blob: f962488546b638e9cef66e0bb9cdd5326345fbd5 [file] [log] [blame]
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -08001// SPDX-License-Identifier: GPL-2.0
2
3#include <linux/types.h>
4#include <linux/kconfig.h>
5#include <linux/list.h>
6#include <linux/slab.h>
7#include <linux/security.h>
8#include <linux/highmem.h>
9#include <linux/umh.h>
Luis R. Rodriguezceb18132018-03-10 06:14:51 -080010#include <linux/sysctl.h>
Stephen Rothwellccce3052018-03-21 19:06:35 +110011#include <linux/vmalloc.h>
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -080012
Luis R. Rodriguez5d6d1dd2018-03-10 06:14:50 -080013#include "fallback.h"
14#include "firmware.h"
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -080015
16/*
17 * firmware fallback mechanism
18 */
19
20extern struct firmware_fallback_config fw_fallback_config;
21
22/* These getters are vetted to use int properly */
23static inline int __firmware_loading_timeout(void)
24{
25 return fw_fallback_config.loading_timeout;
26}
27
28/* These setters are vetted to use int properly */
29static void __fw_fallback_set_timeout(int timeout)
30{
31 fw_fallback_config.loading_timeout = timeout;
32}
33
34/*
35 * use small loading timeout for caching devices' firmware because all these
36 * firmware images have been loaded successfully at lease once, also system is
37 * ready for completing firmware loading now. The maximum size of firmware in
38 * current distributions is about 2M bytes, so 10 secs should be enough.
39 */
40void fw_fallback_set_cache_timeout(void)
41{
42 fw_fallback_config.old_timeout = __firmware_loading_timeout();
43 __fw_fallback_set_timeout(10);
44}
45
46/* Restores the timeout to the value last configured during normal operation */
47void fw_fallback_set_default_timeout(void)
48{
49 __fw_fallback_set_timeout(fw_fallback_config.old_timeout);
50}
51
52static long firmware_loading_timeout(void)
53{
54 return __firmware_loading_timeout() > 0 ?
55 __firmware_loading_timeout() * HZ : MAX_JIFFY_OFFSET;
56}
57
58static inline bool fw_sysfs_done(struct fw_priv *fw_priv)
59{
60 return __fw_state_check(fw_priv, FW_STATUS_DONE);
61}
62
63static inline bool fw_sysfs_loading(struct fw_priv *fw_priv)
64{
65 return __fw_state_check(fw_priv, FW_STATUS_LOADING);
66}
67
68static inline int fw_sysfs_wait_timeout(struct fw_priv *fw_priv, long timeout)
69{
70 return __fw_state_wait_common(fw_priv, timeout);
71}
72
73struct fw_sysfs {
74 bool nowait;
75 struct device dev;
76 struct fw_priv *fw_priv;
77 struct firmware *fw;
78};
79
80static struct fw_sysfs *to_fw_sysfs(struct device *dev)
81{
82 return container_of(dev, struct fw_sysfs, dev);
83}
84
85static void __fw_load_abort(struct fw_priv *fw_priv)
86{
87 /*
88 * There is a small window in which user can write to 'loading'
89 * between loading done and disappearance of 'loading'
90 */
91 if (fw_sysfs_done(fw_priv))
92 return;
93
94 list_del_init(&fw_priv->pending_list);
95 fw_state_aborted(fw_priv);
96}
97
98static void fw_load_abort(struct fw_sysfs *fw_sysfs)
99{
100 struct fw_priv *fw_priv = fw_sysfs->fw_priv;
101
102 __fw_load_abort(fw_priv);
103}
104
105static LIST_HEAD(pending_fw_head);
106
107void kill_pending_fw_fallback_reqs(bool only_kill_custom)
108{
109 struct fw_priv *fw_priv;
110 struct fw_priv *next;
111
112 mutex_lock(&fw_lock);
113 list_for_each_entry_safe(fw_priv, next, &pending_fw_head,
114 pending_list) {
115 if (!fw_priv->need_uevent || !only_kill_custom)
116 __fw_load_abort(fw_priv);
117 }
118 mutex_unlock(&fw_lock);
119}
120
121static ssize_t timeout_show(struct class *class, struct class_attribute *attr,
122 char *buf)
123{
124 return sprintf(buf, "%d\n", __firmware_loading_timeout());
125}
126
127/**
Andres Rodriguezc35f9cbb2018-05-10 13:08:38 -0700128 * firmware_timeout_store() - set number of seconds to wait for firmware
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800129 * @class: device class pointer
130 * @attr: device attribute pointer
131 * @buf: buffer to scan for timeout value
132 * @count: number of bytes in @buf
133 *
134 * Sets the number of seconds to wait for the firmware. Once
135 * this expires an error will be returned to the driver and no
136 * firmware will be provided.
137 *
138 * Note: zero means 'wait forever'.
139 **/
140static ssize_t timeout_store(struct class *class, struct class_attribute *attr,
141 const char *buf, size_t count)
142{
143 int tmp_loading_timeout = simple_strtol(buf, NULL, 10);
144
145 if (tmp_loading_timeout < 0)
146 tmp_loading_timeout = 0;
147
148 __fw_fallback_set_timeout(tmp_loading_timeout);
149
150 return count;
151}
152static CLASS_ATTR_RW(timeout);
153
154static struct attribute *firmware_class_attrs[] = {
155 &class_attr_timeout.attr,
156 NULL,
157};
158ATTRIBUTE_GROUPS(firmware_class);
159
160static void fw_dev_release(struct device *dev)
161{
162 struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev);
163
164 kfree(fw_sysfs);
165}
166
167static int do_firmware_uevent(struct fw_sysfs *fw_sysfs, struct kobj_uevent_env *env)
168{
169 if (add_uevent_var(env, "FIRMWARE=%s", fw_sysfs->fw_priv->fw_name))
170 return -ENOMEM;
171 if (add_uevent_var(env, "TIMEOUT=%i", __firmware_loading_timeout()))
172 return -ENOMEM;
173 if (add_uevent_var(env, "ASYNC=%d", fw_sysfs->nowait))
174 return -ENOMEM;
175
176 return 0;
177}
178
179static int firmware_uevent(struct device *dev, struct kobj_uevent_env *env)
180{
181 struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev);
182 int err = 0;
183
184 mutex_lock(&fw_lock);
185 if (fw_sysfs->fw_priv)
186 err = do_firmware_uevent(fw_sysfs, env);
187 mutex_unlock(&fw_lock);
188 return err;
189}
190
191static struct class firmware_class = {
192 .name = "firmware",
193 .class_groups = firmware_class_groups,
194 .dev_uevent = firmware_uevent,
195 .dev_release = fw_dev_release,
196};
197
198int register_sysfs_loader(void)
199{
200 return class_register(&firmware_class);
201}
202
203void unregister_sysfs_loader(void)
204{
205 class_unregister(&firmware_class);
206}
207
208static ssize_t firmware_loading_show(struct device *dev,
209 struct device_attribute *attr, char *buf)
210{
211 struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev);
212 int loading = 0;
213
214 mutex_lock(&fw_lock);
215 if (fw_sysfs->fw_priv)
216 loading = fw_sysfs_loading(fw_sysfs->fw_priv);
217 mutex_unlock(&fw_lock);
218
219 return sprintf(buf, "%d\n", loading);
220}
221
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800222/* one pages buffer should be mapped/unmapped only once */
223static int map_fw_priv_pages(struct fw_priv *fw_priv)
224{
225 if (!fw_priv->is_paged_buf)
226 return 0;
227
228 vunmap(fw_priv->data);
229 fw_priv->data = vmap(fw_priv->pages, fw_priv->nr_pages, 0,
230 PAGE_KERNEL_RO);
231 if (!fw_priv->data)
232 return -ENOMEM;
233 return 0;
234}
235
236/**
Andres Rodriguezc35f9cbb2018-05-10 13:08:38 -0700237 * firmware_loading_store() - set value in the 'loading' control file
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800238 * @dev: device pointer
239 * @attr: device attribute pointer
240 * @buf: buffer to scan for loading control value
241 * @count: number of bytes in @buf
242 *
243 * The relevant values are:
244 *
245 * 1: Start a load, discarding any previous partial load.
246 * 0: Conclude the load and hand the data to the driver code.
247 * -1: Conclude the load with an error and discard any written data.
248 **/
249static ssize_t firmware_loading_store(struct device *dev,
250 struct device_attribute *attr,
251 const char *buf, size_t count)
252{
253 struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev);
254 struct fw_priv *fw_priv;
255 ssize_t written = count;
256 int loading = simple_strtol(buf, NULL, 10);
257 int i;
258
259 mutex_lock(&fw_lock);
260 fw_priv = fw_sysfs->fw_priv;
261 if (fw_state_is_aborted(fw_priv))
262 goto out;
263
264 switch (loading) {
265 case 1:
266 /* discarding any previous partial load */
267 if (!fw_sysfs_done(fw_priv)) {
268 for (i = 0; i < fw_priv->nr_pages; i++)
269 __free_page(fw_priv->pages[i]);
270 vfree(fw_priv->pages);
271 fw_priv->pages = NULL;
272 fw_priv->page_array_size = 0;
273 fw_priv->nr_pages = 0;
274 fw_state_start(fw_priv);
275 }
276 break;
277 case 0:
278 if (fw_sysfs_loading(fw_priv)) {
279 int rc;
280
281 /*
282 * Several loading requests may be pending on
283 * one same firmware buf, so let all requests
284 * see the mapped 'buf->data' once the loading
285 * is completed.
286 * */
287 rc = map_fw_priv_pages(fw_priv);
288 if (rc)
289 dev_err(dev, "%s: map pages failed\n",
290 __func__);
291 else
292 rc = security_kernel_post_read_file(NULL,
293 fw_priv->data, fw_priv->size,
294 READING_FIRMWARE);
295
296 /*
297 * Same logic as fw_load_abort, only the DONE bit
298 * is ignored and we set ABORT only on failure.
299 */
300 list_del_init(&fw_priv->pending_list);
301 if (rc) {
302 fw_state_aborted(fw_priv);
303 written = rc;
304 } else {
305 fw_state_done(fw_priv);
306 }
307 break;
308 }
309 /* fallthrough */
310 default:
311 dev_err(dev, "%s: unexpected value (%d)\n", __func__, loading);
312 /* fallthrough */
313 case -1:
314 fw_load_abort(fw_sysfs);
315 break;
316 }
317out:
318 mutex_unlock(&fw_lock);
319 return written;
320}
321
322static DEVICE_ATTR(loading, 0644, firmware_loading_show, firmware_loading_store);
323
324static void firmware_rw_data(struct fw_priv *fw_priv, char *buffer,
325 loff_t offset, size_t count, bool read)
326{
327 if (read)
328 memcpy(buffer, fw_priv->data + offset, count);
329 else
330 memcpy(fw_priv->data + offset, buffer, count);
331}
332
333static void firmware_rw(struct fw_priv *fw_priv, char *buffer,
334 loff_t offset, size_t count, bool read)
335{
336 while (count) {
337 void *page_data;
338 int page_nr = offset >> PAGE_SHIFT;
339 int page_ofs = offset & (PAGE_SIZE-1);
340 int page_cnt = min_t(size_t, PAGE_SIZE - page_ofs, count);
341
342 page_data = kmap(fw_priv->pages[page_nr]);
343
344 if (read)
345 memcpy(buffer, page_data + page_ofs, page_cnt);
346 else
347 memcpy(page_data + page_ofs, buffer, page_cnt);
348
349 kunmap(fw_priv->pages[page_nr]);
350 buffer += page_cnt;
351 offset += page_cnt;
352 count -= page_cnt;
353 }
354}
355
356static ssize_t firmware_data_read(struct file *filp, struct kobject *kobj,
357 struct bin_attribute *bin_attr,
358 char *buffer, loff_t offset, size_t count)
359{
360 struct device *dev = kobj_to_dev(kobj);
361 struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev);
362 struct fw_priv *fw_priv;
363 ssize_t ret_count;
364
365 mutex_lock(&fw_lock);
366 fw_priv = fw_sysfs->fw_priv;
367 if (!fw_priv || fw_sysfs_done(fw_priv)) {
368 ret_count = -ENODEV;
369 goto out;
370 }
371 if (offset > fw_priv->size) {
372 ret_count = 0;
373 goto out;
374 }
375 if (count > fw_priv->size - offset)
376 count = fw_priv->size - offset;
377
378 ret_count = count;
379
380 if (fw_priv->data)
381 firmware_rw_data(fw_priv, buffer, offset, count, true);
382 else
383 firmware_rw(fw_priv, buffer, offset, count, true);
384
385out:
386 mutex_unlock(&fw_lock);
387 return ret_count;
388}
389
390static int fw_realloc_pages(struct fw_sysfs *fw_sysfs, int min_size)
391{
392 struct fw_priv *fw_priv= fw_sysfs->fw_priv;
393 int pages_needed = PAGE_ALIGN(min_size) >> PAGE_SHIFT;
394
395 /* If the array of pages is too small, grow it... */
396 if (fw_priv->page_array_size < pages_needed) {
397 int new_array_size = max(pages_needed,
398 fw_priv->page_array_size * 2);
399 struct page **new_pages;
400
Kees Cook42bc47b2018-06-12 14:27:11 -0700401 new_pages = vmalloc(array_size(new_array_size, sizeof(void *)));
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800402 if (!new_pages) {
403 fw_load_abort(fw_sysfs);
404 return -ENOMEM;
405 }
406 memcpy(new_pages, fw_priv->pages,
407 fw_priv->page_array_size * sizeof(void *));
408 memset(&new_pages[fw_priv->page_array_size], 0, sizeof(void *) *
409 (new_array_size - fw_priv->page_array_size));
410 vfree(fw_priv->pages);
411 fw_priv->pages = new_pages;
412 fw_priv->page_array_size = new_array_size;
413 }
414
415 while (fw_priv->nr_pages < pages_needed) {
416 fw_priv->pages[fw_priv->nr_pages] =
417 alloc_page(GFP_KERNEL | __GFP_HIGHMEM);
418
419 if (!fw_priv->pages[fw_priv->nr_pages]) {
420 fw_load_abort(fw_sysfs);
421 return -ENOMEM;
422 }
423 fw_priv->nr_pages++;
424 }
425 return 0;
426}
427
428/**
Andres Rodriguezc35f9cbb2018-05-10 13:08:38 -0700429 * firmware_data_write() - write method for firmware
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800430 * @filp: open sysfs file
431 * @kobj: kobject for the device
432 * @bin_attr: bin_attr structure
433 * @buffer: buffer being written
434 * @offset: buffer offset for write in total data store area
435 * @count: buffer size
436 *
437 * Data written to the 'data' attribute will be later handed to
438 * the driver as a firmware image.
439 **/
440static ssize_t firmware_data_write(struct file *filp, struct kobject *kobj,
441 struct bin_attribute *bin_attr,
442 char *buffer, loff_t offset, size_t count)
443{
444 struct device *dev = kobj_to_dev(kobj);
445 struct fw_sysfs *fw_sysfs = to_fw_sysfs(dev);
446 struct fw_priv *fw_priv;
447 ssize_t retval;
448
449 if (!capable(CAP_SYS_RAWIO))
450 return -EPERM;
451
452 mutex_lock(&fw_lock);
453 fw_priv = fw_sysfs->fw_priv;
454 if (!fw_priv || fw_sysfs_done(fw_priv)) {
455 retval = -ENODEV;
456 goto out;
457 }
458
459 if (fw_priv->data) {
460 if (offset + count > fw_priv->allocated_size) {
461 retval = -ENOMEM;
462 goto out;
463 }
464 firmware_rw_data(fw_priv, buffer, offset, count, false);
465 retval = count;
466 } else {
467 retval = fw_realloc_pages(fw_sysfs, offset + count);
468 if (retval)
469 goto out;
470
471 retval = count;
472 firmware_rw(fw_priv, buffer, offset, count, false);
473 }
474
475 fw_priv->size = max_t(size_t, offset + count, fw_priv->size);
476out:
477 mutex_unlock(&fw_lock);
478 return retval;
479}
480
481static struct bin_attribute firmware_attr_data = {
482 .attr = { .name = "data", .mode = 0644 },
483 .size = 0,
484 .read = firmware_data_read,
485 .write = firmware_data_write,
486};
487
488static struct attribute *fw_dev_attrs[] = {
489 &dev_attr_loading.attr,
490 NULL
491};
492
493static struct bin_attribute *fw_dev_bin_attrs[] = {
494 &firmware_attr_data,
495 NULL
496};
497
498static const struct attribute_group fw_dev_attr_group = {
499 .attrs = fw_dev_attrs,
500 .bin_attrs = fw_dev_bin_attrs,
501};
502
503static const struct attribute_group *fw_dev_attr_groups[] = {
504 &fw_dev_attr_group,
505 NULL
506};
507
508static struct fw_sysfs *
509fw_create_instance(struct firmware *firmware, const char *fw_name,
Andres Rodriguezeb33eb02018-05-10 13:08:37 -0700510 struct device *device, enum fw_opt opt_flags)
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800511{
512 struct fw_sysfs *fw_sysfs;
513 struct device *f_dev;
514
515 fw_sysfs = kzalloc(sizeof(*fw_sysfs), GFP_KERNEL);
516 if (!fw_sysfs) {
517 fw_sysfs = ERR_PTR(-ENOMEM);
518 goto exit;
519 }
520
521 fw_sysfs->nowait = !!(opt_flags & FW_OPT_NOWAIT);
522 fw_sysfs->fw = firmware;
523 f_dev = &fw_sysfs->dev;
524
525 device_initialize(f_dev);
526 dev_set_name(f_dev, "%s", fw_name);
527 f_dev->parent = device;
528 f_dev->class = &firmware_class;
529 f_dev->groups = fw_dev_attr_groups;
530exit:
531 return fw_sysfs;
532}
533
Luis R. Rodriguez60fa7422018-03-10 06:14:55 -0800534/**
Andres Rodriguezc35f9cbb2018-05-10 13:08:38 -0700535 * fw_load_sysfs_fallback() - load a firmware via the sysfs fallback mechanism
Andres Rodriguezb93815d2018-04-25 12:25:39 -0400536 * @fw_sysfs: firmware sysfs information for the firmware to load
Luis R. Rodriguez60fa7422018-03-10 06:14:55 -0800537 * @opt_flags: flags of options, FW_OPT_*
538 * @timeout: timeout to wait for the load
539 *
540 * In charge of constructing a sysfs fallback interface for firmware loading.
541 **/
542static int fw_load_sysfs_fallback(struct fw_sysfs *fw_sysfs,
Andres Rodriguezeb33eb02018-05-10 13:08:37 -0700543 enum fw_opt opt_flags, long timeout)
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800544{
545 int retval = 0;
546 struct device *f_dev = &fw_sysfs->dev;
547 struct fw_priv *fw_priv = fw_sysfs->fw_priv;
548
549 /* fall back on userspace loading */
550 if (!fw_priv->data)
551 fw_priv->is_paged_buf = true;
552
553 dev_set_uevent_suppress(f_dev, true);
554
555 retval = device_add(f_dev);
556 if (retval) {
557 dev_err(f_dev, "%s: device_register failed\n", __func__);
558 goto err_put_dev;
559 }
560
561 mutex_lock(&fw_lock);
562 list_add(&fw_priv->pending_list, &pending_fw_head);
563 mutex_unlock(&fw_lock);
564
565 if (opt_flags & FW_OPT_UEVENT) {
566 fw_priv->need_uevent = true;
567 dev_set_uevent_suppress(f_dev, false);
568 dev_dbg(f_dev, "firmware: requesting %s\n", fw_priv->fw_name);
569 kobject_uevent(&fw_sysfs->dev.kobj, KOBJ_ADD);
570 } else {
571 timeout = MAX_JIFFY_OFFSET;
572 }
573
574 retval = fw_sysfs_wait_timeout(fw_priv, timeout);
575 if (retval < 0) {
576 mutex_lock(&fw_lock);
577 fw_load_abort(fw_sysfs);
578 mutex_unlock(&fw_lock);
579 }
580
581 if (fw_state_is_aborted(fw_priv)) {
582 if (retval == -ERESTARTSYS)
583 retval = -EINTR;
584 else
585 retval = -EAGAIN;
586 } else if (fw_priv->is_paged_buf && !fw_priv->data)
587 retval = -ENOMEM;
588
589 device_del(f_dev);
590err_put_dev:
591 put_device(f_dev);
592 return retval;
593}
594
595static int fw_load_from_user_helper(struct firmware *firmware,
596 const char *name, struct device *device,
Andres Rodriguezeb33eb02018-05-10 13:08:37 -0700597 enum fw_opt opt_flags)
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800598{
599 struct fw_sysfs *fw_sysfs;
600 long timeout;
601 int ret;
602
603 timeout = firmware_loading_timeout();
604 if (opt_flags & FW_OPT_NOWAIT) {
605 timeout = usermodehelper_read_lock_wait(timeout);
606 if (!timeout) {
607 dev_dbg(device, "firmware: %s loading timed out\n",
608 name);
609 return -EBUSY;
610 }
611 } else {
612 ret = usermodehelper_read_trylock();
613 if (WARN_ON(ret)) {
614 dev_err(device, "firmware: %s will not be loaded\n",
615 name);
616 return ret;
617 }
618 }
619
620 fw_sysfs = fw_create_instance(firmware, name, device, opt_flags);
621 if (IS_ERR(fw_sysfs)) {
622 ret = PTR_ERR(fw_sysfs);
623 goto out_unlock;
624 }
625
626 fw_sysfs->fw_priv = firmware->priv;
Luis R. Rodriguez60fa7422018-03-10 06:14:55 -0800627 ret = fw_load_sysfs_fallback(fw_sysfs, opt_flags, timeout);
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800628
629 if (!ret)
630 ret = assign_fw(firmware, device, opt_flags);
631
632out_unlock:
633 usermodehelper_read_unlock();
634
635 return ret;
636}
637
Andres Rodriguezeb33eb02018-05-10 13:08:37 -0700638static bool fw_force_sysfs_fallback(enum fw_opt opt_flags)
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800639{
640 if (fw_fallback_config.force_sysfs_fallback)
641 return true;
642 if (!(opt_flags & FW_OPT_USERHELPER))
643 return false;
644 return true;
645}
646
Andres Rodriguezeb33eb02018-05-10 13:08:37 -0700647static bool fw_run_sysfs_fallback(enum fw_opt opt_flags)
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800648{
Mimi Zohar6e8526512018-07-13 14:05:59 -0400649 int ret;
650
Luis R. Rodriguez2cd7a1c2018-03-10 06:14:52 -0800651 if (fw_fallback_config.ignore_sysfs_fallback) {
Luis R. Rodriguezc6263a42018-03-21 15:34:28 -0700652 pr_info_once("Ignoring firmware sysfs fallback due to sysctl knob\n");
Luis R. Rodriguez2cd7a1c2018-03-10 06:14:52 -0800653 return false;
654 }
655
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800656 if ((opt_flags & FW_OPT_NOFALLBACK))
657 return false;
658
Mimi Zohar6e8526512018-07-13 14:05:59 -0400659 /* Also permit LSMs and IMA to fail firmware sysfs fallback */
660 ret = security_kernel_load_data(LOADING_FIRMWARE);
661 if (ret < 0)
662 return ret;
663
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800664 return fw_force_sysfs_fallback(opt_flags);
665}
666
Luis R. Rodriguez84b5c4f2018-05-10 13:08:40 -0700667/**
668 * firmware_fallback_sysfs() - use the fallback mechanism to find firmware
669 * @fw: pointer to firmware image
670 * @name: name of firmware file to look for
671 * @device: device for which firmware is being loaded
672 * @opt_flags: options to control firmware loading behaviour
673 * @ret: return value from direct lookup which triggered the fallback mechanism
674 *
675 * This function is called if direct lookup for the firmware failed, it enables
676 * a fallback mechanism through userspace by exposing a sysfs loading
Jonathan Neuschäferbbabc3f2019-04-30 16:56:10 +0200677 * interface. Userspace is in charge of loading the firmware through the sysfs
678 * loading interface. This sysfs fallback mechanism may be disabled completely
Luis R. Rodriguez84b5c4f2018-05-10 13:08:40 -0700679 * on a system by setting the proc sysctl value ignore_sysfs_fallback to true.
680 * If this false we check if the internal API caller set the @FW_OPT_NOFALLBACK
681 * flag, if so it would also disable the fallback mechanism. A system may want
682 * to enfoce the sysfs fallback mechanism at all times, it can do this by
683 * setting ignore_sysfs_fallback to false and force_sysfs_fallback to true.
684 * Enabling force_sysfs_fallback is functionally equivalent to build a kernel
685 * with CONFIG_FW_LOADER_USER_HELPER_FALLBACK.
686 **/
Andres Rodriguezcf1cde72018-05-10 13:08:39 -0700687int firmware_fallback_sysfs(struct firmware *fw, const char *name,
688 struct device *device,
689 enum fw_opt opt_flags,
690 int ret)
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800691{
692 if (!fw_run_sysfs_fallback(opt_flags))
693 return ret;
694
Luis R. Rodriguez27d5d7d2018-05-10 13:08:44 -0700695 if (!(opt_flags & FW_OPT_NO_WARN))
Jonathan Neuschäferbbabc3f2019-04-30 16:56:10 +0200696 dev_warn(device, "Falling back to sysfs fallback for: %s\n",
Luis R. Rodriguez27d5d7d2018-05-10 13:08:44 -0700697 name);
698 else
699 dev_dbg(device, "Falling back to sysfs fallback for: %s\n",
700 name);
Luis R. Rodriguezd73f8212018-03-10 06:14:49 -0800701 return fw_load_from_user_helper(fw, name, device, opt_flags);
702}