2019-05-19 12:08:20 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2014-07-14 21:38:12 +00:00
|
|
|
/*
|
|
|
|
* This module provides an interface to trigger and test firmware loading.
|
|
|
|
*
|
|
|
|
* It is designed to be used for basic evaluation of the firmware loading
|
|
|
|
* subsystem (for example when validating firmware verification). It lacks
|
|
|
|
* any extra dependencies, and will not normally be loaded by the system
|
|
|
|
* unless explicitly requested by name.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
|
|
|
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/printk.h>
|
2015-12-09 22:50:27 +00:00
|
|
|
#include <linux/completion.h>
|
2014-07-14 21:38:12 +00:00
|
|
|
#include <linux/firmware.h>
|
|
|
|
#include <linux/device.h>
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <linux/miscdevice.h>
|
2019-08-22 18:40:04 +00:00
|
|
|
#include <linux/sizes.h>
|
2014-07-14 21:38:12 +00:00
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/uaccess.h>
|
2017-07-20 20:13:42 +00:00
|
|
|
#include <linux/delay.h>
|
|
|
|
#include <linux/kthread.h>
|
2018-04-05 23:25:34 +00:00
|
|
|
#include <linux/vmalloc.h>
|
2020-01-15 16:35:49 +00:00
|
|
|
#include <linux/efi_embedded_fw.h>
|
2017-07-20 20:13:42 +00:00
|
|
|
|
2020-09-09 22:53:54 +00:00
|
|
|
MODULE_IMPORT_NS(TEST_FIRMWARE);
|
|
|
|
|
2017-07-20 20:13:42 +00:00
|
|
|
#define TEST_FIRMWARE_NAME "test-firmware.bin"
|
|
|
|
#define TEST_FIRMWARE_NUM_REQS 4
|
2019-08-22 18:40:04 +00:00
|
|
|
#define TEST_FIRMWARE_BUF_SIZE SZ_1K
|
2022-04-21 21:22:02 +00:00
|
|
|
#define TEST_UPLOAD_MAX_SIZE SZ_2K
|
|
|
|
#define TEST_UPLOAD_BLK_SIZE 37 /* Avoid powers of two in testing */
|
2014-07-14 21:38:12 +00:00
|
|
|
|
|
|
|
static DEFINE_MUTEX(test_fw_mutex);
|
|
|
|
static const struct firmware *test_firmware;
|
2022-04-21 21:22:02 +00:00
|
|
|
static LIST_HEAD(test_upload_list);
|
2014-07-14 21:38:12 +00:00
|
|
|
|
2017-07-20 20:13:42 +00:00
|
|
|
struct test_batched_req {
|
|
|
|
u8 idx;
|
|
|
|
int rc;
|
|
|
|
bool sent;
|
|
|
|
const struct firmware *fw;
|
|
|
|
const char *name;
|
|
|
|
struct completion completion;
|
|
|
|
struct task_struct *task;
|
|
|
|
struct device *dev;
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* test_config - represents configuration for the test for different triggers
|
|
|
|
*
|
|
|
|
* @name: the name of the firmware file to look for
|
2019-08-22 18:40:04 +00:00
|
|
|
* @into_buf: when the into_buf is used if this is true
|
|
|
|
* request_firmware_into_buf() will be used instead.
|
2020-10-02 17:38:28 +00:00
|
|
|
* @buf_size: size of buf to allocate when into_buf is true
|
|
|
|
* @file_offset: file offset to request when calling request_firmware_into_buf
|
|
|
|
* @partial: partial read opt when calling request_firmware_into_buf
|
2017-07-20 20:13:42 +00:00
|
|
|
* @sync_direct: when the sync trigger is used if this is true
|
|
|
|
* request_firmware_direct() will be used instead.
|
|
|
|
* @send_uevent: whether or not to send a uevent for async requests
|
|
|
|
* @num_requests: number of requests to try per test case. This is trigger
|
|
|
|
* specific.
|
|
|
|
* @reqs: stores all requests information
|
|
|
|
* @read_fw_idx: index of thread from which we want to read firmware results
|
|
|
|
* from through the read_fw trigger.
|
2022-04-21 21:22:02 +00:00
|
|
|
* @upload_name: firmware name to be used with upload_read sysfs node
|
2017-07-20 20:13:42 +00:00
|
|
|
* @test_result: a test may use this to collect the result from the call
|
|
|
|
* of the request_firmware*() calls used in their tests. In order of
|
|
|
|
* priority we always keep first any setup error. If no setup errors were
|
|
|
|
* found then we move on to the first error encountered while running the
|
|
|
|
* API. Note that for async calls this typically will be a successful
|
|
|
|
* result (0) unless of course you've used bogus parameters, or the system
|
|
|
|
* is out of memory. In the async case the callback is expected to do a
|
|
|
|
* bit more homework to figure out what happened, unfortunately the only
|
|
|
|
* information passed today on error is the fact that no firmware was
|
|
|
|
* found so we can only assume -ENOENT on async calls if the firmware is
|
|
|
|
* NULL.
|
|
|
|
*
|
|
|
|
* Errors you can expect:
|
|
|
|
*
|
|
|
|
* API specific:
|
|
|
|
*
|
|
|
|
* 0: success for sync, for async it means request was sent
|
|
|
|
* -EINVAL: invalid parameters or request
|
|
|
|
* -ENOENT: files not found
|
|
|
|
*
|
|
|
|
* System environment:
|
|
|
|
*
|
|
|
|
* -ENOMEM: memory pressure on system
|
|
|
|
* -ENODEV: out of number of devices to test
|
|
|
|
* -EINVAL: an unexpected error has occurred
|
|
|
|
* @req_firmware: if @sync_direct is true this is set to
|
|
|
|
* request_firmware_direct(), otherwise request_firmware()
|
|
|
|
*/
|
|
|
|
struct test_config {
|
|
|
|
char *name;
|
2019-08-22 18:40:04 +00:00
|
|
|
bool into_buf;
|
2020-10-02 17:38:28 +00:00
|
|
|
size_t buf_size;
|
|
|
|
size_t file_offset;
|
|
|
|
bool partial;
|
2017-07-20 20:13:42 +00:00
|
|
|
bool sync_direct;
|
|
|
|
bool send_uevent;
|
|
|
|
u8 num_requests;
|
|
|
|
u8 read_fw_idx;
|
2022-04-21 21:22:02 +00:00
|
|
|
char *upload_name;
|
2017-07-20 20:13:42 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* These below don't belong her but we'll move them once we create
|
|
|
|
* a struct fw_test_device and stuff the misc_dev under there later.
|
|
|
|
*/
|
|
|
|
struct test_batched_req *reqs;
|
|
|
|
int test_result;
|
|
|
|
int (*req_firmware)(const struct firmware **fw, const char *name,
|
|
|
|
struct device *device);
|
|
|
|
};
|
|
|
|
|
test_firmware: Error injection for firmware upload
Add error injection capability to the test_firmware module specifically
for firmware upload testing. Error injection instructions are transferred
as the first part of the firmware payload. The format of an error
injection string is similar to the error strings that may be read from
the error sysfs node.
To inject the error "programming:hw-error", one would use the error
injection string "inject:programming:hw-error" as the firmware payload:
$ echo 1 > loading
$ echo inject:programming:hw-error > data
$ echo 0 > loading
$ cat status
idle
$ cat error
programming:hw-error
The first part of the error string is the progress state of the upload at
the time of the error. The progress state would be one of the following:
"preparing", "transferring", or "programming". The second part of the
error string is one of the following: "hw-error", "timeout", "device-busy",
"invalid-file-size", "read-write-error", "flash-wearout", and "user-abort".
Note that all of the error strings except "user-abort" will fail without
delay. The "user-abort" error will cause the firmware upload to stall at
the requested progress state for up to 5 minutes to allow you to echo 1
to the cancel sysfs node. It is this cancellation that causes the
'user-abort" error. If the upload is not cancelled within the 5 minute
time period, then the upload will complete without an error.
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Reviewed-by: Tianfei zhang <tianfei.zhang@intel.com>
Tested-by: Matthew Gerlach <matthew.gerlach@linux.intel.com>
Signed-off-by: Russ Weight <russell.h.weight@intel.com>
Link: https://lore.kernel.org/r/20220421212204.36052-8-russell.h.weight@intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-04-21 21:22:03 +00:00
|
|
|
struct upload_inject_err {
|
|
|
|
const char *prog;
|
|
|
|
enum fw_upload_err err_code;
|
|
|
|
};
|
|
|
|
|
2022-04-21 21:22:02 +00:00
|
|
|
struct test_firmware_upload {
|
|
|
|
char *name;
|
|
|
|
struct list_head node;
|
|
|
|
char *buf;
|
|
|
|
size_t size;
|
|
|
|
bool cancel_request;
|
test_firmware: Error injection for firmware upload
Add error injection capability to the test_firmware module specifically
for firmware upload testing. Error injection instructions are transferred
as the first part of the firmware payload. The format of an error
injection string is similar to the error strings that may be read from
the error sysfs node.
To inject the error "programming:hw-error", one would use the error
injection string "inject:programming:hw-error" as the firmware payload:
$ echo 1 > loading
$ echo inject:programming:hw-error > data
$ echo 0 > loading
$ cat status
idle
$ cat error
programming:hw-error
The first part of the error string is the progress state of the upload at
the time of the error. The progress state would be one of the following:
"preparing", "transferring", or "programming". The second part of the
error string is one of the following: "hw-error", "timeout", "device-busy",
"invalid-file-size", "read-write-error", "flash-wearout", and "user-abort".
Note that all of the error strings except "user-abort" will fail without
delay. The "user-abort" error will cause the firmware upload to stall at
the requested progress state for up to 5 minutes to allow you to echo 1
to the cancel sysfs node. It is this cancellation that causes the
'user-abort" error. If the upload is not cancelled within the 5 minute
time period, then the upload will complete without an error.
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Reviewed-by: Tianfei zhang <tianfei.zhang@intel.com>
Tested-by: Matthew Gerlach <matthew.gerlach@linux.intel.com>
Signed-off-by: Russ Weight <russell.h.weight@intel.com>
Link: https://lore.kernel.org/r/20220421212204.36052-8-russell.h.weight@intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-04-21 21:22:03 +00:00
|
|
|
struct upload_inject_err inject;
|
2022-04-21 21:22:02 +00:00
|
|
|
struct fw_upload *fwl;
|
|
|
|
};
|
|
|
|
|
2018-01-11 11:13:45 +00:00
|
|
|
static struct test_config *test_fw_config;
|
2017-07-20 20:13:42 +00:00
|
|
|
|
2022-04-21 21:22:02 +00:00
|
|
|
static struct test_firmware_upload *upload_lookup_name(const char *name)
|
|
|
|
{
|
|
|
|
struct test_firmware_upload *tst;
|
|
|
|
|
|
|
|
list_for_each_entry(tst, &test_upload_list, node)
|
|
|
|
if (strncmp(name, tst->name, strlen(tst->name)) == 0)
|
|
|
|
return tst;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2014-07-14 21:38:12 +00:00
|
|
|
static ssize_t test_fw_misc_read(struct file *f, char __user *buf,
|
|
|
|
size_t size, loff_t *offset)
|
|
|
|
{
|
|
|
|
ssize_t rc = 0;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
if (test_firmware)
|
|
|
|
rc = simple_read_from_buffer(buf, size, offset,
|
|
|
|
test_firmware->data,
|
|
|
|
test_firmware->size);
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct file_operations test_fw_fops = {
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.read = test_fw_misc_read,
|
|
|
|
};
|
|
|
|
|
2017-07-20 20:13:42 +00:00
|
|
|
static void __test_release_all_firmware(void)
|
|
|
|
{
|
|
|
|
struct test_batched_req *req;
|
|
|
|
u8 i;
|
|
|
|
|
|
|
|
if (!test_fw_config->reqs)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (i = 0; i < test_fw_config->num_requests; i++) {
|
|
|
|
req = &test_fw_config->reqs[i];
|
|
|
|
if (req->fw)
|
|
|
|
release_firmware(req->fw);
|
|
|
|
}
|
|
|
|
|
|
|
|
vfree(test_fw_config->reqs);
|
|
|
|
test_fw_config->reqs = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void test_release_all_firmware(void)
|
|
|
|
{
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
__test_release_all_firmware();
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void __test_firmware_config_free(void)
|
|
|
|
{
|
|
|
|
__test_release_all_firmware();
|
|
|
|
kfree_const(test_fw_config->name);
|
|
|
|
test_fw_config->name = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX: move to kstrncpy() once merged.
|
|
|
|
*
|
|
|
|
* Users should use kfree_const() when freeing these.
|
|
|
|
*/
|
|
|
|
static int __kstrncpy(char **dst, const char *name, size_t count, gfp_t gfp)
|
|
|
|
{
|
|
|
|
*dst = kstrndup(name, count, gfp);
|
|
|
|
if (!*dst)
|
|
|
|
return -ENOSPC;
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __test_firmware_config_init(void)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = __kstrncpy(&test_fw_config->name, TEST_FIRMWARE_NAME,
|
|
|
|
strlen(TEST_FIRMWARE_NAME), GFP_KERNEL);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
test_fw_config->num_requests = TEST_FIRMWARE_NUM_REQS;
|
|
|
|
test_fw_config->send_uevent = true;
|
2019-08-22 18:40:04 +00:00
|
|
|
test_fw_config->into_buf = false;
|
2020-10-02 17:38:28 +00:00
|
|
|
test_fw_config->buf_size = TEST_FIRMWARE_BUF_SIZE;
|
|
|
|
test_fw_config->file_offset = 0;
|
|
|
|
test_fw_config->partial = false;
|
2017-07-20 20:13:42 +00:00
|
|
|
test_fw_config->sync_direct = false;
|
|
|
|
test_fw_config->req_firmware = request_firmware;
|
|
|
|
test_fw_config->test_result = 0;
|
|
|
|
test_fw_config->reqs = NULL;
|
2022-04-21 21:22:02 +00:00
|
|
|
test_fw_config->upload_name = NULL;
|
2017-07-20 20:13:42 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out:
|
|
|
|
__test_firmware_config_free();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t reset_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
|
|
|
|
__test_firmware_config_free();
|
|
|
|
|
|
|
|
ret = __test_firmware_config_init();
|
|
|
|
if (ret < 0) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
pr_err("could not alloc settings for config trigger: %d\n",
|
|
|
|
ret);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
pr_info("reset\n");
|
|
|
|
ret = count;
|
|
|
|
|
|
|
|
out:
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_WO(reset);
|
|
|
|
|
|
|
|
static ssize_t config_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
int len = 0;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
|
2019-05-15 09:33:22 +00:00
|
|
|
len += scnprintf(buf, PAGE_SIZE - len,
|
2017-07-20 20:13:42 +00:00
|
|
|
"Custom trigger configuration for: %s\n",
|
|
|
|
dev_name(dev));
|
|
|
|
|
|
|
|
if (test_fw_config->name)
|
2020-10-02 17:38:28 +00:00
|
|
|
len += scnprintf(buf + len, PAGE_SIZE - len,
|
2017-07-20 20:13:42 +00:00
|
|
|
"name:\t%s\n",
|
|
|
|
test_fw_config->name);
|
|
|
|
else
|
2020-10-02 17:38:28 +00:00
|
|
|
len += scnprintf(buf + len, PAGE_SIZE - len,
|
2017-07-20 20:13:42 +00:00
|
|
|
"name:\tEMTPY\n");
|
|
|
|
|
2020-10-02 17:38:28 +00:00
|
|
|
len += scnprintf(buf + len, PAGE_SIZE - len,
|
2017-07-20 20:13:42 +00:00
|
|
|
"num_requests:\t%u\n", test_fw_config->num_requests);
|
|
|
|
|
2020-10-02 17:38:28 +00:00
|
|
|
len += scnprintf(buf + len, PAGE_SIZE - len,
|
2017-07-20 20:13:42 +00:00
|
|
|
"send_uevent:\t\t%s\n",
|
|
|
|
test_fw_config->send_uevent ?
|
2021-04-25 02:00:24 +00:00
|
|
|
"FW_ACTION_UEVENT" :
|
|
|
|
"FW_ACTION_NOUEVENT");
|
2020-10-02 17:38:28 +00:00
|
|
|
len += scnprintf(buf + len, PAGE_SIZE - len,
|
2019-08-22 18:40:04 +00:00
|
|
|
"into_buf:\t\t%s\n",
|
|
|
|
test_fw_config->into_buf ? "true" : "false");
|
2020-10-02 17:38:28 +00:00
|
|
|
len += scnprintf(buf + len, PAGE_SIZE - len,
|
|
|
|
"buf_size:\t%zu\n", test_fw_config->buf_size);
|
|
|
|
len += scnprintf(buf + len, PAGE_SIZE - len,
|
|
|
|
"file_offset:\t%zu\n", test_fw_config->file_offset);
|
|
|
|
len += scnprintf(buf + len, PAGE_SIZE - len,
|
|
|
|
"partial:\t\t%s\n",
|
|
|
|
test_fw_config->partial ? "true" : "false");
|
|
|
|
len += scnprintf(buf + len, PAGE_SIZE - len,
|
2017-07-20 20:13:42 +00:00
|
|
|
"sync_direct:\t\t%s\n",
|
|
|
|
test_fw_config->sync_direct ? "true" : "false");
|
2020-10-02 17:38:28 +00:00
|
|
|
len += scnprintf(buf + len, PAGE_SIZE - len,
|
2017-07-20 20:13:42 +00:00
|
|
|
"read_fw_idx:\t%u\n", test_fw_config->read_fw_idx);
|
2022-04-21 21:22:02 +00:00
|
|
|
if (test_fw_config->upload_name)
|
|
|
|
len += scnprintf(buf + len, PAGE_SIZE - len,
|
|
|
|
"upload_name:\t%s\n",
|
|
|
|
test_fw_config->upload_name);
|
|
|
|
else
|
|
|
|
len += scnprintf(buf + len, PAGE_SIZE - len,
|
|
|
|
"upload_name:\tEMTPY\n");
|
2017-07-20 20:13:42 +00:00
|
|
|
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_RO(config);
|
|
|
|
|
|
|
|
static ssize_t config_name_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
kfree_const(test_fw_config->name);
|
|
|
|
ret = __kstrncpy(&test_fw_config->name, buf, count, GFP_KERNEL);
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* As per sysfs_kf_seq_show() the buf is max PAGE_SIZE.
|
|
|
|
*/
|
|
|
|
static ssize_t config_test_show_str(char *dst,
|
|
|
|
char *src)
|
|
|
|
{
|
|
|
|
int len;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
len = snprintf(dst, PAGE_SIZE, "%s\n", src);
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int test_dev_config_update_bool(const char *buf, size_t size,
|
|
|
|
bool *cfg)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
if (strtobool(buf, cfg) < 0)
|
|
|
|
ret = -EINVAL;
|
|
|
|
else
|
|
|
|
ret = size;
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-04-15 00:25:17 +00:00
|
|
|
static ssize_t test_dev_config_show_bool(char *buf, bool val)
|
2017-07-20 20:13:42 +00:00
|
|
|
{
|
|
|
|
return snprintf(buf, PAGE_SIZE, "%d\n", val);
|
|
|
|
}
|
|
|
|
|
2020-10-02 17:38:28 +00:00
|
|
|
static int test_dev_config_update_size_t(const char *buf,
|
|
|
|
size_t size,
|
|
|
|
size_t *cfg)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
long new;
|
|
|
|
|
|
|
|
ret = kstrtol(buf, 10, &new);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
*(size_t *)cfg = new;
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
/* Always return full write size even if we didn't consume all */
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t test_dev_config_show_size_t(char *buf, size_t val)
|
|
|
|
{
|
|
|
|
return snprintf(buf, PAGE_SIZE, "%zu\n", val);
|
|
|
|
}
|
|
|
|
|
2020-04-15 00:25:17 +00:00
|
|
|
static ssize_t test_dev_config_show_int(char *buf, int val)
|
2017-07-20 20:13:42 +00:00
|
|
|
{
|
|
|
|
return snprintf(buf, PAGE_SIZE, "%d\n", val);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int test_dev_config_update_u8(const char *buf, size_t size, u8 *cfg)
|
|
|
|
{
|
2020-12-16 04:44:00 +00:00
|
|
|
u8 val;
|
2017-07-20 20:13:42 +00:00
|
|
|
int ret;
|
|
|
|
|
2020-12-16 04:44:00 +00:00
|
|
|
ret = kstrtou8(buf, 10, &val);
|
2017-07-20 20:13:42 +00:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
2020-12-16 04:44:00 +00:00
|
|
|
*(u8 *)cfg = val;
|
2017-07-20 20:13:42 +00:00
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
/* Always return full write size even if we didn't consume all */
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
2020-04-15 00:25:17 +00:00
|
|
|
static ssize_t test_dev_config_show_u8(char *buf, u8 val)
|
2017-07-20 20:13:42 +00:00
|
|
|
{
|
|
|
|
return snprintf(buf, PAGE_SIZE, "%u\n", val);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t config_name_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
return config_test_show_str(buf, test_fw_config->name);
|
|
|
|
}
|
2017-12-19 18:15:07 +00:00
|
|
|
static DEVICE_ATTR_RW(config_name);
|
2017-07-20 20:13:42 +00:00
|
|
|
|
2022-04-21 21:22:02 +00:00
|
|
|
static ssize_t config_upload_name_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
struct test_firmware_upload *tst;
|
|
|
|
int ret = count;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
tst = upload_lookup_name(buf);
|
|
|
|
if (tst)
|
|
|
|
test_fw_config->upload_name = tst->name;
|
|
|
|
else
|
|
|
|
ret = -EINVAL;
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t config_upload_name_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
return config_test_show_str(buf, test_fw_config->upload_name);
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_RW(config_upload_name);
|
|
|
|
|
2017-07-20 20:13:42 +00:00
|
|
|
static ssize_t config_num_requests_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
if (test_fw_config->reqs) {
|
|
|
|
pr_err("Must call release_all_firmware prior to changing config\n");
|
|
|
|
rc = -EINVAL;
|
2018-01-11 11:12:55 +00:00
|
|
|
mutex_unlock(&test_fw_mutex);
|
2017-07-20 20:13:42 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
rc = test_dev_config_update_u8(buf, count,
|
|
|
|
&test_fw_config->num_requests);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t config_num_requests_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
return test_dev_config_show_u8(buf, test_fw_config->num_requests);
|
|
|
|
}
|
2017-12-19 18:15:07 +00:00
|
|
|
static DEVICE_ATTR_RW(config_num_requests);
|
2017-07-20 20:13:42 +00:00
|
|
|
|
2019-08-22 18:40:04 +00:00
|
|
|
static ssize_t config_into_buf_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
return test_dev_config_update_bool(buf,
|
|
|
|
count,
|
|
|
|
&test_fw_config->into_buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t config_into_buf_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
return test_dev_config_show_bool(buf, test_fw_config->into_buf);
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_RW(config_into_buf);
|
|
|
|
|
2020-10-02 17:38:28 +00:00
|
|
|
static ssize_t config_buf_size_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
if (test_fw_config->reqs) {
|
|
|
|
pr_err("Must call release_all_firmware prior to changing config\n");
|
|
|
|
rc = -EINVAL;
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
rc = test_dev_config_update_size_t(buf, count,
|
|
|
|
&test_fw_config->buf_size);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t config_buf_size_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
return test_dev_config_show_size_t(buf, test_fw_config->buf_size);
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_RW(config_buf_size);
|
|
|
|
|
|
|
|
static ssize_t config_file_offset_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
if (test_fw_config->reqs) {
|
|
|
|
pr_err("Must call release_all_firmware prior to changing config\n");
|
|
|
|
rc = -EINVAL;
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
rc = test_dev_config_update_size_t(buf, count,
|
|
|
|
&test_fw_config->file_offset);
|
|
|
|
|
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t config_file_offset_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
return test_dev_config_show_size_t(buf, test_fw_config->file_offset);
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_RW(config_file_offset);
|
|
|
|
|
|
|
|
static ssize_t config_partial_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
return test_dev_config_update_bool(buf,
|
|
|
|
count,
|
|
|
|
&test_fw_config->partial);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t config_partial_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
return test_dev_config_show_bool(buf, test_fw_config->partial);
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_RW(config_partial);
|
|
|
|
|
2017-07-20 20:13:42 +00:00
|
|
|
static ssize_t config_sync_direct_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
int rc = test_dev_config_update_bool(buf, count,
|
|
|
|
&test_fw_config->sync_direct);
|
|
|
|
|
|
|
|
if (rc == count)
|
|
|
|
test_fw_config->req_firmware = test_fw_config->sync_direct ?
|
|
|
|
request_firmware_direct :
|
|
|
|
request_firmware;
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t config_sync_direct_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
return test_dev_config_show_bool(buf, test_fw_config->sync_direct);
|
|
|
|
}
|
2017-12-19 18:15:07 +00:00
|
|
|
static DEVICE_ATTR_RW(config_sync_direct);
|
2017-07-20 20:13:42 +00:00
|
|
|
|
|
|
|
static ssize_t config_send_uevent_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
return test_dev_config_update_bool(buf, count,
|
|
|
|
&test_fw_config->send_uevent);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t config_send_uevent_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
return test_dev_config_show_bool(buf, test_fw_config->send_uevent);
|
|
|
|
}
|
2017-12-19 18:15:07 +00:00
|
|
|
static DEVICE_ATTR_RW(config_send_uevent);
|
2017-07-20 20:13:42 +00:00
|
|
|
|
|
|
|
static ssize_t config_read_fw_idx_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
return test_dev_config_update_u8(buf, count,
|
|
|
|
&test_fw_config->read_fw_idx);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t config_read_fw_idx_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
return test_dev_config_show_u8(buf, test_fw_config->read_fw_idx);
|
|
|
|
}
|
2017-12-19 18:15:07 +00:00
|
|
|
static DEVICE_ATTR_RW(config_read_fw_idx);
|
2017-07-20 20:13:42 +00:00
|
|
|
|
|
|
|
|
2014-07-14 21:38:12 +00:00
|
|
|
static ssize_t trigger_request_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
char *name;
|
|
|
|
|
2015-12-09 22:50:26 +00:00
|
|
|
name = kstrndup(buf, count, GFP_KERNEL);
|
2014-07-14 21:38:12 +00:00
|
|
|
if (!name)
|
|
|
|
return -ENOSPC;
|
|
|
|
|
|
|
|
pr_info("loading '%s'\n", name);
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
release_firmware(test_firmware);
|
|
|
|
test_firmware = NULL;
|
|
|
|
rc = request_firmware(&test_firmware, name, dev);
|
2015-12-09 22:50:25 +00:00
|
|
|
if (rc) {
|
2014-07-14 21:38:12 +00:00
|
|
|
pr_info("load of '%s' failed: %d\n", name, rc);
|
2015-12-09 22:50:25 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
pr_info("loaded: %zu\n", test_firmware->size);
|
|
|
|
rc = count;
|
|
|
|
|
|
|
|
out:
|
2014-07-14 21:38:12 +00:00
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
kfree(name);
|
|
|
|
|
2015-12-09 22:50:25 +00:00
|
|
|
return rc;
|
2014-07-14 21:38:12 +00:00
|
|
|
}
|
|
|
|
static DEVICE_ATTR_WO(trigger_request);
|
|
|
|
|
2020-01-15 16:35:49 +00:00
|
|
|
#ifdef CONFIG_EFI_EMBEDDED_FIRMWARE
|
2020-09-09 22:53:54 +00:00
|
|
|
extern struct list_head efi_embedded_fw_list;
|
|
|
|
extern bool efi_embedded_fw_checked;
|
|
|
|
|
2020-01-15 16:35:49 +00:00
|
|
|
static ssize_t trigger_request_platform_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
static const u8 test_data[] = {
|
|
|
|
0x55, 0xaa, 0x55, 0xaa, 0x01, 0x02, 0x03, 0x04,
|
|
|
|
0x55, 0xaa, 0x55, 0xaa, 0x05, 0x06, 0x07, 0x08,
|
|
|
|
0x55, 0xaa, 0x55, 0xaa, 0x10, 0x20, 0x30, 0x40,
|
|
|
|
0x55, 0xaa, 0x55, 0xaa, 0x50, 0x60, 0x70, 0x80
|
|
|
|
};
|
|
|
|
struct efi_embedded_fw efi_embedded_fw;
|
|
|
|
const struct firmware *firmware = NULL;
|
2020-09-09 22:53:54 +00:00
|
|
|
bool saved_efi_embedded_fw_checked;
|
2020-01-15 16:35:49 +00:00
|
|
|
char *name;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
name = kstrndup(buf, count, GFP_KERNEL);
|
|
|
|
if (!name)
|
|
|
|
return -ENOSPC;
|
|
|
|
|
|
|
|
pr_info("inserting test platform fw '%s'\n", name);
|
|
|
|
efi_embedded_fw.name = name;
|
|
|
|
efi_embedded_fw.data = (void *)test_data;
|
|
|
|
efi_embedded_fw.length = sizeof(test_data);
|
|
|
|
list_add(&efi_embedded_fw.list, &efi_embedded_fw_list);
|
2020-09-09 22:53:54 +00:00
|
|
|
saved_efi_embedded_fw_checked = efi_embedded_fw_checked;
|
|
|
|
efi_embedded_fw_checked = true;
|
2020-01-15 16:35:49 +00:00
|
|
|
|
|
|
|
pr_info("loading '%s'\n", name);
|
|
|
|
rc = firmware_request_platform(&firmware, name, dev);
|
|
|
|
if (rc) {
|
|
|
|
pr_info("load of '%s' failed: %d\n", name, rc);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (firmware->size != sizeof(test_data) ||
|
|
|
|
memcmp(firmware->data, test_data, sizeof(test_data)) != 0) {
|
|
|
|
pr_info("firmware contents mismatch for '%s'\n", name);
|
|
|
|
rc = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
pr_info("loaded: %zu\n", firmware->size);
|
|
|
|
rc = count;
|
|
|
|
|
|
|
|
out:
|
2020-09-09 22:53:54 +00:00
|
|
|
efi_embedded_fw_checked = saved_efi_embedded_fw_checked;
|
2020-01-15 16:35:49 +00:00
|
|
|
release_firmware(firmware);
|
|
|
|
list_del(&efi_embedded_fw.list);
|
|
|
|
kfree(name);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_WO(trigger_request_platform);
|
|
|
|
#endif
|
|
|
|
|
2015-12-09 22:50:27 +00:00
|
|
|
static DECLARE_COMPLETION(async_fw_done);
|
|
|
|
|
|
|
|
static void trigger_async_request_cb(const struct firmware *fw, void *context)
|
|
|
|
{
|
|
|
|
test_firmware = fw;
|
|
|
|
complete(&async_fw_done);
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t trigger_async_request_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
char *name;
|
|
|
|
|
|
|
|
name = kstrndup(buf, count, GFP_KERNEL);
|
|
|
|
if (!name)
|
|
|
|
return -ENOSPC;
|
|
|
|
|
|
|
|
pr_info("loading '%s'\n", name);
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
release_firmware(test_firmware);
|
|
|
|
test_firmware = NULL;
|
|
|
|
rc = request_firmware_nowait(THIS_MODULE, 1, name, dev, GFP_KERNEL,
|
|
|
|
NULL, trigger_async_request_cb);
|
|
|
|
if (rc) {
|
|
|
|
pr_info("async load of '%s' failed: %d\n", name, rc);
|
|
|
|
kfree(name);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* Free 'name' ASAP, to test for race conditions */
|
|
|
|
kfree(name);
|
|
|
|
|
|
|
|
wait_for_completion(&async_fw_done);
|
|
|
|
|
|
|
|
if (test_firmware) {
|
|
|
|
pr_info("loaded: %zu\n", test_firmware->size);
|
|
|
|
rc = count;
|
|
|
|
} else {
|
|
|
|
pr_err("failed to async load firmware\n");
|
2019-08-22 18:40:04 +00:00
|
|
|
rc = -ENOMEM;
|
2015-12-09 22:50:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_WO(trigger_async_request);
|
|
|
|
|
2017-01-23 16:11:10 +00:00
|
|
|
static ssize_t trigger_custom_fallback_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
char *name;
|
|
|
|
|
|
|
|
name = kstrndup(buf, count, GFP_KERNEL);
|
|
|
|
if (!name)
|
|
|
|
return -ENOSPC;
|
|
|
|
|
|
|
|
pr_info("loading '%s' using custom fallback mechanism\n", name);
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
release_firmware(test_firmware);
|
|
|
|
test_firmware = NULL;
|
2021-04-25 02:00:24 +00:00
|
|
|
rc = request_firmware_nowait(THIS_MODULE, FW_ACTION_NOUEVENT, name,
|
2017-01-23 16:11:10 +00:00
|
|
|
dev, GFP_KERNEL, NULL,
|
|
|
|
trigger_async_request_cb);
|
|
|
|
if (rc) {
|
|
|
|
pr_info("async load of '%s' failed: %d\n", name, rc);
|
|
|
|
kfree(name);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* Free 'name' ASAP, to test for race conditions */
|
|
|
|
kfree(name);
|
|
|
|
|
|
|
|
wait_for_completion(&async_fw_done);
|
|
|
|
|
|
|
|
if (test_firmware) {
|
|
|
|
pr_info("loaded: %zu\n", test_firmware->size);
|
|
|
|
rc = count;
|
|
|
|
} else {
|
|
|
|
pr_err("failed to async load firmware\n");
|
|
|
|
rc = -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_WO(trigger_custom_fallback);
|
|
|
|
|
2017-07-20 20:13:42 +00:00
|
|
|
static int test_fw_run_batch_request(void *data)
|
|
|
|
{
|
|
|
|
struct test_batched_req *req = data;
|
|
|
|
|
|
|
|
if (!req) {
|
|
|
|
test_fw_config->test_result = -EINVAL;
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2019-08-22 18:40:04 +00:00
|
|
|
if (test_fw_config->into_buf) {
|
|
|
|
void *test_buf;
|
|
|
|
|
|
|
|
test_buf = kzalloc(TEST_FIRMWARE_BUF_SIZE, GFP_KERNEL);
|
|
|
|
if (!test_buf)
|
|
|
|
return -ENOSPC;
|
|
|
|
|
2020-10-02 17:38:28 +00:00
|
|
|
if (test_fw_config->partial)
|
|
|
|
req->rc = request_partial_firmware_into_buf
|
|
|
|
(&req->fw,
|
|
|
|
req->name,
|
|
|
|
req->dev,
|
|
|
|
test_buf,
|
|
|
|
test_fw_config->buf_size,
|
|
|
|
test_fw_config->file_offset);
|
|
|
|
else
|
|
|
|
req->rc = request_firmware_into_buf
|
|
|
|
(&req->fw,
|
|
|
|
req->name,
|
|
|
|
req->dev,
|
|
|
|
test_buf,
|
|
|
|
test_fw_config->buf_size);
|
2019-08-22 18:40:04 +00:00
|
|
|
if (!req->fw)
|
|
|
|
kfree(test_buf);
|
|
|
|
} else {
|
|
|
|
req->rc = test_fw_config->req_firmware(&req->fw,
|
|
|
|
req->name,
|
|
|
|
req->dev);
|
|
|
|
}
|
|
|
|
|
2017-07-20 20:13:42 +00:00
|
|
|
if (req->rc) {
|
|
|
|
pr_info("#%u: batched sync load failed: %d\n",
|
|
|
|
req->idx, req->rc);
|
|
|
|
if (!test_fw_config->test_result)
|
|
|
|
test_fw_config->test_result = req->rc;
|
|
|
|
} else if (req->fw) {
|
|
|
|
req->sent = true;
|
|
|
|
pr_info("#%u: batched sync loaded %zu\n",
|
|
|
|
req->idx, req->fw->size);
|
|
|
|
}
|
|
|
|
complete(&req->completion);
|
|
|
|
|
|
|
|
req->task = NULL;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We use a kthread as otherwise the kernel serializes all our sync requests
|
|
|
|
* and we would not be able to mimic batched requests on a sync call. Batched
|
|
|
|
* requests on a sync call can for instance happen on a device driver when
|
|
|
|
* multiple cards are used and firmware loading happens outside of probe.
|
|
|
|
*/
|
|
|
|
static ssize_t trigger_batched_requests_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
struct test_batched_req *req;
|
|
|
|
int rc;
|
|
|
|
u8 i;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
|
treewide: Use array_size() in vzalloc()
The vzalloc() function has no 2-factor argument form, so multiplication
factors need to be wrapped in array_size(). This patch replaces cases of:
vzalloc(a * b)
with:
vzalloc(array_size(a, b))
as well as handling cases of:
vzalloc(a * b * c)
with:
vzalloc(array3_size(a, b, c))
This does, however, attempt to ignore constant size factors like:
vzalloc(4 * 1024)
though any constants defined via macros get caught up in the conversion.
Any factors with a sizeof() of "unsigned char", "char", and "u8" were
dropped, since they're redundant.
The Coccinelle script used for this was:
// Fix redundant parens around sizeof().
@@
type TYPE;
expression THING, E;
@@
(
vzalloc(
- (sizeof(TYPE)) * E
+ sizeof(TYPE) * E
, ...)
|
vzalloc(
- (sizeof(THING)) * E
+ sizeof(THING) * E
, ...)
)
// Drop single-byte sizes and redundant parens.
@@
expression COUNT;
typedef u8;
typedef __u8;
@@
(
vzalloc(
- sizeof(u8) * (COUNT)
+ COUNT
, ...)
|
vzalloc(
- sizeof(__u8) * (COUNT)
+ COUNT
, ...)
|
vzalloc(
- sizeof(char) * (COUNT)
+ COUNT
, ...)
|
vzalloc(
- sizeof(unsigned char) * (COUNT)
+ COUNT
, ...)
|
vzalloc(
- sizeof(u8) * COUNT
+ COUNT
, ...)
|
vzalloc(
- sizeof(__u8) * COUNT
+ COUNT
, ...)
|
vzalloc(
- sizeof(char) * COUNT
+ COUNT
, ...)
|
vzalloc(
- sizeof(unsigned char) * COUNT
+ COUNT
, ...)
)
// 2-factor product with sizeof(type/expression) and identifier or constant.
@@
type TYPE;
expression THING;
identifier COUNT_ID;
constant COUNT_CONST;
@@
(
vzalloc(
- sizeof(TYPE) * (COUNT_ID)
+ array_size(COUNT_ID, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(TYPE) * COUNT_ID
+ array_size(COUNT_ID, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(TYPE) * (COUNT_CONST)
+ array_size(COUNT_CONST, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(TYPE) * COUNT_CONST
+ array_size(COUNT_CONST, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(THING) * (COUNT_ID)
+ array_size(COUNT_ID, sizeof(THING))
, ...)
|
vzalloc(
- sizeof(THING) * COUNT_ID
+ array_size(COUNT_ID, sizeof(THING))
, ...)
|
vzalloc(
- sizeof(THING) * (COUNT_CONST)
+ array_size(COUNT_CONST, sizeof(THING))
, ...)
|
vzalloc(
- sizeof(THING) * COUNT_CONST
+ array_size(COUNT_CONST, sizeof(THING))
, ...)
)
// 2-factor product, only identifiers.
@@
identifier SIZE, COUNT;
@@
vzalloc(
- SIZE * COUNT
+ array_size(COUNT, SIZE)
, ...)
// 3-factor product with 1 sizeof(type) or sizeof(expression), with
// redundant parens removed.
@@
expression THING;
identifier STRIDE, COUNT;
type TYPE;
@@
(
vzalloc(
- sizeof(TYPE) * (COUNT) * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(TYPE) * (COUNT) * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(TYPE) * COUNT * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(TYPE) * COUNT * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(THING) * (COUNT) * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
vzalloc(
- sizeof(THING) * (COUNT) * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
vzalloc(
- sizeof(THING) * COUNT * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
vzalloc(
- sizeof(THING) * COUNT * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
)
// 3-factor product with 2 sizeof(variable), with redundant parens removed.
@@
expression THING1, THING2;
identifier COUNT;
type TYPE1, TYPE2;
@@
(
vzalloc(
- sizeof(TYPE1) * sizeof(TYPE2) * COUNT
+ array3_size(COUNT, sizeof(TYPE1), sizeof(TYPE2))
, ...)
|
vzalloc(
- sizeof(TYPE1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(TYPE1), sizeof(TYPE2))
, ...)
|
vzalloc(
- sizeof(THING1) * sizeof(THING2) * COUNT
+ array3_size(COUNT, sizeof(THING1), sizeof(THING2))
, ...)
|
vzalloc(
- sizeof(THING1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(THING1), sizeof(THING2))
, ...)
|
vzalloc(
- sizeof(TYPE1) * sizeof(THING2) * COUNT
+ array3_size(COUNT, sizeof(TYPE1), sizeof(THING2))
, ...)
|
vzalloc(
- sizeof(TYPE1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(TYPE1), sizeof(THING2))
, ...)
)
// 3-factor product, only identifiers, with redundant parens removed.
@@
identifier STRIDE, SIZE, COUNT;
@@
(
vzalloc(
- (COUNT) * STRIDE * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- COUNT * (STRIDE) * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- COUNT * STRIDE * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- (COUNT) * (STRIDE) * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- COUNT * (STRIDE) * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- (COUNT) * STRIDE * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- (COUNT) * (STRIDE) * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- COUNT * STRIDE * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
)
// Any remaining multi-factor products, first at least 3-factor products
// when they're not all constants...
@@
expression E1, E2, E3;
constant C1, C2, C3;
@@
(
vzalloc(C1 * C2 * C3, ...)
|
vzalloc(
- E1 * E2 * E3
+ array3_size(E1, E2, E3)
, ...)
)
// And then all remaining 2 factors products when they're not all constants.
@@
expression E1, E2;
constant C1, C2;
@@
(
vzalloc(C1 * C2, ...)
|
vzalloc(
- E1 * E2
+ array_size(E1, E2)
, ...)
)
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-06-12 21:27:37 +00:00
|
|
|
test_fw_config->reqs =
|
|
|
|
vzalloc(array3_size(sizeof(struct test_batched_req),
|
|
|
|
test_fw_config->num_requests, 2));
|
2017-07-20 20:13:42 +00:00
|
|
|
if (!test_fw_config->reqs) {
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto out_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
pr_info("batched sync firmware loading '%s' %u times\n",
|
|
|
|
test_fw_config->name, test_fw_config->num_requests);
|
|
|
|
|
|
|
|
for (i = 0; i < test_fw_config->num_requests; i++) {
|
|
|
|
req = &test_fw_config->reqs[i];
|
|
|
|
req->fw = NULL;
|
|
|
|
req->idx = i;
|
|
|
|
req->name = test_fw_config->name;
|
|
|
|
req->dev = dev;
|
|
|
|
init_completion(&req->completion);
|
|
|
|
req->task = kthread_run(test_fw_run_batch_request, req,
|
|
|
|
"%s-%u", KBUILD_MODNAME, req->idx);
|
|
|
|
if (!req->task || IS_ERR(req->task)) {
|
|
|
|
pr_err("Setting up thread %u failed\n", req->idx);
|
|
|
|
req->task = NULL;
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto out_bail;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = count;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We require an explicit release to enable more time and delay of
|
|
|
|
* calling release_firmware() to improve our chances of forcing a
|
|
|
|
* batched request. If we instead called release_firmware() right away
|
|
|
|
* then we might miss on an opportunity of having a successful firmware
|
|
|
|
* request pass on the opportunity to be come a batched request.
|
|
|
|
*/
|
|
|
|
|
|
|
|
out_bail:
|
|
|
|
for (i = 0; i < test_fw_config->num_requests; i++) {
|
|
|
|
req = &test_fw_config->reqs[i];
|
|
|
|
if (req->task || req->sent)
|
|
|
|
wait_for_completion(&req->completion);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Override any worker error if we had a general setup error */
|
|
|
|
if (rc < 0)
|
|
|
|
test_fw_config->test_result = rc;
|
|
|
|
|
|
|
|
out_unlock:
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_WO(trigger_batched_requests);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We wait for each callback to return with the lock held, no need to lock here
|
|
|
|
*/
|
|
|
|
static void trigger_batched_cb(const struct firmware *fw, void *context)
|
|
|
|
{
|
|
|
|
struct test_batched_req *req = context;
|
|
|
|
|
|
|
|
if (!req) {
|
|
|
|
test_fw_config->test_result = -EINVAL;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* forces *some* batched requests to queue up */
|
|
|
|
if (!req->idx)
|
|
|
|
ssleep(2);
|
|
|
|
|
|
|
|
req->fw = fw;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Unfortunately the firmware API gives us nothing other than a null FW
|
|
|
|
* if the firmware was not found on async requests. Best we can do is
|
|
|
|
* just assume -ENOENT. A better API would pass the actual return
|
|
|
|
* value to the callback.
|
|
|
|
*/
|
|
|
|
if (!fw && !test_fw_config->test_result)
|
|
|
|
test_fw_config->test_result = -ENOENT;
|
|
|
|
|
|
|
|
complete(&req->completion);
|
|
|
|
}
|
|
|
|
|
|
|
|
static
|
|
|
|
ssize_t trigger_batched_requests_async_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
struct test_batched_req *req;
|
|
|
|
bool send_uevent;
|
|
|
|
int rc;
|
|
|
|
u8 i;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
|
treewide: Use array_size() in vzalloc()
The vzalloc() function has no 2-factor argument form, so multiplication
factors need to be wrapped in array_size(). This patch replaces cases of:
vzalloc(a * b)
with:
vzalloc(array_size(a, b))
as well as handling cases of:
vzalloc(a * b * c)
with:
vzalloc(array3_size(a, b, c))
This does, however, attempt to ignore constant size factors like:
vzalloc(4 * 1024)
though any constants defined via macros get caught up in the conversion.
Any factors with a sizeof() of "unsigned char", "char", and "u8" were
dropped, since they're redundant.
The Coccinelle script used for this was:
// Fix redundant parens around sizeof().
@@
type TYPE;
expression THING, E;
@@
(
vzalloc(
- (sizeof(TYPE)) * E
+ sizeof(TYPE) * E
, ...)
|
vzalloc(
- (sizeof(THING)) * E
+ sizeof(THING) * E
, ...)
)
// Drop single-byte sizes and redundant parens.
@@
expression COUNT;
typedef u8;
typedef __u8;
@@
(
vzalloc(
- sizeof(u8) * (COUNT)
+ COUNT
, ...)
|
vzalloc(
- sizeof(__u8) * (COUNT)
+ COUNT
, ...)
|
vzalloc(
- sizeof(char) * (COUNT)
+ COUNT
, ...)
|
vzalloc(
- sizeof(unsigned char) * (COUNT)
+ COUNT
, ...)
|
vzalloc(
- sizeof(u8) * COUNT
+ COUNT
, ...)
|
vzalloc(
- sizeof(__u8) * COUNT
+ COUNT
, ...)
|
vzalloc(
- sizeof(char) * COUNT
+ COUNT
, ...)
|
vzalloc(
- sizeof(unsigned char) * COUNT
+ COUNT
, ...)
)
// 2-factor product with sizeof(type/expression) and identifier or constant.
@@
type TYPE;
expression THING;
identifier COUNT_ID;
constant COUNT_CONST;
@@
(
vzalloc(
- sizeof(TYPE) * (COUNT_ID)
+ array_size(COUNT_ID, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(TYPE) * COUNT_ID
+ array_size(COUNT_ID, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(TYPE) * (COUNT_CONST)
+ array_size(COUNT_CONST, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(TYPE) * COUNT_CONST
+ array_size(COUNT_CONST, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(THING) * (COUNT_ID)
+ array_size(COUNT_ID, sizeof(THING))
, ...)
|
vzalloc(
- sizeof(THING) * COUNT_ID
+ array_size(COUNT_ID, sizeof(THING))
, ...)
|
vzalloc(
- sizeof(THING) * (COUNT_CONST)
+ array_size(COUNT_CONST, sizeof(THING))
, ...)
|
vzalloc(
- sizeof(THING) * COUNT_CONST
+ array_size(COUNT_CONST, sizeof(THING))
, ...)
)
// 2-factor product, only identifiers.
@@
identifier SIZE, COUNT;
@@
vzalloc(
- SIZE * COUNT
+ array_size(COUNT, SIZE)
, ...)
// 3-factor product with 1 sizeof(type) or sizeof(expression), with
// redundant parens removed.
@@
expression THING;
identifier STRIDE, COUNT;
type TYPE;
@@
(
vzalloc(
- sizeof(TYPE) * (COUNT) * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(TYPE) * (COUNT) * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(TYPE) * COUNT * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(TYPE) * COUNT * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
vzalloc(
- sizeof(THING) * (COUNT) * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
vzalloc(
- sizeof(THING) * (COUNT) * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
vzalloc(
- sizeof(THING) * COUNT * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
vzalloc(
- sizeof(THING) * COUNT * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
)
// 3-factor product with 2 sizeof(variable), with redundant parens removed.
@@
expression THING1, THING2;
identifier COUNT;
type TYPE1, TYPE2;
@@
(
vzalloc(
- sizeof(TYPE1) * sizeof(TYPE2) * COUNT
+ array3_size(COUNT, sizeof(TYPE1), sizeof(TYPE2))
, ...)
|
vzalloc(
- sizeof(TYPE1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(TYPE1), sizeof(TYPE2))
, ...)
|
vzalloc(
- sizeof(THING1) * sizeof(THING2) * COUNT
+ array3_size(COUNT, sizeof(THING1), sizeof(THING2))
, ...)
|
vzalloc(
- sizeof(THING1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(THING1), sizeof(THING2))
, ...)
|
vzalloc(
- sizeof(TYPE1) * sizeof(THING2) * COUNT
+ array3_size(COUNT, sizeof(TYPE1), sizeof(THING2))
, ...)
|
vzalloc(
- sizeof(TYPE1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(TYPE1), sizeof(THING2))
, ...)
)
// 3-factor product, only identifiers, with redundant parens removed.
@@
identifier STRIDE, SIZE, COUNT;
@@
(
vzalloc(
- (COUNT) * STRIDE * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- COUNT * (STRIDE) * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- COUNT * STRIDE * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- (COUNT) * (STRIDE) * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- COUNT * (STRIDE) * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- (COUNT) * STRIDE * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- (COUNT) * (STRIDE) * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
vzalloc(
- COUNT * STRIDE * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
)
// Any remaining multi-factor products, first at least 3-factor products
// when they're not all constants...
@@
expression E1, E2, E3;
constant C1, C2, C3;
@@
(
vzalloc(C1 * C2 * C3, ...)
|
vzalloc(
- E1 * E2 * E3
+ array3_size(E1, E2, E3)
, ...)
)
// And then all remaining 2 factors products when they're not all constants.
@@
expression E1, E2;
constant C1, C2;
@@
(
vzalloc(C1 * C2, ...)
|
vzalloc(
- E1 * E2
+ array_size(E1, E2)
, ...)
)
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-06-12 21:27:37 +00:00
|
|
|
test_fw_config->reqs =
|
|
|
|
vzalloc(array3_size(sizeof(struct test_batched_req),
|
|
|
|
test_fw_config->num_requests, 2));
|
2017-07-20 20:13:42 +00:00
|
|
|
if (!test_fw_config->reqs) {
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
pr_info("batched loading '%s' custom fallback mechanism %u times\n",
|
|
|
|
test_fw_config->name, test_fw_config->num_requests);
|
|
|
|
|
2021-04-25 02:00:24 +00:00
|
|
|
send_uevent = test_fw_config->send_uevent ? FW_ACTION_UEVENT :
|
|
|
|
FW_ACTION_NOUEVENT;
|
2017-07-20 20:13:42 +00:00
|
|
|
|
|
|
|
for (i = 0; i < test_fw_config->num_requests; i++) {
|
|
|
|
req = &test_fw_config->reqs[i];
|
|
|
|
req->name = test_fw_config->name;
|
|
|
|
req->fw = NULL;
|
|
|
|
req->idx = i;
|
|
|
|
init_completion(&req->completion);
|
|
|
|
rc = request_firmware_nowait(THIS_MODULE, send_uevent,
|
|
|
|
req->name,
|
|
|
|
dev, GFP_KERNEL, req,
|
|
|
|
trigger_batched_cb);
|
|
|
|
if (rc) {
|
|
|
|
pr_info("#%u: batched async load failed setup: %d\n",
|
|
|
|
i, rc);
|
|
|
|
req->rc = rc;
|
|
|
|
goto out_bail;
|
|
|
|
} else
|
|
|
|
req->sent = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = count;
|
|
|
|
|
|
|
|
out_bail:
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We require an explicit release to enable more time and delay of
|
|
|
|
* calling release_firmware() to improve our chances of forcing a
|
|
|
|
* batched request. If we instead called release_firmware() right away
|
|
|
|
* then we might miss on an opportunity of having a successful firmware
|
|
|
|
* request pass on the opportunity to be come a batched request.
|
|
|
|
*/
|
|
|
|
|
|
|
|
for (i = 0; i < test_fw_config->num_requests; i++) {
|
|
|
|
req = &test_fw_config->reqs[i];
|
|
|
|
if (req->sent)
|
|
|
|
wait_for_completion(&req->completion);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Override any worker error if we had a general setup error */
|
|
|
|
if (rc < 0)
|
|
|
|
test_fw_config->test_result = rc;
|
|
|
|
|
|
|
|
out:
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_WO(trigger_batched_requests_async);
|
|
|
|
|
2022-04-21 21:22:02 +00:00
|
|
|
static void upload_release(struct test_firmware_upload *tst)
|
|
|
|
{
|
|
|
|
firmware_upload_unregister(tst->fwl);
|
|
|
|
kfree(tst->buf);
|
|
|
|
kfree(tst->name);
|
|
|
|
kfree(tst);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void upload_release_all(void)
|
|
|
|
{
|
|
|
|
struct test_firmware_upload *tst, *tmp;
|
|
|
|
|
|
|
|
list_for_each_entry_safe(tst, tmp, &test_upload_list, node) {
|
|
|
|
list_del(&tst->node);
|
|
|
|
upload_release(tst);
|
|
|
|
}
|
|
|
|
test_fw_config->upload_name = NULL;
|
|
|
|
}
|
|
|
|
|
test_firmware: Error injection for firmware upload
Add error injection capability to the test_firmware module specifically
for firmware upload testing. Error injection instructions are transferred
as the first part of the firmware payload. The format of an error
injection string is similar to the error strings that may be read from
the error sysfs node.
To inject the error "programming:hw-error", one would use the error
injection string "inject:programming:hw-error" as the firmware payload:
$ echo 1 > loading
$ echo inject:programming:hw-error > data
$ echo 0 > loading
$ cat status
idle
$ cat error
programming:hw-error
The first part of the error string is the progress state of the upload at
the time of the error. The progress state would be one of the following:
"preparing", "transferring", or "programming". The second part of the
error string is one of the following: "hw-error", "timeout", "device-busy",
"invalid-file-size", "read-write-error", "flash-wearout", and "user-abort".
Note that all of the error strings except "user-abort" will fail without
delay. The "user-abort" error will cause the firmware upload to stall at
the requested progress state for up to 5 minutes to allow you to echo 1
to the cancel sysfs node. It is this cancellation that causes the
'user-abort" error. If the upload is not cancelled within the 5 minute
time period, then the upload will complete without an error.
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Reviewed-by: Tianfei zhang <tianfei.zhang@intel.com>
Tested-by: Matthew Gerlach <matthew.gerlach@linux.intel.com>
Signed-off-by: Russ Weight <russell.h.weight@intel.com>
Link: https://lore.kernel.org/r/20220421212204.36052-8-russell.h.weight@intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-04-21 21:22:03 +00:00
|
|
|
/*
|
|
|
|
* This table is replicated from .../firmware_loader/sysfs_upload.c
|
|
|
|
* and needs to be kept in sync.
|
|
|
|
*/
|
|
|
|
static const char * const fw_upload_err_str[] = {
|
|
|
|
[FW_UPLOAD_ERR_NONE] = "none",
|
|
|
|
[FW_UPLOAD_ERR_HW_ERROR] = "hw-error",
|
|
|
|
[FW_UPLOAD_ERR_TIMEOUT] = "timeout",
|
|
|
|
[FW_UPLOAD_ERR_CANCELED] = "user-abort",
|
|
|
|
[FW_UPLOAD_ERR_BUSY] = "device-busy",
|
|
|
|
[FW_UPLOAD_ERR_INVALID_SIZE] = "invalid-file-size",
|
|
|
|
[FW_UPLOAD_ERR_RW_ERROR] = "read-write-error",
|
|
|
|
[FW_UPLOAD_ERR_WEAROUT] = "flash-wearout",
|
|
|
|
};
|
|
|
|
|
|
|
|
static void upload_err_inject_error(struct test_firmware_upload *tst,
|
|
|
|
const u8 *p, const char *prog)
|
|
|
|
{
|
|
|
|
enum fw_upload_err err;
|
|
|
|
|
|
|
|
for (err = FW_UPLOAD_ERR_NONE + 1; err < FW_UPLOAD_ERR_MAX; err++) {
|
|
|
|
if (strncmp(p, fw_upload_err_str[err],
|
|
|
|
strlen(fw_upload_err_str[err])) == 0) {
|
|
|
|
tst->inject.prog = prog;
|
|
|
|
tst->inject.err_code = err;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void upload_err_inject_prog(struct test_firmware_upload *tst,
|
|
|
|
const u8 *p)
|
|
|
|
{
|
|
|
|
static const char * const progs[] = {
|
|
|
|
"preparing:", "transferring:", "programming:"
|
|
|
|
};
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(progs); i++) {
|
|
|
|
if (strncmp(p, progs[i], strlen(progs[i])) == 0) {
|
|
|
|
upload_err_inject_error(tst, p + strlen(progs[i]),
|
|
|
|
progs[i]);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#define FIVE_MINUTES_MS (5 * 60 * 1000)
|
|
|
|
static enum fw_upload_err
|
|
|
|
fw_upload_wait_on_cancel(struct test_firmware_upload *tst)
|
|
|
|
{
|
|
|
|
int ms_delay;
|
|
|
|
|
|
|
|
for (ms_delay = 0; ms_delay < FIVE_MINUTES_MS; ms_delay += 100) {
|
|
|
|
msleep(100);
|
|
|
|
if (tst->cancel_request)
|
|
|
|
return FW_UPLOAD_ERR_CANCELED;
|
|
|
|
}
|
|
|
|
return FW_UPLOAD_ERR_NONE;
|
|
|
|
}
|
|
|
|
|
2022-04-21 21:22:02 +00:00
|
|
|
static enum fw_upload_err test_fw_upload_prepare(struct fw_upload *fwl,
|
|
|
|
const u8 *data, u32 size)
|
|
|
|
{
|
|
|
|
struct test_firmware_upload *tst = fwl->dd_handle;
|
test_firmware: Error injection for firmware upload
Add error injection capability to the test_firmware module specifically
for firmware upload testing. Error injection instructions are transferred
as the first part of the firmware payload. The format of an error
injection string is similar to the error strings that may be read from
the error sysfs node.
To inject the error "programming:hw-error", one would use the error
injection string "inject:programming:hw-error" as the firmware payload:
$ echo 1 > loading
$ echo inject:programming:hw-error > data
$ echo 0 > loading
$ cat status
idle
$ cat error
programming:hw-error
The first part of the error string is the progress state of the upload at
the time of the error. The progress state would be one of the following:
"preparing", "transferring", or "programming". The second part of the
error string is one of the following: "hw-error", "timeout", "device-busy",
"invalid-file-size", "read-write-error", "flash-wearout", and "user-abort".
Note that all of the error strings except "user-abort" will fail without
delay. The "user-abort" error will cause the firmware upload to stall at
the requested progress state for up to 5 minutes to allow you to echo 1
to the cancel sysfs node. It is this cancellation that causes the
'user-abort" error. If the upload is not cancelled within the 5 minute
time period, then the upload will complete without an error.
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Reviewed-by: Tianfei zhang <tianfei.zhang@intel.com>
Tested-by: Matthew Gerlach <matthew.gerlach@linux.intel.com>
Signed-off-by: Russ Weight <russell.h.weight@intel.com>
Link: https://lore.kernel.org/r/20220421212204.36052-8-russell.h.weight@intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-04-21 21:22:03 +00:00
|
|
|
enum fw_upload_err ret = FW_UPLOAD_ERR_NONE;
|
|
|
|
const char *progress = "preparing:";
|
2022-04-21 21:22:02 +00:00
|
|
|
|
|
|
|
tst->cancel_request = false;
|
|
|
|
|
test_firmware: Error injection for firmware upload
Add error injection capability to the test_firmware module specifically
for firmware upload testing. Error injection instructions are transferred
as the first part of the firmware payload. The format of an error
injection string is similar to the error strings that may be read from
the error sysfs node.
To inject the error "programming:hw-error", one would use the error
injection string "inject:programming:hw-error" as the firmware payload:
$ echo 1 > loading
$ echo inject:programming:hw-error > data
$ echo 0 > loading
$ cat status
idle
$ cat error
programming:hw-error
The first part of the error string is the progress state of the upload at
the time of the error. The progress state would be one of the following:
"preparing", "transferring", or "programming". The second part of the
error string is one of the following: "hw-error", "timeout", "device-busy",
"invalid-file-size", "read-write-error", "flash-wearout", and "user-abort".
Note that all of the error strings except "user-abort" will fail without
delay. The "user-abort" error will cause the firmware upload to stall at
the requested progress state for up to 5 minutes to allow you to echo 1
to the cancel sysfs node. It is this cancellation that causes the
'user-abort" error. If the upload is not cancelled within the 5 minute
time period, then the upload will complete without an error.
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Reviewed-by: Tianfei zhang <tianfei.zhang@intel.com>
Tested-by: Matthew Gerlach <matthew.gerlach@linux.intel.com>
Signed-off-by: Russ Weight <russell.h.weight@intel.com>
Link: https://lore.kernel.org/r/20220421212204.36052-8-russell.h.weight@intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-04-21 21:22:03 +00:00
|
|
|
if (!size || size > TEST_UPLOAD_MAX_SIZE) {
|
|
|
|
ret = FW_UPLOAD_ERR_INVALID_SIZE;
|
|
|
|
goto err_out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (strncmp(data, "inject:", strlen("inject:")) == 0)
|
|
|
|
upload_err_inject_prog(tst, data + strlen("inject:"));
|
2022-04-21 21:22:02 +00:00
|
|
|
|
|
|
|
memset(tst->buf, 0, TEST_UPLOAD_MAX_SIZE);
|
|
|
|
tst->size = size;
|
|
|
|
|
test_firmware: Error injection for firmware upload
Add error injection capability to the test_firmware module specifically
for firmware upload testing. Error injection instructions are transferred
as the first part of the firmware payload. The format of an error
injection string is similar to the error strings that may be read from
the error sysfs node.
To inject the error "programming:hw-error", one would use the error
injection string "inject:programming:hw-error" as the firmware payload:
$ echo 1 > loading
$ echo inject:programming:hw-error > data
$ echo 0 > loading
$ cat status
idle
$ cat error
programming:hw-error
The first part of the error string is the progress state of the upload at
the time of the error. The progress state would be one of the following:
"preparing", "transferring", or "programming". The second part of the
error string is one of the following: "hw-error", "timeout", "device-busy",
"invalid-file-size", "read-write-error", "flash-wearout", and "user-abort".
Note that all of the error strings except "user-abort" will fail without
delay. The "user-abort" error will cause the firmware upload to stall at
the requested progress state for up to 5 minutes to allow you to echo 1
to the cancel sysfs node. It is this cancellation that causes the
'user-abort" error. If the upload is not cancelled within the 5 minute
time period, then the upload will complete without an error.
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Reviewed-by: Tianfei zhang <tianfei.zhang@intel.com>
Tested-by: Matthew Gerlach <matthew.gerlach@linux.intel.com>
Signed-off-by: Russ Weight <russell.h.weight@intel.com>
Link: https://lore.kernel.org/r/20220421212204.36052-8-russell.h.weight@intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-04-21 21:22:03 +00:00
|
|
|
if (tst->inject.err_code == FW_UPLOAD_ERR_NONE ||
|
|
|
|
strncmp(tst->inject.prog, progress, strlen(progress)) != 0)
|
|
|
|
return FW_UPLOAD_ERR_NONE;
|
|
|
|
|
|
|
|
if (tst->inject.err_code == FW_UPLOAD_ERR_CANCELED)
|
|
|
|
ret = fw_upload_wait_on_cancel(tst);
|
|
|
|
else
|
|
|
|
ret = tst->inject.err_code;
|
|
|
|
|
|
|
|
err_out:
|
|
|
|
/*
|
|
|
|
* The cleanup op only executes if the prepare op succeeds.
|
|
|
|
* If the prepare op fails, it must do it's own clean-up.
|
|
|
|
*/
|
|
|
|
tst->inject.err_code = FW_UPLOAD_ERR_NONE;
|
|
|
|
tst->inject.prog = NULL;
|
|
|
|
|
|
|
|
return ret;
|
2022-04-21 21:22:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static enum fw_upload_err test_fw_upload_write(struct fw_upload *fwl,
|
|
|
|
const u8 *data, u32 offset,
|
|
|
|
u32 size, u32 *written)
|
|
|
|
{
|
|
|
|
struct test_firmware_upload *tst = fwl->dd_handle;
|
test_firmware: Error injection for firmware upload
Add error injection capability to the test_firmware module specifically
for firmware upload testing. Error injection instructions are transferred
as the first part of the firmware payload. The format of an error
injection string is similar to the error strings that may be read from
the error sysfs node.
To inject the error "programming:hw-error", one would use the error
injection string "inject:programming:hw-error" as the firmware payload:
$ echo 1 > loading
$ echo inject:programming:hw-error > data
$ echo 0 > loading
$ cat status
idle
$ cat error
programming:hw-error
The first part of the error string is the progress state of the upload at
the time of the error. The progress state would be one of the following:
"preparing", "transferring", or "programming". The second part of the
error string is one of the following: "hw-error", "timeout", "device-busy",
"invalid-file-size", "read-write-error", "flash-wearout", and "user-abort".
Note that all of the error strings except "user-abort" will fail without
delay. The "user-abort" error will cause the firmware upload to stall at
the requested progress state for up to 5 minutes to allow you to echo 1
to the cancel sysfs node. It is this cancellation that causes the
'user-abort" error. If the upload is not cancelled within the 5 minute
time period, then the upload will complete without an error.
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Reviewed-by: Tianfei zhang <tianfei.zhang@intel.com>
Tested-by: Matthew Gerlach <matthew.gerlach@linux.intel.com>
Signed-off-by: Russ Weight <russell.h.weight@intel.com>
Link: https://lore.kernel.org/r/20220421212204.36052-8-russell.h.weight@intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-04-21 21:22:03 +00:00
|
|
|
const char *progress = "transferring:";
|
2022-04-21 21:22:02 +00:00
|
|
|
u32 blk_size;
|
|
|
|
|
|
|
|
if (tst->cancel_request)
|
|
|
|
return FW_UPLOAD_ERR_CANCELED;
|
|
|
|
|
|
|
|
blk_size = min_t(u32, TEST_UPLOAD_BLK_SIZE, size);
|
|
|
|
memcpy(tst->buf + offset, data + offset, blk_size);
|
|
|
|
|
|
|
|
*written = blk_size;
|
test_firmware: Error injection for firmware upload
Add error injection capability to the test_firmware module specifically
for firmware upload testing. Error injection instructions are transferred
as the first part of the firmware payload. The format of an error
injection string is similar to the error strings that may be read from
the error sysfs node.
To inject the error "programming:hw-error", one would use the error
injection string "inject:programming:hw-error" as the firmware payload:
$ echo 1 > loading
$ echo inject:programming:hw-error > data
$ echo 0 > loading
$ cat status
idle
$ cat error
programming:hw-error
The first part of the error string is the progress state of the upload at
the time of the error. The progress state would be one of the following:
"preparing", "transferring", or "programming". The second part of the
error string is one of the following: "hw-error", "timeout", "device-busy",
"invalid-file-size", "read-write-error", "flash-wearout", and "user-abort".
Note that all of the error strings except "user-abort" will fail without
delay. The "user-abort" error will cause the firmware upload to stall at
the requested progress state for up to 5 minutes to allow you to echo 1
to the cancel sysfs node. It is this cancellation that causes the
'user-abort" error. If the upload is not cancelled within the 5 minute
time period, then the upload will complete without an error.
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Reviewed-by: Tianfei zhang <tianfei.zhang@intel.com>
Tested-by: Matthew Gerlach <matthew.gerlach@linux.intel.com>
Signed-off-by: Russ Weight <russell.h.weight@intel.com>
Link: https://lore.kernel.org/r/20220421212204.36052-8-russell.h.weight@intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-04-21 21:22:03 +00:00
|
|
|
|
|
|
|
if (tst->inject.err_code == FW_UPLOAD_ERR_NONE ||
|
|
|
|
strncmp(tst->inject.prog, progress, strlen(progress)) != 0)
|
|
|
|
return FW_UPLOAD_ERR_NONE;
|
|
|
|
|
|
|
|
if (tst->inject.err_code == FW_UPLOAD_ERR_CANCELED)
|
|
|
|
return fw_upload_wait_on_cancel(tst);
|
|
|
|
|
|
|
|
return tst->inject.err_code;
|
2022-04-21 21:22:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static enum fw_upload_err test_fw_upload_complete(struct fw_upload *fwl)
|
|
|
|
{
|
|
|
|
struct test_firmware_upload *tst = fwl->dd_handle;
|
test_firmware: Error injection for firmware upload
Add error injection capability to the test_firmware module specifically
for firmware upload testing. Error injection instructions are transferred
as the first part of the firmware payload. The format of an error
injection string is similar to the error strings that may be read from
the error sysfs node.
To inject the error "programming:hw-error", one would use the error
injection string "inject:programming:hw-error" as the firmware payload:
$ echo 1 > loading
$ echo inject:programming:hw-error > data
$ echo 0 > loading
$ cat status
idle
$ cat error
programming:hw-error
The first part of the error string is the progress state of the upload at
the time of the error. The progress state would be one of the following:
"preparing", "transferring", or "programming". The second part of the
error string is one of the following: "hw-error", "timeout", "device-busy",
"invalid-file-size", "read-write-error", "flash-wearout", and "user-abort".
Note that all of the error strings except "user-abort" will fail without
delay. The "user-abort" error will cause the firmware upload to stall at
the requested progress state for up to 5 minutes to allow you to echo 1
to the cancel sysfs node. It is this cancellation that causes the
'user-abort" error. If the upload is not cancelled within the 5 minute
time period, then the upload will complete without an error.
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Reviewed-by: Tianfei zhang <tianfei.zhang@intel.com>
Tested-by: Matthew Gerlach <matthew.gerlach@linux.intel.com>
Signed-off-by: Russ Weight <russell.h.weight@intel.com>
Link: https://lore.kernel.org/r/20220421212204.36052-8-russell.h.weight@intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-04-21 21:22:03 +00:00
|
|
|
const char *progress = "programming:";
|
2022-04-21 21:22:02 +00:00
|
|
|
|
|
|
|
if (tst->cancel_request)
|
|
|
|
return FW_UPLOAD_ERR_CANCELED;
|
|
|
|
|
test_firmware: Error injection for firmware upload
Add error injection capability to the test_firmware module specifically
for firmware upload testing. Error injection instructions are transferred
as the first part of the firmware payload. The format of an error
injection string is similar to the error strings that may be read from
the error sysfs node.
To inject the error "programming:hw-error", one would use the error
injection string "inject:programming:hw-error" as the firmware payload:
$ echo 1 > loading
$ echo inject:programming:hw-error > data
$ echo 0 > loading
$ cat status
idle
$ cat error
programming:hw-error
The first part of the error string is the progress state of the upload at
the time of the error. The progress state would be one of the following:
"preparing", "transferring", or "programming". The second part of the
error string is one of the following: "hw-error", "timeout", "device-busy",
"invalid-file-size", "read-write-error", "flash-wearout", and "user-abort".
Note that all of the error strings except "user-abort" will fail without
delay. The "user-abort" error will cause the firmware upload to stall at
the requested progress state for up to 5 minutes to allow you to echo 1
to the cancel sysfs node. It is this cancellation that causes the
'user-abort" error. If the upload is not cancelled within the 5 minute
time period, then the upload will complete without an error.
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Reviewed-by: Tianfei zhang <tianfei.zhang@intel.com>
Tested-by: Matthew Gerlach <matthew.gerlach@linux.intel.com>
Signed-off-by: Russ Weight <russell.h.weight@intel.com>
Link: https://lore.kernel.org/r/20220421212204.36052-8-russell.h.weight@intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-04-21 21:22:03 +00:00
|
|
|
if (tst->inject.err_code == FW_UPLOAD_ERR_NONE ||
|
|
|
|
strncmp(tst->inject.prog, progress, strlen(progress)) != 0)
|
|
|
|
return FW_UPLOAD_ERR_NONE;
|
|
|
|
|
|
|
|
if (tst->inject.err_code == FW_UPLOAD_ERR_CANCELED)
|
|
|
|
return fw_upload_wait_on_cancel(tst);
|
|
|
|
|
|
|
|
return tst->inject.err_code;
|
2022-04-21 21:22:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void test_fw_upload_cancel(struct fw_upload *fwl)
|
|
|
|
{
|
|
|
|
struct test_firmware_upload *tst = fwl->dd_handle;
|
|
|
|
|
|
|
|
tst->cancel_request = true;
|
|
|
|
}
|
|
|
|
|
test_firmware: Error injection for firmware upload
Add error injection capability to the test_firmware module specifically
for firmware upload testing. Error injection instructions are transferred
as the first part of the firmware payload. The format of an error
injection string is similar to the error strings that may be read from
the error sysfs node.
To inject the error "programming:hw-error", one would use the error
injection string "inject:programming:hw-error" as the firmware payload:
$ echo 1 > loading
$ echo inject:programming:hw-error > data
$ echo 0 > loading
$ cat status
idle
$ cat error
programming:hw-error
The first part of the error string is the progress state of the upload at
the time of the error. The progress state would be one of the following:
"preparing", "transferring", or "programming". The second part of the
error string is one of the following: "hw-error", "timeout", "device-busy",
"invalid-file-size", "read-write-error", "flash-wearout", and "user-abort".
Note that all of the error strings except "user-abort" will fail without
delay. The "user-abort" error will cause the firmware upload to stall at
the requested progress state for up to 5 minutes to allow you to echo 1
to the cancel sysfs node. It is this cancellation that causes the
'user-abort" error. If the upload is not cancelled within the 5 minute
time period, then the upload will complete without an error.
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Reviewed-by: Tianfei zhang <tianfei.zhang@intel.com>
Tested-by: Matthew Gerlach <matthew.gerlach@linux.intel.com>
Signed-off-by: Russ Weight <russell.h.weight@intel.com>
Link: https://lore.kernel.org/r/20220421212204.36052-8-russell.h.weight@intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-04-21 21:22:03 +00:00
|
|
|
static void test_fw_cleanup(struct fw_upload *fwl)
|
|
|
|
{
|
|
|
|
struct test_firmware_upload *tst = fwl->dd_handle;
|
|
|
|
|
|
|
|
tst->inject.err_code = FW_UPLOAD_ERR_NONE;
|
|
|
|
tst->inject.prog = NULL;
|
|
|
|
}
|
|
|
|
|
2022-04-21 21:22:02 +00:00
|
|
|
static const struct fw_upload_ops upload_test_ops = {
|
|
|
|
.prepare = test_fw_upload_prepare,
|
|
|
|
.write = test_fw_upload_write,
|
|
|
|
.poll_complete = test_fw_upload_complete,
|
|
|
|
.cancel = test_fw_upload_cancel,
|
test_firmware: Error injection for firmware upload
Add error injection capability to the test_firmware module specifically
for firmware upload testing. Error injection instructions are transferred
as the first part of the firmware payload. The format of an error
injection string is similar to the error strings that may be read from
the error sysfs node.
To inject the error "programming:hw-error", one would use the error
injection string "inject:programming:hw-error" as the firmware payload:
$ echo 1 > loading
$ echo inject:programming:hw-error > data
$ echo 0 > loading
$ cat status
idle
$ cat error
programming:hw-error
The first part of the error string is the progress state of the upload at
the time of the error. The progress state would be one of the following:
"preparing", "transferring", or "programming". The second part of the
error string is one of the following: "hw-error", "timeout", "device-busy",
"invalid-file-size", "read-write-error", "flash-wearout", and "user-abort".
Note that all of the error strings except "user-abort" will fail without
delay. The "user-abort" error will cause the firmware upload to stall at
the requested progress state for up to 5 minutes to allow you to echo 1
to the cancel sysfs node. It is this cancellation that causes the
'user-abort" error. If the upload is not cancelled within the 5 minute
time period, then the upload will complete without an error.
Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
Reviewed-by: Tianfei zhang <tianfei.zhang@intel.com>
Tested-by: Matthew Gerlach <matthew.gerlach@linux.intel.com>
Signed-off-by: Russ Weight <russell.h.weight@intel.com>
Link: https://lore.kernel.org/r/20220421212204.36052-8-russell.h.weight@intel.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-04-21 21:22:03 +00:00
|
|
|
.cleanup = test_fw_cleanup
|
2022-04-21 21:22:02 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static ssize_t upload_register_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
struct test_firmware_upload *tst;
|
|
|
|
struct fw_upload *fwl;
|
|
|
|
char *name;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
name = kstrndup(buf, count, GFP_KERNEL);
|
|
|
|
if (!name)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
tst = upload_lookup_name(name);
|
|
|
|
if (tst) {
|
|
|
|
ret = -EEXIST;
|
|
|
|
goto free_name;
|
|
|
|
}
|
|
|
|
|
|
|
|
tst = kzalloc(sizeof(*tst), GFP_KERNEL);
|
|
|
|
if (!tst) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto free_name;
|
|
|
|
}
|
|
|
|
|
|
|
|
tst->name = name;
|
|
|
|
tst->buf = kzalloc(TEST_UPLOAD_MAX_SIZE, GFP_KERNEL);
|
|
|
|
if (!tst->buf) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto free_tst;
|
|
|
|
}
|
|
|
|
|
|
|
|
fwl = firmware_upload_register(THIS_MODULE, dev, tst->name,
|
|
|
|
&upload_test_ops, tst);
|
|
|
|
if (IS_ERR(fwl)) {
|
|
|
|
ret = PTR_ERR(fwl);
|
|
|
|
goto free_buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
tst->fwl = fwl;
|
|
|
|
list_add_tail(&tst->node, &test_upload_list);
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
return count;
|
|
|
|
|
|
|
|
free_buf:
|
|
|
|
kfree(tst->buf);
|
|
|
|
|
|
|
|
free_tst:
|
|
|
|
kfree(tst);
|
|
|
|
|
|
|
|
free_name:
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
kfree(name);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_WO(upload_register);
|
|
|
|
|
|
|
|
static ssize_t upload_unregister_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
struct test_firmware_upload *tst;
|
|
|
|
int ret = count;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
tst = upload_lookup_name(buf);
|
|
|
|
if (!tst) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (test_fw_config->upload_name == tst->name)
|
|
|
|
test_fw_config->upload_name = NULL;
|
|
|
|
|
|
|
|
list_del(&tst->node);
|
|
|
|
upload_release(tst);
|
|
|
|
|
|
|
|
out:
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_WO(upload_unregister);
|
|
|
|
|
2017-07-20 20:13:42 +00:00
|
|
|
static ssize_t test_result_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
return test_dev_config_show_int(buf, test_fw_config->test_result);
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_RO(test_result);
|
|
|
|
|
|
|
|
static ssize_t release_all_firmware_store(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
const char *buf, size_t count)
|
|
|
|
{
|
|
|
|
test_release_all_firmware();
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_WO(release_all_firmware);
|
|
|
|
|
|
|
|
static ssize_t read_firmware_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
|
|
|
struct test_batched_req *req;
|
|
|
|
u8 idx;
|
|
|
|
ssize_t rc = 0;
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
|
|
|
|
|
|
|
idx = test_fw_config->read_fw_idx;
|
|
|
|
if (idx >= test_fw_config->num_requests) {
|
|
|
|
rc = -ERANGE;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!test_fw_config->reqs) {
|
|
|
|
rc = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
req = &test_fw_config->reqs[idx];
|
|
|
|
if (!req->fw) {
|
|
|
|
pr_err("#%u: failed to async load firmware\n", idx);
|
|
|
|
rc = -ENOENT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
pr_info("#%u: loaded %zu\n", idx, req->fw->size);
|
|
|
|
|
|
|
|
if (req->fw->size > PAGE_SIZE) {
|
|
|
|
pr_err("Testing interface must use PAGE_SIZE firmware for now\n");
|
|
|
|
rc = -EINVAL;
|
2018-10-19 12:58:01 +00:00
|
|
|
goto out;
|
2017-07-20 20:13:42 +00:00
|
|
|
}
|
|
|
|
memcpy(buf, req->fw->data, req->fw->size);
|
|
|
|
|
|
|
|
rc = req->fw->size;
|
|
|
|
out:
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_RO(read_firmware);
|
|
|
|
|
2022-04-21 21:22:02 +00:00
|
|
|
static ssize_t upload_read_show(struct device *dev,
|
|
|
|
struct device_attribute *attr,
|
|
|
|
char *buf)
|
|
|
|
{
|
2022-05-06 06:55:15 +00:00
|
|
|
struct test_firmware_upload *tst = NULL;
|
|
|
|
struct test_firmware_upload *tst_iter;
|
2022-04-21 21:22:02 +00:00
|
|
|
int ret = -EINVAL;
|
|
|
|
|
|
|
|
if (!test_fw_config->upload_name) {
|
|
|
|
pr_err("Set config_upload_name before using upload_read\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
mutex_lock(&test_fw_mutex);
|
2022-05-06 06:55:15 +00:00
|
|
|
list_for_each_entry(tst_iter, &test_upload_list, node)
|
|
|
|
if (tst_iter->name == test_fw_config->upload_name) {
|
|
|
|
tst = tst_iter;
|
2022-04-21 21:22:02 +00:00
|
|
|
break;
|
2022-05-06 06:55:15 +00:00
|
|
|
}
|
2022-04-21 21:22:02 +00:00
|
|
|
|
2022-05-06 06:55:15 +00:00
|
|
|
if (!tst) {
|
2022-04-21 21:22:02 +00:00
|
|
|
pr_err("Firmware name not found: %s\n",
|
|
|
|
test_fw_config->upload_name);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tst->size > PAGE_SIZE) {
|
|
|
|
pr_err("Testing interface must use PAGE_SIZE firmware for now\n");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(buf, tst->buf, tst->size);
|
|
|
|
ret = tst->size;
|
|
|
|
out:
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
static DEVICE_ATTR_RO(upload_read);
|
|
|
|
|
2017-01-23 16:11:06 +00:00
|
|
|
#define TEST_FW_DEV_ATTR(name) &dev_attr_##name.attr
|
|
|
|
|
|
|
|
static struct attribute *test_dev_attrs[] = {
|
2017-07-20 20:13:42 +00:00
|
|
|
TEST_FW_DEV_ATTR(reset),
|
|
|
|
|
|
|
|
TEST_FW_DEV_ATTR(config),
|
|
|
|
TEST_FW_DEV_ATTR(config_name),
|
|
|
|
TEST_FW_DEV_ATTR(config_num_requests),
|
2019-08-22 18:40:04 +00:00
|
|
|
TEST_FW_DEV_ATTR(config_into_buf),
|
2020-10-02 17:38:28 +00:00
|
|
|
TEST_FW_DEV_ATTR(config_buf_size),
|
|
|
|
TEST_FW_DEV_ATTR(config_file_offset),
|
|
|
|
TEST_FW_DEV_ATTR(config_partial),
|
2017-07-20 20:13:42 +00:00
|
|
|
TEST_FW_DEV_ATTR(config_sync_direct),
|
|
|
|
TEST_FW_DEV_ATTR(config_send_uevent),
|
|
|
|
TEST_FW_DEV_ATTR(config_read_fw_idx),
|
2022-04-21 21:22:02 +00:00
|
|
|
TEST_FW_DEV_ATTR(config_upload_name),
|
2017-07-20 20:13:42 +00:00
|
|
|
|
|
|
|
/* These don't use the config at all - they could be ported! */
|
2017-01-23 16:11:06 +00:00
|
|
|
TEST_FW_DEV_ATTR(trigger_request),
|
|
|
|
TEST_FW_DEV_ATTR(trigger_async_request),
|
2017-01-23 16:11:10 +00:00
|
|
|
TEST_FW_DEV_ATTR(trigger_custom_fallback),
|
2020-01-15 16:35:49 +00:00
|
|
|
#ifdef CONFIG_EFI_EMBEDDED_FIRMWARE
|
|
|
|
TEST_FW_DEV_ATTR(trigger_request_platform),
|
|
|
|
#endif
|
2017-07-20 20:13:42 +00:00
|
|
|
|
|
|
|
/* These use the config and can use the test_result */
|
|
|
|
TEST_FW_DEV_ATTR(trigger_batched_requests),
|
|
|
|
TEST_FW_DEV_ATTR(trigger_batched_requests_async),
|
|
|
|
|
|
|
|
TEST_FW_DEV_ATTR(release_all_firmware),
|
|
|
|
TEST_FW_DEV_ATTR(test_result),
|
|
|
|
TEST_FW_DEV_ATTR(read_firmware),
|
2022-04-21 21:22:02 +00:00
|
|
|
TEST_FW_DEV_ATTR(upload_read),
|
|
|
|
TEST_FW_DEV_ATTR(upload_register),
|
|
|
|
TEST_FW_DEV_ATTR(upload_unregister),
|
2017-01-23 16:11:06 +00:00
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
ATTRIBUTE_GROUPS(test_dev);
|
|
|
|
|
2017-01-23 16:11:05 +00:00
|
|
|
static struct miscdevice test_fw_misc_device = {
|
|
|
|
.minor = MISC_DYNAMIC_MINOR,
|
|
|
|
.name = "test_firmware",
|
|
|
|
.fops = &test_fw_fops,
|
2017-01-23 16:11:06 +00:00
|
|
|
.groups = test_dev_groups,
|
2017-01-23 16:11:05 +00:00
|
|
|
};
|
|
|
|
|
2014-07-14 21:38:12 +00:00
|
|
|
static int __init test_firmware_init(void)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2017-07-20 20:13:42 +00:00
|
|
|
test_fw_config = kzalloc(sizeof(struct test_config), GFP_KERNEL);
|
|
|
|
if (!test_fw_config)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
rc = __test_firmware_config_init();
|
2019-07-14 06:11:35 +00:00
|
|
|
if (rc) {
|
|
|
|
kfree(test_fw_config);
|
|
|
|
pr_err("could not init firmware test config: %d\n", rc);
|
2017-07-20 20:13:42 +00:00
|
|
|
return rc;
|
2019-07-14 06:11:35 +00:00
|
|
|
}
|
2017-07-20 20:13:42 +00:00
|
|
|
|
2014-07-14 21:38:12 +00:00
|
|
|
rc = misc_register(&test_fw_misc_device);
|
|
|
|
if (rc) {
|
2017-07-20 20:13:42 +00:00
|
|
|
kfree(test_fw_config);
|
2014-07-14 21:38:12 +00:00
|
|
|
pr_err("could not register misc device: %d\n", rc);
|
|
|
|
return rc;
|
|
|
|
}
|
2015-12-09 22:50:27 +00:00
|
|
|
|
2014-07-14 21:38:12 +00:00
|
|
|
pr_warn("interface ready\n");
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
module_init(test_firmware_init);
|
|
|
|
|
|
|
|
static void __exit test_firmware_exit(void)
|
|
|
|
{
|
2017-07-20 20:13:42 +00:00
|
|
|
mutex_lock(&test_fw_mutex);
|
2014-07-14 21:38:12 +00:00
|
|
|
release_firmware(test_firmware);
|
|
|
|
misc_deregister(&test_fw_misc_device);
|
2022-04-21 21:22:02 +00:00
|
|
|
upload_release_all();
|
2017-07-20 20:13:42 +00:00
|
|
|
__test_firmware_config_free();
|
|
|
|
kfree(test_fw_config);
|
|
|
|
mutex_unlock(&test_fw_mutex);
|
|
|
|
|
2014-07-14 21:38:12 +00:00
|
|
|
pr_warn("removed interface\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
module_exit(test_firmware_exit);
|
|
|
|
|
|
|
|
MODULE_AUTHOR("Kees Cook <keescook@chromium.org>");
|
|
|
|
MODULE_LICENSE("GPL");
|