lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 18 Sep 2017 11:12:17 -0500
From:   Dan Williams <dcbw@...hat.com>
To:     Mika Westerberg <mika.westerberg@...ux.intel.com>,
        Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        "David S . Miller" <davem@...emloft.net>
Cc:     Andreas Noever <andreas.noever@...il.com>,
        Michael Jamet <michael.jamet@...el.com>,
        Yehezkel Bernat <yehezkel.bernat@...el.com>,
        Amir Levy <amir.jer.levy@...el.com>,
        Mario.Limonciello@...l.com, Lukas Wunner <lukas@...ner.de>,
        Andy Shevchenko <andriy.shevchenko@...ux.intel.com>,
        linux-kernel@...r.kernel.org, netdev@...r.kernel.org
Subject: Re: [PATCH 06/16] thunderbolt: Add support for XDomain discovery
 protocol

On Mon, 2017-09-18 at 18:30 +0300, Mika Westerberg wrote:
> When two hosts are connected over a Thunderbolt cable, there is a
> protocol they can use to communicate capabilities supported by the
> host.
> The discovery protocol uses automatically configured control channel
> (ring 0) and is build on top of request/response transactions using
> special XDomain primitives provided by the Thunderbolt base protocol.
> 
> The capabilities consists of a root directory block of basic
> properties
> used for identification of the host, and then there can be zero or
> more
> directories each describing a Thunderbolt service and its
> capabilities.
> 
> Once both sides have discovered what is supported the two hosts can
> setup high-speed DMA paths and transfer data to the other side using
> whatever protocol was agreed based on the properties. The software
> protocol used to communicate which DMA paths to enable is service
> specific.
> 
> This patch adds support for the XDomain discovery protocol to the
> Thunderbolt bus. We model each remote host connection as a Linux
> XDomain
> device. For each Thunderbolt service found supported on the XDomain
> device, we create Linux Thunderbolt service device which Thunderbolt
> service drivers can then bind to based on the protocol identification
> information retrieved from the property directory describing the
> service.
> 
> This code is based on the work done by Amir Levy and Michael Jamet.
> 
> Signed-off-by: Michael Jamet <michael.jamet@...el.com>
> Signed-off-by: Mika Westerberg <mika.westerberg@...ux.intel.com>
> Reviewed-by: Yehezkel Bernat <yehezkel.bernat@...el.com>
> ---
>  Documentation/ABI/testing/sysfs-bus-thunderbolt |   48 +
>  drivers/thunderbolt/Makefile                    |    2 +-
>  drivers/thunderbolt/ctl.c                       |   11 +-
>  drivers/thunderbolt/ctl.h                       |    2 +-
>  drivers/thunderbolt/domain.c                    |  197 ++-
>  drivers/thunderbolt/icm.c                       |  218 +++-
>  drivers/thunderbolt/nhi.h                       |    2 +
>  drivers/thunderbolt/switch.c                    |    7 +-
>  drivers/thunderbolt/tb.h                        |   39 +-
>  drivers/thunderbolt/tb_msgs.h                   |  123 ++
>  drivers/thunderbolt/xdomain.c                   | 1576
> +++++++++++++++++++++++
>  include/linux/mod_devicetable.h                 |   26 +
>  include/linux/thunderbolt.h                     |  242 ++++
>  scripts/mod/devicetable-offsets.c               |    7 +
>  scripts/mod/file2alias.c                        |   25 +
>  15 files changed, 2507 insertions(+), 18 deletions(-)
>  create mode 100644 drivers/thunderbolt/xdomain.c
> 
> diff --git a/Documentation/ABI/testing/sysfs-bus-thunderbolt
> b/Documentation/ABI/testing/sysfs-bus-thunderbolt
> index 392bef5bd399..cb48850bd79b 100644
> --- a/Documentation/ABI/testing/sysfs-bus-thunderbolt
> +++ b/Documentation/ABI/testing/sysfs-bus-thunderbolt
> @@ -110,3 +110,51 @@ Description:	When new NVM image is
> written to the non-active NVM
>  		is directly the status value from the DMA
> configuration
>  		based mailbox before the device is power cycled.
> Writing
>  		0 here clears the status.
> +
> +What:		/sys/bus/thunderbolt/devices/<xdomain>.<service
> >/key
> +Date:		Dec 2017
> +KernelVersion:	4.14
> +Contact:	thunderbolt-software@...ts.01.org
> +Description:	This contains name of the property directory the
> XDomain
> +		service exposes. This entry describes the protocol
> in
> +		question. Following directories are already reserved
> by
> +		the Apple XDomain specification:
> +
> +		network:  IP/ethernet over Thunderbolt
> +		targetdm: Target disk mode protocol over Thunderbolt
> +		extdisp:  External display mode protocol over
> Thunderbolt
> +
> +What:		/sys/bus/thunderbolt/devices/<xdomain>.<service
> >/modalias
> +Date:		Dec 2017
> +KernelVersion:	4.14
> +Contact:	thunderbolt-software@...ts.01.org
> +Description:	Stores the same MODALIAS value emitted by uevent
> for
> +		the XDomain service. Format: tbtsvc:kSpNvNrN
> +
> +What:		/sys/bus/thunderbolt/devices/<xdomain>.<service
> >/prtcid
> +Date:		Dec 2017
> +KernelVersion:	4.14
> +Contact:	thunderbolt-software@...ts.01.org
> +Description:	This contains XDomain protocol identifier the
> XDomain
> +		service supports.
> +
> +What:		/sys/bus/thunderbolt/devices/<xdomain>.<service
> >/prtcvers
> +Date:		Dec 2017
> +KernelVersion:	4.14
> +Contact:	thunderbolt-software@...ts.01.org
> +Description:	This contains XDomain protocol version the
> XDomain
> +		service supports.
> +
> +What:		/sys/bus/thunderbolt/devices/<xdomain>.<service
> >/prtcrevs
> +Date:		Dec 2017
> +KernelVersion:	4.14
> +Contact:	thunderbolt-software@...ts.01.org
> +Description:	This contains XDomain software version the
> XDomain
> +		service supports.
> +
> +What:		/sys/bus/thunderbolt/devices/<xdomain>.<service
> >/prtcstns
> +Date:		Dec 2017
> +KernelVersion:	4.14
> +Contact:	thunderbolt-software@...ts.01.org
> +Description:	This contains XDomain service specific settings
> as
> +		bitmask. Format: %x
> diff --git a/drivers/thunderbolt/Makefile
> b/drivers/thunderbolt/Makefile
> index 7afd21f5383a..f2f0de27252b 100644
> --- a/drivers/thunderbolt/Makefile
> +++ b/drivers/thunderbolt/Makefile
> @@ -1,3 +1,3 @@
>  obj-${CONFIG_THUNDERBOLT} := thunderbolt.o
>  thunderbolt-objs := nhi.o ctl.o tb.o switch.o cap.o path.o
> tunnel_pci.o eeprom.o
> -thunderbolt-objs += domain.o dma_port.o icm.o property.o
> +thunderbolt-objs += domain.o dma_port.o icm.o property.o xdomain.o
> diff --git a/drivers/thunderbolt/ctl.c b/drivers/thunderbolt/ctl.c
> index e6a4c9458c76..46e393c5fd1d 100644
> --- a/drivers/thunderbolt/ctl.c
> +++ b/drivers/thunderbolt/ctl.c
> @@ -368,10 +368,10 @@ static int tb_ctl_tx(struct tb_ctl *ctl, const
> void *data, size_t len,
>  /**
>   * tb_ctl_handle_event() - acknowledge a plug event, invoke ctl-
> >callback
>   */
> -static void tb_ctl_handle_event(struct tb_ctl *ctl, enum
> tb_cfg_pkg_type type,
> +static bool tb_ctl_handle_event(struct tb_ctl *ctl, enum
> tb_cfg_pkg_type type,
>  				struct ctl_pkg *pkg, size_t size)
>  {
> -	ctl->callback(ctl->callback_data, type, pkg->buffer, size);
> +	return ctl->callback(ctl->callback_data, type, pkg->buffer,
> size);
>  }
>  
>  static void tb_ctl_rx_submit(struct ctl_pkg *pkg)
> @@ -444,6 +444,8 @@ static void tb_ctl_rx_callback(struct tb_ring
> *ring, struct ring_frame *frame,
>  		break;
>  
>  	case TB_CFG_PKG_EVENT:
> +	case TB_CFG_PKG_XDOMAIN_RESP:
> +	case TB_CFG_PKG_XDOMAIN_REQ:
>  		if (*(__be32 *)(pkg->buffer + frame->size) != crc32)
> {
>  			tb_ctl_err(pkg->ctl,
>  				   "RX: checksum mismatch, dropping
> packet\n");
> @@ -451,8 +453,9 @@ static void tb_ctl_rx_callback(struct tb_ring
> *ring, struct ring_frame *frame,
>  		}
>  		/* Fall through */
>  	case TB_CFG_PKG_ICM_EVENT:
> -		tb_ctl_handle_event(pkg->ctl, frame->eof, pkg,
> frame->size);
> -		goto rx;
> +		if (tb_ctl_handle_event(pkg->ctl, frame->eof, pkg,
> frame->size))
> +			goto rx;
> +		break;
>  
>  	default:
>  		break;
> diff --git a/drivers/thunderbolt/ctl.h b/drivers/thunderbolt/ctl.h
> index d0f21e1e0b8b..85c49dd301ea 100644
> --- a/drivers/thunderbolt/ctl.h
> +++ b/drivers/thunderbolt/ctl.h
> @@ -16,7 +16,7 @@
>  /* control channel */
>  struct tb_ctl;
>  
> -typedef void (*event_cb)(void *data, enum tb_cfg_pkg_type type,
> +typedef bool (*event_cb)(void *data, enum tb_cfg_pkg_type type,
>  			 const void *buf, size_t size);
>  
>  struct tb_ctl *tb_ctl_alloc(struct tb_nhi *nhi, event_cb cb, void
> *cb_data);
> diff --git a/drivers/thunderbolt/domain.c
> b/drivers/thunderbolt/domain.c
> index 9f2dcd48974d..29d6436ec8ce 100644
> --- a/drivers/thunderbolt/domain.c
> +++ b/drivers/thunderbolt/domain.c
> @@ -20,6 +20,98 @@
>  
>  static DEFINE_IDA(tb_domain_ida);
>  
> +static bool match_service_id(const struct tb_service_id *id,
> +			     const struct tb_service *svc)
> +{
> +	if (id->match_flags & TBSVC_MATCH_PROTOCOL_KEY) {
> +		if (strcmp(id->protocol_key, svc->key))
> +			return false;
> +	}
> +
> +	if (id->match_flags & TBSVC_MATCH_PROTOCOL_ID) {
> +		if (id->protocol_id != svc->prtcid)
> +			return false;
> +	}
> +
> +	if (id->match_flags & TBSVC_MATCH_PROTOCOL_VERSION) {
> +		if (id->protocol_version != svc->prtcvers)
> +			return false;
> +	}
> +
> +	if (id->match_flags & TBSVC_MATCH_PROTOCOL_VERSION) {
> +		if (id->protocol_revision != svc->prtcrevs)
> +			return false;
> +	}
> +
> +	return true;
> +}
> +
> +static const struct tb_service_id *__tb_service_match(struct device
> *dev,
> +						      struct
> device_driver *drv)
> +{
> +	struct tb_service_driver *driver;
> +	const struct tb_service_id *ids;
> +	struct tb_service *svc;
> +
> +	svc = tb_to_service(dev);
> +	if (!svc)
> +		return NULL;
> +
> +	driver = container_of(drv, struct tb_service_driver,
> driver);
> +	if (!driver->id_table)
> +		return NULL;
> +
> +	for (ids = driver->id_table; ids->match_flags != 0; ids++) {
> +		if (match_service_id(ids, svc))
> +			return ids;
> +	}
> +
> +	return NULL;
> +}
> +
> +static int tb_service_match(struct device *dev, struct device_driver
> *drv)
> +{
> +	return !!__tb_service_match(dev, drv);
> +}
> +
> +static int tb_service_probe(struct device *dev)
> +{
> +	struct tb_service *svc = tb_to_service(dev);
> +	struct tb_service_driver *driver;
> +	const struct tb_service_id *id;
> +
> +	driver = container_of(dev->driver, struct tb_service_driver,
> driver);
> +	id = __tb_service_match(dev, &driver->driver);
> +
> +	return driver->probe(svc, id);

Could you pass 'dev' to the probe function so that things like the
network sub-driver can sensibly link the netdev to the parent hardware
in sysfs with SET_NETDEV_DEV()?

Dan

> +}
> +
> +static int tb_service_remove(struct device *dev)
> +{
> +	struct tb_service *svc = tb_to_service(dev);
> +	struct tb_service_driver *driver;
> +
> +	driver = container_of(dev->driver, struct tb_service_driver,
> driver);
> +	if (driver->remove)
> +		driver->remove(svc);
> +
> +	return 0;
> +}
> +
> +static void tb_service_shutdown(struct device *dev)
> +{
> +	struct tb_service_driver *driver;
> +	struct tb_service *svc;
> +
> +	svc = tb_to_service(dev);
> +	if (!svc || !dev->driver)
> +		return;
> +
> +	driver = container_of(dev->driver, struct tb_service_driver,
> driver);
> +	if (driver->shutdown)
> +		driver->shutdown(svc);
> +}
> +
>  static const char * const tb_security_names[] = {
>  	[TB_SECURITY_NONE] = "none",
>  	[TB_SECURITY_USER] = "user",
> @@ -52,6 +144,10 @@ static const struct attribute_group
> *domain_attr_groups[] = {
>  
>  struct bus_type tb_bus_type = {
>  	.name = "thunderbolt",
> +	.match = tb_service_match,
> +	.probe = tb_service_probe,
> +	.remove = tb_service_remove,
> +	.shutdown = tb_service_shutdown,
>  };
>  
>  static void tb_domain_release(struct device *dev)
> @@ -128,17 +224,26 @@ struct tb *tb_domain_alloc(struct tb_nhi *nhi,
> size_t privsize)
>  	return NULL;
>  }
>  
> -static void tb_domain_event_cb(void *data, enum tb_cfg_pkg_type
> type,
> +static bool tb_domain_event_cb(void *data, enum tb_cfg_pkg_type
> type,
>  			       const void *buf, size_t size)
>  {
>  	struct tb *tb = data;
>  
>  	if (!tb->cm_ops->handle_event) {
>  		tb_warn(tb, "domain does not have event handler\n");
> -		return;
> +		return true;
>  	}
>  
> -	tb->cm_ops->handle_event(tb, type, buf, size);
> +	switch (type) {
> +	case TB_CFG_PKG_XDOMAIN_REQ:
> +	case TB_CFG_PKG_XDOMAIN_RESP:
> +		return tb_xdomain_handle_request(tb, type, buf,
> size);
> +
> +	default:
> +		tb->cm_ops->handle_event(tb, type, buf, size);
> +	}
> +
> +	return true;
>  }
>  
>  /**
> @@ -443,9 +548,92 @@ int tb_domain_disconnect_pcie_paths(struct tb
> *tb)
>  	return tb->cm_ops->disconnect_pcie_paths(tb);
>  }
>  
> +/**
> + * tb_domain_approve_xdomain_paths() - Enable DMA paths for XDomain
> + * @tb: Domain enabling the DMA paths
> + * @xd: XDomain DMA paths are created to
> + *
> + * Calls connection manager specific method to enable DMA paths to
> the
> + * XDomain in question.
> + *
> + * Return: 0% in case of success and negative errno otherwise. In
> + * particular returns %-ENOTSUPP if the connection manager
> + * implementation does not support XDomains.
> + */
> +int tb_domain_approve_xdomain_paths(struct tb *tb, struct tb_xdomain
> *xd)
> +{
> +	if (!tb->cm_ops->approve_xdomain_paths)
> +		return -ENOTSUPP;
> +
> +	return tb->cm_ops->approve_xdomain_paths(tb, xd);
> +}
> +
> +/**
> + * tb_domain_disconnect_xdomain_paths() - Disable DMA paths for
> XDomain
> + * @tb: Domain disabling the DMA paths
> + * @xd: XDomain whose DMA paths are disconnected
> + *
> + * Calls connection manager specific method to disconnect DMA paths
> to
> + * the XDomain in question.
> + *
> + * Return: 0% in case of success and negative errno otherwise. In
> + * particular returns %-ENOTSUPP if the connection manager
> + * implementation does not support XDomains.
> + */
> +int tb_domain_disconnect_xdomain_paths(struct tb *tb, struct
> tb_xdomain *xd)
> +{
> +	if (!tb->cm_ops->disconnect_xdomain_paths)
> +		return -ENOTSUPP;
> +
> +	return tb->cm_ops->disconnect_xdomain_paths(tb, xd);
> +}
> +
> +static int disconnect_xdomain(struct device *dev, void *data)
> +{
> +	struct tb_xdomain *xd;
> +	struct tb *tb = data;
> +	int ret = 0;
> +
> +	xd = tb_to_xdomain(dev);
> +	if (xd && xd->tb == tb)
> +		ret = tb_xdomain_disable_paths(xd);
> +
> +	return ret;
> +}
> +
> +/**
> + * tb_domain_disconnect_all_paths() - Disconnect all paths for the
> domain
> + * @tb: Domain whose paths are disconnected
> + *
> + * This function can be used to disconnect all paths (PCIe, XDomain)
> for
> + * example in preparation for host NVM firmware upgrade. After this
> is
> + * called the paths cannot be established without reseting the
> switch.
> + *
> + * Return: %0 in case of success and negative errno otherwise.
> + */
> +int tb_domain_disconnect_all_paths(struct tb *tb)
> +{
> +	int ret;
> +
> +	ret = tb_domain_disconnect_pcie_paths(tb);
> +	if (ret)
> +		return ret;
> +
> +	return bus_for_each_dev(&tb_bus_type, NULL, tb,
> disconnect_xdomain);
> +}
> +
>  int tb_domain_init(void)
>  {
> -	return bus_register(&tb_bus_type);
> +	int ret;
> +
> +	ret = tb_xdomain_init();
> +	if (ret)
> +		return ret;
> +	ret = bus_register(&tb_bus_type);
> +	if (ret)
> +		tb_xdomain_exit();
> +
> +	return ret;
>  }
>  
>  void tb_domain_exit(void)
> @@ -453,4 +641,5 @@ void tb_domain_exit(void)
>  	bus_unregister(&tb_bus_type);
>  	ida_destroy(&tb_domain_ida);
>  	tb_switch_exit();
> +	tb_xdomain_exit();
>  }
> diff --git a/drivers/thunderbolt/icm.c b/drivers/thunderbolt/icm.c
> index 8c22b91ed040..ab02d13f40b7 100644
> --- a/drivers/thunderbolt/icm.c
> +++ b/drivers/thunderbolt/icm.c
> @@ -60,6 +60,8 @@
>   * @get_route: Find a route string for given switch
>   * @device_connected: Handle device connected ICM message
>   * @device_disconnected: Handle device disconnected ICM message
> + * @xdomain_connected - Handle XDomain connected ICM message
> + * @xdomain_disconnected - Handle XDomain disconnected ICM message
>   */
>  struct icm {
>  	struct mutex request_lock;
> @@ -74,6 +76,10 @@ struct icm {
>  				 const struct icm_pkg_header *hdr);
>  	void (*device_disconnected)(struct tb *tb,
>  				    const struct icm_pkg_header
> *hdr);
> +	void (*xdomain_connected)(struct tb *tb,
> +				  const struct icm_pkg_header *hdr);
> +	void (*xdomain_disconnected)(struct tb *tb,
> +				     const struct icm_pkg_header
> *hdr);
>  };
>  
>  struct icm_notification {
> @@ -89,7 +95,10 @@ static inline struct tb *icm_to_tb(struct icm
> *icm)
>  
>  static inline u8 phy_port_from_route(u64 route, u8 depth)
>  {
> -	return tb_phy_port_from_link(route >> ((depth - 1) * 8));
> +	u8 link;
> +
> +	link = depth ? route >> ((depth - 1) * 8) : route;
> +	return tb_phy_port_from_link(link);
>  }
>  
>  static inline u8 dual_link_from_link(u8 link)
> @@ -320,6 +329,51 @@ static int icm_fr_challenge_switch_key(struct tb
> *tb, struct tb_switch *sw,
>  	return 0;
>  }
>  
> +static int icm_fr_approve_xdomain_paths(struct tb *tb, struct
> tb_xdomain *xd)
> +{
> +	struct icm_fr_pkg_approve_xdomain_response reply;
> +	struct icm_fr_pkg_approve_xdomain request;
> +	int ret;
> +
> +	memset(&request, 0, sizeof(request));
> +	request.hdr.code = ICM_APPROVE_XDOMAIN;
> +	request.link_info = xd->depth << ICM_LINK_INFO_DEPTH_SHIFT |
> xd->link;
> +	memcpy(&request.remote_uuid, xd->remote_uuid, sizeof(*xd-
> >remote_uuid));
> +
> +	request.transmit_path = xd->transmit_path;
> +	request.transmit_ring = xd->transmit_ring;
> +	request.receive_path = xd->receive_path;
> +	request.receive_ring = xd->receive_ring;
> +
> +	memset(&reply, 0, sizeof(reply));
> +	ret = icm_request(tb, &request, sizeof(request), &reply,
> sizeof(reply),
> +			  1, ICM_TIMEOUT);
> +	if (ret)
> +		return ret;
> +
> +	if (reply.hdr.flags & ICM_FLAGS_ERROR)
> +		return -EIO;
> +
> +	return 0;
> +}
> +
> +static int icm_fr_disconnect_xdomain_paths(struct tb *tb, struct
> tb_xdomain *xd)
> +{
> +	u8 phy_port;
> +	u8 cmd;
> +
> +	phy_port = tb_phy_port_from_link(xd->link);
> +	if (phy_port == 0)
> +		cmd = NHI_MAILBOX_DISCONNECT_PA;
> +	else
> +		cmd = NHI_MAILBOX_DISCONNECT_PB;
> +
> +	nhi_mailbox_cmd(tb->nhi, cmd, 1);
> +	usleep_range(10, 50);
> +	nhi_mailbox_cmd(tb->nhi, cmd, 2);
> +	return 0;
> +}
> +
>  static void remove_switch(struct tb_switch *sw)
>  {
>  	struct tb_switch *parent_sw;
> @@ -475,6 +529,141 @@ icm_fr_device_disconnected(struct tb *tb, const
> struct icm_pkg_header *hdr)
>  	tb_switch_put(sw);
>  }
>  
> +static void remove_xdomain(struct tb_xdomain *xd)
> +{
> +	struct tb_switch *sw;
> +
> +	sw = tb_to_switch(xd->dev.parent);
> +	tb_port_at(xd->route, sw)->xdomain = NULL;
> +	tb_xdomain_remove(xd);
> +}
> +
> +static void
> +icm_fr_xdomain_connected(struct tb *tb, const struct icm_pkg_header
> *hdr)
> +{
> +	const struct icm_fr_event_xdomain_connected *pkg =
> +		(const struct icm_fr_event_xdomain_connected *)hdr;
> +	struct tb_xdomain *xd;
> +	struct tb_switch *sw;
> +	u8 link, depth;
> +	bool approved;
> +	u64 route;
> +
> +	/*
> +	 * After NVM upgrade adding root switch device fails because
> we
> +	 * initiated reset. During that time ICM might still send
> +	 * XDomain connected message which we ignore here.
> +	 */
> +	if (!tb->root_switch)
> +		return;
> +
> +	link = pkg->link_info & ICM_LINK_INFO_LINK_MASK;
> +	depth = (pkg->link_info & ICM_LINK_INFO_DEPTH_MASK) >>
> +		ICM_LINK_INFO_DEPTH_SHIFT;
> +	approved = pkg->link_info & ICM_LINK_INFO_APPROVED;
> +
> +	if (link > ICM_MAX_LINK || depth > ICM_MAX_DEPTH) {
> +		tb_warn(tb, "invalid topology %u.%u, ignoring\n",
> link, depth);
> +		return;
> +	}
> +
> +	route = get_route(pkg->local_route_hi, pkg->local_route_lo);
> +
> +	xd = tb_xdomain_find_by_uuid(tb, &pkg->remote_uuid);
> +	if (xd) {
> +		u8 xd_phy_port, phy_port;
> +
> +		xd_phy_port = phy_port_from_route(xd->route, xd-
> >depth);
> +		phy_port = phy_port_from_route(route, depth);
> +
> +		if (xd->depth == depth && xd_phy_port == phy_port) {
> +			xd->link = link;
> +			xd->route = route;
> +			xd->is_unplugged = false;
> +			tb_xdomain_put(xd);
> +			return;
> +		}
> +
> +		/*
> +		 * If we find an existing XDomain connection remove
> it
> +		 * now. We need to go through login handshake and
> +		 * everything anyway to be able to re-establish the
> +		 * connection.
> +		 */
> +		remove_xdomain(xd);
> +		tb_xdomain_put(xd);
> +	}
> +
> +	/*
> +	 * Look if there already exists an XDomain in the same place
> +	 * than the new one and in that case remove it because it is
> +	 * most likely another host that got disconnected.
> +	 */
> +	xd = tb_xdomain_find_by_link_depth(tb, link, depth);
> +	if (!xd) {
> +		u8 dual_link;
> +
> +		dual_link = dual_link_from_link(link);
> +		if (dual_link)
> +			xd = tb_xdomain_find_by_link_depth(tb,
> dual_link,
> +							   depth);
> +	}
> +	if (xd) {
> +		remove_xdomain(xd);
> +		tb_xdomain_put(xd);
> +	}
> +
> +	/*
> +	 * If the user disconnected a switch during suspend and
> +	 * connected another host to the same port, remove the
> switch
> +	 * first.
> +	 */
> +	sw = get_switch_at_route(tb->root_switch, route);
> +	if (sw)
> +		remove_switch(sw);
> +
> +	sw = tb_switch_find_by_link_depth(tb, link, depth);
> +	if (!sw) {
> +		tb_warn(tb, "no switch exists at %u.%u, ignoring\n",
> link,
> +			depth);
> +		return;
> +	}
> +
> +	xd = tb_xdomain_alloc(sw->tb, &sw->dev, route,
> +			      &pkg->local_uuid, &pkg->remote_uuid);
> +	if (!xd) {
> +		tb_switch_put(sw);
> +		return;
> +	}
> +
> +	xd->link = link;
> +	xd->depth = depth;
> +
> +	tb_port_at(route, sw)->xdomain = xd;
> +
> +	tb_xdomain_add(xd);
> +	tb_switch_put(sw);
> +}
> +
> +static void
> +icm_fr_xdomain_disconnected(struct tb *tb, const struct
> icm_pkg_header *hdr)
> +{
> +	const struct icm_fr_event_xdomain_disconnected *pkg =
> +		(const struct icm_fr_event_xdomain_disconnected
> *)hdr;
> +	struct tb_xdomain *xd;
> +
> +	/*
> +	 * If the connection is through one or multiple devices, the
> +	 * XDomain device is removed along with them so it is fine
> if we
> +	 * cannot find it here.
> +	 */
> +	xd = tb_xdomain_find_by_uuid(tb, &pkg->remote_uuid);
> +	if (xd) {
> +		remove_xdomain(xd);
> +		tb_xdomain_put(xd);
> +	}
> +}
> +
>  static struct pci_dev *get_upstream_port(struct pci_dev *pdev)
>  {
>  	struct pci_dev *parent;
> @@ -594,6 +783,12 @@ static void icm_handle_notification(struct
> work_struct *work)
>  	case ICM_EVENT_DEVICE_DISCONNECTED:
>  		icm->device_disconnected(tb, n->pkg);
>  		break;
> +	case ICM_EVENT_XDOMAIN_CONNECTED:
> +		icm->xdomain_connected(tb, n->pkg);
> +		break;
> +	case ICM_EVENT_XDOMAIN_DISCONNECTED:
> +		icm->xdomain_disconnected(tb, n->pkg);
> +		break;
>  	}
>  
>  	mutex_unlock(&tb->lock);
> @@ -927,6 +1122,10 @@ static void icm_unplug_children(struct
> tb_switch *sw)
>  
>  		if (tb_is_upstream_port(port))
>  			continue;
> +		if (port->xdomain) {
> +			port->xdomain->is_unplugged = true;
> +			continue;
> +		}
>  		if (!port->remote)
>  			continue;
>  
> @@ -943,6 +1142,13 @@ static void icm_free_unplugged_children(struct
> tb_switch *sw)
>  
>  		if (tb_is_upstream_port(port))
>  			continue;
> +
> +		if (port->xdomain && port->xdomain->is_unplugged) {
> +			tb_xdomain_remove(port->xdomain);
> +			port->xdomain = NULL;
> +			continue;
> +		}
> +
>  		if (!port->remote)
>  			continue;
>  
> @@ -1009,8 +1215,10 @@ static int icm_start(struct tb *tb)
>  	tb->root_switch->no_nvm_upgrade = x86_apple_machine;
>  
>  	ret = tb_switch_add(tb->root_switch);
> -	if (ret)
> +	if (ret) {
>  		tb_switch_put(tb->root_switch);
> +		tb->root_switch = NULL;
> +	}
>  
>  	return ret;
>  }
> @@ -1042,6 +1250,8 @@ static const struct tb_cm_ops icm_fr_ops = {
>  	.add_switch_key = icm_fr_add_switch_key,
>  	.challenge_switch_key = icm_fr_challenge_switch_key,
>  	.disconnect_pcie_paths = icm_disconnect_pcie_paths,
> +	.approve_xdomain_paths = icm_fr_approve_xdomain_paths,
> +	.disconnect_xdomain_paths = icm_fr_disconnect_xdomain_paths,
>  };
>  
>  struct tb *icm_probe(struct tb_nhi *nhi)
> @@ -1064,6 +1274,8 @@ struct tb *icm_probe(struct tb_nhi *nhi)
>  		icm->get_route = icm_fr_get_route;
>  		icm->device_connected = icm_fr_device_connected;
>  		icm->device_disconnected =
> icm_fr_device_disconnected;
> +		icm->xdomain_connected = icm_fr_xdomain_connected;
> +		icm->xdomain_disconnected =
> icm_fr_xdomain_disconnected;
>  		tb->cm_ops = &icm_fr_ops;
>  		break;
>  
> @@ -1077,6 +1289,8 @@ struct tb *icm_probe(struct tb_nhi *nhi)
>  		icm->get_route = icm_ar_get_route;
>  		icm->device_connected = icm_fr_device_connected;
>  		icm->device_disconnected =
> icm_fr_device_disconnected;
> +		icm->xdomain_connected = icm_fr_xdomain_connected;
> +		icm->xdomain_disconnected =
> icm_fr_xdomain_disconnected;
>  		tb->cm_ops = &icm_fr_ops;
>  		break;
>  	}
> diff --git a/drivers/thunderbolt/nhi.h b/drivers/thunderbolt/nhi.h
> index 5b5bb2c436be..0e05828983db 100644
> --- a/drivers/thunderbolt/nhi.h
> +++ b/drivers/thunderbolt/nhi.h
> @@ -157,6 +157,8 @@ enum nhi_mailbox_cmd {
>  	NHI_MAILBOX_SAVE_DEVS = 0x05,
>  	NHI_MAILBOX_DISCONNECT_PCIE_PATHS = 0x06,
>  	NHI_MAILBOX_DRV_UNLOADS = 0x07,
> +	NHI_MAILBOX_DISCONNECT_PA = 0x10,
> +	NHI_MAILBOX_DISCONNECT_PB = 0x11,
>  	NHI_MAILBOX_ALLOW_ALL_DEVS = 0x23,
>  };
>  
> diff --git a/drivers/thunderbolt/switch.c
> b/drivers/thunderbolt/switch.c
> index 53f40c57df59..dfc357d33e1e 100644
> --- a/drivers/thunderbolt/switch.c
> +++ b/drivers/thunderbolt/switch.c
> @@ -171,11 +171,11 @@ static int nvm_authenticate_host(struct
> tb_switch *sw)
>  
>  	/*
>  	 * Root switch NVM upgrade requires that we disconnect the
> -	 * existing PCIe paths first (in case it is not in safe mode
> +	 * existing paths first (in case it is not in safe mode
>  	 * already).
>  	 */
>  	if (!sw->safe_mode) {
> -		ret = tb_domain_disconnect_pcie_paths(sw->tb);
> +		ret = tb_domain_disconnect_all_paths(sw->tb);
>  		if (ret)
>  			return ret;
>  		/*
> @@ -1363,6 +1363,9 @@ void tb_switch_remove(struct tb_switch *sw)
>  		if (sw->ports[i].remote)
>  			tb_switch_remove(sw->ports[i].remote->sw);
>  		sw->ports[i].remote = NULL;
> +		if (sw->ports[i].xdomain)
> +			tb_xdomain_remove(sw->ports[i].xdomain);
> +		sw->ports[i].xdomain = NULL;
>  	}
>  
>  	if (!sw->is_unplugged)
> diff --git a/drivers/thunderbolt/tb.h b/drivers/thunderbolt/tb.h
> index ea21d927bd09..74af9d4929ab 100644
> --- a/drivers/thunderbolt/tb.h
> +++ b/drivers/thunderbolt/tb.h
> @@ -9,6 +9,7 @@
>  
>  #include <linux/nvmem-provider.h>
>  #include <linux/pci.h>
> +#include <linux/thunderbolt.h>
>  #include <linux/uuid.h>
>  
>  #include "tb_regs.h"
> @@ -109,14 +110,25 @@ struct tb_switch {
>  
>  /**
>   * struct tb_port - a thunderbolt port, part of a tb_switch
> + * @config: Cached port configuration read from registers
> + * @sw: Switch the port belongs to
> + * @remote: Remote port (%NULL if not connected)
> + * @xdomain: Remote host (%NULL if not connected)
> + * @cap_phy: Offset, zero if not found
> + * @port: Port number on switch
> + * @disabled: Disabled by eeprom
> + * @dual_link_port: If the switch is connected using two ports,
> points
> + *		    to the other port.
> + * @link_nr: Is this primary or secondary port on the dual_link.
>   */
>  struct tb_port {
>  	struct tb_regs_port_header config;
>  	struct tb_switch *sw;
> -	struct tb_port *remote; /* remote port, NULL if not
> connected */
> -	int cap_phy; /* offset, zero if not found */
> -	u8 port; /* port number on switch */
> -	bool disabled; /* disabled by eeprom */
> +	struct tb_port *remote;
> +	struct tb_xdomain *xdomain;
> +	int cap_phy;
> +	u8 port;
> +	bool disabled;
>  	struct tb_port *dual_link_port;
>  	u8 link_nr:1;
>  };
> @@ -189,6 +201,8 @@ struct tb_path {
>   * @add_switch_key: Add key to switch
>   * @challenge_switch_key: Challenge switch using key
>   * @disconnect_pcie_paths: Disconnects PCIe paths before NVM update
> + * @approve_xdomain_paths: Approve (establish) XDomain DMA paths
> + * @disconnect_xdomain_paths: Disconnect XDomain DMA paths
>   */
>  struct tb_cm_ops {
>  	int (*driver_ready)(struct tb *tb);
> @@ -205,6 +219,8 @@ struct tb_cm_ops {
>  	int (*challenge_switch_key)(struct tb *tb, struct tb_switch
> *sw,
>  				    const u8 *challenge, u8
> *response);
>  	int (*disconnect_pcie_paths)(struct tb *tb);
> +	int (*approve_xdomain_paths)(struct tb *tb, struct
> tb_xdomain *xd);
> +	int (*disconnect_xdomain_paths)(struct tb *tb, struct
> tb_xdomain *xd);
>  };
>  
>  static inline void *tb_priv(struct tb *tb)
> @@ -331,6 +347,8 @@ extern struct device_type tb_switch_type;
>  int tb_domain_init(void);
>  void tb_domain_exit(void);
>  void tb_switch_exit(void);
> +int tb_xdomain_init(void);
> +void tb_xdomain_exit(void);
>  
>  struct tb *tb_domain_alloc(struct tb_nhi *nhi, size_t privsize);
>  int tb_domain_add(struct tb *tb);
> @@ -343,6 +361,9 @@ int tb_domain_approve_switch(struct tb *tb,
> struct tb_switch *sw);
>  int tb_domain_approve_switch_key(struct tb *tb, struct tb_switch
> *sw);
>  int tb_domain_challenge_switch_key(struct tb *tb, struct tb_switch
> *sw);
>  int tb_domain_disconnect_pcie_paths(struct tb *tb);
> +int tb_domain_approve_xdomain_paths(struct tb *tb, struct tb_xdomain
> *xd);
> +int tb_domain_disconnect_xdomain_paths(struct tb *tb, struct
> tb_xdomain *xd);
> +int tb_domain_disconnect_all_paths(struct tb *tb);
>  
>  static inline void tb_domain_put(struct tb *tb)
>  {
> @@ -422,4 +443,14 @@ static inline u64 tb_downstream_route(struct
> tb_port *port)
>  	       | ((u64) port->port << (port->sw->config.depth * 8));
>  }
>  
> +bool tb_xdomain_handle_request(struct tb *tb, enum tb_cfg_pkg_type
> type,
> +			       const void *buf, size_t size);
> +struct tb_xdomain *tb_xdomain_alloc(struct tb *tb, struct device
> *parent,
> +				    u64 route, const uuid_t
> *local_uuid,
> +				    const uuid_t *remote_uuid);
> +void tb_xdomain_add(struct tb_xdomain *xd);
> +void tb_xdomain_remove(struct tb_xdomain *xd);
> +struct tb_xdomain *tb_xdomain_find_by_link_depth(struct tb *tb, u8
> link,
> +						 u8 depth);
> +
>  #endif
> diff --git a/drivers/thunderbolt/tb_msgs.h
> b/drivers/thunderbolt/tb_msgs.h
> index fe3039b05da6..2a76908537a6 100644
> --- a/drivers/thunderbolt/tb_msgs.h
> +++ b/drivers/thunderbolt/tb_msgs.h
> @@ -101,11 +101,14 @@ enum icm_pkg_code {
>  	ICM_CHALLENGE_DEVICE = 0x5,
>  	ICM_ADD_DEVICE_KEY = 0x6,
>  	ICM_GET_ROUTE = 0xa,
> +	ICM_APPROVE_XDOMAIN = 0x10,
>  };
>  
>  enum icm_event_code {
>  	ICM_EVENT_DEVICE_CONNECTED = 3,
>  	ICM_EVENT_DEVICE_DISCONNECTED = 4,
> +	ICM_EVENT_XDOMAIN_CONNECTED = 6,
> +	ICM_EVENT_XDOMAIN_DISCONNECTED = 7,
>  };
>  
>  struct icm_pkg_header {
> @@ -188,6 +191,25 @@ struct icm_fr_event_device_disconnected {
>  	u16 link_info;
>  } __packed;
>  
> +struct icm_fr_event_xdomain_connected {
> +	struct icm_pkg_header hdr;
> +	u16 reserved;
> +	u16 link_info;
> +	uuid_t remote_uuid;
> +	uuid_t local_uuid;
> +	u32 local_route_hi;
> +	u32 local_route_lo;
> +	u32 remote_route_hi;
> +	u32 remote_route_lo;
> +} __packed;
> +
> +struct icm_fr_event_xdomain_disconnected {
> +	struct icm_pkg_header hdr;
> +	u16 reserved;
> +	u16 link_info;
> +	uuid_t remote_uuid;
> +} __packed;
> +
>  struct icm_fr_pkg_add_device_key {
>  	struct icm_pkg_header hdr;
>  	uuid_t ep_uuid;
> @@ -224,6 +246,28 @@ struct icm_fr_pkg_challenge_device_response {
>  	u32 response[8];
>  } __packed;
>  
> +struct icm_fr_pkg_approve_xdomain {
> +	struct icm_pkg_header hdr;
> +	u16 reserved;
> +	u16 link_info;
> +	uuid_t remote_uuid;
> +	u16 transmit_path;
> +	u16 transmit_ring;
> +	u16 receive_path;
> +	u16 receive_ring;
> +} __packed;
> +
> +struct icm_fr_pkg_approve_xdomain_response {
> +	struct icm_pkg_header hdr;
> +	u16 reserved;
> +	u16 link_info;
> +	uuid_t remote_uuid;
> +	u16 transmit_path;
> +	u16 transmit_ring;
> +	u16 receive_path;
> +	u16 receive_ring;
> +} __packed;
> +
>  /* Alpine Ridge only messages */
>  
>  struct icm_ar_pkg_get_route {
> @@ -240,4 +284,83 @@ struct icm_ar_pkg_get_route_response {
>  	u32 route_lo;
>  } __packed;
>  
> +/* XDomain messages */
> +
> +struct tb_xdomain_header {
> +	u32 route_hi;
> +	u32 route_lo;
> +	u32 length_sn;
> +} __packed;
> +
> +#define TB_XDOMAIN_LENGTH_MASK	GENMASK(5, 0)
> +#define TB_XDOMAIN_SN_MASK	GENMASK(28, 27)
> +#define TB_XDOMAIN_SN_SHIFT	27
> +
> +enum tb_xdp_type {
> +	UUID_REQUEST_OLD = 1,
> +	UUID_RESPONSE = 2,
> +	PROPERTIES_REQUEST,
> +	PROPERTIES_RESPONSE,
> +	PROPERTIES_CHANGED_REQUEST,
> +	PROPERTIES_CHANGED_RESPONSE,
> +	ERROR_RESPONSE,
> +	UUID_REQUEST = 12,
> +};
> +
> +struct tb_xdp_header {
> +	struct tb_xdomain_header xd_hdr;
> +	uuid_t uuid;
> +	u32 type;
> +} __packed;
> +
> +struct tb_xdp_properties {
> +	struct tb_xdp_header hdr;
> +	uuid_t src_uuid;
> +	uuid_t dst_uuid;
> +	u16 offset;
> +	u16 reserved;
> +} __packed;
> +
> +struct tb_xdp_properties_response {
> +	struct tb_xdp_header hdr;
> +	uuid_t src_uuid;
> +	uuid_t dst_uuid;
> +	u16 offset;
> +	u16 data_length;
> +	u32 generation;
> +	u32 data[0];
> +} __packed;
> +
> +/*
> + * Max length of data array single XDomain property response is
> allowed
> + * to carry.
> + */
> +#define TB_XDP_PROPERTIES_MAX_DATA_LENGTH	\
> +	(((256 - 4 - sizeof(struct tb_xdp_properties_response))) /
> 4)
> +
> +/* Maximum size of the total property block in dwords we allow */
> +#define TB_XDP_PROPERTIES_MAX_LENGTH		500
> +
> +struct tb_xdp_properties_changed {
> +	struct tb_xdp_header hdr;
> +	uuid_t src_uuid;
> +} __packed;
> +
> +struct tb_xdp_properties_changed_response {
> +	struct tb_xdp_header hdr;
> +} __packed;
> +
> +enum tb_xdp_error {
> +	ERROR_SUCCESS,
> +	ERROR_UNKNOWN_PACKET,
> +	ERROR_UNKNOWN_DOMAIN,
> +	ERROR_NOT_SUPPORTED,
> +	ERROR_NOT_READY,
> +};
> +
> +struct tb_xdp_error_response {
> +	struct tb_xdp_header hdr;
> +	u32 error;
> +} __packed;
> +
>  #endif
> diff --git a/drivers/thunderbolt/xdomain.c
> b/drivers/thunderbolt/xdomain.c
> new file mode 100644
> index 000000000000..1b929be8fdd6
> --- /dev/null
> +++ b/drivers/thunderbolt/xdomain.c
> @@ -0,0 +1,1576 @@
> +/*
> + * Thunderbolt XDomain discovery protocol support
> + *
> + * Copyright (C) 2017, Intel Corporation
> + * Authors: Michael Jamet <michael.jamet@...el.com>
> + *          Mika Westerberg <mika.westerberg@...ux.intel.com>
> + *
> + * This program is free software; you can redistribute it and/or
> modify
> + * it under the terms of the GNU General Public License version 2 as
> + * published by the Free Software Foundation.
> + */
> +
> +#include <linux/device.h>
> +#include <linux/kmod.h>
> +#include <linux/module.h>
> +#include <linux/utsname.h>
> +#include <linux/uuid.h>
> +#include <linux/workqueue.h>
> +
> +#include "tb.h"
> +
> +#define XDOMAIN_DEFAULT_TIMEOUT			5000 /* ms */
> +#define XDOMAIN_PROPERTIES_RETRIES		60
> +#define XDOMAIN_PROPERTIES_CHANGED_RETRIES	10
> +
> +struct xdomain_request_work {
> +	struct work_struct work;
> +	struct tb_xdp_header *pkg;
> +	struct tb *tb;
> +};
> +
> +/* Serializes access to the properties and protocol handlers below
> */
> +static DEFINE_MUTEX(xdomain_lock);
> +
> +/* Properties exposed to the remote domains */
> +static struct tb_property_dir *xdomain_property_dir;
> +static u32 *xdomain_property_block;
> +static u32 xdomain_property_block_len;
> +static u32 xdomain_property_block_gen;
> +
> +/* Additional protocol handlers */
> +static LIST_HEAD(protocol_handlers);
> +
> +/* UUID for XDomain discovery protocol */
> +static const uuid_t tb_xdp_uuid =
> +	UUID_INIT(0xb638d70e, 0x42ff, 0x40bb,
> +		  0x97, 0xc2, 0x90, 0xe2, 0xc0, 0xb2, 0xff, 0x07);
> +
> +static bool tb_xdomain_match(const struct tb_cfg_request *req,
> +			     const struct ctl_pkg *pkg)
> +{
> +	switch (pkg->frame.eof) {
> +	case TB_CFG_PKG_ERROR:
> +		return true;
> +
> +	case TB_CFG_PKG_XDOMAIN_RESP: {
> +		const struct tb_xdp_header *res_hdr = pkg->buffer;
> +		const struct tb_xdp_header *req_hdr = req->request;
> +		u8 req_seq, res_seq;
> +
> +		if (pkg->frame.size < req->response_size / 4)
> +			return false;
> +
> +		/* Make sure route matches */
> +		if ((res_hdr->xd_hdr.route_hi & ~BIT(31)) !=
> +		     req_hdr->xd_hdr.route_hi)
> +			return false;
> +		if ((res_hdr->xd_hdr.route_lo) != req_hdr-
> >xd_hdr.route_lo)
> +			return false;
> +
> +		/* Then check that the sequence number matches */
> +		res_seq = res_hdr->xd_hdr.length_sn &
> TB_XDOMAIN_SN_MASK;
> +		res_seq >>= TB_XDOMAIN_SN_SHIFT;
> +		req_seq = req_hdr->xd_hdr.length_sn &
> TB_XDOMAIN_SN_MASK;
> +		req_seq >>= TB_XDOMAIN_SN_SHIFT;
> +		if (res_seq != req_seq)
> +			return false;
> +
> +		/* Check that the XDomain protocol matches */
> +		if (!uuid_equal(&res_hdr->uuid, &req_hdr->uuid))
> +			return false;
> +
> +		return true;
> +	}
> +
> +	default:
> +		return false;
> +	}
> +}
> +
> +static bool tb_xdomain_copy(struct tb_cfg_request *req,
> +			    const struct ctl_pkg *pkg)
> +{
> +	memcpy(req->response, pkg->buffer, req->response_size);
> +	req->result.err = 0;
> +	return true;
> +}
> +
> +static void response_ready(void *data)
> +{
> +	tb_cfg_request_put(data);
> +}
> +
> +static int __tb_xdomain_response(struct tb_ctl *ctl, const void
> *response,
> +				 size_t size, enum tb_cfg_pkg_type
> type)
> +{
> +	struct tb_cfg_request *req;
> +
> +	req = tb_cfg_request_alloc();
> +	if (!req)
> +		return -ENOMEM;
> +
> +	req->match = tb_xdomain_match;
> +	req->copy = tb_xdomain_copy;
> +	req->request = response;
> +	req->request_size = size;
> +	req->request_type = type;
> +
> +	return tb_cfg_request(ctl, req, response_ready, req);
> +}
> +
> +/**
> + * tb_xdomain_response() - Send a XDomain response message
> + * @xd: XDomain to send the message
> + * @response: Response to send
> + * @size: Size of the response
> + * @type: PDF type of the response
> + *
> + * This can be used to send a XDomain response message to the other
> + * domain. No response for the message is expected.
> + *
> + * Return: %0 in case of success and negative errno in case of
> failure
> + */
> +int tb_xdomain_response(struct tb_xdomain *xd, const void *response,
> +			size_t size, enum tb_cfg_pkg_type type)
> +{
> +	return __tb_xdomain_response(xd->tb->ctl, response, size,
> type);
> +}
> +EXPORT_SYMBOL_GPL(tb_xdomain_response);
> +
> +static int __tb_xdomain_request(struct tb_ctl *ctl, const void
> *request,
> +	size_t request_size, enum tb_cfg_pkg_type request_type, void
> *response,
> +	size_t response_size, enum tb_cfg_pkg_type response_type,
> +	unsigned int timeout_msec)
> +{
> +	struct tb_cfg_request *req;
> +	struct tb_cfg_result res;
> +
> +	req = tb_cfg_request_alloc();
> +	if (!req)
> +		return -ENOMEM;
> +
> +	req->match = tb_xdomain_match;
> +	req->copy = tb_xdomain_copy;
> +	req->request = request;
> +	req->request_size = request_size;
> +	req->request_type = request_type;
> +	req->response = response;
> +	req->response_size = response_size;
> +	req->response_type = response_type;
> +
> +	res = tb_cfg_request_sync(ctl, req, timeout_msec);
> +
> +	tb_cfg_request_put(req);
> +
> +	return res.err == 1 ? -EIO : res.err;
> +}
> +
> +/**
> + * tb_xdomain_request() - Send a XDomain request
> + * @xd: XDomain to send the request
> + * @request: Request to send
> + * @request_size: Size of the request in bytes
> + * @request_type: PDF type of the request
> + * @response: Response is copied here
> + * @response_size: Expected size of the response in bytes
> + * @response_type: Expected PDF type of the response
> + * @timeout_msec: Timeout in milliseconds to wait for the response
> + *
> + * This function can be used to send XDomain control channel
> messages to
> + * the other domain. The function waits until the response is
> received
> + * or when timeout triggers. Whichever comes first.
> + *
> + * Return: %0 in case of success and negative errno in case of
> failure
> + */
> +int tb_xdomain_request(struct tb_xdomain *xd, const void *request,
> +	size_t request_size, enum tb_cfg_pkg_type request_type,
> +	void *response, size_t response_size,
> +	enum tb_cfg_pkg_type response_type, unsigned int
> timeout_msec)
> +{
> +	return __tb_xdomain_request(xd->tb->ctl, request,
> request_size,
> +				    request_type, response,
> response_size,
> +				    response_type, timeout_msec);
> +}
> +EXPORT_SYMBOL_GPL(tb_xdomain_request);
> +
> +static inline void tb_xdp_fill_header(struct tb_xdp_header *hdr, u64
> route,
> +	u8 sequence, enum tb_xdp_type type, size_t size)
> +{
> +	u32 length_sn;
> +
> +	length_sn = (size - sizeof(hdr->xd_hdr)) / 4;
> +	length_sn |= (sequence << TB_XDOMAIN_SN_SHIFT) &
> TB_XDOMAIN_SN_MASK;
> +
> +	hdr->xd_hdr.route_hi = upper_32_bits(route);
> +	hdr->xd_hdr.route_lo = lower_32_bits(route);
> +	hdr->xd_hdr.length_sn = length_sn;
> +	hdr->type = type;
> +	memcpy(&hdr->uuid, &tb_xdp_uuid, sizeof(tb_xdp_uuid));
> +}
> +
> +static int tb_xdp_handle_error(const struct tb_xdp_header *hdr)
> +{
> +	const struct tb_xdp_error_response *error;
> +
> +	if (hdr->type != ERROR_RESPONSE)
> +		return 0;
> +
> +	error = (const struct tb_xdp_error_response *)hdr;
> +
> +	switch (error->error) {
> +	case ERROR_UNKNOWN_PACKET:
> +	case ERROR_UNKNOWN_DOMAIN:
> +		return -EIO;
> +	case ERROR_NOT_SUPPORTED:
> +		return -ENOTSUPP;
> +	case ERROR_NOT_READY:
> +		return -EAGAIN;
> +	default:
> +		break;
> +	}
> +
> +	return 0;
> +}
> +
> +static int tb_xdp_error_response(struct tb_ctl *ctl, u64 route, u8
> sequence,
> +				 enum tb_xdp_error error)
> +{
> +	struct tb_xdp_error_response res;
> +
> +	memset(&res, 0, sizeof(res));
> +	tb_xdp_fill_header(&res.hdr, route, sequence,
> ERROR_RESPONSE,
> +			   sizeof(res));
> +	res.error = error;
> +
> +	return __tb_xdomain_response(ctl, &res, sizeof(res),
> +				     TB_CFG_PKG_XDOMAIN_RESP);
> +}
> +
> +static int tb_xdp_properties_request(struct tb_ctl *ctl, u64 route,
> +	const uuid_t *src_uuid, const uuid_t *dst_uuid, int retry,
> +	u32 **block, u32 *generation)
> +{
> +	struct tb_xdp_properties_response *res;
> +	struct tb_xdp_properties req;
> +	u16 data_len, len;
> +	size_t total_size;
> +	u32 *data = NULL;
> +	int ret;
> +
> +	total_size = sizeof(*res) +
> TB_XDP_PROPERTIES_MAX_DATA_LENGTH * 4;
> +	res = kzalloc(total_size, GFP_KERNEL);
> +	if (!res)
> +		return -ENOMEM;
> +
> +	memset(&req, 0, sizeof(req));
> +	tb_xdp_fill_header(&req.hdr, route, retry % 4,
> PROPERTIES_REQUEST,
> +			   sizeof(req));
> +	memcpy(&req.src_uuid, src_uuid, sizeof(*src_uuid));
> +	memcpy(&req.dst_uuid, dst_uuid, sizeof(*dst_uuid));
> +
> +	len = 0;
> +	data_len = 0;
> +
> +	do {
> +		ret = __tb_xdomain_request(ctl, &req, sizeof(req),
> +					   TB_CFG_PKG_XDOMAIN_REQ,
> res,
> +					   total_size,
> TB_CFG_PKG_XDOMAIN_RESP,
> +					   XDOMAIN_DEFAULT_TIMEOUT);
> +		if (ret)
> +			goto err;
> +
> +		ret = tb_xdp_handle_error(&res->hdr);
> +		if (ret)
> +			goto err;
> +
> +		/*
> +		 * Package length includes the whole payload without
> the
> +		 * XDomain header. Validate first that the package
> is at
> +		 * least size of the response structure.
> +		 */
> +		len = res->hdr.xd_hdr.length_sn &
> TB_XDOMAIN_LENGTH_MASK;
> +		if (len < sizeof(*res) / 4) {
> +			ret = -EINVAL;
> +			goto err;
> +		}
> +
> +		len += sizeof(res->hdr.xd_hdr) / 4;
> +		len -= sizeof(*res) / 4;
> +
> +		if (res->offset != req.offset) {
> +			ret = -EINVAL;
> +			goto err;
> +		}
> +
> +		/*
> +		 * First time allocate block that has enough space
> for
> +		 * the whole properties block.
> +		 */
> +		if (!data) {
> +			data_len = res->data_length;
> +			if (data_len > TB_XDP_PROPERTIES_MAX_LENGTH)
> {
> +				ret = -E2BIG;
> +				goto err;
> +			}
> +
> +			data = kcalloc(data_len, sizeof(u32),
> GFP_KERNEL);
> +			if (!data) {
> +				ret = -ENOMEM;
> +				goto err;
> +			}
> +		}
> +
> +		memcpy(data + req.offset, res->data, len * 4);
> +		req.offset += len;
> +	} while (!data_len || req.offset < data_len);
> +
> +	*block = data;
> +	*generation = res->generation;
> +
> +	kfree(res);
> +
> +	return data_len;
> +
> +err:
> +	kfree(data);
> +	kfree(res);
> +
> +	return ret;
> +}
> +
> +static int tb_xdp_properties_response(struct tb *tb, struct tb_ctl
> *ctl,
> +	u64 route, u8 sequence, const uuid_t *src_uuid,
> +	const struct tb_xdp_properties *req)
> +{
> +	struct tb_xdp_properties_response *res;
> +	size_t total_size;
> +	u16 len;
> +	int ret;
> +
> +	/*
> +	 * Currently we expect all requests to be directed to us.
> The
> +	 * protocol supports forwarding, though which we might add
> +	 * support later on.
> +	 */
> +	if (!uuid_equal(src_uuid, &req->dst_uuid)) {
> +		tb_xdp_error_response(ctl, route, sequence,
> +				      ERROR_UNKNOWN_DOMAIN);
> +		return 0;
> +	}
> +
> +	mutex_lock(&xdomain_lock);
> +
> +	if (req->offset >= xdomain_property_block_len) {
> +		mutex_unlock(&xdomain_lock);
> +		return -EINVAL;
> +	}
> +
> +	len = xdomain_property_block_len - req->offset;
> +	len = min_t(u16, len, TB_XDP_PROPERTIES_MAX_DATA_LENGTH);
> +	total_size = sizeof(*res) + len * 4;
> +
> +	res = kzalloc(total_size, GFP_KERNEL);
> +	if (!res) {
> +		mutex_unlock(&xdomain_lock);
> +		return -ENOMEM;
> +	}
> +
> +	tb_xdp_fill_header(&res->hdr, route, sequence,
> PROPERTIES_RESPONSE,
> +			   total_size);
> +	res->generation = xdomain_property_block_gen;
> +	res->data_length = xdomain_property_block_len;
> +	res->offset = req->offset;
> +	uuid_copy(&res->src_uuid, src_uuid);
> +	uuid_copy(&res->dst_uuid, &req->src_uuid);
> +	memcpy(res->data, &xdomain_property_block[req->offset], len
> * 4);
> +
> +	mutex_unlock(&xdomain_lock);
> +
> +	ret = __tb_xdomain_response(ctl, res, total_size,
> +				    TB_CFG_PKG_XDOMAIN_RESP);
> +
> +	kfree(res);
> +	return ret;
> +}
> +
> +static int tb_xdp_properties_changed_request(struct tb_ctl *ctl, u64
> route,
> +					     int retry, const uuid_t
> *uuid)
> +{
> +	struct tb_xdp_properties_changed_response res;
> +	struct tb_xdp_properties_changed req;
> +	int ret;
> +
> +	memset(&req, 0, sizeof(req));
> +	tb_xdp_fill_header(&req.hdr, route, retry % 4,
> +			   PROPERTIES_CHANGED_REQUEST, sizeof(req));
> +	uuid_copy(&req.src_uuid, uuid);
> +
> +	memset(&res, 0, sizeof(res));
> +	ret = __tb_xdomain_request(ctl, &req, sizeof(req),
> +				   TB_CFG_PKG_XDOMAIN_REQ, &res,
> sizeof(res),
> +				   TB_CFG_PKG_XDOMAIN_RESP,
> +				   XDOMAIN_DEFAULT_TIMEOUT);
> +	if (ret)
> +		return ret;
> +
> +	return tb_xdp_handle_error(&res.hdr);
> +}
> +
> +static int
> +tb_xdp_properties_changed_response(struct tb_ctl *ctl, u64 route, u8
> sequence)
> +{
> +	struct tb_xdp_properties_changed_response res;
> +
> +	memset(&res, 0, sizeof(res));
> +	tb_xdp_fill_header(&res.hdr, route, sequence,
> +			   PROPERTIES_CHANGED_RESPONSE,
> sizeof(res));
> +	return __tb_xdomain_response(ctl, &res, sizeof(res),
> +				     TB_CFG_PKG_XDOMAIN_RESP);
> +}
> +
> +/**
> + * tb_register_protocol_handler() - Register protocol handler
> + * @handler: Handler to register
> + *
> + * This allows XDomain service drivers to hook into incoming XDomain
> + * messages. After this function is called the service driver needs
> to
> + * be able to handle calls to callback whenever a package with the
> + * registered protocol is received.
> + */
> +int tb_register_protocol_handler(struct tb_protocol_handler
> *handler)
> +{
> +	if (!handler->uuid || !handler->callback)
> +		return -EINVAL;
> +	if (uuid_equal(handler->uuid, &tb_xdp_uuid))
> +		return -EINVAL;
> +
> +	mutex_lock(&xdomain_lock);
> +	list_add_tail(&handler->list, &protocol_handlers);
> +	mutex_unlock(&xdomain_lock);
> +
> +	return 0;
> +}
> +EXPORT_SYMBOL_GPL(tb_register_protocol_handler);
> +
> +/**
> + * tb_unregister_protocol_handler() - Unregister protocol handler
> + * @handler: Handler to unregister
> + *
> + * Removes the previously registered protocol handler.
> + */
> +void tb_unregister_protocol_handler(struct tb_protocol_handler
> *handler)
> +{
> +	mutex_lock(&xdomain_lock);
> +	list_del_init(&handler->list);
> +	mutex_unlock(&xdomain_lock);
> +}
> +EXPORT_SYMBOL_GPL(tb_unregister_protocol_handler);
> +
> +static void tb_xdp_handle_request(struct work_struct *work)
> +{
> +	struct xdomain_request_work *xw = container_of(work,
> typeof(*xw), work);
> +	const struct tb_xdp_header *pkg = xw->pkg;
> +	const struct tb_xdomain_header *xhdr = &pkg->xd_hdr;
> +	struct tb *tb = xw->tb;
> +	struct tb_ctl *ctl = tb->ctl;
> +	const uuid_t *uuid;
> +	int ret = 0;
> +	u8 sequence;
> +	u64 route;
> +
> +	route = ((u64)xhdr->route_hi << 32 | xhdr->route_lo) &
> ~BIT_ULL(63);
> +	sequence = xhdr->length_sn & TB_XDOMAIN_SN_MASK;
> +	sequence >>= TB_XDOMAIN_SN_SHIFT;
> +
> +	mutex_lock(&tb->lock);
> +	if (tb->root_switch)
> +		uuid = tb->root_switch->uuid;
> +	else
> +		uuid = NULL;
> +	mutex_unlock(&tb->lock);
> +
> +	if (!uuid) {
> +		tb_xdp_error_response(ctl, route, sequence,
> ERROR_NOT_READY);
> +		goto out;
> +	}
> +
> +	switch (pkg->type) {
> +	case PROPERTIES_REQUEST:
> +		ret = tb_xdp_properties_response(tb, ctl, route,
> sequence, uuid,
> +			(const struct tb_xdp_properties *)pkg);
> +		break;
> +
> +	case PROPERTIES_CHANGED_REQUEST: {
> +		const struct tb_xdp_properties_changed *xchg =
> +			(const struct tb_xdp_properties_changed
> *)pkg;
> +		struct tb_xdomain *xd;
> +
> +		ret = tb_xdp_properties_changed_response(ctl, route,
> sequence);
> +
> +		/*
> +		 * Since the properties have been changed, let's
> update
> +		 * the xdomain related to this connection as well in
> +		 * case there is a change in services it offers.
> +		 */
> +		xd = tb_xdomain_find_by_uuid_locked(tb, &xchg-
> >src_uuid);
> +		if (xd) {
> +			queue_delayed_work(tb->wq, &xd-
> >get_properties_work,
> +					   msecs_to_jiffies(50));
> +			tb_xdomain_put(xd);
> +		}
> +
> +		break;
> +	}
> +
> +	default:
> +		break;
> +	}
> +
> +	if (ret) {
> +		tb_warn(tb, "failed to send XDomain response for
> %#x\n",
> +			pkg->type);
> +	}
> +
> +out:
> +	kfree(xw->pkg);
> +	kfree(xw);
> +}
> +
> +static void
> +tb_xdp_schedule_request(struct tb *tb, const struct tb_xdp_header
> *hdr,
> +			size_t size)
> +{
> +	struct xdomain_request_work *xw;
> +
> +	xw = kmalloc(sizeof(*xw), GFP_KERNEL);
> +	if (!xw)
> +		return;
> +
> +	INIT_WORK(&xw->work, tb_xdp_handle_request);
> +	xw->pkg = kmemdup(hdr, size, GFP_KERNEL);
> +	xw->tb = tb;
> +
> +	queue_work(tb->wq, &xw->work);
> +}
> +
> +/**
> + * tb_register_service_driver() - Register XDomain service driver
> + * @drv: Driver to register
> + *
> + * Registers new service driver from @drv to the bus.
> + */
> +int tb_register_service_driver(struct tb_service_driver *drv)
> +{
> +	drv->driver.bus = &tb_bus_type;
> +	return driver_register(&drv->driver);
> +}
> +EXPORT_SYMBOL_GPL(tb_register_service_driver);
> +
> +/**
> + * tb_unregister_service_driver() - Unregister XDomain service
> driver
> + * @xdrv: Driver to unregister
> + *
> + * Unregisters XDomain service driver from the bus.
> + */
> +void tb_unregister_service_driver(struct tb_service_driver *drv)
> +{
> +	driver_unregister(&drv->driver);
> +}
> +EXPORT_SYMBOL_GPL(tb_unregister_service_driver);
> +
> +static ssize_t key_show(struct device *dev, struct device_attribute
> *attr,
> +			char *buf)
> +{
> +	struct tb_service *svc = container_of(dev, struct
> tb_service, dev);
> +
> +	/*
> +	 * It should be null terminated but anything else is pretty
> much
> +	 * allowed.
> +	 */
> +	return sprintf(buf, "%*pEp\n", (int)strlen(svc->key), svc-
> >key);
> +}
> +static DEVICE_ATTR_RO(key);
> +
> +static int get_modalias(struct tb_service *svc, char *buf, size_t
> size)
> +{
> +	return snprintf(buf, size, "tbsvc:k%sp%08Xv%08Xr%08X", svc-
> >key,
> +			svc->prtcid, svc->prtcvers, svc->prtcrevs);
> +}
> +
> +static ssize_t modalias_show(struct device *dev, struct
> device_attribute *attr,
> +			     char *buf)
> +{
> +	struct tb_service *svc = container_of(dev, struct
> tb_service, dev);
> +
> +	/* Full buffer size except new line and null termination */
> +	get_modalias(svc, buf, PAGE_SIZE - 2);
> +	return sprintf(buf, "%s\n", buf);
> +}
> +static DEVICE_ATTR_RO(modalias);
> +
> +static ssize_t prtcid_show(struct device *dev, struct
> device_attribute *attr,
> +			   char *buf)
> +{
> +	struct tb_service *svc = container_of(dev, struct
> tb_service, dev);
> +
> +	return sprintf(buf, "%u\n", svc->prtcid);
> +}
> +static DEVICE_ATTR_RO(prtcid);
> +
> +static ssize_t prtcvers_show(struct device *dev, struct
> device_attribute *attr,
> +			     char *buf)
> +{
> +	struct tb_service *svc = container_of(dev, struct
> tb_service, dev);
> +
> +	return sprintf(buf, "%u\n", svc->prtcvers);
> +}
> +static DEVICE_ATTR_RO(prtcvers);
> +
> +static ssize_t prtcrevs_show(struct device *dev, struct
> device_attribute *attr,
> +			     char *buf)
> +{
> +	struct tb_service *svc = container_of(dev, struct
> tb_service, dev);
> +
> +	return sprintf(buf, "%u\n", svc->prtcrevs);
> +}
> +static DEVICE_ATTR_RO(prtcrevs);
> +
> +static ssize_t prtcstns_show(struct device *dev, struct
> device_attribute *attr,
> +			     char *buf)
> +{
> +	struct tb_service *svc = container_of(dev, struct
> tb_service, dev);
> +
> +	return sprintf(buf, "0x%08x\n", svc->prtcstns);
> +}
> +static DEVICE_ATTR_RO(prtcstns);
> +
> +static struct attribute *tb_service_attrs[] = {
> +	&dev_attr_key.attr,
> +	&dev_attr_modalias.attr,
> +	&dev_attr_prtcid.attr,
> +	&dev_attr_prtcvers.attr,
> +	&dev_attr_prtcrevs.attr,
> +	&dev_attr_prtcstns.attr,
> +	NULL,
> +};
> +
> +static struct attribute_group tb_service_attr_group = {
> +	.attrs = tb_service_attrs,
> +};
> +
> +static const struct attribute_group *tb_service_attr_groups[] = {
> +	&tb_service_attr_group,
> +	NULL,
> +};
> +
> +static int tb_service_uevent(struct device *dev, struct
> kobj_uevent_env *env)
> +{
> +	struct tb_service *svc = container_of(dev, struct
> tb_service, dev);
> +	char modalias[64];
> +
> +	get_modalias(svc, modalias, sizeof(modalias));
> +	return add_uevent_var(env, "MODALIAS=%s", modalias);
> +}
> +
> +static void tb_service_release(struct device *dev)
> +{
> +	struct tb_service *svc = container_of(dev, struct
> tb_service, dev);
> +	struct tb_xdomain *xd = tb_service_parent(svc);
> +
> +	ida_simple_remove(&xd->service_ids, svc->id);
> +	kfree(svc->key);
> +	kfree(svc);
> +}
> +
> +struct device_type tb_service_type = {
> +	.name = "thunderbolt_service",
> +	.groups = tb_service_attr_groups,
> +	.uevent = tb_service_uevent,
> +	.release = tb_service_release,
> +};
> +EXPORT_SYMBOL_GPL(tb_service_type);
> +
> +static int remove_missing_service(struct device *dev, void *data)
> +{
> +	struct tb_xdomain *xd = data;
> +	struct tb_service *svc;
> +
> +	svc = tb_to_service(dev);
> +	if (!svc)
> +		return 0;
> +
> +	if (!tb_property_find(xd->properties, svc->key,
> +			      TB_PROPERTY_TYPE_DIRECTORY))
> +		device_unregister(dev);
> +
> +	return 0;
> +}
> +
> +static int find_service(struct device *dev, void *data)
> +{
> +	const struct tb_property *p = data;
> +	struct tb_service *svc;
> +
> +	svc = tb_to_service(dev);
> +	if (!svc)
> +		return 0;
> +
> +	return !strcmp(svc->key, p->key);
> +}
> +
> +static int populate_service(struct tb_service *svc,
> +			    struct tb_property *property)
> +{
> +	struct tb_property_dir *dir = property->value.dir;
> +	struct tb_property *p;
> +
> +	/* Fill in standard properties */
> +	p = tb_property_find(dir, "prtcid", TB_PROPERTY_TYPE_VALUE);
> +	if (p)
> +		svc->prtcid = p->value.immediate;
> +	p = tb_property_find(dir, "prtcvers",
> TB_PROPERTY_TYPE_VALUE);
> +	if (p)
> +		svc->prtcvers = p->value.immediate;
> +	p = tb_property_find(dir, "prtcrevs",
> TB_PROPERTY_TYPE_VALUE);
> +	if (p)
> +		svc->prtcrevs = p->value.immediate;
> +	p = tb_property_find(dir, "prtcstns",
> TB_PROPERTY_TYPE_VALUE);
> +	if (p)
> +		svc->prtcstns = p->value.immediate;
> +
> +	svc->key = kstrdup(property->key, GFP_KERNEL);
> +	if (!svc->key)
> +		return -ENOMEM;
> +
> +	return 0;
> +}
> +
> +static void enumerate_services(struct tb_xdomain *xd)
> +{
> +	struct tb_service *svc;
> +	struct tb_property *p;
> +	struct device *dev;
> +
> +	/*
> +	 * First remove all services that are not available anymore
> in
> +	 * the updated property block.
> +	 */
> +	device_for_each_child_reverse(&xd->dev, xd,
> remove_missing_service);
> +
> +	/* Then re-enumerate properties creating new services as we
> go */
> +	tb_property_for_each(xd->properties, p) {
> +		if (p->type != TB_PROPERTY_TYPE_DIRECTORY)
> +			continue;
> +
> +		/* If the service exists already we are fine */
> +		dev = device_find_child(&xd->dev, p, find_service);
> +		if (dev) {
> +			put_device(dev);
> +			continue;
> +		}
> +
> +		svc = kzalloc(sizeof(*svc), GFP_KERNEL);
> +		if (!svc)
> +			break;
> +
> +		if (populate_service(svc, p)) {
> +			kfree(svc);
> +			break;
> +		}
> +
> +		svc->id = ida_simple_get(&xd->service_ids, 0, 0,
> GFP_KERNEL);
> +		svc->dev.bus = &tb_bus_type;
> +		svc->dev.type = &tb_service_type;
> +		svc->dev.parent = &xd->dev;
> +		dev_set_name(&svc->dev, "%s.%d", dev_name(&xd->dev), 
> svc->id);
> +
> +		if (device_register(&svc->dev)) {
> +			put_device(&svc->dev);
> +			break;
> +		}
> +	}
> +}
> +
> +static int populate_properties(struct tb_xdomain *xd,
> +			       struct tb_property_dir *dir)
> +{
> +	const struct tb_property *p;
> +
> +	/* Required properties */
> +	p = tb_property_find(dir, "deviceid",
> TB_PROPERTY_TYPE_VALUE);
> +	if (!p)
> +		return -EINVAL;
> +	xd->device = p->value.immediate;
> +
> +	p = tb_property_find(dir, "vendorid",
> TB_PROPERTY_TYPE_VALUE);
> +	if (!p)
> +		return -EINVAL;
> +	xd->vendor = p->value.immediate;
> +
> +	kfree(xd->device_name);
> +	xd->device_name = NULL;
> +	kfree(xd->vendor_name);
> +	xd->vendor_name = NULL;
> +
> +	/* Optional properties */
> +	p = tb_property_find(dir, "deviceid",
> TB_PROPERTY_TYPE_TEXT);
> +	if (p)
> +		xd->device_name = kstrdup(p->value.text,
> GFP_KERNEL);
> +	p = tb_property_find(dir, "vendorid",
> TB_PROPERTY_TYPE_TEXT);
> +	if (p)
> +		xd->vendor_name = kstrdup(p->value.text,
> GFP_KERNEL);
> +
> +	return 0;
> +}
> +
> +/* Called with @xd->lock held */
> +static void tb_xdomain_restore_paths(struct tb_xdomain *xd)
> +{
> +	if (!xd->resume)
> +		return;
> +
> +	xd->resume = false;
> +	if (xd->transmit_path) {
> +		dev_dbg(&xd->dev, "re-establishing DMA path\n");
> +		tb_domain_approve_xdomain_paths(xd->tb, xd);
> +	}
> +}
> +
> +static void tb_xdomain_get_properties(struct work_struct *work)
> +{
> +	struct tb_xdomain *xd = container_of(work, typeof(*xd),
> +					     get_properties_work.wor
> k);
> +	struct tb_property_dir *dir;
> +	struct tb *tb = xd->tb;
> +	bool update = false;
> +	u32 *block = NULL;
> +	u32 gen = 0;
> +	int ret;
> +
> +	ret = tb_xdp_properties_request(tb->ctl, xd->route, xd-
> >local_uuid,
> +					xd->remote_uuid, xd-
> >properties_retries,
> +					&block, &gen);
> +	if (ret < 0) {
> +		if (xd->properties_retries-- > 0) {
> +			queue_delayed_work(xd->tb->wq, &xd-
> >get_properties_work,
> +					   msecs_to_jiffies(1000));
> +		} else {
> +			/* Give up now */
> +			dev_err(&xd->dev,
> +				"failed read XDomain properties from
> %pUb\n",
> +				xd->remote_uuid);
> +		}
> +		return;
> +	}
> +
> +	xd->properties_retries = XDOMAIN_PROPERTIES_RETRIES;
> +
> +	mutex_lock(&xd->lock);
> +
> +	/* Only accept newer generation properties */
> +	if (xd->properties && gen <= xd->property_block_gen) {
> +		/*
> +		 * On resume it is likely that the properties block
> is
> +		 * not changed (unless the other end added or
> removed
> +		 * services). However, we need to make sure the
> existing
> +		 * DMA paths are restored properly.
> +		 */
> +		tb_xdomain_restore_paths(xd);
> +		goto err_free_block;
> +	}
> +
> +	dir = tb_property_parse_dir(block, ret);
> +	if (!dir) {
> +		dev_err(&xd->dev, "failed to parse XDomain
> properties\n");
> +		goto err_free_block;
> +	}
> +
> +	ret = populate_properties(xd, dir);
> +	if (ret) {
> +		dev_err(&xd->dev, "missing XDomain properties in
> response\n");
> +		goto err_free_dir;
> +	}
> +
> +	/* Release the existing one */
> +	if (xd->properties) {
> +		tb_property_free_dir(xd->properties);
> +		update = true;
> +	}
> +
> +	xd->properties = dir;
> +	xd->property_block_gen = gen;
> +
> +	tb_xdomain_restore_paths(xd);
> +
> +	mutex_unlock(&xd->lock);
> +
> +	kfree(block);
> +
> +	/*
> +	 * Now the device should be ready enough so we can add it to
> the
> +	 * bus and let userspace know about it. If the device is
> already
> +	 * registered, we notify the userspace that it has changed.
> +	 */
> +	if (!update) {
> +		if (device_add(&xd->dev)) {
> +			dev_err(&xd->dev, "failed to add XDomain
> device\n");
> +			return;
> +		}
> +	} else {
> +		kobject_uevent(&xd->dev.kobj, KOBJ_CHANGE);
> +	}
> +
> +	enumerate_services(xd);
> +	return;
> +
> +err_free_dir:
> +	tb_property_free_dir(dir);
> +err_free_block:
> +	kfree(block);
> +	mutex_unlock(&xd->lock);
> +}
> +
> +static void tb_xdomain_properties_changed(struct work_struct *work)
> +{
> +	struct tb_xdomain *xd = container_of(work, typeof(*xd),
> +					     properties_changed_work
> .work);
> +	int ret;
> +
> +	ret = tb_xdp_properties_changed_request(xd->tb->ctl, xd-
> >route,
> +				xd->properties_changed_retries, xd-
> >local_uuid);
> +	if (ret) {
> +		if (xd->properties_changed_retries-- > 0)
> +			queue_delayed_work(xd->tb->wq,
> +					   &xd-
> >properties_changed_work,
> +					   msecs_to_jiffies(1000));
> +		return;
> +	}
> +
> +	xd->properties_changed_retries =
> XDOMAIN_PROPERTIES_CHANGED_RETRIES;
> +}
> +
> +static ssize_t device_show(struct device *dev, struct
> device_attribute *attr,
> +			   char *buf)
> +{
> +	struct tb_xdomain *xd = container_of(dev, struct tb_xdomain,
> dev);
> +
> +	return sprintf(buf, "%#x\n", xd->device);
> +}
> +static DEVICE_ATTR_RO(device);
> +
> +static ssize_t
> +device_name_show(struct device *dev, struct device_attribute *attr,
> char *buf)
> +{
> +	struct tb_xdomain *xd = container_of(dev, struct tb_xdomain,
> dev);
> +	int ret;
> +
> +	if (mutex_lock_interruptible(&xd->lock))
> +		return -ERESTARTSYS;
> +	ret = sprintf(buf, "%s\n", xd->device_name ? xd->device_name 
> : "");
> +	mutex_unlock(&xd->lock);
> +
> +	return ret;
> +}
> +static DEVICE_ATTR_RO(device_name);
> +
> +static ssize_t vendor_show(struct device *dev, struct
> device_attribute *attr,
> +			   char *buf)
> +{
> +	struct tb_xdomain *xd = container_of(dev, struct tb_xdomain,
> dev);
> +
> +	return sprintf(buf, "%#x\n", xd->vendor);
> +}
> +static DEVICE_ATTR_RO(vendor);
> +
> +static ssize_t
> +vendor_name_show(struct device *dev, struct device_attribute *attr,
> char *buf)
> +{
> +	struct tb_xdomain *xd = container_of(dev, struct tb_xdomain,
> dev);
> +	int ret;
> +
> +	if (mutex_lock_interruptible(&xd->lock))
> +		return -ERESTARTSYS;
> +	ret = sprintf(buf, "%s\n", xd->vendor_name ? xd->vendor_name 
> : "");
> +	mutex_unlock(&xd->lock);
> +
> +	return ret;
> +}
> +static DEVICE_ATTR_RO(vendor_name);
> +
> +static ssize_t unique_id_show(struct device *dev, struct
> device_attribute *attr,
> +			      char *buf)
> +{
> +	struct tb_xdomain *xd = container_of(dev, struct tb_xdomain,
> dev);
> +
> +	return sprintf(buf, "%pUb\n", xd->remote_uuid);
> +}
> +static DEVICE_ATTR_RO(unique_id);
> +
> +static struct attribute *xdomain_attrs[] = {
> +	&dev_attr_device.attr,
> +	&dev_attr_device_name.attr,
> +	&dev_attr_unique_id.attr,
> +	&dev_attr_vendor.attr,
> +	&dev_attr_vendor_name.attr,
> +	NULL,
> +};
> +
> +static struct attribute_group xdomain_attr_group = {
> +	.attrs = xdomain_attrs,
> +};
> +
> +static const struct attribute_group *xdomain_attr_groups[] = {
> +	&xdomain_attr_group,
> +	NULL,
> +};
> +
> +static void tb_xdomain_release(struct device *dev)
> +{
> +	struct tb_xdomain *xd = container_of(dev, struct tb_xdomain,
> dev);
> +
> +	put_device(xd->dev.parent);
> +
> +	tb_property_free_dir(xd->properties);
> +	ida_destroy(&xd->service_ids);
> +
> +	kfree(xd->local_uuid);
> +	kfree(xd->remote_uuid);
> +	kfree(xd->device_name);
> +	kfree(xd->vendor_name);
> +	kfree(xd);
> +}
> +
> +static void start_handshake(struct tb_xdomain *xd)
> +{
> +	xd->properties_retries = XDOMAIN_PROPERTIES_RETRIES;
> +	xd->properties_changed_retries =
> XDOMAIN_PROPERTIES_CHANGED_RETRIES;
> +
> +	/* Start exchanging properties with the other host */
> +	queue_delayed_work(xd->tb->wq, &xd->properties_changed_work,
> +			   msecs_to_jiffies(100));
> +	queue_delayed_work(xd->tb->wq, &xd->get_properties_work,
> +			   msecs_to_jiffies(1000));
> +}
> +
> +static void stop_handshake(struct tb_xdomain *xd)
> +{
> +	xd->properties_retries = 0;
> +	xd->properties_changed_retries = 0;
> +
> +	cancel_delayed_work_sync(&xd->get_properties_work);
> +	cancel_delayed_work_sync(&xd->properties_changed_work);
> +}
> +
> +static int __maybe_unused tb_xdomain_suspend(struct device *dev)
> +{
> +	stop_handshake(tb_to_xdomain(dev));
> +	return 0;
> +}
> +
> +static int __maybe_unused tb_xdomain_resume(struct device *dev)
> +{
> +	struct tb_xdomain *xd = tb_to_xdomain(dev);
> +
> +	/*
> +	 * Ask tb_xdomain_get_properties() restore any existing DMA
> +	 * paths after properties are re-read.
> +	 */
> +	xd->resume = true;
> +	start_handshake(xd);
> +
> +	return 0;
> +}
> +
> +static const struct dev_pm_ops tb_xdomain_pm_ops = {
> +	SET_SYSTEM_SLEEP_PM_OPS(tb_xdomain_suspend,
> tb_xdomain_resume)
> +};
> +
> +struct device_type tb_xdomain_type = {
> +	.name = "thunderbolt_xdomain",
> +	.release = tb_xdomain_release,
> +	.pm = &tb_xdomain_pm_ops,
> +};
> +EXPORT_SYMBOL_GPL(tb_xdomain_type);
> +
> +/**
> + * tb_xdomain_alloc() - Allocate new XDomain object
> + * @tb: Domain where the XDomain belongs
> + * @parent: Parent device (the switch through the connection to the
> + *	    other domain is reached).
> + * @route: Route string used to reach the other domain
> + * @local_uuid: Our local domain UUID
> + * @remote_uuid: UUID of the other domain
> + *
> + * Allocates new XDomain structure and returns pointer to that. The
> + * object must be released by calling tb_xdomain_put().
> + */
> +struct tb_xdomain *tb_xdomain_alloc(struct tb *tb, struct device
> *parent,
> +				    u64 route, const uuid_t
> *local_uuid,
> +				    const uuid_t *remote_uuid)
> +{
> +	struct tb_xdomain *xd;
> +
> +	xd = kzalloc(sizeof(*xd), GFP_KERNEL);
> +	if (!xd)
> +		return NULL;
> +
> +	xd->tb = tb;
> +	xd->route = route;
> +	ida_init(&xd->service_ids);
> +	mutex_init(&xd->lock);
> +	INIT_DELAYED_WORK(&xd->get_properties_work,
> tb_xdomain_get_properties);
> +	INIT_DELAYED_WORK(&xd->properties_changed_work,
> +			  tb_xdomain_properties_changed);
> +
> +	xd->local_uuid = kmemdup(local_uuid, sizeof(uuid_t),
> GFP_KERNEL);
> +	if (!xd->local_uuid)
> +		goto err_free;
> +
> +	xd->remote_uuid = kmemdup(remote_uuid, sizeof(uuid_t),
> GFP_KERNEL);
> +	if (!xd->remote_uuid)
> +		goto err_free_local_uuid;
> +
> +	device_initialize(&xd->dev);
> +	xd->dev.parent = get_device(parent);
> +	xd->dev.bus = &tb_bus_type;
> +	xd->dev.type = &tb_xdomain_type;
> +	xd->dev.groups = xdomain_attr_groups;
> +	dev_set_name(&xd->dev, "%u-%llx", tb->index, route);
> +
> +	return xd;
> +
> +err_free_local_uuid:
> +	kfree(xd->local_uuid);
> +err_free:
> +	kfree(xd);
> +
> +	return NULL;
> +}
> +
> +/**
> + * tb_xdomain_add() - Add XDomain to the bus
> + * @xd: XDomain to add
> + *
> + * This function starts XDomain discovery protocol handshake and
> + * eventually adds the XDomain to the bus. After calling this
> function
> + * the caller needs to call tb_xdomain_remove() in order to remove
> and
> + * release the object regardless whether the handshake succeeded or
> not.
> + */
> +void tb_xdomain_add(struct tb_xdomain *xd)
> +{
> +	/* Start exchanging properties with the other host */
> +	start_handshake(xd);
> +}
> +
> +static int unregister_service(struct device *dev, void *data)
> +{
> +	device_unregister(dev);
> +	return 0;
> +}
> +
> +/**
> + * tb_xdomain_remove() - Remove XDomain from the bus
> + * @xd: XDomain to remove
> + *
> + * This will stop all ongoing configuration work and remove the
> XDomain
> + * along with any services from the bus. When the last reference to
> @xd
> + * is released the object will be released as well.
> + */
> +void tb_xdomain_remove(struct tb_xdomain *xd)
> +{
> +	stop_handshake(xd);
> +
> +	device_for_each_child_reverse(&xd->dev, xd,
> unregister_service);
> +
> +	if (!device_is_registered(&xd->dev))
> +		put_device(&xd->dev);
> +	else
> +		device_unregister(&xd->dev);
> +}
> +
> +/**
> + * tb_xdomain_enable_paths() - Enable DMA paths for XDomain
> connection
> + * @xd: XDomain connection
> + * @transmit_path: HopID of the transmit path the other end is using
> to
> + *		   send packets
> + * @transmit_ring: DMA ring used to receive packets from the other
> end
> + * @receive_path: HopID of the receive path the other end is using
> to
> + *		  receive packets
> + * @receive_ring: DMA ring used to send packets to the other end
> + *
> + * The function enables DMA paths accordingly so that after
> successful
> + * return the caller can send and receive packets using high-speed
> DMA
> + * path.
> + *
> + * Return: %0 in case of success and negative errno in case of error
> + */
> +int tb_xdomain_enable_paths(struct tb_xdomain *xd, u16
> transmit_path,
> +			    u16 transmit_ring, u16 receive_path,
> +			    u16 receive_ring)
> +{
> +	int ret;
> +
> +	mutex_lock(&xd->lock);
> +
> +	if (xd->transmit_path) {
> +		ret = xd->transmit_path == transmit_path ? 0 :
> -EBUSY;
> +		goto exit_unlock;
> +	}
> +
> +	xd->transmit_path = transmit_path;
> +	xd->transmit_ring = transmit_ring;
> +	xd->receive_path = receive_path;
> +	xd->receive_ring = receive_ring;
> +
> +	ret = tb_domain_approve_xdomain_paths(xd->tb, xd);
> +
> +exit_unlock:
> +	mutex_unlock(&xd->lock);
> +
> +	return ret;
> +}
> +EXPORT_SYMBOL_GPL(tb_xdomain_enable_paths);
> +
> +/**
> + * tb_xdomain_disable_paths() - Disable DMA paths for XDomain
> connection
> + * @xd: XDomain connection
> + *
> + * This does the opposite of tb_xdomain_enable_paths(). After call
> to
> + * this the caller is not expected to use the rings anymore.
> + *
> + * Return: %0 in case of success and negative errno in case of error
> + */
> +int tb_xdomain_disable_paths(struct tb_xdomain *xd)
> +{
> +	int ret = 0;
> +
> +	mutex_lock(&xd->lock);
> +	if (xd->transmit_path) {
> +		xd->transmit_path = 0;
> +		xd->transmit_ring = 0;
> +		xd->receive_path = 0;
> +		xd->receive_ring = 0;
> +
> +		ret = tb_domain_disconnect_xdomain_paths(xd->tb,
> xd);
> +	}
> +	mutex_unlock(&xd->lock);
> +
> +	return ret;
> +}
> +EXPORT_SYMBOL_GPL(tb_xdomain_disable_paths);
> +
> +struct tb_xdomain_lookup {
> +	const uuid_t *uuid;
> +	u8 link;
> +	u8 depth;
> +};
> +
> +static struct tb_xdomain *switch_find_xdomain(struct tb_switch *sw,
> +	const struct tb_xdomain_lookup *lookup)
> +{
> +	int i;
> +
> +	for (i = 1; i <= sw->config.max_port_number; i++) {
> +		struct tb_port *port = &sw->ports[i];
> +		struct tb_xdomain *xd;
> +
> +		if (tb_is_upstream_port(port))
> +			continue;
> +
> +		if (port->xdomain) {
> +			xd = port->xdomain;
> +
> +			if (lookup->uuid) {
> +				if (uuid_equal(xd->remote_uuid,
> lookup->uuid))
> +					return xd;
> +			} else if (lookup->link == xd->link &&
> +				   lookup->depth == xd->depth) {
> +				return xd;
> +			}
> +		} else if (port->remote) {
> +			xd = switch_find_xdomain(port->remote->sw,
> lookup);
> +			if (xd)
> +				return xd;
> +		}
> +	}
> +
> +	return NULL;
> +}
> +
> +/**
> + * tb_xdomain_find_by_uuid() - Find an XDomain by UUID
> + * @tb: Domain where the XDomain belongs to
> + * @uuid: UUID to look for
> + *
> + * Finds XDomain by walking through the Thunderbolt topology below
> @tb.
> + * The returned XDomain will have its reference count increased so
> the
> + * caller needs to call tb_xdomain_put() when it is done with the
> + * object.
> + *
> + * This will find all XDomains including the ones that are not yet
> added
> + * to the bus (handshake is still in progress).
> + *
> + * The caller needs to hold @tb->lock.
> + */
> +struct tb_xdomain *tb_xdomain_find_by_uuid(struct tb *tb, const
> uuid_t *uuid)
> +{
> +	struct tb_xdomain_lookup lookup;
> +	struct tb_xdomain *xd;
> +
> +	memset(&lookup, 0, sizeof(lookup));
> +	lookup.uuid = uuid;
> +
> +	xd = switch_find_xdomain(tb->root_switch, &lookup);
> +	if (xd) {
> +		get_device(&xd->dev);
> +		return xd;
> +	}
> +
> +	return NULL;
> +}
> +EXPORT_SYMBOL_GPL(tb_xdomain_find_by_uuid);
> +
> +/**
> + * tb_xdomain_find_by_link_depth() - Find an XDomain by link and
> depth
> + * @tb: Domain where the XDomain belongs to
> + * @link: Root switch link number
> + * @depth: Depth in the link
> + *
> + * Finds XDomain by walking through the Thunderbolt topology below
> @tb.
> + * The returned XDomain will have its reference count increased so
> the
> + * caller needs to call tb_xdomain_put() when it is done with the
> + * object.
> + *
> + * This will find all XDomains including the ones that are not yet
> added
> + * to the bus (handshake is still in progress).
> + *
> + * The caller needs to hold @tb->lock.
> + */
> +struct tb_xdomain *tb_xdomain_find_by_link_depth(struct tb *tb, u8
> link,
> +						 u8 depth)
> +{
> +	struct tb_xdomain_lookup lookup;
> +	struct tb_xdomain *xd;
> +
> +	memset(&lookup, 0, sizeof(lookup));
> +	lookup.link = link;
> +	lookup.depth = depth;
> +
> +	xd = switch_find_xdomain(tb->root_switch, &lookup);
> +	if (xd) {
> +		get_device(&xd->dev);
> +		return xd;
> +	}
> +
> +	return NULL;
> +}
> +
> +bool tb_xdomain_handle_request(struct tb *tb, enum tb_cfg_pkg_type
> type,
> +			       const void *buf, size_t size)
> +{
> +	const struct tb_protocol_handler *handler, *tmp;
> +	const struct tb_xdp_header *hdr = buf;
> +	unsigned int length;
> +	int ret = 0;
> +
> +	/* We expect the packet is at least size of the header */
> +	length = hdr->xd_hdr.length_sn & TB_XDOMAIN_LENGTH_MASK;
> +	if (length != size / 4 - sizeof(hdr->xd_hdr) / 4)
> +		return true;
> +	if (length < sizeof(*hdr) / 4 - sizeof(hdr->xd_hdr) / 4)
> +		return true;
> +
> +	/*
> +	 * Handle XDomain discovery protocol packets directly here.
> For
> +	 * other protocols (based on their UUID) we call registered
> +	 * handlers in turn.
> +	 */
> +	if (uuid_equal(&hdr->uuid, &tb_xdp_uuid)) {
> +		if (type == TB_CFG_PKG_XDOMAIN_REQ) {
> +			tb_xdp_schedule_request(tb, hdr, size);
> +			return true;
> +		}
> +		return false;
> +	}
> +
> +	mutex_lock(&xdomain_lock);
> +	list_for_each_entry_safe(handler, tmp, &protocol_handlers,
> list) {
> +		if (!uuid_equal(&hdr->uuid, handler->uuid))
> +			continue;
> +
> +		mutex_unlock(&xdomain_lock);
> +		ret = handler->callback(buf, size, handler->data);
> +		mutex_lock(&xdomain_lock);
> +
> +		if (ret)
> +			break;
> +	}
> +	mutex_unlock(&xdomain_lock);
> +
> +	return ret > 0;
> +}
> +
> +static int rebuild_property_block(void)
> +{
> +	u32 *block, len;
> +	int ret;
> +
> +	ret = tb_property_format_dir(xdomain_property_dir, NULL, 0);
> +	if (ret < 0)
> +		return ret;
> +
> +	len = ret;
> +
> +	block = kcalloc(len, sizeof(u32), GFP_KERNEL);
> +	if (!block)
> +		return -ENOMEM;
> +
> +	ret = tb_property_format_dir(xdomain_property_dir, block,
> len);
> +	if (ret) {
> +		kfree(block);
> +		return ret;
> +	}
> +
> +	kfree(xdomain_property_block);
> +	xdomain_property_block = block;
> +	xdomain_property_block_len = len;
> +	xdomain_property_block_gen++;
> +
> +	return 0;
> +}
> +
> +static int update_xdomain(struct device *dev, void *data)
> +{
> +	struct tb_xdomain *xd;
> +
> +	xd = tb_to_xdomain(dev);
> +	if (xd) {
> +		queue_delayed_work(xd->tb->wq, &xd-
> >properties_changed_work,
> +				   msecs_to_jiffies(50));
> +	}
> +
> +	return 0;
> +}
> +
> +static void update_all_xdomains(void)
> +{
> +	bus_for_each_dev(&tb_bus_type, NULL, NULL, update_xdomain);
> +}
> +
> +static bool remove_directory(const char *key, const struct
> tb_property_dir *dir)
> +{
> +	struct tb_property *p;
> +
> +	p = tb_property_find(xdomain_property_dir, key,
> +			     TB_PROPERTY_TYPE_DIRECTORY);
> +	if (p && p->value.dir == dir) {
> +		tb_property_remove(p);
> +		return true;
> +	}
> +	return false;
> +}
> +
> +/**
> + * tb_register_property_dir() - Register property directory to the
> host
> + * @key: Key (name) of the directory to add
> + * @dir: Directory to add
> + *
> + * Service drivers can use this function to add new property
> directory
> + * to the host available properties. The other connected hosts are
> + * notified so they can re-read properties of this host if they are
> + * interested.
> + *
> + * Return: %0 on success and negative errno on failure
> + */
> +int tb_register_property_dir(const char *key, struct tb_property_dir
> *dir)
> +{
> +	int ret;
> +
> +	if (!key || strlen(key) > 8)
> +		return -EINVAL;
> +
> +	mutex_lock(&xdomain_lock);
> +	if (tb_property_find(xdomain_property_dir, key,
> +			     TB_PROPERTY_TYPE_DIRECTORY)) {
> +		ret = -EEXIST;
> +		goto err_unlock;
> +	}
> +
> +	ret = tb_property_add_dir(xdomain_property_dir, key, dir);
> +	if (ret)
> +		goto err_unlock;
> +
> +	ret = rebuild_property_block();
> +	if (ret) {
> +		remove_directory(key, dir);
> +		goto err_unlock;
> +	}
> +
> +	mutex_unlock(&xdomain_lock);
> +	update_all_xdomains();
> +	return 0;
> +
> +err_unlock:
> +	mutex_unlock(&xdomain_lock);
> +	return ret;
> +}
> +EXPORT_SYMBOL_GPL(tb_register_property_dir);
> +
> +/**
> + * tb_unregister_property_dir() - Removes property directory from
> host
> + * @key: Key (name) of the directory
> + * @dir: Directory to remove
> + *
> + * This will remove the existing directory from this host and notify
> the
> + * connected hosts about the change.
> + */
> +void tb_unregister_property_dir(const char *key, struct
> tb_property_dir *dir)
> +{
> +	int ret = 0;
> +
> +	mutex_lock(&xdomain_lock);
> +	if (remove_directory(key, dir))
> +		ret = rebuild_property_block();
> +	mutex_unlock(&xdomain_lock);
> +
> +	if (!ret)
> +		update_all_xdomains();
> +}
> +EXPORT_SYMBOL_GPL(tb_unregister_property_dir);
> +
> +int tb_xdomain_init(void)
> +{
> +	int ret;
> +
> +	xdomain_property_dir = tb_property_create_dir(NULL);
> +	if (!xdomain_property_dir)
> +		return -ENOMEM;
> +
> +	/*
> +	 * Initialize standard set of properties without any service
> +	 * directories. Those will be added by service drivers
> +	 * themselves when they are loaded.
> +	 */
> +	tb_property_add_immediate(xdomain_property_dir, "vendorid",
> +				  PCI_VENDOR_ID_INTEL);
> +	tb_property_add_text(xdomain_property_dir, "vendorid",
> "Intel Corp.");
> +	tb_property_add_immediate(xdomain_property_dir, "deviceid",
> 0x1);
> +	tb_property_add_text(xdomain_property_dir, "deviceid",
> +			     utsname()->nodename);
> +	tb_property_add_immediate(xdomain_property_dir, "devicerv",
> 0x80000100);
> +
> +	ret = rebuild_property_block();
> +	if (ret) {
> +		tb_property_free_dir(xdomain_property_dir);
> +		xdomain_property_dir = NULL;
> +	}
> +
> +	return ret;
> +}
> +
> +void tb_xdomain_exit(void)
> +{
> +	kfree(xdomain_property_block);
> +	tb_property_free_dir(xdomain_property_dir);
> +}
> diff --git a/include/linux/mod_devicetable.h
> b/include/linux/mod_devicetable.h
> index 694cebb50f72..7625c3b81f84 100644
> --- a/include/linux/mod_devicetable.h
> +++ b/include/linux/mod_devicetable.h
> @@ -683,5 +683,31 @@ struct fsl_mc_device_id {
>  	const char obj_type[16];
>  };
>  
> +/**
> + * struct tb_service_id - Thunderbolt service identifiers
> + * @match_flags: Flags used to match the structure
> + * @protocol_key: Protocol key the service supports
> + * @protocol_id: Protocol id the service supports
> + * @protocol_version: Version of the protocol
> + * @protocol_revision: Revision of the protocol software
> + * @driver_data: Driver specific data
> + *
> + * Thunderbolt XDomain services are exposed as devices where each
> device
> + * carries the protocol information the service supports.
> Thunderbolt
> + * XDomain service drivers match against that information.
> + */
> +struct tb_service_id {
> +	__u32 match_flags;
> +	char protocol_key[8 + 1];
> +	__u32 protocol_id;
> +	__u32 protocol_version;
> +	__u32 protocol_revision;
> +	kernel_ulong_t driver_data;
> +};
> +
> +#define TBSVC_MATCH_PROTOCOL_KEY	0x0001
> +#define TBSVC_MATCH_PROTOCOL_ID		0x0002
> +#define TBSVC_MATCH_PROTOCOL_VERSION	0x0004
> +#define TBSVC_MATCH_PROTOCOL_REVISION	0x0008
>  
>  #endif /* LINUX_MOD_DEVICETABLE_H */
> diff --git a/include/linux/thunderbolt.h
> b/include/linux/thunderbolt.h
> index 4011d6537a8c..79abdaf1c296 100644
> --- a/include/linux/thunderbolt.h
> +++ b/include/linux/thunderbolt.h
> @@ -17,6 +17,7 @@
>  #include <linux/device.h>
>  #include <linux/list.h>
>  #include <linux/mutex.h>
> +#include <linux/mod_devicetable.h>
>  #include <linux/uuid.h>
>  
>  enum tb_cfg_pkg_type {
> @@ -77,6 +78,8 @@ struct tb {
>  };
>  
>  extern struct bus_type tb_bus_type;
> +extern struct device_type tb_service_type;
> +extern struct device_type tb_xdomain_type;
>  
>  #define TB_LINKS_PER_PHY_PORT	2
>  
> @@ -155,4 +158,243 @@ struct tb_property *tb_property_get_next(struct
> tb_property_dir *dir,
>  	     property;						
> \
>  	     property = tb_property_get_next(dir, property))
>  
> +int tb_register_property_dir(const char *key, struct tb_property_dir
> *dir);
> +void tb_unregister_property_dir(const char *key, struct
> tb_property_dir *dir);
> +
> +/**
> + * struct tb_xdomain - Cross-domain (XDomain) connection
> + * @dev: XDomain device
> + * @tb: Pointer to the domain
> + * @remote_uuid: UUID of the remote domain (host)
> + * @local_uuid: Cached local UUID
> + * @route: Route string the other domain can be reached
> + * @vendor: Vendor ID of the remote domain
> + * @device: Device ID of the demote domain
> + * @lock: Lock to serialize access to the following fields of this
> structure
> + * @vendor_name: Name of the vendor (or %NULL if not known)
> + * @device_name: Name of the device (or %NULL if not known)
> + * @is_unplugged: The XDomain is unplugged
> + * @resume: The XDomain is being resumed
> + * @transmit_path: HopID which the remote end expects us to transmit
> + * @transmit_ring: Local ring (hop) where outgoing packets are
> pushed
> + * @receive_path: HopID which we expect the remote end to transmit
> + * @receive_ring: Local ring (hop) where incoming packets arrive
> + * @service_ids: Used to generate IDs for the services
> + * @properties: Properties exported by the remote domain
> + * @property_block_gen: Generation of @properties
> + * @properties_lock: Lock protecting @properties.
> + * @get_properties_work: Work used to get remote domain properties
> + * @properties_retries: Number of times left to read properties
> + * @properties_changed_work: Work used to notify the remote domain
> that
> + *			     our properties have changed
> + * @properties_changed_retries: Number of times left to send
> properties
> + *				changed notification
> + * @link: Root switch link the remote domain is connected (ICM only)
> + * @depth: Depth in the chain the remote domain is connected (ICM
> only)
> + *
> + * This structure represents connection across two domains (hosts).
> + * Each XDomain contains zero or more services which are exposed as
> + * &struct tb_service objects.
> + *
> + * Service drivers may access this structure if they need to
> enumerate
> + * non-standard properties but they need hold @lock when doing so
> + * because properties can be changed asynchronously in response to
> + * changes in the remote domain.
> + */
> +struct tb_xdomain {
> +	struct device dev;
> +	struct tb *tb;
> +	uuid_t *remote_uuid;
> +	const uuid_t *local_uuid;
> +	u64 route;
> +	u16 vendor;
> +	u16 device;
> +	struct mutex lock;
> +	const char *vendor_name;
> +	const char *device_name;
> +	bool is_unplugged;
> +	bool resume;
> +	u16 transmit_path;
> +	u16 transmit_ring;
> +	u16 receive_path;
> +	u16 receive_ring;
> +	struct ida service_ids;
> +	struct tb_property_dir *properties;
> +	u32 property_block_gen;
> +	struct delayed_work get_properties_work;
> +	int properties_retries;
> +	struct delayed_work properties_changed_work;
> +	int properties_changed_retries;
> +	u8 link;
> +	u8 depth;
> +};
> +
> +int tb_xdomain_enable_paths(struct tb_xdomain *xd, u16
> transmit_path,
> +			    u16 transmit_ring, u16 receive_path,
> +			    u16 receive_ring);
> +int tb_xdomain_disable_paths(struct tb_xdomain *xd);
> +struct tb_xdomain *tb_xdomain_find_by_uuid(struct tb *tb, const
> uuid_t *uuid);
> +
> +static inline struct tb_xdomain *
> +tb_xdomain_find_by_uuid_locked(struct tb *tb, const uuid_t *uuid)
> +{
> +	struct tb_xdomain *xd;
> +
> +	mutex_lock(&tb->lock);
> +	xd = tb_xdomain_find_by_uuid(tb, uuid);
> +	mutex_unlock(&tb->lock);
> +
> +	return xd;
> +}
> +
> +static inline struct tb_xdomain *tb_xdomain_get(struct tb_xdomain
> *xd)
> +{
> +	if (xd)
> +		get_device(&xd->dev);
> +	return xd;
> +}
> +
> +static inline void tb_xdomain_put(struct tb_xdomain *xd)
> +{
> +	if (xd)
> +		put_device(&xd->dev);
> +}
> +
> +static inline bool tb_is_xdomain(const struct device *dev)
> +{
> +	return dev->type == &tb_xdomain_type;
> +}
> +
> +static inline struct tb_xdomain *tb_to_xdomain(struct device *dev)
> +{
> +	if (tb_is_xdomain(dev))
> +		return container_of(dev, struct tb_xdomain, dev);
> +	return NULL;
> +}
> +
> +int tb_xdomain_response(struct tb_xdomain *xd, const void *response,
> +			size_t size, enum tb_cfg_pkg_type type);
> +int tb_xdomain_request(struct tb_xdomain *xd, const void *request,
> +		       size_t request_size, enum tb_cfg_pkg_type
> request_type,
> +		       void *response, size_t response_size,
> +		       enum tb_cfg_pkg_type response_type,
> +		       unsigned int timeout_msec);
> +
> +/**
> + * tb_protocol_handler - Protocol specific handler
> + * @uuid: XDomain messages with this UUID are dispatched to this
> handler
> + * @callback: Callback called with the XDomain message. Returning %1
> + *	      here tells the XDomain core that the message was
> handled
> + *	      by this handler and should not be forwared to other
> + *	      handlers.
> + * @data: Data passed with the callback
> + * @list: Handlers are linked using this
> + *
> + * Thunderbolt services can hook into incoming XDomain requests by
> + * registering protocol handler. Only limitation is that the XDomain
> + * discovery protocol UUID cannot be registered since it is handled
> by
> + * the core XDomain code.
> + *
> + * The @callback must check that the message is really directed to
> the
> + * service the driver implements.
> + */
> +struct tb_protocol_handler {
> +	const uuid_t *uuid;
> +	int (*callback)(const void *buf, size_t size, void *data);
> +	void *data;
> +	struct list_head list;
> +};
> +
> +int tb_register_protocol_handler(struct tb_protocol_handler
> *handler);
> +void tb_unregister_protocol_handler(struct tb_protocol_handler
> *handler);
> +
> +/**
> + * struct tb_service - Thunderbolt service
> + * @dev: XDomain device
> + * @id: ID of the service (shown in sysfs)
> + * @key: Protocol key from the properties directory
> + * @prtcid: Protocol ID from the properties directory
> + * @prtcvers: Protocol version from the properties directory
> + * @prtcrevs: Protocol software revision from the properties
> directory
> + * @prtcstns: Protocol settings mask from the properties directory
> + *
> + * Each domain exposes set of services it supports as collection of
> + * properties. For each service there will be one corresponding
> + * &struct tb_service. Service drivers are bound to these.
> + */
> +struct tb_service {
> +	struct device dev;
> +	int id;
> +	const char *key;
> +	u32 prtcid;
> +	u32 prtcvers;
> +	u32 prtcrevs;
> +	u32 prtcstns;
> +};
> +
> +static inline struct tb_service *tb_service_get(struct tb_service
> *svc)
> +{
> +	if (svc)
> +		get_device(&svc->dev);
> +	return svc;
> +}
> +
> +static inline void tb_service_put(struct tb_service *svc)
> +{
> +	if (svc)
> +		put_device(&svc->dev);
> +}
> +
> +static inline bool tb_is_service(const struct device *dev)
> +{
> +	return dev->type == &tb_service_type;
> +}
> +
> +static inline struct tb_service *tb_to_service(struct device *dev)
> +{
> +	if (tb_is_service(dev))
> +		return container_of(dev, struct tb_service, dev);
> +	return NULL;
> +}
> +
> +/**
> + * tb_service_driver - Thunderbolt service driver
> + * @driver: Driver structure
> + * @probe: Called when the driver is probed
> + * @remove: Called when the driver is removed (optional)
> + * @shutdown: Called at shutdown time to stop the service (optional)
> + * @id_table: Table of service identifiers the driver supports
> + */
> +struct tb_service_driver {
> +	struct device_driver driver;
> +	int (*probe)(struct tb_service *svc, const struct
> tb_service_id *id);
> +	void (*remove)(struct tb_service *svc);
> +	void (*shutdown)(struct tb_service *svc);
> +	const struct tb_service_id *id_table;
> +};
> +
> +#define TB_SERVICE(key, id)				\
> +	.match_flags = TBSVC_MATCH_PROTOCOL_KEY |	\
> +		       TBSVC_MATCH_PROTOCOL_ID,		\
> +	.protocol_key = (key),				\
> +	.protocol_id = (id)
> +
> +int tb_register_service_driver(struct tb_service_driver *drv);
> +void tb_unregister_service_driver(struct tb_service_driver *drv);
> +
> +static inline void *tb_service_get_drvdata(const struct tb_service
> *svc)
> +{
> +	return dev_get_drvdata(&svc->dev);
> +}
> +
> +static inline void tb_service_set_drvdata(struct tb_service *svc,
> void *data)
> +{
> +	dev_set_drvdata(&svc->dev, data);
> +}
> +
> +static inline struct tb_xdomain *tb_service_parent(struct tb_service
> *svc)
> +{
> +	return tb_to_xdomain(svc->dev.parent);
> +}
> +
>  #endif /* THUNDERBOLT_H_ */
> diff --git a/scripts/mod/devicetable-offsets.c
> b/scripts/mod/devicetable-offsets.c
> index e4d90e50f6fe..57263f2f8f2f 100644
> --- a/scripts/mod/devicetable-offsets.c
> +++ b/scripts/mod/devicetable-offsets.c
> @@ -206,5 +206,12 @@ int main(void)
>  	DEVID_FIELD(fsl_mc_device_id, vendor);
>  	DEVID_FIELD(fsl_mc_device_id, obj_type);
>  
> +	DEVID(tb_service_id);
> +	DEVID_FIELD(tb_service_id, match_flags);
> +	DEVID_FIELD(tb_service_id, protocol_key);
> +	DEVID_FIELD(tb_service_id, protocol_id);
> +	DEVID_FIELD(tb_service_id, protocol_version);
> +	DEVID_FIELD(tb_service_id, protocol_revision);
> +
>  	return 0;
>  }
> diff --git a/scripts/mod/file2alias.c b/scripts/mod/file2alias.c
> index 29d6699d5a06..6ef6e63f96fd 100644
> --- a/scripts/mod/file2alias.c
> +++ b/scripts/mod/file2alias.c
> @@ -1301,6 +1301,31 @@ static int do_fsl_mc_entry(const char
> *filename, void *symval,
>  }
>  ADD_TO_DEVTABLE("fslmc", fsl_mc_device_id, do_fsl_mc_entry);
>  
> +/* Looks like: tbsvc:kSpNvNrN */
> +static int do_tbsvc_entry(const char *filename, void *symval, char
> *alias)
> +{
> +	DEF_FIELD(symval, tb_service_id, match_flags);
> +	DEF_FIELD_ADDR(symval, tb_service_id, protocol_key);
> +	DEF_FIELD(symval, tb_service_id, protocol_id);
> +	DEF_FIELD(symval, tb_service_id, protocol_version);
> +	DEF_FIELD(symval, tb_service_id, protocol_revision);
> +
> +	strcpy(alias, "tbsvc:");
> +	if (match_flags & TBSVC_MATCH_PROTOCOL_KEY)
> +		sprintf(alias + strlen(alias), "k%s",
> *protocol_key);
> +	else
> +		strcat(alias + strlen(alias), "k*");
> +	ADD(alias, "p", match_flags & TBSVC_MATCH_PROTOCOL_ID,
> protocol_id);
> +	ADD(alias, "v", match_flags & TBSVC_MATCH_PROTOCOL_VERSION,
> +	    protocol_version);
> +	ADD(alias, "r", match_flags & TBSVC_MATCH_PROTOCOL_REVISION,
> +	    protocol_revision);
> +
> +	add_wildcard(alias);
> +	return 1;
> +}
> +ADD_TO_DEVTABLE("tbsvc", tb_service_id, do_tbsvc_entry);
> +
>  /* Does namelen bytes of name exactly match the symbol? */
>  static bool sym_is(const char *name, unsigned namelen, const char
> *symbol)
>  {

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ