1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (C) 2018-2019, Intel Corporation. */
3
4 #include <linux/unaligned.h>
5 #include <linux/crc32.h>
6 #include <linux/device.h>
7 #include <linux/firmware.h>
8 #include <linux/kernel.h>
9 #include <linux/module.h>
10 #include <linux/pci.h>
11 #include <linux/pldmfw.h>
12 #include <linux/slab.h>
13 #include <linux/uuid.h>
14
15 #include "pldmfw_private.h"
16
17 /* Internal structure used to store details about the PLDM image file as it is
18 * being validated and processed.
19 */
20 struct pldmfw_priv {
21 struct pldmfw *context;
22 const struct firmware *fw;
23
24 /* current offset of firmware image */
25 size_t offset;
26
27 struct list_head records;
28 struct list_head components;
29
30 /* PLDM Firmware Package Header */
31 const struct __pldm_header *header;
32 u16 total_header_size;
33
34 /* length of the component bitmap */
35 u16 component_bitmap_len;
36 u16 bitmap_size;
37
38 /* Start of the component image information */
39 u16 component_count;
40 const u8 *component_start;
41
42 /* Start pf the firmware device id records */
43 const u8 *record_start;
44 u8 record_count;
45
46 /* The CRC at the end of the package header */
47 u32 header_crc;
48
49 struct pldmfw_record *matching_record;
50 };
51
52 /**
53 * pldm_check_fw_space - Verify that the firmware image has space left
54 * @data: pointer to private data
55 * @offset: offset to start from
56 * @length: length to check for
57 *
58 * Verify that the firmware data can hold a chunk of bytes with the specified
59 * offset and length.
60 *
61 * Returns: zero on success, or -EFAULT if the image does not have enough
62 * space left to fit the expected length.
63 */
64 static int
pldm_check_fw_space(struct pldmfw_priv * data,size_t offset,size_t length)65 pldm_check_fw_space(struct pldmfw_priv *data, size_t offset, size_t length)
66 {
67 size_t expected_size = offset + length;
68 struct device *dev = data->context->dev;
69
70 if (data->fw->size < expected_size) {
71 dev_dbg(dev, "Firmware file size smaller than expected. Got %zu bytes, needed %zu bytes\n",
72 data->fw->size, expected_size);
73 return -EFAULT;
74 }
75
76 return 0;
77 }
78
79 /**
80 * pldm_move_fw_offset - Move the current firmware offset forward
81 * @data: pointer to private data
82 * @bytes_to_move: number of bytes to move the offset forward by
83 *
84 * Check that there is enough space past the current offset, and then move the
85 * offset forward by this amount.
86 *
87 * Returns: zero on success, or -EFAULT if the image is too small to fit the
88 * expected length.
89 */
90 static int
pldm_move_fw_offset(struct pldmfw_priv * data,size_t bytes_to_move)91 pldm_move_fw_offset(struct pldmfw_priv *data, size_t bytes_to_move)
92 {
93 int err;
94
95 err = pldm_check_fw_space(data, data->offset, bytes_to_move);
96 if (err)
97 return err;
98
99 data->offset += bytes_to_move;
100
101 return 0;
102 }
103
104 /**
105 * pldm_parse_header - Validate and extract details about the PLDM header
106 * @data: pointer to private data
107 *
108 * Performs initial basic verification of the PLDM image, up to the first
109 * firmware record.
110 *
111 * This includes the following checks and extractions
112 *
113 * * Verify that the UUID at the start of the header matches the expected
114 * value as defined in the DSP0267 PLDM specification
115 * * Check that the revision is 0x01
116 * * Extract the total header_size and verify that the image is large enough
117 * to contain at least the length of this header
118 * * Extract the size of the component bitmap length
119 * * Extract a pointer to the start of the record area
120 *
121 * Returns: zero on success, or a negative error code on failure.
122 */
pldm_parse_header(struct pldmfw_priv * data)123 static int pldm_parse_header(struct pldmfw_priv *data)
124 {
125 const struct __pldmfw_record_area *record_area;
126 struct device *dev = data->context->dev;
127 const struct __pldm_header *header;
128 size_t header_size;
129 int err;
130
131 err = pldm_move_fw_offset(data, sizeof(*header));
132 if (err)
133 return err;
134
135 header = (const struct __pldm_header *)data->fw->data;
136 data->header = header;
137
138 if (!uuid_equal(&header->id, &pldm_firmware_header_id)) {
139 dev_dbg(dev, "Invalid package header identifier. Expected UUID %pUB, but got %pUB\n",
140 &pldm_firmware_header_id, &header->id);
141 return -EINVAL;
142 }
143
144 if (header->revision != PACKAGE_HEADER_FORMAT_REVISION) {
145 dev_dbg(dev, "Invalid package header revision. Expected revision %u but got %u\n",
146 PACKAGE_HEADER_FORMAT_REVISION, header->revision);
147 return -EOPNOTSUPP;
148 }
149
150 data->total_header_size = get_unaligned_le16(&header->size);
151 header_size = data->total_header_size - sizeof(*header);
152
153 err = pldm_check_fw_space(data, data->offset, header_size);
154 if (err)
155 return err;
156
157 data->component_bitmap_len =
158 get_unaligned_le16(&header->component_bitmap_len);
159
160 if (data->component_bitmap_len % 8 != 0) {
161 dev_dbg(dev, "Invalid component bitmap length. The length is %u, which is not a multiple of 8\n",
162 data->component_bitmap_len);
163 return -EINVAL;
164 }
165
166 data->bitmap_size = data->component_bitmap_len / 8;
167
168 err = pldm_move_fw_offset(data, header->version_len);
169 if (err)
170 return err;
171
172 /* extract a pointer to the record area, which just follows the main
173 * PLDM header data.
174 */
175 record_area = (const struct __pldmfw_record_area *)(data->fw->data +
176 data->offset);
177
178 err = pldm_move_fw_offset(data, sizeof(*record_area));
179 if (err)
180 return err;
181
182 data->record_count = record_area->record_count;
183 data->record_start = record_area->records;
184
185 return 0;
186 }
187
188 /**
189 * pldm_check_desc_tlv_len - Check that the length matches expectation
190 * @data: pointer to image details
191 * @type: the descriptor type
192 * @size: the length from the descriptor header
193 *
194 * If the descriptor type is one of the documented descriptor types according
195 * to the standard, verify that the provided length matches.
196 *
197 * If the type is not recognized or is VENDOR_DEFINED, return zero.
198 *
199 * Returns: zero on success, or -EINVAL if the specified size of a standard
200 * TLV does not match the expected value defined for that TLV.
201 */
202 static int
pldm_check_desc_tlv_len(struct pldmfw_priv * data,u16 type,u16 size)203 pldm_check_desc_tlv_len(struct pldmfw_priv *data, u16 type, u16 size)
204 {
205 struct device *dev = data->context->dev;
206 u16 expected_size;
207
208 switch (type) {
209 case PLDM_DESC_ID_PCI_VENDOR_ID:
210 case PLDM_DESC_ID_PCI_DEVICE_ID:
211 case PLDM_DESC_ID_PCI_SUBVENDOR_ID:
212 case PLDM_DESC_ID_PCI_SUBDEV_ID:
213 expected_size = 2;
214 break;
215 case PLDM_DESC_ID_PCI_REVISION_ID:
216 expected_size = 1;
217 break;
218 case PLDM_DESC_ID_PNP_VENDOR_ID:
219 expected_size = 3;
220 break;
221 case PLDM_DESC_ID_IANA_ENTERPRISE_ID:
222 case PLDM_DESC_ID_ACPI_VENDOR_ID:
223 case PLDM_DESC_ID_PNP_PRODUCT_ID:
224 case PLDM_DESC_ID_ACPI_PRODUCT_ID:
225 expected_size = 4;
226 break;
227 case PLDM_DESC_ID_UUID:
228 expected_size = 16;
229 break;
230 case PLDM_DESC_ID_VENDOR_DEFINED:
231 return 0;
232 default:
233 /* Do not report an error on an unexpected TLV */
234 dev_dbg(dev, "Found unrecognized TLV type 0x%04x\n", type);
235 return 0;
236 }
237
238 if (size != expected_size) {
239 dev_dbg(dev, "Found TLV type 0x%04x with unexpected length. Got %u bytes, but expected %u bytes\n",
240 type, size, expected_size);
241 return -EINVAL;
242 }
243
244 return 0;
245 }
246
247 /**
248 * pldm_parse_desc_tlvs - Check and skip past a number of TLVs
249 * @data: pointer to private data
250 * @record: pointer to the record this TLV belongs too
251 * @desc_count: descriptor count
252 *
253 * From the current offset, read and extract the descriptor TLVs, updating the
254 * current offset each time.
255 *
256 * Returns: zero on success, or a negative error code on failure.
257 */
258 static int
pldm_parse_desc_tlvs(struct pldmfw_priv * data,struct pldmfw_record * record,u8 desc_count)259 pldm_parse_desc_tlvs(struct pldmfw_priv *data, struct pldmfw_record *record, u8 desc_count)
260 {
261 const struct __pldmfw_desc_tlv *__desc;
262 const u8 *desc_start;
263 u8 i;
264
265 desc_start = data->fw->data + data->offset;
266
267 pldm_for_each_desc_tlv(i, __desc, desc_start, desc_count) {
268 struct pldmfw_desc_tlv *desc;
269 int err;
270 u16 type, size;
271
272 err = pldm_move_fw_offset(data, sizeof(*__desc));
273 if (err)
274 return err;
275
276 type = get_unaligned_le16(&__desc->type);
277
278 /* According to DSP0267, this only includes the data field */
279 size = get_unaligned_le16(&__desc->size);
280
281 err = pldm_check_desc_tlv_len(data, type, size);
282 if (err)
283 return err;
284
285 /* check that we have space and move the offset forward */
286 err = pldm_move_fw_offset(data, size);
287 if (err)
288 return err;
289
290 desc = kzalloc(sizeof(*desc), GFP_KERNEL);
291 if (!desc)
292 return -ENOMEM;
293
294 desc->type = type;
295 desc->size = size;
296 desc->data = __desc->data;
297
298 list_add_tail(&desc->entry, &record->descs);
299 }
300
301 return 0;
302 }
303
304 /**
305 * pldm_parse_one_record - Verify size of one PLDM record
306 * @data: pointer to image details
307 * @__record: pointer to the record to check
308 *
309 * This function checks that the record size does not exceed either the size
310 * of the firmware file or the total length specified in the header section.
311 *
312 * It also verifies that the recorded length of the start of the record
313 * matches the size calculated by adding the static structure length, the
314 * component bitmap length, the version string length, the length of all
315 * descriptor TLVs, and the length of the package data.
316 *
317 * Returns: zero on success, or a negative error code on failure.
318 */
319 static int
pldm_parse_one_record(struct pldmfw_priv * data,const struct __pldmfw_record_info * __record)320 pldm_parse_one_record(struct pldmfw_priv *data,
321 const struct __pldmfw_record_info *__record)
322 {
323 struct pldmfw_record *record;
324 size_t measured_length;
325 int err;
326 const u8 *bitmap_ptr;
327 u16 record_len;
328 int i;
329
330 /* Make a copy and insert it into the record list */
331 record = kzalloc(sizeof(*record), GFP_KERNEL);
332 if (!record)
333 return -ENOMEM;
334
335 INIT_LIST_HEAD(&record->descs);
336 list_add_tail(&record->entry, &data->records);
337
338 /* Then check that we have space and move the offset */
339 err = pldm_move_fw_offset(data, sizeof(*__record));
340 if (err)
341 return err;
342
343 record_len = get_unaligned_le16(&__record->record_len);
344 record->package_data_len = get_unaligned_le16(&__record->package_data_len);
345 record->version_len = __record->version_len;
346 record->version_type = __record->version_type;
347
348 bitmap_ptr = data->fw->data + data->offset;
349
350 /* check that we have space for the component bitmap length */
351 err = pldm_move_fw_offset(data, data->bitmap_size);
352 if (err)
353 return err;
354
355 record->component_bitmap_len = data->component_bitmap_len;
356 record->component_bitmap = bitmap_zalloc(record->component_bitmap_len,
357 GFP_KERNEL);
358 if (!record->component_bitmap)
359 return -ENOMEM;
360
361 for (i = 0; i < data->bitmap_size; i++)
362 bitmap_set_value8(record->component_bitmap, bitmap_ptr[i], i * 8);
363
364 record->version_string = data->fw->data + data->offset;
365
366 err = pldm_move_fw_offset(data, record->version_len);
367 if (err)
368 return err;
369
370 /* Scan through the descriptor TLVs and find the end */
371 err = pldm_parse_desc_tlvs(data, record, __record->descriptor_count);
372 if (err)
373 return err;
374
375 record->package_data = data->fw->data + data->offset;
376
377 err = pldm_move_fw_offset(data, record->package_data_len);
378 if (err)
379 return err;
380
381 measured_length = data->offset - ((const u8 *)__record - data->fw->data);
382 if (measured_length != record_len) {
383 dev_dbg(data->context->dev, "Unexpected record length. Measured record length is %zu bytes, expected length is %u bytes\n",
384 measured_length, record_len);
385 return -EFAULT;
386 }
387
388 return 0;
389 }
390
391 /**
392 * pldm_parse_records - Locate the start of the component area
393 * @data: pointer to private data
394 *
395 * Extract the record count, and loop through each record, searching for the
396 * component area.
397 *
398 * Returns: zero on success, or a negative error code on failure.
399 */
pldm_parse_records(struct pldmfw_priv * data)400 static int pldm_parse_records(struct pldmfw_priv *data)
401 {
402 const struct __pldmfw_component_area *component_area;
403 const struct __pldmfw_record_info *record;
404 int err;
405 u8 i;
406
407 pldm_for_each_record(i, record, data->record_start, data->record_count) {
408 err = pldm_parse_one_record(data, record);
409 if (err)
410 return err;
411 }
412
413 /* Extract a pointer to the component area, which just follows the
414 * PLDM device record data.
415 */
416 component_area = (const struct __pldmfw_component_area *)(data->fw->data + data->offset);
417
418 err = pldm_move_fw_offset(data, sizeof(*component_area));
419 if (err)
420 return err;
421
422 data->component_count =
423 get_unaligned_le16(&component_area->component_image_count);
424 data->component_start = component_area->components;
425
426 return 0;
427 }
428
429 /**
430 * pldm_parse_components - Locate the CRC header checksum
431 * @data: pointer to private data
432 *
433 * Extract the component count, and find the pointer to the component area.
434 * Scan through each component searching for the end, which should point to
435 * the package header checksum.
436 *
437 * Extract the package header CRC and save it for verification.
438 *
439 * Returns: zero on success, or a negative error code on failure.
440 */
pldm_parse_components(struct pldmfw_priv * data)441 static int pldm_parse_components(struct pldmfw_priv *data)
442 {
443 const struct __pldmfw_component_info *__component;
444 struct device *dev = data->context->dev;
445 const u8 *header_crc_ptr;
446 int err;
447 u8 i;
448
449 pldm_for_each_component(i, __component, data->component_start, data->component_count) {
450 struct pldmfw_component *component;
451 u32 offset, size;
452
453 err = pldm_move_fw_offset(data, sizeof(*__component));
454 if (err)
455 return err;
456
457 err = pldm_move_fw_offset(data, __component->version_len);
458 if (err)
459 return err;
460
461 offset = get_unaligned_le32(&__component->location_offset);
462 size = get_unaligned_le32(&__component->size);
463
464 err = pldm_check_fw_space(data, offset, size);
465 if (err)
466 return err;
467
468 component = kzalloc(sizeof(*component), GFP_KERNEL);
469 if (!component)
470 return -ENOMEM;
471
472 component->index = i;
473 component->classification = get_unaligned_le16(&__component->classification);
474 component->identifier = get_unaligned_le16(&__component->identifier);
475 component->comparison_stamp = get_unaligned_le32(&__component->comparison_stamp);
476 component->options = get_unaligned_le16(&__component->options);
477 component->activation_method = get_unaligned_le16(&__component->activation_method);
478 component->version_type = __component->version_type;
479 component->version_len = __component->version_len;
480 component->version_string = __component->version_string;
481 component->component_data = data->fw->data + offset;
482 component->component_size = size;
483
484 if (data->context->mode == PLDMFW_UPDATE_MODE_SINGLE_COMPONENT &&
485 data->context->component_identifier != component->identifier)
486 continue;
487
488 list_add_tail(&component->entry, &data->components);
489 }
490
491 if (data->context->mode == PLDMFW_UPDATE_MODE_SINGLE_COMPONENT &&
492 list_empty(&data->components))
493 return -ENOENT;
494
495 header_crc_ptr = data->fw->data + data->offset;
496
497 err = pldm_move_fw_offset(data, sizeof(data->header_crc));
498 if (err)
499 return err;
500
501 /* Make sure that we reached the expected offset */
502 if (data->offset != data->total_header_size) {
503 dev_dbg(dev, "Invalid firmware header size. Expected %u but got %zu\n",
504 data->total_header_size, data->offset);
505 return -EFAULT;
506 }
507
508 data->header_crc = get_unaligned_le32(header_crc_ptr);
509
510 return 0;
511 }
512
513 /**
514 * pldm_verify_header_crc - Verify that the CRC in the header matches
515 * @data: pointer to private data
516 *
517 * Calculates the 32-bit CRC using the standard IEEE 802.3 CRC polynomial and
518 * compares it to the value stored in the header.
519 *
520 * Returns: zero on success if the CRC matches, or -EBADMSG on an invalid CRC.
521 */
pldm_verify_header_crc(struct pldmfw_priv * data)522 static int pldm_verify_header_crc(struct pldmfw_priv *data)
523 {
524 struct device *dev = data->context->dev;
525 u32 calculated_crc;
526 size_t length;
527
528 /* Calculate the 32-bit CRC of the header header contents up to but
529 * not including the checksum. Note that the Linux crc32_le function
530 * does not perform an expected final XOR.
531 */
532 length = data->offset - sizeof(data->header_crc);
533 calculated_crc = crc32_le(~0, data->fw->data, length) ^ ~0;
534
535 if (calculated_crc != data->header_crc) {
536 dev_dbg(dev, "Invalid CRC in firmware header. Got 0x%08x but expected 0x%08x\n",
537 calculated_crc, data->header_crc);
538 return -EBADMSG;
539 }
540
541 return 0;
542 }
543
544 /**
545 * pldmfw_free_priv - Free memory allocated while parsing the PLDM image
546 * @data: pointer to the PLDM data structure
547 *
548 * Loops through and clears all allocated memory associated with each
549 * allocated descriptor, record, and component.
550 */
pldmfw_free_priv(struct pldmfw_priv * data)551 static void pldmfw_free_priv(struct pldmfw_priv *data)
552 {
553 struct pldmfw_component *component, *c_safe;
554 struct pldmfw_record *record, *r_safe;
555 struct pldmfw_desc_tlv *desc, *d_safe;
556
557 list_for_each_entry_safe(component, c_safe, &data->components, entry) {
558 list_del(&component->entry);
559 kfree(component);
560 }
561
562 list_for_each_entry_safe(record, r_safe, &data->records, entry) {
563 list_for_each_entry_safe(desc, d_safe, &record->descs, entry) {
564 list_del(&desc->entry);
565 kfree(desc);
566 }
567
568 if (record->component_bitmap) {
569 bitmap_free(record->component_bitmap);
570 record->component_bitmap = NULL;
571 }
572
573 list_del(&record->entry);
574 kfree(record);
575 }
576 }
577
578 /**
579 * pldm_parse_image - parse and extract details from PLDM image
580 * @data: pointer to private data
581 *
582 * Verify that the firmware file contains valid data for a PLDM firmware
583 * file. Extract useful pointers and data from the firmware file and store
584 * them in the data structure.
585 *
586 * The PLDM firmware file format is defined in DMTF DSP0267 1.0.0. Care
587 * should be taken to use get_unaligned_le* when accessing data from the
588 * pointers in data.
589 *
590 * Returns: zero on success, or a negative error code on failure.
591 */
pldm_parse_image(struct pldmfw_priv * data)592 static int pldm_parse_image(struct pldmfw_priv *data)
593 {
594 int err;
595
596 if (WARN_ON(!(data->context->dev && data->fw->data && data->fw->size)))
597 return -EINVAL;
598
599 err = pldm_parse_header(data);
600 if (err)
601 return err;
602
603 err = pldm_parse_records(data);
604 if (err)
605 return err;
606
607 err = pldm_parse_components(data);
608 if (err)
609 return err;
610
611 return pldm_verify_header_crc(data);
612 }
613
614 /* these are u32 so that we can store PCI_ANY_ID */
615 struct pldm_pci_record_id {
616 int vendor;
617 int device;
618 int subsystem_vendor;
619 int subsystem_device;
620 };
621
622 /**
623 * pldmfw_op_pci_match_record - Check if a PCI device matches the record
624 * @context: PLDM fw update structure
625 * @record: list of records extracted from the PLDM image
626 *
627 * Determine of the PCI device associated with this device matches the record
628 * data provided.
629 *
630 * Searches the descriptor TLVs and extracts the relevant descriptor data into
631 * a pldm_pci_record_id. This is then compared against the PCI device ID
632 * information.
633 *
634 * Returns: true if the device matches the record, false otherwise.
635 */
pldmfw_op_pci_match_record(struct pldmfw * context,struct pldmfw_record * record)636 bool pldmfw_op_pci_match_record(struct pldmfw *context, struct pldmfw_record *record)
637 {
638 struct pci_dev *pdev = to_pci_dev(context->dev);
639 struct pldm_pci_record_id id = {
640 .vendor = PCI_ANY_ID,
641 .device = PCI_ANY_ID,
642 .subsystem_vendor = PCI_ANY_ID,
643 .subsystem_device = PCI_ANY_ID,
644 };
645 struct pldmfw_desc_tlv *desc;
646
647 list_for_each_entry(desc, &record->descs, entry) {
648 u16 value;
649 int *ptr;
650
651 switch (desc->type) {
652 case PLDM_DESC_ID_PCI_VENDOR_ID:
653 ptr = &id.vendor;
654 break;
655 case PLDM_DESC_ID_PCI_DEVICE_ID:
656 ptr = &id.device;
657 break;
658 case PLDM_DESC_ID_PCI_SUBVENDOR_ID:
659 ptr = &id.subsystem_vendor;
660 break;
661 case PLDM_DESC_ID_PCI_SUBDEV_ID:
662 ptr = &id.subsystem_device;
663 break;
664 default:
665 /* Skip unrelated TLVs */
666 continue;
667 }
668
669 value = get_unaligned_le16(desc->data);
670 /* A value of zero for one of the descriptors is sometimes
671 * used when the record should ignore this field when matching
672 * device. For example if the record applies to any subsystem
673 * device or vendor.
674 */
675 if (value)
676 *ptr = (int)value;
677 else
678 *ptr = PCI_ANY_ID;
679 }
680
681 if ((id.vendor == PCI_ANY_ID || id.vendor == pdev->vendor) &&
682 (id.device == PCI_ANY_ID || id.device == pdev->device) &&
683 (id.subsystem_vendor == PCI_ANY_ID || id.subsystem_vendor == pdev->subsystem_vendor) &&
684 (id.subsystem_device == PCI_ANY_ID || id.subsystem_device == pdev->subsystem_device))
685 return true;
686 else
687 return false;
688 }
689 EXPORT_SYMBOL(pldmfw_op_pci_match_record);
690
691 /**
692 * pldm_find_matching_record - Find the first matching PLDM record
693 * @data: pointer to private data
694 *
695 * Search through PLDM records and find the first matching entry. It is
696 * expected that only one entry matches.
697 *
698 * Store a pointer to the matching record, if found.
699 *
700 * Returns: zero on success, or -ENOENT if no matching record is found.
701 */
pldm_find_matching_record(struct pldmfw_priv * data)702 static int pldm_find_matching_record(struct pldmfw_priv *data)
703 {
704 struct pldmfw_record *record;
705
706 list_for_each_entry(record, &data->records, entry) {
707 if (data->context->ops->match_record(data->context, record)) {
708 data->matching_record = record;
709 return 0;
710 }
711 }
712
713 return -ENOENT;
714 }
715
716 /**
717 * pldm_send_package_data - Send firmware the package data for the record
718 * @data: pointer to private data
719 *
720 * Send the package data associated with the matching record to the firmware,
721 * using the send_pkg_data operation.
722 *
723 * Returns: zero on success, or a negative error code on failure.
724 */
725 static int
pldm_send_package_data(struct pldmfw_priv * data)726 pldm_send_package_data(struct pldmfw_priv *data)
727 {
728 struct pldmfw_record *record = data->matching_record;
729 const struct pldmfw_ops *ops = data->context->ops;
730
731 return ops->send_package_data(data->context, record->package_data,
732 record->package_data_len);
733 }
734
735 /**
736 * pldm_send_component_tables - Send component table information to firmware
737 * @data: pointer to private data
738 *
739 * Loop over each component, sending the applicable components to the firmware
740 * via the send_component_table operation.
741 *
742 * Returns: zero on success, or a negative error code on failure.
743 */
744 static int
pldm_send_component_tables(struct pldmfw_priv * data)745 pldm_send_component_tables(struct pldmfw_priv *data)
746 {
747 unsigned long *bitmap = data->matching_record->component_bitmap;
748 struct pldmfw_component *component;
749 int err;
750
751 list_for_each_entry(component, &data->components, entry) {
752 u8 index = component->index, transfer_flag = 0;
753
754 /* Skip components which are not intended for this device */
755 if (!test_bit(index, bitmap))
756 continue;
757
758 /* determine whether this is the start, middle, end, or both
759 * the start and end of the component tables
760 */
761 if (index == find_first_bit(bitmap, data->component_bitmap_len))
762 transfer_flag |= PLDM_TRANSFER_FLAG_START;
763 if (index == find_last_bit(bitmap, data->component_bitmap_len))
764 transfer_flag |= PLDM_TRANSFER_FLAG_END;
765 if (!transfer_flag)
766 transfer_flag = PLDM_TRANSFER_FLAG_MIDDLE;
767
768 err = data->context->ops->send_component_table(data->context,
769 component,
770 transfer_flag);
771 if (err)
772 return err;
773 }
774
775 return 0;
776 }
777
778 /**
779 * pldm_flash_components - Program each component to device flash
780 * @data: pointer to private data
781 *
782 * Loop through each component that is active for the matching device record,
783 * and send it to the device driver for flashing.
784 *
785 * Returns: zero on success, or a negative error code on failure.
786 */
pldm_flash_components(struct pldmfw_priv * data)787 static int pldm_flash_components(struct pldmfw_priv *data)
788 {
789 unsigned long *bitmap = data->matching_record->component_bitmap;
790 struct pldmfw_component *component;
791 int err;
792
793 list_for_each_entry(component, &data->components, entry) {
794 u8 index = component->index;
795
796 /* Skip components which are not intended for this device */
797 if (!test_bit(index, bitmap))
798 continue;
799
800 err = data->context->ops->flash_component(data->context, component);
801 if (err)
802 return err;
803 }
804
805 return 0;
806 }
807
808 /**
809 * pldm_finalize_update - Finalize the device flash update
810 * @data: pointer to private data
811 *
812 * Tell the device driver to perform any remaining logic to complete the
813 * device update.
814 *
815 * Returns: zero on success, or a PLFM_FWU error indicating the reason for
816 * failure.
817 */
pldm_finalize_update(struct pldmfw_priv * data)818 static int pldm_finalize_update(struct pldmfw_priv *data)
819 {
820 if (data->context->ops->finalize_update)
821 return data->context->ops->finalize_update(data->context);
822
823 return 0;
824 }
825
826 /**
827 * pldmfw_flash_image - Write a PLDM-formatted firmware image to the device
828 * @context: ops and data for firmware update
829 * @fw: firmware object pointing to the relevant firmware file to program
830 *
831 * Parse the data for a given firmware file, verifying that it is a valid PLDM
832 * formatted image that matches this device.
833 *
834 * Extract the device record Package Data and Component Tables and send them
835 * to the device firmware. Extract and write the flash data for each of the
836 * components indicated in the firmware file.
837 *
838 * Returns: zero on success, or a negative error code on failure.
839 */
pldmfw_flash_image(struct pldmfw * context,const struct firmware * fw)840 int pldmfw_flash_image(struct pldmfw *context, const struct firmware *fw)
841 {
842 struct pldmfw_priv *data;
843 int err;
844
845 data = kzalloc(sizeof(*data), GFP_KERNEL);
846 if (!data)
847 return -ENOMEM;
848
849 INIT_LIST_HEAD(&data->records);
850 INIT_LIST_HEAD(&data->components);
851
852 data->fw = fw;
853 data->context = context;
854
855 err = pldm_parse_image(data);
856 if (err)
857 goto out_release_data;
858
859 err = pldm_find_matching_record(data);
860 if (err)
861 goto out_release_data;
862
863 err = pldm_send_package_data(data);
864 if (err)
865 goto out_release_data;
866
867 err = pldm_send_component_tables(data);
868 if (err)
869 goto out_release_data;
870
871 err = pldm_flash_components(data);
872 if (err)
873 goto out_release_data;
874
875 err = pldm_finalize_update(data);
876
877 out_release_data:
878 pldmfw_free_priv(data);
879 kfree(data);
880
881 return err;
882 }
883 EXPORT_SYMBOL(pldmfw_flash_image);
884
885 MODULE_AUTHOR("Jacob Keller <[email protected]>");
886 MODULE_DESCRIPTION("PLDM firmware flash update library");
887