1 // SPDX-License-Identifier: GPL-2.0-only
3 * This module provides an interface to trigger and test firmware loading.
5 * It is designed to be used for basic evaluation of the firmware loading
6 * subsystem (for example when validating firmware verification). It lacks
7 * any extra dependencies, and will not normally be loaded by the system
8 * unless explicitly requested by name.
11 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13 #include <linux/init.h>
14 #include <linux/module.h>
15 #include <linux/printk.h>
16 #include <linux/completion.h>
17 #include <linux/firmware.h>
18 #include <linux/device.h>
20 #include <linux/miscdevice.h>
21 #include <linux/sizes.h>
22 #include <linux/slab.h>
23 #include <linux/uaccess.h>
24 #include <linux/delay.h>
25 #include <linux/kthread.h>
26 #include <linux/vmalloc.h>
27 #include <linux/efi_embedded_fw.h>
29 #define TEST_FIRMWARE_NAME "test-firmware.bin"
30 #define TEST_FIRMWARE_NUM_REQS 4
31 #define TEST_FIRMWARE_BUF_SIZE SZ_1K
33 static DEFINE_MUTEX(test_fw_mutex
);
34 static const struct firmware
*test_firmware
;
36 struct test_batched_req
{
40 const struct firmware
*fw
;
42 struct completion completion
;
43 struct task_struct
*task
;
48 * test_config - represents configuration for the test for different triggers
50 * @name: the name of the firmware file to look for
51 * @into_buf: when the into_buf is used if this is true
52 * request_firmware_into_buf() will be used instead.
53 * @sync_direct: when the sync trigger is used if this is true
54 * request_firmware_direct() will be used instead.
55 * @send_uevent: whether or not to send a uevent for async requests
56 * @num_requests: number of requests to try per test case. This is trigger
58 * @reqs: stores all requests information
59 * @read_fw_idx: index of thread from which we want to read firmware results
60 * from through the read_fw trigger.
61 * @test_result: a test may use this to collect the result from the call
62 * of the request_firmware*() calls used in their tests. In order of
63 * priority we always keep first any setup error. If no setup errors were
64 * found then we move on to the first error encountered while running the
65 * API. Note that for async calls this typically will be a successful
66 * result (0) unless of course you've used bogus parameters, or the system
67 * is out of memory. In the async case the callback is expected to do a
68 * bit more homework to figure out what happened, unfortunately the only
69 * information passed today on error is the fact that no firmware was
70 * found so we can only assume -ENOENT on async calls if the firmware is
73 * Errors you can expect:
77 * 0: success for sync, for async it means request was sent
78 * -EINVAL: invalid parameters or request
79 * -ENOENT: files not found
83 * -ENOMEM: memory pressure on system
84 * -ENODEV: out of number of devices to test
85 * -EINVAL: an unexpected error has occurred
86 * @req_firmware: if @sync_direct is true this is set to
87 * request_firmware_direct(), otherwise request_firmware()
98 * These below don't belong her but we'll move them once we create
99 * a struct fw_test_device and stuff the misc_dev under there later.
101 struct test_batched_req
*reqs
;
103 int (*req_firmware
)(const struct firmware
**fw
, const char *name
,
104 struct device
*device
);
107 static struct test_config
*test_fw_config
;
109 static ssize_t
test_fw_misc_read(struct file
*f
, char __user
*buf
,
110 size_t size
, loff_t
*offset
)
114 mutex_lock(&test_fw_mutex
);
116 rc
= simple_read_from_buffer(buf
, size
, offset
,
118 test_firmware
->size
);
119 mutex_unlock(&test_fw_mutex
);
123 static const struct file_operations test_fw_fops
= {
124 .owner
= THIS_MODULE
,
125 .read
= test_fw_misc_read
,
128 static void __test_release_all_firmware(void)
130 struct test_batched_req
*req
;
133 if (!test_fw_config
->reqs
)
136 for (i
= 0; i
< test_fw_config
->num_requests
; i
++) {
137 req
= &test_fw_config
->reqs
[i
];
139 release_firmware(req
->fw
);
142 vfree(test_fw_config
->reqs
);
143 test_fw_config
->reqs
= NULL
;
146 static void test_release_all_firmware(void)
148 mutex_lock(&test_fw_mutex
);
149 __test_release_all_firmware();
150 mutex_unlock(&test_fw_mutex
);
154 static void __test_firmware_config_free(void)
156 __test_release_all_firmware();
157 kfree_const(test_fw_config
->name
);
158 test_fw_config
->name
= NULL
;
162 * XXX: move to kstrncpy() once merged.
164 * Users should use kfree_const() when freeing these.
166 static int __kstrncpy(char **dst
, const char *name
, size_t count
, gfp_t gfp
)
168 *dst
= kstrndup(name
, count
, gfp
);
174 static int __test_firmware_config_init(void)
178 ret
= __kstrncpy(&test_fw_config
->name
, TEST_FIRMWARE_NAME
,
179 strlen(TEST_FIRMWARE_NAME
), GFP_KERNEL
);
183 test_fw_config
->num_requests
= TEST_FIRMWARE_NUM_REQS
;
184 test_fw_config
->send_uevent
= true;
185 test_fw_config
->into_buf
= false;
186 test_fw_config
->sync_direct
= false;
187 test_fw_config
->req_firmware
= request_firmware
;
188 test_fw_config
->test_result
= 0;
189 test_fw_config
->reqs
= NULL
;
194 __test_firmware_config_free();
198 static ssize_t
reset_store(struct device
*dev
,
199 struct device_attribute
*attr
,
200 const char *buf
, size_t count
)
204 mutex_lock(&test_fw_mutex
);
206 __test_firmware_config_free();
208 ret
= __test_firmware_config_init();
211 pr_err("could not alloc settings for config trigger: %d\n",
220 mutex_unlock(&test_fw_mutex
);
224 static DEVICE_ATTR_WO(reset
);
226 static ssize_t
config_show(struct device
*dev
,
227 struct device_attribute
*attr
,
232 mutex_lock(&test_fw_mutex
);
234 len
+= scnprintf(buf
, PAGE_SIZE
- len
,
235 "Custom trigger configuration for: %s\n",
238 if (test_fw_config
->name
)
239 len
+= scnprintf(buf
+len
, PAGE_SIZE
- len
,
241 test_fw_config
->name
);
243 len
+= scnprintf(buf
+len
, PAGE_SIZE
- len
,
246 len
+= scnprintf(buf
+len
, PAGE_SIZE
- len
,
247 "num_requests:\t%u\n", test_fw_config
->num_requests
);
249 len
+= scnprintf(buf
+len
, PAGE_SIZE
- len
,
250 "send_uevent:\t\t%s\n",
251 test_fw_config
->send_uevent
?
252 "FW_ACTION_HOTPLUG" :
253 "FW_ACTION_NOHOTPLUG");
254 len
+= scnprintf(buf
+len
, PAGE_SIZE
- len
,
256 test_fw_config
->into_buf
? "true" : "false");
257 len
+= scnprintf(buf
+len
, PAGE_SIZE
- len
,
258 "sync_direct:\t\t%s\n",
259 test_fw_config
->sync_direct
? "true" : "false");
260 len
+= scnprintf(buf
+len
, PAGE_SIZE
- len
,
261 "read_fw_idx:\t%u\n", test_fw_config
->read_fw_idx
);
263 mutex_unlock(&test_fw_mutex
);
267 static DEVICE_ATTR_RO(config
);
269 static ssize_t
config_name_store(struct device
*dev
,
270 struct device_attribute
*attr
,
271 const char *buf
, size_t count
)
275 mutex_lock(&test_fw_mutex
);
276 kfree_const(test_fw_config
->name
);
277 ret
= __kstrncpy(&test_fw_config
->name
, buf
, count
, GFP_KERNEL
);
278 mutex_unlock(&test_fw_mutex
);
284 * As per sysfs_kf_seq_show() the buf is max PAGE_SIZE.
286 static ssize_t
config_test_show_str(char *dst
,
291 mutex_lock(&test_fw_mutex
);
292 len
= snprintf(dst
, PAGE_SIZE
, "%s\n", src
);
293 mutex_unlock(&test_fw_mutex
);
298 static int test_dev_config_update_bool(const char *buf
, size_t size
,
303 mutex_lock(&test_fw_mutex
);
304 if (strtobool(buf
, cfg
) < 0)
308 mutex_unlock(&test_fw_mutex
);
313 static ssize_t
test_dev_config_show_bool(char *buf
, bool val
)
315 return snprintf(buf
, PAGE_SIZE
, "%d\n", val
);
318 static ssize_t
test_dev_config_show_int(char *buf
, int val
)
320 return snprintf(buf
, PAGE_SIZE
, "%d\n", val
);
323 static int test_dev_config_update_u8(const char *buf
, size_t size
, u8
*cfg
)
328 ret
= kstrtol(buf
, 10, &new);
335 mutex_lock(&test_fw_mutex
);
337 mutex_unlock(&test_fw_mutex
);
339 /* Always return full write size even if we didn't consume all */
343 static ssize_t
test_dev_config_show_u8(char *buf
, u8 val
)
345 return snprintf(buf
, PAGE_SIZE
, "%u\n", val
);
348 static ssize_t
config_name_show(struct device
*dev
,
349 struct device_attribute
*attr
,
352 return config_test_show_str(buf
, test_fw_config
->name
);
354 static DEVICE_ATTR_RW(config_name
);
356 static ssize_t
config_num_requests_store(struct device
*dev
,
357 struct device_attribute
*attr
,
358 const char *buf
, size_t count
)
362 mutex_lock(&test_fw_mutex
);
363 if (test_fw_config
->reqs
) {
364 pr_err("Must call release_all_firmware prior to changing config\n");
366 mutex_unlock(&test_fw_mutex
);
369 mutex_unlock(&test_fw_mutex
);
371 rc
= test_dev_config_update_u8(buf
, count
,
372 &test_fw_config
->num_requests
);
378 static ssize_t
config_num_requests_show(struct device
*dev
,
379 struct device_attribute
*attr
,
382 return test_dev_config_show_u8(buf
, test_fw_config
->num_requests
);
384 static DEVICE_ATTR_RW(config_num_requests
);
386 static ssize_t
config_into_buf_store(struct device
*dev
,
387 struct device_attribute
*attr
,
388 const char *buf
, size_t count
)
390 return test_dev_config_update_bool(buf
,
392 &test_fw_config
->into_buf
);
395 static ssize_t
config_into_buf_show(struct device
*dev
,
396 struct device_attribute
*attr
,
399 return test_dev_config_show_bool(buf
, test_fw_config
->into_buf
);
401 static DEVICE_ATTR_RW(config_into_buf
);
403 static ssize_t
config_sync_direct_store(struct device
*dev
,
404 struct device_attribute
*attr
,
405 const char *buf
, size_t count
)
407 int rc
= test_dev_config_update_bool(buf
, count
,
408 &test_fw_config
->sync_direct
);
411 test_fw_config
->req_firmware
= test_fw_config
->sync_direct
?
412 request_firmware_direct
:
417 static ssize_t
config_sync_direct_show(struct device
*dev
,
418 struct device_attribute
*attr
,
421 return test_dev_config_show_bool(buf
, test_fw_config
->sync_direct
);
423 static DEVICE_ATTR_RW(config_sync_direct
);
425 static ssize_t
config_send_uevent_store(struct device
*dev
,
426 struct device_attribute
*attr
,
427 const char *buf
, size_t count
)
429 return test_dev_config_update_bool(buf
, count
,
430 &test_fw_config
->send_uevent
);
433 static ssize_t
config_send_uevent_show(struct device
*dev
,
434 struct device_attribute
*attr
,
437 return test_dev_config_show_bool(buf
, test_fw_config
->send_uevent
);
439 static DEVICE_ATTR_RW(config_send_uevent
);
441 static ssize_t
config_read_fw_idx_store(struct device
*dev
,
442 struct device_attribute
*attr
,
443 const char *buf
, size_t count
)
445 return test_dev_config_update_u8(buf
, count
,
446 &test_fw_config
->read_fw_idx
);
449 static ssize_t
config_read_fw_idx_show(struct device
*dev
,
450 struct device_attribute
*attr
,
453 return test_dev_config_show_u8(buf
, test_fw_config
->read_fw_idx
);
455 static DEVICE_ATTR_RW(config_read_fw_idx
);
458 static ssize_t
trigger_request_store(struct device
*dev
,
459 struct device_attribute
*attr
,
460 const char *buf
, size_t count
)
465 name
= kstrndup(buf
, count
, GFP_KERNEL
);
469 pr_info("loading '%s'\n", name
);
471 mutex_lock(&test_fw_mutex
);
472 release_firmware(test_firmware
);
473 test_firmware
= NULL
;
474 rc
= request_firmware(&test_firmware
, name
, dev
);
476 pr_info("load of '%s' failed: %d\n", name
, rc
);
479 pr_info("loaded: %zu\n", test_firmware
->size
);
483 mutex_unlock(&test_fw_mutex
);
489 static DEVICE_ATTR_WO(trigger_request
);
491 #ifdef CONFIG_EFI_EMBEDDED_FIRMWARE
492 static ssize_t
trigger_request_platform_store(struct device
*dev
,
493 struct device_attribute
*attr
,
494 const char *buf
, size_t count
)
496 static const u8 test_data
[] = {
497 0x55, 0xaa, 0x55, 0xaa, 0x01, 0x02, 0x03, 0x04,
498 0x55, 0xaa, 0x55, 0xaa, 0x05, 0x06, 0x07, 0x08,
499 0x55, 0xaa, 0x55, 0xaa, 0x10, 0x20, 0x30, 0x40,
500 0x55, 0xaa, 0x55, 0xaa, 0x50, 0x60, 0x70, 0x80
502 struct efi_embedded_fw efi_embedded_fw
;
503 const struct firmware
*firmware
= NULL
;
507 name
= kstrndup(buf
, count
, GFP_KERNEL
);
511 pr_info("inserting test platform fw '%s'\n", name
);
512 efi_embedded_fw
.name
= name
;
513 efi_embedded_fw
.data
= (void *)test_data
;
514 efi_embedded_fw
.length
= sizeof(test_data
);
515 list_add(&efi_embedded_fw
.list
, &efi_embedded_fw_list
);
517 pr_info("loading '%s'\n", name
);
518 rc
= firmware_request_platform(&firmware
, name
, dev
);
520 pr_info("load of '%s' failed: %d\n", name
, rc
);
523 if (firmware
->size
!= sizeof(test_data
) ||
524 memcmp(firmware
->data
, test_data
, sizeof(test_data
)) != 0) {
525 pr_info("firmware contents mismatch for '%s'\n", name
);
529 pr_info("loaded: %zu\n", firmware
->size
);
533 release_firmware(firmware
);
534 list_del(&efi_embedded_fw
.list
);
539 static DEVICE_ATTR_WO(trigger_request_platform
);
542 static DECLARE_COMPLETION(async_fw_done
);
544 static void trigger_async_request_cb(const struct firmware
*fw
, void *context
)
547 complete(&async_fw_done
);
550 static ssize_t
trigger_async_request_store(struct device
*dev
,
551 struct device_attribute
*attr
,
552 const char *buf
, size_t count
)
557 name
= kstrndup(buf
, count
, GFP_KERNEL
);
561 pr_info("loading '%s'\n", name
);
563 mutex_lock(&test_fw_mutex
);
564 release_firmware(test_firmware
);
565 test_firmware
= NULL
;
566 rc
= request_firmware_nowait(THIS_MODULE
, 1, name
, dev
, GFP_KERNEL
,
567 NULL
, trigger_async_request_cb
);
569 pr_info("async load of '%s' failed: %d\n", name
, rc
);
573 /* Free 'name' ASAP, to test for race conditions */
576 wait_for_completion(&async_fw_done
);
579 pr_info("loaded: %zu\n", test_firmware
->size
);
582 pr_err("failed to async load firmware\n");
587 mutex_unlock(&test_fw_mutex
);
591 static DEVICE_ATTR_WO(trigger_async_request
);
593 static ssize_t
trigger_custom_fallback_store(struct device
*dev
,
594 struct device_attribute
*attr
,
595 const char *buf
, size_t count
)
600 name
= kstrndup(buf
, count
, GFP_KERNEL
);
604 pr_info("loading '%s' using custom fallback mechanism\n", name
);
606 mutex_lock(&test_fw_mutex
);
607 release_firmware(test_firmware
);
608 test_firmware
= NULL
;
609 rc
= request_firmware_nowait(THIS_MODULE
, FW_ACTION_NOHOTPLUG
, name
,
610 dev
, GFP_KERNEL
, NULL
,
611 trigger_async_request_cb
);
613 pr_info("async load of '%s' failed: %d\n", name
, rc
);
617 /* Free 'name' ASAP, to test for race conditions */
620 wait_for_completion(&async_fw_done
);
623 pr_info("loaded: %zu\n", test_firmware
->size
);
626 pr_err("failed to async load firmware\n");
631 mutex_unlock(&test_fw_mutex
);
635 static DEVICE_ATTR_WO(trigger_custom_fallback
);
637 static int test_fw_run_batch_request(void *data
)
639 struct test_batched_req
*req
= data
;
642 test_fw_config
->test_result
= -EINVAL
;
646 if (test_fw_config
->into_buf
) {
649 test_buf
= kzalloc(TEST_FIRMWARE_BUF_SIZE
, GFP_KERNEL
);
653 req
->rc
= request_firmware_into_buf(&req
->fw
,
657 TEST_FIRMWARE_BUF_SIZE
);
661 req
->rc
= test_fw_config
->req_firmware(&req
->fw
,
667 pr_info("#%u: batched sync load failed: %d\n",
669 if (!test_fw_config
->test_result
)
670 test_fw_config
->test_result
= req
->rc
;
671 } else if (req
->fw
) {
673 pr_info("#%u: batched sync loaded %zu\n",
674 req
->idx
, req
->fw
->size
);
676 complete(&req
->completion
);
684 * We use a kthread as otherwise the kernel serializes all our sync requests
685 * and we would not be able to mimic batched requests on a sync call. Batched
686 * requests on a sync call can for instance happen on a device driver when
687 * multiple cards are used and firmware loading happens outside of probe.
689 static ssize_t
trigger_batched_requests_store(struct device
*dev
,
690 struct device_attribute
*attr
,
691 const char *buf
, size_t count
)
693 struct test_batched_req
*req
;
697 mutex_lock(&test_fw_mutex
);
699 test_fw_config
->reqs
=
700 vzalloc(array3_size(sizeof(struct test_batched_req
),
701 test_fw_config
->num_requests
, 2));
702 if (!test_fw_config
->reqs
) {
707 pr_info("batched sync firmware loading '%s' %u times\n",
708 test_fw_config
->name
, test_fw_config
->num_requests
);
710 for (i
= 0; i
< test_fw_config
->num_requests
; i
++) {
711 req
= &test_fw_config
->reqs
[i
];
714 req
->name
= test_fw_config
->name
;
716 init_completion(&req
->completion
);
717 req
->task
= kthread_run(test_fw_run_batch_request
, req
,
718 "%s-%u", KBUILD_MODNAME
, req
->idx
);
719 if (!req
->task
|| IS_ERR(req
->task
)) {
720 pr_err("Setting up thread %u failed\n", req
->idx
);
730 * We require an explicit release to enable more time and delay of
731 * calling release_firmware() to improve our chances of forcing a
732 * batched request. If we instead called release_firmware() right away
733 * then we might miss on an opportunity of having a successful firmware
734 * request pass on the opportunity to be come a batched request.
738 for (i
= 0; i
< test_fw_config
->num_requests
; i
++) {
739 req
= &test_fw_config
->reqs
[i
];
740 if (req
->task
|| req
->sent
)
741 wait_for_completion(&req
->completion
);
744 /* Override any worker error if we had a general setup error */
746 test_fw_config
->test_result
= rc
;
749 mutex_unlock(&test_fw_mutex
);
753 static DEVICE_ATTR_WO(trigger_batched_requests
);
756 * We wait for each callback to return with the lock held, no need to lock here
758 static void trigger_batched_cb(const struct firmware
*fw
, void *context
)
760 struct test_batched_req
*req
= context
;
763 test_fw_config
->test_result
= -EINVAL
;
767 /* forces *some* batched requests to queue up */
774 * Unfortunately the firmware API gives us nothing other than a null FW
775 * if the firmware was not found on async requests. Best we can do is
776 * just assume -ENOENT. A better API would pass the actual return
777 * value to the callback.
779 if (!fw
&& !test_fw_config
->test_result
)
780 test_fw_config
->test_result
= -ENOENT
;
782 complete(&req
->completion
);
786 ssize_t
trigger_batched_requests_async_store(struct device
*dev
,
787 struct device_attribute
*attr
,
788 const char *buf
, size_t count
)
790 struct test_batched_req
*req
;
795 mutex_lock(&test_fw_mutex
);
797 test_fw_config
->reqs
=
798 vzalloc(array3_size(sizeof(struct test_batched_req
),
799 test_fw_config
->num_requests
, 2));
800 if (!test_fw_config
->reqs
) {
805 pr_info("batched loading '%s' custom fallback mechanism %u times\n",
806 test_fw_config
->name
, test_fw_config
->num_requests
);
808 send_uevent
= test_fw_config
->send_uevent
? FW_ACTION_HOTPLUG
:
811 for (i
= 0; i
< test_fw_config
->num_requests
; i
++) {
812 req
= &test_fw_config
->reqs
[i
];
813 req
->name
= test_fw_config
->name
;
816 init_completion(&req
->completion
);
817 rc
= request_firmware_nowait(THIS_MODULE
, send_uevent
,
819 dev
, GFP_KERNEL
, req
,
822 pr_info("#%u: batched async load failed setup: %d\n",
835 * We require an explicit release to enable more time and delay of
836 * calling release_firmware() to improve our chances of forcing a
837 * batched request. If we instead called release_firmware() right away
838 * then we might miss on an opportunity of having a successful firmware
839 * request pass on the opportunity to be come a batched request.
842 for (i
= 0; i
< test_fw_config
->num_requests
; i
++) {
843 req
= &test_fw_config
->reqs
[i
];
845 wait_for_completion(&req
->completion
);
848 /* Override any worker error if we had a general setup error */
850 test_fw_config
->test_result
= rc
;
853 mutex_unlock(&test_fw_mutex
);
857 static DEVICE_ATTR_WO(trigger_batched_requests_async
);
859 static ssize_t
test_result_show(struct device
*dev
,
860 struct device_attribute
*attr
,
863 return test_dev_config_show_int(buf
, test_fw_config
->test_result
);
865 static DEVICE_ATTR_RO(test_result
);
867 static ssize_t
release_all_firmware_store(struct device
*dev
,
868 struct device_attribute
*attr
,
869 const char *buf
, size_t count
)
871 test_release_all_firmware();
874 static DEVICE_ATTR_WO(release_all_firmware
);
876 static ssize_t
read_firmware_show(struct device
*dev
,
877 struct device_attribute
*attr
,
880 struct test_batched_req
*req
;
884 mutex_lock(&test_fw_mutex
);
886 idx
= test_fw_config
->read_fw_idx
;
887 if (idx
>= test_fw_config
->num_requests
) {
892 if (!test_fw_config
->reqs
) {
897 req
= &test_fw_config
->reqs
[idx
];
899 pr_err("#%u: failed to async load firmware\n", idx
);
904 pr_info("#%u: loaded %zu\n", idx
, req
->fw
->size
);
906 if (req
->fw
->size
> PAGE_SIZE
) {
907 pr_err("Testing interface must use PAGE_SIZE firmware for now\n");
911 memcpy(buf
, req
->fw
->data
, req
->fw
->size
);
915 mutex_unlock(&test_fw_mutex
);
919 static DEVICE_ATTR_RO(read_firmware
);
921 #define TEST_FW_DEV_ATTR(name) &dev_attr_##name.attr
923 static struct attribute
*test_dev_attrs
[] = {
924 TEST_FW_DEV_ATTR(reset
),
926 TEST_FW_DEV_ATTR(config
),
927 TEST_FW_DEV_ATTR(config_name
),
928 TEST_FW_DEV_ATTR(config_num_requests
),
929 TEST_FW_DEV_ATTR(config_into_buf
),
930 TEST_FW_DEV_ATTR(config_sync_direct
),
931 TEST_FW_DEV_ATTR(config_send_uevent
),
932 TEST_FW_DEV_ATTR(config_read_fw_idx
),
934 /* These don't use the config at all - they could be ported! */
935 TEST_FW_DEV_ATTR(trigger_request
),
936 TEST_FW_DEV_ATTR(trigger_async_request
),
937 TEST_FW_DEV_ATTR(trigger_custom_fallback
),
938 #ifdef CONFIG_EFI_EMBEDDED_FIRMWARE
939 TEST_FW_DEV_ATTR(trigger_request_platform
),
942 /* These use the config and can use the test_result */
943 TEST_FW_DEV_ATTR(trigger_batched_requests
),
944 TEST_FW_DEV_ATTR(trigger_batched_requests_async
),
946 TEST_FW_DEV_ATTR(release_all_firmware
),
947 TEST_FW_DEV_ATTR(test_result
),
948 TEST_FW_DEV_ATTR(read_firmware
),
952 ATTRIBUTE_GROUPS(test_dev
);
954 static struct miscdevice test_fw_misc_device
= {
955 .minor
= MISC_DYNAMIC_MINOR
,
956 .name
= "test_firmware",
957 .fops
= &test_fw_fops
,
958 .groups
= test_dev_groups
,
961 static int __init
test_firmware_init(void)
965 test_fw_config
= kzalloc(sizeof(struct test_config
), GFP_KERNEL
);
969 rc
= __test_firmware_config_init();
971 kfree(test_fw_config
);
972 pr_err("could not init firmware test config: %d\n", rc
);
976 rc
= misc_register(&test_fw_misc_device
);
978 kfree(test_fw_config
);
979 pr_err("could not register misc device: %d\n", rc
);
983 pr_warn("interface ready\n");
988 module_init(test_firmware_init
);
990 static void __exit
test_firmware_exit(void)
992 mutex_lock(&test_fw_mutex
);
993 release_firmware(test_firmware
);
994 misc_deregister(&test_fw_misc_device
);
995 __test_firmware_config_free();
996 kfree(test_fw_config
);
997 mutex_unlock(&test_fw_mutex
);
999 pr_warn("removed interface\n");
1002 module_exit(test_firmware_exit
);
1004 MODULE_AUTHOR("Kees Cook <keescook@chromium.org>");
1005 MODULE_LICENSE("GPL");