1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3 * PowerNV OPAL Firmware Update Interface
4 *
5 * Copyright 2013 IBM Corp.
6 */
7
8 #define DEBUG
9
10 #include <linux/kernel.h>
11 #include <linux/reboot.h>
12 #include <linux/init.h>
13 #include <linux/kobject.h>
14 #include <linux/sysfs.h>
15 #include <linux/slab.h>
16 #include <linux/mm.h>
17 #include <linux/vmalloc.h>
18 #include <linux/pagemap.h>
19 #include <linux/delay.h>
20
21 #include <asm/opal.h>
22
23 /* FLASH status codes */
24 #define FLASH_NO_OP -1099 /* No operation initiated by user */
25 #define FLASH_NO_AUTH -9002 /* Not a service authority partition */
26
27 /* Validate image status values */
28 #define VALIDATE_IMG_READY -1001 /* Image ready for validation */
29 #define VALIDATE_IMG_INCOMPLETE -1002 /* User copied < VALIDATE_BUF_SIZE */
30
31 /* Manage image status values */
32 #define MANAGE_ACTIVE_ERR -9001 /* Cannot overwrite active img */
33
34 /* Flash image status values */
35 #define FLASH_IMG_READY 0 /* Img ready for flash on reboot */
36 #define FLASH_INVALID_IMG -1003 /* Flash image shorter than expected */
37 #define FLASH_IMG_NULL_DATA -1004 /* Bad data in sg list entry */
38 #define FLASH_IMG_BAD_LEN -1005 /* Bad length in sg list entry */
39
40 /* Manage operation tokens */
41 #define FLASH_REJECT_TMP_SIDE 0 /* Reject temporary fw image */
42 #define FLASH_COMMIT_TMP_SIDE 1 /* Commit temporary fw image */
43
44 /* Update tokens */
45 #define FLASH_UPDATE_CANCEL 0 /* Cancel update request */
46 #define FLASH_UPDATE_INIT 1 /* Initiate update */
47
48 /* Validate image update result tokens */
49 #define VALIDATE_TMP_UPDATE 0 /* T side will be updated */
50 #define VALIDATE_FLASH_AUTH 1 /* Partition does not have authority */
51 #define VALIDATE_INVALID_IMG 2 /* Candidate image is not valid */
52 #define VALIDATE_CUR_UNKNOWN 3 /* Current fixpack level is unknown */
53 /*
54 * Current T side will be committed to P side before being replace with new
55 * image, and the new image is downlevel from current image
56 */
57 #define VALIDATE_TMP_COMMIT_DL 4
58 /*
59 * Current T side will be committed to P side before being replaced with new
60 * image
61 */
62 #define VALIDATE_TMP_COMMIT 5
63 /*
64 * T side will be updated with a downlevel image
65 */
66 #define VALIDATE_TMP_UPDATE_DL 6
67 /*
68 * The candidate image's release date is later than the system's firmware
69 * service entitlement date - service warranty period has expired
70 */
71 #define VALIDATE_OUT_OF_WRNTY 7
72
73 /* Validate buffer size */
74 #define VALIDATE_BUF_SIZE 4096
75
76 /* XXX: Assume candidate image size is <= 1GB */
77 #define MAX_IMAGE_SIZE 0x40000000
78
79 /* Image status */
80 enum {
81 IMAGE_INVALID,
82 IMAGE_LOADING,
83 IMAGE_READY,
84 };
85
86 /* Candidate image data */
87 struct image_data_t {
88 int status;
89 void *data;
90 uint32_t size;
91 };
92
93 /* Candidate image header */
94 struct image_header_t {
95 uint16_t magic;
96 uint16_t version;
97 uint32_t size;
98 };
99
100 struct validate_flash_t {
101 int status; /* Return status */
102 void *buf; /* Candidate image buffer */
103 uint32_t buf_size; /* Image size */
104 uint32_t result; /* Update results token */
105 };
106
107 struct manage_flash_t {
108 int status; /* Return status */
109 };
110
111 struct update_flash_t {
112 int status; /* Return status */
113 };
114
115 static struct image_header_t image_header;
116 static struct image_data_t image_data;
117 static struct validate_flash_t validate_flash_data;
118 static struct manage_flash_t manage_flash_data;
119
120 /* Initialize update_flash_data status to No Operation */
121 static struct update_flash_t update_flash_data = {
122 .status = FLASH_NO_OP,
123 };
124
125 static DEFINE_MUTEX(image_data_mutex);
126
127 /*
128 * Validate candidate image
129 */
opal_flash_validate(void)130 static inline void opal_flash_validate(void)
131 {
132 long ret;
133 void *buf = validate_flash_data.buf;
134 __be32 size = cpu_to_be32(validate_flash_data.buf_size);
135 __be32 result;
136
137 ret = opal_validate_flash(__pa(buf), &size, &result);
138
139 validate_flash_data.status = ret;
140 validate_flash_data.buf_size = be32_to_cpu(size);
141 validate_flash_data.result = be32_to_cpu(result);
142 }
143
144 /*
145 * Validate output format:
146 * validate result token
147 * current image version details
148 * new image version details
149 */
validate_show(struct kobject * kobj,struct kobj_attribute * attr,char * buf)150 static ssize_t validate_show(struct kobject *kobj,
151 struct kobj_attribute *attr, char *buf)
152 {
153 struct validate_flash_t *args_buf = &validate_flash_data;
154 int len;
155
156 /* Candidate image is not validated */
157 if (args_buf->status < VALIDATE_TMP_UPDATE) {
158 len = sprintf(buf, "%d\n", args_buf->status);
159 goto out;
160 }
161
162 /* Result token */
163 len = sprintf(buf, "%d\n", args_buf->result);
164
165 /* Current and candidate image version details */
166 if ((args_buf->result != VALIDATE_TMP_UPDATE) &&
167 (args_buf->result < VALIDATE_CUR_UNKNOWN))
168 goto out;
169
170 if (args_buf->buf_size > (VALIDATE_BUF_SIZE - len)) {
171 memcpy(buf + len, args_buf->buf, VALIDATE_BUF_SIZE - len);
172 len = VALIDATE_BUF_SIZE;
173 } else {
174 memcpy(buf + len, args_buf->buf, args_buf->buf_size);
175 len += args_buf->buf_size;
176 }
177 out:
178 /* Set status to default */
179 args_buf->status = FLASH_NO_OP;
180 return len;
181 }
182
183 /*
184 * Validate candidate firmware image
185 *
186 * Note:
187 * We are only interested in first 4K bytes of the
188 * candidate image.
189 */
validate_store(struct kobject * kobj,struct kobj_attribute * attr,const char * buf,size_t count)190 static ssize_t validate_store(struct kobject *kobj,
191 struct kobj_attribute *attr,
192 const char *buf, size_t count)
193 {
194 struct validate_flash_t *args_buf = &validate_flash_data;
195
196 if (buf[0] != '1')
197 return -EINVAL;
198
199 mutex_lock(&image_data_mutex);
200
201 if (image_data.status != IMAGE_READY ||
202 image_data.size < VALIDATE_BUF_SIZE) {
203 args_buf->result = VALIDATE_INVALID_IMG;
204 args_buf->status = VALIDATE_IMG_INCOMPLETE;
205 goto out;
206 }
207
208 /* Copy first 4k bytes of candidate image */
209 memcpy(args_buf->buf, image_data.data, VALIDATE_BUF_SIZE);
210
211 args_buf->status = VALIDATE_IMG_READY;
212 args_buf->buf_size = VALIDATE_BUF_SIZE;
213
214 /* Validate candidate image */
215 opal_flash_validate();
216
217 out:
218 mutex_unlock(&image_data_mutex);
219 return count;
220 }
221
222 /*
223 * Manage flash routine
224 */
opal_flash_manage(uint8_t op)225 static inline void opal_flash_manage(uint8_t op)
226 {
227 struct manage_flash_t *const args_buf = &manage_flash_data;
228
229 args_buf->status = opal_manage_flash(op);
230 }
231
232 /*
233 * Show manage flash status
234 */
manage_show(struct kobject * kobj,struct kobj_attribute * attr,char * buf)235 static ssize_t manage_show(struct kobject *kobj,
236 struct kobj_attribute *attr, char *buf)
237 {
238 struct manage_flash_t *const args_buf = &manage_flash_data;
239 int rc;
240
241 rc = sprintf(buf, "%d\n", args_buf->status);
242 /* Set status to default*/
243 args_buf->status = FLASH_NO_OP;
244 return rc;
245 }
246
247 /*
248 * Manage operations:
249 * 0 - Reject
250 * 1 - Commit
251 */
manage_store(struct kobject * kobj,struct kobj_attribute * attr,const char * buf,size_t count)252 static ssize_t manage_store(struct kobject *kobj,
253 struct kobj_attribute *attr,
254 const char *buf, size_t count)
255 {
256 uint8_t op;
257 switch (buf[0]) {
258 case '0':
259 op = FLASH_REJECT_TMP_SIDE;
260 break;
261 case '1':
262 op = FLASH_COMMIT_TMP_SIDE;
263 break;
264 default:
265 return -EINVAL;
266 }
267
268 /* commit/reject temporary image */
269 opal_flash_manage(op);
270 return count;
271 }
272
273 /*
274 * OPAL update flash
275 */
opal_flash_update(int op)276 static int opal_flash_update(int op)
277 {
278 struct opal_sg_list *list;
279 unsigned long addr;
280 int64_t rc = OPAL_PARAMETER;
281
282 if (op == FLASH_UPDATE_CANCEL) {
283 pr_alert("FLASH: Image update cancelled\n");
284 addr = '\0';
285 goto flash;
286 }
287
288 list = opal_vmalloc_to_sg_list(image_data.data, image_data.size);
289 if (!list)
290 goto invalid_img;
291
292 /* First entry address */
293 addr = __pa(list);
294
295 flash:
296 rc = opal_update_flash(addr);
297
298 invalid_img:
299 return rc;
300 }
301
302 /* This gets called just before system reboots */
opal_flash_update_print_message(void)303 void opal_flash_update_print_message(void)
304 {
305 if (update_flash_data.status != FLASH_IMG_READY)
306 return;
307
308 pr_alert("FLASH: Flashing new firmware\n");
309 pr_alert("FLASH: Image is %u bytes\n", image_data.size);
310 pr_alert("FLASH: Performing flash and reboot/shutdown\n");
311 pr_alert("FLASH: This will take several minutes. Do not power off!\n");
312
313 /* Small delay to help getting the above message out */
314 msleep(500);
315 }
316
317 /*
318 * Show candidate image status
319 */
update_show(struct kobject * kobj,struct kobj_attribute * attr,char * buf)320 static ssize_t update_show(struct kobject *kobj,
321 struct kobj_attribute *attr, char *buf)
322 {
323 struct update_flash_t *const args_buf = &update_flash_data;
324 return sprintf(buf, "%d\n", args_buf->status);
325 }
326
327 /*
328 * Set update image flag
329 * 1 - Flash new image
330 * 0 - Cancel flash request
331 */
update_store(struct kobject * kobj,struct kobj_attribute * attr,const char * buf,size_t count)332 static ssize_t update_store(struct kobject *kobj,
333 struct kobj_attribute *attr,
334 const char *buf, size_t count)
335 {
336 struct update_flash_t *const args_buf = &update_flash_data;
337 int rc = count;
338
339 mutex_lock(&image_data_mutex);
340
341 switch (buf[0]) {
342 case '0':
343 if (args_buf->status == FLASH_IMG_READY)
344 opal_flash_update(FLASH_UPDATE_CANCEL);
345 args_buf->status = FLASH_NO_OP;
346 break;
347 case '1':
348 /* Image is loaded? */
349 if (image_data.status == IMAGE_READY)
350 args_buf->status =
351 opal_flash_update(FLASH_UPDATE_INIT);
352 else
353 args_buf->status = FLASH_INVALID_IMG;
354 break;
355 default:
356 rc = -EINVAL;
357 }
358
359 mutex_unlock(&image_data_mutex);
360 return rc;
361 }
362
363 /*
364 * Free image buffer
365 */
free_image_buf(void)366 static void free_image_buf(void)
367 {
368 void *addr;
369 int size;
370
371 addr = image_data.data;
372 size = PAGE_ALIGN(image_data.size);
373 while (size > 0) {
374 ClearPageReserved(vmalloc_to_page(addr));
375 addr += PAGE_SIZE;
376 size -= PAGE_SIZE;
377 }
378 vfree(image_data.data);
379 image_data.data = NULL;
380 image_data.status = IMAGE_INVALID;
381 }
382
383 /*
384 * Allocate image buffer.
385 */
alloc_image_buf(char * buffer,size_t count)386 static int alloc_image_buf(char *buffer, size_t count)
387 {
388 void *addr;
389 int size;
390
391 if (count < sizeof(image_header)) {
392 pr_warn("FLASH: Invalid candidate image\n");
393 return -EINVAL;
394 }
395
396 memcpy(&image_header, (void *)buffer, sizeof(image_header));
397 image_data.size = be32_to_cpu(image_header.size);
398 pr_debug("FLASH: Candidate image size = %u\n", image_data.size);
399
400 if (image_data.size > MAX_IMAGE_SIZE) {
401 pr_warn("FLASH: Too large image\n");
402 return -EINVAL;
403 }
404 if (image_data.size < VALIDATE_BUF_SIZE) {
405 pr_warn("FLASH: Image is shorter than expected\n");
406 return -EINVAL;
407 }
408
409 image_data.data = vzalloc(PAGE_ALIGN(image_data.size));
410 if (!image_data.data) {
411 pr_err("%s : Failed to allocate memory\n", __func__);
412 return -ENOMEM;
413 }
414
415 /* Pin memory */
416 addr = image_data.data;
417 size = PAGE_ALIGN(image_data.size);
418 while (size > 0) {
419 SetPageReserved(vmalloc_to_page(addr));
420 addr += PAGE_SIZE;
421 size -= PAGE_SIZE;
422 }
423
424 image_data.status = IMAGE_LOADING;
425 return 0;
426 }
427
428 /*
429 * Copy candidate image
430 *
431 * Parse candidate image header to get total image size
432 * and pre-allocate required memory.
433 */
image_data_write(struct file * filp,struct kobject * kobj,struct bin_attribute * bin_attr,char * buffer,loff_t pos,size_t count)434 static ssize_t image_data_write(struct file *filp, struct kobject *kobj,
435 struct bin_attribute *bin_attr,
436 char *buffer, loff_t pos, size_t count)
437 {
438 int rc;
439
440 mutex_lock(&image_data_mutex);
441
442 /* New image ? */
443 if (pos == 0) {
444 /* Free memory, if already allocated */
445 if (image_data.data)
446 free_image_buf();
447
448 /* Cancel outstanding image update request */
449 if (update_flash_data.status == FLASH_IMG_READY)
450 opal_flash_update(FLASH_UPDATE_CANCEL);
451
452 /* Allocate memory */
453 rc = alloc_image_buf(buffer, count);
454 if (rc)
455 goto out;
456 }
457
458 if (image_data.status != IMAGE_LOADING) {
459 rc = -ENOMEM;
460 goto out;
461 }
462
463 if ((pos + count) > image_data.size) {
464 rc = -EINVAL;
465 goto out;
466 }
467
468 memcpy(image_data.data + pos, (void *)buffer, count);
469 rc = count;
470
471 /* Set image status */
472 if ((pos + count) == image_data.size) {
473 pr_debug("FLASH: Candidate image loaded....\n");
474 image_data.status = IMAGE_READY;
475 }
476
477 out:
478 mutex_unlock(&image_data_mutex);
479 return rc;
480 }
481
482 /*
483 * sysfs interface :
484 * OPAL uses below sysfs files for code update.
485 * We create these files under /sys/firmware/opal.
486 *
487 * image : Interface to load candidate firmware image
488 * validate_flash : Validate firmware image
489 * manage_flash : Commit/Reject firmware image
490 * update_flash : Flash new firmware image
491 *
492 */
493 static const struct bin_attribute image_data_attr = {
494 .attr = {.name = "image", .mode = 0200},
495 .size = MAX_IMAGE_SIZE, /* Limit image size */
496 .write = image_data_write,
497 };
498
499 static struct kobj_attribute validate_attribute =
500 __ATTR(validate_flash, 0600, validate_show, validate_store);
501
502 static struct kobj_attribute manage_attribute =
503 __ATTR(manage_flash, 0600, manage_show, manage_store);
504
505 static struct kobj_attribute update_attribute =
506 __ATTR(update_flash, 0600, update_show, update_store);
507
508 static struct attribute *image_op_attrs[] = {
509 &validate_attribute.attr,
510 &manage_attribute.attr,
511 &update_attribute.attr,
512 NULL /* need to NULL terminate the list of attributes */
513 };
514
515 static const struct attribute_group image_op_attr_group = {
516 .attrs = image_op_attrs,
517 };
518
opal_flash_update_init(void)519 void __init opal_flash_update_init(void)
520 {
521 int ret;
522
523 /* Firmware update is not supported by firmware */
524 if (!opal_check_token(OPAL_FLASH_VALIDATE))
525 return;
526
527 /* Allocate validate image buffer */
528 validate_flash_data.buf = kzalloc(VALIDATE_BUF_SIZE, GFP_KERNEL);
529 if (!validate_flash_data.buf) {
530 pr_err("%s : Failed to allocate memory\n", __func__);
531 return;
532 }
533
534 /* Make sure /sys/firmware/opal directory is created */
535 if (!opal_kobj) {
536 pr_warn("FLASH: opal kobject is not available\n");
537 goto nokobj;
538 }
539
540 /* Create the sysfs files */
541 ret = sysfs_create_group(opal_kobj, &image_op_attr_group);
542 if (ret) {
543 pr_warn("FLASH: Failed to create sysfs files\n");
544 goto nokobj;
545 }
546
547 ret = sysfs_create_bin_file(opal_kobj, &image_data_attr);
548 if (ret) {
549 pr_warn("FLASH: Failed to create sysfs files\n");
550 goto nosysfs_file;
551 }
552
553 /* Set default status */
554 validate_flash_data.status = FLASH_NO_OP;
555 manage_flash_data.status = FLASH_NO_OP;
556 update_flash_data.status = FLASH_NO_OP;
557 image_data.status = IMAGE_INVALID;
558 return;
559
560 nosysfs_file:
561 sysfs_remove_group(opal_kobj, &image_op_attr_group);
562
563 nokobj:
564 kfree(validate_flash_data.buf);
565 return;
566 }
567