1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3 * This module provides an interface to trigger and test firmware loading.
4 *
5 * It is designed to be used for basic evaluation of the firmware loading
6 * subsystem (for example when validating firmware verification). It lacks
7 * any extra dependencies, and will not normally be loaded by the system
8 * unless explicitly requested by name.
9 */
10
11 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
12
13 #include <linux/init.h>
14 #include <linux/module.h>
15 #include <linux/printk.h>
16 #include <linux/completion.h>
17 #include <linux/firmware.h>
18 #include <linux/device.h>
19 #include <linux/fs.h>
20 #include <linux/miscdevice.h>
21 #include <linux/sizes.h>
22 #include <linux/slab.h>
23 #include <linux/uaccess.h>
24 #include <linux/delay.h>
25 #include <linux/kthread.h>
26 #include <linux/vmalloc.h>
27 #include <linux/efi_embedded_fw.h>
28
29 MODULE_IMPORT_NS(TEST_FIRMWARE);
30
31 #define TEST_FIRMWARE_NAME "test-firmware.bin"
32 #define TEST_FIRMWARE_NUM_REQS 4
33 #define TEST_FIRMWARE_BUF_SIZE SZ_1K
34
35 static DEFINE_MUTEX(test_fw_mutex);
36 static const struct firmware *test_firmware;
37
38 struct test_batched_req {
39 u8 idx;
40 int rc;
41 bool sent;
42 const struct firmware *fw;
43 const char *name;
44 struct completion completion;
45 struct task_struct *task;
46 struct device *dev;
47 };
48
49 /**
50 * test_config - represents configuration for the test for different triggers
51 *
52 * @name: the name of the firmware file to look for
53 * @into_buf: when the into_buf is used if this is true
54 * request_firmware_into_buf() will be used instead.
55 * @buf_size: size of buf to allocate when into_buf is true
56 * @file_offset: file offset to request when calling request_firmware_into_buf
57 * @partial: partial read opt when calling request_firmware_into_buf
58 * @sync_direct: when the sync trigger is used if this is true
59 * request_firmware_direct() will be used instead.
60 * @send_uevent: whether or not to send a uevent for async requests
61 * @num_requests: number of requests to try per test case. This is trigger
62 * specific.
63 * @reqs: stores all requests information
64 * @read_fw_idx: index of thread from which we want to read firmware results
65 * from through the read_fw trigger.
66 * @test_result: a test may use this to collect the result from the call
67 * of the request_firmware*() calls used in their tests. In order of
68 * priority we always keep first any setup error. If no setup errors were
69 * found then we move on to the first error encountered while running the
70 * API. Note that for async calls this typically will be a successful
71 * result (0) unless of course you've used bogus parameters, or the system
72 * is out of memory. In the async case the callback is expected to do a
73 * bit more homework to figure out what happened, unfortunately the only
74 * information passed today on error is the fact that no firmware was
75 * found so we can only assume -ENOENT on async calls if the firmware is
76 * NULL.
77 *
78 * Errors you can expect:
79 *
80 * API specific:
81 *
82 * 0: success for sync, for async it means request was sent
83 * -EINVAL: invalid parameters or request
84 * -ENOENT: files not found
85 *
86 * System environment:
87 *
88 * -ENOMEM: memory pressure on system
89 * -ENODEV: out of number of devices to test
90 * -EINVAL: an unexpected error has occurred
91 * @req_firmware: if @sync_direct is true this is set to
92 * request_firmware_direct(), otherwise request_firmware()
93 */
94 struct test_config {
95 char *name;
96 bool into_buf;
97 size_t buf_size;
98 size_t file_offset;
99 bool partial;
100 bool sync_direct;
101 bool send_uevent;
102 u8 num_requests;
103 u8 read_fw_idx;
104
105 /*
106 * These below don't belong her but we'll move them once we create
107 * a struct fw_test_device and stuff the misc_dev under there later.
108 */
109 struct test_batched_req *reqs;
110 int test_result;
111 int (*req_firmware)(const struct firmware **fw, const char *name,
112 struct device *device);
113 };
114
115 static struct test_config *test_fw_config;
116
test_fw_misc_read(struct file * f,char __user * buf,size_t size,loff_t * offset)117 static ssize_t test_fw_misc_read(struct file *f, char __user *buf,
118 size_t size, loff_t *offset)
119 {
120 ssize_t rc = 0;
121
122 mutex_lock(&test_fw_mutex);
123 if (test_firmware)
124 rc = simple_read_from_buffer(buf, size, offset,
125 test_firmware->data,
126 test_firmware->size);
127 mutex_unlock(&test_fw_mutex);
128 return rc;
129 }
130
131 static const struct file_operations test_fw_fops = {
132 .owner = THIS_MODULE,
133 .read = test_fw_misc_read,
134 };
135
__test_release_all_firmware(void)136 static void __test_release_all_firmware(void)
137 {
138 struct test_batched_req *req;
139 u8 i;
140
141 if (!test_fw_config->reqs)
142 return;
143
144 for (i = 0; i < test_fw_config->num_requests; i++) {
145 req = &test_fw_config->reqs[i];
146 if (req->fw)
147 release_firmware(req->fw);
148 }
149
150 vfree(test_fw_config->reqs);
151 test_fw_config->reqs = NULL;
152 }
153
test_release_all_firmware(void)154 static void test_release_all_firmware(void)
155 {
156 mutex_lock(&test_fw_mutex);
157 __test_release_all_firmware();
158 mutex_unlock(&test_fw_mutex);
159 }
160
161
__test_firmware_config_free(void)162 static void __test_firmware_config_free(void)
163 {
164 __test_release_all_firmware();
165 kfree_const(test_fw_config->name);
166 test_fw_config->name = NULL;
167 }
168
169 /*
170 * XXX: move to kstrncpy() once merged.
171 *
172 * Users should use kfree_const() when freeing these.
173 */
__kstrncpy(char ** dst,const char * name,size_t count,gfp_t gfp)174 static int __kstrncpy(char **dst, const char *name, size_t count, gfp_t gfp)
175 {
176 *dst = kstrndup(name, count, gfp);
177 if (!*dst)
178 return -ENOSPC;
179 return count;
180 }
181
__test_firmware_config_init(void)182 static int __test_firmware_config_init(void)
183 {
184 int ret;
185
186 ret = __kstrncpy(&test_fw_config->name, TEST_FIRMWARE_NAME,
187 strlen(TEST_FIRMWARE_NAME), GFP_KERNEL);
188 if (ret < 0)
189 goto out;
190
191 test_fw_config->num_requests = TEST_FIRMWARE_NUM_REQS;
192 test_fw_config->send_uevent = true;
193 test_fw_config->into_buf = false;
194 test_fw_config->buf_size = TEST_FIRMWARE_BUF_SIZE;
195 test_fw_config->file_offset = 0;
196 test_fw_config->partial = false;
197 test_fw_config->sync_direct = false;
198 test_fw_config->req_firmware = request_firmware;
199 test_fw_config->test_result = 0;
200 test_fw_config->reqs = NULL;
201
202 return 0;
203
204 out:
205 __test_firmware_config_free();
206 return ret;
207 }
208
reset_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)209 static ssize_t reset_store(struct device *dev,
210 struct device_attribute *attr,
211 const char *buf, size_t count)
212 {
213 int ret;
214
215 mutex_lock(&test_fw_mutex);
216
217 __test_firmware_config_free();
218
219 ret = __test_firmware_config_init();
220 if (ret < 0) {
221 ret = -ENOMEM;
222 pr_err("could not alloc settings for config trigger: %d\n",
223 ret);
224 goto out;
225 }
226
227 pr_info("reset\n");
228 ret = count;
229
230 out:
231 mutex_unlock(&test_fw_mutex);
232
233 return ret;
234 }
235 static DEVICE_ATTR_WO(reset);
236
config_show(struct device * dev,struct device_attribute * attr,char * buf)237 static ssize_t config_show(struct device *dev,
238 struct device_attribute *attr,
239 char *buf)
240 {
241 int len = 0;
242
243 mutex_lock(&test_fw_mutex);
244
245 len += scnprintf(buf, PAGE_SIZE - len,
246 "Custom trigger configuration for: %s\n",
247 dev_name(dev));
248
249 if (test_fw_config->name)
250 len += scnprintf(buf + len, PAGE_SIZE - len,
251 "name:\t%s\n",
252 test_fw_config->name);
253 else
254 len += scnprintf(buf + len, PAGE_SIZE - len,
255 "name:\tEMTPY\n");
256
257 len += scnprintf(buf + len, PAGE_SIZE - len,
258 "num_requests:\t%u\n", test_fw_config->num_requests);
259
260 len += scnprintf(buf + len, PAGE_SIZE - len,
261 "send_uevent:\t\t%s\n",
262 test_fw_config->send_uevent ?
263 "FW_ACTION_HOTPLUG" :
264 "FW_ACTION_NOHOTPLUG");
265 len += scnprintf(buf + len, PAGE_SIZE - len,
266 "into_buf:\t\t%s\n",
267 test_fw_config->into_buf ? "true" : "false");
268 len += scnprintf(buf + len, PAGE_SIZE - len,
269 "buf_size:\t%zu\n", test_fw_config->buf_size);
270 len += scnprintf(buf + len, PAGE_SIZE - len,
271 "file_offset:\t%zu\n", test_fw_config->file_offset);
272 len += scnprintf(buf + len, PAGE_SIZE - len,
273 "partial:\t\t%s\n",
274 test_fw_config->partial ? "true" : "false");
275 len += scnprintf(buf + len, PAGE_SIZE - len,
276 "sync_direct:\t\t%s\n",
277 test_fw_config->sync_direct ? "true" : "false");
278 len += scnprintf(buf + len, PAGE_SIZE - len,
279 "read_fw_idx:\t%u\n", test_fw_config->read_fw_idx);
280
281 mutex_unlock(&test_fw_mutex);
282
283 return len;
284 }
285 static DEVICE_ATTR_RO(config);
286
config_name_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)287 static ssize_t config_name_store(struct device *dev,
288 struct device_attribute *attr,
289 const char *buf, size_t count)
290 {
291 int ret;
292
293 mutex_lock(&test_fw_mutex);
294 kfree_const(test_fw_config->name);
295 ret = __kstrncpy(&test_fw_config->name, buf, count, GFP_KERNEL);
296 mutex_unlock(&test_fw_mutex);
297
298 return ret;
299 }
300
301 /*
302 * As per sysfs_kf_seq_show() the buf is max PAGE_SIZE.
303 */
config_test_show_str(char * dst,char * src)304 static ssize_t config_test_show_str(char *dst,
305 char *src)
306 {
307 int len;
308
309 mutex_lock(&test_fw_mutex);
310 len = snprintf(dst, PAGE_SIZE, "%s\n", src);
311 mutex_unlock(&test_fw_mutex);
312
313 return len;
314 }
315
test_dev_config_update_bool(const char * buf,size_t size,bool * cfg)316 static int test_dev_config_update_bool(const char *buf, size_t size,
317 bool *cfg)
318 {
319 int ret;
320
321 mutex_lock(&test_fw_mutex);
322 if (strtobool(buf, cfg) < 0)
323 ret = -EINVAL;
324 else
325 ret = size;
326 mutex_unlock(&test_fw_mutex);
327
328 return ret;
329 }
330
test_dev_config_show_bool(char * buf,bool val)331 static ssize_t test_dev_config_show_bool(char *buf, bool val)
332 {
333 return snprintf(buf, PAGE_SIZE, "%d\n", val);
334 }
335
test_dev_config_update_size_t(const char * buf,size_t size,size_t * cfg)336 static int test_dev_config_update_size_t(const char *buf,
337 size_t size,
338 size_t *cfg)
339 {
340 int ret;
341 long new;
342
343 ret = kstrtol(buf, 10, &new);
344 if (ret)
345 return ret;
346
347 mutex_lock(&test_fw_mutex);
348 *(size_t *)cfg = new;
349 mutex_unlock(&test_fw_mutex);
350
351 /* Always return full write size even if we didn't consume all */
352 return size;
353 }
354
test_dev_config_show_size_t(char * buf,size_t val)355 static ssize_t test_dev_config_show_size_t(char *buf, size_t val)
356 {
357 return snprintf(buf, PAGE_SIZE, "%zu\n", val);
358 }
359
test_dev_config_show_int(char * buf,int val)360 static ssize_t test_dev_config_show_int(char *buf, int val)
361 {
362 return snprintf(buf, PAGE_SIZE, "%d\n", val);
363 }
364
test_dev_config_update_u8(const char * buf,size_t size,u8 * cfg)365 static int test_dev_config_update_u8(const char *buf, size_t size, u8 *cfg)
366 {
367 int ret;
368 long new;
369
370 ret = kstrtol(buf, 10, &new);
371 if (ret)
372 return ret;
373
374 if (new > U8_MAX)
375 return -EINVAL;
376
377 mutex_lock(&test_fw_mutex);
378 *(u8 *)cfg = new;
379 mutex_unlock(&test_fw_mutex);
380
381 /* Always return full write size even if we didn't consume all */
382 return size;
383 }
384
test_dev_config_show_u8(char * buf,u8 val)385 static ssize_t test_dev_config_show_u8(char *buf, u8 val)
386 {
387 return snprintf(buf, PAGE_SIZE, "%u\n", val);
388 }
389
config_name_show(struct device * dev,struct device_attribute * attr,char * buf)390 static ssize_t config_name_show(struct device *dev,
391 struct device_attribute *attr,
392 char *buf)
393 {
394 return config_test_show_str(buf, test_fw_config->name);
395 }
396 static DEVICE_ATTR_RW(config_name);
397
config_num_requests_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)398 static ssize_t config_num_requests_store(struct device *dev,
399 struct device_attribute *attr,
400 const char *buf, size_t count)
401 {
402 int rc;
403
404 mutex_lock(&test_fw_mutex);
405 if (test_fw_config->reqs) {
406 pr_err("Must call release_all_firmware prior to changing config\n");
407 rc = -EINVAL;
408 mutex_unlock(&test_fw_mutex);
409 goto out;
410 }
411 mutex_unlock(&test_fw_mutex);
412
413 rc = test_dev_config_update_u8(buf, count,
414 &test_fw_config->num_requests);
415
416 out:
417 return rc;
418 }
419
config_num_requests_show(struct device * dev,struct device_attribute * attr,char * buf)420 static ssize_t config_num_requests_show(struct device *dev,
421 struct device_attribute *attr,
422 char *buf)
423 {
424 return test_dev_config_show_u8(buf, test_fw_config->num_requests);
425 }
426 static DEVICE_ATTR_RW(config_num_requests);
427
config_into_buf_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)428 static ssize_t config_into_buf_store(struct device *dev,
429 struct device_attribute *attr,
430 const char *buf, size_t count)
431 {
432 return test_dev_config_update_bool(buf,
433 count,
434 &test_fw_config->into_buf);
435 }
436
config_into_buf_show(struct device * dev,struct device_attribute * attr,char * buf)437 static ssize_t config_into_buf_show(struct device *dev,
438 struct device_attribute *attr,
439 char *buf)
440 {
441 return test_dev_config_show_bool(buf, test_fw_config->into_buf);
442 }
443 static DEVICE_ATTR_RW(config_into_buf);
444
config_buf_size_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)445 static ssize_t config_buf_size_store(struct device *dev,
446 struct device_attribute *attr,
447 const char *buf, size_t count)
448 {
449 int rc;
450
451 mutex_lock(&test_fw_mutex);
452 if (test_fw_config->reqs) {
453 pr_err("Must call release_all_firmware prior to changing config\n");
454 rc = -EINVAL;
455 mutex_unlock(&test_fw_mutex);
456 goto out;
457 }
458 mutex_unlock(&test_fw_mutex);
459
460 rc = test_dev_config_update_size_t(buf, count,
461 &test_fw_config->buf_size);
462
463 out:
464 return rc;
465 }
466
config_buf_size_show(struct device * dev,struct device_attribute * attr,char * buf)467 static ssize_t config_buf_size_show(struct device *dev,
468 struct device_attribute *attr,
469 char *buf)
470 {
471 return test_dev_config_show_size_t(buf, test_fw_config->buf_size);
472 }
473 static DEVICE_ATTR_RW(config_buf_size);
474
config_file_offset_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)475 static ssize_t config_file_offset_store(struct device *dev,
476 struct device_attribute *attr,
477 const char *buf, size_t count)
478 {
479 int rc;
480
481 mutex_lock(&test_fw_mutex);
482 if (test_fw_config->reqs) {
483 pr_err("Must call release_all_firmware prior to changing config\n");
484 rc = -EINVAL;
485 mutex_unlock(&test_fw_mutex);
486 goto out;
487 }
488 mutex_unlock(&test_fw_mutex);
489
490 rc = test_dev_config_update_size_t(buf, count,
491 &test_fw_config->file_offset);
492
493 out:
494 return rc;
495 }
496
config_file_offset_show(struct device * dev,struct device_attribute * attr,char * buf)497 static ssize_t config_file_offset_show(struct device *dev,
498 struct device_attribute *attr,
499 char *buf)
500 {
501 return test_dev_config_show_size_t(buf, test_fw_config->file_offset);
502 }
503 static DEVICE_ATTR_RW(config_file_offset);
504
config_partial_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)505 static ssize_t config_partial_store(struct device *dev,
506 struct device_attribute *attr,
507 const char *buf, size_t count)
508 {
509 return test_dev_config_update_bool(buf,
510 count,
511 &test_fw_config->partial);
512 }
513
config_partial_show(struct device * dev,struct device_attribute * attr,char * buf)514 static ssize_t config_partial_show(struct device *dev,
515 struct device_attribute *attr,
516 char *buf)
517 {
518 return test_dev_config_show_bool(buf, test_fw_config->partial);
519 }
520 static DEVICE_ATTR_RW(config_partial);
521
config_sync_direct_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)522 static ssize_t config_sync_direct_store(struct device *dev,
523 struct device_attribute *attr,
524 const char *buf, size_t count)
525 {
526 int rc = test_dev_config_update_bool(buf, count,
527 &test_fw_config->sync_direct);
528
529 if (rc == count)
530 test_fw_config->req_firmware = test_fw_config->sync_direct ?
531 request_firmware_direct :
532 request_firmware;
533 return rc;
534 }
535
config_sync_direct_show(struct device * dev,struct device_attribute * attr,char * buf)536 static ssize_t config_sync_direct_show(struct device *dev,
537 struct device_attribute *attr,
538 char *buf)
539 {
540 return test_dev_config_show_bool(buf, test_fw_config->sync_direct);
541 }
542 static DEVICE_ATTR_RW(config_sync_direct);
543
config_send_uevent_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)544 static ssize_t config_send_uevent_store(struct device *dev,
545 struct device_attribute *attr,
546 const char *buf, size_t count)
547 {
548 return test_dev_config_update_bool(buf, count,
549 &test_fw_config->send_uevent);
550 }
551
config_send_uevent_show(struct device * dev,struct device_attribute * attr,char * buf)552 static ssize_t config_send_uevent_show(struct device *dev,
553 struct device_attribute *attr,
554 char *buf)
555 {
556 return test_dev_config_show_bool(buf, test_fw_config->send_uevent);
557 }
558 static DEVICE_ATTR_RW(config_send_uevent);
559
config_read_fw_idx_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)560 static ssize_t config_read_fw_idx_store(struct device *dev,
561 struct device_attribute *attr,
562 const char *buf, size_t count)
563 {
564 return test_dev_config_update_u8(buf, count,
565 &test_fw_config->read_fw_idx);
566 }
567
config_read_fw_idx_show(struct device * dev,struct device_attribute * attr,char * buf)568 static ssize_t config_read_fw_idx_show(struct device *dev,
569 struct device_attribute *attr,
570 char *buf)
571 {
572 return test_dev_config_show_u8(buf, test_fw_config->read_fw_idx);
573 }
574 static DEVICE_ATTR_RW(config_read_fw_idx);
575
576
trigger_request_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)577 static ssize_t trigger_request_store(struct device *dev,
578 struct device_attribute *attr,
579 const char *buf, size_t count)
580 {
581 int rc;
582 char *name;
583
584 name = kstrndup(buf, count, GFP_KERNEL);
585 if (!name)
586 return -ENOSPC;
587
588 pr_info("loading '%s'\n", name);
589
590 mutex_lock(&test_fw_mutex);
591 release_firmware(test_firmware);
592 test_firmware = NULL;
593 rc = request_firmware(&test_firmware, name, dev);
594 if (rc) {
595 pr_info("load of '%s' failed: %d\n", name, rc);
596 goto out;
597 }
598 pr_info("loaded: %zu\n", test_firmware->size);
599 rc = count;
600
601 out:
602 mutex_unlock(&test_fw_mutex);
603
604 kfree(name);
605
606 return rc;
607 }
608 static DEVICE_ATTR_WO(trigger_request);
609
610 #ifdef CONFIG_EFI_EMBEDDED_FIRMWARE
611 extern struct list_head efi_embedded_fw_list;
612 extern bool efi_embedded_fw_checked;
613
trigger_request_platform_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)614 static ssize_t trigger_request_platform_store(struct device *dev,
615 struct device_attribute *attr,
616 const char *buf, size_t count)
617 {
618 static const u8 test_data[] = {
619 0x55, 0xaa, 0x55, 0xaa, 0x01, 0x02, 0x03, 0x04,
620 0x55, 0xaa, 0x55, 0xaa, 0x05, 0x06, 0x07, 0x08,
621 0x55, 0xaa, 0x55, 0xaa, 0x10, 0x20, 0x30, 0x40,
622 0x55, 0xaa, 0x55, 0xaa, 0x50, 0x60, 0x70, 0x80
623 };
624 struct efi_embedded_fw efi_embedded_fw;
625 const struct firmware *firmware = NULL;
626 bool saved_efi_embedded_fw_checked;
627 char *name;
628 int rc;
629
630 name = kstrndup(buf, count, GFP_KERNEL);
631 if (!name)
632 return -ENOSPC;
633
634 pr_info("inserting test platform fw '%s'\n", name);
635 efi_embedded_fw.name = name;
636 efi_embedded_fw.data = (void *)test_data;
637 efi_embedded_fw.length = sizeof(test_data);
638 list_add(&efi_embedded_fw.list, &efi_embedded_fw_list);
639 saved_efi_embedded_fw_checked = efi_embedded_fw_checked;
640 efi_embedded_fw_checked = true;
641
642 pr_info("loading '%s'\n", name);
643 rc = firmware_request_platform(&firmware, name, dev);
644 if (rc) {
645 pr_info("load of '%s' failed: %d\n", name, rc);
646 goto out;
647 }
648 if (firmware->size != sizeof(test_data) ||
649 memcmp(firmware->data, test_data, sizeof(test_data)) != 0) {
650 pr_info("firmware contents mismatch for '%s'\n", name);
651 rc = -EINVAL;
652 goto out;
653 }
654 pr_info("loaded: %zu\n", firmware->size);
655 rc = count;
656
657 out:
658 efi_embedded_fw_checked = saved_efi_embedded_fw_checked;
659 release_firmware(firmware);
660 list_del(&efi_embedded_fw.list);
661 kfree(name);
662
663 return rc;
664 }
665 static DEVICE_ATTR_WO(trigger_request_platform);
666 #endif
667
668 static DECLARE_COMPLETION(async_fw_done);
669
trigger_async_request_cb(const struct firmware * fw,void * context)670 static void trigger_async_request_cb(const struct firmware *fw, void *context)
671 {
672 test_firmware = fw;
673 complete(&async_fw_done);
674 }
675
trigger_async_request_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)676 static ssize_t trigger_async_request_store(struct device *dev,
677 struct device_attribute *attr,
678 const char *buf, size_t count)
679 {
680 int rc;
681 char *name;
682
683 name = kstrndup(buf, count, GFP_KERNEL);
684 if (!name)
685 return -ENOSPC;
686
687 pr_info("loading '%s'\n", name);
688
689 mutex_lock(&test_fw_mutex);
690 release_firmware(test_firmware);
691 test_firmware = NULL;
692 rc = request_firmware_nowait(THIS_MODULE, 1, name, dev, GFP_KERNEL,
693 NULL, trigger_async_request_cb);
694 if (rc) {
695 pr_info("async load of '%s' failed: %d\n", name, rc);
696 kfree(name);
697 goto out;
698 }
699 /* Free 'name' ASAP, to test for race conditions */
700 kfree(name);
701
702 wait_for_completion(&async_fw_done);
703
704 if (test_firmware) {
705 pr_info("loaded: %zu\n", test_firmware->size);
706 rc = count;
707 } else {
708 pr_err("failed to async load firmware\n");
709 rc = -ENOMEM;
710 }
711
712 out:
713 mutex_unlock(&test_fw_mutex);
714
715 return rc;
716 }
717 static DEVICE_ATTR_WO(trigger_async_request);
718
trigger_custom_fallback_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)719 static ssize_t trigger_custom_fallback_store(struct device *dev,
720 struct device_attribute *attr,
721 const char *buf, size_t count)
722 {
723 int rc;
724 char *name;
725
726 name = kstrndup(buf, count, GFP_KERNEL);
727 if (!name)
728 return -ENOSPC;
729
730 pr_info("loading '%s' using custom fallback mechanism\n", name);
731
732 mutex_lock(&test_fw_mutex);
733 release_firmware(test_firmware);
734 test_firmware = NULL;
735 rc = request_firmware_nowait(THIS_MODULE, FW_ACTION_NOHOTPLUG, name,
736 dev, GFP_KERNEL, NULL,
737 trigger_async_request_cb);
738 if (rc) {
739 pr_info("async load of '%s' failed: %d\n", name, rc);
740 kfree(name);
741 goto out;
742 }
743 /* Free 'name' ASAP, to test for race conditions */
744 kfree(name);
745
746 wait_for_completion(&async_fw_done);
747
748 if (test_firmware) {
749 pr_info("loaded: %zu\n", test_firmware->size);
750 rc = count;
751 } else {
752 pr_err("failed to async load firmware\n");
753 rc = -ENODEV;
754 }
755
756 out:
757 mutex_unlock(&test_fw_mutex);
758
759 return rc;
760 }
761 static DEVICE_ATTR_WO(trigger_custom_fallback);
762
test_fw_run_batch_request(void * data)763 static int test_fw_run_batch_request(void *data)
764 {
765 struct test_batched_req *req = data;
766
767 if (!req) {
768 test_fw_config->test_result = -EINVAL;
769 return -EINVAL;
770 }
771
772 if (test_fw_config->into_buf) {
773 void *test_buf;
774
775 test_buf = kzalloc(TEST_FIRMWARE_BUF_SIZE, GFP_KERNEL);
776 if (!test_buf)
777 return -ENOSPC;
778
779 if (test_fw_config->partial)
780 req->rc = request_partial_firmware_into_buf
781 (&req->fw,
782 req->name,
783 req->dev,
784 test_buf,
785 test_fw_config->buf_size,
786 test_fw_config->file_offset);
787 else
788 req->rc = request_firmware_into_buf
789 (&req->fw,
790 req->name,
791 req->dev,
792 test_buf,
793 test_fw_config->buf_size);
794 if (!req->fw)
795 kfree(test_buf);
796 } else {
797 req->rc = test_fw_config->req_firmware(&req->fw,
798 req->name,
799 req->dev);
800 }
801
802 if (req->rc) {
803 pr_info("#%u: batched sync load failed: %d\n",
804 req->idx, req->rc);
805 if (!test_fw_config->test_result)
806 test_fw_config->test_result = req->rc;
807 } else if (req->fw) {
808 req->sent = true;
809 pr_info("#%u: batched sync loaded %zu\n",
810 req->idx, req->fw->size);
811 }
812 complete(&req->completion);
813
814 req->task = NULL;
815
816 return 0;
817 }
818
819 /*
820 * We use a kthread as otherwise the kernel serializes all our sync requests
821 * and we would not be able to mimic batched requests on a sync call. Batched
822 * requests on a sync call can for instance happen on a device driver when
823 * multiple cards are used and firmware loading happens outside of probe.
824 */
trigger_batched_requests_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)825 static ssize_t trigger_batched_requests_store(struct device *dev,
826 struct device_attribute *attr,
827 const char *buf, size_t count)
828 {
829 struct test_batched_req *req;
830 int rc;
831 u8 i;
832
833 mutex_lock(&test_fw_mutex);
834
835 test_fw_config->reqs =
836 vzalloc(array3_size(sizeof(struct test_batched_req),
837 test_fw_config->num_requests, 2));
838 if (!test_fw_config->reqs) {
839 rc = -ENOMEM;
840 goto out_unlock;
841 }
842
843 pr_info("batched sync firmware loading '%s' %u times\n",
844 test_fw_config->name, test_fw_config->num_requests);
845
846 for (i = 0; i < test_fw_config->num_requests; i++) {
847 req = &test_fw_config->reqs[i];
848 req->fw = NULL;
849 req->idx = i;
850 req->name = test_fw_config->name;
851 req->dev = dev;
852 init_completion(&req->completion);
853 req->task = kthread_run(test_fw_run_batch_request, req,
854 "%s-%u", KBUILD_MODNAME, req->idx);
855 if (!req->task || IS_ERR(req->task)) {
856 pr_err("Setting up thread %u failed\n", req->idx);
857 req->task = NULL;
858 rc = -ENOMEM;
859 goto out_bail;
860 }
861 }
862
863 rc = count;
864
865 /*
866 * We require an explicit release to enable more time and delay of
867 * calling release_firmware() to improve our chances of forcing a
868 * batched request. If we instead called release_firmware() right away
869 * then we might miss on an opportunity of having a successful firmware
870 * request pass on the opportunity to be come a batched request.
871 */
872
873 out_bail:
874 for (i = 0; i < test_fw_config->num_requests; i++) {
875 req = &test_fw_config->reqs[i];
876 if (req->task || req->sent)
877 wait_for_completion(&req->completion);
878 }
879
880 /* Override any worker error if we had a general setup error */
881 if (rc < 0)
882 test_fw_config->test_result = rc;
883
884 out_unlock:
885 mutex_unlock(&test_fw_mutex);
886
887 return rc;
888 }
889 static DEVICE_ATTR_WO(trigger_batched_requests);
890
891 /*
892 * We wait for each callback to return with the lock held, no need to lock here
893 */
trigger_batched_cb(const struct firmware * fw,void * context)894 static void trigger_batched_cb(const struct firmware *fw, void *context)
895 {
896 struct test_batched_req *req = context;
897
898 if (!req) {
899 test_fw_config->test_result = -EINVAL;
900 return;
901 }
902
903 /* forces *some* batched requests to queue up */
904 if (!req->idx)
905 ssleep(2);
906
907 req->fw = fw;
908
909 /*
910 * Unfortunately the firmware API gives us nothing other than a null FW
911 * if the firmware was not found on async requests. Best we can do is
912 * just assume -ENOENT. A better API would pass the actual return
913 * value to the callback.
914 */
915 if (!fw && !test_fw_config->test_result)
916 test_fw_config->test_result = -ENOENT;
917
918 complete(&req->completion);
919 }
920
921 static
trigger_batched_requests_async_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)922 ssize_t trigger_batched_requests_async_store(struct device *dev,
923 struct device_attribute *attr,
924 const char *buf, size_t count)
925 {
926 struct test_batched_req *req;
927 bool send_uevent;
928 int rc;
929 u8 i;
930
931 mutex_lock(&test_fw_mutex);
932
933 test_fw_config->reqs =
934 vzalloc(array3_size(sizeof(struct test_batched_req),
935 test_fw_config->num_requests, 2));
936 if (!test_fw_config->reqs) {
937 rc = -ENOMEM;
938 goto out;
939 }
940
941 pr_info("batched loading '%s' custom fallback mechanism %u times\n",
942 test_fw_config->name, test_fw_config->num_requests);
943
944 send_uevent = test_fw_config->send_uevent ? FW_ACTION_HOTPLUG :
945 FW_ACTION_NOHOTPLUG;
946
947 for (i = 0; i < test_fw_config->num_requests; i++) {
948 req = &test_fw_config->reqs[i];
949 req->name = test_fw_config->name;
950 req->fw = NULL;
951 req->idx = i;
952 init_completion(&req->completion);
953 rc = request_firmware_nowait(THIS_MODULE, send_uevent,
954 req->name,
955 dev, GFP_KERNEL, req,
956 trigger_batched_cb);
957 if (rc) {
958 pr_info("#%u: batched async load failed setup: %d\n",
959 i, rc);
960 req->rc = rc;
961 goto out_bail;
962 } else
963 req->sent = true;
964 }
965
966 rc = count;
967
968 out_bail:
969
970 /*
971 * We require an explicit release to enable more time and delay of
972 * calling release_firmware() to improve our chances of forcing a
973 * batched request. If we instead called release_firmware() right away
974 * then we might miss on an opportunity of having a successful firmware
975 * request pass on the opportunity to be come a batched request.
976 */
977
978 for (i = 0; i < test_fw_config->num_requests; i++) {
979 req = &test_fw_config->reqs[i];
980 if (req->sent)
981 wait_for_completion(&req->completion);
982 }
983
984 /* Override any worker error if we had a general setup error */
985 if (rc < 0)
986 test_fw_config->test_result = rc;
987
988 out:
989 mutex_unlock(&test_fw_mutex);
990
991 return rc;
992 }
993 static DEVICE_ATTR_WO(trigger_batched_requests_async);
994
test_result_show(struct device * dev,struct device_attribute * attr,char * buf)995 static ssize_t test_result_show(struct device *dev,
996 struct device_attribute *attr,
997 char *buf)
998 {
999 return test_dev_config_show_int(buf, test_fw_config->test_result);
1000 }
1001 static DEVICE_ATTR_RO(test_result);
1002
release_all_firmware_store(struct device * dev,struct device_attribute * attr,const char * buf,size_t count)1003 static ssize_t release_all_firmware_store(struct device *dev,
1004 struct device_attribute *attr,
1005 const char *buf, size_t count)
1006 {
1007 test_release_all_firmware();
1008 return count;
1009 }
1010 static DEVICE_ATTR_WO(release_all_firmware);
1011
read_firmware_show(struct device * dev,struct device_attribute * attr,char * buf)1012 static ssize_t read_firmware_show(struct device *dev,
1013 struct device_attribute *attr,
1014 char *buf)
1015 {
1016 struct test_batched_req *req;
1017 u8 idx;
1018 ssize_t rc = 0;
1019
1020 mutex_lock(&test_fw_mutex);
1021
1022 idx = test_fw_config->read_fw_idx;
1023 if (idx >= test_fw_config->num_requests) {
1024 rc = -ERANGE;
1025 goto out;
1026 }
1027
1028 if (!test_fw_config->reqs) {
1029 rc = -EINVAL;
1030 goto out;
1031 }
1032
1033 req = &test_fw_config->reqs[idx];
1034 if (!req->fw) {
1035 pr_err("#%u: failed to async load firmware\n", idx);
1036 rc = -ENOENT;
1037 goto out;
1038 }
1039
1040 pr_info("#%u: loaded %zu\n", idx, req->fw->size);
1041
1042 if (req->fw->size > PAGE_SIZE) {
1043 pr_err("Testing interface must use PAGE_SIZE firmware for now\n");
1044 rc = -EINVAL;
1045 goto out;
1046 }
1047 memcpy(buf, req->fw->data, req->fw->size);
1048
1049 rc = req->fw->size;
1050 out:
1051 mutex_unlock(&test_fw_mutex);
1052
1053 return rc;
1054 }
1055 static DEVICE_ATTR_RO(read_firmware);
1056
1057 #define TEST_FW_DEV_ATTR(name) &dev_attr_##name.attr
1058
1059 static struct attribute *test_dev_attrs[] = {
1060 TEST_FW_DEV_ATTR(reset),
1061
1062 TEST_FW_DEV_ATTR(config),
1063 TEST_FW_DEV_ATTR(config_name),
1064 TEST_FW_DEV_ATTR(config_num_requests),
1065 TEST_FW_DEV_ATTR(config_into_buf),
1066 TEST_FW_DEV_ATTR(config_buf_size),
1067 TEST_FW_DEV_ATTR(config_file_offset),
1068 TEST_FW_DEV_ATTR(config_partial),
1069 TEST_FW_DEV_ATTR(config_sync_direct),
1070 TEST_FW_DEV_ATTR(config_send_uevent),
1071 TEST_FW_DEV_ATTR(config_read_fw_idx),
1072
1073 /* These don't use the config at all - they could be ported! */
1074 TEST_FW_DEV_ATTR(trigger_request),
1075 TEST_FW_DEV_ATTR(trigger_async_request),
1076 TEST_FW_DEV_ATTR(trigger_custom_fallback),
1077 #ifdef CONFIG_EFI_EMBEDDED_FIRMWARE
1078 TEST_FW_DEV_ATTR(trigger_request_platform),
1079 #endif
1080
1081 /* These use the config and can use the test_result */
1082 TEST_FW_DEV_ATTR(trigger_batched_requests),
1083 TEST_FW_DEV_ATTR(trigger_batched_requests_async),
1084
1085 TEST_FW_DEV_ATTR(release_all_firmware),
1086 TEST_FW_DEV_ATTR(test_result),
1087 TEST_FW_DEV_ATTR(read_firmware),
1088 NULL,
1089 };
1090
1091 ATTRIBUTE_GROUPS(test_dev);
1092
1093 static struct miscdevice test_fw_misc_device = {
1094 .minor = MISC_DYNAMIC_MINOR,
1095 .name = "test_firmware",
1096 .fops = &test_fw_fops,
1097 .groups = test_dev_groups,
1098 };
1099
test_firmware_init(void)1100 static int __init test_firmware_init(void)
1101 {
1102 int rc;
1103
1104 test_fw_config = kzalloc(sizeof(struct test_config), GFP_KERNEL);
1105 if (!test_fw_config)
1106 return -ENOMEM;
1107
1108 rc = __test_firmware_config_init();
1109 if (rc) {
1110 kfree(test_fw_config);
1111 pr_err("could not init firmware test config: %d\n", rc);
1112 return rc;
1113 }
1114
1115 rc = misc_register(&test_fw_misc_device);
1116 if (rc) {
1117 kfree(test_fw_config);
1118 pr_err("could not register misc device: %d\n", rc);
1119 return rc;
1120 }
1121
1122 pr_warn("interface ready\n");
1123
1124 return 0;
1125 }
1126
1127 module_init(test_firmware_init);
1128
test_firmware_exit(void)1129 static void __exit test_firmware_exit(void)
1130 {
1131 mutex_lock(&test_fw_mutex);
1132 release_firmware(test_firmware);
1133 misc_deregister(&test_fw_misc_device);
1134 __test_firmware_config_free();
1135 kfree(test_fw_config);
1136 mutex_unlock(&test_fw_mutex);
1137
1138 pr_warn("removed interface\n");
1139 }
1140
1141 module_exit(test_firmware_exit);
1142
1143 MODULE_AUTHOR("Kees Cook <keescook@chromium.org>");
1144 MODULE_LICENSE("GPL");
1145