treewide: remove redundant IS_ERR() before error code check
[linux/fpc-iii.git] / drivers / soc / fsl / qbman / bman_test_api.c
blob6f6bdd154fe3956f65aa749d6c635d2d7ce15680
1 /* Copyright 2008 - 2016 Freescale Semiconductor, Inc.
3 * Redistribution and use in source and binary forms, with or without
4 * modification, are permitted provided that the following conditions are met:
5 * * Redistributions of source code must retain the above copyright
6 * notice, this list of conditions and the following disclaimer.
7 * * Redistributions in binary form must reproduce the above copyright
8 * notice, this list of conditions and the following disclaimer in the
9 * documentation and/or other materials provided with the distribution.
10 * * Neither the name of Freescale Semiconductor nor the
11 * names of its contributors may be used to endorse or promote products
12 * derived from this software without specific prior written permission.
14 * ALTERNATIVELY, this software may be distributed under the terms of the
15 * GNU General Public License ("GPL") as published by the Free Software
16 * Foundation, either version 2 of that License or (at your option) any
17 * later version.
19 * THIS SOFTWARE IS PROVIDED BY Freescale Semiconductor ``AS IS'' AND ANY
20 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
21 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
22 * DISCLAIMED. IN NO EVENT SHALL Freescale Semiconductor BE LIABLE FOR ANY
23 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
24 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
25 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
26 * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
28 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 #include "bman_test.h"
33 #define NUM_BUFS 93
34 #define LOOPS 3
35 #define BMAN_TOKEN_MASK 0x00FFFFFFFFFFLLU
37 static struct bman_pool *pool;
38 static struct bm_buffer bufs_in[NUM_BUFS] ____cacheline_aligned;
39 static struct bm_buffer bufs_out[NUM_BUFS] ____cacheline_aligned;
40 static int bufs_received;
42 static void bufs_init(void)
44 int i;
46 for (i = 0; i < NUM_BUFS; i++)
47 bm_buffer_set64(&bufs_in[i], 0xfedc01234567LLU * i);
48 bufs_received = 0;
51 static inline int bufs_cmp(const struct bm_buffer *a, const struct bm_buffer *b)
53 if (bman_ip_rev == BMAN_REV20 || bman_ip_rev == BMAN_REV21) {
56 * On SoCs with BMan revison 2.0, BMan only respects the 40
57 * LS-bits of buffer addresses, masking off the upper 8-bits on
58 * release commands. The API provides for 48-bit addresses
59 * because some SoCs support all 48-bits. When generating
60 * garbage addresses for testing, we either need to zero the
61 * upper 8-bits when releasing to BMan (otherwise we'll be
62 * disappointed when the buffers we acquire back from BMan
63 * don't match), or we need to mask the upper 8-bits off when
64 * comparing. We do the latter.
66 if ((bm_buffer_get64(a) & BMAN_TOKEN_MASK) <
67 (bm_buffer_get64(b) & BMAN_TOKEN_MASK))
68 return -1;
69 if ((bm_buffer_get64(a) & BMAN_TOKEN_MASK) >
70 (bm_buffer_get64(b) & BMAN_TOKEN_MASK))
71 return 1;
72 } else {
73 if (bm_buffer_get64(a) < bm_buffer_get64(b))
74 return -1;
75 if (bm_buffer_get64(a) > bm_buffer_get64(b))
76 return 1;
79 return 0;
82 static void bufs_confirm(void)
84 int i, j;
86 for (i = 0; i < NUM_BUFS; i++) {
87 int matches = 0;
89 for (j = 0; j < NUM_BUFS; j++)
90 if (!bufs_cmp(&bufs_in[i], &bufs_out[j]))
91 matches++;
92 WARN_ON(matches != 1);
96 /* test */
97 void bman_test_api(void)
99 int i, loops = LOOPS;
101 bufs_init();
103 pr_info("%s(): Starting\n", __func__);
105 pool = bman_new_pool();
106 if (!pool) {
107 pr_crit("bman_new_pool() failed\n");
108 goto failed;
111 /* Release buffers */
112 do_loop:
113 i = 0;
114 while (i < NUM_BUFS) {
115 int num = 8;
117 if (i + num > NUM_BUFS)
118 num = NUM_BUFS - i;
119 if (bman_release(pool, bufs_in + i, num)) {
120 pr_crit("bman_release() failed\n");
121 goto failed;
123 i += num;
126 /* Acquire buffers */
127 while (i > 0) {
128 int tmp, num = 8;
130 if (num > i)
131 num = i;
132 tmp = bman_acquire(pool, bufs_out + i - num, num);
133 WARN_ON(tmp != num);
134 i -= num;
136 i = bman_acquire(pool, NULL, 1);
137 WARN_ON(i > 0);
139 bufs_confirm();
141 if (--loops)
142 goto do_loop;
144 /* Clean up */
145 bman_free_pool(pool);
146 pr_info("%s(): Finished\n", __func__);
147 return;
149 failed:
150 WARN_ON(1);