Loading...
1/*
2 *
3 * Intel Management Engine Interface (Intel MEI) Linux driver
4 * Copyright (c) 2003-2012, Intel Corporation.
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms and conditions of the GNU General Public License,
8 * version 2, as published by the Free Software Foundation.
9 *
10 * This program is distributed in the hope it will be useful, but WITHOUT
11 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
12 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
13 * more details.
14 *
15 */
16#include <linux/module.h>
17#include <linux/moduleparam.h>
18#include <linux/kernel.h>
19#include <linux/device.h>
20#include <linux/slab.h>
21#include <linux/fs.h>
22#include <linux/errno.h>
23#include <linux/types.h>
24#include <linux/fcntl.h>
25#include <linux/poll.h>
26#include <linux/init.h>
27#include <linux/ioctl.h>
28#include <linux/cdev.h>
29#include <linux/sched.h>
30#include <linux/uuid.h>
31#include <linux/compat.h>
32#include <linux/jiffies.h>
33#include <linux/interrupt.h>
34
35#include <linux/mei.h>
36
37#include "mei_dev.h"
38#include "client.h"
39
40/**
41 * mei_open - the open function
42 *
43 * @inode: pointer to inode structure
44 * @file: pointer to file structure
45 *
46 * Return: 0 on success, <0 on error
47 */
48static int mei_open(struct inode *inode, struct file *file)
49{
50 struct mei_device *dev;
51 struct mei_cl *cl;
52
53 int err;
54
55 dev = container_of(inode->i_cdev, struct mei_device, cdev);
56 if (!dev)
57 return -ENODEV;
58
59 mutex_lock(&dev->device_lock);
60
61 if (dev->dev_state != MEI_DEV_ENABLED) {
62 dev_dbg(dev->dev, "dev_state != MEI_ENABLED dev_state = %s\n",
63 mei_dev_state_str(dev->dev_state));
64 err = -ENODEV;
65 goto err_unlock;
66 }
67
68 cl = mei_cl_alloc_linked(dev);
69 if (IS_ERR(cl)) {
70 err = PTR_ERR(cl);
71 goto err_unlock;
72 }
73
74 file->private_data = cl;
75
76 mutex_unlock(&dev->device_lock);
77
78 return nonseekable_open(inode, file);
79
80err_unlock:
81 mutex_unlock(&dev->device_lock);
82 return err;
83}
84
85/**
86 * mei_release - the release function
87 *
88 * @inode: pointer to inode structure
89 * @file: pointer to file structure
90 *
91 * Return: 0 on success, <0 on error
92 */
93static int mei_release(struct inode *inode, struct file *file)
94{
95 struct mei_cl *cl = file->private_data;
96 struct mei_device *dev;
97 int rets;
98
99 if (WARN_ON(!cl || !cl->dev))
100 return -ENODEV;
101
102 dev = cl->dev;
103
104 mutex_lock(&dev->device_lock);
105 if (cl == &dev->iamthif_cl) {
106 rets = mei_amthif_release(dev, file);
107 goto out;
108 }
109 rets = mei_cl_disconnect(cl);
110
111 mei_cl_flush_queues(cl, file);
112 cl_dbg(dev, cl, "removing\n");
113
114 mei_cl_unlink(cl);
115
116 file->private_data = NULL;
117
118 kfree(cl);
119out:
120 mutex_unlock(&dev->device_lock);
121 return rets;
122}
123
124
125/**
126 * mei_read - the read function.
127 *
128 * @file: pointer to file structure
129 * @ubuf: pointer to user buffer
130 * @length: buffer length
131 * @offset: data offset in buffer
132 *
133 * Return: >=0 data length on success , <0 on error
134 */
135static ssize_t mei_read(struct file *file, char __user *ubuf,
136 size_t length, loff_t *offset)
137{
138 struct mei_cl *cl = file->private_data;
139 struct mei_device *dev;
140 struct mei_cl_cb *cb = NULL;
141 int rets;
142 int err;
143
144
145 if (WARN_ON(!cl || !cl->dev))
146 return -ENODEV;
147
148 dev = cl->dev;
149
150
151 mutex_lock(&dev->device_lock);
152 if (dev->dev_state != MEI_DEV_ENABLED) {
153 rets = -ENODEV;
154 goto out;
155 }
156
157 if (length == 0) {
158 rets = 0;
159 goto out;
160 }
161
162 if (ubuf == NULL) {
163 rets = -EMSGSIZE;
164 goto out;
165 }
166
167 if (cl == &dev->iamthif_cl) {
168 rets = mei_amthif_read(dev, file, ubuf, length, offset);
169 goto out;
170 }
171
172 cb = mei_cl_read_cb(cl, file);
173 if (cb)
174 goto copy_buffer;
175
176 if (*offset > 0)
177 *offset = 0;
178
179 err = mei_cl_read_start(cl, length, file);
180 if (err && err != -EBUSY) {
181 cl_dbg(dev, cl, "mei start read failure status = %d\n", err);
182 rets = err;
183 goto out;
184 }
185
186 if (list_empty(&cl->rd_completed) && !waitqueue_active(&cl->rx_wait)) {
187 if (file->f_flags & O_NONBLOCK) {
188 rets = -EAGAIN;
189 goto out;
190 }
191
192 mutex_unlock(&dev->device_lock);
193
194 if (wait_event_interruptible(cl->rx_wait,
195 (!list_empty(&cl->rd_completed)) ||
196 (!mei_cl_is_connected(cl)))) {
197
198 if (signal_pending(current))
199 return -EINTR;
200 return -ERESTARTSYS;
201 }
202
203 mutex_lock(&dev->device_lock);
204 if (!mei_cl_is_connected(cl)) {
205 rets = -EBUSY;
206 goto out;
207 }
208 }
209
210 cb = mei_cl_read_cb(cl, file);
211 if (!cb) {
212 rets = 0;
213 goto out;
214 }
215
216copy_buffer:
217 /* now copy the data to user space */
218 if (cb->status) {
219 rets = cb->status;
220 cl_dbg(dev, cl, "read operation failed %d\n", rets);
221 goto free;
222 }
223
224 cl_dbg(dev, cl, "buf.size = %zu buf.idx = %zu offset = %lld\n",
225 cb->buf.size, cb->buf_idx, *offset);
226 if (*offset >= cb->buf_idx) {
227 rets = 0;
228 goto free;
229 }
230
231 /* length is being truncated to PAGE_SIZE,
232 * however buf_idx may point beyond that */
233 length = min_t(size_t, length, cb->buf_idx - *offset);
234
235 if (copy_to_user(ubuf, cb->buf.data + *offset, length)) {
236 dev_dbg(dev->dev, "failed to copy data to userland\n");
237 rets = -EFAULT;
238 goto free;
239 }
240
241 rets = length;
242 *offset += length;
243 /* not all data was read, keep the cb */
244 if (*offset < cb->buf_idx)
245 goto out;
246
247free:
248 mei_io_cb_free(cb);
249 *offset = 0;
250
251out:
252 cl_dbg(dev, cl, "end mei read rets = %d\n", rets);
253 mutex_unlock(&dev->device_lock);
254 return rets;
255}
256/**
257 * mei_write - the write function.
258 *
259 * @file: pointer to file structure
260 * @ubuf: pointer to user buffer
261 * @length: buffer length
262 * @offset: data offset in buffer
263 *
264 * Return: >=0 data length on success , <0 on error
265 */
266static ssize_t mei_write(struct file *file, const char __user *ubuf,
267 size_t length, loff_t *offset)
268{
269 struct mei_cl *cl = file->private_data;
270 struct mei_cl_cb *cb;
271 struct mei_device *dev;
272 int rets;
273
274 if (WARN_ON(!cl || !cl->dev))
275 return -ENODEV;
276
277 dev = cl->dev;
278
279 mutex_lock(&dev->device_lock);
280
281 if (dev->dev_state != MEI_DEV_ENABLED) {
282 rets = -ENODEV;
283 goto out;
284 }
285
286 if (!mei_cl_is_connected(cl)) {
287 cl_err(dev, cl, "is not connected");
288 rets = -ENODEV;
289 goto out;
290 }
291
292 if (!mei_me_cl_is_active(cl->me_cl)) {
293 rets = -ENOTTY;
294 goto out;
295 }
296
297 if (length > mei_cl_mtu(cl)) {
298 rets = -EFBIG;
299 goto out;
300 }
301
302 if (length == 0) {
303 rets = 0;
304 goto out;
305 }
306
307 *offset = 0;
308 cb = mei_cl_alloc_cb(cl, length, MEI_FOP_WRITE, file);
309 if (!cb) {
310 rets = -ENOMEM;
311 goto out;
312 }
313
314 rets = copy_from_user(cb->buf.data, ubuf, length);
315 if (rets) {
316 dev_dbg(dev->dev, "failed to copy data from userland\n");
317 rets = -EFAULT;
318 mei_io_cb_free(cb);
319 goto out;
320 }
321
322 if (cl == &dev->iamthif_cl) {
323 rets = mei_amthif_write(cl, cb);
324 if (!rets)
325 rets = length;
326 goto out;
327 }
328
329 rets = mei_cl_write(cl, cb, false);
330out:
331 mutex_unlock(&dev->device_lock);
332 return rets;
333}
334
335/**
336 * mei_ioctl_connect_client - the connect to fw client IOCTL function
337 *
338 * @file: private data of the file object
339 * @data: IOCTL connect data, input and output parameters
340 *
341 * Locking: called under "dev->device_lock" lock
342 *
343 * Return: 0 on success, <0 on failure.
344 */
345static int mei_ioctl_connect_client(struct file *file,
346 struct mei_connect_client_data *data)
347{
348 struct mei_device *dev;
349 struct mei_client *client;
350 struct mei_me_client *me_cl;
351 struct mei_cl *cl;
352 int rets;
353
354 cl = file->private_data;
355 dev = cl->dev;
356
357 if (dev->dev_state != MEI_DEV_ENABLED)
358 return -ENODEV;
359
360 if (cl->state != MEI_FILE_INITIALIZING &&
361 cl->state != MEI_FILE_DISCONNECTED)
362 return -EBUSY;
363
364 /* find ME client we're trying to connect to */
365 me_cl = mei_me_cl_by_uuid(dev, &data->in_client_uuid);
366 if (!me_cl) {
367 dev_dbg(dev->dev, "Cannot connect to FW Client UUID = %pUl\n",
368 &data->in_client_uuid);
369 rets = -ENOTTY;
370 goto end;
371 }
372
373 if (me_cl->props.fixed_address) {
374 bool forbidden = dev->override_fixed_address ?
375 !dev->allow_fixed_address : !dev->hbm_f_fa_supported;
376 if (forbidden) {
377 dev_dbg(dev->dev, "Connection forbidden to FW Client UUID = %pUl\n",
378 &data->in_client_uuid);
379 rets = -ENOTTY;
380 goto end;
381 }
382 }
383
384 dev_dbg(dev->dev, "Connect to FW Client ID = %d\n",
385 me_cl->client_id);
386 dev_dbg(dev->dev, "FW Client - Protocol Version = %d\n",
387 me_cl->props.protocol_version);
388 dev_dbg(dev->dev, "FW Client - Max Msg Len = %d\n",
389 me_cl->props.max_msg_length);
390
391 /* if we're connecting to amthif client then we will use the
392 * existing connection
393 */
394 if (uuid_le_cmp(data->in_client_uuid, mei_amthif_guid) == 0) {
395 dev_dbg(dev->dev, "FW Client is amthi\n");
396 if (!mei_cl_is_connected(&dev->iamthif_cl)) {
397 rets = -ENODEV;
398 goto end;
399 }
400 mei_cl_unlink(cl);
401
402 kfree(cl);
403 cl = NULL;
404 dev->iamthif_open_count++;
405 file->private_data = &dev->iamthif_cl;
406
407 client = &data->out_client_properties;
408 client->max_msg_length = me_cl->props.max_msg_length;
409 client->protocol_version = me_cl->props.protocol_version;
410 rets = dev->iamthif_cl.status;
411
412 goto end;
413 }
414
415 /* prepare the output buffer */
416 client = &data->out_client_properties;
417 client->max_msg_length = me_cl->props.max_msg_length;
418 client->protocol_version = me_cl->props.protocol_version;
419 dev_dbg(dev->dev, "Can connect?\n");
420
421 rets = mei_cl_connect(cl, me_cl, file);
422
423end:
424 mei_me_cl_put(me_cl);
425 return rets;
426}
427
428/**
429 * mei_ioctl_client_notify_request -
430 * propagate event notification request to client
431 *
432 * @file: pointer to file structure
433 * @request: 0 - disable, 1 - enable
434 *
435 * Return: 0 on success , <0 on error
436 */
437static int mei_ioctl_client_notify_request(const struct file *file, u32 request)
438{
439 struct mei_cl *cl = file->private_data;
440
441 if (request != MEI_HBM_NOTIFICATION_START &&
442 request != MEI_HBM_NOTIFICATION_STOP)
443 return -EINVAL;
444
445 return mei_cl_notify_request(cl, file, (u8)request);
446}
447
448/**
449 * mei_ioctl_client_notify_get - wait for notification request
450 *
451 * @file: pointer to file structure
452 * @notify_get: 0 - disable, 1 - enable
453 *
454 * Return: 0 on success , <0 on error
455 */
456static int mei_ioctl_client_notify_get(const struct file *file, u32 *notify_get)
457{
458 struct mei_cl *cl = file->private_data;
459 bool notify_ev;
460 bool block = (file->f_flags & O_NONBLOCK) == 0;
461 int rets;
462
463 rets = mei_cl_notify_get(cl, block, ¬ify_ev);
464 if (rets)
465 return rets;
466
467 *notify_get = notify_ev ? 1 : 0;
468 return 0;
469}
470
471/**
472 * mei_ioctl - the IOCTL function
473 *
474 * @file: pointer to file structure
475 * @cmd: ioctl command
476 * @data: pointer to mei message structure
477 *
478 * Return: 0 on success , <0 on error
479 */
480static long mei_ioctl(struct file *file, unsigned int cmd, unsigned long data)
481{
482 struct mei_device *dev;
483 struct mei_cl *cl = file->private_data;
484 struct mei_connect_client_data connect_data;
485 u32 notify_get, notify_req;
486 int rets;
487
488
489 if (WARN_ON(!cl || !cl->dev))
490 return -ENODEV;
491
492 dev = cl->dev;
493
494 dev_dbg(dev->dev, "IOCTL cmd = 0x%x", cmd);
495
496 mutex_lock(&dev->device_lock);
497 if (dev->dev_state != MEI_DEV_ENABLED) {
498 rets = -ENODEV;
499 goto out;
500 }
501
502 switch (cmd) {
503 case IOCTL_MEI_CONNECT_CLIENT:
504 dev_dbg(dev->dev, ": IOCTL_MEI_CONNECT_CLIENT.\n");
505 if (copy_from_user(&connect_data, (char __user *)data,
506 sizeof(struct mei_connect_client_data))) {
507 dev_dbg(dev->dev, "failed to copy data from userland\n");
508 rets = -EFAULT;
509 goto out;
510 }
511
512 rets = mei_ioctl_connect_client(file, &connect_data);
513 if (rets)
514 goto out;
515
516 /* if all is ok, copying the data back to user. */
517 if (copy_to_user((char __user *)data, &connect_data,
518 sizeof(struct mei_connect_client_data))) {
519 dev_dbg(dev->dev, "failed to copy data to userland\n");
520 rets = -EFAULT;
521 goto out;
522 }
523
524 break;
525
526 case IOCTL_MEI_NOTIFY_SET:
527 dev_dbg(dev->dev, ": IOCTL_MEI_NOTIFY_SET.\n");
528 if (copy_from_user(¬ify_req,
529 (char __user *)data, sizeof(notify_req))) {
530 dev_dbg(dev->dev, "failed to copy data from userland\n");
531 rets = -EFAULT;
532 goto out;
533 }
534 rets = mei_ioctl_client_notify_request(file, notify_req);
535 break;
536
537 case IOCTL_MEI_NOTIFY_GET:
538 dev_dbg(dev->dev, ": IOCTL_MEI_NOTIFY_GET.\n");
539 rets = mei_ioctl_client_notify_get(file, ¬ify_get);
540 if (rets)
541 goto out;
542
543 dev_dbg(dev->dev, "copy connect data to user\n");
544 if (copy_to_user((char __user *)data,
545 ¬ify_get, sizeof(notify_get))) {
546 dev_dbg(dev->dev, "failed to copy data to userland\n");
547 rets = -EFAULT;
548 goto out;
549
550 }
551 break;
552
553 default:
554 dev_err(dev->dev, ": unsupported ioctl %d.\n", cmd);
555 rets = -ENOIOCTLCMD;
556 }
557
558out:
559 mutex_unlock(&dev->device_lock);
560 return rets;
561}
562
563/**
564 * mei_compat_ioctl - the compat IOCTL function
565 *
566 * @file: pointer to file structure
567 * @cmd: ioctl command
568 * @data: pointer to mei message structure
569 *
570 * Return: 0 on success , <0 on error
571 */
572#ifdef CONFIG_COMPAT
573static long mei_compat_ioctl(struct file *file,
574 unsigned int cmd, unsigned long data)
575{
576 return mei_ioctl(file, cmd, (unsigned long)compat_ptr(data));
577}
578#endif
579
580
581/**
582 * mei_poll - the poll function
583 *
584 * @file: pointer to file structure
585 * @wait: pointer to poll_table structure
586 *
587 * Return: poll mask
588 */
589static unsigned int mei_poll(struct file *file, poll_table *wait)
590{
591 unsigned long req_events = poll_requested_events(wait);
592 struct mei_cl *cl = file->private_data;
593 struct mei_device *dev;
594 unsigned int mask = 0;
595 bool notify_en;
596
597 if (WARN_ON(!cl || !cl->dev))
598 return POLLERR;
599
600 dev = cl->dev;
601
602 mutex_lock(&dev->device_lock);
603
604 notify_en = cl->notify_en && (req_events & POLLPRI);
605
606 if (dev->dev_state != MEI_DEV_ENABLED ||
607 !mei_cl_is_connected(cl)) {
608 mask = POLLERR;
609 goto out;
610 }
611
612 if (cl == &dev->iamthif_cl) {
613 mask = mei_amthif_poll(dev, file, wait);
614 goto out;
615 }
616
617 if (notify_en) {
618 poll_wait(file, &cl->ev_wait, wait);
619 if (cl->notify_ev)
620 mask |= POLLPRI;
621 }
622
623 if (req_events & (POLLIN | POLLRDNORM)) {
624 poll_wait(file, &cl->rx_wait, wait);
625
626 if (!list_empty(&cl->rd_completed))
627 mask |= POLLIN | POLLRDNORM;
628 else
629 mei_cl_read_start(cl, 0, file);
630 }
631
632out:
633 mutex_unlock(&dev->device_lock);
634 return mask;
635}
636
637/**
638 * mei_fasync - asynchronous io support
639 *
640 * @fd: file descriptor
641 * @file: pointer to file structure
642 * @band: band bitmap
643 *
644 * Return: negative on error,
645 * 0 if it did no changes,
646 * and positive a process was added or deleted
647 */
648static int mei_fasync(int fd, struct file *file, int band)
649{
650
651 struct mei_cl *cl = file->private_data;
652
653 if (!mei_cl_is_connected(cl))
654 return -ENODEV;
655
656 return fasync_helper(fd, file, band, &cl->ev_async);
657}
658
659/**
660 * fw_status_show - mei device attribute show method
661 *
662 * @device: device pointer
663 * @attr: attribute pointer
664 * @buf: char out buffer
665 *
666 * Return: number of the bytes printed into buf or error
667 */
668static ssize_t fw_status_show(struct device *device,
669 struct device_attribute *attr, char *buf)
670{
671 struct mei_device *dev = dev_get_drvdata(device);
672 struct mei_fw_status fw_status;
673 int err, i;
674 ssize_t cnt = 0;
675
676 mutex_lock(&dev->device_lock);
677 err = mei_fw_status(dev, &fw_status);
678 mutex_unlock(&dev->device_lock);
679 if (err) {
680 dev_err(device, "read fw_status error = %d\n", err);
681 return err;
682 }
683
684 for (i = 0; i < fw_status.count; i++)
685 cnt += scnprintf(buf + cnt, PAGE_SIZE - cnt, "%08X\n",
686 fw_status.status[i]);
687 return cnt;
688}
689static DEVICE_ATTR_RO(fw_status);
690
691static struct attribute *mei_attrs[] = {
692 &dev_attr_fw_status.attr,
693 NULL
694};
695ATTRIBUTE_GROUPS(mei);
696
697/*
698 * file operations structure will be used for mei char device.
699 */
700static const struct file_operations mei_fops = {
701 .owner = THIS_MODULE,
702 .read = mei_read,
703 .unlocked_ioctl = mei_ioctl,
704#ifdef CONFIG_COMPAT
705 .compat_ioctl = mei_compat_ioctl,
706#endif
707 .open = mei_open,
708 .release = mei_release,
709 .write = mei_write,
710 .poll = mei_poll,
711 .fasync = mei_fasync,
712 .llseek = no_llseek
713};
714
715static struct class *mei_class;
716static dev_t mei_devt;
717#define MEI_MAX_DEVS MINORMASK
718static DEFINE_MUTEX(mei_minor_lock);
719static DEFINE_IDR(mei_idr);
720
721/**
722 * mei_minor_get - obtain next free device minor number
723 *
724 * @dev: device pointer
725 *
726 * Return: allocated minor, or -ENOSPC if no free minor left
727 */
728static int mei_minor_get(struct mei_device *dev)
729{
730 int ret;
731
732 mutex_lock(&mei_minor_lock);
733 ret = idr_alloc(&mei_idr, dev, 0, MEI_MAX_DEVS, GFP_KERNEL);
734 if (ret >= 0)
735 dev->minor = ret;
736 else if (ret == -ENOSPC)
737 dev_err(dev->dev, "too many mei devices\n");
738
739 mutex_unlock(&mei_minor_lock);
740 return ret;
741}
742
743/**
744 * mei_minor_free - mark device minor number as free
745 *
746 * @dev: device pointer
747 */
748static void mei_minor_free(struct mei_device *dev)
749{
750 mutex_lock(&mei_minor_lock);
751 idr_remove(&mei_idr, dev->minor);
752 mutex_unlock(&mei_minor_lock);
753}
754
755int mei_register(struct mei_device *dev, struct device *parent)
756{
757 struct device *clsdev; /* class device */
758 int ret, devno;
759
760 ret = mei_minor_get(dev);
761 if (ret < 0)
762 return ret;
763
764 /* Fill in the data structures */
765 devno = MKDEV(MAJOR(mei_devt), dev->minor);
766 cdev_init(&dev->cdev, &mei_fops);
767 dev->cdev.owner = parent->driver->owner;
768
769 /* Add the device */
770 ret = cdev_add(&dev->cdev, devno, 1);
771 if (ret) {
772 dev_err(parent, "unable to add device %d:%d\n",
773 MAJOR(mei_devt), dev->minor);
774 goto err_dev_add;
775 }
776
777 clsdev = device_create_with_groups(mei_class, parent, devno,
778 dev, mei_groups,
779 "mei%d", dev->minor);
780
781 if (IS_ERR(clsdev)) {
782 dev_err(parent, "unable to create device %d:%d\n",
783 MAJOR(mei_devt), dev->minor);
784 ret = PTR_ERR(clsdev);
785 goto err_dev_create;
786 }
787
788 ret = mei_dbgfs_register(dev, dev_name(clsdev));
789 if (ret) {
790 dev_err(clsdev, "cannot register debugfs ret = %d\n", ret);
791 goto err_dev_dbgfs;
792 }
793
794 return 0;
795
796err_dev_dbgfs:
797 device_destroy(mei_class, devno);
798err_dev_create:
799 cdev_del(&dev->cdev);
800err_dev_add:
801 mei_minor_free(dev);
802 return ret;
803}
804EXPORT_SYMBOL_GPL(mei_register);
805
806void mei_deregister(struct mei_device *dev)
807{
808 int devno;
809
810 devno = dev->cdev.dev;
811 cdev_del(&dev->cdev);
812
813 mei_dbgfs_deregister(dev);
814
815 device_destroy(mei_class, devno);
816
817 mei_minor_free(dev);
818}
819EXPORT_SYMBOL_GPL(mei_deregister);
820
821static int __init mei_init(void)
822{
823 int ret;
824
825 mei_class = class_create(THIS_MODULE, "mei");
826 if (IS_ERR(mei_class)) {
827 pr_err("couldn't create class\n");
828 ret = PTR_ERR(mei_class);
829 goto err;
830 }
831
832 ret = alloc_chrdev_region(&mei_devt, 0, MEI_MAX_DEVS, "mei");
833 if (ret < 0) {
834 pr_err("unable to allocate char dev region\n");
835 goto err_class;
836 }
837
838 ret = mei_cl_bus_init();
839 if (ret < 0) {
840 pr_err("unable to initialize bus\n");
841 goto err_chrdev;
842 }
843
844 return 0;
845
846err_chrdev:
847 unregister_chrdev_region(mei_devt, MEI_MAX_DEVS);
848err_class:
849 class_destroy(mei_class);
850err:
851 return ret;
852}
853
854static void __exit mei_exit(void)
855{
856 unregister_chrdev_region(mei_devt, MEI_MAX_DEVS);
857 class_destroy(mei_class);
858 mei_cl_bus_exit();
859}
860
861module_init(mei_init);
862module_exit(mei_exit);
863
864MODULE_AUTHOR("Intel Corporation");
865MODULE_DESCRIPTION("Intel(R) Management Engine Interface");
866MODULE_LICENSE("GPL v2");
867
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * Copyright (c) 2003-2022, Intel Corporation. All rights reserved.
4 * Intel Management Engine Interface (Intel MEI) Linux driver
5 */
6
7#include <linux/module.h>
8#include <linux/moduleparam.h>
9#include <linux/kernel.h>
10#include <linux/device.h>
11#include <linux/slab.h>
12#include <linux/fs.h>
13#include <linux/errno.h>
14#include <linux/types.h>
15#include <linux/fcntl.h>
16#include <linux/poll.h>
17#include <linux/init.h>
18#include <linux/ioctl.h>
19#include <linux/cdev.h>
20#include <linux/sched/signal.h>
21#include <linux/compat.h>
22#include <linux/jiffies.h>
23#include <linux/interrupt.h>
24
25#include <linux/mei.h>
26
27#include "mei_dev.h"
28#include "client.h"
29
30static const struct class mei_class = {
31 .name = "mei",
32};
33
34static dev_t mei_devt;
35#define MEI_MAX_DEVS MINORMASK
36static DEFINE_MUTEX(mei_minor_lock);
37static DEFINE_IDR(mei_idr);
38
39/**
40 * mei_open - the open function
41 *
42 * @inode: pointer to inode structure
43 * @file: pointer to file structure
44 *
45 * Return: 0 on success, <0 on error
46 */
47static int mei_open(struct inode *inode, struct file *file)
48{
49 struct mei_device *dev;
50 struct mei_cl *cl;
51
52 int err;
53
54 dev = container_of(inode->i_cdev, struct mei_device, cdev);
55
56 mutex_lock(&dev->device_lock);
57
58 if (dev->dev_state != MEI_DEV_ENABLED) {
59 dev_dbg(dev->dev, "dev_state != MEI_ENABLED dev_state = %s\n",
60 mei_dev_state_str(dev->dev_state));
61 err = -ENODEV;
62 goto err_unlock;
63 }
64
65 cl = mei_cl_alloc_linked(dev);
66 if (IS_ERR(cl)) {
67 err = PTR_ERR(cl);
68 goto err_unlock;
69 }
70
71 cl->fp = file;
72 file->private_data = cl;
73
74 mutex_unlock(&dev->device_lock);
75
76 return nonseekable_open(inode, file);
77
78err_unlock:
79 mutex_unlock(&dev->device_lock);
80 return err;
81}
82
83/**
84 * mei_cl_vtag_remove_by_fp - remove vtag that corresponds to fp from list
85 *
86 * @cl: host client
87 * @fp: pointer to file structure
88 *
89 */
90static void mei_cl_vtag_remove_by_fp(const struct mei_cl *cl,
91 const struct file *fp)
92{
93 struct mei_cl_vtag *vtag_l, *next;
94
95 list_for_each_entry_safe(vtag_l, next, &cl->vtag_map, list) {
96 if (vtag_l->fp == fp) {
97 list_del(&vtag_l->list);
98 kfree(vtag_l);
99 return;
100 }
101 }
102}
103
104/**
105 * mei_release - the release function
106 *
107 * @inode: pointer to inode structure
108 * @file: pointer to file structure
109 *
110 * Return: 0 on success, <0 on error
111 */
112static int mei_release(struct inode *inode, struct file *file)
113{
114 struct mei_cl *cl = file->private_data;
115 struct mei_device *dev;
116 int rets;
117
118 if (WARN_ON(!cl || !cl->dev))
119 return -ENODEV;
120
121 dev = cl->dev;
122
123 mutex_lock(&dev->device_lock);
124
125 mei_cl_vtag_remove_by_fp(cl, file);
126
127 if (!list_empty(&cl->vtag_map)) {
128 cl_dbg(dev, cl, "not the last vtag\n");
129 mei_cl_flush_queues(cl, file);
130 rets = 0;
131 goto out;
132 }
133
134 rets = mei_cl_disconnect(cl);
135 /*
136 * Check again: This is necessary since disconnect releases the lock
137 * and another client can connect in the meantime.
138 */
139 if (!list_empty(&cl->vtag_map)) {
140 cl_dbg(dev, cl, "not the last vtag after disconnect\n");
141 mei_cl_flush_queues(cl, file);
142 goto out;
143 }
144
145 mei_cl_flush_queues(cl, NULL);
146 cl_dbg(dev, cl, "removing\n");
147
148 mei_cl_unlink(cl);
149 kfree(cl);
150
151out:
152 file->private_data = NULL;
153
154 mutex_unlock(&dev->device_lock);
155 return rets;
156}
157
158
159/**
160 * mei_read - the read function.
161 *
162 * @file: pointer to file structure
163 * @ubuf: pointer to user buffer
164 * @length: buffer length
165 * @offset: data offset in buffer
166 *
167 * Return: >=0 data length on success , <0 on error
168 */
169static ssize_t mei_read(struct file *file, char __user *ubuf,
170 size_t length, loff_t *offset)
171{
172 struct mei_cl *cl = file->private_data;
173 struct mei_device *dev;
174 struct mei_cl_cb *cb = NULL;
175 bool nonblock = !!(file->f_flags & O_NONBLOCK);
176 ssize_t rets;
177
178 if (WARN_ON(!cl || !cl->dev))
179 return -ENODEV;
180
181 dev = cl->dev;
182
183
184 mutex_lock(&dev->device_lock);
185 if (dev->dev_state != MEI_DEV_ENABLED) {
186 rets = -ENODEV;
187 goto out;
188 }
189
190 if (length == 0) {
191 rets = 0;
192 goto out;
193 }
194
195 if (ubuf == NULL) {
196 rets = -EMSGSIZE;
197 goto out;
198 }
199
200 cb = mei_cl_read_cb(cl, file);
201 if (cb)
202 goto copy_buffer;
203
204 if (*offset > 0)
205 *offset = 0;
206
207 rets = mei_cl_read_start(cl, length, file);
208 if (rets && rets != -EBUSY) {
209 cl_dbg(dev, cl, "mei start read failure status = %zd\n", rets);
210 goto out;
211 }
212
213 if (nonblock) {
214 rets = -EAGAIN;
215 goto out;
216 }
217
218 mutex_unlock(&dev->device_lock);
219 if (wait_event_interruptible(cl->rx_wait,
220 mei_cl_read_cb(cl, file) ||
221 !mei_cl_is_connected(cl))) {
222 if (signal_pending(current))
223 return -EINTR;
224 return -ERESTARTSYS;
225 }
226 mutex_lock(&dev->device_lock);
227
228 if (!mei_cl_is_connected(cl)) {
229 rets = -ENODEV;
230 goto out;
231 }
232
233 cb = mei_cl_read_cb(cl, file);
234 if (!cb) {
235 rets = 0;
236 goto out;
237 }
238
239copy_buffer:
240 /* now copy the data to user space */
241 if (cb->status) {
242 rets = cb->status;
243 cl_dbg(dev, cl, "read operation failed %zd\n", rets);
244 goto free;
245 }
246
247 cl_dbg(dev, cl, "buf.size = %zu buf.idx = %zu offset = %lld\n",
248 cb->buf.size, cb->buf_idx, *offset);
249 if (*offset >= cb->buf_idx) {
250 rets = 0;
251 goto free;
252 }
253
254 /* length is being truncated to PAGE_SIZE,
255 * however buf_idx may point beyond that */
256 length = min_t(size_t, length, cb->buf_idx - *offset);
257
258 if (copy_to_user(ubuf, cb->buf.data + *offset, length)) {
259 dev_dbg(dev->dev, "failed to copy data to userland\n");
260 rets = -EFAULT;
261 goto free;
262 }
263
264 rets = length;
265 *offset += length;
266 /* not all data was read, keep the cb */
267 if (*offset < cb->buf_idx)
268 goto out;
269
270free:
271 mei_cl_del_rd_completed(cl, cb);
272 *offset = 0;
273
274out:
275 cl_dbg(dev, cl, "end mei read rets = %zd\n", rets);
276 mutex_unlock(&dev->device_lock);
277 return rets;
278}
279
280/**
281 * mei_cl_vtag_by_fp - obtain the vtag by file pointer
282 *
283 * @cl: host client
284 * @fp: pointer to file structure
285 *
286 * Return: vtag value on success, otherwise 0
287 */
288static u8 mei_cl_vtag_by_fp(const struct mei_cl *cl, const struct file *fp)
289{
290 struct mei_cl_vtag *cl_vtag;
291
292 if (!fp)
293 return 0;
294
295 list_for_each_entry(cl_vtag, &cl->vtag_map, list)
296 if (cl_vtag->fp == fp)
297 return cl_vtag->vtag;
298 return 0;
299}
300
301/**
302 * mei_write - the write function.
303 *
304 * @file: pointer to file structure
305 * @ubuf: pointer to user buffer
306 * @length: buffer length
307 * @offset: data offset in buffer
308 *
309 * Return: >=0 data length on success , <0 on error
310 */
311static ssize_t mei_write(struct file *file, const char __user *ubuf,
312 size_t length, loff_t *offset)
313{
314 struct mei_cl *cl = file->private_data;
315 struct mei_cl_cb *cb;
316 struct mei_device *dev;
317 ssize_t rets;
318
319 if (WARN_ON(!cl || !cl->dev))
320 return -ENODEV;
321
322 dev = cl->dev;
323
324 mutex_lock(&dev->device_lock);
325
326 if (dev->dev_state != MEI_DEV_ENABLED) {
327 rets = -ENODEV;
328 goto out;
329 }
330
331 if (!mei_cl_is_connected(cl)) {
332 cl_err(dev, cl, "is not connected");
333 rets = -ENODEV;
334 goto out;
335 }
336
337 if (!mei_me_cl_is_active(cl->me_cl)) {
338 rets = -ENOTTY;
339 goto out;
340 }
341
342 if (length > mei_cl_mtu(cl)) {
343 rets = -EFBIG;
344 goto out;
345 }
346
347 if (length == 0) {
348 rets = 0;
349 goto out;
350 }
351
352 while (cl->tx_cb_queued >= dev->tx_queue_limit) {
353 if (file->f_flags & O_NONBLOCK) {
354 rets = -EAGAIN;
355 goto out;
356 }
357 mutex_unlock(&dev->device_lock);
358 rets = wait_event_interruptible(cl->tx_wait,
359 cl->writing_state == MEI_WRITE_COMPLETE ||
360 (!mei_cl_is_connected(cl)));
361 mutex_lock(&dev->device_lock);
362 if (rets) {
363 if (signal_pending(current))
364 rets = -EINTR;
365 goto out;
366 }
367 if (!mei_cl_is_connected(cl)) {
368 rets = -ENODEV;
369 goto out;
370 }
371 }
372
373 cb = mei_cl_alloc_cb(cl, length, MEI_FOP_WRITE, file);
374 if (!cb) {
375 rets = -ENOMEM;
376 goto out;
377 }
378 cb->vtag = mei_cl_vtag_by_fp(cl, file);
379
380 rets = copy_from_user(cb->buf.data, ubuf, length);
381 if (rets) {
382 dev_dbg(dev->dev, "failed to copy data from userland\n");
383 rets = -EFAULT;
384 mei_io_cb_free(cb);
385 goto out;
386 }
387
388 rets = mei_cl_write(cl, cb, MAX_SCHEDULE_TIMEOUT);
389out:
390 mutex_unlock(&dev->device_lock);
391 return rets;
392}
393
394/**
395 * mei_ioctl_connect_client - the connect to fw client IOCTL function
396 *
397 * @file: private data of the file object
398 * @in_client_uuid: requested UUID for connection
399 * @client: IOCTL connect data, output parameters
400 *
401 * Locking: called under "dev->device_lock" lock
402 *
403 * Return: 0 on success, <0 on failure.
404 */
405static int mei_ioctl_connect_client(struct file *file,
406 const uuid_le *in_client_uuid,
407 struct mei_client *client)
408{
409 struct mei_device *dev;
410 struct mei_me_client *me_cl;
411 struct mei_cl *cl;
412 int rets;
413
414 cl = file->private_data;
415 dev = cl->dev;
416
417 if (cl->state != MEI_FILE_INITIALIZING &&
418 cl->state != MEI_FILE_DISCONNECTED)
419 return -EBUSY;
420
421 /* find ME client we're trying to connect to */
422 me_cl = mei_me_cl_by_uuid(dev, in_client_uuid);
423 if (!me_cl) {
424 dev_dbg(dev->dev, "Cannot connect to FW Client UUID = %pUl\n",
425 in_client_uuid);
426 rets = -ENOTTY;
427 goto end;
428 }
429
430 if (me_cl->props.fixed_address) {
431 bool forbidden = dev->override_fixed_address ?
432 !dev->allow_fixed_address : !dev->hbm_f_fa_supported;
433 if (forbidden) {
434 dev_dbg(dev->dev, "Connection forbidden to FW Client UUID = %pUl\n",
435 in_client_uuid);
436 rets = -ENOTTY;
437 goto end;
438 }
439 }
440
441 dev_dbg(dev->dev, "Connect to FW Client ID = %d\n",
442 me_cl->client_id);
443 dev_dbg(dev->dev, "FW Client - Protocol Version = %d\n",
444 me_cl->props.protocol_version);
445 dev_dbg(dev->dev, "FW Client - Max Msg Len = %d\n",
446 me_cl->props.max_msg_length);
447
448 /* prepare the output buffer */
449 client->max_msg_length = me_cl->props.max_msg_length;
450 client->protocol_version = me_cl->props.protocol_version;
451 dev_dbg(dev->dev, "Can connect?\n");
452
453 rets = mei_cl_connect(cl, me_cl, file);
454
455end:
456 mei_me_cl_put(me_cl);
457 return rets;
458}
459
460/**
461 * mei_vt_support_check - check if client support vtags
462 *
463 * @dev: mei_device
464 * @uuid: client UUID
465 *
466 * Locking: called under "dev->device_lock" lock
467 *
468 * Return:
469 * 0 - supported
470 * -ENOTTY - no such client
471 * -EOPNOTSUPP - vtags are not supported by client
472 */
473static int mei_vt_support_check(struct mei_device *dev, const uuid_le *uuid)
474{
475 struct mei_me_client *me_cl;
476 int ret;
477
478 if (!dev->hbm_f_vt_supported)
479 return -EOPNOTSUPP;
480
481 me_cl = mei_me_cl_by_uuid(dev, uuid);
482 if (!me_cl) {
483 dev_dbg(dev->dev, "Cannot connect to FW Client UUID = %pUl\n",
484 uuid);
485 return -ENOTTY;
486 }
487 ret = me_cl->props.vt_supported ? 0 : -EOPNOTSUPP;
488 mei_me_cl_put(me_cl);
489
490 return ret;
491}
492
493/**
494 * mei_ioctl_connect_vtag - connect to fw client with vtag IOCTL function
495 *
496 * @file: private data of the file object
497 * @in_client_uuid: requested UUID for connection
498 * @client: IOCTL connect data, output parameters
499 * @vtag: vm tag
500 *
501 * Locking: called under "dev->device_lock" lock
502 *
503 * Return: 0 on success, <0 on failure.
504 */
505static int mei_ioctl_connect_vtag(struct file *file,
506 const uuid_le *in_client_uuid,
507 struct mei_client *client,
508 u8 vtag)
509{
510 struct mei_device *dev;
511 struct mei_cl *cl;
512 struct mei_cl *pos;
513 struct mei_cl_vtag *cl_vtag;
514
515 cl = file->private_data;
516 dev = cl->dev;
517
518 dev_dbg(dev->dev, "FW Client %pUl vtag %d\n", in_client_uuid, vtag);
519
520 switch (cl->state) {
521 case MEI_FILE_DISCONNECTED:
522 if (mei_cl_vtag_by_fp(cl, file) != vtag) {
523 dev_err(dev->dev, "reconnect with different vtag\n");
524 return -EINVAL;
525 }
526 break;
527 case MEI_FILE_INITIALIZING:
528 /* malicious connect from another thread may push vtag */
529 if (!IS_ERR(mei_cl_fp_by_vtag(cl, vtag))) {
530 dev_err(dev->dev, "vtag already filled\n");
531 return -EINVAL;
532 }
533
534 list_for_each_entry(pos, &dev->file_list, link) {
535 if (pos == cl)
536 continue;
537 if (!pos->me_cl)
538 continue;
539
540 /* only search for same UUID */
541 if (uuid_le_cmp(*mei_cl_uuid(pos), *in_client_uuid))
542 continue;
543
544 /* if tag already exist try another fp */
545 if (!IS_ERR(mei_cl_fp_by_vtag(pos, vtag)))
546 continue;
547
548 /* replace cl with acquired one */
549 dev_dbg(dev->dev, "replacing with existing cl\n");
550 mei_cl_unlink(cl);
551 kfree(cl);
552 file->private_data = pos;
553 cl = pos;
554 break;
555 }
556
557 cl_vtag = mei_cl_vtag_alloc(file, vtag);
558 if (IS_ERR(cl_vtag))
559 return -ENOMEM;
560
561 list_add_tail(&cl_vtag->list, &cl->vtag_map);
562 break;
563 default:
564 return -EBUSY;
565 }
566
567 while (cl->state != MEI_FILE_INITIALIZING &&
568 cl->state != MEI_FILE_DISCONNECTED &&
569 cl->state != MEI_FILE_CONNECTED) {
570 mutex_unlock(&dev->device_lock);
571 wait_event_timeout(cl->wait,
572 (cl->state == MEI_FILE_CONNECTED ||
573 cl->state == MEI_FILE_DISCONNECTED ||
574 cl->state == MEI_FILE_DISCONNECT_REQUIRED ||
575 cl->state == MEI_FILE_DISCONNECT_REPLY),
576 dev->timeouts.cl_connect);
577 mutex_lock(&dev->device_lock);
578 }
579
580 if (!mei_cl_is_connected(cl))
581 return mei_ioctl_connect_client(file, in_client_uuid, client);
582
583 client->max_msg_length = cl->me_cl->props.max_msg_length;
584 client->protocol_version = cl->me_cl->props.protocol_version;
585
586 return 0;
587}
588
589/**
590 * mei_ioctl_client_notify_request - propagate event notification
591 * request to client
592 *
593 * @file: pointer to file structure
594 * @request: 0 - disable, 1 - enable
595 *
596 * Return: 0 on success , <0 on error
597 */
598static int mei_ioctl_client_notify_request(const struct file *file, u32 request)
599{
600 struct mei_cl *cl = file->private_data;
601
602 if (request != MEI_HBM_NOTIFICATION_START &&
603 request != MEI_HBM_NOTIFICATION_STOP)
604 return -EINVAL;
605
606 return mei_cl_notify_request(cl, file, (u8)request);
607}
608
609/**
610 * mei_ioctl_client_notify_get - wait for notification request
611 *
612 * @file: pointer to file structure
613 * @notify_get: 0 - disable, 1 - enable
614 *
615 * Return: 0 on success , <0 on error
616 */
617static int mei_ioctl_client_notify_get(const struct file *file, u32 *notify_get)
618{
619 struct mei_cl *cl = file->private_data;
620 bool notify_ev;
621 bool block = (file->f_flags & O_NONBLOCK) == 0;
622 int rets;
623
624 rets = mei_cl_notify_get(cl, block, ¬ify_ev);
625 if (rets)
626 return rets;
627
628 *notify_get = notify_ev ? 1 : 0;
629 return 0;
630}
631
632/**
633 * mei_ioctl - the IOCTL function
634 *
635 * @file: pointer to file structure
636 * @cmd: ioctl command
637 * @data: pointer to mei message structure
638 *
639 * Return: 0 on success , <0 on error
640 */
641static long mei_ioctl(struct file *file, unsigned int cmd, unsigned long data)
642{
643 struct mei_device *dev;
644 struct mei_cl *cl = file->private_data;
645 struct mei_connect_client_data conn;
646 struct mei_connect_client_data_vtag conn_vtag;
647 const uuid_le *cl_uuid;
648 struct mei_client *props;
649 u8 vtag;
650 u32 notify_get, notify_req;
651 int rets;
652
653
654 if (WARN_ON(!cl || !cl->dev))
655 return -ENODEV;
656
657 dev = cl->dev;
658
659 dev_dbg(dev->dev, "IOCTL cmd = 0x%x", cmd);
660
661 mutex_lock(&dev->device_lock);
662 if (dev->dev_state != MEI_DEV_ENABLED) {
663 rets = -ENODEV;
664 goto out;
665 }
666
667 switch (cmd) {
668 case IOCTL_MEI_CONNECT_CLIENT:
669 dev_dbg(dev->dev, ": IOCTL_MEI_CONNECT_CLIENT.\n");
670 if (copy_from_user(&conn, (char __user *)data, sizeof(conn))) {
671 dev_dbg(dev->dev, "failed to copy data from userland\n");
672 rets = -EFAULT;
673 goto out;
674 }
675 cl_uuid = &conn.in_client_uuid;
676 props = &conn.out_client_properties;
677 vtag = 0;
678
679 rets = mei_vt_support_check(dev, cl_uuid);
680 if (rets == -ENOTTY)
681 goto out;
682 if (!rets)
683 rets = mei_ioctl_connect_vtag(file, cl_uuid, props,
684 vtag);
685 else
686 rets = mei_ioctl_connect_client(file, cl_uuid, props);
687 if (rets)
688 goto out;
689
690 /* if all is ok, copying the data back to user. */
691 if (copy_to_user((char __user *)data, &conn, sizeof(conn))) {
692 dev_dbg(dev->dev, "failed to copy data to userland\n");
693 rets = -EFAULT;
694 goto out;
695 }
696
697 break;
698
699 case IOCTL_MEI_CONNECT_CLIENT_VTAG:
700 dev_dbg(dev->dev, "IOCTL_MEI_CONNECT_CLIENT_VTAG\n");
701 if (copy_from_user(&conn_vtag, (char __user *)data,
702 sizeof(conn_vtag))) {
703 dev_dbg(dev->dev, "failed to copy data from userland\n");
704 rets = -EFAULT;
705 goto out;
706 }
707
708 cl_uuid = &conn_vtag.connect.in_client_uuid;
709 props = &conn_vtag.out_client_properties;
710 vtag = conn_vtag.connect.vtag;
711
712 rets = mei_vt_support_check(dev, cl_uuid);
713 if (rets == -EOPNOTSUPP)
714 dev_dbg(dev->dev, "FW Client %pUl does not support vtags\n",
715 cl_uuid);
716 if (rets)
717 goto out;
718
719 if (!vtag) {
720 dev_dbg(dev->dev, "vtag can't be zero\n");
721 rets = -EINVAL;
722 goto out;
723 }
724
725 rets = mei_ioctl_connect_vtag(file, cl_uuid, props, vtag);
726 if (rets)
727 goto out;
728
729 /* if all is ok, copying the data back to user. */
730 if (copy_to_user((char __user *)data, &conn_vtag,
731 sizeof(conn_vtag))) {
732 dev_dbg(dev->dev, "failed to copy data to userland\n");
733 rets = -EFAULT;
734 goto out;
735 }
736
737 break;
738
739 case IOCTL_MEI_NOTIFY_SET:
740 dev_dbg(dev->dev, ": IOCTL_MEI_NOTIFY_SET.\n");
741 if (copy_from_user(¬ify_req,
742 (char __user *)data, sizeof(notify_req))) {
743 dev_dbg(dev->dev, "failed to copy data from userland\n");
744 rets = -EFAULT;
745 goto out;
746 }
747 rets = mei_ioctl_client_notify_request(file, notify_req);
748 break;
749
750 case IOCTL_MEI_NOTIFY_GET:
751 dev_dbg(dev->dev, ": IOCTL_MEI_NOTIFY_GET.\n");
752 rets = mei_ioctl_client_notify_get(file, ¬ify_get);
753 if (rets)
754 goto out;
755
756 dev_dbg(dev->dev, "copy connect data to user\n");
757 if (copy_to_user((char __user *)data,
758 ¬ify_get, sizeof(notify_get))) {
759 dev_dbg(dev->dev, "failed to copy data to userland\n");
760 rets = -EFAULT;
761 goto out;
762
763 }
764 break;
765
766 default:
767 rets = -ENOIOCTLCMD;
768 }
769
770out:
771 mutex_unlock(&dev->device_lock);
772 return rets;
773}
774
775/**
776 * mei_poll - the poll function
777 *
778 * @file: pointer to file structure
779 * @wait: pointer to poll_table structure
780 *
781 * Return: poll mask
782 */
783static __poll_t mei_poll(struct file *file, poll_table *wait)
784{
785 __poll_t req_events = poll_requested_events(wait);
786 struct mei_cl *cl = file->private_data;
787 struct mei_device *dev;
788 __poll_t mask = 0;
789 bool notify_en;
790
791 if (WARN_ON(!cl || !cl->dev))
792 return EPOLLERR;
793
794 dev = cl->dev;
795
796 mutex_lock(&dev->device_lock);
797
798 notify_en = cl->notify_en && (req_events & EPOLLPRI);
799
800 if (dev->dev_state != MEI_DEV_ENABLED ||
801 !mei_cl_is_connected(cl)) {
802 mask = EPOLLERR;
803 goto out;
804 }
805
806 if (notify_en) {
807 poll_wait(file, &cl->ev_wait, wait);
808 if (cl->notify_ev)
809 mask |= EPOLLPRI;
810 }
811
812 if (req_events & (EPOLLIN | EPOLLRDNORM)) {
813 poll_wait(file, &cl->rx_wait, wait);
814
815 if (mei_cl_read_cb(cl, file))
816 mask |= EPOLLIN | EPOLLRDNORM;
817 else
818 mei_cl_read_start(cl, mei_cl_mtu(cl), file);
819 }
820
821 if (req_events & (EPOLLOUT | EPOLLWRNORM)) {
822 poll_wait(file, &cl->tx_wait, wait);
823 if (cl->tx_cb_queued < dev->tx_queue_limit)
824 mask |= EPOLLOUT | EPOLLWRNORM;
825 }
826
827out:
828 mutex_unlock(&dev->device_lock);
829 return mask;
830}
831
832/**
833 * mei_cl_is_write_queued - check if the client has pending writes.
834 *
835 * @cl: writing host client
836 *
837 * Return: true if client is writing, false otherwise.
838 */
839static bool mei_cl_is_write_queued(struct mei_cl *cl)
840{
841 struct mei_device *dev = cl->dev;
842 struct mei_cl_cb *cb;
843
844 list_for_each_entry(cb, &dev->write_list, list)
845 if (cb->cl == cl)
846 return true;
847 list_for_each_entry(cb, &dev->write_waiting_list, list)
848 if (cb->cl == cl)
849 return true;
850 return false;
851}
852
853/**
854 * mei_fsync - the fsync handler
855 *
856 * @fp: pointer to file structure
857 * @start: unused
858 * @end: unused
859 * @datasync: unused
860 *
861 * Return: 0 on success, -ENODEV if client is not connected
862 */
863static int mei_fsync(struct file *fp, loff_t start, loff_t end, int datasync)
864{
865 struct mei_cl *cl = fp->private_data;
866 struct mei_device *dev;
867 int rets;
868
869 if (WARN_ON(!cl || !cl->dev))
870 return -ENODEV;
871
872 dev = cl->dev;
873
874 mutex_lock(&dev->device_lock);
875
876 if (dev->dev_state != MEI_DEV_ENABLED || !mei_cl_is_connected(cl)) {
877 rets = -ENODEV;
878 goto out;
879 }
880
881 while (mei_cl_is_write_queued(cl)) {
882 mutex_unlock(&dev->device_lock);
883 rets = wait_event_interruptible(cl->tx_wait,
884 cl->writing_state == MEI_WRITE_COMPLETE ||
885 !mei_cl_is_connected(cl));
886 mutex_lock(&dev->device_lock);
887 if (rets) {
888 if (signal_pending(current))
889 rets = -EINTR;
890 goto out;
891 }
892 if (!mei_cl_is_connected(cl)) {
893 rets = -ENODEV;
894 goto out;
895 }
896 }
897 rets = 0;
898out:
899 mutex_unlock(&dev->device_lock);
900 return rets;
901}
902
903/**
904 * mei_fasync - asynchronous io support
905 *
906 * @fd: file descriptor
907 * @file: pointer to file structure
908 * @band: band bitmap
909 *
910 * Return: negative on error,
911 * 0 if it did no changes,
912 * and positive a process was added or deleted
913 */
914static int mei_fasync(int fd, struct file *file, int band)
915{
916
917 struct mei_cl *cl = file->private_data;
918
919 if (!mei_cl_is_connected(cl))
920 return -ENODEV;
921
922 return fasync_helper(fd, file, band, &cl->ev_async);
923}
924
925/**
926 * trc_show - mei device trc attribute show method
927 *
928 * @device: device pointer
929 * @attr: attribute pointer
930 * @buf: char out buffer
931 *
932 * Return: number of the bytes printed into buf or error
933 */
934static ssize_t trc_show(struct device *device,
935 struct device_attribute *attr, char *buf)
936{
937 struct mei_device *dev = dev_get_drvdata(device);
938 u32 trc;
939 int ret;
940
941 ret = mei_trc_status(dev, &trc);
942 if (ret)
943 return ret;
944 return sprintf(buf, "%08X\n", trc);
945}
946static DEVICE_ATTR_RO(trc);
947
948/**
949 * fw_status_show - mei device fw_status attribute show method
950 *
951 * @device: device pointer
952 * @attr: attribute pointer
953 * @buf: char out buffer
954 *
955 * Return: number of the bytes printed into buf or error
956 */
957static ssize_t fw_status_show(struct device *device,
958 struct device_attribute *attr, char *buf)
959{
960 struct mei_device *dev = dev_get_drvdata(device);
961 struct mei_fw_status fw_status;
962 int err, i;
963 ssize_t cnt = 0;
964
965 mutex_lock(&dev->device_lock);
966 err = mei_fw_status(dev, &fw_status);
967 mutex_unlock(&dev->device_lock);
968 if (err) {
969 dev_err(device, "read fw_status error = %d\n", err);
970 return err;
971 }
972
973 for (i = 0; i < fw_status.count; i++)
974 cnt += scnprintf(buf + cnt, PAGE_SIZE - cnt, "%08X\n",
975 fw_status.status[i]);
976 return cnt;
977}
978static DEVICE_ATTR_RO(fw_status);
979
980/**
981 * hbm_ver_show - display HBM protocol version negotiated with FW
982 *
983 * @device: device pointer
984 * @attr: attribute pointer
985 * @buf: char out buffer
986 *
987 * Return: number of the bytes printed into buf or error
988 */
989static ssize_t hbm_ver_show(struct device *device,
990 struct device_attribute *attr, char *buf)
991{
992 struct mei_device *dev = dev_get_drvdata(device);
993 struct hbm_version ver;
994
995 mutex_lock(&dev->device_lock);
996 ver = dev->version;
997 mutex_unlock(&dev->device_lock);
998
999 return sprintf(buf, "%u.%u\n", ver.major_version, ver.minor_version);
1000}
1001static DEVICE_ATTR_RO(hbm_ver);
1002
1003/**
1004 * hbm_ver_drv_show - display HBM protocol version advertised by driver
1005 *
1006 * @device: device pointer
1007 * @attr: attribute pointer
1008 * @buf: char out buffer
1009 *
1010 * Return: number of the bytes printed into buf or error
1011 */
1012static ssize_t hbm_ver_drv_show(struct device *device,
1013 struct device_attribute *attr, char *buf)
1014{
1015 return sprintf(buf, "%u.%u\n", HBM_MAJOR_VERSION, HBM_MINOR_VERSION);
1016}
1017static DEVICE_ATTR_RO(hbm_ver_drv);
1018
1019static ssize_t tx_queue_limit_show(struct device *device,
1020 struct device_attribute *attr, char *buf)
1021{
1022 struct mei_device *dev = dev_get_drvdata(device);
1023 u8 size = 0;
1024
1025 mutex_lock(&dev->device_lock);
1026 size = dev->tx_queue_limit;
1027 mutex_unlock(&dev->device_lock);
1028
1029 return sysfs_emit(buf, "%u\n", size);
1030}
1031
1032static ssize_t tx_queue_limit_store(struct device *device,
1033 struct device_attribute *attr,
1034 const char *buf, size_t count)
1035{
1036 struct mei_device *dev = dev_get_drvdata(device);
1037 u8 limit;
1038 unsigned int inp;
1039 int err;
1040
1041 err = kstrtouint(buf, 10, &inp);
1042 if (err)
1043 return err;
1044 if (inp > MEI_TX_QUEUE_LIMIT_MAX || inp < MEI_TX_QUEUE_LIMIT_MIN)
1045 return -EINVAL;
1046 limit = inp;
1047
1048 mutex_lock(&dev->device_lock);
1049 dev->tx_queue_limit = limit;
1050 mutex_unlock(&dev->device_lock);
1051
1052 return count;
1053}
1054static DEVICE_ATTR_RW(tx_queue_limit);
1055
1056/**
1057 * fw_ver_show - display ME FW version
1058 *
1059 * @device: device pointer
1060 * @attr: attribute pointer
1061 * @buf: char out buffer
1062 *
1063 * Return: number of the bytes printed into buf or error
1064 */
1065static ssize_t fw_ver_show(struct device *device,
1066 struct device_attribute *attr, char *buf)
1067{
1068 struct mei_device *dev = dev_get_drvdata(device);
1069 struct mei_fw_version *ver;
1070 ssize_t cnt = 0;
1071 int i;
1072
1073 ver = dev->fw_ver;
1074
1075 for (i = 0; i < MEI_MAX_FW_VER_BLOCKS; i++)
1076 cnt += scnprintf(buf + cnt, PAGE_SIZE - cnt, "%u:%u.%u.%u.%u\n",
1077 ver[i].platform, ver[i].major, ver[i].minor,
1078 ver[i].hotfix, ver[i].buildno);
1079 return cnt;
1080}
1081static DEVICE_ATTR_RO(fw_ver);
1082
1083/**
1084 * dev_state_show - display device state
1085 *
1086 * @device: device pointer
1087 * @attr: attribute pointer
1088 * @buf: char out buffer
1089 *
1090 * Return: number of the bytes printed into buf or error
1091 */
1092static ssize_t dev_state_show(struct device *device,
1093 struct device_attribute *attr, char *buf)
1094{
1095 struct mei_device *dev = dev_get_drvdata(device);
1096 enum mei_dev_state dev_state;
1097
1098 mutex_lock(&dev->device_lock);
1099 dev_state = dev->dev_state;
1100 mutex_unlock(&dev->device_lock);
1101
1102 return sprintf(buf, "%s", mei_dev_state_str(dev_state));
1103}
1104static DEVICE_ATTR_RO(dev_state);
1105
1106/**
1107 * mei_set_devstate: set to new device state and notify sysfs file.
1108 *
1109 * @dev: mei_device
1110 * @state: new device state
1111 */
1112void mei_set_devstate(struct mei_device *dev, enum mei_dev_state state)
1113{
1114 struct device *clsdev;
1115
1116 if (dev->dev_state == state)
1117 return;
1118
1119 dev->dev_state = state;
1120
1121 clsdev = class_find_device_by_devt(&mei_class, dev->cdev.dev);
1122 if (clsdev) {
1123 sysfs_notify(&clsdev->kobj, NULL, "dev_state");
1124 put_device(clsdev);
1125 }
1126}
1127
1128/**
1129 * kind_show - display device kind
1130 *
1131 * @device: device pointer
1132 * @attr: attribute pointer
1133 * @buf: char out buffer
1134 *
1135 * Return: number of the bytes printed into buf or error
1136 */
1137static ssize_t kind_show(struct device *device,
1138 struct device_attribute *attr, char *buf)
1139{
1140 struct mei_device *dev = dev_get_drvdata(device);
1141 ssize_t ret;
1142
1143 if (dev->kind)
1144 ret = sprintf(buf, "%s\n", dev->kind);
1145 else
1146 ret = sprintf(buf, "%s\n", "mei");
1147
1148 return ret;
1149}
1150static DEVICE_ATTR_RO(kind);
1151
1152static struct attribute *mei_attrs[] = {
1153 &dev_attr_fw_status.attr,
1154 &dev_attr_hbm_ver.attr,
1155 &dev_attr_hbm_ver_drv.attr,
1156 &dev_attr_tx_queue_limit.attr,
1157 &dev_attr_fw_ver.attr,
1158 &dev_attr_dev_state.attr,
1159 &dev_attr_trc.attr,
1160 &dev_attr_kind.attr,
1161 NULL
1162};
1163ATTRIBUTE_GROUPS(mei);
1164
1165/*
1166 * file operations structure will be used for mei char device.
1167 */
1168static const struct file_operations mei_fops = {
1169 .owner = THIS_MODULE,
1170 .read = mei_read,
1171 .unlocked_ioctl = mei_ioctl,
1172 .compat_ioctl = compat_ptr_ioctl,
1173 .open = mei_open,
1174 .release = mei_release,
1175 .write = mei_write,
1176 .poll = mei_poll,
1177 .fsync = mei_fsync,
1178 .fasync = mei_fasync,
1179 .llseek = no_llseek
1180};
1181
1182/**
1183 * mei_minor_get - obtain next free device minor number
1184 *
1185 * @dev: device pointer
1186 *
1187 * Return: allocated minor, or -ENOSPC if no free minor left
1188 */
1189static int mei_minor_get(struct mei_device *dev)
1190{
1191 int ret;
1192
1193 mutex_lock(&mei_minor_lock);
1194 ret = idr_alloc(&mei_idr, dev, 0, MEI_MAX_DEVS, GFP_KERNEL);
1195 if (ret >= 0)
1196 dev->minor = ret;
1197 else if (ret == -ENOSPC)
1198 dev_err(dev->dev, "too many mei devices\n");
1199
1200 mutex_unlock(&mei_minor_lock);
1201 return ret;
1202}
1203
1204/**
1205 * mei_minor_free - mark device minor number as free
1206 *
1207 * @dev: device pointer
1208 */
1209static void mei_minor_free(struct mei_device *dev)
1210{
1211 mutex_lock(&mei_minor_lock);
1212 idr_remove(&mei_idr, dev->minor);
1213 mutex_unlock(&mei_minor_lock);
1214}
1215
1216int mei_register(struct mei_device *dev, struct device *parent)
1217{
1218 struct device *clsdev; /* class device */
1219 int ret, devno;
1220
1221 ret = mei_minor_get(dev);
1222 if (ret < 0)
1223 return ret;
1224
1225 /* Fill in the data structures */
1226 devno = MKDEV(MAJOR(mei_devt), dev->minor);
1227 cdev_init(&dev->cdev, &mei_fops);
1228 dev->cdev.owner = parent->driver->owner;
1229
1230 /* Add the device */
1231 ret = cdev_add(&dev->cdev, devno, 1);
1232 if (ret) {
1233 dev_err(parent, "unable to add device %d:%d\n",
1234 MAJOR(mei_devt), dev->minor);
1235 goto err_dev_add;
1236 }
1237
1238 clsdev = device_create_with_groups(&mei_class, parent, devno,
1239 dev, mei_groups,
1240 "mei%d", dev->minor);
1241
1242 if (IS_ERR(clsdev)) {
1243 dev_err(parent, "unable to create device %d:%d\n",
1244 MAJOR(mei_devt), dev->minor);
1245 ret = PTR_ERR(clsdev);
1246 goto err_dev_create;
1247 }
1248
1249 mei_dbgfs_register(dev, dev_name(clsdev));
1250
1251 return 0;
1252
1253err_dev_create:
1254 cdev_del(&dev->cdev);
1255err_dev_add:
1256 mei_minor_free(dev);
1257 return ret;
1258}
1259EXPORT_SYMBOL_GPL(mei_register);
1260
1261void mei_deregister(struct mei_device *dev)
1262{
1263 int devno;
1264
1265 devno = dev->cdev.dev;
1266 cdev_del(&dev->cdev);
1267
1268 mei_dbgfs_deregister(dev);
1269
1270 device_destroy(&mei_class, devno);
1271
1272 mei_minor_free(dev);
1273}
1274EXPORT_SYMBOL_GPL(mei_deregister);
1275
1276static int __init mei_init(void)
1277{
1278 int ret;
1279
1280 ret = class_register(&mei_class);
1281 if (ret)
1282 return ret;
1283
1284 ret = alloc_chrdev_region(&mei_devt, 0, MEI_MAX_DEVS, "mei");
1285 if (ret < 0) {
1286 pr_err("unable to allocate char dev region\n");
1287 goto err_class;
1288 }
1289
1290 ret = mei_cl_bus_init();
1291 if (ret < 0) {
1292 pr_err("unable to initialize bus\n");
1293 goto err_chrdev;
1294 }
1295
1296 return 0;
1297
1298err_chrdev:
1299 unregister_chrdev_region(mei_devt, MEI_MAX_DEVS);
1300err_class:
1301 class_unregister(&mei_class);
1302 return ret;
1303}
1304
1305static void __exit mei_exit(void)
1306{
1307 unregister_chrdev_region(mei_devt, MEI_MAX_DEVS);
1308 class_unregister(&mei_class);
1309 mei_cl_bus_exit();
1310}
1311
1312module_init(mei_init);
1313module_exit(mei_exit);
1314
1315MODULE_AUTHOR("Intel Corporation");
1316MODULE_DESCRIPTION("Intel(R) Management Engine Interface");
1317MODULE_LICENSE("GPL v2");
1318