18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 28c2ecf20Sopenharmony_ci 38c2ecf20Sopenharmony_ci#include <linux/types.h> 48c2ecf20Sopenharmony_ci#include <linux/kconfig.h> 58c2ecf20Sopenharmony_ci#include <linux/list.h> 68c2ecf20Sopenharmony_ci#include <linux/slab.h> 78c2ecf20Sopenharmony_ci#include <linux/security.h> 88c2ecf20Sopenharmony_ci#include <linux/highmem.h> 98c2ecf20Sopenharmony_ci#include <linux/umh.h> 108c2ecf20Sopenharmony_ci#include <linux/sysctl.h> 118c2ecf20Sopenharmony_ci#include <linux/vmalloc.h> 128c2ecf20Sopenharmony_ci#include <linux/module.h> 138c2ecf20Sopenharmony_ci 148c2ecf20Sopenharmony_ci#include "fallback.h" 158c2ecf20Sopenharmony_ci#include "firmware.h" 168c2ecf20Sopenharmony_ci 178c2ecf20Sopenharmony_ci/* 188c2ecf20Sopenharmony_ci * firmware fallback mechanism 198c2ecf20Sopenharmony_ci */ 208c2ecf20Sopenharmony_ci 218c2ecf20Sopenharmony_ciMODULE_IMPORT_NS(FIRMWARE_LOADER_PRIVATE); 228c2ecf20Sopenharmony_ci 238c2ecf20Sopenharmony_ciextern struct firmware_fallback_config fw_fallback_config; 248c2ecf20Sopenharmony_ci 258c2ecf20Sopenharmony_ci/* These getters are vetted to use int properly */ 268c2ecf20Sopenharmony_cistatic inline int __firmware_loading_timeout(void) 278c2ecf20Sopenharmony_ci{ 288c2ecf20Sopenharmony_ci return fw_fallback_config.loading_timeout; 298c2ecf20Sopenharmony_ci} 308c2ecf20Sopenharmony_ci 318c2ecf20Sopenharmony_ci/* These setters are vetted to use int properly */ 328c2ecf20Sopenharmony_cistatic void __fw_fallback_set_timeout(int timeout) 338c2ecf20Sopenharmony_ci{ 348c2ecf20Sopenharmony_ci fw_fallback_config.loading_timeout = timeout; 358c2ecf20Sopenharmony_ci} 368c2ecf20Sopenharmony_ci 378c2ecf20Sopenharmony_ci/* 388c2ecf20Sopenharmony_ci * use small loading timeout for caching devices' firmware because all these 398c2ecf20Sopenharmony_ci * firmware images have been loaded successfully at lease once, also system is 408c2ecf20Sopenharmony_ci * ready for completing firmware loading now. The maximum size of firmware in 418c2ecf20Sopenharmony_ci * current distributions is about 2M bytes, so 10 secs should be enough. 428c2ecf20Sopenharmony_ci */ 438c2ecf20Sopenharmony_civoid fw_fallback_set_cache_timeout(void) 448c2ecf20Sopenharmony_ci{ 458c2ecf20Sopenharmony_ci fw_fallback_config.old_timeout = __firmware_loading_timeout(); 468c2ecf20Sopenharmony_ci __fw_fallback_set_timeout(10); 478c2ecf20Sopenharmony_ci} 488c2ecf20Sopenharmony_ci 498c2ecf20Sopenharmony_ci/* Restores the timeout to the value last configured during normal operation */ 508c2ecf20Sopenharmony_civoid fw_fallback_set_default_timeout(void) 518c2ecf20Sopenharmony_ci{ 528c2ecf20Sopenharmony_ci __fw_fallback_set_timeout(fw_fallback_config.old_timeout); 538c2ecf20Sopenharmony_ci} 548c2ecf20Sopenharmony_ci 558c2ecf20Sopenharmony_cistatic long firmware_loading_timeout(void) 568c2ecf20Sopenharmony_ci{ 578c2ecf20Sopenharmony_ci return __firmware_loading_timeout() > 0 ? 588c2ecf20Sopenharmony_ci __firmware_loading_timeout() * HZ : MAX_JIFFY_OFFSET; 598c2ecf20Sopenharmony_ci} 608c2ecf20Sopenharmony_ci 618c2ecf20Sopenharmony_cistatic inline bool fw_sysfs_done(struct fw_priv *fw_priv) 628c2ecf20Sopenharmony_ci{ 638c2ecf20Sopenharmony_ci return __fw_state_check(fw_priv, FW_STATUS_DONE); 648c2ecf20Sopenharmony_ci} 658c2ecf20Sopenharmony_ci 668c2ecf20Sopenharmony_cistatic inline bool fw_sysfs_loading(struct fw_priv *fw_priv) 678c2ecf20Sopenharmony_ci{ 688c2ecf20Sopenharmony_ci return __fw_state_check(fw_priv, FW_STATUS_LOADING); 698c2ecf20Sopenharmony_ci} 708c2ecf20Sopenharmony_ci 718c2ecf20Sopenharmony_cistatic inline int fw_sysfs_wait_timeout(struct fw_priv *fw_priv, long timeout) 728c2ecf20Sopenharmony_ci{ 738c2ecf20Sopenharmony_ci return __fw_state_wait_common(fw_priv, timeout); 748c2ecf20Sopenharmony_ci} 758c2ecf20Sopenharmony_ci 768c2ecf20Sopenharmony_cistruct fw_sysfs { 778c2ecf20Sopenharmony_ci bool nowait; 788c2ecf20Sopenharmony_ci struct device dev; 798c2ecf20Sopenharmony_ci struct fw_priv *fw_priv; 808c2ecf20Sopenharmony_ci struct firmware *fw; 818c2ecf20Sopenharmony_ci}; 828c2ecf20Sopenharmony_ci 838c2ecf20Sopenharmony_cistatic struct fw_sysfs *to_fw_sysfs(struct device *dev) 848c2ecf20Sopenharmony_ci{ 858c2ecf20Sopenharmony_ci return container_of(dev, struct fw_sysfs, dev); 868c2ecf20Sopenharmony_ci} 878c2ecf20Sopenharmony_ci 888c2ecf20Sopenharmony_cistatic void __fw_load_abort(struct fw_priv *fw_priv) 898c2ecf20Sopenharmony_ci{ 908c2ecf20Sopenharmony_ci /* 918c2ecf20Sopenharmony_ci * There is a small window in which user can write to 'loading' 928c2ecf20Sopenharmony_ci * between loading done/aborted and disappearance of 'loading' 938c2ecf20Sopenharmony_ci */ 948c2ecf20Sopenharmony_ci if (fw_state_is_aborted(fw_priv) || fw_sysfs_done(fw_priv)) 958c2ecf20Sopenharmony_ci return; 968c2ecf20Sopenharmony_ci 978c2ecf20Sopenharmony_ci fw_state_aborted(fw_priv); 988c2ecf20Sopenharmony_ci} 998c2ecf20Sopenharmony_ci 1008c2ecf20Sopenharmony_cistatic void fw_load_abort(struct fw_sysfs *fw_sysfs) 1018c2ecf20Sopenharmony_ci{ 1028c2ecf20Sopenharmony_ci struct fw_priv *fw_priv = fw_sysfs->fw_priv; 1038c2ecf20Sopenharmony_ci 1048c2ecf20Sopenharmony_ci __fw_load_abort(fw_priv); 1058c2ecf20Sopenharmony_ci} 1068c2ecf20Sopenharmony_ci 1078c2ecf20Sopenharmony_cistatic LIST_HEAD(pending_fw_head); 1088c2ecf20Sopenharmony_ci 1098c2ecf20Sopenharmony_civoid kill_pending_fw_fallback_reqs(bool only_kill_custom) 1108c2ecf20Sopenharmony_ci{ 1118c2ecf20Sopenharmony_ci struct fw_priv *fw_priv; 1128c2ecf20Sopenharmony_ci struct fw_priv *next; 1138c2ecf20Sopenharmony_ci 1148c2ecf20Sopenharmony_ci mutex_lock(&fw_lock); 1158c2ecf20Sopenharmony_ci list_for_each_entry_safe(fw_priv, next, &pending_fw_head, 1168c2ecf20Sopenharmony_ci pending_list) { 1178c2ecf20Sopenharmony_ci if (!fw_priv->need_uevent || !only_kill_custom) 1188c2ecf20Sopenharmony_ci __fw_load_abort(fw_priv); 1198c2ecf20Sopenharmony_ci } 1208c2ecf20Sopenharmony_ci mutex_unlock(&fw_lock); 1218c2ecf20Sopenharmony_ci} 1228c2ecf20Sopenharmony_ci 1238c2ecf20Sopenharmony_cistatic ssize_t timeout_show(struct class *class, struct class_attribute *attr, 1248c2ecf20Sopenharmony_ci char *buf) 1258c2ecf20Sopenharmony_ci{ 1268c2ecf20Sopenharmony_ci return sysfs_emit(buf, "%d\n", __firmware_loading_timeout()); 1278c2ecf20Sopenharmony_ci} 1288c2ecf20Sopenharmony_ci 1298c2ecf20Sopenharmony_ci/** 1308c2ecf20Sopenharmony_ci * firmware_timeout_store() - set number of seconds to wait for firmware 1318c2ecf20Sopenharmony_ci * @class: device class pointer 1328c2ecf20Sopenharmony_ci * @attr: device attribute pointer 1338c2ecf20Sopenharmony_ci * @buf: buffer to scan for timeout value 1348c2ecf20Sopenharmony_ci * @count: number of bytes in @buf 1358c2ecf20Sopenharmony_ci * 1368c2ecf20Sopenharmony_ci * Sets the number of seconds to wait for the firmware. Once 1378c2ecf20Sopenharmony_ci * this expires an error will be returned to the driver and no 1388c2ecf20Sopenharmony_ci * firmware will be provided. 1398c2ecf20Sopenharmony_ci * 1408c2ecf20Sopenharmony_ci * Note: zero means 'wait forever'. 1418c2ecf20Sopenharmony_ci **/ 1428c2ecf20Sopenharmony_cistatic ssize_t timeout_store(struct class *class, struct class_attribute *attr, 1438c2ecf20Sopenharmony_ci const char *buf, size_t count) 1448c2ecf20Sopenharmony_ci{ 1458c2ecf20Sopenharmony_ci int tmp_loading_timeout = simple_strtol(buf, NULL, 10); 1468c2ecf20Sopenharmony_ci 1478c2ecf20Sopenharmony_ci if (tmp_loading_timeout < 0) 1488c2ecf20Sopenharmony_ci tmp_loading_timeout = 0; 1498c2ecf20Sopenharmony_ci 1508c2ecf20Sopenharmony_ci __fw_fallback_set_timeout(tmp_loading_timeout); 1518c2ecf20Sopenharmony_ci 1528c2ecf20Sopenharmony_ci return count; 1538c2ecf20Sopenharmony_ci} 1548c2ecf20Sopenharmony_cistatic CLASS_ATTR_RW(timeout); 1558c2ecf20Sopenharmony_ci 1568c2ecf20Sopenharmony_cistatic struct attribute *firmware_class_attrs[] = { 1578c2ecf20Sopenharmony_ci &class_attr_timeout.attr, 1588c2ecf20Sopenharmony_ci NULL, 1598c2ecf20Sopenharmony_ci}; 1608c2ecf20Sopenharmony_ciATTRIBUTE_GROUPS(firmware_class); 1618c2ecf20Sopenharmony_ci 1628c2ecf20Sopenharmony_cistatic void fw_dev_release(struct device *dev) 1638c2ecf20Sopenharmony_ci{ 1648c2ecf20Sopenharmony_ci struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev); 1658c2ecf20Sopenharmony_ci 1668c2ecf20Sopenharmony_ci kfree(fw_sysfs); 1678c2ecf20Sopenharmony_ci} 1688c2ecf20Sopenharmony_ci 1698c2ecf20Sopenharmony_cistatic int do_firmware_uevent(struct fw_sysfs *fw_sysfs, struct kobj_uevent_env *env) 1708c2ecf20Sopenharmony_ci{ 1718c2ecf20Sopenharmony_ci if (add_uevent_var(env, "FIRMWARE=%s", fw_sysfs->fw_priv->fw_name)) 1728c2ecf20Sopenharmony_ci return -ENOMEM; 1738c2ecf20Sopenharmony_ci if (add_uevent_var(env, "TIMEOUT=%i", __firmware_loading_timeout())) 1748c2ecf20Sopenharmony_ci return -ENOMEM; 1758c2ecf20Sopenharmony_ci if (add_uevent_var(env, "ASYNC=%d", fw_sysfs->nowait)) 1768c2ecf20Sopenharmony_ci return -ENOMEM; 1778c2ecf20Sopenharmony_ci 1788c2ecf20Sopenharmony_ci return 0; 1798c2ecf20Sopenharmony_ci} 1808c2ecf20Sopenharmony_ci 1818c2ecf20Sopenharmony_cistatic int firmware_uevent(struct device *dev, struct kobj_uevent_env *env) 1828c2ecf20Sopenharmony_ci{ 1838c2ecf20Sopenharmony_ci struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev); 1848c2ecf20Sopenharmony_ci int err = 0; 1858c2ecf20Sopenharmony_ci 1868c2ecf20Sopenharmony_ci mutex_lock(&fw_lock); 1878c2ecf20Sopenharmony_ci if (fw_sysfs->fw_priv) 1888c2ecf20Sopenharmony_ci err = do_firmware_uevent(fw_sysfs, env); 1898c2ecf20Sopenharmony_ci mutex_unlock(&fw_lock); 1908c2ecf20Sopenharmony_ci return err; 1918c2ecf20Sopenharmony_ci} 1928c2ecf20Sopenharmony_ci 1938c2ecf20Sopenharmony_cistatic struct class firmware_class = { 1948c2ecf20Sopenharmony_ci .name = "firmware", 1958c2ecf20Sopenharmony_ci .class_groups = firmware_class_groups, 1968c2ecf20Sopenharmony_ci .dev_uevent = firmware_uevent, 1978c2ecf20Sopenharmony_ci .dev_release = fw_dev_release, 1988c2ecf20Sopenharmony_ci}; 1998c2ecf20Sopenharmony_ci 2008c2ecf20Sopenharmony_ciint register_sysfs_loader(void) 2018c2ecf20Sopenharmony_ci{ 2028c2ecf20Sopenharmony_ci return class_register(&firmware_class); 2038c2ecf20Sopenharmony_ci} 2048c2ecf20Sopenharmony_ci 2058c2ecf20Sopenharmony_civoid unregister_sysfs_loader(void) 2068c2ecf20Sopenharmony_ci{ 2078c2ecf20Sopenharmony_ci class_unregister(&firmware_class); 2088c2ecf20Sopenharmony_ci} 2098c2ecf20Sopenharmony_ci 2108c2ecf20Sopenharmony_cistatic ssize_t firmware_loading_show(struct device *dev, 2118c2ecf20Sopenharmony_ci struct device_attribute *attr, char *buf) 2128c2ecf20Sopenharmony_ci{ 2138c2ecf20Sopenharmony_ci struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev); 2148c2ecf20Sopenharmony_ci int loading = 0; 2158c2ecf20Sopenharmony_ci 2168c2ecf20Sopenharmony_ci mutex_lock(&fw_lock); 2178c2ecf20Sopenharmony_ci if (fw_sysfs->fw_priv) 2188c2ecf20Sopenharmony_ci loading = fw_sysfs_loading(fw_sysfs->fw_priv); 2198c2ecf20Sopenharmony_ci mutex_unlock(&fw_lock); 2208c2ecf20Sopenharmony_ci 2218c2ecf20Sopenharmony_ci return sysfs_emit(buf, "%d\n", loading); 2228c2ecf20Sopenharmony_ci} 2238c2ecf20Sopenharmony_ci 2248c2ecf20Sopenharmony_ci/** 2258c2ecf20Sopenharmony_ci * firmware_loading_store() - set value in the 'loading' control file 2268c2ecf20Sopenharmony_ci * @dev: device pointer 2278c2ecf20Sopenharmony_ci * @attr: device attribute pointer 2288c2ecf20Sopenharmony_ci * @buf: buffer to scan for loading control value 2298c2ecf20Sopenharmony_ci * @count: number of bytes in @buf 2308c2ecf20Sopenharmony_ci * 2318c2ecf20Sopenharmony_ci * The relevant values are: 2328c2ecf20Sopenharmony_ci * 2338c2ecf20Sopenharmony_ci * 1: Start a load, discarding any previous partial load. 2348c2ecf20Sopenharmony_ci * 0: Conclude the load and hand the data to the driver code. 2358c2ecf20Sopenharmony_ci * -1: Conclude the load with an error and discard any written data. 2368c2ecf20Sopenharmony_ci **/ 2378c2ecf20Sopenharmony_cistatic ssize_t firmware_loading_store(struct device *dev, 2388c2ecf20Sopenharmony_ci struct device_attribute *attr, 2398c2ecf20Sopenharmony_ci const char *buf, size_t count) 2408c2ecf20Sopenharmony_ci{ 2418c2ecf20Sopenharmony_ci struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev); 2428c2ecf20Sopenharmony_ci struct fw_priv *fw_priv; 2438c2ecf20Sopenharmony_ci ssize_t written = count; 2448c2ecf20Sopenharmony_ci int loading = simple_strtol(buf, NULL, 10); 2458c2ecf20Sopenharmony_ci 2468c2ecf20Sopenharmony_ci mutex_lock(&fw_lock); 2478c2ecf20Sopenharmony_ci fw_priv = fw_sysfs->fw_priv; 2488c2ecf20Sopenharmony_ci if (fw_state_is_aborted(fw_priv)) 2498c2ecf20Sopenharmony_ci goto out; 2508c2ecf20Sopenharmony_ci 2518c2ecf20Sopenharmony_ci switch (loading) { 2528c2ecf20Sopenharmony_ci case 1: 2538c2ecf20Sopenharmony_ci /* discarding any previous partial load */ 2548c2ecf20Sopenharmony_ci if (!fw_sysfs_done(fw_priv)) { 2558c2ecf20Sopenharmony_ci fw_free_paged_buf(fw_priv); 2568c2ecf20Sopenharmony_ci fw_state_start(fw_priv); 2578c2ecf20Sopenharmony_ci } 2588c2ecf20Sopenharmony_ci break; 2598c2ecf20Sopenharmony_ci case 0: 2608c2ecf20Sopenharmony_ci if (fw_sysfs_loading(fw_priv)) { 2618c2ecf20Sopenharmony_ci int rc; 2628c2ecf20Sopenharmony_ci 2638c2ecf20Sopenharmony_ci /* 2648c2ecf20Sopenharmony_ci * Several loading requests may be pending on 2658c2ecf20Sopenharmony_ci * one same firmware buf, so let all requests 2668c2ecf20Sopenharmony_ci * see the mapped 'buf->data' once the loading 2678c2ecf20Sopenharmony_ci * is completed. 2688c2ecf20Sopenharmony_ci * */ 2698c2ecf20Sopenharmony_ci rc = fw_map_paged_buf(fw_priv); 2708c2ecf20Sopenharmony_ci if (rc) 2718c2ecf20Sopenharmony_ci dev_err(dev, "%s: map pages failed\n", 2728c2ecf20Sopenharmony_ci __func__); 2738c2ecf20Sopenharmony_ci else 2748c2ecf20Sopenharmony_ci rc = security_kernel_post_load_data(fw_priv->data, 2758c2ecf20Sopenharmony_ci fw_priv->size, 2768c2ecf20Sopenharmony_ci LOADING_FIRMWARE, "blob"); 2778c2ecf20Sopenharmony_ci 2788c2ecf20Sopenharmony_ci /* 2798c2ecf20Sopenharmony_ci * Same logic as fw_load_abort, only the DONE bit 2808c2ecf20Sopenharmony_ci * is ignored and we set ABORT only on failure. 2818c2ecf20Sopenharmony_ci */ 2828c2ecf20Sopenharmony_ci if (rc) { 2838c2ecf20Sopenharmony_ci fw_state_aborted(fw_priv); 2848c2ecf20Sopenharmony_ci written = rc; 2858c2ecf20Sopenharmony_ci } else { 2868c2ecf20Sopenharmony_ci fw_state_done(fw_priv); 2878c2ecf20Sopenharmony_ci } 2888c2ecf20Sopenharmony_ci break; 2898c2ecf20Sopenharmony_ci } 2908c2ecf20Sopenharmony_ci fallthrough; 2918c2ecf20Sopenharmony_ci default: 2928c2ecf20Sopenharmony_ci dev_err(dev, "%s: unexpected value (%d)\n", __func__, loading); 2938c2ecf20Sopenharmony_ci fallthrough; 2948c2ecf20Sopenharmony_ci case -1: 2958c2ecf20Sopenharmony_ci fw_load_abort(fw_sysfs); 2968c2ecf20Sopenharmony_ci break; 2978c2ecf20Sopenharmony_ci } 2988c2ecf20Sopenharmony_ciout: 2998c2ecf20Sopenharmony_ci mutex_unlock(&fw_lock); 3008c2ecf20Sopenharmony_ci return written; 3018c2ecf20Sopenharmony_ci} 3028c2ecf20Sopenharmony_ci 3038c2ecf20Sopenharmony_cistatic DEVICE_ATTR(loading, 0644, firmware_loading_show, firmware_loading_store); 3048c2ecf20Sopenharmony_ci 3058c2ecf20Sopenharmony_cistatic void firmware_rw_data(struct fw_priv *fw_priv, char *buffer, 3068c2ecf20Sopenharmony_ci loff_t offset, size_t count, bool read) 3078c2ecf20Sopenharmony_ci{ 3088c2ecf20Sopenharmony_ci if (read) 3098c2ecf20Sopenharmony_ci memcpy(buffer, fw_priv->data + offset, count); 3108c2ecf20Sopenharmony_ci else 3118c2ecf20Sopenharmony_ci memcpy(fw_priv->data + offset, buffer, count); 3128c2ecf20Sopenharmony_ci} 3138c2ecf20Sopenharmony_ci 3148c2ecf20Sopenharmony_cistatic void firmware_rw(struct fw_priv *fw_priv, char *buffer, 3158c2ecf20Sopenharmony_ci loff_t offset, size_t count, bool read) 3168c2ecf20Sopenharmony_ci{ 3178c2ecf20Sopenharmony_ci while (count) { 3188c2ecf20Sopenharmony_ci void *page_data; 3198c2ecf20Sopenharmony_ci int page_nr = offset >> PAGE_SHIFT; 3208c2ecf20Sopenharmony_ci int page_ofs = offset & (PAGE_SIZE-1); 3218c2ecf20Sopenharmony_ci int page_cnt = min_t(size_t, PAGE_SIZE - page_ofs, count); 3228c2ecf20Sopenharmony_ci 3238c2ecf20Sopenharmony_ci page_data = kmap(fw_priv->pages[page_nr]); 3248c2ecf20Sopenharmony_ci 3258c2ecf20Sopenharmony_ci if (read) 3268c2ecf20Sopenharmony_ci memcpy(buffer, page_data + page_ofs, page_cnt); 3278c2ecf20Sopenharmony_ci else 3288c2ecf20Sopenharmony_ci memcpy(page_data + page_ofs, buffer, page_cnt); 3298c2ecf20Sopenharmony_ci 3308c2ecf20Sopenharmony_ci kunmap(fw_priv->pages[page_nr]); 3318c2ecf20Sopenharmony_ci buffer += page_cnt; 3328c2ecf20Sopenharmony_ci offset += page_cnt; 3338c2ecf20Sopenharmony_ci count -= page_cnt; 3348c2ecf20Sopenharmony_ci } 3358c2ecf20Sopenharmony_ci} 3368c2ecf20Sopenharmony_ci 3378c2ecf20Sopenharmony_cistatic ssize_t firmware_data_read(struct file *filp, struct kobject *kobj, 3388c2ecf20Sopenharmony_ci struct bin_attribute *bin_attr, 3398c2ecf20Sopenharmony_ci char *buffer, loff_t offset, size_t count) 3408c2ecf20Sopenharmony_ci{ 3418c2ecf20Sopenharmony_ci struct device *dev = kobj_to_dev(kobj); 3428c2ecf20Sopenharmony_ci struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev); 3438c2ecf20Sopenharmony_ci struct fw_priv *fw_priv; 3448c2ecf20Sopenharmony_ci ssize_t ret_count; 3458c2ecf20Sopenharmony_ci 3468c2ecf20Sopenharmony_ci mutex_lock(&fw_lock); 3478c2ecf20Sopenharmony_ci fw_priv = fw_sysfs->fw_priv; 3488c2ecf20Sopenharmony_ci if (!fw_priv || fw_sysfs_done(fw_priv)) { 3498c2ecf20Sopenharmony_ci ret_count = -ENODEV; 3508c2ecf20Sopenharmony_ci goto out; 3518c2ecf20Sopenharmony_ci } 3528c2ecf20Sopenharmony_ci if (offset > fw_priv->size) { 3538c2ecf20Sopenharmony_ci ret_count = 0; 3548c2ecf20Sopenharmony_ci goto out; 3558c2ecf20Sopenharmony_ci } 3568c2ecf20Sopenharmony_ci if (count > fw_priv->size - offset) 3578c2ecf20Sopenharmony_ci count = fw_priv->size - offset; 3588c2ecf20Sopenharmony_ci 3598c2ecf20Sopenharmony_ci ret_count = count; 3608c2ecf20Sopenharmony_ci 3618c2ecf20Sopenharmony_ci if (fw_priv->data) 3628c2ecf20Sopenharmony_ci firmware_rw_data(fw_priv, buffer, offset, count, true); 3638c2ecf20Sopenharmony_ci else 3648c2ecf20Sopenharmony_ci firmware_rw(fw_priv, buffer, offset, count, true); 3658c2ecf20Sopenharmony_ci 3668c2ecf20Sopenharmony_ciout: 3678c2ecf20Sopenharmony_ci mutex_unlock(&fw_lock); 3688c2ecf20Sopenharmony_ci return ret_count; 3698c2ecf20Sopenharmony_ci} 3708c2ecf20Sopenharmony_ci 3718c2ecf20Sopenharmony_cistatic int fw_realloc_pages(struct fw_sysfs *fw_sysfs, int min_size) 3728c2ecf20Sopenharmony_ci{ 3738c2ecf20Sopenharmony_ci int err; 3748c2ecf20Sopenharmony_ci 3758c2ecf20Sopenharmony_ci err = fw_grow_paged_buf(fw_sysfs->fw_priv, 3768c2ecf20Sopenharmony_ci PAGE_ALIGN(min_size) >> PAGE_SHIFT); 3778c2ecf20Sopenharmony_ci if (err) 3788c2ecf20Sopenharmony_ci fw_load_abort(fw_sysfs); 3798c2ecf20Sopenharmony_ci return err; 3808c2ecf20Sopenharmony_ci} 3818c2ecf20Sopenharmony_ci 3828c2ecf20Sopenharmony_ci/** 3838c2ecf20Sopenharmony_ci * firmware_data_write() - write method for firmware 3848c2ecf20Sopenharmony_ci * @filp: open sysfs file 3858c2ecf20Sopenharmony_ci * @kobj: kobject for the device 3868c2ecf20Sopenharmony_ci * @bin_attr: bin_attr structure 3878c2ecf20Sopenharmony_ci * @buffer: buffer being written 3888c2ecf20Sopenharmony_ci * @offset: buffer offset for write in total data store area 3898c2ecf20Sopenharmony_ci * @count: buffer size 3908c2ecf20Sopenharmony_ci * 3918c2ecf20Sopenharmony_ci * Data written to the 'data' attribute will be later handed to 3928c2ecf20Sopenharmony_ci * the driver as a firmware image. 3938c2ecf20Sopenharmony_ci **/ 3948c2ecf20Sopenharmony_cistatic ssize_t firmware_data_write(struct file *filp, struct kobject *kobj, 3958c2ecf20Sopenharmony_ci struct bin_attribute *bin_attr, 3968c2ecf20Sopenharmony_ci char *buffer, loff_t offset, size_t count) 3978c2ecf20Sopenharmony_ci{ 3988c2ecf20Sopenharmony_ci struct device *dev = kobj_to_dev(kobj); 3998c2ecf20Sopenharmony_ci struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev); 4008c2ecf20Sopenharmony_ci struct fw_priv *fw_priv; 4018c2ecf20Sopenharmony_ci ssize_t retval; 4028c2ecf20Sopenharmony_ci 4038c2ecf20Sopenharmony_ci if (!capable(CAP_SYS_RAWIO)) 4048c2ecf20Sopenharmony_ci return -EPERM; 4058c2ecf20Sopenharmony_ci 4068c2ecf20Sopenharmony_ci mutex_lock(&fw_lock); 4078c2ecf20Sopenharmony_ci fw_priv = fw_sysfs->fw_priv; 4088c2ecf20Sopenharmony_ci if (!fw_priv || fw_sysfs_done(fw_priv)) { 4098c2ecf20Sopenharmony_ci retval = -ENODEV; 4108c2ecf20Sopenharmony_ci goto out; 4118c2ecf20Sopenharmony_ci } 4128c2ecf20Sopenharmony_ci 4138c2ecf20Sopenharmony_ci if (fw_priv->data) { 4148c2ecf20Sopenharmony_ci if (offset + count > fw_priv->allocated_size) { 4158c2ecf20Sopenharmony_ci retval = -ENOMEM; 4168c2ecf20Sopenharmony_ci goto out; 4178c2ecf20Sopenharmony_ci } 4188c2ecf20Sopenharmony_ci firmware_rw_data(fw_priv, buffer, offset, count, false); 4198c2ecf20Sopenharmony_ci retval = count; 4208c2ecf20Sopenharmony_ci } else { 4218c2ecf20Sopenharmony_ci retval = fw_realloc_pages(fw_sysfs, offset + count); 4228c2ecf20Sopenharmony_ci if (retval) 4238c2ecf20Sopenharmony_ci goto out; 4248c2ecf20Sopenharmony_ci 4258c2ecf20Sopenharmony_ci retval = count; 4268c2ecf20Sopenharmony_ci firmware_rw(fw_priv, buffer, offset, count, false); 4278c2ecf20Sopenharmony_ci } 4288c2ecf20Sopenharmony_ci 4298c2ecf20Sopenharmony_ci fw_priv->size = max_t(size_t, offset + count, fw_priv->size); 4308c2ecf20Sopenharmony_ciout: 4318c2ecf20Sopenharmony_ci mutex_unlock(&fw_lock); 4328c2ecf20Sopenharmony_ci return retval; 4338c2ecf20Sopenharmony_ci} 4348c2ecf20Sopenharmony_ci 4358c2ecf20Sopenharmony_cistatic struct bin_attribute firmware_attr_data = { 4368c2ecf20Sopenharmony_ci .attr = { .name = "data", .mode = 0644 }, 4378c2ecf20Sopenharmony_ci .size = 0, 4388c2ecf20Sopenharmony_ci .read = firmware_data_read, 4398c2ecf20Sopenharmony_ci .write = firmware_data_write, 4408c2ecf20Sopenharmony_ci}; 4418c2ecf20Sopenharmony_ci 4428c2ecf20Sopenharmony_cistatic struct attribute *fw_dev_attrs[] = { 4438c2ecf20Sopenharmony_ci &dev_attr_loading.attr, 4448c2ecf20Sopenharmony_ci NULL 4458c2ecf20Sopenharmony_ci}; 4468c2ecf20Sopenharmony_ci 4478c2ecf20Sopenharmony_cistatic struct bin_attribute *fw_dev_bin_attrs[] = { 4488c2ecf20Sopenharmony_ci &firmware_attr_data, 4498c2ecf20Sopenharmony_ci NULL 4508c2ecf20Sopenharmony_ci}; 4518c2ecf20Sopenharmony_ci 4528c2ecf20Sopenharmony_cistatic const struct attribute_group fw_dev_attr_group = { 4538c2ecf20Sopenharmony_ci .attrs = fw_dev_attrs, 4548c2ecf20Sopenharmony_ci .bin_attrs = fw_dev_bin_attrs, 4558c2ecf20Sopenharmony_ci}; 4568c2ecf20Sopenharmony_ci 4578c2ecf20Sopenharmony_cistatic const struct attribute_group *fw_dev_attr_groups[] = { 4588c2ecf20Sopenharmony_ci &fw_dev_attr_group, 4598c2ecf20Sopenharmony_ci NULL 4608c2ecf20Sopenharmony_ci}; 4618c2ecf20Sopenharmony_ci 4628c2ecf20Sopenharmony_cistatic struct fw_sysfs * 4638c2ecf20Sopenharmony_cifw_create_instance(struct firmware *firmware, const char *fw_name, 4648c2ecf20Sopenharmony_ci struct device *device, u32 opt_flags) 4658c2ecf20Sopenharmony_ci{ 4668c2ecf20Sopenharmony_ci struct fw_sysfs *fw_sysfs; 4678c2ecf20Sopenharmony_ci struct device *f_dev; 4688c2ecf20Sopenharmony_ci 4698c2ecf20Sopenharmony_ci fw_sysfs = kzalloc(sizeof(*fw_sysfs), GFP_KERNEL); 4708c2ecf20Sopenharmony_ci if (!fw_sysfs) { 4718c2ecf20Sopenharmony_ci fw_sysfs = ERR_PTR(-ENOMEM); 4728c2ecf20Sopenharmony_ci goto exit; 4738c2ecf20Sopenharmony_ci } 4748c2ecf20Sopenharmony_ci 4758c2ecf20Sopenharmony_ci fw_sysfs->nowait = !!(opt_flags & FW_OPT_NOWAIT); 4768c2ecf20Sopenharmony_ci fw_sysfs->fw = firmware; 4778c2ecf20Sopenharmony_ci f_dev = &fw_sysfs->dev; 4788c2ecf20Sopenharmony_ci 4798c2ecf20Sopenharmony_ci device_initialize(f_dev); 4808c2ecf20Sopenharmony_ci dev_set_name(f_dev, "%s", fw_name); 4818c2ecf20Sopenharmony_ci f_dev->parent = device; 4828c2ecf20Sopenharmony_ci f_dev->class = &firmware_class; 4838c2ecf20Sopenharmony_ci f_dev->groups = fw_dev_attr_groups; 4848c2ecf20Sopenharmony_ciexit: 4858c2ecf20Sopenharmony_ci return fw_sysfs; 4868c2ecf20Sopenharmony_ci} 4878c2ecf20Sopenharmony_ci 4888c2ecf20Sopenharmony_ci/** 4898c2ecf20Sopenharmony_ci * fw_load_sysfs_fallback() - load a firmware via the sysfs fallback mechanism 4908c2ecf20Sopenharmony_ci * @fw_sysfs: firmware sysfs information for the firmware to load 4918c2ecf20Sopenharmony_ci * @timeout: timeout to wait for the load 4928c2ecf20Sopenharmony_ci * 4938c2ecf20Sopenharmony_ci * In charge of constructing a sysfs fallback interface for firmware loading. 4948c2ecf20Sopenharmony_ci **/ 4958c2ecf20Sopenharmony_cistatic int fw_load_sysfs_fallback(struct fw_sysfs *fw_sysfs, long timeout) 4968c2ecf20Sopenharmony_ci{ 4978c2ecf20Sopenharmony_ci int retval = 0; 4988c2ecf20Sopenharmony_ci struct device *f_dev = &fw_sysfs->dev; 4998c2ecf20Sopenharmony_ci struct fw_priv *fw_priv = fw_sysfs->fw_priv; 5008c2ecf20Sopenharmony_ci 5018c2ecf20Sopenharmony_ci /* fall back on userspace loading */ 5028c2ecf20Sopenharmony_ci if (!fw_priv->data) 5038c2ecf20Sopenharmony_ci fw_priv->is_paged_buf = true; 5048c2ecf20Sopenharmony_ci 5058c2ecf20Sopenharmony_ci dev_set_uevent_suppress(f_dev, true); 5068c2ecf20Sopenharmony_ci 5078c2ecf20Sopenharmony_ci retval = device_add(f_dev); 5088c2ecf20Sopenharmony_ci if (retval) { 5098c2ecf20Sopenharmony_ci dev_err(f_dev, "%s: device_register failed\n", __func__); 5108c2ecf20Sopenharmony_ci goto err_put_dev; 5118c2ecf20Sopenharmony_ci } 5128c2ecf20Sopenharmony_ci 5138c2ecf20Sopenharmony_ci mutex_lock(&fw_lock); 5148c2ecf20Sopenharmony_ci if (fw_state_is_aborted(fw_priv)) { 5158c2ecf20Sopenharmony_ci mutex_unlock(&fw_lock); 5168c2ecf20Sopenharmony_ci retval = -EINTR; 5178c2ecf20Sopenharmony_ci goto out; 5188c2ecf20Sopenharmony_ci } 5198c2ecf20Sopenharmony_ci list_add(&fw_priv->pending_list, &pending_fw_head); 5208c2ecf20Sopenharmony_ci mutex_unlock(&fw_lock); 5218c2ecf20Sopenharmony_ci 5228c2ecf20Sopenharmony_ci if (fw_priv->opt_flags & FW_OPT_UEVENT) { 5238c2ecf20Sopenharmony_ci fw_priv->need_uevent = true; 5248c2ecf20Sopenharmony_ci dev_set_uevent_suppress(f_dev, false); 5258c2ecf20Sopenharmony_ci dev_dbg(f_dev, "firmware: requesting %s\n", fw_priv->fw_name); 5268c2ecf20Sopenharmony_ci kobject_uevent(&fw_sysfs->dev.kobj, KOBJ_ADD); 5278c2ecf20Sopenharmony_ci } else { 5288c2ecf20Sopenharmony_ci timeout = MAX_JIFFY_OFFSET; 5298c2ecf20Sopenharmony_ci } 5308c2ecf20Sopenharmony_ci 5318c2ecf20Sopenharmony_ci retval = fw_sysfs_wait_timeout(fw_priv, timeout); 5328c2ecf20Sopenharmony_ci if (retval < 0 && retval != -ENOENT) { 5338c2ecf20Sopenharmony_ci mutex_lock(&fw_lock); 5348c2ecf20Sopenharmony_ci fw_load_abort(fw_sysfs); 5358c2ecf20Sopenharmony_ci mutex_unlock(&fw_lock); 5368c2ecf20Sopenharmony_ci } 5378c2ecf20Sopenharmony_ci 5388c2ecf20Sopenharmony_ci if (fw_state_is_aborted(fw_priv)) { 5398c2ecf20Sopenharmony_ci if (retval == -ERESTARTSYS) 5408c2ecf20Sopenharmony_ci retval = -EINTR; 5418c2ecf20Sopenharmony_ci } else if (fw_priv->is_paged_buf && !fw_priv->data) 5428c2ecf20Sopenharmony_ci retval = -ENOMEM; 5438c2ecf20Sopenharmony_ci 5448c2ecf20Sopenharmony_ciout: 5458c2ecf20Sopenharmony_ci device_del(f_dev); 5468c2ecf20Sopenharmony_cierr_put_dev: 5478c2ecf20Sopenharmony_ci put_device(f_dev); 5488c2ecf20Sopenharmony_ci return retval; 5498c2ecf20Sopenharmony_ci} 5508c2ecf20Sopenharmony_ci 5518c2ecf20Sopenharmony_cistatic int fw_load_from_user_helper(struct firmware *firmware, 5528c2ecf20Sopenharmony_ci const char *name, struct device *device, 5538c2ecf20Sopenharmony_ci u32 opt_flags) 5548c2ecf20Sopenharmony_ci{ 5558c2ecf20Sopenharmony_ci struct fw_sysfs *fw_sysfs; 5568c2ecf20Sopenharmony_ci long timeout; 5578c2ecf20Sopenharmony_ci int ret; 5588c2ecf20Sopenharmony_ci 5598c2ecf20Sopenharmony_ci timeout = firmware_loading_timeout(); 5608c2ecf20Sopenharmony_ci if (opt_flags & FW_OPT_NOWAIT) { 5618c2ecf20Sopenharmony_ci timeout = usermodehelper_read_lock_wait(timeout); 5628c2ecf20Sopenharmony_ci if (!timeout) { 5638c2ecf20Sopenharmony_ci dev_dbg(device, "firmware: %s loading timed out\n", 5648c2ecf20Sopenharmony_ci name); 5658c2ecf20Sopenharmony_ci return -EBUSY; 5668c2ecf20Sopenharmony_ci } 5678c2ecf20Sopenharmony_ci } else { 5688c2ecf20Sopenharmony_ci ret = usermodehelper_read_trylock(); 5698c2ecf20Sopenharmony_ci if (WARN_ON(ret)) { 5708c2ecf20Sopenharmony_ci dev_err(device, "firmware: %s will not be loaded\n", 5718c2ecf20Sopenharmony_ci name); 5728c2ecf20Sopenharmony_ci return ret; 5738c2ecf20Sopenharmony_ci } 5748c2ecf20Sopenharmony_ci } 5758c2ecf20Sopenharmony_ci 5768c2ecf20Sopenharmony_ci fw_sysfs = fw_create_instance(firmware, name, device, opt_flags); 5778c2ecf20Sopenharmony_ci if (IS_ERR(fw_sysfs)) { 5788c2ecf20Sopenharmony_ci ret = PTR_ERR(fw_sysfs); 5798c2ecf20Sopenharmony_ci goto out_unlock; 5808c2ecf20Sopenharmony_ci } 5818c2ecf20Sopenharmony_ci 5828c2ecf20Sopenharmony_ci fw_sysfs->fw_priv = firmware->priv; 5838c2ecf20Sopenharmony_ci ret = fw_load_sysfs_fallback(fw_sysfs, timeout); 5848c2ecf20Sopenharmony_ci 5858c2ecf20Sopenharmony_ci if (!ret) 5868c2ecf20Sopenharmony_ci ret = assign_fw(firmware, device); 5878c2ecf20Sopenharmony_ci 5888c2ecf20Sopenharmony_ciout_unlock: 5898c2ecf20Sopenharmony_ci usermodehelper_read_unlock(); 5908c2ecf20Sopenharmony_ci 5918c2ecf20Sopenharmony_ci return ret; 5928c2ecf20Sopenharmony_ci} 5938c2ecf20Sopenharmony_ci 5948c2ecf20Sopenharmony_cistatic bool fw_force_sysfs_fallback(u32 opt_flags) 5958c2ecf20Sopenharmony_ci{ 5968c2ecf20Sopenharmony_ci if (fw_fallback_config.force_sysfs_fallback) 5978c2ecf20Sopenharmony_ci return true; 5988c2ecf20Sopenharmony_ci if (!(opt_flags & FW_OPT_USERHELPER)) 5998c2ecf20Sopenharmony_ci return false; 6008c2ecf20Sopenharmony_ci return true; 6018c2ecf20Sopenharmony_ci} 6028c2ecf20Sopenharmony_ci 6038c2ecf20Sopenharmony_cistatic bool fw_run_sysfs_fallback(u32 opt_flags) 6048c2ecf20Sopenharmony_ci{ 6058c2ecf20Sopenharmony_ci int ret; 6068c2ecf20Sopenharmony_ci 6078c2ecf20Sopenharmony_ci if (fw_fallback_config.ignore_sysfs_fallback) { 6088c2ecf20Sopenharmony_ci pr_info_once("Ignoring firmware sysfs fallback due to sysctl knob\n"); 6098c2ecf20Sopenharmony_ci return false; 6108c2ecf20Sopenharmony_ci } 6118c2ecf20Sopenharmony_ci 6128c2ecf20Sopenharmony_ci if ((opt_flags & FW_OPT_NOFALLBACK_SYSFS)) 6138c2ecf20Sopenharmony_ci return false; 6148c2ecf20Sopenharmony_ci 6158c2ecf20Sopenharmony_ci /* Also permit LSMs and IMA to fail firmware sysfs fallback */ 6168c2ecf20Sopenharmony_ci ret = security_kernel_load_data(LOADING_FIRMWARE, true); 6178c2ecf20Sopenharmony_ci if (ret < 0) 6188c2ecf20Sopenharmony_ci return false; 6198c2ecf20Sopenharmony_ci 6208c2ecf20Sopenharmony_ci return fw_force_sysfs_fallback(opt_flags); 6218c2ecf20Sopenharmony_ci} 6228c2ecf20Sopenharmony_ci 6238c2ecf20Sopenharmony_ci/** 6248c2ecf20Sopenharmony_ci * firmware_fallback_sysfs() - use the fallback mechanism to find firmware 6258c2ecf20Sopenharmony_ci * @fw: pointer to firmware image 6268c2ecf20Sopenharmony_ci * @name: name of firmware file to look for 6278c2ecf20Sopenharmony_ci * @device: device for which firmware is being loaded 6288c2ecf20Sopenharmony_ci * @opt_flags: options to control firmware loading behaviour, as defined by 6298c2ecf20Sopenharmony_ci * &enum fw_opt 6308c2ecf20Sopenharmony_ci * @ret: return value from direct lookup which triggered the fallback mechanism 6318c2ecf20Sopenharmony_ci * 6328c2ecf20Sopenharmony_ci * This function is called if direct lookup for the firmware failed, it enables 6338c2ecf20Sopenharmony_ci * a fallback mechanism through userspace by exposing a sysfs loading 6348c2ecf20Sopenharmony_ci * interface. Userspace is in charge of loading the firmware through the sysfs 6358c2ecf20Sopenharmony_ci * loading interface. This sysfs fallback mechanism may be disabled completely 6368c2ecf20Sopenharmony_ci * on a system by setting the proc sysctl value ignore_sysfs_fallback to true. 6378c2ecf20Sopenharmony_ci * If this is false we check if the internal API caller set the 6388c2ecf20Sopenharmony_ci * @FW_OPT_NOFALLBACK_SYSFS flag, if so it would also disable the fallback 6398c2ecf20Sopenharmony_ci * mechanism. A system may want to enforce the sysfs fallback mechanism at all 6408c2ecf20Sopenharmony_ci * times, it can do this by setting ignore_sysfs_fallback to false and 6418c2ecf20Sopenharmony_ci * force_sysfs_fallback to true. 6428c2ecf20Sopenharmony_ci * Enabling force_sysfs_fallback is functionally equivalent to build a kernel 6438c2ecf20Sopenharmony_ci * with CONFIG_FW_LOADER_USER_HELPER_FALLBACK. 6448c2ecf20Sopenharmony_ci **/ 6458c2ecf20Sopenharmony_ciint firmware_fallback_sysfs(struct firmware *fw, const char *name, 6468c2ecf20Sopenharmony_ci struct device *device, 6478c2ecf20Sopenharmony_ci u32 opt_flags, 6488c2ecf20Sopenharmony_ci int ret) 6498c2ecf20Sopenharmony_ci{ 6508c2ecf20Sopenharmony_ci if (!fw_run_sysfs_fallback(opt_flags)) 6518c2ecf20Sopenharmony_ci return ret; 6528c2ecf20Sopenharmony_ci 6538c2ecf20Sopenharmony_ci if (!(opt_flags & FW_OPT_NO_WARN)) 6548c2ecf20Sopenharmony_ci dev_warn(device, "Falling back to sysfs fallback for: %s\n", 6558c2ecf20Sopenharmony_ci name); 6568c2ecf20Sopenharmony_ci else 6578c2ecf20Sopenharmony_ci dev_dbg(device, "Falling back to sysfs fallback for: %s\n", 6588c2ecf20Sopenharmony_ci name); 6598c2ecf20Sopenharmony_ci return fw_load_from_user_helper(fw, name, device, opt_flags); 6608c2ecf20Sopenharmony_ci} 661