xref: /openbmc/linux/lib/test_firmware.c (revision 0b26ca68)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * This module provides an interface to trigger and test firmware loading.
4  *
5  * It is designed to be used for basic evaluation of the firmware loading
6  * subsystem (for example when validating firmware verification). It lacks
7  * any extra dependencies, and will not normally be loaded by the system
8  * unless explicitly requested by name.
9  */
10 
11 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
12 
13 #include <linux/init.h>
14 #include <linux/module.h>
15 #include <linux/printk.h>
16 #include <linux/completion.h>
17 #include <linux/firmware.h>
18 #include <linux/device.h>
19 #include <linux/fs.h>
20 #include <linux/miscdevice.h>
21 #include <linux/sizes.h>
22 #include <linux/slab.h>
23 #include <linux/uaccess.h>
24 #include <linux/delay.h>
25 #include <linux/kthread.h>
26 #include <linux/vmalloc.h>
27 #include <linux/efi_embedded_fw.h>
28 
29 MODULE_IMPORT_NS(TEST_FIRMWARE);
30 
31 #define TEST_FIRMWARE_NAME	"test-firmware.bin"
32 #define TEST_FIRMWARE_NUM_REQS	4
33 #define TEST_FIRMWARE_BUF_SIZE	SZ_1K
34 
35 static DEFINE_MUTEX(test_fw_mutex);
36 static const struct firmware *test_firmware;
37 
38 struct test_batched_req {
39 	u8 idx;
40 	int rc;
41 	bool sent;
42 	const struct firmware *fw;
43 	const char *name;
44 	struct completion completion;
45 	struct task_struct *task;
46 	struct device *dev;
47 };
48 
49 /**
50  * test_config - represents configuration for the test for different triggers
51  *
52  * @name: the name of the firmware file to look for
53  * @into_buf: when the into_buf is used if this is true
54  *	request_firmware_into_buf() will be used instead.
55  * @buf_size: size of buf to allocate when into_buf is true
56  * @file_offset: file offset to request when calling request_firmware_into_buf
57  * @partial: partial read opt when calling request_firmware_into_buf
58  * @sync_direct: when the sync trigger is used if this is true
59  *	request_firmware_direct() will be used instead.
60  * @send_uevent: whether or not to send a uevent for async requests
61  * @num_requests: number of requests to try per test case. This is trigger
62  *	specific.
63  * @reqs: stores all requests information
64  * @read_fw_idx: index of thread from which we want to read firmware results
65  *	from through the read_fw trigger.
66  * @test_result: a test may use this to collect the result from the call
67  *	of the request_firmware*() calls used in their tests. In order of
68  *	priority we always keep first any setup error. If no setup errors were
69  *	found then we move on to the first error encountered while running the
70  *	API. Note that for async calls this typically will be a successful
71  *	result (0) unless of course you've used bogus parameters, or the system
72  *	is out of memory.  In the async case the callback is expected to do a
73  *	bit more homework to figure out what happened, unfortunately the only
74  *	information passed today on error is the fact that no firmware was
75  *	found so we can only assume -ENOENT on async calls if the firmware is
76  *	NULL.
77  *
78  *	Errors you can expect:
79  *
80  *	API specific:
81  *
82  *	0:		success for sync, for async it means request was sent
83  *	-EINVAL:	invalid parameters or request
84  *	-ENOENT:	files not found
85  *
86  *	System environment:
87  *
88  *	-ENOMEM:	memory pressure on system
89  *	-ENODEV:	out of number of devices to test
90  *	-EINVAL:	an unexpected error has occurred
91  * @req_firmware: if @sync_direct is true this is set to
92  *	request_firmware_direct(), otherwise request_firmware()
93  */
94 struct test_config {
95 	char *name;
96 	bool into_buf;
97 	size_t buf_size;
98 	size_t file_offset;
99 	bool partial;
100 	bool sync_direct;
101 	bool send_uevent;
102 	u8 num_requests;
103 	u8 read_fw_idx;
104 
105 	/*
106 	 * These below don't belong her but we'll move them once we create
107 	 * a struct fw_test_device and stuff the misc_dev under there later.
108 	 */
109 	struct test_batched_req *reqs;
110 	int test_result;
111 	int (*req_firmware)(const struct firmware **fw, const char *name,
112 			    struct device *device);
113 };
114 
115 static struct test_config *test_fw_config;
116 
117 static ssize_t test_fw_misc_read(struct file *f, char __user *buf,
118 				 size_t size, loff_t *offset)
119 {
120 	ssize_t rc = 0;
121 
122 	mutex_lock(&test_fw_mutex);
123 	if (test_firmware)
124 		rc = simple_read_from_buffer(buf, size, offset,
125 					     test_firmware->data,
126 					     test_firmware->size);
127 	mutex_unlock(&test_fw_mutex);
128 	return rc;
129 }
130 
131 static const struct file_operations test_fw_fops = {
132 	.owner          = THIS_MODULE,
133 	.read           = test_fw_misc_read,
134 };
135 
136 static void __test_release_all_firmware(void)
137 {
138 	struct test_batched_req *req;
139 	u8 i;
140 
141 	if (!test_fw_config->reqs)
142 		return;
143 
144 	for (i = 0; i < test_fw_config->num_requests; i++) {
145 		req = &test_fw_config->reqs[i];
146 		if (req->fw)
147 			release_firmware(req->fw);
148 	}
149 
150 	vfree(test_fw_config->reqs);
151 	test_fw_config->reqs = NULL;
152 }
153 
154 static void test_release_all_firmware(void)
155 {
156 	mutex_lock(&test_fw_mutex);
157 	__test_release_all_firmware();
158 	mutex_unlock(&test_fw_mutex);
159 }
160 
161 
162 static void __test_firmware_config_free(void)
163 {
164 	__test_release_all_firmware();
165 	kfree_const(test_fw_config->name);
166 	test_fw_config->name = NULL;
167 }
168 
169 /*
170  * XXX: move to kstrncpy() once merged.
171  *
172  * Users should use kfree_const() when freeing these.
173  */
174 static int __kstrncpy(char **dst, const char *name, size_t count, gfp_t gfp)
175 {
176 	*dst = kstrndup(name, count, gfp);
177 	if (!*dst)
178 		return -ENOSPC;
179 	return count;
180 }
181 
182 static int __test_firmware_config_init(void)
183 {
184 	int ret;
185 
186 	ret = __kstrncpy(&test_fw_config->name, TEST_FIRMWARE_NAME,
187 			 strlen(TEST_FIRMWARE_NAME), GFP_KERNEL);
188 	if (ret < 0)
189 		goto out;
190 
191 	test_fw_config->num_requests = TEST_FIRMWARE_NUM_REQS;
192 	test_fw_config->send_uevent = true;
193 	test_fw_config->into_buf = false;
194 	test_fw_config->buf_size = TEST_FIRMWARE_BUF_SIZE;
195 	test_fw_config->file_offset = 0;
196 	test_fw_config->partial = false;
197 	test_fw_config->sync_direct = false;
198 	test_fw_config->req_firmware = request_firmware;
199 	test_fw_config->test_result = 0;
200 	test_fw_config->reqs = NULL;
201 
202 	return 0;
203 
204 out:
205 	__test_firmware_config_free();
206 	return ret;
207 }
208 
209 static ssize_t reset_store(struct device *dev,
210 			   struct device_attribute *attr,
211 			   const char *buf, size_t count)
212 {
213 	int ret;
214 
215 	mutex_lock(&test_fw_mutex);
216 
217 	__test_firmware_config_free();
218 
219 	ret = __test_firmware_config_init();
220 	if (ret < 0) {
221 		ret = -ENOMEM;
222 		pr_err("could not alloc settings for config trigger: %d\n",
223 		       ret);
224 		goto out;
225 	}
226 
227 	pr_info("reset\n");
228 	ret = count;
229 
230 out:
231 	mutex_unlock(&test_fw_mutex);
232 
233 	return ret;
234 }
235 static DEVICE_ATTR_WO(reset);
236 
237 static ssize_t config_show(struct device *dev,
238 			   struct device_attribute *attr,
239 			   char *buf)
240 {
241 	int len = 0;
242 
243 	mutex_lock(&test_fw_mutex);
244 
245 	len += scnprintf(buf, PAGE_SIZE - len,
246 			"Custom trigger configuration for: %s\n",
247 			dev_name(dev));
248 
249 	if (test_fw_config->name)
250 		len += scnprintf(buf + len, PAGE_SIZE - len,
251 				"name:\t%s\n",
252 				test_fw_config->name);
253 	else
254 		len += scnprintf(buf + len, PAGE_SIZE - len,
255 				"name:\tEMTPY\n");
256 
257 	len += scnprintf(buf + len, PAGE_SIZE - len,
258 			"num_requests:\t%u\n", test_fw_config->num_requests);
259 
260 	len += scnprintf(buf + len, PAGE_SIZE - len,
261 			"send_uevent:\t\t%s\n",
262 			test_fw_config->send_uevent ?
263 			"FW_ACTION_HOTPLUG" :
264 			"FW_ACTION_NOHOTPLUG");
265 	len += scnprintf(buf + len, PAGE_SIZE - len,
266 			"into_buf:\t\t%s\n",
267 			test_fw_config->into_buf ? "true" : "false");
268 	len += scnprintf(buf + len, PAGE_SIZE - len,
269 			"buf_size:\t%zu\n", test_fw_config->buf_size);
270 	len += scnprintf(buf + len, PAGE_SIZE - len,
271 			"file_offset:\t%zu\n", test_fw_config->file_offset);
272 	len += scnprintf(buf + len, PAGE_SIZE - len,
273 			"partial:\t\t%s\n",
274 			test_fw_config->partial ? "true" : "false");
275 	len += scnprintf(buf + len, PAGE_SIZE - len,
276 			"sync_direct:\t\t%s\n",
277 			test_fw_config->sync_direct ? "true" : "false");
278 	len += scnprintf(buf + len, PAGE_SIZE - len,
279 			"read_fw_idx:\t%u\n", test_fw_config->read_fw_idx);
280 
281 	mutex_unlock(&test_fw_mutex);
282 
283 	return len;
284 }
285 static DEVICE_ATTR_RO(config);
286 
287 static ssize_t config_name_store(struct device *dev,
288 				 struct device_attribute *attr,
289 				 const char *buf, size_t count)
290 {
291 	int ret;
292 
293 	mutex_lock(&test_fw_mutex);
294 	kfree_const(test_fw_config->name);
295 	ret = __kstrncpy(&test_fw_config->name, buf, count, GFP_KERNEL);
296 	mutex_unlock(&test_fw_mutex);
297 
298 	return ret;
299 }
300 
301 /*
302  * As per sysfs_kf_seq_show() the buf is max PAGE_SIZE.
303  */
304 static ssize_t config_test_show_str(char *dst,
305 				    char *src)
306 {
307 	int len;
308 
309 	mutex_lock(&test_fw_mutex);
310 	len = snprintf(dst, PAGE_SIZE, "%s\n", src);
311 	mutex_unlock(&test_fw_mutex);
312 
313 	return len;
314 }
315 
316 static int test_dev_config_update_bool(const char *buf, size_t size,
317 				       bool *cfg)
318 {
319 	int ret;
320 
321 	mutex_lock(&test_fw_mutex);
322 	if (strtobool(buf, cfg) < 0)
323 		ret = -EINVAL;
324 	else
325 		ret = size;
326 	mutex_unlock(&test_fw_mutex);
327 
328 	return ret;
329 }
330 
331 static ssize_t test_dev_config_show_bool(char *buf, bool val)
332 {
333 	return snprintf(buf, PAGE_SIZE, "%d\n", val);
334 }
335 
336 static int test_dev_config_update_size_t(const char *buf,
337 					 size_t size,
338 					 size_t *cfg)
339 {
340 	int ret;
341 	long new;
342 
343 	ret = kstrtol(buf, 10, &new);
344 	if (ret)
345 		return ret;
346 
347 	mutex_lock(&test_fw_mutex);
348 	*(size_t *)cfg = new;
349 	mutex_unlock(&test_fw_mutex);
350 
351 	/* Always return full write size even if we didn't consume all */
352 	return size;
353 }
354 
355 static ssize_t test_dev_config_show_size_t(char *buf, size_t val)
356 {
357 	return snprintf(buf, PAGE_SIZE, "%zu\n", val);
358 }
359 
360 static ssize_t test_dev_config_show_int(char *buf, int val)
361 {
362 	return snprintf(buf, PAGE_SIZE, "%d\n", val);
363 }
364 
365 static int test_dev_config_update_u8(const char *buf, size_t size, u8 *cfg)
366 {
367 	u8 val;
368 	int ret;
369 
370 	ret = kstrtou8(buf, 10, &val);
371 	if (ret)
372 		return ret;
373 
374 	mutex_lock(&test_fw_mutex);
375 	*(u8 *)cfg = val;
376 	mutex_unlock(&test_fw_mutex);
377 
378 	/* Always return full write size even if we didn't consume all */
379 	return size;
380 }
381 
382 static ssize_t test_dev_config_show_u8(char *buf, u8 val)
383 {
384 	return snprintf(buf, PAGE_SIZE, "%u\n", val);
385 }
386 
387 static ssize_t config_name_show(struct device *dev,
388 				struct device_attribute *attr,
389 				char *buf)
390 {
391 	return config_test_show_str(buf, test_fw_config->name);
392 }
393 static DEVICE_ATTR_RW(config_name);
394 
395 static ssize_t config_num_requests_store(struct device *dev,
396 					 struct device_attribute *attr,
397 					 const char *buf, size_t count)
398 {
399 	int rc;
400 
401 	mutex_lock(&test_fw_mutex);
402 	if (test_fw_config->reqs) {
403 		pr_err("Must call release_all_firmware prior to changing config\n");
404 		rc = -EINVAL;
405 		mutex_unlock(&test_fw_mutex);
406 		goto out;
407 	}
408 	mutex_unlock(&test_fw_mutex);
409 
410 	rc = test_dev_config_update_u8(buf, count,
411 				       &test_fw_config->num_requests);
412 
413 out:
414 	return rc;
415 }
416 
417 static ssize_t config_num_requests_show(struct device *dev,
418 					struct device_attribute *attr,
419 					char *buf)
420 {
421 	return test_dev_config_show_u8(buf, test_fw_config->num_requests);
422 }
423 static DEVICE_ATTR_RW(config_num_requests);
424 
425 static ssize_t config_into_buf_store(struct device *dev,
426 				     struct device_attribute *attr,
427 				     const char *buf, size_t count)
428 {
429 	return test_dev_config_update_bool(buf,
430 					   count,
431 					   &test_fw_config->into_buf);
432 }
433 
434 static ssize_t config_into_buf_show(struct device *dev,
435 				    struct device_attribute *attr,
436 				    char *buf)
437 {
438 	return test_dev_config_show_bool(buf, test_fw_config->into_buf);
439 }
440 static DEVICE_ATTR_RW(config_into_buf);
441 
442 static ssize_t config_buf_size_store(struct device *dev,
443 				     struct device_attribute *attr,
444 				     const char *buf, size_t count)
445 {
446 	int rc;
447 
448 	mutex_lock(&test_fw_mutex);
449 	if (test_fw_config->reqs) {
450 		pr_err("Must call release_all_firmware prior to changing config\n");
451 		rc = -EINVAL;
452 		mutex_unlock(&test_fw_mutex);
453 		goto out;
454 	}
455 	mutex_unlock(&test_fw_mutex);
456 
457 	rc = test_dev_config_update_size_t(buf, count,
458 					   &test_fw_config->buf_size);
459 
460 out:
461 	return rc;
462 }
463 
464 static ssize_t config_buf_size_show(struct device *dev,
465 				    struct device_attribute *attr,
466 				    char *buf)
467 {
468 	return test_dev_config_show_size_t(buf, test_fw_config->buf_size);
469 }
470 static DEVICE_ATTR_RW(config_buf_size);
471 
472 static ssize_t config_file_offset_store(struct device *dev,
473 					struct device_attribute *attr,
474 					const char *buf, size_t count)
475 {
476 	int rc;
477 
478 	mutex_lock(&test_fw_mutex);
479 	if (test_fw_config->reqs) {
480 		pr_err("Must call release_all_firmware prior to changing config\n");
481 		rc = -EINVAL;
482 		mutex_unlock(&test_fw_mutex);
483 		goto out;
484 	}
485 	mutex_unlock(&test_fw_mutex);
486 
487 	rc = test_dev_config_update_size_t(buf, count,
488 					   &test_fw_config->file_offset);
489 
490 out:
491 	return rc;
492 }
493 
494 static ssize_t config_file_offset_show(struct device *dev,
495 				       struct device_attribute *attr,
496 				       char *buf)
497 {
498 	return test_dev_config_show_size_t(buf, test_fw_config->file_offset);
499 }
500 static DEVICE_ATTR_RW(config_file_offset);
501 
502 static ssize_t config_partial_store(struct device *dev,
503 				    struct device_attribute *attr,
504 				    const char *buf, size_t count)
505 {
506 	return test_dev_config_update_bool(buf,
507 					   count,
508 					   &test_fw_config->partial);
509 }
510 
511 static ssize_t config_partial_show(struct device *dev,
512 				   struct device_attribute *attr,
513 				   char *buf)
514 {
515 	return test_dev_config_show_bool(buf, test_fw_config->partial);
516 }
517 static DEVICE_ATTR_RW(config_partial);
518 
519 static ssize_t config_sync_direct_store(struct device *dev,
520 					struct device_attribute *attr,
521 					const char *buf, size_t count)
522 {
523 	int rc = test_dev_config_update_bool(buf, count,
524 					     &test_fw_config->sync_direct);
525 
526 	if (rc == count)
527 		test_fw_config->req_firmware = test_fw_config->sync_direct ?
528 				       request_firmware_direct :
529 				       request_firmware;
530 	return rc;
531 }
532 
533 static ssize_t config_sync_direct_show(struct device *dev,
534 				       struct device_attribute *attr,
535 				       char *buf)
536 {
537 	return test_dev_config_show_bool(buf, test_fw_config->sync_direct);
538 }
539 static DEVICE_ATTR_RW(config_sync_direct);
540 
541 static ssize_t config_send_uevent_store(struct device *dev,
542 					struct device_attribute *attr,
543 					const char *buf, size_t count)
544 {
545 	return test_dev_config_update_bool(buf, count,
546 					   &test_fw_config->send_uevent);
547 }
548 
549 static ssize_t config_send_uevent_show(struct device *dev,
550 				       struct device_attribute *attr,
551 				       char *buf)
552 {
553 	return test_dev_config_show_bool(buf, test_fw_config->send_uevent);
554 }
555 static DEVICE_ATTR_RW(config_send_uevent);
556 
557 static ssize_t config_read_fw_idx_store(struct device *dev,
558 					struct device_attribute *attr,
559 					const char *buf, size_t count)
560 {
561 	return test_dev_config_update_u8(buf, count,
562 					 &test_fw_config->read_fw_idx);
563 }
564 
565 static ssize_t config_read_fw_idx_show(struct device *dev,
566 				       struct device_attribute *attr,
567 				       char *buf)
568 {
569 	return test_dev_config_show_u8(buf, test_fw_config->read_fw_idx);
570 }
571 static DEVICE_ATTR_RW(config_read_fw_idx);
572 
573 
574 static ssize_t trigger_request_store(struct device *dev,
575 				     struct device_attribute *attr,
576 				     const char *buf, size_t count)
577 {
578 	int rc;
579 	char *name;
580 
581 	name = kstrndup(buf, count, GFP_KERNEL);
582 	if (!name)
583 		return -ENOSPC;
584 
585 	pr_info("loading '%s'\n", name);
586 
587 	mutex_lock(&test_fw_mutex);
588 	release_firmware(test_firmware);
589 	test_firmware = NULL;
590 	rc = request_firmware(&test_firmware, name, dev);
591 	if (rc) {
592 		pr_info("load of '%s' failed: %d\n", name, rc);
593 		goto out;
594 	}
595 	pr_info("loaded: %zu\n", test_firmware->size);
596 	rc = count;
597 
598 out:
599 	mutex_unlock(&test_fw_mutex);
600 
601 	kfree(name);
602 
603 	return rc;
604 }
605 static DEVICE_ATTR_WO(trigger_request);
606 
607 #ifdef CONFIG_EFI_EMBEDDED_FIRMWARE
608 extern struct list_head efi_embedded_fw_list;
609 extern bool efi_embedded_fw_checked;
610 
611 static ssize_t trigger_request_platform_store(struct device *dev,
612 					      struct device_attribute *attr,
613 					      const char *buf, size_t count)
614 {
615 	static const u8 test_data[] = {
616 		0x55, 0xaa, 0x55, 0xaa, 0x01, 0x02, 0x03, 0x04,
617 		0x55, 0xaa, 0x55, 0xaa, 0x05, 0x06, 0x07, 0x08,
618 		0x55, 0xaa, 0x55, 0xaa, 0x10, 0x20, 0x30, 0x40,
619 		0x55, 0xaa, 0x55, 0xaa, 0x50, 0x60, 0x70, 0x80
620 	};
621 	struct efi_embedded_fw efi_embedded_fw;
622 	const struct firmware *firmware = NULL;
623 	bool saved_efi_embedded_fw_checked;
624 	char *name;
625 	int rc;
626 
627 	name = kstrndup(buf, count, GFP_KERNEL);
628 	if (!name)
629 		return -ENOSPC;
630 
631 	pr_info("inserting test platform fw '%s'\n", name);
632 	efi_embedded_fw.name = name;
633 	efi_embedded_fw.data = (void *)test_data;
634 	efi_embedded_fw.length = sizeof(test_data);
635 	list_add(&efi_embedded_fw.list, &efi_embedded_fw_list);
636 	saved_efi_embedded_fw_checked = efi_embedded_fw_checked;
637 	efi_embedded_fw_checked = true;
638 
639 	pr_info("loading '%s'\n", name);
640 	rc = firmware_request_platform(&firmware, name, dev);
641 	if (rc) {
642 		pr_info("load of '%s' failed: %d\n", name, rc);
643 		goto out;
644 	}
645 	if (firmware->size != sizeof(test_data) ||
646 	    memcmp(firmware->data, test_data, sizeof(test_data)) != 0) {
647 		pr_info("firmware contents mismatch for '%s'\n", name);
648 		rc = -EINVAL;
649 		goto out;
650 	}
651 	pr_info("loaded: %zu\n", firmware->size);
652 	rc = count;
653 
654 out:
655 	efi_embedded_fw_checked = saved_efi_embedded_fw_checked;
656 	release_firmware(firmware);
657 	list_del(&efi_embedded_fw.list);
658 	kfree(name);
659 
660 	return rc;
661 }
662 static DEVICE_ATTR_WO(trigger_request_platform);
663 #endif
664 
665 static DECLARE_COMPLETION(async_fw_done);
666 
667 static void trigger_async_request_cb(const struct firmware *fw, void *context)
668 {
669 	test_firmware = fw;
670 	complete(&async_fw_done);
671 }
672 
673 static ssize_t trigger_async_request_store(struct device *dev,
674 					   struct device_attribute *attr,
675 					   const char *buf, size_t count)
676 {
677 	int rc;
678 	char *name;
679 
680 	name = kstrndup(buf, count, GFP_KERNEL);
681 	if (!name)
682 		return -ENOSPC;
683 
684 	pr_info("loading '%s'\n", name);
685 
686 	mutex_lock(&test_fw_mutex);
687 	release_firmware(test_firmware);
688 	test_firmware = NULL;
689 	rc = request_firmware_nowait(THIS_MODULE, 1, name, dev, GFP_KERNEL,
690 				     NULL, trigger_async_request_cb);
691 	if (rc) {
692 		pr_info("async load of '%s' failed: %d\n", name, rc);
693 		kfree(name);
694 		goto out;
695 	}
696 	/* Free 'name' ASAP, to test for race conditions */
697 	kfree(name);
698 
699 	wait_for_completion(&async_fw_done);
700 
701 	if (test_firmware) {
702 		pr_info("loaded: %zu\n", test_firmware->size);
703 		rc = count;
704 	} else {
705 		pr_err("failed to async load firmware\n");
706 		rc = -ENOMEM;
707 	}
708 
709 out:
710 	mutex_unlock(&test_fw_mutex);
711 
712 	return rc;
713 }
714 static DEVICE_ATTR_WO(trigger_async_request);
715 
716 static ssize_t trigger_custom_fallback_store(struct device *dev,
717 					     struct device_attribute *attr,
718 					     const char *buf, size_t count)
719 {
720 	int rc;
721 	char *name;
722 
723 	name = kstrndup(buf, count, GFP_KERNEL);
724 	if (!name)
725 		return -ENOSPC;
726 
727 	pr_info("loading '%s' using custom fallback mechanism\n", name);
728 
729 	mutex_lock(&test_fw_mutex);
730 	release_firmware(test_firmware);
731 	test_firmware = NULL;
732 	rc = request_firmware_nowait(THIS_MODULE, FW_ACTION_NOHOTPLUG, name,
733 				     dev, GFP_KERNEL, NULL,
734 				     trigger_async_request_cb);
735 	if (rc) {
736 		pr_info("async load of '%s' failed: %d\n", name, rc);
737 		kfree(name);
738 		goto out;
739 	}
740 	/* Free 'name' ASAP, to test for race conditions */
741 	kfree(name);
742 
743 	wait_for_completion(&async_fw_done);
744 
745 	if (test_firmware) {
746 		pr_info("loaded: %zu\n", test_firmware->size);
747 		rc = count;
748 	} else {
749 		pr_err("failed to async load firmware\n");
750 		rc = -ENODEV;
751 	}
752 
753 out:
754 	mutex_unlock(&test_fw_mutex);
755 
756 	return rc;
757 }
758 static DEVICE_ATTR_WO(trigger_custom_fallback);
759 
760 static int test_fw_run_batch_request(void *data)
761 {
762 	struct test_batched_req *req = data;
763 
764 	if (!req) {
765 		test_fw_config->test_result = -EINVAL;
766 		return -EINVAL;
767 	}
768 
769 	if (test_fw_config->into_buf) {
770 		void *test_buf;
771 
772 		test_buf = kzalloc(TEST_FIRMWARE_BUF_SIZE, GFP_KERNEL);
773 		if (!test_buf)
774 			return -ENOSPC;
775 
776 		if (test_fw_config->partial)
777 			req->rc = request_partial_firmware_into_buf
778 						(&req->fw,
779 						 req->name,
780 						 req->dev,
781 						 test_buf,
782 						 test_fw_config->buf_size,
783 						 test_fw_config->file_offset);
784 		else
785 			req->rc = request_firmware_into_buf
786 						(&req->fw,
787 						 req->name,
788 						 req->dev,
789 						 test_buf,
790 						 test_fw_config->buf_size);
791 		if (!req->fw)
792 			kfree(test_buf);
793 	} else {
794 		req->rc = test_fw_config->req_firmware(&req->fw,
795 						       req->name,
796 						       req->dev);
797 	}
798 
799 	if (req->rc) {
800 		pr_info("#%u: batched sync load failed: %d\n",
801 			req->idx, req->rc);
802 		if (!test_fw_config->test_result)
803 			test_fw_config->test_result = req->rc;
804 	} else if (req->fw) {
805 		req->sent = true;
806 		pr_info("#%u: batched sync loaded %zu\n",
807 			req->idx, req->fw->size);
808 	}
809 	complete(&req->completion);
810 
811 	req->task = NULL;
812 
813 	return 0;
814 }
815 
816 /*
817  * We use a kthread as otherwise the kernel serializes all our sync requests
818  * and we would not be able to mimic batched requests on a sync call. Batched
819  * requests on a sync call can for instance happen on a device driver when
820  * multiple cards are used and firmware loading happens outside of probe.
821  */
822 static ssize_t trigger_batched_requests_store(struct device *dev,
823 					      struct device_attribute *attr,
824 					      const char *buf, size_t count)
825 {
826 	struct test_batched_req *req;
827 	int rc;
828 	u8 i;
829 
830 	mutex_lock(&test_fw_mutex);
831 
832 	test_fw_config->reqs =
833 		vzalloc(array3_size(sizeof(struct test_batched_req),
834 				    test_fw_config->num_requests, 2));
835 	if (!test_fw_config->reqs) {
836 		rc = -ENOMEM;
837 		goto out_unlock;
838 	}
839 
840 	pr_info("batched sync firmware loading '%s' %u times\n",
841 		test_fw_config->name, test_fw_config->num_requests);
842 
843 	for (i = 0; i < test_fw_config->num_requests; i++) {
844 		req = &test_fw_config->reqs[i];
845 		req->fw = NULL;
846 		req->idx = i;
847 		req->name = test_fw_config->name;
848 		req->dev = dev;
849 		init_completion(&req->completion);
850 		req->task = kthread_run(test_fw_run_batch_request, req,
851 					     "%s-%u", KBUILD_MODNAME, req->idx);
852 		if (!req->task || IS_ERR(req->task)) {
853 			pr_err("Setting up thread %u failed\n", req->idx);
854 			req->task = NULL;
855 			rc = -ENOMEM;
856 			goto out_bail;
857 		}
858 	}
859 
860 	rc = count;
861 
862 	/*
863 	 * We require an explicit release to enable more time and delay of
864 	 * calling release_firmware() to improve our chances of forcing a
865 	 * batched request. If we instead called release_firmware() right away
866 	 * then we might miss on an opportunity of having a successful firmware
867 	 * request pass on the opportunity to be come a batched request.
868 	 */
869 
870 out_bail:
871 	for (i = 0; i < test_fw_config->num_requests; i++) {
872 		req = &test_fw_config->reqs[i];
873 		if (req->task || req->sent)
874 			wait_for_completion(&req->completion);
875 	}
876 
877 	/* Override any worker error if we had a general setup error */
878 	if (rc < 0)
879 		test_fw_config->test_result = rc;
880 
881 out_unlock:
882 	mutex_unlock(&test_fw_mutex);
883 
884 	return rc;
885 }
886 static DEVICE_ATTR_WO(trigger_batched_requests);
887 
888 /*
889  * We wait for each callback to return with the lock held, no need to lock here
890  */
891 static void trigger_batched_cb(const struct firmware *fw, void *context)
892 {
893 	struct test_batched_req *req = context;
894 
895 	if (!req) {
896 		test_fw_config->test_result = -EINVAL;
897 		return;
898 	}
899 
900 	/* forces *some* batched requests to queue up */
901 	if (!req->idx)
902 		ssleep(2);
903 
904 	req->fw = fw;
905 
906 	/*
907 	 * Unfortunately the firmware API gives us nothing other than a null FW
908 	 * if the firmware was not found on async requests.  Best we can do is
909 	 * just assume -ENOENT. A better API would pass the actual return
910 	 * value to the callback.
911 	 */
912 	if (!fw && !test_fw_config->test_result)
913 		test_fw_config->test_result = -ENOENT;
914 
915 	complete(&req->completion);
916 }
917 
918 static
919 ssize_t trigger_batched_requests_async_store(struct device *dev,
920 					     struct device_attribute *attr,
921 					     const char *buf, size_t count)
922 {
923 	struct test_batched_req *req;
924 	bool send_uevent;
925 	int rc;
926 	u8 i;
927 
928 	mutex_lock(&test_fw_mutex);
929 
930 	test_fw_config->reqs =
931 		vzalloc(array3_size(sizeof(struct test_batched_req),
932 				    test_fw_config->num_requests, 2));
933 	if (!test_fw_config->reqs) {
934 		rc = -ENOMEM;
935 		goto out;
936 	}
937 
938 	pr_info("batched loading '%s' custom fallback mechanism %u times\n",
939 		test_fw_config->name, test_fw_config->num_requests);
940 
941 	send_uevent = test_fw_config->send_uevent ? FW_ACTION_HOTPLUG :
942 		FW_ACTION_NOHOTPLUG;
943 
944 	for (i = 0; i < test_fw_config->num_requests; i++) {
945 		req = &test_fw_config->reqs[i];
946 		req->name = test_fw_config->name;
947 		req->fw = NULL;
948 		req->idx = i;
949 		init_completion(&req->completion);
950 		rc = request_firmware_nowait(THIS_MODULE, send_uevent,
951 					     req->name,
952 					     dev, GFP_KERNEL, req,
953 					     trigger_batched_cb);
954 		if (rc) {
955 			pr_info("#%u: batched async load failed setup: %d\n",
956 				i, rc);
957 			req->rc = rc;
958 			goto out_bail;
959 		} else
960 			req->sent = true;
961 	}
962 
963 	rc = count;
964 
965 out_bail:
966 
967 	/*
968 	 * We require an explicit release to enable more time and delay of
969 	 * calling release_firmware() to improve our chances of forcing a
970 	 * batched request. If we instead called release_firmware() right away
971 	 * then we might miss on an opportunity of having a successful firmware
972 	 * request pass on the opportunity to be come a batched request.
973 	 */
974 
975 	for (i = 0; i < test_fw_config->num_requests; i++) {
976 		req = &test_fw_config->reqs[i];
977 		if (req->sent)
978 			wait_for_completion(&req->completion);
979 	}
980 
981 	/* Override any worker error if we had a general setup error */
982 	if (rc < 0)
983 		test_fw_config->test_result = rc;
984 
985 out:
986 	mutex_unlock(&test_fw_mutex);
987 
988 	return rc;
989 }
990 static DEVICE_ATTR_WO(trigger_batched_requests_async);
991 
992 static ssize_t test_result_show(struct device *dev,
993 				struct device_attribute *attr,
994 				char *buf)
995 {
996 	return test_dev_config_show_int(buf, test_fw_config->test_result);
997 }
998 static DEVICE_ATTR_RO(test_result);
999 
1000 static ssize_t release_all_firmware_store(struct device *dev,
1001 					  struct device_attribute *attr,
1002 					  const char *buf, size_t count)
1003 {
1004 	test_release_all_firmware();
1005 	return count;
1006 }
1007 static DEVICE_ATTR_WO(release_all_firmware);
1008 
1009 static ssize_t read_firmware_show(struct device *dev,
1010 				  struct device_attribute *attr,
1011 				  char *buf)
1012 {
1013 	struct test_batched_req *req;
1014 	u8 idx;
1015 	ssize_t rc = 0;
1016 
1017 	mutex_lock(&test_fw_mutex);
1018 
1019 	idx = test_fw_config->read_fw_idx;
1020 	if (idx >= test_fw_config->num_requests) {
1021 		rc = -ERANGE;
1022 		goto out;
1023 	}
1024 
1025 	if (!test_fw_config->reqs) {
1026 		rc = -EINVAL;
1027 		goto out;
1028 	}
1029 
1030 	req = &test_fw_config->reqs[idx];
1031 	if (!req->fw) {
1032 		pr_err("#%u: failed to async load firmware\n", idx);
1033 		rc = -ENOENT;
1034 		goto out;
1035 	}
1036 
1037 	pr_info("#%u: loaded %zu\n", idx, req->fw->size);
1038 
1039 	if (req->fw->size > PAGE_SIZE) {
1040 		pr_err("Testing interface must use PAGE_SIZE firmware for now\n");
1041 		rc = -EINVAL;
1042 		goto out;
1043 	}
1044 	memcpy(buf, req->fw->data, req->fw->size);
1045 
1046 	rc = req->fw->size;
1047 out:
1048 	mutex_unlock(&test_fw_mutex);
1049 
1050 	return rc;
1051 }
1052 static DEVICE_ATTR_RO(read_firmware);
1053 
1054 #define TEST_FW_DEV_ATTR(name)          &dev_attr_##name.attr
1055 
1056 static struct attribute *test_dev_attrs[] = {
1057 	TEST_FW_DEV_ATTR(reset),
1058 
1059 	TEST_FW_DEV_ATTR(config),
1060 	TEST_FW_DEV_ATTR(config_name),
1061 	TEST_FW_DEV_ATTR(config_num_requests),
1062 	TEST_FW_DEV_ATTR(config_into_buf),
1063 	TEST_FW_DEV_ATTR(config_buf_size),
1064 	TEST_FW_DEV_ATTR(config_file_offset),
1065 	TEST_FW_DEV_ATTR(config_partial),
1066 	TEST_FW_DEV_ATTR(config_sync_direct),
1067 	TEST_FW_DEV_ATTR(config_send_uevent),
1068 	TEST_FW_DEV_ATTR(config_read_fw_idx),
1069 
1070 	/* These don't use the config at all - they could be ported! */
1071 	TEST_FW_DEV_ATTR(trigger_request),
1072 	TEST_FW_DEV_ATTR(trigger_async_request),
1073 	TEST_FW_DEV_ATTR(trigger_custom_fallback),
1074 #ifdef CONFIG_EFI_EMBEDDED_FIRMWARE
1075 	TEST_FW_DEV_ATTR(trigger_request_platform),
1076 #endif
1077 
1078 	/* These use the config and can use the test_result */
1079 	TEST_FW_DEV_ATTR(trigger_batched_requests),
1080 	TEST_FW_DEV_ATTR(trigger_batched_requests_async),
1081 
1082 	TEST_FW_DEV_ATTR(release_all_firmware),
1083 	TEST_FW_DEV_ATTR(test_result),
1084 	TEST_FW_DEV_ATTR(read_firmware),
1085 	NULL,
1086 };
1087 
1088 ATTRIBUTE_GROUPS(test_dev);
1089 
1090 static struct miscdevice test_fw_misc_device = {
1091 	.minor          = MISC_DYNAMIC_MINOR,
1092 	.name           = "test_firmware",
1093 	.fops           = &test_fw_fops,
1094 	.groups 	= test_dev_groups,
1095 };
1096 
1097 static int __init test_firmware_init(void)
1098 {
1099 	int rc;
1100 
1101 	test_fw_config = kzalloc(sizeof(struct test_config), GFP_KERNEL);
1102 	if (!test_fw_config)
1103 		return -ENOMEM;
1104 
1105 	rc = __test_firmware_config_init();
1106 	if (rc) {
1107 		kfree(test_fw_config);
1108 		pr_err("could not init firmware test config: %d\n", rc);
1109 		return rc;
1110 	}
1111 
1112 	rc = misc_register(&test_fw_misc_device);
1113 	if (rc) {
1114 		kfree(test_fw_config);
1115 		pr_err("could not register misc device: %d\n", rc);
1116 		return rc;
1117 	}
1118 
1119 	pr_warn("interface ready\n");
1120 
1121 	return 0;
1122 }
1123 
1124 module_init(test_firmware_init);
1125 
1126 static void __exit test_firmware_exit(void)
1127 {
1128 	mutex_lock(&test_fw_mutex);
1129 	release_firmware(test_firmware);
1130 	misc_deregister(&test_fw_misc_device);
1131 	__test_firmware_config_free();
1132 	kfree(test_fw_config);
1133 	mutex_unlock(&test_fw_mutex);
1134 
1135 	pr_warn("removed interface\n");
1136 }
1137 
1138 module_exit(test_firmware_exit);
1139 
1140 MODULE_AUTHOR("Kees Cook <keescook@chromium.org>");
1141 MODULE_LICENSE("GPL");
1142