]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - lib/test_firmware.c
Merge tag 'hyperv-fixes-signed' of git://git.kernel.org/pub/scm/linux/kernel/git...
[mirror_ubuntu-jammy-kernel.git] / lib / test_firmware.c
CommitLineData
09c434b8 1// SPDX-License-Identifier: GPL-2.0-only
0a8adf58
KC
2/*
3 * This module provides an interface to trigger and test firmware loading.
4 *
5 * It is designed to be used for basic evaluation of the firmware loading
6 * subsystem (for example when validating firmware verification). It lacks
7 * any extra dependencies, and will not normally be loaded by the system
8 * unless explicitly requested by name.
9 */
10
11#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
12
13#include <linux/init.h>
14#include <linux/module.h>
15#include <linux/printk.h>
eb910947 16#include <linux/completion.h>
0a8adf58
KC
17#include <linux/firmware.h>
18#include <linux/device.h>
19#include <linux/fs.h>
20#include <linux/miscdevice.h>
7feebfa4 21#include <linux/sizes.h>
0a8adf58
KC
22#include <linux/slab.h>
23#include <linux/uaccess.h>
c92316bf
LR
24#include <linux/delay.h>
25#include <linux/kthread.h>
514c6032 26#include <linux/vmalloc.h>
548193cb 27#include <linux/efi_embedded_fw.h>
c92316bf
LR
28
29#define TEST_FIRMWARE_NAME "test-firmware.bin"
30#define TEST_FIRMWARE_NUM_REQS 4
7feebfa4 31#define TEST_FIRMWARE_BUF_SIZE SZ_1K
0a8adf58
KC
32
33static DEFINE_MUTEX(test_fw_mutex);
34static const struct firmware *test_firmware;
35
c92316bf
LR
36struct test_batched_req {
37 u8 idx;
38 int rc;
39 bool sent;
40 const struct firmware *fw;
41 const char *name;
42 struct completion completion;
43 struct task_struct *task;
44 struct device *dev;
45};
46
47/**
48 * test_config - represents configuration for the test for different triggers
49 *
50 * @name: the name of the firmware file to look for
7feebfa4
SB
51 * @into_buf: when the into_buf is used if this is true
52 * request_firmware_into_buf() will be used instead.
c92316bf
LR
53 * @sync_direct: when the sync trigger is used if this is true
54 * request_firmware_direct() will be used instead.
55 * @send_uevent: whether or not to send a uevent for async requests
56 * @num_requests: number of requests to try per test case. This is trigger
57 * specific.
58 * @reqs: stores all requests information
59 * @read_fw_idx: index of thread from which we want to read firmware results
60 * from through the read_fw trigger.
61 * @test_result: a test may use this to collect the result from the call
62 * of the request_firmware*() calls used in their tests. In order of
63 * priority we always keep first any setup error. If no setup errors were
64 * found then we move on to the first error encountered while running the
65 * API. Note that for async calls this typically will be a successful
66 * result (0) unless of course you've used bogus parameters, or the system
67 * is out of memory. In the async case the callback is expected to do a
68 * bit more homework to figure out what happened, unfortunately the only
69 * information passed today on error is the fact that no firmware was
70 * found so we can only assume -ENOENT on async calls if the firmware is
71 * NULL.
72 *
73 * Errors you can expect:
74 *
75 * API specific:
76 *
77 * 0: success for sync, for async it means request was sent
78 * -EINVAL: invalid parameters or request
79 * -ENOENT: files not found
80 *
81 * System environment:
82 *
83 * -ENOMEM: memory pressure on system
84 * -ENODEV: out of number of devices to test
85 * -EINVAL: an unexpected error has occurred
86 * @req_firmware: if @sync_direct is true this is set to
87 * request_firmware_direct(), otherwise request_firmware()
88 */
89struct test_config {
90 char *name;
7feebfa4 91 bool into_buf;
c92316bf
LR
92 bool sync_direct;
93 bool send_uevent;
94 u8 num_requests;
95 u8 read_fw_idx;
96
97 /*
98 * These below don't belong her but we'll move them once we create
99 * a struct fw_test_device and stuff the misc_dev under there later.
100 */
101 struct test_batched_req *reqs;
102 int test_result;
103 int (*req_firmware)(const struct firmware **fw, const char *name,
104 struct device *device);
105};
106
76f8ab1b 107static struct test_config *test_fw_config;
c92316bf 108
0a8adf58
KC
109static ssize_t test_fw_misc_read(struct file *f, char __user *buf,
110 size_t size, loff_t *offset)
111{
112 ssize_t rc = 0;
113
114 mutex_lock(&test_fw_mutex);
115 if (test_firmware)
116 rc = simple_read_from_buffer(buf, size, offset,
117 test_firmware->data,
118 test_firmware->size);
119 mutex_unlock(&test_fw_mutex);
120 return rc;
121}
122
123static const struct file_operations test_fw_fops = {
124 .owner = THIS_MODULE,
125 .read = test_fw_misc_read,
126};
127
c92316bf
LR
128static void __test_release_all_firmware(void)
129{
130 struct test_batched_req *req;
131 u8 i;
132
133 if (!test_fw_config->reqs)
134 return;
135
136 for (i = 0; i < test_fw_config->num_requests; i++) {
137 req = &test_fw_config->reqs[i];
138 if (req->fw)
139 release_firmware(req->fw);
140 }
141
142 vfree(test_fw_config->reqs);
143 test_fw_config->reqs = NULL;
144}
145
146static void test_release_all_firmware(void)
147{
148 mutex_lock(&test_fw_mutex);
149 __test_release_all_firmware();
150 mutex_unlock(&test_fw_mutex);
151}
152
153
154static void __test_firmware_config_free(void)
155{
156 __test_release_all_firmware();
157 kfree_const(test_fw_config->name);
158 test_fw_config->name = NULL;
159}
160
161/*
162 * XXX: move to kstrncpy() once merged.
163 *
164 * Users should use kfree_const() when freeing these.
165 */
166static int __kstrncpy(char **dst, const char *name, size_t count, gfp_t gfp)
167{
168 *dst = kstrndup(name, count, gfp);
169 if (!*dst)
170 return -ENOSPC;
171 return count;
172}
173
174static int __test_firmware_config_init(void)
175{
176 int ret;
177
178 ret = __kstrncpy(&test_fw_config->name, TEST_FIRMWARE_NAME,
179 strlen(TEST_FIRMWARE_NAME), GFP_KERNEL);
180 if (ret < 0)
181 goto out;
182
183 test_fw_config->num_requests = TEST_FIRMWARE_NUM_REQS;
184 test_fw_config->send_uevent = true;
7feebfa4 185 test_fw_config->into_buf = false;
c92316bf
LR
186 test_fw_config->sync_direct = false;
187 test_fw_config->req_firmware = request_firmware;
188 test_fw_config->test_result = 0;
189 test_fw_config->reqs = NULL;
190
191 return 0;
192
193out:
194 __test_firmware_config_free();
195 return ret;
196}
197
198static ssize_t reset_store(struct device *dev,
199 struct device_attribute *attr,
200 const char *buf, size_t count)
201{
202 int ret;
203
204 mutex_lock(&test_fw_mutex);
205
206 __test_firmware_config_free();
207
208 ret = __test_firmware_config_init();
209 if (ret < 0) {
210 ret = -ENOMEM;
211 pr_err("could not alloc settings for config trigger: %d\n",
212 ret);
213 goto out;
214 }
215
216 pr_info("reset\n");
217 ret = count;
218
219out:
220 mutex_unlock(&test_fw_mutex);
221
222 return ret;
223}
224static DEVICE_ATTR_WO(reset);
225
226static ssize_t config_show(struct device *dev,
227 struct device_attribute *attr,
228 char *buf)
229{
230 int len = 0;
231
232 mutex_lock(&test_fw_mutex);
233
bd17cc5a 234 len += scnprintf(buf, PAGE_SIZE - len,
c92316bf
LR
235 "Custom trigger configuration for: %s\n",
236 dev_name(dev));
237
238 if (test_fw_config->name)
bd17cc5a 239 len += scnprintf(buf+len, PAGE_SIZE - len,
c92316bf
LR
240 "name:\t%s\n",
241 test_fw_config->name);
242 else
bd17cc5a 243 len += scnprintf(buf+len, PAGE_SIZE - len,
c92316bf
LR
244 "name:\tEMTPY\n");
245
bd17cc5a 246 len += scnprintf(buf+len, PAGE_SIZE - len,
c92316bf
LR
247 "num_requests:\t%u\n", test_fw_config->num_requests);
248
bd17cc5a 249 len += scnprintf(buf+len, PAGE_SIZE - len,
c92316bf
LR
250 "send_uevent:\t\t%s\n",
251 test_fw_config->send_uevent ?
252 "FW_ACTION_HOTPLUG" :
253 "FW_ACTION_NOHOTPLUG");
7feebfa4
SB
254 len += scnprintf(buf+len, PAGE_SIZE - len,
255 "into_buf:\t\t%s\n",
256 test_fw_config->into_buf ? "true" : "false");
bd17cc5a 257 len += scnprintf(buf+len, PAGE_SIZE - len,
c92316bf
LR
258 "sync_direct:\t\t%s\n",
259 test_fw_config->sync_direct ? "true" : "false");
bd17cc5a 260 len += scnprintf(buf+len, PAGE_SIZE - len,
c92316bf
LR
261 "read_fw_idx:\t%u\n", test_fw_config->read_fw_idx);
262
263 mutex_unlock(&test_fw_mutex);
264
265 return len;
266}
267static DEVICE_ATTR_RO(config);
268
269static ssize_t config_name_store(struct device *dev,
270 struct device_attribute *attr,
271 const char *buf, size_t count)
272{
273 int ret;
274
275 mutex_lock(&test_fw_mutex);
276 kfree_const(test_fw_config->name);
277 ret = __kstrncpy(&test_fw_config->name, buf, count, GFP_KERNEL);
278 mutex_unlock(&test_fw_mutex);
279
280 return ret;
281}
282
283/*
284 * As per sysfs_kf_seq_show() the buf is max PAGE_SIZE.
285 */
286static ssize_t config_test_show_str(char *dst,
287 char *src)
288{
289 int len;
290
291 mutex_lock(&test_fw_mutex);
292 len = snprintf(dst, PAGE_SIZE, "%s\n", src);
293 mutex_unlock(&test_fw_mutex);
294
295 return len;
296}
297
298static int test_dev_config_update_bool(const char *buf, size_t size,
299 bool *cfg)
300{
301 int ret;
302
303 mutex_lock(&test_fw_mutex);
304 if (strtobool(buf, cfg) < 0)
305 ret = -EINVAL;
306 else
307 ret = size;
308 mutex_unlock(&test_fw_mutex);
309
310 return ret;
311}
312
313static ssize_t
314test_dev_config_show_bool(char *buf,
315 bool config)
316{
317 bool val;
318
319 mutex_lock(&test_fw_mutex);
320 val = config;
321 mutex_unlock(&test_fw_mutex);
322
323 return snprintf(buf, PAGE_SIZE, "%d\n", val);
324}
325
326static ssize_t test_dev_config_show_int(char *buf, int cfg)
327{
328 int val;
329
330 mutex_lock(&test_fw_mutex);
331 val = cfg;
332 mutex_unlock(&test_fw_mutex);
333
334 return snprintf(buf, PAGE_SIZE, "%d\n", val);
335}
336
337static int test_dev_config_update_u8(const char *buf, size_t size, u8 *cfg)
338{
339 int ret;
340 long new;
341
342 ret = kstrtol(buf, 10, &new);
343 if (ret)
344 return ret;
345
346 if (new > U8_MAX)
347 return -EINVAL;
348
349 mutex_lock(&test_fw_mutex);
350 *(u8 *)cfg = new;
351 mutex_unlock(&test_fw_mutex);
352
353 /* Always return full write size even if we didn't consume all */
354 return size;
355}
356
357static ssize_t test_dev_config_show_u8(char *buf, u8 cfg)
358{
359 u8 val;
360
361 mutex_lock(&test_fw_mutex);
362 val = cfg;
363 mutex_unlock(&test_fw_mutex);
364
365 return snprintf(buf, PAGE_SIZE, "%u\n", val);
366}
367
368static ssize_t config_name_show(struct device *dev,
369 struct device_attribute *attr,
370 char *buf)
371{
372 return config_test_show_str(buf, test_fw_config->name);
373}
b6b996b6 374static DEVICE_ATTR_RW(config_name);
c92316bf
LR
375
376static ssize_t config_num_requests_store(struct device *dev,
377 struct device_attribute *attr,
378 const char *buf, size_t count)
379{
380 int rc;
381
382 mutex_lock(&test_fw_mutex);
383 if (test_fw_config->reqs) {
384 pr_err("Must call release_all_firmware prior to changing config\n");
385 rc = -EINVAL;
a5e19233 386 mutex_unlock(&test_fw_mutex);
c92316bf
LR
387 goto out;
388 }
389 mutex_unlock(&test_fw_mutex);
390
391 rc = test_dev_config_update_u8(buf, count,
392 &test_fw_config->num_requests);
393
394out:
395 return rc;
396}
397
398static ssize_t config_num_requests_show(struct device *dev,
399 struct device_attribute *attr,
400 char *buf)
401{
402 return test_dev_config_show_u8(buf, test_fw_config->num_requests);
403}
b6b996b6 404static DEVICE_ATTR_RW(config_num_requests);
c92316bf 405
7feebfa4
SB
406static ssize_t config_into_buf_store(struct device *dev,
407 struct device_attribute *attr,
408 const char *buf, size_t count)
409{
410 return test_dev_config_update_bool(buf,
411 count,
412 &test_fw_config->into_buf);
413}
414
415static ssize_t config_into_buf_show(struct device *dev,
416 struct device_attribute *attr,
417 char *buf)
418{
419 return test_dev_config_show_bool(buf, test_fw_config->into_buf);
420}
421static DEVICE_ATTR_RW(config_into_buf);
422
c92316bf
LR
423static ssize_t config_sync_direct_store(struct device *dev,
424 struct device_attribute *attr,
425 const char *buf, size_t count)
426{
427 int rc = test_dev_config_update_bool(buf, count,
428 &test_fw_config->sync_direct);
429
430 if (rc == count)
431 test_fw_config->req_firmware = test_fw_config->sync_direct ?
432 request_firmware_direct :
433 request_firmware;
434 return rc;
435}
436
437static ssize_t config_sync_direct_show(struct device *dev,
438 struct device_attribute *attr,
439 char *buf)
440{
441 return test_dev_config_show_bool(buf, test_fw_config->sync_direct);
442}
b6b996b6 443static DEVICE_ATTR_RW(config_sync_direct);
c92316bf
LR
444
445static ssize_t config_send_uevent_store(struct device *dev,
446 struct device_attribute *attr,
447 const char *buf, size_t count)
448{
449 return test_dev_config_update_bool(buf, count,
450 &test_fw_config->send_uevent);
451}
452
453static ssize_t config_send_uevent_show(struct device *dev,
454 struct device_attribute *attr,
455 char *buf)
456{
457 return test_dev_config_show_bool(buf, test_fw_config->send_uevent);
458}
b6b996b6 459static DEVICE_ATTR_RW(config_send_uevent);
c92316bf
LR
460
461static ssize_t config_read_fw_idx_store(struct device *dev,
462 struct device_attribute *attr,
463 const char *buf, size_t count)
464{
465 return test_dev_config_update_u8(buf, count,
466 &test_fw_config->read_fw_idx);
467}
468
469static ssize_t config_read_fw_idx_show(struct device *dev,
470 struct device_attribute *attr,
471 char *buf)
472{
473 return test_dev_config_show_u8(buf, test_fw_config->read_fw_idx);
474}
b6b996b6 475static DEVICE_ATTR_RW(config_read_fw_idx);
c92316bf
LR
476
477
0a8adf58
KC
478static ssize_t trigger_request_store(struct device *dev,
479 struct device_attribute *attr,
480 const char *buf, size_t count)
481{
482 int rc;
483 char *name;
484
be4a1326 485 name = kstrndup(buf, count, GFP_KERNEL);
0a8adf58
KC
486 if (!name)
487 return -ENOSPC;
0a8adf58
KC
488
489 pr_info("loading '%s'\n", name);
490
491 mutex_lock(&test_fw_mutex);
492 release_firmware(test_firmware);
493 test_firmware = NULL;
494 rc = request_firmware(&test_firmware, name, dev);
47e0bbb7 495 if (rc) {
0a8adf58 496 pr_info("load of '%s' failed: %d\n", name, rc);
47e0bbb7
BN
497 goto out;
498 }
499 pr_info("loaded: %zu\n", test_firmware->size);
500 rc = count;
501
502out:
0a8adf58
KC
503 mutex_unlock(&test_fw_mutex);
504
505 kfree(name);
506
47e0bbb7 507 return rc;
0a8adf58
KC
508}
509static DEVICE_ATTR_WO(trigger_request);
510
548193cb
HG
511#ifdef CONFIG_EFI_EMBEDDED_FIRMWARE
512static ssize_t trigger_request_platform_store(struct device *dev,
513 struct device_attribute *attr,
514 const char *buf, size_t count)
515{
516 static const u8 test_data[] = {
517 0x55, 0xaa, 0x55, 0xaa, 0x01, 0x02, 0x03, 0x04,
518 0x55, 0xaa, 0x55, 0xaa, 0x05, 0x06, 0x07, 0x08,
519 0x55, 0xaa, 0x55, 0xaa, 0x10, 0x20, 0x30, 0x40,
520 0x55, 0xaa, 0x55, 0xaa, 0x50, 0x60, 0x70, 0x80
521 };
522 struct efi_embedded_fw efi_embedded_fw;
523 const struct firmware *firmware = NULL;
524 char *name;
525 int rc;
526
527 name = kstrndup(buf, count, GFP_KERNEL);
528 if (!name)
529 return -ENOSPC;
530
531 pr_info("inserting test platform fw '%s'\n", name);
532 efi_embedded_fw.name = name;
533 efi_embedded_fw.data = (void *)test_data;
534 efi_embedded_fw.length = sizeof(test_data);
535 list_add(&efi_embedded_fw.list, &efi_embedded_fw_list);
536
537 pr_info("loading '%s'\n", name);
538 rc = firmware_request_platform(&firmware, name, dev);
539 if (rc) {
540 pr_info("load of '%s' failed: %d\n", name, rc);
541 goto out;
542 }
543 if (firmware->size != sizeof(test_data) ||
544 memcmp(firmware->data, test_data, sizeof(test_data)) != 0) {
545 pr_info("firmware contents mismatch for '%s'\n", name);
546 rc = -EINVAL;
547 goto out;
548 }
549 pr_info("loaded: %zu\n", firmware->size);
550 rc = count;
551
552out:
553 release_firmware(firmware);
554 list_del(&efi_embedded_fw.list);
555 kfree(name);
556
557 return rc;
558}
559static DEVICE_ATTR_WO(trigger_request_platform);
560#endif
561
eb910947
BN
562static DECLARE_COMPLETION(async_fw_done);
563
564static void trigger_async_request_cb(const struct firmware *fw, void *context)
565{
566 test_firmware = fw;
567 complete(&async_fw_done);
568}
569
570static ssize_t trigger_async_request_store(struct device *dev,
571 struct device_attribute *attr,
572 const char *buf, size_t count)
573{
574 int rc;
575 char *name;
576
577 name = kstrndup(buf, count, GFP_KERNEL);
578 if (!name)
579 return -ENOSPC;
580
581 pr_info("loading '%s'\n", name);
582
583 mutex_lock(&test_fw_mutex);
584 release_firmware(test_firmware);
585 test_firmware = NULL;
586 rc = request_firmware_nowait(THIS_MODULE, 1, name, dev, GFP_KERNEL,
587 NULL, trigger_async_request_cb);
588 if (rc) {
589 pr_info("async load of '%s' failed: %d\n", name, rc);
590 kfree(name);
591 goto out;
592 }
593 /* Free 'name' ASAP, to test for race conditions */
594 kfree(name);
595
596 wait_for_completion(&async_fw_done);
597
598 if (test_firmware) {
599 pr_info("loaded: %zu\n", test_firmware->size);
600 rc = count;
601 } else {
602 pr_err("failed to async load firmware\n");
7feebfa4 603 rc = -ENOMEM;
eb910947
BN
604 }
605
606out:
607 mutex_unlock(&test_fw_mutex);
608
609 return rc;
610}
611static DEVICE_ATTR_WO(trigger_async_request);
612
061132d2
LR
613static ssize_t trigger_custom_fallback_store(struct device *dev,
614 struct device_attribute *attr,
615 const char *buf, size_t count)
616{
617 int rc;
618 char *name;
619
620 name = kstrndup(buf, count, GFP_KERNEL);
621 if (!name)
622 return -ENOSPC;
623
624 pr_info("loading '%s' using custom fallback mechanism\n", name);
625
626 mutex_lock(&test_fw_mutex);
627 release_firmware(test_firmware);
628 test_firmware = NULL;
629 rc = request_firmware_nowait(THIS_MODULE, FW_ACTION_NOHOTPLUG, name,
630 dev, GFP_KERNEL, NULL,
631 trigger_async_request_cb);
632 if (rc) {
633 pr_info("async load of '%s' failed: %d\n", name, rc);
634 kfree(name);
635 goto out;
636 }
637 /* Free 'name' ASAP, to test for race conditions */
638 kfree(name);
639
640 wait_for_completion(&async_fw_done);
641
642 if (test_firmware) {
643 pr_info("loaded: %zu\n", test_firmware->size);
644 rc = count;
645 } else {
646 pr_err("failed to async load firmware\n");
647 rc = -ENODEV;
648 }
649
650out:
651 mutex_unlock(&test_fw_mutex);
652
653 return rc;
654}
655static DEVICE_ATTR_WO(trigger_custom_fallback);
656
c92316bf
LR
657static int test_fw_run_batch_request(void *data)
658{
659 struct test_batched_req *req = data;
660
661 if (!req) {
662 test_fw_config->test_result = -EINVAL;
663 return -EINVAL;
664 }
665
7feebfa4
SB
666 if (test_fw_config->into_buf) {
667 void *test_buf;
668
669 test_buf = kzalloc(TEST_FIRMWARE_BUF_SIZE, GFP_KERNEL);
670 if (!test_buf)
671 return -ENOSPC;
672
673 req->rc = request_firmware_into_buf(&req->fw,
674 req->name,
675 req->dev,
676 test_buf,
677 TEST_FIRMWARE_BUF_SIZE);
678 if (!req->fw)
679 kfree(test_buf);
680 } else {
681 req->rc = test_fw_config->req_firmware(&req->fw,
682 req->name,
683 req->dev);
684 }
685
c92316bf
LR
686 if (req->rc) {
687 pr_info("#%u: batched sync load failed: %d\n",
688 req->idx, req->rc);
689 if (!test_fw_config->test_result)
690 test_fw_config->test_result = req->rc;
691 } else if (req->fw) {
692 req->sent = true;
693 pr_info("#%u: batched sync loaded %zu\n",
694 req->idx, req->fw->size);
695 }
696 complete(&req->completion);
697
698 req->task = NULL;
699
700 return 0;
701}
702
703/*
704 * We use a kthread as otherwise the kernel serializes all our sync requests
705 * and we would not be able to mimic batched requests on a sync call. Batched
706 * requests on a sync call can for instance happen on a device driver when
707 * multiple cards are used and firmware loading happens outside of probe.
708 */
709static ssize_t trigger_batched_requests_store(struct device *dev,
710 struct device_attribute *attr,
711 const char *buf, size_t count)
712{
713 struct test_batched_req *req;
714 int rc;
715 u8 i;
716
717 mutex_lock(&test_fw_mutex);
718
fad953ce
KC
719 test_fw_config->reqs =
720 vzalloc(array3_size(sizeof(struct test_batched_req),
721 test_fw_config->num_requests, 2));
c92316bf
LR
722 if (!test_fw_config->reqs) {
723 rc = -ENOMEM;
724 goto out_unlock;
725 }
726
727 pr_info("batched sync firmware loading '%s' %u times\n",
728 test_fw_config->name, test_fw_config->num_requests);
729
730 for (i = 0; i < test_fw_config->num_requests; i++) {
731 req = &test_fw_config->reqs[i];
c92316bf
LR
732 req->fw = NULL;
733 req->idx = i;
734 req->name = test_fw_config->name;
735 req->dev = dev;
736 init_completion(&req->completion);
737 req->task = kthread_run(test_fw_run_batch_request, req,
738 "%s-%u", KBUILD_MODNAME, req->idx);
739 if (!req->task || IS_ERR(req->task)) {
740 pr_err("Setting up thread %u failed\n", req->idx);
741 req->task = NULL;
742 rc = -ENOMEM;
743 goto out_bail;
744 }
745 }
746
747 rc = count;
748
749 /*
750 * We require an explicit release to enable more time and delay of
751 * calling release_firmware() to improve our chances of forcing a
752 * batched request. If we instead called release_firmware() right away
753 * then we might miss on an opportunity of having a successful firmware
754 * request pass on the opportunity to be come a batched request.
755 */
756
757out_bail:
758 for (i = 0; i < test_fw_config->num_requests; i++) {
759 req = &test_fw_config->reqs[i];
760 if (req->task || req->sent)
761 wait_for_completion(&req->completion);
762 }
763
764 /* Override any worker error if we had a general setup error */
765 if (rc < 0)
766 test_fw_config->test_result = rc;
767
768out_unlock:
769 mutex_unlock(&test_fw_mutex);
770
771 return rc;
772}
773static DEVICE_ATTR_WO(trigger_batched_requests);
774
775/*
776 * We wait for each callback to return with the lock held, no need to lock here
777 */
778static void trigger_batched_cb(const struct firmware *fw, void *context)
779{
780 struct test_batched_req *req = context;
781
782 if (!req) {
783 test_fw_config->test_result = -EINVAL;
784 return;
785 }
786
787 /* forces *some* batched requests to queue up */
788 if (!req->idx)
789 ssleep(2);
790
791 req->fw = fw;
792
793 /*
794 * Unfortunately the firmware API gives us nothing other than a null FW
795 * if the firmware was not found on async requests. Best we can do is
796 * just assume -ENOENT. A better API would pass the actual return
797 * value to the callback.
798 */
799 if (!fw && !test_fw_config->test_result)
800 test_fw_config->test_result = -ENOENT;
801
802 complete(&req->completion);
803}
804
805static
806ssize_t trigger_batched_requests_async_store(struct device *dev,
807 struct device_attribute *attr,
808 const char *buf, size_t count)
809{
810 struct test_batched_req *req;
811 bool send_uevent;
812 int rc;
813 u8 i;
814
815 mutex_lock(&test_fw_mutex);
816
fad953ce
KC
817 test_fw_config->reqs =
818 vzalloc(array3_size(sizeof(struct test_batched_req),
819 test_fw_config->num_requests, 2));
c92316bf
LR
820 if (!test_fw_config->reqs) {
821 rc = -ENOMEM;
822 goto out;
823 }
824
825 pr_info("batched loading '%s' custom fallback mechanism %u times\n",
826 test_fw_config->name, test_fw_config->num_requests);
827
828 send_uevent = test_fw_config->send_uevent ? FW_ACTION_HOTPLUG :
829 FW_ACTION_NOHOTPLUG;
830
831 for (i = 0; i < test_fw_config->num_requests; i++) {
832 req = &test_fw_config->reqs[i];
c92316bf
LR
833 req->name = test_fw_config->name;
834 req->fw = NULL;
835 req->idx = i;
836 init_completion(&req->completion);
837 rc = request_firmware_nowait(THIS_MODULE, send_uevent,
838 req->name,
839 dev, GFP_KERNEL, req,
840 trigger_batched_cb);
841 if (rc) {
842 pr_info("#%u: batched async load failed setup: %d\n",
843 i, rc);
844 req->rc = rc;
845 goto out_bail;
846 } else
847 req->sent = true;
848 }
849
850 rc = count;
851
852out_bail:
853
854 /*
855 * We require an explicit release to enable more time and delay of
856 * calling release_firmware() to improve our chances of forcing a
857 * batched request. If we instead called release_firmware() right away
858 * then we might miss on an opportunity of having a successful firmware
859 * request pass on the opportunity to be come a batched request.
860 */
861
862 for (i = 0; i < test_fw_config->num_requests; i++) {
863 req = &test_fw_config->reqs[i];
864 if (req->sent)
865 wait_for_completion(&req->completion);
866 }
867
868 /* Override any worker error if we had a general setup error */
869 if (rc < 0)
870 test_fw_config->test_result = rc;
871
872out:
873 mutex_unlock(&test_fw_mutex);
874
875 return rc;
876}
877static DEVICE_ATTR_WO(trigger_batched_requests_async);
878
879static ssize_t test_result_show(struct device *dev,
880 struct device_attribute *attr,
881 char *buf)
882{
883 return test_dev_config_show_int(buf, test_fw_config->test_result);
884}
885static DEVICE_ATTR_RO(test_result);
886
887static ssize_t release_all_firmware_store(struct device *dev,
888 struct device_attribute *attr,
889 const char *buf, size_t count)
890{
891 test_release_all_firmware();
892 return count;
893}
894static DEVICE_ATTR_WO(release_all_firmware);
895
896static ssize_t read_firmware_show(struct device *dev,
897 struct device_attribute *attr,
898 char *buf)
899{
900 struct test_batched_req *req;
901 u8 idx;
902 ssize_t rc = 0;
903
904 mutex_lock(&test_fw_mutex);
905
906 idx = test_fw_config->read_fw_idx;
907 if (idx >= test_fw_config->num_requests) {
908 rc = -ERANGE;
909 goto out;
910 }
911
912 if (!test_fw_config->reqs) {
913 rc = -EINVAL;
914 goto out;
915 }
916
917 req = &test_fw_config->reqs[idx];
918 if (!req->fw) {
919 pr_err("#%u: failed to async load firmware\n", idx);
920 rc = -ENOENT;
921 goto out;
922 }
923
924 pr_info("#%u: loaded %zu\n", idx, req->fw->size);
925
926 if (req->fw->size > PAGE_SIZE) {
927 pr_err("Testing interface must use PAGE_SIZE firmware for now\n");
928 rc = -EINVAL;
8bb0a886 929 goto out;
c92316bf
LR
930 }
931 memcpy(buf, req->fw->data, req->fw->size);
932
933 rc = req->fw->size;
934out:
935 mutex_unlock(&test_fw_mutex);
936
937 return rc;
938}
939static DEVICE_ATTR_RO(read_firmware);
940
083a93b0
LR
941#define TEST_FW_DEV_ATTR(name) &dev_attr_##name.attr
942
943static struct attribute *test_dev_attrs[] = {
c92316bf
LR
944 TEST_FW_DEV_ATTR(reset),
945
946 TEST_FW_DEV_ATTR(config),
947 TEST_FW_DEV_ATTR(config_name),
948 TEST_FW_DEV_ATTR(config_num_requests),
7feebfa4 949 TEST_FW_DEV_ATTR(config_into_buf),
c92316bf
LR
950 TEST_FW_DEV_ATTR(config_sync_direct),
951 TEST_FW_DEV_ATTR(config_send_uevent),
952 TEST_FW_DEV_ATTR(config_read_fw_idx),
953
954 /* These don't use the config at all - they could be ported! */
083a93b0
LR
955 TEST_FW_DEV_ATTR(trigger_request),
956 TEST_FW_DEV_ATTR(trigger_async_request),
061132d2 957 TEST_FW_DEV_ATTR(trigger_custom_fallback),
548193cb
HG
958#ifdef CONFIG_EFI_EMBEDDED_FIRMWARE
959 TEST_FW_DEV_ATTR(trigger_request_platform),
960#endif
c92316bf
LR
961
962 /* These use the config and can use the test_result */
963 TEST_FW_DEV_ATTR(trigger_batched_requests),
964 TEST_FW_DEV_ATTR(trigger_batched_requests_async),
965
966 TEST_FW_DEV_ATTR(release_all_firmware),
967 TEST_FW_DEV_ATTR(test_result),
968 TEST_FW_DEV_ATTR(read_firmware),
083a93b0
LR
969 NULL,
970};
971
972ATTRIBUTE_GROUPS(test_dev);
973
67fd553c
LR
974static struct miscdevice test_fw_misc_device = {
975 .minor = MISC_DYNAMIC_MINOR,
976 .name = "test_firmware",
977 .fops = &test_fw_fops,
083a93b0 978 .groups = test_dev_groups,
67fd553c
LR
979};
980
0a8adf58
KC
981static int __init test_firmware_init(void)
982{
983 int rc;
984
c92316bf
LR
985 test_fw_config = kzalloc(sizeof(struct test_config), GFP_KERNEL);
986 if (!test_fw_config)
987 return -ENOMEM;
988
989 rc = __test_firmware_config_init();
d4fddac5
WW
990 if (rc) {
991 kfree(test_fw_config);
992 pr_err("could not init firmware test config: %d\n", rc);
c92316bf 993 return rc;
d4fddac5 994 }
c92316bf 995
0a8adf58
KC
996 rc = misc_register(&test_fw_misc_device);
997 if (rc) {
c92316bf 998 kfree(test_fw_config);
0a8adf58
KC
999 pr_err("could not register misc device: %d\n", rc);
1000 return rc;
1001 }
eb910947 1002
0a8adf58
KC
1003 pr_warn("interface ready\n");
1004
1005 return 0;
0a8adf58
KC
1006}
1007
1008module_init(test_firmware_init);
1009
1010static void __exit test_firmware_exit(void)
1011{
c92316bf 1012 mutex_lock(&test_fw_mutex);
0a8adf58 1013 release_firmware(test_firmware);
0a8adf58 1014 misc_deregister(&test_fw_misc_device);
c92316bf
LR
1015 __test_firmware_config_free();
1016 kfree(test_fw_config);
1017 mutex_unlock(&test_fw_mutex);
1018
0a8adf58
KC
1019 pr_warn("removed interface\n");
1020}
1021
1022module_exit(test_firmware_exit);
1023
1024MODULE_AUTHOR("Kees Cook <keescook@chromium.org>");
1025MODULE_LICENSE("GPL");