18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
28c2ecf20Sopenharmony_ci
38c2ecf20Sopenharmony_ci#include <linux/types.h>
48c2ecf20Sopenharmony_ci#include <linux/kconfig.h>
58c2ecf20Sopenharmony_ci#include <linux/list.h>
68c2ecf20Sopenharmony_ci#include <linux/slab.h>
78c2ecf20Sopenharmony_ci#include <linux/security.h>
88c2ecf20Sopenharmony_ci#include <linux/highmem.h>
98c2ecf20Sopenharmony_ci#include <linux/umh.h>
108c2ecf20Sopenharmony_ci#include <linux/sysctl.h>
118c2ecf20Sopenharmony_ci#include <linux/vmalloc.h>
128c2ecf20Sopenharmony_ci#include <linux/module.h>
138c2ecf20Sopenharmony_ci
148c2ecf20Sopenharmony_ci#include "fallback.h"
158c2ecf20Sopenharmony_ci#include "firmware.h"
168c2ecf20Sopenharmony_ci
178c2ecf20Sopenharmony_ci/*
188c2ecf20Sopenharmony_ci * firmware fallback mechanism
198c2ecf20Sopenharmony_ci */
208c2ecf20Sopenharmony_ci
218c2ecf20Sopenharmony_ciMODULE_IMPORT_NS(FIRMWARE_LOADER_PRIVATE);
228c2ecf20Sopenharmony_ci
238c2ecf20Sopenharmony_ciextern struct firmware_fallback_config fw_fallback_config;
248c2ecf20Sopenharmony_ci
258c2ecf20Sopenharmony_ci/* These getters are vetted to use int properly */
268c2ecf20Sopenharmony_cistatic inline int __firmware_loading_timeout(void)
278c2ecf20Sopenharmony_ci{
288c2ecf20Sopenharmony_ci	return fw_fallback_config.loading_timeout;
298c2ecf20Sopenharmony_ci}
308c2ecf20Sopenharmony_ci
318c2ecf20Sopenharmony_ci/* These setters are vetted to use int properly */
328c2ecf20Sopenharmony_cistatic void __fw_fallback_set_timeout(int timeout)
338c2ecf20Sopenharmony_ci{
348c2ecf20Sopenharmony_ci	fw_fallback_config.loading_timeout = timeout;
358c2ecf20Sopenharmony_ci}
368c2ecf20Sopenharmony_ci
378c2ecf20Sopenharmony_ci/*
388c2ecf20Sopenharmony_ci * use small loading timeout for caching devices' firmware because all these
398c2ecf20Sopenharmony_ci * firmware images have been loaded successfully at lease once, also system is
408c2ecf20Sopenharmony_ci * ready for completing firmware loading now. The maximum size of firmware in
418c2ecf20Sopenharmony_ci * current distributions is about 2M bytes, so 10 secs should be enough.
428c2ecf20Sopenharmony_ci */
438c2ecf20Sopenharmony_civoid fw_fallback_set_cache_timeout(void)
448c2ecf20Sopenharmony_ci{
458c2ecf20Sopenharmony_ci	fw_fallback_config.old_timeout = __firmware_loading_timeout();
468c2ecf20Sopenharmony_ci	__fw_fallback_set_timeout(10);
478c2ecf20Sopenharmony_ci}
488c2ecf20Sopenharmony_ci
498c2ecf20Sopenharmony_ci/* Restores the timeout to the value last configured during normal operation */
508c2ecf20Sopenharmony_civoid fw_fallback_set_default_timeout(void)
518c2ecf20Sopenharmony_ci{
528c2ecf20Sopenharmony_ci	__fw_fallback_set_timeout(fw_fallback_config.old_timeout);
538c2ecf20Sopenharmony_ci}
548c2ecf20Sopenharmony_ci
558c2ecf20Sopenharmony_cistatic long firmware_loading_timeout(void)
568c2ecf20Sopenharmony_ci{
578c2ecf20Sopenharmony_ci	return __firmware_loading_timeout() > 0 ?
588c2ecf20Sopenharmony_ci		__firmware_loading_timeout() * HZ : MAX_JIFFY_OFFSET;
598c2ecf20Sopenharmony_ci}
608c2ecf20Sopenharmony_ci
618c2ecf20Sopenharmony_cistatic inline bool fw_sysfs_done(struct fw_priv *fw_priv)
628c2ecf20Sopenharmony_ci{
638c2ecf20Sopenharmony_ci	return __fw_state_check(fw_priv, FW_STATUS_DONE);
648c2ecf20Sopenharmony_ci}
658c2ecf20Sopenharmony_ci
668c2ecf20Sopenharmony_cistatic inline bool fw_sysfs_loading(struct fw_priv *fw_priv)
678c2ecf20Sopenharmony_ci{
688c2ecf20Sopenharmony_ci	return __fw_state_check(fw_priv, FW_STATUS_LOADING);
698c2ecf20Sopenharmony_ci}
708c2ecf20Sopenharmony_ci
718c2ecf20Sopenharmony_cistatic inline int fw_sysfs_wait_timeout(struct fw_priv *fw_priv,  long timeout)
728c2ecf20Sopenharmony_ci{
738c2ecf20Sopenharmony_ci	return __fw_state_wait_common(fw_priv, timeout);
748c2ecf20Sopenharmony_ci}
758c2ecf20Sopenharmony_ci
768c2ecf20Sopenharmony_cistruct fw_sysfs {
778c2ecf20Sopenharmony_ci	bool nowait;
788c2ecf20Sopenharmony_ci	struct device dev;
798c2ecf20Sopenharmony_ci	struct fw_priv *fw_priv;
808c2ecf20Sopenharmony_ci	struct firmware *fw;
818c2ecf20Sopenharmony_ci};
828c2ecf20Sopenharmony_ci
838c2ecf20Sopenharmony_cistatic struct fw_sysfs *to_fw_sysfs(struct device *dev)
848c2ecf20Sopenharmony_ci{
858c2ecf20Sopenharmony_ci	return container_of(dev, struct fw_sysfs, dev);
868c2ecf20Sopenharmony_ci}
878c2ecf20Sopenharmony_ci
888c2ecf20Sopenharmony_cistatic void __fw_load_abort(struct fw_priv *fw_priv)
898c2ecf20Sopenharmony_ci{
908c2ecf20Sopenharmony_ci	/*
918c2ecf20Sopenharmony_ci	 * There is a small window in which user can write to 'loading'
928c2ecf20Sopenharmony_ci	 * between loading done/aborted and disappearance of 'loading'
938c2ecf20Sopenharmony_ci	 */
948c2ecf20Sopenharmony_ci	if (fw_state_is_aborted(fw_priv) || fw_sysfs_done(fw_priv))
958c2ecf20Sopenharmony_ci		return;
968c2ecf20Sopenharmony_ci
978c2ecf20Sopenharmony_ci	fw_state_aborted(fw_priv);
988c2ecf20Sopenharmony_ci}
998c2ecf20Sopenharmony_ci
1008c2ecf20Sopenharmony_cistatic void fw_load_abort(struct fw_sysfs *fw_sysfs)
1018c2ecf20Sopenharmony_ci{
1028c2ecf20Sopenharmony_ci	struct fw_priv *fw_priv = fw_sysfs->fw_priv;
1038c2ecf20Sopenharmony_ci
1048c2ecf20Sopenharmony_ci	__fw_load_abort(fw_priv);
1058c2ecf20Sopenharmony_ci}
1068c2ecf20Sopenharmony_ci
1078c2ecf20Sopenharmony_cistatic LIST_HEAD(pending_fw_head);
1088c2ecf20Sopenharmony_ci
1098c2ecf20Sopenharmony_civoid kill_pending_fw_fallback_reqs(bool only_kill_custom)
1108c2ecf20Sopenharmony_ci{
1118c2ecf20Sopenharmony_ci	struct fw_priv *fw_priv;
1128c2ecf20Sopenharmony_ci	struct fw_priv *next;
1138c2ecf20Sopenharmony_ci
1148c2ecf20Sopenharmony_ci	mutex_lock(&fw_lock);
1158c2ecf20Sopenharmony_ci	list_for_each_entry_safe(fw_priv, next, &pending_fw_head,
1168c2ecf20Sopenharmony_ci				 pending_list) {
1178c2ecf20Sopenharmony_ci		if (!fw_priv->need_uevent || !only_kill_custom)
1188c2ecf20Sopenharmony_ci			 __fw_load_abort(fw_priv);
1198c2ecf20Sopenharmony_ci	}
1208c2ecf20Sopenharmony_ci	mutex_unlock(&fw_lock);
1218c2ecf20Sopenharmony_ci}
1228c2ecf20Sopenharmony_ci
1238c2ecf20Sopenharmony_cistatic ssize_t timeout_show(struct class *class, struct class_attribute *attr,
1248c2ecf20Sopenharmony_ci			    char *buf)
1258c2ecf20Sopenharmony_ci{
1268c2ecf20Sopenharmony_ci	return sysfs_emit(buf, "%d\n", __firmware_loading_timeout());
1278c2ecf20Sopenharmony_ci}
1288c2ecf20Sopenharmony_ci
1298c2ecf20Sopenharmony_ci/**
1308c2ecf20Sopenharmony_ci * firmware_timeout_store() - set number of seconds to wait for firmware
1318c2ecf20Sopenharmony_ci * @class: device class pointer
1328c2ecf20Sopenharmony_ci * @attr: device attribute pointer
1338c2ecf20Sopenharmony_ci * @buf: buffer to scan for timeout value
1348c2ecf20Sopenharmony_ci * @count: number of bytes in @buf
1358c2ecf20Sopenharmony_ci *
1368c2ecf20Sopenharmony_ci *	Sets the number of seconds to wait for the firmware.  Once
1378c2ecf20Sopenharmony_ci *	this expires an error will be returned to the driver and no
1388c2ecf20Sopenharmony_ci *	firmware will be provided.
1398c2ecf20Sopenharmony_ci *
1408c2ecf20Sopenharmony_ci *	Note: zero means 'wait forever'.
1418c2ecf20Sopenharmony_ci **/
1428c2ecf20Sopenharmony_cistatic ssize_t timeout_store(struct class *class, struct class_attribute *attr,
1438c2ecf20Sopenharmony_ci			     const char *buf, size_t count)
1448c2ecf20Sopenharmony_ci{
1458c2ecf20Sopenharmony_ci	int tmp_loading_timeout = simple_strtol(buf, NULL, 10);
1468c2ecf20Sopenharmony_ci
1478c2ecf20Sopenharmony_ci	if (tmp_loading_timeout < 0)
1488c2ecf20Sopenharmony_ci		tmp_loading_timeout = 0;
1498c2ecf20Sopenharmony_ci
1508c2ecf20Sopenharmony_ci	__fw_fallback_set_timeout(tmp_loading_timeout);
1518c2ecf20Sopenharmony_ci
1528c2ecf20Sopenharmony_ci	return count;
1538c2ecf20Sopenharmony_ci}
1548c2ecf20Sopenharmony_cistatic CLASS_ATTR_RW(timeout);
1558c2ecf20Sopenharmony_ci
1568c2ecf20Sopenharmony_cistatic struct attribute *firmware_class_attrs[] = {
1578c2ecf20Sopenharmony_ci	&class_attr_timeout.attr,
1588c2ecf20Sopenharmony_ci	NULL,
1598c2ecf20Sopenharmony_ci};
1608c2ecf20Sopenharmony_ciATTRIBUTE_GROUPS(firmware_class);
1618c2ecf20Sopenharmony_ci
1628c2ecf20Sopenharmony_cistatic void fw_dev_release(struct device *dev)
1638c2ecf20Sopenharmony_ci{
1648c2ecf20Sopenharmony_ci	struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev);
1658c2ecf20Sopenharmony_ci
1668c2ecf20Sopenharmony_ci	kfree(fw_sysfs);
1678c2ecf20Sopenharmony_ci}
1688c2ecf20Sopenharmony_ci
1698c2ecf20Sopenharmony_cistatic int do_firmware_uevent(struct fw_sysfs *fw_sysfs, struct kobj_uevent_env *env)
1708c2ecf20Sopenharmony_ci{
1718c2ecf20Sopenharmony_ci	if (add_uevent_var(env, "FIRMWARE=%s", fw_sysfs->fw_priv->fw_name))
1728c2ecf20Sopenharmony_ci		return -ENOMEM;
1738c2ecf20Sopenharmony_ci	if (add_uevent_var(env, "TIMEOUT=%i", __firmware_loading_timeout()))
1748c2ecf20Sopenharmony_ci		return -ENOMEM;
1758c2ecf20Sopenharmony_ci	if (add_uevent_var(env, "ASYNC=%d", fw_sysfs->nowait))
1768c2ecf20Sopenharmony_ci		return -ENOMEM;
1778c2ecf20Sopenharmony_ci
1788c2ecf20Sopenharmony_ci	return 0;
1798c2ecf20Sopenharmony_ci}
1808c2ecf20Sopenharmony_ci
1818c2ecf20Sopenharmony_cistatic int firmware_uevent(struct device *dev, struct kobj_uevent_env *env)
1828c2ecf20Sopenharmony_ci{
1838c2ecf20Sopenharmony_ci	struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev);
1848c2ecf20Sopenharmony_ci	int err = 0;
1858c2ecf20Sopenharmony_ci
1868c2ecf20Sopenharmony_ci	mutex_lock(&fw_lock);
1878c2ecf20Sopenharmony_ci	if (fw_sysfs->fw_priv)
1888c2ecf20Sopenharmony_ci		err = do_firmware_uevent(fw_sysfs, env);
1898c2ecf20Sopenharmony_ci	mutex_unlock(&fw_lock);
1908c2ecf20Sopenharmony_ci	return err;
1918c2ecf20Sopenharmony_ci}
1928c2ecf20Sopenharmony_ci
1938c2ecf20Sopenharmony_cistatic struct class firmware_class = {
1948c2ecf20Sopenharmony_ci	.name		= "firmware",
1958c2ecf20Sopenharmony_ci	.class_groups	= firmware_class_groups,
1968c2ecf20Sopenharmony_ci	.dev_uevent	= firmware_uevent,
1978c2ecf20Sopenharmony_ci	.dev_release	= fw_dev_release,
1988c2ecf20Sopenharmony_ci};
1998c2ecf20Sopenharmony_ci
2008c2ecf20Sopenharmony_ciint register_sysfs_loader(void)
2018c2ecf20Sopenharmony_ci{
2028c2ecf20Sopenharmony_ci	return class_register(&firmware_class);
2038c2ecf20Sopenharmony_ci}
2048c2ecf20Sopenharmony_ci
2058c2ecf20Sopenharmony_civoid unregister_sysfs_loader(void)
2068c2ecf20Sopenharmony_ci{
2078c2ecf20Sopenharmony_ci	class_unregister(&firmware_class);
2088c2ecf20Sopenharmony_ci}
2098c2ecf20Sopenharmony_ci
2108c2ecf20Sopenharmony_cistatic ssize_t firmware_loading_show(struct device *dev,
2118c2ecf20Sopenharmony_ci				     struct device_attribute *attr, char *buf)
2128c2ecf20Sopenharmony_ci{
2138c2ecf20Sopenharmony_ci	struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev);
2148c2ecf20Sopenharmony_ci	int loading = 0;
2158c2ecf20Sopenharmony_ci
2168c2ecf20Sopenharmony_ci	mutex_lock(&fw_lock);
2178c2ecf20Sopenharmony_ci	if (fw_sysfs->fw_priv)
2188c2ecf20Sopenharmony_ci		loading = fw_sysfs_loading(fw_sysfs->fw_priv);
2198c2ecf20Sopenharmony_ci	mutex_unlock(&fw_lock);
2208c2ecf20Sopenharmony_ci
2218c2ecf20Sopenharmony_ci	return sysfs_emit(buf, "%d\n", loading);
2228c2ecf20Sopenharmony_ci}
2238c2ecf20Sopenharmony_ci
2248c2ecf20Sopenharmony_ci/**
2258c2ecf20Sopenharmony_ci * firmware_loading_store() - set value in the 'loading' control file
2268c2ecf20Sopenharmony_ci * @dev: device pointer
2278c2ecf20Sopenharmony_ci * @attr: device attribute pointer
2288c2ecf20Sopenharmony_ci * @buf: buffer to scan for loading control value
2298c2ecf20Sopenharmony_ci * @count: number of bytes in @buf
2308c2ecf20Sopenharmony_ci *
2318c2ecf20Sopenharmony_ci *	The relevant values are:
2328c2ecf20Sopenharmony_ci *
2338c2ecf20Sopenharmony_ci *	 1: Start a load, discarding any previous partial load.
2348c2ecf20Sopenharmony_ci *	 0: Conclude the load and hand the data to the driver code.
2358c2ecf20Sopenharmony_ci *	-1: Conclude the load with an error and discard any written data.
2368c2ecf20Sopenharmony_ci **/
2378c2ecf20Sopenharmony_cistatic ssize_t firmware_loading_store(struct device *dev,
2388c2ecf20Sopenharmony_ci				      struct device_attribute *attr,
2398c2ecf20Sopenharmony_ci				      const char *buf, size_t count)
2408c2ecf20Sopenharmony_ci{
2418c2ecf20Sopenharmony_ci	struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev);
2428c2ecf20Sopenharmony_ci	struct fw_priv *fw_priv;
2438c2ecf20Sopenharmony_ci	ssize_t written = count;
2448c2ecf20Sopenharmony_ci	int loading = simple_strtol(buf, NULL, 10);
2458c2ecf20Sopenharmony_ci
2468c2ecf20Sopenharmony_ci	mutex_lock(&fw_lock);
2478c2ecf20Sopenharmony_ci	fw_priv = fw_sysfs->fw_priv;
2488c2ecf20Sopenharmony_ci	if (fw_state_is_aborted(fw_priv))
2498c2ecf20Sopenharmony_ci		goto out;
2508c2ecf20Sopenharmony_ci
2518c2ecf20Sopenharmony_ci	switch (loading) {
2528c2ecf20Sopenharmony_ci	case 1:
2538c2ecf20Sopenharmony_ci		/* discarding any previous partial load */
2548c2ecf20Sopenharmony_ci		if (!fw_sysfs_done(fw_priv)) {
2558c2ecf20Sopenharmony_ci			fw_free_paged_buf(fw_priv);
2568c2ecf20Sopenharmony_ci			fw_state_start(fw_priv);
2578c2ecf20Sopenharmony_ci		}
2588c2ecf20Sopenharmony_ci		break;
2598c2ecf20Sopenharmony_ci	case 0:
2608c2ecf20Sopenharmony_ci		if (fw_sysfs_loading(fw_priv)) {
2618c2ecf20Sopenharmony_ci			int rc;
2628c2ecf20Sopenharmony_ci
2638c2ecf20Sopenharmony_ci			/*
2648c2ecf20Sopenharmony_ci			 * Several loading requests may be pending on
2658c2ecf20Sopenharmony_ci			 * one same firmware buf, so let all requests
2668c2ecf20Sopenharmony_ci			 * see the mapped 'buf->data' once the loading
2678c2ecf20Sopenharmony_ci			 * is completed.
2688c2ecf20Sopenharmony_ci			 * */
2698c2ecf20Sopenharmony_ci			rc = fw_map_paged_buf(fw_priv);
2708c2ecf20Sopenharmony_ci			if (rc)
2718c2ecf20Sopenharmony_ci				dev_err(dev, "%s: map pages failed\n",
2728c2ecf20Sopenharmony_ci					__func__);
2738c2ecf20Sopenharmony_ci			else
2748c2ecf20Sopenharmony_ci				rc = security_kernel_post_load_data(fw_priv->data,
2758c2ecf20Sopenharmony_ci						fw_priv->size,
2768c2ecf20Sopenharmony_ci						LOADING_FIRMWARE, "blob");
2778c2ecf20Sopenharmony_ci
2788c2ecf20Sopenharmony_ci			/*
2798c2ecf20Sopenharmony_ci			 * Same logic as fw_load_abort, only the DONE bit
2808c2ecf20Sopenharmony_ci			 * is ignored and we set ABORT only on failure.
2818c2ecf20Sopenharmony_ci			 */
2828c2ecf20Sopenharmony_ci			if (rc) {
2838c2ecf20Sopenharmony_ci				fw_state_aborted(fw_priv);
2848c2ecf20Sopenharmony_ci				written = rc;
2858c2ecf20Sopenharmony_ci			} else {
2868c2ecf20Sopenharmony_ci				fw_state_done(fw_priv);
2878c2ecf20Sopenharmony_ci			}
2888c2ecf20Sopenharmony_ci			break;
2898c2ecf20Sopenharmony_ci		}
2908c2ecf20Sopenharmony_ci		fallthrough;
2918c2ecf20Sopenharmony_ci	default:
2928c2ecf20Sopenharmony_ci		dev_err(dev, "%s: unexpected value (%d)\n", __func__, loading);
2938c2ecf20Sopenharmony_ci		fallthrough;
2948c2ecf20Sopenharmony_ci	case -1:
2958c2ecf20Sopenharmony_ci		fw_load_abort(fw_sysfs);
2968c2ecf20Sopenharmony_ci		break;
2978c2ecf20Sopenharmony_ci	}
2988c2ecf20Sopenharmony_ciout:
2998c2ecf20Sopenharmony_ci	mutex_unlock(&fw_lock);
3008c2ecf20Sopenharmony_ci	return written;
3018c2ecf20Sopenharmony_ci}
3028c2ecf20Sopenharmony_ci
3038c2ecf20Sopenharmony_cistatic DEVICE_ATTR(loading, 0644, firmware_loading_show, firmware_loading_store);
3048c2ecf20Sopenharmony_ci
3058c2ecf20Sopenharmony_cistatic void firmware_rw_data(struct fw_priv *fw_priv, char *buffer,
3068c2ecf20Sopenharmony_ci			   loff_t offset, size_t count, bool read)
3078c2ecf20Sopenharmony_ci{
3088c2ecf20Sopenharmony_ci	if (read)
3098c2ecf20Sopenharmony_ci		memcpy(buffer, fw_priv->data + offset, count);
3108c2ecf20Sopenharmony_ci	else
3118c2ecf20Sopenharmony_ci		memcpy(fw_priv->data + offset, buffer, count);
3128c2ecf20Sopenharmony_ci}
3138c2ecf20Sopenharmony_ci
3148c2ecf20Sopenharmony_cistatic void firmware_rw(struct fw_priv *fw_priv, char *buffer,
3158c2ecf20Sopenharmony_ci			loff_t offset, size_t count, bool read)
3168c2ecf20Sopenharmony_ci{
3178c2ecf20Sopenharmony_ci	while (count) {
3188c2ecf20Sopenharmony_ci		void *page_data;
3198c2ecf20Sopenharmony_ci		int page_nr = offset >> PAGE_SHIFT;
3208c2ecf20Sopenharmony_ci		int page_ofs = offset & (PAGE_SIZE-1);
3218c2ecf20Sopenharmony_ci		int page_cnt = min_t(size_t, PAGE_SIZE - page_ofs, count);
3228c2ecf20Sopenharmony_ci
3238c2ecf20Sopenharmony_ci		page_data = kmap(fw_priv->pages[page_nr]);
3248c2ecf20Sopenharmony_ci
3258c2ecf20Sopenharmony_ci		if (read)
3268c2ecf20Sopenharmony_ci			memcpy(buffer, page_data + page_ofs, page_cnt);
3278c2ecf20Sopenharmony_ci		else
3288c2ecf20Sopenharmony_ci			memcpy(page_data + page_ofs, buffer, page_cnt);
3298c2ecf20Sopenharmony_ci
3308c2ecf20Sopenharmony_ci		kunmap(fw_priv->pages[page_nr]);
3318c2ecf20Sopenharmony_ci		buffer += page_cnt;
3328c2ecf20Sopenharmony_ci		offset += page_cnt;
3338c2ecf20Sopenharmony_ci		count -= page_cnt;
3348c2ecf20Sopenharmony_ci	}
3358c2ecf20Sopenharmony_ci}
3368c2ecf20Sopenharmony_ci
3378c2ecf20Sopenharmony_cistatic ssize_t firmware_data_read(struct file *filp, struct kobject *kobj,
3388c2ecf20Sopenharmony_ci				  struct bin_attribute *bin_attr,
3398c2ecf20Sopenharmony_ci				  char *buffer, loff_t offset, size_t count)
3408c2ecf20Sopenharmony_ci{
3418c2ecf20Sopenharmony_ci	struct device *dev = kobj_to_dev(kobj);
3428c2ecf20Sopenharmony_ci	struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev);
3438c2ecf20Sopenharmony_ci	struct fw_priv *fw_priv;
3448c2ecf20Sopenharmony_ci	ssize_t ret_count;
3458c2ecf20Sopenharmony_ci
3468c2ecf20Sopenharmony_ci	mutex_lock(&fw_lock);
3478c2ecf20Sopenharmony_ci	fw_priv = fw_sysfs->fw_priv;
3488c2ecf20Sopenharmony_ci	if (!fw_priv || fw_sysfs_done(fw_priv)) {
3498c2ecf20Sopenharmony_ci		ret_count = -ENODEV;
3508c2ecf20Sopenharmony_ci		goto out;
3518c2ecf20Sopenharmony_ci	}
3528c2ecf20Sopenharmony_ci	if (offset > fw_priv->size) {
3538c2ecf20Sopenharmony_ci		ret_count = 0;
3548c2ecf20Sopenharmony_ci		goto out;
3558c2ecf20Sopenharmony_ci	}
3568c2ecf20Sopenharmony_ci	if (count > fw_priv->size - offset)
3578c2ecf20Sopenharmony_ci		count = fw_priv->size - offset;
3588c2ecf20Sopenharmony_ci
3598c2ecf20Sopenharmony_ci	ret_count = count;
3608c2ecf20Sopenharmony_ci
3618c2ecf20Sopenharmony_ci	if (fw_priv->data)
3628c2ecf20Sopenharmony_ci		firmware_rw_data(fw_priv, buffer, offset, count, true);
3638c2ecf20Sopenharmony_ci	else
3648c2ecf20Sopenharmony_ci		firmware_rw(fw_priv, buffer, offset, count, true);
3658c2ecf20Sopenharmony_ci
3668c2ecf20Sopenharmony_ciout:
3678c2ecf20Sopenharmony_ci	mutex_unlock(&fw_lock);
3688c2ecf20Sopenharmony_ci	return ret_count;
3698c2ecf20Sopenharmony_ci}
3708c2ecf20Sopenharmony_ci
3718c2ecf20Sopenharmony_cistatic int fw_realloc_pages(struct fw_sysfs *fw_sysfs, int min_size)
3728c2ecf20Sopenharmony_ci{
3738c2ecf20Sopenharmony_ci	int err;
3748c2ecf20Sopenharmony_ci
3758c2ecf20Sopenharmony_ci	err = fw_grow_paged_buf(fw_sysfs->fw_priv,
3768c2ecf20Sopenharmony_ci				PAGE_ALIGN(min_size) >> PAGE_SHIFT);
3778c2ecf20Sopenharmony_ci	if (err)
3788c2ecf20Sopenharmony_ci		fw_load_abort(fw_sysfs);
3798c2ecf20Sopenharmony_ci	return err;
3808c2ecf20Sopenharmony_ci}
3818c2ecf20Sopenharmony_ci
3828c2ecf20Sopenharmony_ci/**
3838c2ecf20Sopenharmony_ci * firmware_data_write() - write method for firmware
3848c2ecf20Sopenharmony_ci * @filp: open sysfs file
3858c2ecf20Sopenharmony_ci * @kobj: kobject for the device
3868c2ecf20Sopenharmony_ci * @bin_attr: bin_attr structure
3878c2ecf20Sopenharmony_ci * @buffer: buffer being written
3888c2ecf20Sopenharmony_ci * @offset: buffer offset for write in total data store area
3898c2ecf20Sopenharmony_ci * @count: buffer size
3908c2ecf20Sopenharmony_ci *
3918c2ecf20Sopenharmony_ci *	Data written to the 'data' attribute will be later handed to
3928c2ecf20Sopenharmony_ci *	the driver as a firmware image.
3938c2ecf20Sopenharmony_ci **/
3948c2ecf20Sopenharmony_cistatic ssize_t firmware_data_write(struct file *filp, struct kobject *kobj,
3958c2ecf20Sopenharmony_ci				   struct bin_attribute *bin_attr,
3968c2ecf20Sopenharmony_ci				   char *buffer, loff_t offset, size_t count)
3978c2ecf20Sopenharmony_ci{
3988c2ecf20Sopenharmony_ci	struct device *dev = kobj_to_dev(kobj);
3998c2ecf20Sopenharmony_ci	struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev);
4008c2ecf20Sopenharmony_ci	struct fw_priv *fw_priv;
4018c2ecf20Sopenharmony_ci	ssize_t retval;
4028c2ecf20Sopenharmony_ci
4038c2ecf20Sopenharmony_ci	if (!capable(CAP_SYS_RAWIO))
4048c2ecf20Sopenharmony_ci		return -EPERM;
4058c2ecf20Sopenharmony_ci
4068c2ecf20Sopenharmony_ci	mutex_lock(&fw_lock);
4078c2ecf20Sopenharmony_ci	fw_priv = fw_sysfs->fw_priv;
4088c2ecf20Sopenharmony_ci	if (!fw_priv || fw_sysfs_done(fw_priv)) {
4098c2ecf20Sopenharmony_ci		retval = -ENODEV;
4108c2ecf20Sopenharmony_ci		goto out;
4118c2ecf20Sopenharmony_ci	}
4128c2ecf20Sopenharmony_ci
4138c2ecf20Sopenharmony_ci	if (fw_priv->data) {
4148c2ecf20Sopenharmony_ci		if (offset + count > fw_priv->allocated_size) {
4158c2ecf20Sopenharmony_ci			retval = -ENOMEM;
4168c2ecf20Sopenharmony_ci			goto out;
4178c2ecf20Sopenharmony_ci		}
4188c2ecf20Sopenharmony_ci		firmware_rw_data(fw_priv, buffer, offset, count, false);
4198c2ecf20Sopenharmony_ci		retval = count;
4208c2ecf20Sopenharmony_ci	} else {
4218c2ecf20Sopenharmony_ci		retval = fw_realloc_pages(fw_sysfs, offset + count);
4228c2ecf20Sopenharmony_ci		if (retval)
4238c2ecf20Sopenharmony_ci			goto out;
4248c2ecf20Sopenharmony_ci
4258c2ecf20Sopenharmony_ci		retval = count;
4268c2ecf20Sopenharmony_ci		firmware_rw(fw_priv, buffer, offset, count, false);
4278c2ecf20Sopenharmony_ci	}
4288c2ecf20Sopenharmony_ci
4298c2ecf20Sopenharmony_ci	fw_priv->size = max_t(size_t, offset + count, fw_priv->size);
4308c2ecf20Sopenharmony_ciout:
4318c2ecf20Sopenharmony_ci	mutex_unlock(&fw_lock);
4328c2ecf20Sopenharmony_ci	return retval;
4338c2ecf20Sopenharmony_ci}
4348c2ecf20Sopenharmony_ci
4358c2ecf20Sopenharmony_cistatic struct bin_attribute firmware_attr_data = {
4368c2ecf20Sopenharmony_ci	.attr = { .name = "data", .mode = 0644 },
4378c2ecf20Sopenharmony_ci	.size = 0,
4388c2ecf20Sopenharmony_ci	.read = firmware_data_read,
4398c2ecf20Sopenharmony_ci	.write = firmware_data_write,
4408c2ecf20Sopenharmony_ci};
4418c2ecf20Sopenharmony_ci
4428c2ecf20Sopenharmony_cistatic struct attribute *fw_dev_attrs[] = {
4438c2ecf20Sopenharmony_ci	&dev_attr_loading.attr,
4448c2ecf20Sopenharmony_ci	NULL
4458c2ecf20Sopenharmony_ci};
4468c2ecf20Sopenharmony_ci
4478c2ecf20Sopenharmony_cistatic struct bin_attribute *fw_dev_bin_attrs[] = {
4488c2ecf20Sopenharmony_ci	&firmware_attr_data,
4498c2ecf20Sopenharmony_ci	NULL
4508c2ecf20Sopenharmony_ci};
4518c2ecf20Sopenharmony_ci
4528c2ecf20Sopenharmony_cistatic const struct attribute_group fw_dev_attr_group = {
4538c2ecf20Sopenharmony_ci	.attrs = fw_dev_attrs,
4548c2ecf20Sopenharmony_ci	.bin_attrs = fw_dev_bin_attrs,
4558c2ecf20Sopenharmony_ci};
4568c2ecf20Sopenharmony_ci
4578c2ecf20Sopenharmony_cistatic const struct attribute_group *fw_dev_attr_groups[] = {
4588c2ecf20Sopenharmony_ci	&fw_dev_attr_group,
4598c2ecf20Sopenharmony_ci	NULL
4608c2ecf20Sopenharmony_ci};
4618c2ecf20Sopenharmony_ci
4628c2ecf20Sopenharmony_cistatic struct fw_sysfs *
4638c2ecf20Sopenharmony_cifw_create_instance(struct firmware *firmware, const char *fw_name,
4648c2ecf20Sopenharmony_ci		   struct device *device, u32 opt_flags)
4658c2ecf20Sopenharmony_ci{
4668c2ecf20Sopenharmony_ci	struct fw_sysfs *fw_sysfs;
4678c2ecf20Sopenharmony_ci	struct device *f_dev;
4688c2ecf20Sopenharmony_ci
4698c2ecf20Sopenharmony_ci	fw_sysfs = kzalloc(sizeof(*fw_sysfs), GFP_KERNEL);
4708c2ecf20Sopenharmony_ci	if (!fw_sysfs) {
4718c2ecf20Sopenharmony_ci		fw_sysfs = ERR_PTR(-ENOMEM);
4728c2ecf20Sopenharmony_ci		goto exit;
4738c2ecf20Sopenharmony_ci	}
4748c2ecf20Sopenharmony_ci
4758c2ecf20Sopenharmony_ci	fw_sysfs->nowait = !!(opt_flags & FW_OPT_NOWAIT);
4768c2ecf20Sopenharmony_ci	fw_sysfs->fw = firmware;
4778c2ecf20Sopenharmony_ci	f_dev = &fw_sysfs->dev;
4788c2ecf20Sopenharmony_ci
4798c2ecf20Sopenharmony_ci	device_initialize(f_dev);
4808c2ecf20Sopenharmony_ci	dev_set_name(f_dev, "%s", fw_name);
4818c2ecf20Sopenharmony_ci	f_dev->parent = device;
4828c2ecf20Sopenharmony_ci	f_dev->class = &firmware_class;
4838c2ecf20Sopenharmony_ci	f_dev->groups = fw_dev_attr_groups;
4848c2ecf20Sopenharmony_ciexit:
4858c2ecf20Sopenharmony_ci	return fw_sysfs;
4868c2ecf20Sopenharmony_ci}
4878c2ecf20Sopenharmony_ci
4888c2ecf20Sopenharmony_ci/**
4898c2ecf20Sopenharmony_ci * fw_load_sysfs_fallback() - load a firmware via the sysfs fallback mechanism
4908c2ecf20Sopenharmony_ci * @fw_sysfs: firmware sysfs information for the firmware to load
4918c2ecf20Sopenharmony_ci * @timeout: timeout to wait for the load
4928c2ecf20Sopenharmony_ci *
4938c2ecf20Sopenharmony_ci * In charge of constructing a sysfs fallback interface for firmware loading.
4948c2ecf20Sopenharmony_ci **/
4958c2ecf20Sopenharmony_cistatic int fw_load_sysfs_fallback(struct fw_sysfs *fw_sysfs, long timeout)
4968c2ecf20Sopenharmony_ci{
4978c2ecf20Sopenharmony_ci	int retval = 0;
4988c2ecf20Sopenharmony_ci	struct device *f_dev = &fw_sysfs->dev;
4998c2ecf20Sopenharmony_ci	struct fw_priv *fw_priv = fw_sysfs->fw_priv;
5008c2ecf20Sopenharmony_ci
5018c2ecf20Sopenharmony_ci	/* fall back on userspace loading */
5028c2ecf20Sopenharmony_ci	if (!fw_priv->data)
5038c2ecf20Sopenharmony_ci		fw_priv->is_paged_buf = true;
5048c2ecf20Sopenharmony_ci
5058c2ecf20Sopenharmony_ci	dev_set_uevent_suppress(f_dev, true);
5068c2ecf20Sopenharmony_ci
5078c2ecf20Sopenharmony_ci	retval = device_add(f_dev);
5088c2ecf20Sopenharmony_ci	if (retval) {
5098c2ecf20Sopenharmony_ci		dev_err(f_dev, "%s: device_register failed\n", __func__);
5108c2ecf20Sopenharmony_ci		goto err_put_dev;
5118c2ecf20Sopenharmony_ci	}
5128c2ecf20Sopenharmony_ci
5138c2ecf20Sopenharmony_ci	mutex_lock(&fw_lock);
5148c2ecf20Sopenharmony_ci	if (fw_state_is_aborted(fw_priv)) {
5158c2ecf20Sopenharmony_ci		mutex_unlock(&fw_lock);
5168c2ecf20Sopenharmony_ci		retval = -EINTR;
5178c2ecf20Sopenharmony_ci		goto out;
5188c2ecf20Sopenharmony_ci	}
5198c2ecf20Sopenharmony_ci	list_add(&fw_priv->pending_list, &pending_fw_head);
5208c2ecf20Sopenharmony_ci	mutex_unlock(&fw_lock);
5218c2ecf20Sopenharmony_ci
5228c2ecf20Sopenharmony_ci	if (fw_priv->opt_flags & FW_OPT_UEVENT) {
5238c2ecf20Sopenharmony_ci		fw_priv->need_uevent = true;
5248c2ecf20Sopenharmony_ci		dev_set_uevent_suppress(f_dev, false);
5258c2ecf20Sopenharmony_ci		dev_dbg(f_dev, "firmware: requesting %s\n", fw_priv->fw_name);
5268c2ecf20Sopenharmony_ci		kobject_uevent(&fw_sysfs->dev.kobj, KOBJ_ADD);
5278c2ecf20Sopenharmony_ci	} else {
5288c2ecf20Sopenharmony_ci		timeout = MAX_JIFFY_OFFSET;
5298c2ecf20Sopenharmony_ci	}
5308c2ecf20Sopenharmony_ci
5318c2ecf20Sopenharmony_ci	retval = fw_sysfs_wait_timeout(fw_priv, timeout);
5328c2ecf20Sopenharmony_ci	if (retval < 0 && retval != -ENOENT) {
5338c2ecf20Sopenharmony_ci		mutex_lock(&fw_lock);
5348c2ecf20Sopenharmony_ci		fw_load_abort(fw_sysfs);
5358c2ecf20Sopenharmony_ci		mutex_unlock(&fw_lock);
5368c2ecf20Sopenharmony_ci	}
5378c2ecf20Sopenharmony_ci
5388c2ecf20Sopenharmony_ci	if (fw_state_is_aborted(fw_priv)) {
5398c2ecf20Sopenharmony_ci		if (retval == -ERESTARTSYS)
5408c2ecf20Sopenharmony_ci			retval = -EINTR;
5418c2ecf20Sopenharmony_ci	} else if (fw_priv->is_paged_buf && !fw_priv->data)
5428c2ecf20Sopenharmony_ci		retval = -ENOMEM;
5438c2ecf20Sopenharmony_ci
5448c2ecf20Sopenharmony_ciout:
5458c2ecf20Sopenharmony_ci	device_del(f_dev);
5468c2ecf20Sopenharmony_cierr_put_dev:
5478c2ecf20Sopenharmony_ci	put_device(f_dev);
5488c2ecf20Sopenharmony_ci	return retval;
5498c2ecf20Sopenharmony_ci}
5508c2ecf20Sopenharmony_ci
5518c2ecf20Sopenharmony_cistatic int fw_load_from_user_helper(struct firmware *firmware,
5528c2ecf20Sopenharmony_ci				    const char *name, struct device *device,
5538c2ecf20Sopenharmony_ci				    u32 opt_flags)
5548c2ecf20Sopenharmony_ci{
5558c2ecf20Sopenharmony_ci	struct fw_sysfs *fw_sysfs;
5568c2ecf20Sopenharmony_ci	long timeout;
5578c2ecf20Sopenharmony_ci	int ret;
5588c2ecf20Sopenharmony_ci
5598c2ecf20Sopenharmony_ci	timeout = firmware_loading_timeout();
5608c2ecf20Sopenharmony_ci	if (opt_flags & FW_OPT_NOWAIT) {
5618c2ecf20Sopenharmony_ci		timeout = usermodehelper_read_lock_wait(timeout);
5628c2ecf20Sopenharmony_ci		if (!timeout) {
5638c2ecf20Sopenharmony_ci			dev_dbg(device, "firmware: %s loading timed out\n",
5648c2ecf20Sopenharmony_ci				name);
5658c2ecf20Sopenharmony_ci			return -EBUSY;
5668c2ecf20Sopenharmony_ci		}
5678c2ecf20Sopenharmony_ci	} else {
5688c2ecf20Sopenharmony_ci		ret = usermodehelper_read_trylock();
5698c2ecf20Sopenharmony_ci		if (WARN_ON(ret)) {
5708c2ecf20Sopenharmony_ci			dev_err(device, "firmware: %s will not be loaded\n",
5718c2ecf20Sopenharmony_ci				name);
5728c2ecf20Sopenharmony_ci			return ret;
5738c2ecf20Sopenharmony_ci		}
5748c2ecf20Sopenharmony_ci	}
5758c2ecf20Sopenharmony_ci
5768c2ecf20Sopenharmony_ci	fw_sysfs = fw_create_instance(firmware, name, device, opt_flags);
5778c2ecf20Sopenharmony_ci	if (IS_ERR(fw_sysfs)) {
5788c2ecf20Sopenharmony_ci		ret = PTR_ERR(fw_sysfs);
5798c2ecf20Sopenharmony_ci		goto out_unlock;
5808c2ecf20Sopenharmony_ci	}
5818c2ecf20Sopenharmony_ci
5828c2ecf20Sopenharmony_ci	fw_sysfs->fw_priv = firmware->priv;
5838c2ecf20Sopenharmony_ci	ret = fw_load_sysfs_fallback(fw_sysfs, timeout);
5848c2ecf20Sopenharmony_ci
5858c2ecf20Sopenharmony_ci	if (!ret)
5868c2ecf20Sopenharmony_ci		ret = assign_fw(firmware, device);
5878c2ecf20Sopenharmony_ci
5888c2ecf20Sopenharmony_ciout_unlock:
5898c2ecf20Sopenharmony_ci	usermodehelper_read_unlock();
5908c2ecf20Sopenharmony_ci
5918c2ecf20Sopenharmony_ci	return ret;
5928c2ecf20Sopenharmony_ci}
5938c2ecf20Sopenharmony_ci
5948c2ecf20Sopenharmony_cistatic bool fw_force_sysfs_fallback(u32 opt_flags)
5958c2ecf20Sopenharmony_ci{
5968c2ecf20Sopenharmony_ci	if (fw_fallback_config.force_sysfs_fallback)
5978c2ecf20Sopenharmony_ci		return true;
5988c2ecf20Sopenharmony_ci	if (!(opt_flags & FW_OPT_USERHELPER))
5998c2ecf20Sopenharmony_ci		return false;
6008c2ecf20Sopenharmony_ci	return true;
6018c2ecf20Sopenharmony_ci}
6028c2ecf20Sopenharmony_ci
6038c2ecf20Sopenharmony_cistatic bool fw_run_sysfs_fallback(u32 opt_flags)
6048c2ecf20Sopenharmony_ci{
6058c2ecf20Sopenharmony_ci	int ret;
6068c2ecf20Sopenharmony_ci
6078c2ecf20Sopenharmony_ci	if (fw_fallback_config.ignore_sysfs_fallback) {
6088c2ecf20Sopenharmony_ci		pr_info_once("Ignoring firmware sysfs fallback due to sysctl knob\n");
6098c2ecf20Sopenharmony_ci		return false;
6108c2ecf20Sopenharmony_ci	}
6118c2ecf20Sopenharmony_ci
6128c2ecf20Sopenharmony_ci	if ((opt_flags & FW_OPT_NOFALLBACK_SYSFS))
6138c2ecf20Sopenharmony_ci		return false;
6148c2ecf20Sopenharmony_ci
6158c2ecf20Sopenharmony_ci	/* Also permit LSMs and IMA to fail firmware sysfs fallback */
6168c2ecf20Sopenharmony_ci	ret = security_kernel_load_data(LOADING_FIRMWARE, true);
6178c2ecf20Sopenharmony_ci	if (ret < 0)
6188c2ecf20Sopenharmony_ci		return false;
6198c2ecf20Sopenharmony_ci
6208c2ecf20Sopenharmony_ci	return fw_force_sysfs_fallback(opt_flags);
6218c2ecf20Sopenharmony_ci}
6228c2ecf20Sopenharmony_ci
6238c2ecf20Sopenharmony_ci/**
6248c2ecf20Sopenharmony_ci * firmware_fallback_sysfs() - use the fallback mechanism to find firmware
6258c2ecf20Sopenharmony_ci * @fw: pointer to firmware image
6268c2ecf20Sopenharmony_ci * @name: name of firmware file to look for
6278c2ecf20Sopenharmony_ci * @device: device for which firmware is being loaded
6288c2ecf20Sopenharmony_ci * @opt_flags: options to control firmware loading behaviour, as defined by
6298c2ecf20Sopenharmony_ci *	       &enum fw_opt
6308c2ecf20Sopenharmony_ci * @ret: return value from direct lookup which triggered the fallback mechanism
6318c2ecf20Sopenharmony_ci *
6328c2ecf20Sopenharmony_ci * This function is called if direct lookup for the firmware failed, it enables
6338c2ecf20Sopenharmony_ci * a fallback mechanism through userspace by exposing a sysfs loading
6348c2ecf20Sopenharmony_ci * interface. Userspace is in charge of loading the firmware through the sysfs
6358c2ecf20Sopenharmony_ci * loading interface. This sysfs fallback mechanism may be disabled completely
6368c2ecf20Sopenharmony_ci * on a system by setting the proc sysctl value ignore_sysfs_fallback to true.
6378c2ecf20Sopenharmony_ci * If this is false we check if the internal API caller set the
6388c2ecf20Sopenharmony_ci * @FW_OPT_NOFALLBACK_SYSFS flag, if so it would also disable the fallback
6398c2ecf20Sopenharmony_ci * mechanism. A system may want to enforce the sysfs fallback mechanism at all
6408c2ecf20Sopenharmony_ci * times, it can do this by setting ignore_sysfs_fallback to false and
6418c2ecf20Sopenharmony_ci * force_sysfs_fallback to true.
6428c2ecf20Sopenharmony_ci * Enabling force_sysfs_fallback is functionally equivalent to build a kernel
6438c2ecf20Sopenharmony_ci * with CONFIG_FW_LOADER_USER_HELPER_FALLBACK.
6448c2ecf20Sopenharmony_ci **/
6458c2ecf20Sopenharmony_ciint firmware_fallback_sysfs(struct firmware *fw, const char *name,
6468c2ecf20Sopenharmony_ci			    struct device *device,
6478c2ecf20Sopenharmony_ci			    u32 opt_flags,
6488c2ecf20Sopenharmony_ci			    int ret)
6498c2ecf20Sopenharmony_ci{
6508c2ecf20Sopenharmony_ci	if (!fw_run_sysfs_fallback(opt_flags))
6518c2ecf20Sopenharmony_ci		return ret;
6528c2ecf20Sopenharmony_ci
6538c2ecf20Sopenharmony_ci	if (!(opt_flags & FW_OPT_NO_WARN))
6548c2ecf20Sopenharmony_ci		dev_warn(device, "Falling back to sysfs fallback for: %s\n",
6558c2ecf20Sopenharmony_ci				 name);
6568c2ecf20Sopenharmony_ci	else
6578c2ecf20Sopenharmony_ci		dev_dbg(device, "Falling back to sysfs fallback for: %s\n",
6588c2ecf20Sopenharmony_ci				name);
6598c2ecf20Sopenharmony_ci	return fw_load_from_user_helper(fw, name, device, opt_flags);
6608c2ecf20Sopenharmony_ci}
661