onoff.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656
  1. /*
  2. * Copyright (c) 2019 Peter Bigot Consulting, LLC
  3. * Copyright (c) 2020 Nordic Semiconductor ASA
  4. *
  5. * SPDX-License-Identifier: Apache-2.0
  6. */
  7. #include <kernel.h>
  8. #include <sys/onoff.h>
  9. #include <stdio.h>
  10. #define SERVICE_REFS_MAX UINT16_MAX
  11. /* Confirm consistency of public flags with private flags */
  12. BUILD_ASSERT((ONOFF_FLAG_ERROR | ONOFF_FLAG_ONOFF | ONOFF_FLAG_TRANSITION)
  13. < BIT(3));
  14. #define ONOFF_FLAG_PROCESSING BIT(3)
  15. #define ONOFF_FLAG_COMPLETE BIT(4)
  16. #define ONOFF_FLAG_RECHECK BIT(5)
  17. /* These symbols in the ONOFF_FLAGS namespace identify bits in
  18. * onoff_manager::flags that indicate the state of the machine. The
  19. * bits are manipulated by process_event() under lock, and actions
  20. * cued by bit values are executed outside of lock within
  21. * process_event().
  22. *
  23. * * ERROR indicates that the machine is in an error state. When
  24. * this bit is set ONOFF will be cleared.
  25. * * ONOFF indicates whether the target/current state is off (clear)
  26. * or on (set).
  27. * * TRANSITION indicates whether a service transition function is in
  28. * progress. It combines with ONOFF to identify start and stop
  29. * transitions, and with ERROR to identify a reset transition.
  30. * * PROCESSING indicates that the process_event() loop is active. It
  31. * is used to defer initiation of transitions and other complex
  32. * state changes while invoking notifications associated with a
  33. * state transition. This bounds the depth by limiting
  34. * active process_event() call stacks to two instances. State changes
  35. * initiated by a nested call will be executed when control returns
  36. * to the parent call.
  37. * * COMPLETE indicates that a transition completion notification has
  38. * been received. This flag is set in the notification, and cleared
  39. * by process_events() which is invoked from the notification. In
  40. * the case of nested process_events() the processing is deferred to
  41. * the top invocation.
  42. * * RECHECK indicates that a state transition has completed but
  43. * process_events() must re-check the overall state to confirm no
  44. * additional transitions are required. This is used to simplfy the
  45. * logic when, for example, a request is received during a
  46. * transition to off, which means that when the transition completes
  47. * a transition to on must be initiated if the request is still
  48. * present. Transition to ON with no remaining requests similarly
  49. * triggers a recheck.
  50. */
  51. /* Identify the events that can trigger state changes, as well as an
  52. * internal state used when processing deferred actions.
  53. */
  54. enum event_type {
  55. /* No-op event: used to process deferred changes.
  56. *
  57. * This event is local to the process loop.
  58. */
  59. EVT_NOP,
  60. /* Completion of a service transition.
  61. *
  62. * This event is triggered by the transition notify callback.
  63. * It can be received only when the machine is in a transition
  64. * state (TO-ON, TO-OFF, or RESETTING).
  65. */
  66. EVT_COMPLETE,
  67. /* Reassess whether a transition from a stable state is needed.
  68. *
  69. * This event causes:
  70. * * a start from OFF when there are clients;
  71. * * a stop from ON when there are no clients;
  72. * * a reset from ERROR when there are clients.
  73. *
  74. * The client list can change while the manager lock is
  75. * released (e.g. during client and monitor notifications and
  76. * transition initiations), so this event records the
  77. * potential for these state changes, and process_event() ...
  78. *
  79. */
  80. EVT_RECHECK,
  81. /* Transition to on.
  82. *
  83. * This is synthesized from EVT_RECHECK in a non-nested
  84. * process_event() when state OFF is confirmed with a
  85. * non-empty client (request) list.
  86. */
  87. EVT_START,
  88. /* Transition to off.
  89. *
  90. * This is synthesized from EVT_RECHECK in a non-nested
  91. * process_event() when state ON is confirmed with a
  92. * zero reference count.
  93. */
  94. EVT_STOP,
  95. /* Transition to resetting.
  96. *
  97. * This is synthesized from EVT_RECHECK in a non-nested
  98. * process_event() when state ERROR is confirmed with a
  99. * non-empty client (reset) list.
  100. */
  101. EVT_RESET,
  102. };
  103. static void set_state(struct onoff_manager *mgr,
  104. uint32_t state)
  105. {
  106. mgr->flags = (state & ONOFF_STATE_MASK)
  107. | (mgr->flags & ~ONOFF_STATE_MASK);
  108. }
  109. static int validate_args(const struct onoff_manager *mgr,
  110. struct onoff_client *cli)
  111. {
  112. if ((mgr == NULL) || (cli == NULL)) {
  113. return -EINVAL;
  114. }
  115. int rv = sys_notify_validate(&cli->notify);
  116. if ((rv == 0)
  117. && ((cli->notify.flags
  118. & ~BIT_MASK(ONOFF_CLIENT_EXTENSION_POS)) != 0)) {
  119. rv = -EINVAL;
  120. }
  121. return rv;
  122. }
  123. int onoff_manager_init(struct onoff_manager *mgr,
  124. const struct onoff_transitions *transitions)
  125. {
  126. if ((mgr == NULL)
  127. || (transitions == NULL)
  128. || (transitions->start == NULL)
  129. || (transitions->stop == NULL)) {
  130. return -EINVAL;
  131. }
  132. *mgr = (struct onoff_manager)ONOFF_MANAGER_INITIALIZER(transitions);
  133. return 0;
  134. }
  135. static void notify_monitors(struct onoff_manager *mgr,
  136. uint32_t state,
  137. int res)
  138. {
  139. sys_slist_t *mlist = &mgr->monitors;
  140. struct onoff_monitor *mon;
  141. struct onoff_monitor *tmp;
  142. SYS_SLIST_FOR_EACH_CONTAINER_SAFE(mlist, mon, tmp, node) {
  143. mon->callback(mgr, mon, state, res);
  144. }
  145. }
  146. static void notify_one(struct onoff_manager *mgr,
  147. struct onoff_client *cli,
  148. uint32_t state,
  149. int res)
  150. {
  151. onoff_client_callback cb =
  152. (onoff_client_callback)sys_notify_finalize(&cli->notify, res);
  153. if (cb) {
  154. cb(mgr, cli, state, res);
  155. }
  156. }
  157. static void notify_all(struct onoff_manager *mgr,
  158. sys_slist_t *list,
  159. uint32_t state,
  160. int res)
  161. {
  162. while (!sys_slist_is_empty(list)) {
  163. sys_snode_t *node = sys_slist_get_not_empty(list);
  164. struct onoff_client *cli =
  165. CONTAINER_OF(node,
  166. struct onoff_client,
  167. node);
  168. notify_one(mgr, cli, state, res);
  169. }
  170. }
  171. static void process_event(struct onoff_manager *mgr,
  172. int evt,
  173. k_spinlock_key_t key);
  174. static void transition_complete(struct onoff_manager *mgr,
  175. int res)
  176. {
  177. k_spinlock_key_t key = k_spin_lock(&mgr->lock);
  178. mgr->last_res = res;
  179. process_event(mgr, EVT_COMPLETE, key);
  180. }
  181. /* Detect whether static state requires a transition. */
  182. static int process_recheck(struct onoff_manager *mgr)
  183. {
  184. int evt = EVT_NOP;
  185. uint32_t state = mgr->flags & ONOFF_STATE_MASK;
  186. if ((state == ONOFF_STATE_OFF)
  187. && !sys_slist_is_empty(&mgr->clients)) {
  188. evt = EVT_START;
  189. } else if ((state == ONOFF_STATE_ON)
  190. && (mgr->refs == 0U)) {
  191. evt = EVT_STOP;
  192. } else if ((state == ONOFF_STATE_ERROR)
  193. && !sys_slist_is_empty(&mgr->clients)) {
  194. evt = EVT_RESET;
  195. } else {
  196. ;
  197. }
  198. return evt;
  199. }
  200. /* Process a transition completion.
  201. *
  202. * If the completion requires notifying clients, the clients are moved
  203. * from the manager to the output list for notification.
  204. */
  205. static void process_complete(struct onoff_manager *mgr,
  206. sys_slist_t *clients,
  207. int res)
  208. {
  209. uint32_t state = mgr->flags & ONOFF_STATE_MASK;
  210. if (res < 0) {
  211. /* Enter ERROR state and notify all clients. */
  212. *clients = mgr->clients;
  213. sys_slist_init(&mgr->clients);
  214. set_state(mgr, ONOFF_STATE_ERROR);
  215. } else if ((state == ONOFF_STATE_TO_ON)
  216. || (state == ONOFF_STATE_RESETTING)) {
  217. *clients = mgr->clients;
  218. sys_slist_init(&mgr->clients);
  219. if (state == ONOFF_STATE_TO_ON) {
  220. struct onoff_client *cp;
  221. /* Increment reference count for all remaining
  222. * clients and enter ON state.
  223. */
  224. SYS_SLIST_FOR_EACH_CONTAINER(clients, cp, node) {
  225. mgr->refs += 1U;
  226. }
  227. set_state(mgr, ONOFF_STATE_ON);
  228. } else {
  229. __ASSERT_NO_MSG(state == ONOFF_STATE_RESETTING);
  230. set_state(mgr, ONOFF_STATE_OFF);
  231. }
  232. if (process_recheck(mgr) != EVT_NOP) {
  233. mgr->flags |= ONOFF_FLAG_RECHECK;
  234. }
  235. } else if (state == ONOFF_STATE_TO_OFF) {
  236. /* Any active clients are requests waiting for this
  237. * transition to complete. Queue a RECHECK event to
  238. * ensure we don't miss them if we don't unlock to
  239. * tell anybody about the completion.
  240. */
  241. set_state(mgr, ONOFF_STATE_OFF);
  242. if (process_recheck(mgr) != EVT_NOP) {
  243. mgr->flags |= ONOFF_FLAG_RECHECK;
  244. }
  245. } else {
  246. __ASSERT_NO_MSG(false);
  247. }
  248. }
  249. /* There are two points in the state machine where the machine is
  250. * unlocked to perform some external action:
  251. * * Initiation of an transition due to some event;
  252. * * Invocation of the user-specified callback when a stable state is
  253. * reached or an error detected.
  254. *
  255. * Events received during these unlocked periods are recorded in the
  256. * state, but processing is deferred to the top-level invocation which
  257. * will loop to handle any events that occurred during the unlocked
  258. * regions.
  259. */
  260. static void process_event(struct onoff_manager *mgr,
  261. int evt,
  262. k_spinlock_key_t key)
  263. {
  264. sys_slist_t clients;
  265. uint32_t state = mgr->flags & ONOFF_STATE_MASK;
  266. int res = 0;
  267. bool processing = ((mgr->flags & ONOFF_FLAG_PROCESSING) != 0);
  268. __ASSERT_NO_MSG(evt != EVT_NOP);
  269. /* If this is a nested call record the event for processing in
  270. * the top invocation.
  271. */
  272. if (processing) {
  273. if (evt == EVT_COMPLETE) {
  274. mgr->flags |= ONOFF_FLAG_COMPLETE;
  275. } else {
  276. __ASSERT_NO_MSG(evt == EVT_RECHECK);
  277. mgr->flags |= ONOFF_FLAG_RECHECK;
  278. }
  279. goto out;
  280. }
  281. sys_slist_init(&clients);
  282. do {
  283. onoff_transition_fn transit = NULL;
  284. if (evt == EVT_RECHECK) {
  285. evt = process_recheck(mgr);
  286. }
  287. if (evt == EVT_NOP) {
  288. break;
  289. }
  290. res = 0;
  291. if (evt == EVT_COMPLETE) {
  292. res = mgr->last_res;
  293. process_complete(mgr, &clients, res);
  294. /* NB: This can trigger a RECHECK */
  295. } else if (evt == EVT_START) {
  296. __ASSERT_NO_MSG(state == ONOFF_STATE_OFF);
  297. __ASSERT_NO_MSG(!sys_slist_is_empty(&mgr->clients));
  298. transit = mgr->transitions->start;
  299. __ASSERT_NO_MSG(transit != NULL);
  300. set_state(mgr, ONOFF_STATE_TO_ON);
  301. } else if (evt == EVT_STOP) {
  302. __ASSERT_NO_MSG(state == ONOFF_STATE_ON);
  303. __ASSERT_NO_MSG(mgr->refs == 0);
  304. transit = mgr->transitions->stop;
  305. __ASSERT_NO_MSG(transit != NULL);
  306. set_state(mgr, ONOFF_STATE_TO_OFF);
  307. } else if (evt == EVT_RESET) {
  308. __ASSERT_NO_MSG(state == ONOFF_STATE_ERROR);
  309. __ASSERT_NO_MSG(!sys_slist_is_empty(&mgr->clients));
  310. transit = mgr->transitions->reset;
  311. __ASSERT_NO_MSG(transit != NULL);
  312. set_state(mgr, ONOFF_STATE_RESETTING);
  313. } else {
  314. __ASSERT_NO_MSG(false);
  315. }
  316. /* Have to unlock and do something if any of:
  317. * * We changed state and there are monitors;
  318. * * We completed a transition and there are clients to notify;
  319. * * We need to initiate a transition.
  320. */
  321. bool do_monitors = (state != (mgr->flags & ONOFF_STATE_MASK))
  322. && !sys_slist_is_empty(&mgr->monitors);
  323. evt = EVT_NOP;
  324. if (do_monitors
  325. || !sys_slist_is_empty(&clients)
  326. || (transit != NULL)) {
  327. uint32_t flags = mgr->flags | ONOFF_FLAG_PROCESSING;
  328. mgr->flags = flags;
  329. state = flags & ONOFF_STATE_MASK;
  330. k_spin_unlock(&mgr->lock, key);
  331. if (do_monitors) {
  332. notify_monitors(mgr, state, res);
  333. }
  334. if (!sys_slist_is_empty(&clients)) {
  335. notify_all(mgr, &clients, state, res);
  336. }
  337. if (transit != NULL) {
  338. transit(mgr, transition_complete);
  339. }
  340. key = k_spin_lock(&mgr->lock);
  341. mgr->flags &= ~ONOFF_FLAG_PROCESSING;
  342. state = mgr->flags & ONOFF_STATE_MASK;
  343. }
  344. /* Process deferred events. Completion takes priority
  345. * over recheck.
  346. */
  347. if ((mgr->flags & ONOFF_FLAG_COMPLETE) != 0) {
  348. mgr->flags &= ~ONOFF_FLAG_COMPLETE;
  349. evt = EVT_COMPLETE;
  350. } else if ((mgr->flags & ONOFF_FLAG_RECHECK) != 0) {
  351. mgr->flags &= ~ONOFF_FLAG_RECHECK;
  352. evt = EVT_RECHECK;
  353. } else {
  354. ;
  355. }
  356. state = mgr->flags & ONOFF_STATE_MASK;
  357. } while (evt != EVT_NOP);
  358. out:
  359. k_spin_unlock(&mgr->lock, key);
  360. }
  361. int onoff_request(struct onoff_manager *mgr,
  362. struct onoff_client *cli)
  363. {
  364. bool add_client = false; /* add client to pending list */
  365. bool start = false; /* trigger a start transition */
  366. bool notify = false; /* do client notification */
  367. int rv = validate_args(mgr, cli);
  368. if (rv < 0) {
  369. return rv;
  370. }
  371. k_spinlock_key_t key = k_spin_lock(&mgr->lock);
  372. uint32_t state = mgr->flags & ONOFF_STATE_MASK;
  373. /* Reject if this would overflow the reference count. */
  374. if (mgr->refs == SERVICE_REFS_MAX) {
  375. rv = -EAGAIN;
  376. goto out;
  377. }
  378. rv = state;
  379. if (state == ONOFF_STATE_ON) {
  380. /* Increment reference count, notify in exit */
  381. notify = true;
  382. mgr->refs += 1U;
  383. } else if ((state == ONOFF_STATE_OFF)
  384. || (state == ONOFF_STATE_TO_OFF)
  385. || (state == ONOFF_STATE_TO_ON)) {
  386. /* Start if OFF, queue client */
  387. start = (state == ONOFF_STATE_OFF);
  388. add_client = true;
  389. } else if (state == ONOFF_STATE_RESETTING) {
  390. rv = -ENOTSUP;
  391. } else {
  392. __ASSERT_NO_MSG(state == ONOFF_STATE_ERROR);
  393. rv = -EIO;
  394. }
  395. out:
  396. if (add_client) {
  397. sys_slist_append(&mgr->clients, &cli->node);
  398. }
  399. if (start) {
  400. process_event(mgr, EVT_RECHECK, key);
  401. } else {
  402. k_spin_unlock(&mgr->lock, key);
  403. if (notify) {
  404. notify_one(mgr, cli, state, 0);
  405. }
  406. }
  407. return rv;
  408. }
  409. int onoff_release(struct onoff_manager *mgr)
  410. {
  411. bool stop = false; /* trigger a stop transition */
  412. k_spinlock_key_t key = k_spin_lock(&mgr->lock);
  413. uint32_t state = mgr->flags & ONOFF_STATE_MASK;
  414. int rv = state;
  415. if (state != ONOFF_STATE_ON) {
  416. if (state == ONOFF_STATE_ERROR) {
  417. rv = -EIO;
  418. } else {
  419. rv = -ENOTSUP;
  420. }
  421. goto out;
  422. }
  423. __ASSERT_NO_MSG(mgr->refs > 0);
  424. mgr->refs -= 1U;
  425. stop = (mgr->refs == 0);
  426. out:
  427. if (stop) {
  428. process_event(mgr, EVT_RECHECK, key);
  429. } else {
  430. k_spin_unlock(&mgr->lock, key);
  431. }
  432. return rv;
  433. }
  434. int onoff_reset(struct onoff_manager *mgr,
  435. struct onoff_client *cli)
  436. {
  437. bool reset = false;
  438. int rv = validate_args(mgr, cli);
  439. if ((rv >= 0)
  440. && (mgr->transitions->reset == NULL)) {
  441. rv = -ENOTSUP;
  442. }
  443. if (rv < 0) {
  444. return rv;
  445. }
  446. k_spinlock_key_t key = k_spin_lock(&mgr->lock);
  447. uint32_t state = mgr->flags & ONOFF_STATE_MASK;
  448. rv = state;
  449. if ((state & ONOFF_FLAG_ERROR) == 0) {
  450. rv = -EALREADY;
  451. } else {
  452. reset = (state != ONOFF_STATE_RESETTING);
  453. sys_slist_append(&mgr->clients, &cli->node);
  454. }
  455. if (reset) {
  456. process_event(mgr, EVT_RECHECK, key);
  457. } else {
  458. k_spin_unlock(&mgr->lock, key);
  459. }
  460. return rv;
  461. }
  462. int onoff_cancel(struct onoff_manager *mgr,
  463. struct onoff_client *cli)
  464. {
  465. if ((mgr == NULL) || (cli == NULL)) {
  466. return -EINVAL;
  467. }
  468. int rv = -EALREADY;
  469. k_spinlock_key_t key = k_spin_lock(&mgr->lock);
  470. uint32_t state = mgr->flags & ONOFF_STATE_MASK;
  471. if (sys_slist_find_and_remove(&mgr->clients, &cli->node)) {
  472. __ASSERT_NO_MSG((state == ONOFF_STATE_TO_ON)
  473. || (state == ONOFF_STATE_TO_OFF)
  474. || (state == ONOFF_STATE_RESETTING));
  475. rv = state;
  476. }
  477. k_spin_unlock(&mgr->lock, key);
  478. return rv;
  479. }
  480. int onoff_monitor_register(struct onoff_manager *mgr,
  481. struct onoff_monitor *mon)
  482. {
  483. if ((mgr == NULL)
  484. || (mon == NULL)
  485. || (mon->callback == NULL)) {
  486. return -EINVAL;
  487. }
  488. k_spinlock_key_t key = k_spin_lock(&mgr->lock);
  489. sys_slist_append(&mgr->monitors, &mon->node);
  490. k_spin_unlock(&mgr->lock, key);
  491. return 0;
  492. }
  493. int onoff_monitor_unregister(struct onoff_manager *mgr,
  494. struct onoff_monitor *mon)
  495. {
  496. int rv = -EINVAL;
  497. if ((mgr == NULL)
  498. || (mon == NULL)) {
  499. return rv;
  500. }
  501. k_spinlock_key_t key = k_spin_lock(&mgr->lock);
  502. if (sys_slist_find_and_remove(&mgr->monitors, &mon->node)) {
  503. rv = 0;
  504. }
  505. k_spin_unlock(&mgr->lock, key);
  506. return rv;
  507. }
  508. int onoff_sync_lock(struct onoff_sync_service *srv,
  509. k_spinlock_key_t *keyp)
  510. {
  511. *keyp = k_spin_lock(&srv->lock);
  512. return srv->count;
  513. }
  514. int onoff_sync_finalize(struct onoff_sync_service *srv,
  515. k_spinlock_key_t key,
  516. struct onoff_client *cli,
  517. int res,
  518. bool on)
  519. {
  520. uint32_t state = ONOFF_STATE_ON;
  521. /* Clear errors visible when locked. If they are to be
  522. * preserved the caller must finalize with the previous
  523. * error code.
  524. */
  525. if (srv->count < 0) {
  526. srv->count = 0;
  527. }
  528. if (res < 0) {
  529. srv->count = res;
  530. state = ONOFF_STATE_ERROR;
  531. } else if (on) {
  532. srv->count += 1;
  533. } else {
  534. srv->count -= 1;
  535. /* state would be either off or on, but since
  536. * callbacks are used only when turning on don't
  537. * bother changing it.
  538. */
  539. }
  540. int rv = srv->count;
  541. k_spin_unlock(&srv->lock, key);
  542. if (cli) {
  543. /* Detect service mis-use: onoff does not callback on transition
  544. * to off, so no client should have been passed.
  545. */
  546. __ASSERT_NO_MSG(on);
  547. notify_one(NULL, cli, state, res);
  548. }
  549. return rv;
  550. }