,
1224 		ctrl->caps.ssh_buffer_size,
1225 		ctrl->caps.screen_on_sleep_idle_timeout,
1226 		ctrl->caps.screen_off_sleep_idle_timeout,
1227 		ctrl->caps.d3_closes_handle);
1228 
1229 	ssh_seq_reset(&ctrl->counter.seq);
1230 	ssh_rqid_reset(&ctrl->counter.rqid);
1231 
1232 	/* Initialize event/request completion system. */
1233 	status = ssam_cplt_init(&ctrl->cplt, &serdev->dev);
1234 	if (status)
1235 		return status;
1236 
1237 	/* Initialize request and packet transport layers. */
1238 	status = ssh_rtl_init(&ctrl->rtl, serdev, &ssam_rtl_ops);
1239 	if (status) {
1240 		ssam_cplt_destroy(&ctrl->cplt);
1241 		return status;
1242 	}
1243 
1244 	/*
1245 	 * Set state via write_once even though we expect to be in an
1246 	 * exclusive context, due to smoke-testing in
1247 	 * ssam_request_sync_submit().
1248 	 */
1249 	WRITE_ONCE(ctrl->state, SSAM_CONTROLLER_INITIALIZED);
1250 	return 0;
1251 }
1252 
1253 /**
1254  * ssam_controller_start() - Start the receiver and transmitter threads of the
1255  * controller.
1256  * @ctrl: The controller.
1257  *
1258  * Note: When this function is called, the controller should be properly
1259  * hooked up to the serdev core via &struct serdev_device_ops. Please refer
1260  * to ssam_controller_init() for more details on controller initialization.
1261  *
1262  * This function must be called with the main controller lock held (i.e. by
1263  * calling ssam_controller_lock()).
1264  */
1265 int ssam_controller_start(struct ssam_controller *ctrl)
1266 {
1267 	int status;
1268 
1269 	lockdep_assert_held_write(&ctrl->lock);
1270 
1271 	if (ctrl->state != SSAM_CONTROLLER_INITIALIZED)
1272 		return -EINVAL;
1273 
1274 	status = ssh_rtl_start(&ctrl->rtl);
1275 	if (status)
1276 		return status;
1277 
1278 	/*
1279 	 * Set state via write_once even though we expect to be locked/in an
1280 	 * exclusive context, due to smoke-testing in
1281 	 * ssam_request_sync_submit().
1282 	 */
1283 	WRITE_ONCE(ctrl->state, SSAM_CONTROLLER_STARTED);
1284 	return 0;
1285 }
1286 
1287 /*
1288  * SSAM_CTRL_SHUTDOWN_FLUSH_TIMEOUT - Timeout for flushing requests during
1289  * shutdown.
1290  *
1291  * Chosen to be larger than one full request timeout, including packets timing
1292  * out. This value should give ample time to complete any outstanding requests
1293  * during normal operation and account for the odd package timeout.
1294  */
1295 #define SSAM_CTRL_SHUTDOWN_FLUSH_TIMEOUT	msecs_to_jiffies(5000)
1296 
1297 /**
1298  * ssam_controller_shutdown() - Shut down the controller.
1299  * @ctrl: The controller.
1300  *
1301  * Shuts down the controller by flushing all pending requests and stopping the
1302  * transmitter and receiver threads. All requests submitted after this call
1303  * will fail with %-ESHUTDOWN. While it is discouraged to do so, this function
1304  * is safe to use in parallel with ongoing request submission.
1305  *
1306  * In the course of this shutdown procedure, all currently registered
1307  * notifiers will be unregistered. It is, however, strongly recommended to not
1308  * rely on this behavior, and instead the party registering the notifier
1309  * should unregister it before the controller gets shut down, e.g. via the
1310  * SSAM bus which guarantees client devices to be removed before a shutdown.
1311  *
1312  * Note that events may still be pending after this call, but, due to the
1313  * notifiers being unregistered, these events will be dropped when the
1314  * controller is subsequently destroyed via ssam_controller_destroy().
1315  *
1316  * This function must be called with the main controller lock held (i.e. by
1317  * calling ssam_controller_lock()).
1318  */
1319 void ssam_controller_shutdown(struct ssam_controller *ctrl)
1320 {
1321 	enum ssam_controller_state s = ctrl->state;
1322 	int status;
1323 
1324 	lockdep_assert_held_write(&ctrl->lock);
1325 
1326 	if (s == SSAM_CONTROLLER_UNINITIALIZED || s == SSAM_CONTROLLER_STOPPED)
1327 		return;
1328 
1329 	/*
1330 	 * Try to flush pending events and requests while everything still
1331 	 * works. Note: There may still be packets and/or requests in the
1332 	 * system after this call (e.g. via control packets submitted by the
1333 	 * packet transport layer or flush timeout / failure, ...). Those will
1334 	 * be handled with the ssh_rtl_shutdown() call below.
1335 	 */
1336 	status = ssh_rtl_flush(&ctrl->rtl, SSAM_CTRL_SHUTDOWN_FLUSH_TIMEOUT);
1337 	if (status) {
1338 		ssam_err(ctrl, "failed to flush request transport layer: %d\n",
1339 			 status);
1340 	}
1341 
1342 	/* Try to flush all currently completing requests and events. */
1343 	ssam_cplt_flush(&ctrl->cplt);
1344 
1345 	/*
1346 	 * We expect all notifiers to have been removed by the respective client
1347 	 * driver that set them up at this point. If this warning occurs, some
1348 	 * client driver has not done that...
1349 	 */
1350 	WARN_ON(!ssam_notifier_is_empty(ctrl));
1351 
1352 	/*
1353 	 * Nevertheless, we should still take care of drivers that don't behave
1354 	 * well. Thus disable all enabled events, unregister all notifiers.
1355 	 */
1356 	ssam_notifier_unregister_all(ctrl);
1357 
1358 	/*
1359 	 * Cancel remaining requests. Ensure no new ones can be queued and stop
1360 	 * threads.
1361 	 */
1362 	ssh_rtl_shutdown(&ctrl->rtl);
1363 
1364 	/*
1365 	 * Set state via write_once even though we expect to be locked/in an
1366 	 * exclusive context, due to smoke-testing in
1367 	 * ssam_request_sync_submit().
1368 	 */
1369 	WRITE_ONCE(ctrl->state, SSAM_CONTROLLER_STOPPED);
1370 	ctrl->rtl.ptl.serdev = NULL;
1371 }
1372 
1373 /**
1374  * ssam_controller_destroy() - Destroy the controller and free its resources.
1375  * @ctrl: The controller.
1376  *
1377  * Ensures that all resources associated with the controller get freed. This
1378  * function should only be called after the controller has been stopped via
1379  * ssam_controller_shutdown(). In general, this function should not be called
1380  * directly. The only valid place to call this function directly is during
1381  * initialization, before the controller has been fully initialized and passed
1382  * to other processes. This function is called automatically when the
1383  * reference count of the controller reaches zero.
1384  *
1385  * This function must be called with the main controller lock held (i.e. by
1386  * calling ssam_controller_lock()).
1387  */
1388 void ssam_controller_destroy(struct ssam_controller *ctrl)
1389 {
1390 	lockdep_assert_held_write(&ctrl->lock);
1391 
1392 	if (ctrl->state == SSAM_CONTROLLER_UNINITIALIZED)
1393 		return;
1394 
1395 	WARN_ON(ctrl->state != SSAM_CONTROLLER_STOPPED);
1396 
1397 	/*
1398 	 * Note: New events could still have been received after the previous
1399 	 * flush in ssam_controller_shutdown, before the request transport layer
1400 	 * has been shut down. At this point, after the shutdown, we can be sure
1401 	 * that no new events will be queued. The call to ssam_cplt_destroy will
1402 	 * ensure that those remaining are being completed and freed.
1403 	 */
1404 
1405 	/* Actually free resources. */
1406 	ssam_cplt_destroy(&ctrl->cplt);
1407 	ssh_rtl_destroy(&ctrl->rtl);
1408 
1409 	/*
1410 	 * Set state via write_once even though we expect to be locked/in an
1411 	 * exclusive context, due to smoke-testing in
1412 	 * ssam_request_sync_submit().
1413 	 */
1414 	WRITE_ONCE(ctrl->state, SSAM_CONTROLLER_UNINITIALIZED);
1415 }
1416 
1417 /**
1418  * ssam_controller_suspend() - Suspend the controller.
1419  * @ctrl: The controller to suspend.
1420  *
1421  * Marks the controller as suspended. Note that display-off and D0-exit
1422  * notifications have to be sent manually before transitioning the controller
1423  * into the suspended state via this function.
1424  *
1425  * See ssam_controller_resume() for the corresponding resume function.
1426  *
1427  * Return: Returns %-EINVAL if the controller is currently not in the
1428  * "started" state.
1429  */
1430 int ssam_controller_suspend(struct ssam_controller *ctrl)
1431 {
1432 	ssam_controller_lock(ctrl);
1433 
1434 	if (ctrl->state != SSAM_CONTROLLER_STARTED) {
1435 		ssam_controller_unlock(ctrl);
1436 		return -EINVAL;
1437 	}
1438 
1439 	ssam_dbg(ctrl, "pm: suspending controller\n");
1440 
1441 	/*
1442 	 * Set state via write_once even though we're locked, due to
1443 	 * smoke-testing in ssam_request_sync_submit().
1444 	 */
1445 	WRITE_ONCE(ctrl->state, SSAM_CONTROLLER_SUSPENDED);
1446 
1447 	ssam_controller_unlock(ctrl);
1448 	return 0;
1449 }
1450 
1451 /**
1452  * ssam_controller_resume() - Resume the controller from suspend.
1453  * @ctrl: The controller to resume.
1454  *
1455  * Resume the controller from the suspended state it was put into via
1456  * ssam_controller_suspend(). This function does not issue display-on and
1457  * D0-entry notifications. If required, those have to be sent manually after
1458  * this call.
1459  *
1460  * Return: Returns %-EINVAL if the controller is currently not suspended.
1461  */
1462 int ssam_controller_resume(struct ssam_controller *ctrl)
1463 {
1464 	ssam_controller_lock(ctrl);
1465 
1466 	if (ctrl->state != SSAM_CONTROLLER_SUSPENDED) {
1467 		ssam_controller_unlock(ctrl);
1468 		return -EINVAL;
1469 	}
1470 
1471 	ssam_dbg(ctrl, "pm: resuming controller\n");
1472 
1473 	/*
1474 	 * Set state via write_once even though we're locked, due to
1475 	 * smoke-testing in ssam_request_sync_submit().
1476 	 */
1477 	WRITE_ONCE(ctrl->state, SSAM_CONTROLLER_STARTED);
1478 
1479 	ssam_controller_unlock(ctrl);
1480 	return 0;
1481 }
1482 
1483 
1484 /* -- Top-level request interface ------------------------------------------- */
1485 
1486 /**
1487  * ssam_request_write_data() - Construct and write SAM request message to
1488  * buffer.
1489  * @buf:  The buffer to write the data to.
1490  * @ctrl: The controller via which the request will be sent.
1491  * @spec: The request data and specification.
1492  *
1493  * Constructs a SAM/SSH request message and writes it to the provided buffer.
1494  * The request and transport counters, specifically RQID and SEQ, will be set
1495  * in this call. These counters are obtained from the controller. It is thus
1496  * only valid to send the resulting message via the controller specified here.
1497  *
1498  * For calculation of the required buffer size, refer to the
1499  * SSH_COMMAND_MESSAGE_LENGTH() macro.
1500  *
1501  * Return: Returns the number of bytes used in the buffer on success. Returns
1502  * %-EINVAL if the payload length provided in the request specification is too
1503  * large (larger than %SSH_COMMAND_MAX_PAYLOAD_SIZE) or if the provided buffer
1504  * is too small.
1505  */
1506 ssize_t ssam_request_write_data(struct ssam_span *buf,
1507 				struct ssam_controller *ctrl,
1508 				const struct ssam_request *spec)
1509 {
1510 	struct msgbuf msgb;
1511 	u16 rqid;
1512 	u8 seq;
1513 
1514 	if (spec->length > SSH_COMMAND_MAX_PAYLOAD_SIZE)
1515 		return -EINVAL;
1516 
1517 	if (SSH_COMMAND_MESSAGE_LENGTH(spec->length) > buf->len)
1518 		return -EINVAL;
1519 
1520 	msgb_init(&msgb, buf->ptr, buf->len);
1521 	seq = ssh_seq_next(&ctrl->counter.seq);
1522 	rqid = ssh_rqid_next(&ctrl->counter.rqid);
1523 	msgb_push_cmd(&msgb, seq, rqid, spec);
1524 
1525 	return msgb_bytes_used(&msgb);
1526 }
1527 EXPORT_SYMBOL_GPL(ssam_request_write_data);
1528 
1529 static void ssam_request_sync_complete(struct ssh_request *rqst,
1530 				       const struct ssh_command *cmd,
1531 				       const struct ssam_span *data, int status)
1532 {
1533 	struct ssh_rtl *rtl = ssh_request_rtl(rqst);
1534 	struct ssam_request_sync *r;
1535 
1536 	r = container_of(rqst, struct ssam_request_sync, base);
1537 	r->status = status;
1538 
1539 	if (r->resp)
1540 		r->resp->length = 0;
1541 
1542 	if (status) {
1543 		rtl_dbg_cond(rtl, "rsp: request failed: %d\n", status);
1544 		return;
1545 	}
1546 
1547 	if (!data)	/* Handle requests without a response. */
1548 		return;
1549 
1550 	if (!r->resp || !r->resp->pointer) {
1551 		if (data->len)
1552 			rtl_warn(rtl, "rsp: no response buffer provided, dropping data\n");
1553 		return;
1554 	}
1555 
1556 	if (data->len > r->resp->capacity) {
1557 		rtl_err(rtl,
1558 			"rsp: response buffer too small, capacity: %zu bytes, got: %zu bytes\n",
1559 			r->resp->capacity, data->len);
1560 		r->status = -ENOSPC;
1561 		return;
1562 	}
1563 
1564 	r->resp->length = data->len;
1565 	memcpy(r->resp->pointer, data->ptr, data->len);
1566 }
1567 
1568 static void ssam_request_sync_release(struct ssh_request *rqst)
1569 {
1570 	complete_all(&container_of(rqst, struct ssam_request_sync, base)->comp);
1571 }
1572 
1573 static const struct ssh_request_ops ssam_request_sync_ops = {
1574 	.release = ssam_request_sync_release,
1575 	.complete = ssam_request_sync_complete,
1576 };
1577 
1578 /**
1579  * ssam_request_sync_alloc() - Allocate a synchronous request.
1580  * @payload_len: The length of the request payload.
1581  * @flags:       Flags used for allocation.
1582  * @rqst:        Where to store the pointer to the allocated request.
1583  * @buffer:      Where to store the buffer descriptor for the message buffer of
1584  *               the request.
1585  *
1586  * Allocates a synchronous request with corresponding message buffer. The
1587  * request still needs to be initialized ssam_request_sync_init() before
1588  * it can be submitted, and the message buffer data must still be set to the
1589  * returned buffer via ssam_request_sync_set_data() after it has been filled,
1590  * if need be with adjusted message length.
1591  *
1592  * After use, the request and its corresponding message buffer should be freed
1593  * via ssam_request_sync_free(). The buffer must not be freed separately.
1594  *
1595  * Return: Returns zero on success, %-ENOMEM if the request could not be
1596  * allocated.
1597  */
1598 int ssam_request_sync_alloc(size_t payload_len, gfp_t flags,
1599 			    struct ssam_request_sync **rqst,
1600 			    struct ssam_span *buffer)
1601 {
1602 	size_t msglen = SSH_COMMAND_MESSAGE_LENGTH(payload_len);
1603 
1604 	*rqst = kzalloc(sizeof(**rqst) + msglen, flags);
1605 	if (!*rqst)
1606 		return -ENOMEM;
1607 
1608 	buffer->ptr = (u8 *)(*rqst + 1);
1609 	buffer->len = msglen;
1610 
1611 	return 0;
1612 }
1613 EXPORT_SYMBOL_GPL(ssam_request_sync_alloc);
1614 
1615 /**
1616  * ssam_request_sync_free() - Free a synchronous request.
1617  * @rqst: The request to be freed.
1618  *
1619  * Free a synchronous request and its corresponding buffer allocated with
1620  * ssam_request_sync_alloc(). Do not use for requests allocated on the stack
1621  * or via any other function.
1622  *
1623  * Warning: The caller must ensure that the request is not in use any more.
1624  * I.e. the caller must ensure that it has the only reference to the request
1625  * and the request is not currently pending. This means that the caller has
1626  * either never submitted the request, request submission has failed, or the
1627  * caller has waited until the submitted request has been completed via
1628  * ssam_request_sync_wait().
1629  */
1630 void ssam_request_sync_free(struct ssam_request_sync *rqst)
1631 {
1632 	kfree(rqst);
1633 }
1634 EXPORT_SYMBOL_GPL(ssam_request_sync_free);
1635 
1636 /**
1637  * ssam_request_sync_init() - Initialize a synchronous request struct.
1638  * @rqst:  The request to initialize.
1639  * @flags: The request flags.
1640  *
1641  * Initializes the given request struct. Does not initialize the request
1642  * message data. This has to be done explicitly after this call via
1643  * ssam_request_sync_set_data() and the actual message data has to be written
1644  * via ssam_request_write_data().
1645  *
1646  * Return: Returns zero on success or %-EINVAL if the given flags are invalid.
1647  */
1648 int ssam_request_sync_init(struct ssam_request_sync *rqst,
1649 			   enum ssam_request_flags flags)
1650 {
1651 	int status;
1652 
1653 	status = ssh_request_init(&rqst->base, flags, &ssam_request_sync_ops);
1654 	if (status)
1655 		return status;
1656 
1657 	init_completion(&rqst->comp);
1658 	rqst->resp = NULL;
1659 	rqst->status = 0;
1660 
1661 	return 0;
1662 }
1663 EXPORT_SYMBOL_GPL(ssam_request_sync_init);
1664 
1665 /**
1666  * ssam_request_sync_submit() - Submit a synchronous request.
1667  * @ctrl: The controller with which to submit the request.
1668  * @rqst: The request to submit.
1669  *
1670  * Submit a synchronous request. The request has to be initialized and
1671  * properly set up, including response buffer (may be %NULL if no response is
1672  * expected) and command message data. This function does not wait for the
1673  * request to be completed.
1674  *
1675  * If this function succeeds, ssam_request_sync_wait() must be used to ensure
1676  * that the request has been completed before the response data can be
1677  * accessed and/or the request can be freed. On failure, the request may
1678  * immediately be freed.
1679  *
1680  * This function may only be used if the controller is active, i.e. has been
1681  * initialized and not suspended.
1682  */
1683 int ssam_request_sync_submit(struct ssam_controller *ctrl,
1684 			     struct ssam_request_sync *rqst)
1685 {
1686 	int status;
1687 
1688 	/*
1689 	 * This is only a superficial check. In general, the caller needs to
1690 	 * ensure that the controller is initialized and is not (and does not
1691 	 * get) suspended during use, i.e. until the request has been completed
1692 	 * (if _absolutely_ necessary, by use of ssam_controller_statelock/
1693 	 * ssam_controller_stateunlock, but something like ssam_client_link
1694 	 * should be preferred as this needs to last until the request has been
1695 	 * completed).
1696 	 *
1697 	 * Note that it is actually safe to use this function while the
1698 	 * controller is in the process of being shut down (as ssh_rtl_submit
1699 	 * is safe with regards to this), but it is generally discouraged to do
1700 	 * so.
1701 	 */
1702 	if (WARN_ON(READ_ONCE(ctrl->state) != SSAM_CONTROLLER_STARTED)) {
1703 		ssh_request_put(&rqst->base);
1704 		return -ENODEV;
1705 	}
1706 
1707 	status = ssh_rtl_submit(&ctrl->rtl, &rqst->base);
1708 	ssh_request_put(&rqst->base);
1709 
1710 	return status;
1711 }
1712 EXPORT_SYMBOL_GPL(ssam_request_sync_submit);
1713 
1714 /**
1715  * ssam_request_do_sync() - Execute a synchronous request.
1716  * @ctrl: The controller via which the request will be submitted.
1717  * @spec: The request specification and payload.
1718  * @rsp:  The response buffer.
1719  *
1720  * Allocates a synchronous request with its message data buffer on the heap
1721  * via ssam_request_sync_alloc(), fully initializes it via the provided
1722  * request specification, submits it, and finally waits for its completion
1723  * before freeing it and returning its status.
1724  *
1725  * Return: Returns the status of the request or any failure during setup.
1726  */
1727 int ssam_request_do_sync(struct ssam_controller *ctrl,
1728 			 const struct ssam_request *spec,
1729 			 struct ssam_response *rsp)
1730 {
1731 	struct ssam_request_sync *rqst;
1732 	struct ssam_span buf;
1733 	ssize_t len;
1734 	int status;
1735 
1736 	status = ssam_request_sync_alloc(spec->length, GFP_KERNEL, &rqst, &buf);
1737 	if (status)
1738 		return status;
1739 
1740 	status = ssam_request_sync_init(rqst, spec->flags);
1741 	if (status) {
1742 		ssam_request_sync_free(rqst);
1743 		return status;
1744 	}
1745 
1746 	ssam_request_sync_set_resp(rqst, rsp);
1747 
1748 	len = ssam_request_write_data(&buf, ctrl, spec);
1749 	if (len < 0) {
1750 		ssam_request_sync_free(rqst);
1751 		return len;
1752 	}
1753 
1754 	ssam_request_sync_set_data(rqst, buf.ptr, len);
1755 
1756 	status = ssam_request_sync_submit(ctrl, rqst);
1757 	if (!status)
1758 		status = ssam_request_sync_wait(rqst);
1759 
1760 	ssam_request_sync_free(rqst);
1761 	return status;
1762 }
1763 EXPORT_SYMBOL_GPL(ssam_request_do_sync);
1764 
1765 /**
1766  * ssam_request_do_sync_with_buffer() - Execute a synchronous request with the
1767  * provided buffer as back-end for the message buffer.
1768  * @ctrl: The controller via which the request will be submitted.
1769  * @spec: The request specification and payload.
1770  * @rsp:  The response buffer.
1771  * @buf:  The buffer for the request message data.
1772  *
1773  * Allocates a synchronous request struct on the stack, fully initializes it
1774  * using the provided buffer as message data buffer, submits it, and then
1775  * waits for its completion before returning its status. The
1776  * SSH_COMMAND_MESSAGE_LENGTH() macro can be used to compute the required
1777  * message buffer size.
1778  *
1779  * This function does essentially the same as ssam_request_do_sync(), but
1780  * instead of dynamically allocating the request and message data buffer, it
1781  * uses the provided message data buffer and stores the (small) request struct
1782  * on the heap.
1783  *
1784  * Return: Returns the status of the request or any failure during setup.
1785  */
1786 int ssam_request_do_sync_with_buffer(struct ssam_controller *ctrl,
1787 				     const struct ssam_request *spec,
1788 				     struct ssam_response *rsp,
1789 				     struct ssam_span *buf)
1790 {
1791 	struct ssam_request_sync rqst;
1792 	ssize_t len;
1793 	int status;
1794 
1795 	status = ssam_request_sync_init(&rqst, spec->flags);
1796 	if (status)
1797 		return status;
1798 
1799 	ssam_request_sync_set_resp(&rqst, rsp);
1800 
1801 	len = ssam_request_write_data(buf, ctrl, spec);
1802 	if (len < 0)
1803 		return len;
1804 
1805 	ssam_request_sync_set_data(&rqst, buf->ptr, len);
1806 
1807 	status = ssam_request_sync_submit(ctrl, &rqst);
1808 	if (!status)
1809 		status = ssam_request_sync_wait(&rqst);
1810 
1811 	return status;
1812 }
1813 EXPORT_SYMBOL_GPL(ssam_request_do_sync_with_buffer);
1814 
1815 
1816 /* -- Internal SAM requests. ------------------------------------------------ */
1817 
1818 SSAM_DEFINE_SYNC_REQUEST_R(ssam_ssh_get_firmware_version, __le32, {
1819 	.target_category = SSAM_SSH_TC_SAM,
1820 	.target_id       = SSAM_SSH_TID_SAM,
1821 	.command_id      = 0x13,
1822 	.instance_id     = 0x00,
1823 });
1824 
1825 SSAM_DEFINE_SYNC_REQUEST_R(ssam_ssh_notif_display_off, u8, {
1826 	.target_category = SSAM_SSH_TC_SAM,
1827 	.target_id       = SSAM_SSH_TID_SAM,
1828 	.command_id      = 0x15,
1829 	.instance_id     = 0x00,
1830 });
1831 
1832 SSAM_DEFINE_SYNC_REQUEST_R(ssam_ssh_notif_display_on, u8, {
1833 	.target_category = SSAM_SSH_TC_SAM,
1834 	.target_id       = SSAM_SSH_TID_SAM,
1835 	.command_id      = 0x16,
1836 	.instance_id     = 0x00,
1837 });
1838 
1839 SSAM_DEFINE_SYNC_REQUEST_R(ssam_ssh_notif_d0_exit, u8, {
1840 	.target_category = SSAM_SSH_TC_SAM,
1841 	.target_id       = SSAM_SSH_TID_SAM,
1842 	.command_id      = 0x33,
1843 	.instance_id     = 0x00,
1844 });
1845 
1846 SSAM_DEFINE_SYNC_REQUEST_R(ssam_ssh_notif_d0_entry, u8, {
1847 	.target_category = SSAM_SSH_TC_SAM,
1848 	.target_id       = SSAM_SSH_TID_SAM,
1849 	.command_id      = 0x34,
1850 	.instance_id     = 0x00,
1851 });
1852 
1853 /**
1854  * struct ssh_notification_params - Command payload to enable/disable SSH
1855  * notifications.
1856  * @target_category: The target category for which notifications should be
1857  *                   enabled/disabled.
1858  * @flags:           Flags determining how notifications are being sent.
1859  * @request_id:      The request ID that is used to send these notifications.
1860  * @instance_id:     The specific instance in the given target category for
1861  *                   which notifications should be enabled.
1862  */
1863 struct ssh_notification_params {
1864 	u8 target_category;
1865 	u8 flags;
1866 	__le16 request_id;
1867 	u8 instance_id;
1868 } __packed;
1869 
1870 static_assert(sizeof(struct ssh_notification_params) == 5);
1871 
1872 static int __ssam_ssh_event_request(struct ssam_controller *ctrl,
1873 				    struct ssam_event_registry reg, u8 cid,
1874 				    struct ssam_event_id id, u8 flags)
1875 {
1876 	struct ssh_notification_params params;
1877 	struct ssam_request rqst;
1878 	struct ssam_response result;
1879 	int status;
1880 
1881 	u16 rqid = ssh_tc_to_rqid(id.target_category);
1882 	u8 buf = 0;
1883 
1884 	/* Only allow RQIDs that lie within the event spectrum. */
1885 	if (!ssh_rqid_is_event(rqid))
1886 		return -EINVAL;
1887 
1888 	params.target_category = id.target_category;
1889 	params.instance_id = id.instance;
1890 	params.flags = flags;
1891 	put_unaligned_le16(rqid, &params.request_id);
1892 
1893 	rqst.target_category = reg.target_category;
1894 	rqst.target_id = reg.target_id;
1895 	rqst.command_id = cid;
1896 	rqst.instance_id = 0x00;
1897 	rqst.flags = SSAM_REQUEST_HAS_RESPONSE;
1898 	rqst.length = sizeof(params);
1899 	rqst.payload = (u8 *)&params;
1900 
1901 	result.capacity = sizeof(buf);
1902 	result.length = 0;
1903 	result.pointer = &buf;
1904 
1905 	status = ssam_retry(ssam_request_do_sync_onstack, ctrl, &rqst, &result,
1906 			    sizeof(params));
1907 
1908 	return status < 0 ? status : buf;
1909 }
1910 
1911 /**
1912  * ssam_ssh_event_enable() - Enable SSH event.
1913  * @ctrl:  The controller for which to enable the event.
1914  * @reg:   The event registry describing what request to use for enabling and
1915  *         disabling the event.
1916  * @id:    The event identifier.
1917  * @flags: The event flags.
1918  *
1919  * Enables the specified event on the EC. This function does not manage
1920  * reference counting of enabled events and is basically only a wrapper for
1921  * the raw EC request. If the specified event is already enabled, the EC will
1922  * ignore this request.
1923  *
1924  * Return: Returns the status of the executed SAM request (zero on success and
1925  * negative on direct failure) or %-EPROTO if the request response indicates a
1926  * failure.
1927  */
1928 static int ssam_ssh_event_enable(struct ssam_controller *ctrl,
1929 				 struct ssam_event_registry reg,
1930 				 struct ssam_event_id id, u8 flags)
1931 {
1932 	int status;
1933 
1934 	status = __ssam_ssh_event_request(ctrl, reg, reg.cid_enable, id, flags);
1935 
1936 	if (status < 0 && status != -EINVAL) {
1937 		ssam_err(ctrl,
1938 			 "failed to enable event source (tc: %#04x, iid: %#04x, reg: %#04x)\n",
1939 			 id.target_category, id.instance, reg.target_category);
1940 	}
1941 
1942 	if (status > 0) {
1943 		ssam_err(ctrl,
1944 			 "unexpected result while enabling event source: %#04x (tc: %#04x, iid: %#04x, reg: %#04x)\n",
1945 			 status, id.target_category, id.instance, reg.target_category);
1946 		return -EPROTO;
1947 	}
1948 
1949 	return status;
1950 }
1951 
1952 /**
1953  * ssam_ssh_event_disable() - Disable SSH event.
1954  * @ctrl:  The controller for which to disable the event.
1955  * @reg:   The event registry describing what request to use for enabling and
1956  *         disabling the event (must be same as used when enabling the event).
1957  * @id:    The event identifier.
1958  * @flags: The event flags (likely ignored for disabling of events).
1959  *
1960  * Disables the specified event on the EC. This function does not manage
1961  * reference counting of enabled events and is basically only a wrapper for
1962  * the raw EC request. If the specified event is already disabled, the EC will
1963  * ignore this request.
1964  *
1965  * Return: Returns the status of the executed SAM request (zero on success and
1966  * negative on direct failure) or %-EPROTO if the request response indicates a
1967  * failure.
1968  */
1969 static int ssam_ssh_event_disable(struct ssam_controller *ctrl,
1970 				  struct ssam_event_registry reg,
1971 				  struct ssam_event_id id, u8 flags)
1972 {
1973 	int status;
1974 
1975 	status = __ssam_ssh_event_request(ctrl, reg, reg.cid_disable, id, flags);
1976 
1977 	if (status < 0 && status != -EINVAL) {
1978 		ssam_err(ctrl,
1979 			 "failed to disable event source (tc: %#04x, iid: %#04x, reg: %#04x)\n",
1980 			 id.target_category, id.instance, reg.target_category);
1981 	}
1982 
1983 	if (status > 0) {
1984 		ssam_err(ctrl,
1985 			 "unexpected result while disabling event source: %#04x (tc: %#04x, iid: %#04x, reg: %#04x)\n",
1986 			 status, id.target_category, id.instance, reg.target_category);
1987 		return -EPROTO;
1988 	}
1989 
1990 	return status;
1991 }
1992 
1993 
1994 /* -- Wrappers for internal SAM requests. ----------------------------------- */
1995 
1996 /**
1997  * ssam_get_firmware_version() - Get the SAM/EC firmware version.
1998  * @ctrl:    The controller.
1999  * @version: Where to store the version number.
2000  *
2001  * Return: Returns zero on success or the status of the executed SAM request
2002  * if that request failed.
2003  */
2004 int ssam_get_firmware_version(struct ssam_controller *ctrl, u32 *version)
2005 {
2006 	__le32 __version;
2007 	int status;
2008 
2009 	status = ssam_retry(ssam_ssh_get_firmware_version, ctrl, &__version);
2010 	if (status)
2011 		return status;
2012 
2013 	*version = le32_to_cpu(__version);
2014 	return 0;
2015 }
2016 
2017 /**
2018  * ssam_ctrl_notif_display_off() - Notify EC that the display has been turned
2019  * off.
2020  * @ctrl: The controller.
2021  *
2022  * Notify the EC that the display has been turned off and the driver may enter
2023  * a lower-power state. This will prevent events from being sent directly.
2024  * Rather, the EC signals an event by pulling the wakeup GPIO high for as long
2025  * as there are pending events. The events then need to be manually released,
2026  * one by one, via the GPIO callback request. All pending events accumulated
2027  * during this state can also be released by issuing the display-on
2028  * notification, e.g. via ssam_ctrl_notif_display_on(), which will also reset
2029  * the GPIO.
2030  *
2031  * On some devices, specifically ones with an integrated keyboard, the keyboard
2032  * backlight will be turned off by this call.
2033  *
2034  * This function will only send the display-off notification command if
2035  * display notifications are supported by the EC. Currently all known devices
2036  * support these notifications.
2037  *
2038  * Use ssam_ctrl_notif_display_on() to reverse the effects of this function.
2039  *
2040  * Return: Returns zero on success or if no request has been executed, the
2041  * status of the executed SAM request if that request failed, or %-EPROTO if
2042  * an unexpected response has been received.
2043  */
2044 int ssam_ctrl_notif_display_off(struct ssam_controller *ctrl)
2045 {
2046 	int status;
2047 	u8 response;
2048 
2049 	ssam_dbg(ctrl, "pm: notifying display off\n");
2050 
2051 	status = ssam_retry(ssam_ssh_notif_display_off, ctrl, &response);
2052 	if (status)
2053 		return status;
2054 
2055 	if (response != 0) {
2056 		ssam_err(ctrl, "unexpected response from display-off notification: %#04x\n",
2057 			 response);
2058 		return -EPROTO;
2059 	}
2060 
2061 	return 0;
2062 }
2063 
2064 /**
2065  * ssam_ctrl_notif_display_on() - Notify EC that the display has been turned on.
2066  * @ctrl: The controller.
2067  *
2068  * Notify the EC that the display has been turned back on and the driver has
2069  * exited its lower-power state. This notification is the counterpart to the
2070  * display-off notification sent via ssam_ctrl_notif_display_off() and will
2071  * reverse its effects, including resetting events to their default behavior.
2072  *
2073  * This function will only send the display-on notification command if display
2074  * notifications are supported by the EC. Currently all known devices support
2075  * these notifications.
2076  *
2077  * See ssam_ctrl_notif_display_off() for more details.
2078  *
2079  * Return: Returns zero on success or if no request has been executed, the
2080  * status of the executed SAM request if that request failed, or %-EPROTO if
2081  * an unexpected response has been received.
2082  */
2083 int ssam_ctrl_notif_display_on(struct ssam_controller *ctrl)
2084 {
2085 	int status;
2086 	u8 response;
2087 
2088 	ssam_dbg(ctrl, "pm: notifying display on\n");
2089 
2090 	status = ssam_retry(ssam_ssh_notif_display_on, ctrl, &response);
2091 	if (status)
2092 		return status;
2093 
2094 	if (response != 0) {
2095 		ssam_err(ctrl, "unexpected response from display-on notification: %#04x\n",
2096 			 response);
2097 		return -EPROTO;
2098 	}
2099 
2100 	return 0;
2101 }
2102 
2103 /**
2104  * ssam_ctrl_notif_d0_exit() - Notify EC that the driver/device exits the D0
2105  * power state.
2106  * @ctrl: The controller
2107  *
2108  * Notifies the EC that the driver prepares to exit the D0 power state in
2109  * favor of a lower-power state. Exact effects of this function related to the
2110  * EC are currently unknown.
2111  *
2112  * This function will only send the D0-exit notification command if D0-state
2113  * notifications are supported by the EC. Only newer Surface generations
2114  * support these notifications.
2115  *
2116  * Use ssam_ctrl_notif_d0_entry() to reverse the effects of this function.
2117  *
2118  * Return: Returns zero on success or if no request has been executed, the
2119  * status of the executed SAM request if that request failed, or %-EPROTO if
2120  * an unexpected response has been received.
2121  */
2122 int ssam_ctrl_notif_d0_exit(struct ssam_controller *ctrl)
2123 {
2124 	int status;
2125 	u8 response;
2126 
2127 	if (!ctrl->caps.d3_closes_handle)
2128 		return 0;
2129 
2130 	ssam_dbg(ctrl, "pm: notifying D0 exit\n");
2131 
2132 	status = ssam_retry(ssam_ssh_notif_d0_exit, ctrl, &response);
2133 	if (status)
2134 		return status;
2135 
2136 	if (response != 0) {
2137 		ssam_err(ctrl, "unexpected response from D0-exit notification: %#04x\n",
2138 			 response);
2139 		return -EPROTO;
2140 	}
2141 
2142 	return 0;
2143 }
2144 
2145 /**
2146  * ssam_ctrl_notif_d0_entry() - Notify EC that the driver/device enters the D0
2147  * power state.
2148  * @ctrl: The controller
2149  *
2150  * Notifies the EC that the driver has exited a lower-power state and entered
2151  * the D0 power state. Exact effects of this function related to the EC are
2152  * currently unknown.
2153  *
2154  * This function will only send the D0-entry notification command if D0-state
2155  * notifications are supported by the EC. Only newer Surface generations
2156  * support these notifications.
2157  *
2158  * See ssam_ctrl_notif_d0_exit() for more details.
2159  *
2160  * Return: Returns zero on success or if no request has been executed, the
2161  * status of the executed SAM request if that request failed, or %-EPROTO if
2162  * an unexpected response has been received.
2163  */
2164 int ssam_ctrl_notif_d0_entry(struct ssam_controller *ctrl)
2165 {
2166 	int status;
2167 	u8 response;
2168 
2169 	if (!ctrl->caps.d3_closes_handle)
2170 		return 0;
2171 
2172 	ssam_dbg(ctrl, "pm: notifying D0 entry\n");
2173 
2174 	status = ssam_retry(ssam_ssh_notif_d0_entry, ctrl, &response);
2175 	if (status)
2176 		return status;
2177 
2178 	if (response != 0) {
2179 		ssam_err(ctrl, "unexpected response from D0-entry notification: %#04x\n",
2180 			 response);
2181 		return -EPROTO;
2182 	}
2183 
2184 	return 0;
2185 }
2186 
2187 
2188 /* -- Top-level event registry interface. ----------------------------------- */
2189 
2190 /**
2191  * ssam_nf_refcount_enable() - Enable event for reference count entry if it has
2192  * not already been enabled.
2193  * @ctrl:  The controller to enable the event on.
2194  * @entry: The reference count entry for the event to be enabled.
2195  * @flags: The flags used for enabling the event on the EC.
2196  *
2197  * Enable the event associated with the given reference count entry if the
2198  * reference count equals one, i.e. the event has not previously been enabled.
2199  * If the event has already been enabled (i.e. reference count not equal to
2200  * one), check that the flags used for enabling match and warn about this if
2201  * they do not.
2202  *
2203  * This does not modify the reference count itself, which is done with
2204  * ssam_nf_refcount_inc() / ssam_nf_refcount_dec().
2205  *
2206  * Note: ``nf->lock`` must be held when calling this function.
2207  *
2208  * Return: Returns zero on success. If the event is enabled by this call,
2209  * returns the status of the event-enable EC command.
2210  */
2211 static int ssam_nf_refcount_enable(struct ssam_controller *ctrl,
2212 				   struct ssam_nf_refcount_entry *entry, u8 flags)
2213 {
2214 	const struct ssam_event_registry reg = entry->key.reg;
2215 	const struct ssam_event_id id = entry->key.id;
2216 	struct ssam_nf *nf = &ctrl->cplt.event.notif;
2217 	int status;
2218 
2219 	lockdep_assert_held(&nf->lock);
2220 
2221 	ssam_dbg(ctrl, "enabling event (reg: %#04x, tc: %#04x, iid: %#04x, rc: %d)\n",
2222 		 reg.target_category, id.target_category, id.instance, entry->refcount);
2223 
2224 	if (entry->refcount == 1) {
2225 		status = ssam_ssh_event_enable(ctrl, reg, id, flags);
2226 		if (status)
2227 			return status;
2228 
2229 		entry->flags = flags;
2230 
2231 	} else if (entry->flags != flags) {
2232 		ssam_warn(ctrl,
2233 			  "inconsistent flags when enabling event: got %#04x, expected %#04x (reg: %#04x, tc: %#04x, iid: %#04x)\n",
2234 			  flags, entry->flags, reg.target_category, id.target_category,
2235 			  id.instance);
2236 	}
2237 
2238 	return 0;
2239 }
2240 
2241 /**
2242  * ssam_nf_refcount_disable_free() - Disable event for reference count entry if
2243  * it is no longer in use and free the corresponding entry.
2244  * @ctrl:  The controller to disable the event on.
2245  * @entry: The reference count entry for the event to be disabled.
2246  * @flags: The flags used for enabling the event on the EC.
2247  * @ec:    Flag specifying if the event should actually be disabled on the EC.
2248  *
2249  * If ``ec`` equals ``true`` and the reference count equals zero (i.e. the
2250  * event is no longer requested by any client), the specified event will be
2251  * disabled on the EC via the corresponding request.
2252  *
2253  * If ``ec`` equals ``false``, no request will be sent to the EC and the event
2254  * can be considered in a detached state (i.e. no longer used but still
2255  * enabled). Disabling an event via this method may be required for
2256  * hot-removable devices, where event disable requests may time out after the
2257  * device has been physically removed.
2258  *
2259  * In both cases, if the reference count equals zero, the corresponding
2260  * reference count entry will be freed. The reference count entry must not be
2261  * used any more after a call to this function.
2262  *
2263  * Also checks if the flags used for disabling the event match the flags used
2264  * for enabling the event and warns if they do not (regardless of reference
2265  * count).
2266  *
2267  * This does not modify the reference count itself, which is done with
2268  * ssam_nf_refcount_inc() / ssam_nf_refcount_dec().
2269  *
2270  * Note: ``nf->lock`` must be held when calling this function.
2271  *
2272  * Return: Returns zero on success. If the event is disabled by this call,
2273  * returns the status of the event-enable EC command.
2274  */
2275 static int ssam_nf_refcount_disable_free(struct ssam_controller *ctrl,
2276 					 struct ssam_nf_refcount_entry *entry, u8 flags, bool ec)
2277 {
2278 	const struct ssam_event_registry reg = entry->key.reg;
2279 	const struct ssam_event_id id = entry->key.id;
2280 	struct ssam_nf *nf = &ctrl->cplt.event.notif;
2281 	int status = 0;
2282 
2283 	lockdep_assert_held(&nf->lock);
2284 
2285 	ssam_dbg(ctrl, "%s event (reg: %#04x, tc: %#04x, iid: %#04x, rc: %d)\n",
2286 		 ec ? "disabling" : "detaching", reg.target_category, id.target_category,
2287 		 id.instance, entry->refcount);
2288 
2289 	if (entry->flags != flags) {
2290 		ssam_warn(ctrl,
2291 			  "inconsistent flags when disabling event: got %#04x, expected %#04x (reg: %#04x, tc: %#04x, iid: %#04x)\n",
2292 			  flags, entry->flags, reg.target_category, id.target_category,
2293 			  id.instance);
2294 	}
2295 
2296 	if (ec && entry->refcount == 0) {
2297 		status = ssam_ssh_event_disable(ctrl, reg, id, flags);
2298 		kfree(entry);
2299 	}
2300 
2301 	return status;
2302 }
2303 
2304 /**
2305  * ssam_notifier_register() - Register an event notifier.
2306  * @ctrl: The controller to register the notifier on.
2307  * @n:    The event notifier to register.
2308  *
2309  * Register an event notifier. Increment the usage counter of the associated
2310  * SAM event if the notifier is not marked as an observer. If the event is not
2311  * marked as an observer and is currently not enabled, it will be enabled
2312  * during this call. If the notifier is marked as an observer, no attempt will
2313  * be made at enabling any event and no reference count will be modified.
2314  *
2315  * Notifiers marked as observers do not need to be associated with one specific
2316  * event, i.e. as long as no event matching is performed, only the event target
2317  * category needs to be set.
2318  *
2319  * Return: Returns zero on success, %-ENOSPC if there have already been
2320  * %INT_MAX notifiers for the event ID/type associated with the notifier block
2321  * registered, %-ENOMEM if the corresponding event entry could not be
2322  * allocated. If this is the first time that a notifier block is registered
2323  * for the specific associated event, returns the status of the event-enable
2324  * EC-command.
2325  */
2326 int ssam_notifier_register(struct ssam_controller *ctrl, struct ssam_event_notifier *n)
2327 {
2328 	u16 rqid = ssh_tc_to_rqid(n->event.id.target_category);
2329 	struct ssam_nf_refcount_entry *entry = NULL;
2330 	struct ssam_nf_head *nf_head;
2331 	struct ssam_nf *nf;
2332 	int status;
2333 
2334 	if (!ssh_rqid_is_event(rqid))
2335 		return -EINVAL;
2336 
2337 	nf = &ctrl->cplt.event.notif;
2338 	nf_head = &nf->head[ssh_rqid_to_event(rqid)];
2339 
2340 	mutex_lock(&nf->lock);
2341 
2342 	if (!(n->flags & SSAM_EVENT_NOTIFIER_OBSERVER)) {
2343 		entry = ssam_nf_refcount_inc(nf, n->event.reg, n->event.id);
2344 		if (IS_ERR(entry)) {
2345 			mutex_unlock(&nf->lock);
2346 			return PTR_ERR(entry);
2347 		}
2348 	}
2349 
2350 	status = ssam_nfblk_insert(nf_head, &n->base);
2351 	if (status) {
2352 		if (entry)
2353 			ssam_nf_refcount_dec_free(nf, n->event.reg, n->event.id);
2354 
2355 		mutex_unlock(&nf->lock);
2356 		return status;
2357 	}
2358 
2359 	if (entry) {
2360 		status = ssam_nf_refcount_enable(ctrl, entry, n->event.flags);
2361 		if (status) {
2362 			ssam_nfblk_remove(&n->base);
2363 			ssam_nf_refcount_dec_free(nf, n->event.reg, n->event.id);
2364 			mutex_unlock(&nf->lock);
2365 			synchronize_srcu(&nf_head->srcu);
2366 			return status;
2367 		}
2368 	}
2369 
2370 	mutex_unlock(&nf->lock);
2371 	return 0;
2372 }
2373 EXPORT_SYMBOL_GPL(ssam_notifier_register);
2374 
2375 /**
2376  * __ssam_notifier_unregister() - Unregister an event notifier.
2377  * @ctrl:    The controller the notifier has been registered on.
2378  * @n:       The event notifier to unregister.
2379  * @disable: Whether to disable the corresponding event on the EC.
2380  *
2381  * Unregister an event notifier. Decrement the usage counter of the associated
2382  * SAM event if the notifier is not marked as an observer. If the usage counter
2383  * reaches zero and ``disable`` equals ``true``, the event will be disabled.
2384  *
2385  * Useful for hot-removable devices, where communication may fail once the
2386  * device has been physically removed. In that case, specifying ``disable`` as
2387  * ``false`` avoids communication with the EC.
2388  *
2389  * Return: Returns zero on success, %-ENOENT if the given notifier block has
2390  * not been registered on the controller. If the given notifier block was the
2391  * last one associated with its specific event, returns the status of the
2392  * event-disable EC-command.
2393  */
2394 int __ssam_notifier_unregister(struct ssam_controller *ctrl, struct ssam_event_notifier *n,
2395 			       bool disable)
2396 {
2397 	u16 rqid = ssh_tc_to_rqid(n->event.id.target_category);
2398 	struct ssam_nf_refcount_entry *entry;
2399 	struct ssam_nf_head *nf_head;
2400 	struct ssam_nf *nf;
2401 	int status = 0;
2402 
2403 	if (!ssh_rqid_is_event(rqid))
2404 		return -EINVAL;
2405 
2406 	nf = &ctrl->cplt.event.notif;
2407 	nf_head = &nf->head[ssh_rqid_to_event(rqid)];
2408 
2409 	mutex_lock(&nf->lock);
2410 
2411 	if (!ssam_nfblk_find(nf_head, &n->base)) {
2412 		mutex_unlock(&nf->lock);
2413 		return -ENOENT;
2414 	}
2415 
2416 	/*
2417 	 * If this is an observer notifier, do not attempt to disable the
2418 	 * event, just remove it.
2419 	 */
2420 	if (!(n->flags & SSAM_EVENT_NOTIFIER_OBSERVER)) {
2421 		entry = ssam_nf_refcount_dec(nf, n->event.reg, n->event.id);
2422 		if (WARN_ON(!entry)) {
2423 			/*
2424 			 * If this does not return an entry, there's a logic
2425 			 * error somewhere: The notifier block is registered,
2426 			 * but the event refcount entry is not there. Remove
2427 			 * the notifier block anyways.
2428 			 */
2429 			status = -ENOENT;
2430 			goto remove;
2431 		}
2432 
2433 		status = ssam_nf_refcount_disable_free(ctrl, entry, n->event.flags, disable);
2434 	}
2435 
2436 remove:
2437 	ssam_nfblk_remove(&n->base);
2438 	mutex_unlock(&nf->lock);
2439 	synchronize_srcu(&nf_head->srcu);
2440 
2441 	return status;
2442 }
2443 EXPORT_SYMBOL_GPL(__ssam_notifier_unregister);
2444 
2445 /**
2446  * ssam_controller_event_enable() - Enable the specified event.
2447  * @ctrl:  The controller to enable the event for.
2448  * @reg:   The event registry to use for enabling the event.
2449  * @id:    The event ID specifying the event to be enabled.
2450  * @flags: The SAM event flags used for enabling the event.
2451  *
2452  * Increment the event reference count of the specified event. If the event has
2453  * not been enabled previously, it will be enabled by this call.
2454  *
2455  * Note: In general, ssam_notifier_register() with a non-observer notifier
2456  * should be preferred for enabling/disabling events, as this will guarantee
2457  * proper ordering and event forwarding in case of errors during event
2458  * enabling/disabling.
2459  *
2460  * Return: Returns zero on success, %-ENOSPC if the reference count for the
2461  * specified event has reached its maximum, %-ENOMEM if the corresponding event
2462  * entry could not be allocated. If this is the first time that this event has
2463  * been enabled (i.e. the reference count was incremented from zero to one by
2464  * this call), returns the status of the event-enable EC-command.
2465  */
2466 int ssam_controller_event_enable(struct ssam_controller *ctrl,
2467 				 struct ssam_event_registry reg,
2468 				 struct ssam_event_id id, u8 flags)
2469 {
2470 	u16 rqid = ssh_tc_to_rqid(id.target_category);
2471 	struct ssam_nf *nf = &ctrl->cplt.event.notif;
2472 	struct ssam_nf_refcount_entry *entry;
2473 	int status;
2474 
2475 	if (!ssh_rqid_is_event(rqid))
2476 		return -EINVAL;
2477 
2478 	mutex_lock(&nf->lock);
2479 
2480 	entry = ssam_nf_refcount_inc(nf, reg, id);
2481 	if (IS_ERR(entry)) {
2482 		mutex_unlock(&nf->lock);
2483 		return PTR_ERR(entry);
2484 	}
2485 
2486 	status = ssam_nf_refcount_enable(ctrl, entry, flags);
2487 	if (status) {
2488 		ssam_nf_refcount_dec_free(nf, reg, id);
2489 		mutex_unlock(&nf->lock);
2490 		return status;
2491 	}
2492 
2493 	mutex_unlock(&nf->lock);
2494 	return 0;
2495 }
2496 EXPORT_SYMBOL_GPL(ssam_controller_event_enable);
2497 
2498 /**
2499  * ssam_controller_event_disable() - Disable the specified event.
2500  * @ctrl:  The controller to disable the event for.
2501  * @reg:   The event registry to use for disabling the event.
2502  * @id:    The event ID specifying the event to be disabled.
2503  * @flags: The flags used when enabling the event.
2504  *
2505  * Decrement the reference count of the specified event. If the reference count
2506  * reaches zero, the event will be disabled.
2507  *
2508  * Note: In general, ssam_notifier_register()/ssam_notifier_unregister() with a
2509  * non-observer notifier should be preferred for enabling/disabling events, as
2510  * this will guarantee proper ordering and event forwarding in case of errors
2511  * during event enabling/disabling.
2512  *
2513  * Return: Returns zero on success, %-ENOENT if the given event has not been
2514  * enabled on the controller. If the reference count of the event reaches zero
2515  * during this call, returns the status of the event-disable EC-command.
2516  */
2517 int ssam_controller_event_disable(struct ssam_controller *ctrl,
2518 				  struct ssam_event_registry reg,
2519 				  struct ssam_event_id id, u8 flags)
2520 {
2521 	u16 rqid = ssh_tc_to_rqid(id.target_category);
2522 	struct ssam_nf *nf = &ctrl->cplt.event.notif;
2523 	struct ssam_nf_refcount_entry *entry;
2524 	int status;
2525 
2526 	if (!ssh_rqid_is_event(rqid))
2527 		return -EINVAL;
2528 
2529 	mutex_lock(&nf->lock);
2530 
2531 	entry = ssam_nf_refcount_dec(nf, reg, id);
2532 	if (!entry) {
2533 		mutex_unlock(&nf->lock);
2534 		return -ENOENT;
2535 	}
2536 
2537 	status = ssam_nf_refcount_disable_free(ctrl, entry, flags, true);
2538 
2539 	mutex_unlock(&nf->lock);
2540 	return status;
2541 }
2542 EXPORT_SYMBOL_GPL(ssam_controller_event_disable);
2543 
2544 /**
2545  * ssam_notifier_disable_registered() - Disable events for all registered
2546  * notifiers.
2547  * @ctrl: The controller for which to disable the notifiers/events.
2548  *
2549  * Disables events for all currently registered notifiers. In case of an error
2550  * (EC command failing), all previously disabled events will be restored and
2551  * the error code returned.
2552  *
2553  * This function is intended to disable all events prior to hibernation entry.
2554  * See ssam_notifier_restore_registered() to restore/re-enable all events
2555  * disabled with this function.
2556  *
2557  * Note that this function will not disable events for notifiers registered
2558  * after calling this function. It should thus be made sure that no new
2559  * notifiers are going to be added after this call and before the corresponding
2560  * call to ssam_notifier_restore_registered().
2561  *
2562  * Return: Returns zero on success. In case of failure returns the error code
2563  * returned by the failed EC command to disable an event.
2564  */
2565 int ssam_notifier_disable_registered(struct ssam_controller *ctrl)
2566 {
2567 	struct ssam_nf *nf = &ctrl->cplt.event.notif;
2568 	struct rb_node *n;
2569 	int status;
2570 
2571 	mutex_lock(&nf->lock);
2572 	for (n = rb_first(&nf->refcount); n; n = rb_next(n)) {
2573 		struct ssam_nf_refcount_entry *e;
2574 
2575 		e = rb_entry(n, struct ssam_nf_refcount_entry, node);
2576 		status = ssam_ssh_event_disable(ctrl, e->key.reg,
2577 						e->key.id, e->flags);
2578 		if (status)
2579 			goto err;
2580 	}
2581 	mutex_unlock(&nf->lock);
2582 
2583 	return 0;
2584 
2585 err:
2586 	for (n = rb_prev(n); n; n = rb_prev(n)) {
2587 		struct ssam_nf_refcount_entry *e;
2588 
2589 		e = rb_entry(n, struct ssam_nf_refcount_entry, node);
2590 		ssam_ssh_event_enable(ctrl, e->key.reg, e->key.id, e->flags);
2591 	}
2592 	mutex_unlock(&nf->lock);
2593 
2594 	return status;
2595 }
2596 
2597 /**
2598  * ssam_notifier_restore_registered() - Restore/re-enable events for all
2599  * registered notifiers.
2600  * @ctrl: The controller for which to restore the notifiers/events.
2601  *
2602  * Restores/re-enables all events for which notifiers have been registered on
2603  * the given controller. In case of a failure, the error is logged and the
2604  * function continues to try and enable the remaining events.
2605  *
2606  * This function is intended to restore/re-enable all registered events after
2607  * hibernation. See ssam_notifier_disable_registered() for the counter part
2608  * disabling the events and more details.
2609  */
2610 void ssam_notifier_restore_registered(struct ssam_controller *ctrl)
2611 {
2612 	struct ssam_nf *nf = &ctrl->cplt.event.notif;
2613 	struct rb_node *n;
2614 
2615 	mutex_lock(&nf->lock);
2616 	for (n = rb_first(&nf->refcount); n; n = rb_next(n)) {
2617 		struct ssam_nf_refcount_entry *e;
2618 
2619 		e = rb_entry(n, struct ssam_nf_refcount_entry, node);
2620 
2621 		/* Ignore errors, will get logged in call. */
2622 		ssam_ssh_event_enable(ctrl, e->key.reg, e->key.id, e->flags);
2623 	}
2624 	mutex_unlock(&nf->lock);
2625 }
2626 
2627 /**
2628  * ssam_notifier_is_empty() - Check if there are any registered notifiers.
2629  * @ctrl: The controller to check on.
2630  *
2631  * Return: Returns %true if there are currently no notifiers registered on the
2632  * controller, %false otherwise.
2633  */
2634 static bool ssam_notifier_is_empty(struct ssam_controller *ctrl)
2635 {
2636 	struct ssam_nf *nf = &ctrl->cplt.event.notif;
2637 	bool result;
2638 
2639 	mutex_lock(&nf->lock);
2640 	result = ssam_nf_refcount_empty(nf);
2641 	mutex_unlock(&nf->lock);
2642 
2643 	return result;
2644 }
2645 
2646 /**
2647  * ssam_notifier_unregister_all() - Unregister all currently registered
2648  * notifiers.
2649  * @ctrl: The controller to unregister the notifiers on.
2650  *
2651  * Unregisters all currently registered notifiers. This function is used to
2652  * ensure that all notifiers will be unregistered and associated
2653  * entries/resources freed when the controller is being shut down.
2654  */
2655 static void ssam_notifier_unregister_all(struct ssam_controller *ctrl)
2656 {
2657 	struct ssam_nf *nf = &ctrl->cplt.event.notif;
2658 	struct ssam_nf_refcount_entry *e, *n;
2659 
2660 	mutex_lock(&nf->lock);
2661 	rbtree_postorder_for_each_entry_safe(e, n, &nf->refcount, node) {
2662 		/* Ignore errors, will get logged in call. */
2663 		ssam_ssh_event_disable(ctrl, e->key.reg, e->key.id, e->flags);
2664 		kfree(e);
2665 	}
2666 	nf->refcount = RB_ROOT;
2667 	mutex_unlock(&nf->lock);
2668 }
2669 
2670 
2671 /* -- Wakeup IRQ. ----------------------------------------------------------- */
2672 
2673 static irqreturn_t ssam_irq_handle(int irq, void *dev_id)
2674 {
2675 	struct ssam_controller *ctrl = dev_id;
2676 
2677 	ssam_dbg(ctrl, "pm: wake irq triggered\n");
2678 
2679 	/*
2680 	 * Note: Proper wakeup detection is currently unimplemented.
2681 	 *       When the EC is in display-off or any other non-D0 state, it
2682 	 *       does not send events/notifications to the host. Instead it
2683 	 *       signals that there are events available via the wakeup IRQ.
2684 	 *       This driver is responsible for calling back to the EC to
2685 	 *       release these events one-by-one.
2686 	 *
2687 	 *       This IRQ should not cause a full system resume by its own.
2688 	 *       Instead, events should be handled by their respective subsystem
2689 	 *       drivers, which in turn should signal whether a full system
2690 	 *       resume should be performed.
2691 	 *
2692 	 * TODO: Send GPIO callback command repeatedly to EC until callback
2693 	 *       returns 0x00. Return flag of callback is "has more events".
2694 	 *       Each time the command is sent, one event is "released". Once
2695 	 *       all events have been released (return = 0x00), the GPIO is
2696 	 *       re-armed. Detect wakeup events during this process, go back to
2697 	 *       sleep if no wakeup event has been received.
2698 	 */
2699 
2700 	return IRQ_HANDLED;
2701 }
2702 
2703 /**
2704  * ssam_irq_setup() - Set up SAM EC wakeup-GPIO interrupt.
2705  * @ctrl: The controller for which the IRQ should be set up.
2706  *
2707  * Set up an IRQ for the wakeup-GPIO pin of the SAM EC. This IRQ can be used
2708  * to wake the device from a low power state.
2709  *
2710  * Note that this IRQ can only be triggered while the EC is in the display-off
2711  * state. In this state, events are not sent to the host in the usual way.
2712  * Instead the wakeup-GPIO gets pulled to "high" as long as there are pending
2713  * events and these events need to be released one-by-one via the GPIO
2714  * callback request, either until there are no events left and the GPIO is
2715  * reset, or all at once by transitioning the EC out of the display-off state,
2716  * which will also clear the GPIO.
2717  *
2718  * Not all events, however, should trigger a full system wakeup. Instead the
2719  * driver should, if necessary, inspect and forward each event to the
2720  * corresponding subsystem, which in turn should decide if the system needs to
2721  * be woken up. This logic has not been implemented yet, thus wakeup by this
2722  * IRQ should be disabled by default to avoid spurious wake-ups, caused, for
2723  * example, by the remaining battery percentage changing. Refer to comments in
2724  * this function and comments in the corresponding IRQ handler for more
2725  * details on how this should be implemented.
2726  *
2727  * See also ssam_ctrl_notif_display_off() and ssam_ctrl_notif_display_off()
2728  * for functions to transition the EC into and out of the display-off state as
2729  * well as more details on it.
2730  *
2731  * The IRQ is disabled by default and has to be enabled before it can wake up
2732  * the device from suspend via ssam_irq_arm_for_wakeup(). On teardown, the IRQ
2733  * should be freed via ssam_irq_free().
2734  */
2735 int ssam_irq_setup(struct ssam_controller *ctrl)
2736 {
2737 	struct device *dev = ssam_controller_device(ctrl);
2738 	struct gpio_desc *gpiod;
2739 	int irq;
2740 	int status;
2741 
2742 	/*
2743 	 * The actual GPIO interrupt is declared in ACPI as TRIGGER_HIGH.
2744 	 * However, the GPIO line only gets reset by sending the GPIO callback
2745 	 * command to SAM (or alternatively the display-on notification). As
2746 	 * proper handling for this interrupt is not implemented yet, leaving
2747 	 * the IRQ at TRIGGER_HIGH would cause an IRQ storm (as the callback
2748 	 * never gets sent and thus the line never gets reset). To avoid this,
2749 	 * mark the IRQ as TRIGGER_RISING for now, only creating a single
2750 	 * interrupt, and let the SAM resume callback during the controller
2751 	 * resume process clear it.
2752 	 */
2753 	const int irqf = IRQF_ONESHOT | IRQF_TRIGGER_RISING | IRQF_NO_AUTOEN;
2754 
2755 	gpiod = gpiod_get(dev, "ssam_wakeup-int", GPIOD_ASIS);
2756 	if (IS_ERR(gpiod)) {
2757 		irq = fwnode_irq_get(dev_fwnode(dev), 0);
2758 	} else {
2759 		irq = gpiod_to_irq(gpiod);
2760 		gpiod_put(gpiod);
2761 	}
2762 
2763 	if (irq < 0)
2764 		return irq;
2765 
2766 	status = request_threaded_irq(irq, NULL, ssam_irq_handle, irqf,
2767 				      "ssam_wakeup", ctrl);
2768 	if (status)
2769 		return status;
2770 
2771 	ctrl->irq.num = irq;
2772 	return 0;
2773 }
2774 
2775 /**
2776  * ssam_irq_free() - Free SAM EC wakeup-GPIO interrupt.
2777  * @ctrl: The controller for which the IRQ should be freed.
2778  *
2779  * Free the wakeup-GPIO IRQ previously set-up via ssam_irq_setup().
2780  */
2781 void ssam_irq_free(struct ssam_controller *ctrl)
2782 {
2783 	free_irq(ctrl->irq.num, ctrl);
2784 	ctrl->irq.num = -1;
2785 }
2786 
2787 /**
2788  * ssam_irq_arm_for_wakeup() - Arm the EC IRQ for wakeup, if enabled.
2789  * @ctrl: The controller for which the IRQ should be armed.
2790  *
2791  * Sets up the IRQ so that it can be used to wake the device. Specifically,
2792  * this function enables the irq and then, if the device is allowed to wake up
2793  * the system, calls enable_irq_wake(). See ssam_irq_disarm_wakeup() for the
2794  * corresponding function to disable the IRQ.
2795  *
2796  * This function is intended to arm the IRQ before entering S2idle suspend.
2797  *
2798  * Note: calls to ssam_irq_arm_for_wakeup() and ssam_irq_disarm_wakeup() must
2799  * be balanced.
2800  */
2801 int ssam_irq_arm_for_wakeup(struct ssam_controller *ctrl)
2802 {
2803 	struct device *dev = ssam_controller_device(ctrl);
2804 	int status;
2805 
2806 	enable_irq(ctrl->irq.num);
2807 	if (device_may_wakeup(dev)) {
2808 		status = enable_irq_wake(ctrl->irq.num);
2809 		if (status) {
2810 			ssam_err(ctrl, "failed to enable wake IRQ: %d\n", status);
2811 			disable_irq(ctrl->irq.num);
2812 			return status;
2813 		}
2814 
2815 		ctrl->irq.wakeup_enabled = true;
2816 	} else {
2817 		ctrl->irq.wakeup_enabled = false;
2818 	}
2819 
2820 	return 0;
2821 }
2822 
2823 /**
2824  * ssam_irq_disarm_wakeup() - Disarm the wakeup IRQ.
2825  * @ctrl: The controller for which the IRQ should be disarmed.
2826  *
2827  * Disarm the IRQ previously set up for wake via ssam_irq_arm_for_wakeup().
2828  *
2829  * This function is intended to disarm the IRQ after exiting S2idle suspend.
2830  *
2831  * Note: calls to ssam_irq_arm_for_wakeup() and ssam_irq_disarm_wakeup() must
2832  * be balanced.
2833  */
2834 void ssam_irq_disarm_wakeup(struct ssam_controller *ctrl)
2835 {
2836 	int status;
2837 
2838 	if (ctrl->irq.wakeup_enabled) {
2839 		status = disable_irq_wake(ctrl->irq.num);
2840 		if (status)
2841 			ssam_err(ctrl, "failed to disable wake IRQ: %d\n", status);
2842 
2843 		ctrl->irq.wakeup_enabled = false;
2844 	}
2845 	disable_irq(ctrl->irq.num);
2846 }
2847