]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - drivers/base/firmware_class.c
Merge tag 'sound-4.15' of git://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound
[mirror_ubuntu-bionic-kernel.git] / drivers / base / firmware_class.c
CommitLineData
1da177e4
LT
1/*
2 * firmware_class.c - Multi purpose firmware loading support
3 *
87d37a4f 4 * Copyright (c) 2003 Manuel Estrada Sainz
1da177e4
LT
5 *
6 * Please see Documentation/firmware_class/ for more information.
7 *
8 */
9
73da4b4b
LR
10#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
11
c59ede7b 12#include <linux/capability.h>
1da177e4
LT
13#include <linux/device.h>
14#include <linux/module.h>
15#include <linux/init.h>
16#include <linux/timer.h>
17#include <linux/vmalloc.h>
18#include <linux/interrupt.h>
19#include <linux/bitops.h>
cad1e55d 20#include <linux/mutex.h>
a36cf844 21#include <linux/workqueue.h>
6e03a201 22#include <linux/highmem.h>
1da177e4 23#include <linux/firmware.h>
5a0e3ad6 24#include <linux/slab.h>
a36cf844 25#include <linux/sched.h>
abb139e7 26#include <linux/file.h>
1f2b7959 27#include <linux/list.h>
e40ba6d5 28#include <linux/fs.h>
37276a51
ML
29#include <linux/async.h>
30#include <linux/pm.h>
07646d9c 31#include <linux/suspend.h>
ac39b3ea 32#include <linux/syscore_ops.h>
fe304143 33#include <linux/reboot.h>
6593d924 34#include <linux/security.h>
37276a51 35
abb139e7
LT
36#include <generated/utsrelease.h>
37
37276a51 38#include "base.h"
1da177e4 39
87d37a4f 40MODULE_AUTHOR("Manuel Estrada Sainz");
1da177e4
LT
41MODULE_DESCRIPTION("Multi purpose firmware loading support");
42MODULE_LICENSE("GPL");
43
bcb9bd18
DT
44/* Builtin firmware support */
45
46#ifdef CONFIG_FW_LOADER
47
48extern struct builtin_fw __start_builtin_fw[];
49extern struct builtin_fw __end_builtin_fw[];
50
a098ecd2
SB
51static bool fw_get_builtin_firmware(struct firmware *fw, const char *name,
52 void *buf, size_t size)
bcb9bd18
DT
53{
54 struct builtin_fw *b_fw;
55
56 for (b_fw = __start_builtin_fw; b_fw != __end_builtin_fw; b_fw++) {
57 if (strcmp(name, b_fw->name) == 0) {
58 fw->size = b_fw->size;
59 fw->data = b_fw->data;
a098ecd2
SB
60
61 if (buf && fw->size <= size)
62 memcpy(buf, fw->data, fw->size);
bcb9bd18
DT
63 return true;
64 }
65 }
66
67 return false;
68}
69
70static bool fw_is_builtin_firmware(const struct firmware *fw)
71{
72 struct builtin_fw *b_fw;
73
74 for (b_fw = __start_builtin_fw; b_fw != __end_builtin_fw; b_fw++)
75 if (fw->data == b_fw->data)
76 return true;
77
78 return false;
79}
80
81#else /* Module case - no builtin firmware support */
82
a098ecd2
SB
83static inline bool fw_get_builtin_firmware(struct firmware *fw,
84 const char *name, void *buf,
85 size_t size)
bcb9bd18
DT
86{
87 return false;
88}
89
90static inline bool fw_is_builtin_firmware(const struct firmware *fw)
91{
92 return false;
93}
94#endif
95
f52cc379
DW
96enum fw_status {
97 FW_STATUS_UNKNOWN,
1da177e4
LT
98 FW_STATUS_LOADING,
99 FW_STATUS_DONE,
f52cc379 100 FW_STATUS_ABORTED,
1da177e4
LT
101};
102
2f65168d 103static int loading_timeout = 60; /* In seconds */
1da177e4 104
9b78c1da
RW
105static inline long firmware_loading_timeout(void)
106{
68ff2a00 107 return loading_timeout > 0 ? loading_timeout * HZ : MAX_JIFFY_OFFSET;
9b78c1da
RW
108}
109
f52cc379
DW
110/*
111 * Concurrent request_firmware() for the same firmware need to be
112 * serialized. struct fw_state is simple state machine which hold the
113 * state of the firmware loading.
114 */
115struct fw_state {
e44565f6 116 struct completion completion;
0430cafc 117 enum fw_status status;
f52cc379
DW
118};
119
120static void fw_state_init(struct fw_state *fw_st)
121{
e44565f6 122 init_completion(&fw_st->completion);
f52cc379
DW
123 fw_st->status = FW_STATUS_UNKNOWN;
124}
125
5b029624
DW
126static inline bool __fw_state_is_done(enum fw_status status)
127{
128 return status == FW_STATUS_DONE || status == FW_STATUS_ABORTED;
129}
130
5d47ec02 131static int __fw_state_wait_common(struct fw_state *fw_st, long timeout)
f52cc379
DW
132{
133 long ret;
134
260d9f2f 135 ret = wait_for_completion_killable_timeout(&fw_st->completion, timeout);
5b029624 136 if (ret != 0 && fw_st->status == FW_STATUS_ABORTED)
f52cc379 137 return -ENOENT;
5d47ec02
BA
138 if (!ret)
139 return -ETIMEDOUT;
f52cc379 140
5d47ec02 141 return ret < 0 ? ret : 0;
f52cc379
DW
142}
143
144static void __fw_state_set(struct fw_state *fw_st,
145 enum fw_status status)
146{
0430cafc 147 WRITE_ONCE(fw_st->status, status);
f52cc379 148
0430cafc 149 if (status == FW_STATUS_DONE || status == FW_STATUS_ABORTED)
e44565f6 150 complete_all(&fw_st->completion);
f52cc379
DW
151}
152
153#define fw_state_start(fw_st) \
154 __fw_state_set(fw_st, FW_STATUS_LOADING)
155#define fw_state_done(fw_st) \
156 __fw_state_set(fw_st, FW_STATUS_DONE)
90d41e74
LR
157#define fw_state_aborted(fw_st) \
158 __fw_state_set(fw_st, FW_STATUS_ABORTED)
f52cc379
DW
159#define fw_state_wait(fw_st) \
160 __fw_state_wait_common(fw_st, MAX_SCHEDULE_TIMEOUT)
161
fab82cb3
DW
162static int __fw_state_check(struct fw_state *fw_st, enum fw_status status)
163{
164 return fw_st->status == status;
165}
166
90d41e74
LR
167#define fw_state_is_aborted(fw_st) \
168 __fw_state_check(fw_st, FW_STATUS_ABORTED)
169
170#ifdef CONFIG_FW_LOADER_USER_HELPER
171
f52cc379
DW
172#define fw_state_aborted(fw_st) \
173 __fw_state_set(fw_st, FW_STATUS_ABORTED)
fab82cb3
DW
174#define fw_state_is_done(fw_st) \
175 __fw_state_check(fw_st, FW_STATUS_DONE)
f52cc379
DW
176#define fw_state_is_loading(fw_st) \
177 __fw_state_check(fw_st, FW_STATUS_LOADING)
f52cc379
DW
178#define fw_state_wait_timeout(fw_st, timeout) \
179 __fw_state_wait_common(fw_st, timeout)
180
181#endif /* CONFIG_FW_LOADER_USER_HELPER */
182
14c4bae7
TI
183/* firmware behavior options */
184#define FW_OPT_UEVENT (1U << 0)
185#define FW_OPT_NOWAIT (1U << 1)
68aeeaaa 186#ifdef CONFIG_FW_LOADER_USER_HELPER
5a1379e8 187#define FW_OPT_USERHELPER (1U << 2)
68aeeaaa 188#else
5a1379e8
TI
189#define FW_OPT_USERHELPER 0
190#endif
191#ifdef CONFIG_FW_LOADER_USER_HELPER_FALLBACK
192#define FW_OPT_FALLBACK FW_OPT_USERHELPER
193#else
194#define FW_OPT_FALLBACK 0
68aeeaaa 195#endif
c868edf4 196#define FW_OPT_NO_WARN (1U << 3)
0e742e92 197#define FW_OPT_NOCACHE (1U << 4)
14c4bae7 198
1f2b7959
ML
199struct firmware_cache {
200 /* firmware_buf instance will be added into the below list */
201 spinlock_t lock;
202 struct list_head head;
cfe016b1 203 int state;
37276a51 204
cfe016b1 205#ifdef CONFIG_PM_SLEEP
37276a51
ML
206 /*
207 * Names of firmware images which have been cached successfully
208 * will be added into the below list so that device uncache
209 * helper can trace which firmware images have been cached
210 * before.
211 */
212 spinlock_t name_lock;
213 struct list_head fw_names;
214
37276a51 215 struct delayed_work work;
07646d9c
ML
216
217 struct notifier_block pm_notify;
cfe016b1 218#endif
1f2b7959 219};
1da177e4 220
1244691c 221struct firmware_buf {
1f2b7959
ML
222 struct kref ref;
223 struct list_head list;
1f2b7959 224 struct firmware_cache *fwc;
f52cc379 225 struct fw_state fw_st;
65710cb6
ML
226 void *data;
227 size_t size;
a098ecd2 228 size_t allocated_size;
7b1269f7 229#ifdef CONFIG_FW_LOADER_USER_HELPER
cd7239fa 230 bool is_paged_buf;
af5bc11e 231 bool need_uevent;
6e03a201
DW
232 struct page **pages;
233 int nr_pages;
234 int page_array_size;
fe304143 235 struct list_head pending_list;
7b1269f7 236#endif
e0fd9b1d 237 const char *fw_id;
1244691c
ML
238};
239
37276a51
ML
240struct fw_cache_entry {
241 struct list_head list;
e0fd9b1d 242 const char *name;
37276a51
ML
243};
244
f531f05a
ML
245struct fw_name_devm {
246 unsigned long magic;
e0fd9b1d 247 const char *name;
f531f05a
ML
248};
249
1f2b7959
ML
250#define to_fwbuf(d) container_of(d, struct firmware_buf, ref)
251
ac39b3ea
ML
252#define FW_LOADER_NO_CACHE 0
253#define FW_LOADER_START_CACHE 1
254
255static int fw_cache_piggyback_on_request(const char *name);
256
1f2b7959
ML
257/* fw_lock could be moved to 'struct firmware_priv' but since it is just
258 * guarding for corner cases a global lock should be OK */
259static DEFINE_MUTEX(fw_lock);
260
261static struct firmware_cache fw_cache;
262
263static struct firmware_buf *__allocate_fw_buf(const char *fw_name,
a098ecd2
SB
264 struct firmware_cache *fwc,
265 void *dbuf, size_t size)
1f2b7959
ML
266{
267 struct firmware_buf *buf;
268
e0fd9b1d 269 buf = kzalloc(sizeof(*buf), GFP_ATOMIC);
1f2b7959 270 if (!buf)
e0fd9b1d
LR
271 return NULL;
272
273 buf->fw_id = kstrdup_const(fw_name, GFP_ATOMIC);
274 if (!buf->fw_id) {
275 kfree(buf);
276 return NULL;
277 }
1f2b7959
ML
278
279 kref_init(&buf->ref);
1f2b7959 280 buf->fwc = fwc;
a098ecd2
SB
281 buf->data = dbuf;
282 buf->allocated_size = size;
f52cc379 283 fw_state_init(&buf->fw_st);
fe304143
TI
284#ifdef CONFIG_FW_LOADER_USER_HELPER
285 INIT_LIST_HEAD(&buf->pending_list);
286#endif
1f2b7959
ML
287
288 pr_debug("%s: fw-%s buf=%p\n", __func__, fw_name, buf);
289
290 return buf;
291}
292
2887b395
ML
293static struct firmware_buf *__fw_lookup_buf(const char *fw_name)
294{
295 struct firmware_buf *tmp;
296 struct firmware_cache *fwc = &fw_cache;
297
298 list_for_each_entry(tmp, &fwc->head, list)
299 if (!strcmp(tmp->fw_id, fw_name))
300 return tmp;
301 return NULL;
302}
303
30172bea 304/* Returns 1 for batching firmware requests with the same name */
1f2b7959
ML
305static int fw_lookup_and_allocate_buf(const char *fw_name,
306 struct firmware_cache *fwc,
a098ecd2
SB
307 struct firmware_buf **buf, void *dbuf,
308 size_t size)
1f2b7959
ML
309{
310 struct firmware_buf *tmp;
311
312 spin_lock(&fwc->lock);
2887b395
ML
313 tmp = __fw_lookup_buf(fw_name);
314 if (tmp) {
315 kref_get(&tmp->ref);
316 spin_unlock(&fwc->lock);
317 *buf = tmp;
30172bea 318 pr_debug("batched request - sharing the same struct firmware_buf and lookup for multiple requests\n");
2887b395
ML
319 return 1;
320 }
a098ecd2 321 tmp = __allocate_fw_buf(fw_name, fwc, dbuf, size);
1f2b7959
ML
322 if (tmp)
323 list_add(&tmp->list, &fwc->head);
324 spin_unlock(&fwc->lock);
325
326 *buf = tmp;
327
328 return tmp ? 0 : -ENOMEM;
329}
330
331static void __fw_free_buf(struct kref *ref)
98233b21 332 __releases(&fwc->lock)
1f2b7959
ML
333{
334 struct firmware_buf *buf = to_fwbuf(ref);
335 struct firmware_cache *fwc = buf->fwc;
1f2b7959
ML
336
337 pr_debug("%s: fw-%s buf=%p data=%p size=%u\n",
338 __func__, buf->fw_id, buf, buf->data,
339 (unsigned int)buf->size);
340
1f2b7959
ML
341 list_del(&buf->list);
342 spin_unlock(&fwc->lock);
343
7b1269f7 344#ifdef CONFIG_FW_LOADER_USER_HELPER
cd7239fa 345 if (buf->is_paged_buf) {
7b1269f7 346 int i;
746058f4
ML
347 vunmap(buf->data);
348 for (i = 0; i < buf->nr_pages; i++)
349 __free_page(buf->pages[i]);
10a3fbf1 350 vfree(buf->pages);
746058f4 351 } else
7b1269f7 352#endif
a098ecd2 353 if (!buf->allocated_size)
746058f4 354 vfree(buf->data);
e0fd9b1d 355 kfree_const(buf->fw_id);
1f2b7959
ML
356 kfree(buf);
357}
358
359static void fw_free_buf(struct firmware_buf *buf)
360{
bd9eb7fb
CL
361 struct firmware_cache *fwc = buf->fwc;
362 spin_lock(&fwc->lock);
363 if (!kref_put(&buf->ref, __fw_free_buf))
364 spin_unlock(&fwc->lock);
1f2b7959
ML
365}
366
746058f4 367/* direct firmware loading support */
27602842
ML
368static char fw_path_para[256];
369static const char * const fw_path[] = {
370 fw_path_para,
746058f4
ML
371 "/lib/firmware/updates/" UTS_RELEASE,
372 "/lib/firmware/updates",
373 "/lib/firmware/" UTS_RELEASE,
374 "/lib/firmware"
375};
376
27602842
ML
377/*
378 * Typical usage is that passing 'firmware_class.path=$CUSTOMIZED_PATH'
379 * from kernel command line because firmware_class is generally built in
380 * kernel instead of module.
381 */
382module_param_string(path, fw_path_para, sizeof(fw_path_para), 0644);
383MODULE_PARM_DESC(path, "customized firmware image search path with a higher priority than default path");
384
a098ecd2
SB
385static int
386fw_get_filesystem_firmware(struct device *device, struct firmware_buf *buf)
746058f4 387{
e40ba6d5 388 loff_t size;
1ba4de17 389 int i, len;
3e358ac2 390 int rc = -ENOENT;
f5727b05 391 char *path;
a098ecd2
SB
392 enum kernel_read_file_id id = READING_FIRMWARE;
393 size_t msize = INT_MAX;
394
395 /* Already populated data member means we're loading into a buffer */
396 if (buf->data) {
397 id = READING_FIRMWARE_PREALLOC_BUFFER;
398 msize = buf->allocated_size;
399 }
f5727b05
LR
400
401 path = __getname();
402 if (!path)
403 return -ENOMEM;
746058f4
ML
404
405 for (i = 0; i < ARRAY_SIZE(fw_path); i++) {
27602842
ML
406 /* skip the unset customized path */
407 if (!fw_path[i][0])
408 continue;
409
1ba4de17
LR
410 len = snprintf(path, PATH_MAX, "%s/%s",
411 fw_path[i], buf->fw_id);
412 if (len >= PATH_MAX) {
413 rc = -ENAMETOOLONG;
414 break;
415 }
746058f4 416
e40ba6d5 417 buf->size = 0;
a098ecd2
SB
418 rc = kernel_read_file_from_path(path, &buf->data, &size, msize,
419 id);
4b2530d8 420 if (rc) {
8e516aa5
LR
421 if (rc == -ENOENT)
422 dev_dbg(device, "loading %s failed with error %d\n",
423 path, rc);
424 else
425 dev_warn(device, "loading %s failed with error %d\n",
426 path, rc);
4b2530d8
KC
427 continue;
428 }
e40ba6d5
MZ
429 dev_dbg(device, "direct-loading %s\n", buf->fw_id);
430 buf->size = size;
5b029624 431 fw_state_done(&buf->fw_st);
4b2530d8 432 break;
4e0c92d0 433 }
4b2530d8 434 __putname(path);
4e0c92d0 435
3e358ac2 436 return rc;
746058f4
ML
437}
438
7b1269f7
TI
439/* firmware holds the ownership of pages */
440static void firmware_free_data(const struct firmware *fw)
441{
442 /* Loaded directly? */
443 if (!fw->priv) {
444 vfree(fw->data);
445 return;
446 }
447 fw_free_buf(fw->priv);
448}
449
cd7239fa
TI
450/* store the pages buffer info firmware from buf */
451static void fw_set_page_data(struct firmware_buf *buf, struct firmware *fw)
452{
453 fw->priv = buf;
454#ifdef CONFIG_FW_LOADER_USER_HELPER
455 fw->pages = buf->pages;
456#endif
457 fw->size = buf->size;
458 fw->data = buf->data;
459
460 pr_debug("%s: fw-%s buf=%p data=%p size=%u\n",
461 __func__, buf->fw_id, buf, buf->data,
462 (unsigned int)buf->size);
463}
464
465#ifdef CONFIG_PM_SLEEP
466static void fw_name_devm_release(struct device *dev, void *res)
467{
468 struct fw_name_devm *fwn = res;
469
470 if (fwn->magic == (unsigned long)&fw_cache)
471 pr_debug("%s: fw_name-%s devm-%p released\n",
472 __func__, fwn->name, res);
e0fd9b1d 473 kfree_const(fwn->name);
cd7239fa
TI
474}
475
476static int fw_devm_match(struct device *dev, void *res,
477 void *match_data)
478{
479 struct fw_name_devm *fwn = res;
480
481 return (fwn->magic == (unsigned long)&fw_cache) &&
482 !strcmp(fwn->name, match_data);
483}
484
485static struct fw_name_devm *fw_find_devm_name(struct device *dev,
486 const char *name)
487{
488 struct fw_name_devm *fwn;
489
490 fwn = devres_find(dev, fw_name_devm_release,
491 fw_devm_match, (void *)name);
492 return fwn;
493}
494
495/* add firmware name into devres list */
496static int fw_add_devm_name(struct device *dev, const char *name)
497{
498 struct fw_name_devm *fwn;
499
500 fwn = fw_find_devm_name(dev, name);
501 if (fwn)
502 return 1;
503
e0fd9b1d
LR
504 fwn = devres_alloc(fw_name_devm_release, sizeof(struct fw_name_devm),
505 GFP_KERNEL);
cd7239fa
TI
506 if (!fwn)
507 return -ENOMEM;
e0fd9b1d
LR
508 fwn->name = kstrdup_const(name, GFP_KERNEL);
509 if (!fwn->name) {
a885de67 510 devres_free(fwn);
e0fd9b1d
LR
511 return -ENOMEM;
512 }
cd7239fa
TI
513
514 fwn->magic = (unsigned long)&fw_cache;
cd7239fa
TI
515 devres_add(dev, fwn);
516
517 return 0;
518}
519#else
520static int fw_add_devm_name(struct device *dev, const char *name)
521{
522 return 0;
523}
524#endif
525
8509adca
LR
526static int assign_firmware_buf(struct firmware *fw, struct device *device,
527 unsigned int opt_flags)
528{
529 struct firmware_buf *buf = fw->priv;
530
531 mutex_lock(&fw_lock);
532 if (!buf->size || fw_state_is_aborted(&buf->fw_st)) {
533 mutex_unlock(&fw_lock);
534 return -ENOENT;
535 }
536
537 /*
538 * add firmware name into devres list so that we can auto cache
539 * and uncache firmware for device.
540 *
541 * device may has been deleted already, but the problem
542 * should be fixed in devres or driver core.
543 */
544 /* don't cache firmware handled without uevent */
545 if (device && (opt_flags & FW_OPT_UEVENT) &&
546 !(opt_flags & FW_OPT_NOCACHE))
547 fw_add_devm_name(device, buf->fw_id);
548
549 /*
550 * After caching firmware image is started, let it piggyback
551 * on request firmware.
552 */
553 if (!(opt_flags & FW_OPT_NOCACHE) &&
554 buf->fwc->state == FW_LOADER_START_CACHE) {
555 if (fw_cache_piggyback_on_request(buf->fw_id))
556 kref_get(&buf->ref);
557 }
558
559 /* pass the pages buffer to driver at the last minute */
560 fw_set_page_data(buf, fw);
561 mutex_unlock(&fw_lock);
562 return 0;
563}
cd7239fa
TI
564
565/*
566 * user-mode helper code
567 */
7b1269f7 568#ifdef CONFIG_FW_LOADER_USER_HELPER
cd7239fa 569struct firmware_priv {
cd7239fa
TI
570 bool nowait;
571 struct device dev;
572 struct firmware_buf *buf;
573 struct firmware *fw;
574};
7b1269f7 575
f8a4bd34
DT
576static struct firmware_priv *to_firmware_priv(struct device *dev)
577{
578 return container_of(dev, struct firmware_priv, dev);
579}
580
7068cb07 581static void __fw_load_abort(struct firmware_buf *buf)
1da177e4 582{
87597936
ML
583 /*
584 * There is a small window in which user can write to 'loading'
585 * between loading done and disappearance of 'loading'
586 */
f52cc379 587 if (fw_state_is_done(&buf->fw_st))
87597936
ML
588 return;
589
fe304143 590 list_del_init(&buf->pending_list);
f52cc379 591 fw_state_aborted(&buf->fw_st);
1da177e4
LT
592}
593
7068cb07
GKH
594static void fw_load_abort(struct firmware_priv *fw_priv)
595{
596 struct firmware_buf *buf = fw_priv->buf;
597
598 __fw_load_abort(buf);
1da177e4
LT
599}
600
fe304143
TI
601static LIST_HEAD(pending_fw_head);
602
c4b76893 603static void kill_pending_fw_fallback_reqs(bool only_kill_custom)
6383331d
LR
604{
605 struct firmware_buf *buf;
606 struct firmware_buf *next;
607
608 mutex_lock(&fw_lock);
609 list_for_each_entry_safe(buf, next, &pending_fw_head, pending_list) {
c4b76893 610 if (!buf->need_uevent || !only_kill_custom)
6383331d
LR
611 __fw_load_abort(buf);
612 }
613 mutex_unlock(&fw_lock);
614}
6383331d 615
14adbe53
GKH
616static ssize_t timeout_show(struct class *class, struct class_attribute *attr,
617 char *buf)
1da177e4
LT
618{
619 return sprintf(buf, "%d\n", loading_timeout);
620}
621
622/**
eb8e3179
RD
623 * firmware_timeout_store - set number of seconds to wait for firmware
624 * @class: device class pointer
e59817bf 625 * @attr: device attribute pointer
eb8e3179
RD
626 * @buf: buffer to scan for timeout value
627 * @count: number of bytes in @buf
628 *
1da177e4 629 * Sets the number of seconds to wait for the firmware. Once
eb8e3179 630 * this expires an error will be returned to the driver and no
1da177e4
LT
631 * firmware will be provided.
632 *
eb8e3179 633 * Note: zero means 'wait forever'.
1da177e4 634 **/
14adbe53
GKH
635static ssize_t timeout_store(struct class *class, struct class_attribute *attr,
636 const char *buf, size_t count)
1da177e4
LT
637{
638 loading_timeout = simple_strtol(buf, NULL, 10);
b92eac01
SG
639 if (loading_timeout < 0)
640 loading_timeout = 0;
f8a4bd34 641
1da177e4
LT
642 return count;
643}
3f214cff 644static CLASS_ATTR_RW(timeout);
1da177e4 645
3f214cff
GKH
646static struct attribute *firmware_class_attrs[] = {
647 &class_attr_timeout.attr,
648 NULL,
673fae90 649};
3f214cff 650ATTRIBUTE_GROUPS(firmware_class);
1da177e4 651
1244691c
ML
652static void fw_dev_release(struct device *dev)
653{
654 struct firmware_priv *fw_priv = to_firmware_priv(dev);
65710cb6 655
673fae90 656 kfree(fw_priv);
673fae90 657}
1da177e4 658
6f957724 659static int do_firmware_uevent(struct firmware_priv *fw_priv, struct kobj_uevent_env *env)
1da177e4 660{
1244691c 661 if (add_uevent_var(env, "FIRMWARE=%s", fw_priv->buf->fw_id))
1da177e4 662 return -ENOMEM;
7eff2e7a 663 if (add_uevent_var(env, "TIMEOUT=%i", loading_timeout))
6897089c 664 return -ENOMEM;
e9045f91
JB
665 if (add_uevent_var(env, "ASYNC=%d", fw_priv->nowait))
666 return -ENOMEM;
1da177e4
LT
667
668 return 0;
669}
670
6f957724
LT
671static int firmware_uevent(struct device *dev, struct kobj_uevent_env *env)
672{
673 struct firmware_priv *fw_priv = to_firmware_priv(dev);
674 int err = 0;
675
676 mutex_lock(&fw_lock);
677 if (fw_priv->buf)
678 err = do_firmware_uevent(fw_priv, env);
679 mutex_unlock(&fw_lock);
680 return err;
681}
682
1b81d663
AB
683static struct class firmware_class = {
684 .name = "firmware",
3f214cff 685 .class_groups = firmware_class_groups,
e55c8790
GKH
686 .dev_uevent = firmware_uevent,
687 .dev_release = fw_dev_release,
1b81d663
AB
688};
689
e55c8790
GKH
690static ssize_t firmware_loading_show(struct device *dev,
691 struct device_attribute *attr, char *buf)
1da177e4 692{
f8a4bd34 693 struct firmware_priv *fw_priv = to_firmware_priv(dev);
87597936
ML
694 int loading = 0;
695
696 mutex_lock(&fw_lock);
697 if (fw_priv->buf)
f52cc379 698 loading = fw_state_is_loading(&fw_priv->buf->fw_st);
87597936 699 mutex_unlock(&fw_lock);
f8a4bd34 700
1da177e4
LT
701 return sprintf(buf, "%d\n", loading);
702}
703
6e03a201
DW
704/* Some architectures don't have PAGE_KERNEL_RO */
705#ifndef PAGE_KERNEL_RO
706#define PAGE_KERNEL_RO PAGE_KERNEL
707#endif
253c9240
ML
708
709/* one pages buffer should be mapped/unmapped only once */
710static int fw_map_pages_buf(struct firmware_buf *buf)
711{
cd7239fa 712 if (!buf->is_paged_buf)
746058f4
ML
713 return 0;
714
daa3d67f 715 vunmap(buf->data);
253c9240
ML
716 buf->data = vmap(buf->pages, buf->nr_pages, 0, PAGE_KERNEL_RO);
717 if (!buf->data)
718 return -ENOMEM;
719 return 0;
720}
721
1da177e4 722/**
eb8e3179 723 * firmware_loading_store - set value in the 'loading' control file
e55c8790 724 * @dev: device pointer
af9997e4 725 * @attr: device attribute pointer
eb8e3179
RD
726 * @buf: buffer to scan for loading control value
727 * @count: number of bytes in @buf
728 *
1da177e4
LT
729 * The relevant values are:
730 *
731 * 1: Start a load, discarding any previous partial load.
eb8e3179 732 * 0: Conclude the load and hand the data to the driver code.
1da177e4
LT
733 * -1: Conclude the load with an error and discard any written data.
734 **/
e55c8790
GKH
735static ssize_t firmware_loading_store(struct device *dev,
736 struct device_attribute *attr,
737 const char *buf, size_t count)
1da177e4 738{
f8a4bd34 739 struct firmware_priv *fw_priv = to_firmware_priv(dev);
87597936 740 struct firmware_buf *fw_buf;
6593d924 741 ssize_t written = count;
1da177e4 742 int loading = simple_strtol(buf, NULL, 10);
6e03a201 743 int i;
1da177e4 744
eea915bb 745 mutex_lock(&fw_lock);
87597936 746 fw_buf = fw_priv->buf;
191e885a 747 if (fw_state_is_aborted(&fw_buf->fw_st))
eea915bb
NH
748 goto out;
749
1da177e4
LT
750 switch (loading) {
751 case 1:
65710cb6 752 /* discarding any previous partial load */
f52cc379 753 if (!fw_state_is_done(&fw_buf->fw_st)) {
1244691c
ML
754 for (i = 0; i < fw_buf->nr_pages; i++)
755 __free_page(fw_buf->pages[i]);
10a3fbf1 756 vfree(fw_buf->pages);
1244691c
ML
757 fw_buf->pages = NULL;
758 fw_buf->page_array_size = 0;
759 fw_buf->nr_pages = 0;
f52cc379 760 fw_state_start(&fw_buf->fw_st);
28eefa75 761 }
1da177e4
LT
762 break;
763 case 0:
f52cc379 764 if (fw_state_is_loading(&fw_buf->fw_st)) {
6593d924
KC
765 int rc;
766
253c9240
ML
767 /*
768 * Several loading requests may be pending on
769 * one same firmware buf, so let all requests
770 * see the mapped 'buf->data' once the loading
771 * is completed.
772 * */
6593d924
KC
773 rc = fw_map_pages_buf(fw_buf);
774 if (rc)
2b1278cb 775 dev_err(dev, "%s: map pages failed\n",
776 __func__);
6593d924 777 else
e40ba6d5
MZ
778 rc = security_kernel_post_read_file(NULL,
779 fw_buf->data, fw_buf->size,
780 READING_FIRMWARE);
6593d924
KC
781
782 /*
783 * Same logic as fw_load_abort, only the DONE bit
784 * is ignored and we set ABORT only on failure.
785 */
fe304143 786 list_del_init(&fw_buf->pending_list);
6593d924 787 if (rc) {
f52cc379 788 fw_state_aborted(&fw_buf->fw_st);
6593d924 789 written = rc;
f52cc379
DW
790 } else {
791 fw_state_done(&fw_buf->fw_st);
6593d924 792 }
1da177e4
LT
793 break;
794 }
795 /* fallthrough */
796 default:
266a813c 797 dev_err(dev, "%s: unexpected value (%d)\n", __func__, loading);
1da177e4
LT
798 /* fallthrough */
799 case -1:
800 fw_load_abort(fw_priv);
801 break;
802 }
eea915bb
NH
803out:
804 mutex_unlock(&fw_lock);
6593d924 805 return written;
1da177e4
LT
806}
807
e55c8790 808static DEVICE_ATTR(loading, 0644, firmware_loading_show, firmware_loading_store);
1da177e4 809
a098ecd2
SB
810static void firmware_rw_buf(struct firmware_buf *buf, char *buffer,
811 loff_t offset, size_t count, bool read)
812{
813 if (read)
814 memcpy(buffer, buf->data + offset, count);
815 else
816 memcpy(buf->data + offset, buffer, count);
817}
818
9ccf9811
SB
819static void firmware_rw(struct firmware_buf *buf, char *buffer,
820 loff_t offset, size_t count, bool read)
821{
822 while (count) {
823 void *page_data;
824 int page_nr = offset >> PAGE_SHIFT;
825 int page_ofs = offset & (PAGE_SIZE-1);
826 int page_cnt = min_t(size_t, PAGE_SIZE - page_ofs, count);
827
828 page_data = kmap(buf->pages[page_nr]);
829
830 if (read)
831 memcpy(buffer, page_data + page_ofs, page_cnt);
832 else
833 memcpy(page_data + page_ofs, buffer, page_cnt);
834
835 kunmap(buf->pages[page_nr]);
836 buffer += page_cnt;
837 offset += page_cnt;
838 count -= page_cnt;
839 }
840}
841
f8a4bd34
DT
842static ssize_t firmware_data_read(struct file *filp, struct kobject *kobj,
843 struct bin_attribute *bin_attr,
844 char *buffer, loff_t offset, size_t count)
1da177e4 845{
b0d1f807 846 struct device *dev = kobj_to_dev(kobj);
f8a4bd34 847 struct firmware_priv *fw_priv = to_firmware_priv(dev);
1244691c 848 struct firmware_buf *buf;
f37e6617 849 ssize_t ret_count;
1da177e4 850
cad1e55d 851 mutex_lock(&fw_lock);
1244691c 852 buf = fw_priv->buf;
f52cc379 853 if (!buf || fw_state_is_done(&buf->fw_st)) {
1da177e4
LT
854 ret_count = -ENODEV;
855 goto out;
856 }
1244691c 857 if (offset > buf->size) {
308975fa
JS
858 ret_count = 0;
859 goto out;
860 }
1244691c
ML
861 if (count > buf->size - offset)
862 count = buf->size - offset;
6e03a201
DW
863
864 ret_count = count;
865
a098ecd2
SB
866 if (buf->data)
867 firmware_rw_buf(buf, buffer, offset, count, true);
868 else
869 firmware_rw(buf, buffer, offset, count, true);
6e03a201 870
1da177e4 871out:
cad1e55d 872 mutex_unlock(&fw_lock);
1da177e4
LT
873 return ret_count;
874}
eb8e3179 875
f8a4bd34 876static int fw_realloc_buffer(struct firmware_priv *fw_priv, int min_size)
1da177e4 877{
1244691c 878 struct firmware_buf *buf = fw_priv->buf;
a76040d8 879 int pages_needed = PAGE_ALIGN(min_size) >> PAGE_SHIFT;
6e03a201
DW
880
881 /* If the array of pages is too small, grow it... */
1244691c 882 if (buf->page_array_size < pages_needed) {
6e03a201 883 int new_array_size = max(pages_needed,
1244691c 884 buf->page_array_size * 2);
6e03a201
DW
885 struct page **new_pages;
886
10a3fbf1 887 new_pages = vmalloc(new_array_size * sizeof(void *));
6e03a201
DW
888 if (!new_pages) {
889 fw_load_abort(fw_priv);
890 return -ENOMEM;
891 }
1244691c
ML
892 memcpy(new_pages, buf->pages,
893 buf->page_array_size * sizeof(void *));
894 memset(&new_pages[buf->page_array_size], 0, sizeof(void *) *
895 (new_array_size - buf->page_array_size));
10a3fbf1 896 vfree(buf->pages);
1244691c
ML
897 buf->pages = new_pages;
898 buf->page_array_size = new_array_size;
6e03a201 899 }
1da177e4 900
1244691c
ML
901 while (buf->nr_pages < pages_needed) {
902 buf->pages[buf->nr_pages] =
6e03a201 903 alloc_page(GFP_KERNEL | __GFP_HIGHMEM);
1da177e4 904
1244691c 905 if (!buf->pages[buf->nr_pages]) {
6e03a201
DW
906 fw_load_abort(fw_priv);
907 return -ENOMEM;
908 }
1244691c 909 buf->nr_pages++;
1da177e4 910 }
1da177e4
LT
911 return 0;
912}
913
914/**
eb8e3179 915 * firmware_data_write - write method for firmware
2c3c8bea 916 * @filp: open sysfs file
e55c8790 917 * @kobj: kobject for the device
42e61f4a 918 * @bin_attr: bin_attr structure
eb8e3179
RD
919 * @buffer: buffer being written
920 * @offset: buffer offset for write in total data store area
921 * @count: buffer size
1da177e4 922 *
eb8e3179 923 * Data written to the 'data' attribute will be later handed to
1da177e4
LT
924 * the driver as a firmware image.
925 **/
f8a4bd34
DT
926static ssize_t firmware_data_write(struct file *filp, struct kobject *kobj,
927 struct bin_attribute *bin_attr,
928 char *buffer, loff_t offset, size_t count)
1da177e4 929{
b0d1f807 930 struct device *dev = kobj_to_dev(kobj);
f8a4bd34 931 struct firmware_priv *fw_priv = to_firmware_priv(dev);
1244691c 932 struct firmware_buf *buf;
1da177e4
LT
933 ssize_t retval;
934
935 if (!capable(CAP_SYS_RAWIO))
936 return -EPERM;
b92eac01 937
cad1e55d 938 mutex_lock(&fw_lock);
1244691c 939 buf = fw_priv->buf;
f52cc379 940 if (!buf || fw_state_is_done(&buf->fw_st)) {
1da177e4
LT
941 retval = -ENODEV;
942 goto out;
943 }
65710cb6 944
a098ecd2
SB
945 if (buf->data) {
946 if (offset + count > buf->allocated_size) {
947 retval = -ENOMEM;
948 goto out;
949 }
950 firmware_rw_buf(buf, buffer, offset, count, false);
951 retval = count;
952 } else {
953 retval = fw_realloc_buffer(fw_priv, offset + count);
954 if (retval)
955 goto out;
1da177e4 956
a098ecd2
SB
957 retval = count;
958 firmware_rw(buf, buffer, offset, count, false);
959 }
6e03a201 960
9ccf9811 961 buf->size = max_t(size_t, offset + count, buf->size);
1da177e4 962out:
cad1e55d 963 mutex_unlock(&fw_lock);
1da177e4
LT
964 return retval;
965}
eb8e3179 966
0983ca2d
DT
967static struct bin_attribute firmware_attr_data = {
968 .attr = { .name = "data", .mode = 0644 },
1da177e4
LT
969 .size = 0,
970 .read = firmware_data_read,
971 .write = firmware_data_write,
972};
973
46239902
TI
974static struct attribute *fw_dev_attrs[] = {
975 &dev_attr_loading.attr,
976 NULL
977};
978
979static struct bin_attribute *fw_dev_bin_attrs[] = {
980 &firmware_attr_data,
981 NULL
982};
983
984static const struct attribute_group fw_dev_attr_group = {
985 .attrs = fw_dev_attrs,
986 .bin_attrs = fw_dev_bin_attrs,
987};
988
989static const struct attribute_group *fw_dev_attr_groups[] = {
990 &fw_dev_attr_group,
991 NULL
992};
993
f8a4bd34 994static struct firmware_priv *
dddb5549 995fw_create_instance(struct firmware *firmware, const char *fw_name,
14c4bae7 996 struct device *device, unsigned int opt_flags)
1da177e4 997{
f8a4bd34
DT
998 struct firmware_priv *fw_priv;
999 struct device *f_dev;
1da177e4 1000
1244691c 1001 fw_priv = kzalloc(sizeof(*fw_priv), GFP_KERNEL);
f8a4bd34 1002 if (!fw_priv) {
1244691c
ML
1003 fw_priv = ERR_PTR(-ENOMEM);
1004 goto exit;
1005 }
1006
14c4bae7 1007 fw_priv->nowait = !!(opt_flags & FW_OPT_NOWAIT);
1f2b7959 1008 fw_priv->fw = firmware;
f8a4bd34
DT
1009 f_dev = &fw_priv->dev;
1010
1011 device_initialize(f_dev);
99c2aa72 1012 dev_set_name(f_dev, "%s", fw_name);
e55c8790
GKH
1013 f_dev->parent = device;
1014 f_dev->class = &firmware_class;
46239902 1015 f_dev->groups = fw_dev_attr_groups;
1244691c 1016exit:
f8a4bd34 1017 return fw_priv;
1da177e4
LT
1018}
1019
cd7239fa 1020/* load a firmware via user helper */
14c4bae7
TI
1021static int _request_firmware_load(struct firmware_priv *fw_priv,
1022 unsigned int opt_flags, long timeout)
1f2b7959 1023{
cd7239fa
TI
1024 int retval = 0;
1025 struct device *f_dev = &fw_priv->dev;
1026 struct firmware_buf *buf = fw_priv->buf;
1f2b7959 1027
cd7239fa 1028 /* fall back on userspace loading */
a098ecd2
SB
1029 if (!buf->data)
1030 buf->is_paged_buf = true;
1f2b7959 1031
cd7239fa 1032 dev_set_uevent_suppress(f_dev, true);
f531f05a 1033
cd7239fa
TI
1034 retval = device_add(f_dev);
1035 if (retval) {
1036 dev_err(f_dev, "%s: device_register failed\n", __func__);
1037 goto err_put_dev;
1038 }
f531f05a 1039
1eeeef15
MB
1040 mutex_lock(&fw_lock);
1041 list_add(&buf->pending_list, &pending_fw_head);
1042 mutex_unlock(&fw_lock);
1043
14c4bae7 1044 if (opt_flags & FW_OPT_UEVENT) {
af5bc11e 1045 buf->need_uevent = true;
cd7239fa
TI
1046 dev_set_uevent_suppress(f_dev, false);
1047 dev_dbg(f_dev, "firmware: requesting %s\n", buf->fw_id);
cd7239fa 1048 kobject_uevent(&fw_priv->dev.kobj, KOBJ_ADD);
68ff2a00
ML
1049 } else {
1050 timeout = MAX_JIFFY_OFFSET;
cd7239fa 1051 }
f531f05a 1052
5d47ec02
BA
1053 retval = fw_state_wait_timeout(&buf->fw_st, timeout);
1054 if (retval < 0) {
0cb64249
ML
1055 mutex_lock(&fw_lock);
1056 fw_load_abort(fw_priv);
1057 mutex_unlock(&fw_lock);
1058 }
f531f05a 1059
76098b36
LR
1060 if (fw_state_is_aborted(&buf->fw_st)) {
1061 if (retval == -ERESTARTSYS)
1062 retval = -EINTR;
1063 else
1064 retval = -EAGAIN;
1065 } else if (buf->is_paged_buf && !buf->data)
2b1278cb 1066 retval = -ENOMEM;
f531f05a 1067
cd7239fa
TI
1068 device_del(f_dev);
1069err_put_dev:
1070 put_device(f_dev);
1071 return retval;
f531f05a 1072}
cd7239fa
TI
1073
1074static int fw_load_from_user_helper(struct firmware *firmware,
1075 const char *name, struct device *device,
06a45a93 1076 unsigned int opt_flags)
cfe016b1 1077{
cd7239fa 1078 struct firmware_priv *fw_priv;
06a45a93
LR
1079 long timeout;
1080 int ret;
1081
1082 timeout = firmware_loading_timeout();
1083 if (opt_flags & FW_OPT_NOWAIT) {
1084 timeout = usermodehelper_read_lock_wait(timeout);
1085 if (!timeout) {
1086 dev_dbg(device, "firmware: %s loading timed out\n",
1087 name);
1088 return -EBUSY;
1089 }
1090 } else {
1091 ret = usermodehelper_read_trylock();
1092 if (WARN_ON(ret)) {
1093 dev_err(device, "firmware: %s will not be loaded\n",
1094 name);
1095 return ret;
1096 }
1097 }
cd7239fa 1098
14c4bae7 1099 fw_priv = fw_create_instance(firmware, name, device, opt_flags);
06a45a93
LR
1100 if (IS_ERR(fw_priv)) {
1101 ret = PTR_ERR(fw_priv);
1102 goto out_unlock;
1103 }
cd7239fa
TI
1104
1105 fw_priv->buf = firmware->priv;
06a45a93
LR
1106 ret = _request_firmware_load(fw_priv, opt_flags, timeout);
1107
1108 if (!ret)
1109 ret = assign_firmware_buf(firmware, device, opt_flags);
1110
1111out_unlock:
1112 usermodehelper_read_unlock();
1113
1114 return ret;
cfe016b1 1115}
ddf1f064 1116
cd7239fa
TI
1117#else /* CONFIG_FW_LOADER_USER_HELPER */
1118static inline int
1119fw_load_from_user_helper(struct firmware *firmware, const char *name,
06a45a93 1120 struct device *device, unsigned int opt_flags)
cd7239fa
TI
1121{
1122 return -ENOENT;
1123}
807be03c 1124
c4b76893 1125static inline void kill_pending_fw_fallback_reqs(bool only_kill_custom) { }
ddf1f064 1126
cd7239fa
TI
1127#endif /* CONFIG_FW_LOADER_USER_HELPER */
1128
4e0c92d0
TI
1129/* prepare firmware and firmware_buf structs;
1130 * return 0 if a firmware is already assigned, 1 if need to load one,
1131 * or a negative error code
1132 */
1133static int
1134_request_firmware_prepare(struct firmware **firmware_p, const char *name,
a098ecd2 1135 struct device *device, void *dbuf, size_t size)
1da177e4 1136{
1da177e4 1137 struct firmware *firmware;
1f2b7959
ML
1138 struct firmware_buf *buf;
1139 int ret;
1da177e4 1140
4aed0644 1141 *firmware_p = firmware = kzalloc(sizeof(*firmware), GFP_KERNEL);
1da177e4 1142 if (!firmware) {
266a813c
BH
1143 dev_err(device, "%s: kmalloc(struct firmware) failed\n",
1144 __func__);
4e0c92d0 1145 return -ENOMEM;
1da177e4 1146 }
1da177e4 1147
a098ecd2 1148 if (fw_get_builtin_firmware(firmware, name, dbuf, size)) {
ed04630b 1149 dev_dbg(device, "using built-in %s\n", name);
4e0c92d0 1150 return 0; /* assigned */
5658c769
DW
1151 }
1152
a098ecd2 1153 ret = fw_lookup_and_allocate_buf(name, &fw_cache, &buf, dbuf, size);
4e0c92d0
TI
1154
1155 /*
1156 * bind with 'buf' now to avoid warning in failure path
1157 * of requesting firmware.
1158 */
1159 firmware->priv = buf;
1160
1161 if (ret > 0) {
5b029624 1162 ret = fw_state_wait(&buf->fw_st);
4e0c92d0
TI
1163 if (!ret) {
1164 fw_set_page_data(buf, firmware);
1165 return 0; /* assigned */
1166 }
dddb5549 1167 }
811fa400 1168
4e0c92d0
TI
1169 if (ret < 0)
1170 return ret;
1171 return 1; /* need to load */
1172}
1173
90d41e74
LR
1174/*
1175 * Batched requests need only one wake, we need to do this step last due to the
1176 * fallback mechanism. The buf is protected with kref_get(), and it won't be
1177 * released until the last user calls release_firmware().
1178 *
1179 * Failed batched requests are possible as well, in such cases we just share
1180 * the struct firmware_buf and won't release it until all requests are woken
1181 * and have gone through this same path.
1182 */
1183static void fw_abort_batch_reqs(struct firmware *fw)
1184{
1185 struct firmware_buf *buf;
1186
1187 /* Loaded directly? */
1188 if (!fw || !fw->priv)
1189 return;
1190
1191 buf = fw->priv;
1192 if (!fw_state_is_aborted(&buf->fw_st))
1193 fw_state_aborted(&buf->fw_st);
1194}
1195
4e0c92d0
TI
1196/* called from request_firmware() and request_firmware_work_func() */
1197static int
1198_request_firmware(const struct firmware **firmware_p, const char *name,
a098ecd2
SB
1199 struct device *device, void *buf, size_t size,
1200 unsigned int opt_flags)
4e0c92d0 1201{
715780ae 1202 struct firmware *fw = NULL;
4e0c92d0
TI
1203 int ret;
1204
1205 if (!firmware_p)
1206 return -EINVAL;
1207
715780ae
BN
1208 if (!name || name[0] == '\0') {
1209 ret = -EINVAL;
1210 goto out;
1211 }
471b095d 1212
a098ecd2 1213 ret = _request_firmware_prepare(&fw, name, device, buf, size);
4e0c92d0
TI
1214 if (ret <= 0) /* error or already assigned */
1215 goto out;
1216
3e358ac2
NH
1217 ret = fw_get_filesystem_firmware(device, fw->priv);
1218 if (ret) {
c868edf4 1219 if (!(opt_flags & FW_OPT_NO_WARN))
bba3a87e 1220 dev_warn(device,
c868edf4
LR
1221 "Direct firmware load for %s failed with error %d\n",
1222 name, ret);
1223 if (opt_flags & FW_OPT_USERHELPER) {
bba3a87e
TI
1224 dev_warn(device, "Falling back to user helper\n");
1225 ret = fw_load_from_user_helper(fw, name, device,
06a45a93 1226 opt_flags);
bba3a87e 1227 }
06a45a93 1228 } else
14c4bae7 1229 ret = assign_firmware_buf(fw, device, opt_flags);
4e0c92d0 1230
4e0c92d0
TI
1231 out:
1232 if (ret < 0) {
90d41e74 1233 fw_abort_batch_reqs(fw);
4e0c92d0
TI
1234 release_firmware(fw);
1235 fw = NULL;
1236 }
1237
1238 *firmware_p = fw;
1239 return ret;
1240}
1241
6e3eaab0 1242/**
312c004d 1243 * request_firmware: - send firmware request and wait for it
eb8e3179
RD
1244 * @firmware_p: pointer to firmware image
1245 * @name: name of firmware file
1246 * @device: device for which firmware is being loaded
1247 *
1248 * @firmware_p will be used to return a firmware image by the name
6e3eaab0
AS
1249 * of @name for device @device.
1250 *
1251 * Should be called from user context where sleeping is allowed.
1252 *
312c004d 1253 * @name will be used as $FIRMWARE in the uevent environment and
6e3eaab0
AS
1254 * should be distinctive enough not to be confused with any other
1255 * firmware image for this or any other device.
0cfc1e1e
ML
1256 *
1257 * Caller must hold the reference count of @device.
6a927857
ML
1258 *
1259 * The function can be called safely inside device's suspend and
1260 * resume callback.
6e3eaab0
AS
1261 **/
1262int
1263request_firmware(const struct firmware **firmware_p, const char *name,
ea31003c 1264 struct device *device)
6e3eaab0 1265{
d6c8aa39
ML
1266 int ret;
1267
1268 /* Need to pin this module until return */
1269 __module_get(THIS_MODULE);
a098ecd2 1270 ret = _request_firmware(firmware_p, name, device, NULL, 0,
14c4bae7 1271 FW_OPT_UEVENT | FW_OPT_FALLBACK);
d6c8aa39
ML
1272 module_put(THIS_MODULE);
1273 return ret;
6e3eaab0 1274}
f494513f 1275EXPORT_SYMBOL(request_firmware);
6e3eaab0 1276
bba3a87e 1277/**
3c1556b2 1278 * request_firmware_direct: - load firmware directly without usermode helper
bba3a87e
TI
1279 * @firmware_p: pointer to firmware image
1280 * @name: name of firmware file
1281 * @device: device for which firmware is being loaded
1282 *
1283 * This function works pretty much like request_firmware(), but this doesn't
1284 * fall back to usermode helper even if the firmware couldn't be loaded
1285 * directly from fs. Hence it's useful for loading optional firmwares, which
1286 * aren't always present, without extra long timeouts of udev.
1287 **/
1288int request_firmware_direct(const struct firmware **firmware_p,
1289 const char *name, struct device *device)
1290{
1291 int ret;
ea31003c 1292
bba3a87e 1293 __module_get(THIS_MODULE);
a098ecd2 1294 ret = _request_firmware(firmware_p, name, device, NULL, 0,
c868edf4 1295 FW_OPT_UEVENT | FW_OPT_NO_WARN);
bba3a87e
TI
1296 module_put(THIS_MODULE);
1297 return ret;
1298}
1299EXPORT_SYMBOL_GPL(request_firmware_direct);
bba3a87e 1300
a098ecd2
SB
1301/**
1302 * request_firmware_into_buf - load firmware into a previously allocated buffer
1303 * @firmware_p: pointer to firmware image
1304 * @name: name of firmware file
1305 * @device: device for which firmware is being loaded and DMA region allocated
1306 * @buf: address of buffer to load firmware into
1307 * @size: size of buffer
1308 *
1309 * This function works pretty much like request_firmware(), but it doesn't
1310 * allocate a buffer to hold the firmware data. Instead, the firmware
1311 * is loaded directly into the buffer pointed to by @buf and the @firmware_p
1312 * data member is pointed at @buf.
1313 *
1314 * This function doesn't cache firmware either.
1315 */
1316int
1317request_firmware_into_buf(const struct firmware **firmware_p, const char *name,
1318 struct device *device, void *buf, size_t size)
1319{
1320 int ret;
1321
1322 __module_get(THIS_MODULE);
1323 ret = _request_firmware(firmware_p, name, device, buf, size,
1324 FW_OPT_UEVENT | FW_OPT_FALLBACK |
1325 FW_OPT_NOCACHE);
1326 module_put(THIS_MODULE);
1327 return ret;
1328}
1329EXPORT_SYMBOL(request_firmware_into_buf);
1330
1da177e4
LT
1331/**
1332 * release_firmware: - release the resource associated with a firmware image
eb8e3179 1333 * @fw: firmware resource to release
1da177e4 1334 **/
bcb9bd18 1335void release_firmware(const struct firmware *fw)
1da177e4
LT
1336{
1337 if (fw) {
bcb9bd18
DT
1338 if (!fw_is_builtin_firmware(fw))
1339 firmware_free_data(fw);
1da177e4
LT
1340 kfree(fw);
1341 }
1342}
f494513f 1343EXPORT_SYMBOL(release_firmware);
1da177e4 1344
1da177e4
LT
1345/* Async support */
1346struct firmware_work {
1347 struct work_struct work;
1348 struct module *module;
1349 const char *name;
1350 struct device *device;
1351 void *context;
1352 void (*cont)(const struct firmware *fw, void *context);
14c4bae7 1353 unsigned int opt_flags;
1da177e4
LT
1354};
1355
a36cf844 1356static void request_firmware_work_func(struct work_struct *work)
1da177e4 1357{
a36cf844 1358 struct firmware_work *fw_work;
1da177e4 1359 const struct firmware *fw;
f8a4bd34 1360
a36cf844 1361 fw_work = container_of(work, struct firmware_work, work);
811fa400 1362
a098ecd2 1363 _request_firmware(&fw, fw_work->name, fw_work->device, NULL, 0,
14c4bae7 1364 fw_work->opt_flags);
9ebfbd45 1365 fw_work->cont(fw, fw_work->context);
4e0c92d0 1366 put_device(fw_work->device); /* taken in request_firmware_nowait() */
9ebfbd45 1367
1da177e4 1368 module_put(fw_work->module);
f9692b26 1369 kfree_const(fw_work->name);
1da177e4 1370 kfree(fw_work);
1da177e4
LT
1371}
1372
1373/**
3c31f07a 1374 * request_firmware_nowait - asynchronous version of request_firmware
eb8e3179 1375 * @module: module requesting the firmware
312c004d 1376 * @uevent: sends uevent to copy the firmware image if this flag
eb8e3179
RD
1377 * is non-zero else the firmware copy must be done manually.
1378 * @name: name of firmware file
1379 * @device: device for which firmware is being loaded
9ebfbd45 1380 * @gfp: allocation flags
eb8e3179
RD
1381 * @context: will be passed over to @cont, and
1382 * @fw may be %NULL if firmware request fails.
1383 * @cont: function will be called asynchronously when the firmware
1384 * request is over.
1da177e4 1385 *
0cfc1e1e
ML
1386 * Caller must hold the reference count of @device.
1387 *
6f21a62a
ML
1388 * Asynchronous variant of request_firmware() for user contexts:
1389 * - sleep for as small periods as possible since it may
88bcef50
SF
1390 * increase kernel boot time of built-in device drivers
1391 * requesting firmware in their ->probe() methods, if
1392 * @gfp is GFP_KERNEL.
6f21a62a
ML
1393 *
1394 * - can't sleep at all if @gfp is GFP_ATOMIC.
1da177e4
LT
1395 **/
1396int
1397request_firmware_nowait(
072fc8f0 1398 struct module *module, bool uevent,
9ebfbd45 1399 const char *name, struct device *device, gfp_t gfp, void *context,
1da177e4
LT
1400 void (*cont)(const struct firmware *fw, void *context))
1401{
f8a4bd34 1402 struct firmware_work *fw_work;
1da177e4 1403
ea31003c 1404 fw_work = kzalloc(sizeof(struct firmware_work), gfp);
1da177e4
LT
1405 if (!fw_work)
1406 return -ENOMEM;
f8a4bd34
DT
1407
1408 fw_work->module = module;
f9692b26 1409 fw_work->name = kstrdup_const(name, gfp);
303cda0e
LR
1410 if (!fw_work->name) {
1411 kfree(fw_work);
f9692b26 1412 return -ENOMEM;
303cda0e 1413 }
f8a4bd34
DT
1414 fw_work->device = device;
1415 fw_work->context = context;
1416 fw_work->cont = cont;
14c4bae7 1417 fw_work->opt_flags = FW_OPT_NOWAIT | FW_OPT_FALLBACK |
5a1379e8 1418 (uevent ? FW_OPT_UEVENT : FW_OPT_USERHELPER);
f8a4bd34 1419
1da177e4 1420 if (!try_module_get(module)) {
f9692b26 1421 kfree_const(fw_work->name);
1da177e4
LT
1422 kfree(fw_work);
1423 return -EFAULT;
1424 }
1425
0cfc1e1e 1426 get_device(fw_work->device);
a36cf844
SB
1427 INIT_WORK(&fw_work->work, request_firmware_work_func);
1428 schedule_work(&fw_work->work);
1da177e4
LT
1429 return 0;
1430}
f494513f 1431EXPORT_SYMBOL(request_firmware_nowait);
1da177e4 1432
90f89081
ML
1433#ifdef CONFIG_PM_SLEEP
1434static ASYNC_DOMAIN_EXCLUSIVE(fw_cache_domain);
1435
2887b395
ML
1436/**
1437 * cache_firmware - cache one firmware image in kernel memory space
1438 * @fw_name: the firmware image name
1439 *
1440 * Cache firmware in kernel memory so that drivers can use it when
1441 * system isn't ready for them to request firmware image from userspace.
1442 * Once it returns successfully, driver can use request_firmware or its
1443 * nowait version to get the cached firmware without any interacting
1444 * with userspace
1445 *
1446 * Return 0 if the firmware image has been cached successfully
1447 * Return !0 otherwise
1448 *
1449 */
93232e46 1450static int cache_firmware(const char *fw_name)
2887b395
ML
1451{
1452 int ret;
1453 const struct firmware *fw;
1454
1455 pr_debug("%s: %s\n", __func__, fw_name);
1456
1457 ret = request_firmware(&fw, fw_name, NULL);
1458 if (!ret)
1459 kfree(fw);
1460
1461 pr_debug("%s: %s ret=%d\n", __func__, fw_name, ret);
1462
1463 return ret;
1464}
1465
6a2c1234
ML
1466static struct firmware_buf *fw_lookup_buf(const char *fw_name)
1467{
1468 struct firmware_buf *tmp;
1469 struct firmware_cache *fwc = &fw_cache;
1470
1471 spin_lock(&fwc->lock);
1472 tmp = __fw_lookup_buf(fw_name);
1473 spin_unlock(&fwc->lock);
1474
1475 return tmp;
1476}
1477
2887b395
ML
1478/**
1479 * uncache_firmware - remove one cached firmware image
1480 * @fw_name: the firmware image name
1481 *
1482 * Uncache one firmware image which has been cached successfully
1483 * before.
1484 *
1485 * Return 0 if the firmware cache has been removed successfully
1486 * Return !0 otherwise
1487 *
1488 */
93232e46 1489static int uncache_firmware(const char *fw_name)
2887b395
ML
1490{
1491 struct firmware_buf *buf;
1492 struct firmware fw;
1493
1494 pr_debug("%s: %s\n", __func__, fw_name);
1495
a098ecd2 1496 if (fw_get_builtin_firmware(&fw, fw_name, NULL, 0))
2887b395
ML
1497 return 0;
1498
1499 buf = fw_lookup_buf(fw_name);
1500 if (buf) {
1501 fw_free_buf(buf);
1502 return 0;
1503 }
1504
1505 return -EINVAL;
1506}
1507
37276a51
ML
1508static struct fw_cache_entry *alloc_fw_cache_entry(const char *name)
1509{
1510 struct fw_cache_entry *fce;
1511
e0fd9b1d 1512 fce = kzalloc(sizeof(*fce), GFP_ATOMIC);
37276a51
ML
1513 if (!fce)
1514 goto exit;
1515
e0fd9b1d
LR
1516 fce->name = kstrdup_const(name, GFP_ATOMIC);
1517 if (!fce->name) {
1518 kfree(fce);
1519 fce = NULL;
1520 goto exit;
1521 }
37276a51
ML
1522exit:
1523 return fce;
1524}
1525
373304fe 1526static int __fw_entry_found(const char *name)
ac39b3ea
ML
1527{
1528 struct firmware_cache *fwc = &fw_cache;
1529 struct fw_cache_entry *fce;
ac39b3ea 1530
ac39b3ea
ML
1531 list_for_each_entry(fce, &fwc->fw_names, list) {
1532 if (!strcmp(fce->name, name))
373304fe 1533 return 1;
ac39b3ea 1534 }
373304fe
ML
1535 return 0;
1536}
1537
1538static int fw_cache_piggyback_on_request(const char *name)
1539{
1540 struct firmware_cache *fwc = &fw_cache;
1541 struct fw_cache_entry *fce;
1542 int ret = 0;
1543
1544 spin_lock(&fwc->name_lock);
1545 if (__fw_entry_found(name))
1546 goto found;
ac39b3ea
ML
1547
1548 fce = alloc_fw_cache_entry(name);
1549 if (fce) {
1550 ret = 1;
1551 list_add(&fce->list, &fwc->fw_names);
1552 pr_debug("%s: fw: %s\n", __func__, name);
1553 }
1554found:
1555 spin_unlock(&fwc->name_lock);
1556 return ret;
1557}
1558
37276a51
ML
1559static void free_fw_cache_entry(struct fw_cache_entry *fce)
1560{
e0fd9b1d 1561 kfree_const(fce->name);
37276a51
ML
1562 kfree(fce);
1563}
1564
1565static void __async_dev_cache_fw_image(void *fw_entry,
1566 async_cookie_t cookie)
1567{
1568 struct fw_cache_entry *fce = fw_entry;
1569 struct firmware_cache *fwc = &fw_cache;
1570 int ret;
1571
1572 ret = cache_firmware(fce->name);
ac39b3ea
ML
1573 if (ret) {
1574 spin_lock(&fwc->name_lock);
1575 list_del(&fce->list);
1576 spin_unlock(&fwc->name_lock);
37276a51 1577
ac39b3ea
ML
1578 free_fw_cache_entry(fce);
1579 }
37276a51
ML
1580}
1581
1582/* called with dev->devres_lock held */
1583static void dev_create_fw_entry(struct device *dev, void *res,
1584 void *data)
1585{
1586 struct fw_name_devm *fwn = res;
1587 const char *fw_name = fwn->name;
1588 struct list_head *head = data;
1589 struct fw_cache_entry *fce;
1590
1591 fce = alloc_fw_cache_entry(fw_name);
1592 if (fce)
1593 list_add(&fce->list, head);
1594}
1595
1596static int devm_name_match(struct device *dev, void *res,
1597 void *match_data)
1598{
1599 struct fw_name_devm *fwn = res;
1600 return (fwn->magic == (unsigned long)match_data);
1601}
1602
ab6dd8e5 1603static void dev_cache_fw_image(struct device *dev, void *data)
37276a51
ML
1604{
1605 LIST_HEAD(todo);
1606 struct fw_cache_entry *fce;
1607 struct fw_cache_entry *fce_next;
1608 struct firmware_cache *fwc = &fw_cache;
1609
1610 devres_for_each_res(dev, fw_name_devm_release,
1611 devm_name_match, &fw_cache,
1612 dev_create_fw_entry, &todo);
1613
1614 list_for_each_entry_safe(fce, fce_next, &todo, list) {
1615 list_del(&fce->list);
1616
1617 spin_lock(&fwc->name_lock);
373304fe
ML
1618 /* only one cache entry for one firmware */
1619 if (!__fw_entry_found(fce->name)) {
373304fe
ML
1620 list_add(&fce->list, &fwc->fw_names);
1621 } else {
1622 free_fw_cache_entry(fce);
1623 fce = NULL;
1624 }
37276a51
ML
1625 spin_unlock(&fwc->name_lock);
1626
373304fe 1627 if (fce)
d28d3882
ML
1628 async_schedule_domain(__async_dev_cache_fw_image,
1629 (void *)fce,
1630 &fw_cache_domain);
37276a51
ML
1631 }
1632}
1633
1634static void __device_uncache_fw_images(void)
1635{
1636 struct firmware_cache *fwc = &fw_cache;
1637 struct fw_cache_entry *fce;
1638
1639 spin_lock(&fwc->name_lock);
1640 while (!list_empty(&fwc->fw_names)) {
1641 fce = list_entry(fwc->fw_names.next,
1642 struct fw_cache_entry, list);
1643 list_del(&fce->list);
1644 spin_unlock(&fwc->name_lock);
1645
1646 uncache_firmware(fce->name);
1647 free_fw_cache_entry(fce);
1648
1649 spin_lock(&fwc->name_lock);
1650 }
1651 spin_unlock(&fwc->name_lock);
1652}
1653
1654/**
1655 * device_cache_fw_images - cache devices' firmware
1656 *
1657 * If one device called request_firmware or its nowait version
1658 * successfully before, the firmware names are recored into the
1659 * device's devres link list, so device_cache_fw_images can call
1660 * cache_firmware() to cache these firmwares for the device,
1661 * then the device driver can load its firmwares easily at
1662 * time when system is not ready to complete loading firmware.
1663 */
1664static void device_cache_fw_images(void)
1665{
1666 struct firmware_cache *fwc = &fw_cache;
ffe53f6f 1667 int old_timeout;
37276a51
ML
1668 DEFINE_WAIT(wait);
1669
1670 pr_debug("%s\n", __func__);
1671
373304fe
ML
1672 /* cancel uncache work */
1673 cancel_delayed_work_sync(&fwc->work);
1674
ffe53f6f
ML
1675 /*
1676 * use small loading timeout for caching devices' firmware
1677 * because all these firmware images have been loaded
1678 * successfully at lease once, also system is ready for
1679 * completing firmware loading now. The maximum size of
1680 * firmware in current distributions is about 2M bytes,
1681 * so 10 secs should be enough.
1682 */
1683 old_timeout = loading_timeout;
1684 loading_timeout = 10;
1685
ac39b3ea
ML
1686 mutex_lock(&fw_lock);
1687 fwc->state = FW_LOADER_START_CACHE;
ab6dd8e5 1688 dpm_for_each_dev(NULL, dev_cache_fw_image);
ac39b3ea 1689 mutex_unlock(&fw_lock);
37276a51
ML
1690
1691 /* wait for completion of caching firmware for all devices */
d28d3882 1692 async_synchronize_full_domain(&fw_cache_domain);
ffe53f6f
ML
1693
1694 loading_timeout = old_timeout;
37276a51
ML
1695}
1696
1697/**
1698 * device_uncache_fw_images - uncache devices' firmware
1699 *
1700 * uncache all firmwares which have been cached successfully
1701 * by device_uncache_fw_images earlier
1702 */
1703static void device_uncache_fw_images(void)
1704{
1705 pr_debug("%s\n", __func__);
1706 __device_uncache_fw_images();
1707}
1708
1709static void device_uncache_fw_images_work(struct work_struct *work)
1710{
1711 device_uncache_fw_images();
1712}
1713
1714/**
1715 * device_uncache_fw_images_delay - uncache devices firmwares
1716 * @delay: number of milliseconds to delay uncache device firmwares
1717 *
1718 * uncache all devices's firmwares which has been cached successfully
1719 * by device_cache_fw_images after @delay milliseconds.
1720 */
1721static void device_uncache_fw_images_delay(unsigned long delay)
1722{
bce6618a
SD
1723 queue_delayed_work(system_power_efficient_wq, &fw_cache.work,
1724 msecs_to_jiffies(delay));
37276a51
ML
1725}
1726
07646d9c
ML
1727static int fw_pm_notify(struct notifier_block *notify_block,
1728 unsigned long mode, void *unused)
1729{
1730 switch (mode) {
1731 case PM_HIBERNATION_PREPARE:
1732 case PM_SUSPEND_PREPARE:
f8d5b9e9 1733 case PM_RESTORE_PREPARE:
c4b76893
LR
1734 /*
1735 * kill pending fallback requests with a custom fallback
1736 * to avoid stalling suspend.
1737 */
1738 kill_pending_fw_fallback_reqs(true);
07646d9c
ML
1739 device_cache_fw_images();
1740 break;
1741
1742 case PM_POST_SUSPEND:
1743 case PM_POST_HIBERNATION:
1744 case PM_POST_RESTORE:
ac39b3ea
ML
1745 /*
1746 * In case that system sleep failed and syscore_suspend is
1747 * not called.
1748 */
1749 mutex_lock(&fw_lock);
1750 fw_cache.state = FW_LOADER_NO_CACHE;
1751 mutex_unlock(&fw_lock);
1752
07646d9c
ML
1753 device_uncache_fw_images_delay(10 * MSEC_PER_SEC);
1754 break;
1755 }
1756
1757 return 0;
1758}
07646d9c 1759
ac39b3ea
ML
1760/* stop caching firmware once syscore_suspend is reached */
1761static int fw_suspend(void)
1762{
1763 fw_cache.state = FW_LOADER_NO_CACHE;
1764 return 0;
1765}
1766
1767static struct syscore_ops fw_syscore_ops = {
1768 .suspend = fw_suspend,
1769};
cfe016b1
ML
1770#else
1771static int fw_cache_piggyback_on_request(const char *name)
1772{
1773 return 0;
1774}
1775#endif
ac39b3ea 1776
37276a51
ML
1777static void __init fw_cache_init(void)
1778{
1779 spin_lock_init(&fw_cache.lock);
1780 INIT_LIST_HEAD(&fw_cache.head);
cfe016b1 1781 fw_cache.state = FW_LOADER_NO_CACHE;
37276a51 1782
cfe016b1 1783#ifdef CONFIG_PM_SLEEP
37276a51
ML
1784 spin_lock_init(&fw_cache.name_lock);
1785 INIT_LIST_HEAD(&fw_cache.fw_names);
37276a51 1786
37276a51
ML
1787 INIT_DELAYED_WORK(&fw_cache.work,
1788 device_uncache_fw_images_work);
07646d9c
ML
1789
1790 fw_cache.pm_notify.notifier_call = fw_pm_notify;
1791 register_pm_notifier(&fw_cache.pm_notify);
ac39b3ea
ML
1792
1793 register_syscore_ops(&fw_syscore_ops);
cfe016b1 1794#endif
37276a51
ML
1795}
1796
a669f04a
LR
1797static int fw_shutdown_notify(struct notifier_block *unused1,
1798 unsigned long unused2, void *unused3)
1799{
1800 /*
1801 * Kill all pending fallback requests to avoid both stalling shutdown,
1802 * and avoid a deadlock with the usermode_lock.
1803 */
1804 kill_pending_fw_fallback_reqs(false);
1805
1806 return NOTIFY_DONE;
1807}
1808
1809static struct notifier_block fw_shutdown_nb = {
1810 .notifier_call = fw_shutdown_notify,
1811};
1812
673fae90 1813static int __init firmware_class_init(void)
1da177e4 1814{
1f2b7959 1815 fw_cache_init();
fe304143 1816 register_reboot_notifier(&fw_shutdown_nb);
a669f04a 1817#ifdef CONFIG_FW_LOADER_USER_HELPER
673fae90 1818 return class_register(&firmware_class);
7b1269f7
TI
1819#else
1820 return 0;
1821#endif
1da177e4 1822}
673fae90
DT
1823
1824static void __exit firmware_class_exit(void)
1da177e4 1825{
cfe016b1 1826#ifdef CONFIG_PM_SLEEP
ac39b3ea 1827 unregister_syscore_ops(&fw_syscore_ops);
07646d9c 1828 unregister_pm_notifier(&fw_cache.pm_notify);
cfe016b1 1829#endif
fe304143 1830 unregister_reboot_notifier(&fw_shutdown_nb);
a669f04a 1831#ifdef CONFIG_FW_LOADER_USER_HELPER
1da177e4 1832 class_unregister(&firmware_class);
7b1269f7 1833#endif
1da177e4
LT
1834}
1835
a30a6a2c 1836fs_initcall(firmware_class_init);
1da177e4 1837module_exit(firmware_class_exit);