firmload.c revision 1.6 1 1.6 christos /* $NetBSD: firmload.c,v 1.6 2006/11/16 01:32:45 christos Exp $ */
2 1.1 thorpej
3 1.1 thorpej /*-
4 1.1 thorpej * Copyright (c) 2005, 2006 The NetBSD Foundation, Inc.
5 1.1 thorpej * All rights reserved.
6 1.1 thorpej *
7 1.1 thorpej * This code is derived from software contributed to The NetBSD Foundation
8 1.1 thorpej * by Jason R. Thorpe.
9 1.1 thorpej *
10 1.1 thorpej * Redistribution and use in source and binary forms, with or without
11 1.1 thorpej * modification, are permitted provided that the following conditions
12 1.1 thorpej * are met:
13 1.1 thorpej * 1. Redistributions of source code must retain the above copyright
14 1.1 thorpej * notice, this list of conditions and the following disclaimer.
15 1.1 thorpej * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 thorpej * notice, this list of conditions and the following disclaimer in the
17 1.1 thorpej * documentation and/or other materials provided with the distribution.
18 1.1 thorpej * 3. All advertising materials mentioning features or use of this software
19 1.1 thorpej * must display the following acknowledgement:
20 1.1 thorpej * This product includes software developed by the NetBSD
21 1.1 thorpej * Foundation, Inc. and its contributors.
22 1.1 thorpej * 4. Neither the name of The NetBSD Foundation nor the names of its
23 1.1 thorpej * contributors may be used to endorse or promote products derived
24 1.1 thorpej * from this software without specific prior written permission.
25 1.1 thorpej *
26 1.1 thorpej * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 1.1 thorpej * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 1.1 thorpej * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 1.1 thorpej * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 1.1 thorpej * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 1.1 thorpej * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 1.1 thorpej * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 1.1 thorpej * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 1.1 thorpej * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 1.1 thorpej * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 1.1 thorpej * POSSIBILITY OF SUCH DAMAGE.
37 1.1 thorpej */
38 1.1 thorpej
39 1.1 thorpej #include <sys/cdefs.h>
40 1.6 christos __KERNEL_RCSID(0, "$NetBSD: firmload.c,v 1.6 2006/11/16 01:32:45 christos Exp $");
41 1.1 thorpej
42 1.1 thorpej /*
43 1.1 thorpej * The firmload API provides an interface for device drivers to access
44 1.1 thorpej * firmware images that must be loaded onto their devices.
45 1.1 thorpej */
46 1.1 thorpej
47 1.1 thorpej #include <sys/param.h>
48 1.1 thorpej #include <sys/fcntl.h>
49 1.1 thorpej #include <sys/malloc.h>
50 1.1 thorpej #include <sys/namei.h>
51 1.1 thorpej #include <sys/systm.h>
52 1.1 thorpej #include <sys/sysctl.h>
53 1.1 thorpej #include <sys/vnode.h>
54 1.3 elad #include <sys/kauth.h>
55 1.1 thorpej
56 1.1 thorpej #include <dev/firmload.h>
57 1.1 thorpej
58 1.1 thorpej static MALLOC_DEFINE(M_DEVFIRM, "devfirm", "device firmware buffers");
59 1.1 thorpej
60 1.1 thorpej struct firmware_handle {
61 1.1 thorpej struct vnode *fh_vp;
62 1.1 thorpej off_t fh_size;
63 1.1 thorpej };
64 1.1 thorpej
65 1.1 thorpej static firmware_handle_t
66 1.1 thorpej firmware_handle_alloc(void)
67 1.1 thorpej {
68 1.1 thorpej
69 1.1 thorpej return (malloc(sizeof(struct firmware_handle), M_DEVFIRM, M_WAITOK));
70 1.1 thorpej }
71 1.1 thorpej
72 1.1 thorpej static void
73 1.1 thorpej firmware_handle_free(firmware_handle_t fh)
74 1.1 thorpej {
75 1.1 thorpej
76 1.1 thorpej free(fh, M_DEVFIRM);
77 1.1 thorpej }
78 1.1 thorpej
79 1.1 thorpej #if !defined(FIRMWARE_PATHS)
80 1.1 thorpej #define FIRMWARE_PATHS \
81 1.2 rpaulo "/libdata/firmware:/usr/libdata/firmware:/usr/pkg/libdata/firmware:/usr/pkg/libdata"
82 1.1 thorpej #endif
83 1.1 thorpej
84 1.1 thorpej static char firmware_paths[PATH_MAX+1] = FIRMWARE_PATHS;
85 1.1 thorpej
86 1.1 thorpej static int
87 1.1 thorpej sysctl_hw_firmware_path(SYSCTLFN_ARGS)
88 1.1 thorpej {
89 1.1 thorpej int error, i;
90 1.1 thorpej char newpath[PATH_MAX+1];
91 1.1 thorpej struct sysctlnode node;
92 1.1 thorpej char expected_char;
93 1.1 thorpej
94 1.1 thorpej node = *rnode;
95 1.1 thorpej node.sysctl_data = &newpath[0];
96 1.1 thorpej memcpy(node.sysctl_data, rnode->sysctl_data, PATH_MAX+1);
97 1.1 thorpej error = sysctl_lookup(SYSCTLFN_CALL(&node));
98 1.1 thorpej if (error || newp == NULL)
99 1.1 thorpej return (error);
100 1.1 thorpej
101 1.1 thorpej /*
102 1.1 thorpej * Make sure that all of the paths in the new path list are
103 1.1 thorpej * absolute.
104 1.1 thorpej *
105 1.1 thorpej * When sysctl_lookup() deals with a string, it's guaranteed
106 1.1 thorpej * to come back nul-terminated.
107 1.1 thorpej */
108 1.1 thorpej expected_char = '/';
109 1.1 thorpej for (i = 0; i < PATH_MAX+1; i++) {
110 1.1 thorpej if (expected_char != 0 && newpath[i] != expected_char)
111 1.1 thorpej return (EINVAL);
112 1.1 thorpej if (newpath[i] == '\0')
113 1.1 thorpej break;
114 1.1 thorpej else if (newpath[i] == ':')
115 1.1 thorpej expected_char = '/';
116 1.1 thorpej else
117 1.1 thorpej expected_char = 0;
118 1.1 thorpej }
119 1.1 thorpej
120 1.1 thorpej memcpy(rnode->sysctl_data, node.sysctl_data, PATH_MAX+1);
121 1.1 thorpej
122 1.1 thorpej return (0);
123 1.1 thorpej }
124 1.1 thorpej
125 1.1 thorpej SYSCTL_SETUP_PROTO(sysctl_hw_firmware_setup);
126 1.1 thorpej
127 1.1 thorpej SYSCTL_SETUP(sysctl_hw_firmware_setup, "sysctl hw.firmware subtree setup")
128 1.1 thorpej {
129 1.1 thorpej const struct sysctlnode *firmware_node;
130 1.1 thorpej
131 1.1 thorpej if (sysctl_createv(clog, 0, NULL, NULL,
132 1.1 thorpej CTLFLAG_PERMANENT,
133 1.1 thorpej CTLTYPE_NODE, "hw", NULL,
134 1.1 thorpej NULL, 0, NULL, 0,
135 1.1 thorpej CTL_HW, CTL_EOL) != 0)
136 1.1 thorpej return;
137 1.1 thorpej
138 1.1 thorpej if (sysctl_createv(clog, 0, NULL, &firmware_node,
139 1.1 thorpej CTLFLAG_PERMANENT,
140 1.1 thorpej CTLTYPE_NODE, "firmware", NULL,
141 1.1 thorpej NULL, 0, NULL, 0,
142 1.1 thorpej CTL_HW, CTL_CREATE, CTL_EOL) != 0)
143 1.1 thorpej return;
144 1.1 thorpej
145 1.1 thorpej sysctl_createv(clog, 0, NULL, NULL,
146 1.1 thorpej CTLFLAG_READWRITE,
147 1.1 thorpej CTLTYPE_STRING, "path",
148 1.1 thorpej SYSCTL_DESCR("Device firmware loading path list"),
149 1.1 thorpej sysctl_hw_firmware_path, 0, firmware_paths, PATH_MAX+1,
150 1.1 thorpej CTL_HW, firmware_node->sysctl_num, CTL_CREATE, CTL_EOL);
151 1.1 thorpej }
152 1.1 thorpej
153 1.1 thorpej static char *
154 1.1 thorpej firmware_path_next(const char *drvname, const char *imgname, char *pnbuf,
155 1.1 thorpej char **prefixp)
156 1.1 thorpej {
157 1.1 thorpej char *prefix = *prefixp;
158 1.1 thorpej size_t maxprefix, i;
159 1.1 thorpej
160 1.1 thorpej if (prefix == NULL /* terminated early */
161 1.1 thorpej || *prefix == '\0' /* no more left */
162 1.1 thorpej || *prefix != '/') { /* not absolute */
163 1.1 thorpej *prefixp = NULL;
164 1.1 thorpej return (NULL);
165 1.1 thorpej }
166 1.1 thorpej
167 1.1 thorpej /*
168 1.1 thorpej * Compute the max path prefix based on the length of the provided
169 1.1 thorpej * names.
170 1.1 thorpej */
171 1.1 thorpej maxprefix = MAXPATHLEN -
172 1.1 thorpej (1 /* / */
173 1.1 thorpej + strlen(drvname)
174 1.1 thorpej + 1 /* / */
175 1.1 thorpej + strlen(imgname)
176 1.1 thorpej + 1 /* terminating NUL */);
177 1.1 thorpej
178 1.1 thorpej /* Check for underflow (size_t is unsigned). */
179 1.1 thorpej if (maxprefix > MAXPATHLEN) {
180 1.1 thorpej *prefixp = NULL;
181 1.1 thorpej return (NULL);
182 1.1 thorpej }
183 1.1 thorpej
184 1.1 thorpej for (i = 0; i < maxprefix; i++) {
185 1.1 thorpej if (*prefix == ':' || *prefix == '\0')
186 1.1 thorpej break;
187 1.1 thorpej pnbuf[i] = *prefix++;
188 1.1 thorpej }
189 1.1 thorpej
190 1.1 thorpej if (*prefix != ':' && *prefix != '\0') {
191 1.1 thorpej /* Path prefix was too long. */
192 1.1 thorpej *prefixp = NULL;
193 1.1 thorpej return (NULL);
194 1.1 thorpej }
195 1.1 thorpej
196 1.1 thorpej if (*prefix != '\0')
197 1.1 thorpej prefix++;
198 1.1 thorpej *prefixp = prefix;
199 1.1 thorpej
200 1.1 thorpej /*
201 1.1 thorpej * This sprintf() is safe because of the maxprefix calculation
202 1.1 thorpej * performed above.
203 1.1 thorpej */
204 1.1 thorpej sprintf(&pnbuf[i], "/%s/%s", drvname, imgname);
205 1.1 thorpej
206 1.1 thorpej return (pnbuf);
207 1.1 thorpej }
208 1.1 thorpej
209 1.1 thorpej static char *
210 1.1 thorpej firmware_path_first(const char *drvname, const char *imgname, char *pnbuf,
211 1.1 thorpej char **prefixp)
212 1.1 thorpej {
213 1.1 thorpej
214 1.1 thorpej *prefixp = firmware_paths;
215 1.1 thorpej return (firmware_path_next(drvname, imgname, pnbuf, prefixp));
216 1.1 thorpej }
217 1.1 thorpej
218 1.1 thorpej /*
219 1.1 thorpej * firmware_open:
220 1.1 thorpej *
221 1.1 thorpej * Open a firmware image and return its handle.
222 1.1 thorpej */
223 1.1 thorpej int
224 1.1 thorpej firmware_open(const char *drvname, const char *imgname, firmware_handle_t *fhp)
225 1.1 thorpej {
226 1.1 thorpej struct nameidata nd;
227 1.1 thorpej struct vattr va;
228 1.1 thorpej char *pnbuf, *path, *prefix;
229 1.1 thorpej firmware_handle_t fh;
230 1.1 thorpej struct vnode *vp;
231 1.1 thorpej int error;
232 1.1 thorpej
233 1.1 thorpej if (drvname == NULL || imgname == NULL)
234 1.1 thorpej return (EINVAL);
235 1.1 thorpej
236 1.1 thorpej pnbuf = PNBUF_GET();
237 1.1 thorpej KASSERT(pnbuf != NULL);
238 1.1 thorpej
239 1.1 thorpej fh = firmware_handle_alloc();
240 1.1 thorpej KASSERT(fh != NULL);
241 1.1 thorpej
242 1.1 thorpej error = 0;
243 1.1 thorpej for (path = firmware_path_first(drvname, imgname, pnbuf, &prefix);
244 1.1 thorpej path != NULL;
245 1.1 thorpej path = firmware_path_next(drvname, imgname, pnbuf, &prefix)) {
246 1.1 thorpej NDINIT(&nd, LOOKUP, FOLLOW, UIO_SYSSPACE, path, curlwp);
247 1.1 thorpej error = vn_open(&nd, FREAD, 0);
248 1.1 thorpej if (error == ENOENT)
249 1.1 thorpej continue;
250 1.1 thorpej break;
251 1.1 thorpej }
252 1.1 thorpej
253 1.1 thorpej PNBUF_PUT(pnbuf);
254 1.1 thorpej if (error) {
255 1.1 thorpej firmware_handle_free(fh);
256 1.1 thorpej return (error);
257 1.1 thorpej }
258 1.1 thorpej
259 1.1 thorpej vp = nd.ni_vp;
260 1.1 thorpej
261 1.4 elad error = VOP_GETATTR(vp, &va, kauth_cred_get(), curlwp);
262 1.1 thorpej if (error) {
263 1.1 thorpej VOP_UNLOCK(vp, 0);
264 1.4 elad (void)vn_close(vp, FREAD, kauth_cred_get(), curlwp);
265 1.1 thorpej firmware_handle_free(fh);
266 1.1 thorpej return (error);
267 1.1 thorpej }
268 1.1 thorpej
269 1.1 thorpej if (va.va_type != VREG) {
270 1.1 thorpej VOP_UNLOCK(vp, 0);
271 1.4 elad (void)vn_close(vp, FREAD, kauth_cred_get(), curlwp);
272 1.1 thorpej firmware_handle_free(fh);
273 1.1 thorpej return (EINVAL);
274 1.1 thorpej }
275 1.1 thorpej
276 1.1 thorpej /* XXX Mark as busy text file. */
277 1.1 thorpej
278 1.1 thorpej fh->fh_vp = vp;
279 1.1 thorpej fh->fh_size = va.va_size;
280 1.1 thorpej
281 1.1 thorpej VOP_UNLOCK(vp, 0);
282 1.1 thorpej
283 1.1 thorpej *fhp = fh;
284 1.1 thorpej return (0);
285 1.1 thorpej }
286 1.1 thorpej
287 1.1 thorpej /*
288 1.1 thorpej * firmware_close:
289 1.1 thorpej *
290 1.1 thorpej * Close a firmware image.
291 1.1 thorpej */
292 1.1 thorpej int
293 1.1 thorpej firmware_close(firmware_handle_t fh)
294 1.1 thorpej {
295 1.1 thorpej int error;
296 1.1 thorpej
297 1.4 elad error = vn_close(fh->fh_vp, FREAD, kauth_cred_get(), curlwp);
298 1.1 thorpej firmware_handle_free(fh);
299 1.1 thorpej return (error);
300 1.1 thorpej }
301 1.1 thorpej
302 1.1 thorpej /*
303 1.1 thorpej * firmware_get_size:
304 1.1 thorpej *
305 1.1 thorpej * Return the total size of a firmware image.
306 1.1 thorpej */
307 1.1 thorpej off_t
308 1.1 thorpej firmware_get_size(firmware_handle_t fh)
309 1.1 thorpej {
310 1.1 thorpej
311 1.1 thorpej return (fh->fh_size);
312 1.1 thorpej }
313 1.1 thorpej
314 1.1 thorpej /*
315 1.1 thorpej * firmware_read:
316 1.1 thorpej *
317 1.1 thorpej * Read data from a firmware image at the specified offset into
318 1.1 thorpej * the provided buffer.
319 1.1 thorpej */
320 1.1 thorpej int
321 1.1 thorpej firmware_read(firmware_handle_t fh, off_t offset, void *buf, size_t len)
322 1.1 thorpej {
323 1.1 thorpej
324 1.1 thorpej return (vn_rdwr(UIO_READ, fh->fh_vp, buf, len, offset,
325 1.4 elad UIO_SYSSPACE, 0, kauth_cred_get(), NULL, curlwp));
326 1.1 thorpej }
327 1.1 thorpej
328 1.1 thorpej /*
329 1.1 thorpej * firmware_malloc:
330 1.1 thorpej *
331 1.1 thorpej * Allocate a firmware buffer of the specified size.
332 1.1 thorpej *
333 1.1 thorpej * NOTE: This routine may block.
334 1.1 thorpej */
335 1.1 thorpej void *
336 1.1 thorpej firmware_malloc(size_t size)
337 1.1 thorpej {
338 1.1 thorpej
339 1.1 thorpej return (malloc(size, M_DEVFIRM, M_WAITOK));
340 1.1 thorpej }
341 1.1 thorpej
342 1.1 thorpej /*
343 1.1 thorpej * firmware_free:
344 1.1 thorpej *
345 1.1 thorpej * Free a previously allocated firmware buffer.
346 1.1 thorpej */
347 1.1 thorpej /*ARGSUSED*/
348 1.1 thorpej void
349 1.6 christos firmware_free(void *v, size_t size)
350 1.1 thorpej {
351 1.1 thorpej
352 1.1 thorpej free(v, M_DEVFIRM);
353 1.1 thorpej }
354