Changes in 4.9.149 NFC: nxp-nci: Include unaligned.h instead of access_ok.h ip6mr: Fix potential Spectre v1 vulnerability ipv4: Fix potential Spectre v1 vulnerability ax25: fix a use-after-free in ax25_fillin_cb() ibmveth: fix DMA unmap error in ibmveth_xmit_start error path ieee802154: lowpan_header_create check must check daddr ipv6: explicitly initialize udp6_addr in udp_sock_create6() ipv6: tunnels: fix two use-after-free isdn: fix kernel-infoleak in capi_unlocked_ioctl net: ipv4: do not handle duplicate fragments as overlapping net: phy: Fix the issue that netif always links up after resuming netrom: fix locking in nr_find_socket() net/wan: fix a double free in x25_asy_open_tty() packet: validate address length packet: validate address length if non-zero sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event tipc: fix a double kfree_skb() vhost: make sure used idx is seen before log in vhost_add_used_n() VSOCK: Send reset control packet when socket is partially bound xen/netfront: tolerate frags with no data tipc: use lock_sock() in tipc_sk_reinit() tipc: compare remote and local protocols in tipc_udp_enable() gro_cell: add napi_disable in gro_cells_destroy net/mlx5e: Remove the false indication of software timestamping support net/mlx5: Typo fix in del_sw_hw_rule sock: Make sock->sk_stamp thread-safe ptr_ring: wrap back ->producer in __ptr_ring_swap_queue() ALSA: rme9652: Fix potential Spectre v1 vulnerability ALSA: emu10k1: Fix potential Spectre v1 vulnerabilities ALSA: pcm: Fix potential Spectre v1 vulnerability ALSA: emux: Fix potential Spectre v1 vulnerabilities mtd: atmel-quadspi: disallow building on ebsa110 ALSA: hda: add mute LED support for HP EliteBook 840 G4 ALSA: hda/tegra: clear pending irq handlers USB: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays USB: serial: option: add Fibocom NL678 series usb: r8a66597: Fix a possible concurrency use-after-free bug in r8a66597_endpoint_disable() staging: wilc1000: fix missing read_write setting when reading data qmi_wwan: apply SET_DTR quirk to the SIMCOM shared device ID Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G KVM: x86: Use jmp to invoke kvm_spurious_fault() from .fixup platform-msi: Free descriptors in platform_msi_domain_free() perf pmu: Suppress potential format-truncation warning ext4: fix possible use after free in ext4_quota_enable ext4: missing unlock/put_page() in ext4_try_to_write_inline_data() ext4: fix EXT4_IOC_GROUP_ADD ioctl ext4: include terminating u32 in size of xattr entries when expanding inodes ext4: force inode writes when nfsd calls commit_metadata() spi: bcm2835: Fix race on DMA termination spi: bcm2835: Fix book-keeping of DMA termination spi: bcm2835: Avoid finishing transfer prematurely in IRQ mode clk: rockchip: fix typo in rk3188 spdif_frac parent cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader. f2fs: fix validation of the block count in sanity_check_raw_super serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly media: vivid: free bitmap_cap when updating std/timings/etc. media: v4l2-tpg: array index could become negative MIPS: Ensure pmd_present() returns false after pmd_mknotpresent() MIPS: Align kernel load address to 64KB MIPS: OCTEON: mark RGMII interface disabled on OCTEON III CIFS: Fix error mapping for SMB2_LOCK command which caused OFD lock problem x86/kvm/vmx: do not use vm-exit instruction length for fast MMIO when running nested arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 rtc: m41t80: Correct alarm month range with RTC reads tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x spi: bcm2835: Unbreak the build of esoteric configs Linux 4.9.149 Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
326 lines
8.1 KiB
C
326 lines
8.1 KiB
C
/*
|
|
* Generic driver for NXP NCI NFC chips
|
|
*
|
|
* Copyright (C) 2014 NXP Semiconductors All rights reserved.
|
|
*
|
|
* Author: Clément Perrochaud <clement.perrochaud@nxp.com>
|
|
*
|
|
* Derived from PN544 device driver:
|
|
* Copyright (C) 2012 Intel Corporation. All rights reserved.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms and conditions of the GNU General Public License,
|
|
* version 2, as published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <linux/completion.h>
|
|
#include <linux/firmware.h>
|
|
#include <linux/nfc.h>
|
|
#include <asm/unaligned.h>
|
|
|
|
#include "nxp-nci.h"
|
|
|
|
/* Crypto operations can take up to 30 seconds */
|
|
#define NXP_NCI_FW_ANSWER_TIMEOUT msecs_to_jiffies(30000)
|
|
|
|
#define NXP_NCI_FW_CMD_RESET 0xF0
|
|
#define NXP_NCI_FW_CMD_GETVERSION 0xF1
|
|
#define NXP_NCI_FW_CMD_CHECKINTEGRITY 0xE0
|
|
#define NXP_NCI_FW_CMD_WRITE 0xC0
|
|
#define NXP_NCI_FW_CMD_READ 0xA2
|
|
#define NXP_NCI_FW_CMD_GETSESSIONSTATE 0xF2
|
|
#define NXP_NCI_FW_CMD_LOG 0xA7
|
|
#define NXP_NCI_FW_CMD_FORCE 0xD0
|
|
#define NXP_NCI_FW_CMD_GET_DIE_ID 0xF4
|
|
|
|
#define NXP_NCI_FW_CHUNK_FLAG 0x0400
|
|
|
|
#define NXP_NCI_FW_RESULT_OK 0x00
|
|
#define NXP_NCI_FW_RESULT_INVALID_ADDR 0x01
|
|
#define NXP_NCI_FW_RESULT_GENERIC_ERROR 0x02
|
|
#define NXP_NCI_FW_RESULT_UNKNOWN_CMD 0x0B
|
|
#define NXP_NCI_FW_RESULT_ABORTED_CMD 0x0C
|
|
#define NXP_NCI_FW_RESULT_PLL_ERROR 0x0D
|
|
#define NXP_NCI_FW_RESULT_ADDR_RANGE_OFL_ERROR 0x1E
|
|
#define NXP_NCI_FW_RESULT_BUFFER_OFL_ERROR 0x1F
|
|
#define NXP_NCI_FW_RESULT_MEM_BSY 0x20
|
|
#define NXP_NCI_FW_RESULT_SIGNATURE_ERROR 0x21
|
|
#define NXP_NCI_FW_RESULT_FIRMWARE_VERSION_ERROR 0x24
|
|
#define NXP_NCI_FW_RESULT_PROTOCOL_ERROR 0x28
|
|
#define NXP_NCI_FW_RESULT_SFWU_DEGRADED 0x2A
|
|
#define NXP_NCI_FW_RESULT_PH_STATUS_FIRST_CHUNK 0x2D
|
|
#define NXP_NCI_FW_RESULT_PH_STATUS_NEXT_CHUNK 0x2E
|
|
#define NXP_NCI_FW_RESULT_PH_STATUS_INTERNAL_ERROR_5 0xC5
|
|
|
|
void nxp_nci_fw_work_complete(struct nxp_nci_info *info, int result)
|
|
{
|
|
struct nxp_nci_fw_info *fw_info = &info->fw_info;
|
|
int r;
|
|
|
|
if (info->phy_ops->set_mode) {
|
|
r = info->phy_ops->set_mode(info->phy_id, NXP_NCI_MODE_COLD);
|
|
if (r < 0 && result == 0)
|
|
result = -r;
|
|
}
|
|
|
|
info->mode = NXP_NCI_MODE_COLD;
|
|
|
|
if (fw_info->fw) {
|
|
release_firmware(fw_info->fw);
|
|
fw_info->fw = NULL;
|
|
}
|
|
|
|
nfc_fw_download_done(info->ndev->nfc_dev, fw_info->name, (u32) -result);
|
|
}
|
|
|
|
/* crc_ccitt cannot be used since it is computed MSB first and not LSB first */
|
|
static u16 nxp_nci_fw_crc(u8 const *buffer, size_t len)
|
|
{
|
|
u16 crc = 0xffff;
|
|
|
|
while (len--) {
|
|
crc = ((crc >> 8) | (crc << 8)) ^ *buffer++;
|
|
crc ^= (crc & 0xff) >> 4;
|
|
crc ^= (crc & 0xff) << 12;
|
|
crc ^= (crc & 0xff) << 5;
|
|
}
|
|
|
|
return crc;
|
|
}
|
|
|
|
static int nxp_nci_fw_send_chunk(struct nxp_nci_info *info)
|
|
{
|
|
struct nxp_nci_fw_info *fw_info = &info->fw_info;
|
|
u16 header, crc;
|
|
struct sk_buff *skb;
|
|
size_t chunk_len;
|
|
size_t remaining_len;
|
|
int r;
|
|
|
|
skb = nci_skb_alloc(info->ndev, info->max_payload, GFP_KERNEL);
|
|
if (!skb) {
|
|
r = -ENOMEM;
|
|
goto chunk_exit;
|
|
}
|
|
|
|
chunk_len = info->max_payload - NXP_NCI_FW_HDR_LEN - NXP_NCI_FW_CRC_LEN;
|
|
remaining_len = fw_info->frame_size - fw_info->written;
|
|
|
|
if (remaining_len > chunk_len) {
|
|
header = NXP_NCI_FW_CHUNK_FLAG;
|
|
} else {
|
|
chunk_len = remaining_len;
|
|
header = 0x0000;
|
|
}
|
|
|
|
header |= chunk_len & NXP_NCI_FW_FRAME_LEN_MASK;
|
|
put_unaligned_be16(header, skb_put(skb, NXP_NCI_FW_HDR_LEN));
|
|
|
|
memcpy(skb_put(skb, chunk_len), fw_info->data + fw_info->written,
|
|
chunk_len);
|
|
|
|
crc = nxp_nci_fw_crc(skb->data, chunk_len + NXP_NCI_FW_HDR_LEN);
|
|
put_unaligned_be16(crc, skb_put(skb, NXP_NCI_FW_CRC_LEN));
|
|
|
|
r = info->phy_ops->write(info->phy_id, skb);
|
|
if (r >= 0)
|
|
r = chunk_len;
|
|
|
|
kfree_skb(skb);
|
|
|
|
chunk_exit:
|
|
return r;
|
|
}
|
|
|
|
static int nxp_nci_fw_send(struct nxp_nci_info *info)
|
|
{
|
|
struct nxp_nci_fw_info *fw_info = &info->fw_info;
|
|
long completion_rc;
|
|
int r;
|
|
|
|
reinit_completion(&fw_info->cmd_completion);
|
|
|
|
if (fw_info->written == 0) {
|
|
fw_info->frame_size = get_unaligned_be16(fw_info->data) &
|
|
NXP_NCI_FW_FRAME_LEN_MASK;
|
|
fw_info->data += NXP_NCI_FW_HDR_LEN;
|
|
fw_info->size -= NXP_NCI_FW_HDR_LEN;
|
|
}
|
|
|
|
if (fw_info->frame_size > fw_info->size)
|
|
return -EMSGSIZE;
|
|
|
|
r = nxp_nci_fw_send_chunk(info);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
fw_info->written += r;
|
|
|
|
if (*fw_info->data == NXP_NCI_FW_CMD_RESET) {
|
|
fw_info->cmd_result = 0;
|
|
if (fw_info->fw)
|
|
schedule_work(&fw_info->work);
|
|
} else {
|
|
completion_rc = wait_for_completion_interruptible_timeout(
|
|
&fw_info->cmd_completion, NXP_NCI_FW_ANSWER_TIMEOUT);
|
|
if (completion_rc == 0)
|
|
return -ETIMEDOUT;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
void nxp_nci_fw_work(struct work_struct *work)
|
|
{
|
|
struct nxp_nci_info *info;
|
|
struct nxp_nci_fw_info *fw_info;
|
|
int r;
|
|
|
|
fw_info = container_of(work, struct nxp_nci_fw_info, work);
|
|
info = container_of(fw_info, struct nxp_nci_info, fw_info);
|
|
|
|
mutex_lock(&info->info_lock);
|
|
|
|
r = fw_info->cmd_result;
|
|
if (r < 0)
|
|
goto exit_work;
|
|
|
|
if (fw_info->written == fw_info->frame_size) {
|
|
fw_info->data += fw_info->frame_size;
|
|
fw_info->size -= fw_info->frame_size;
|
|
fw_info->written = 0;
|
|
}
|
|
|
|
if (fw_info->size > 0)
|
|
r = nxp_nci_fw_send(info);
|
|
|
|
exit_work:
|
|
if (r < 0 || fw_info->size == 0)
|
|
nxp_nci_fw_work_complete(info, r);
|
|
mutex_unlock(&info->info_lock);
|
|
}
|
|
|
|
int nxp_nci_fw_download(struct nci_dev *ndev, const char *firmware_name)
|
|
{
|
|
struct nxp_nci_info *info = nci_get_drvdata(ndev);
|
|
struct nxp_nci_fw_info *fw_info = &info->fw_info;
|
|
int r;
|
|
|
|
mutex_lock(&info->info_lock);
|
|
|
|
if (!info->phy_ops->set_mode || !info->phy_ops->write) {
|
|
r = -ENOTSUPP;
|
|
goto fw_download_exit;
|
|
}
|
|
|
|
if (!firmware_name || firmware_name[0] == '\0') {
|
|
r = -EINVAL;
|
|
goto fw_download_exit;
|
|
}
|
|
|
|
strcpy(fw_info->name, firmware_name);
|
|
|
|
r = request_firmware(&fw_info->fw, firmware_name,
|
|
ndev->nfc_dev->dev.parent);
|
|
if (r < 0)
|
|
goto fw_download_exit;
|
|
|
|
r = info->phy_ops->set_mode(info->phy_id, NXP_NCI_MODE_FW);
|
|
if (r < 0) {
|
|
release_firmware(fw_info->fw);
|
|
goto fw_download_exit;
|
|
}
|
|
|
|
info->mode = NXP_NCI_MODE_FW;
|
|
|
|
fw_info->data = fw_info->fw->data;
|
|
fw_info->size = fw_info->fw->size;
|
|
fw_info->written = 0;
|
|
fw_info->frame_size = 0;
|
|
fw_info->cmd_result = 0;
|
|
|
|
schedule_work(&fw_info->work);
|
|
|
|
fw_download_exit:
|
|
mutex_unlock(&info->info_lock);
|
|
return r;
|
|
}
|
|
|
|
static int nxp_nci_fw_read_status(u8 stat)
|
|
{
|
|
switch (stat) {
|
|
case NXP_NCI_FW_RESULT_OK:
|
|
return 0;
|
|
case NXP_NCI_FW_RESULT_INVALID_ADDR:
|
|
return -EINVAL;
|
|
case NXP_NCI_FW_RESULT_UNKNOWN_CMD:
|
|
return -EINVAL;
|
|
case NXP_NCI_FW_RESULT_ABORTED_CMD:
|
|
return -EMSGSIZE;
|
|
case NXP_NCI_FW_RESULT_ADDR_RANGE_OFL_ERROR:
|
|
return -EADDRNOTAVAIL;
|
|
case NXP_NCI_FW_RESULT_BUFFER_OFL_ERROR:
|
|
return -ENOBUFS;
|
|
case NXP_NCI_FW_RESULT_MEM_BSY:
|
|
return -ENOKEY;
|
|
case NXP_NCI_FW_RESULT_SIGNATURE_ERROR:
|
|
return -EKEYREJECTED;
|
|
case NXP_NCI_FW_RESULT_FIRMWARE_VERSION_ERROR:
|
|
return -EALREADY;
|
|
case NXP_NCI_FW_RESULT_PROTOCOL_ERROR:
|
|
return -EPROTO;
|
|
case NXP_NCI_FW_RESULT_SFWU_DEGRADED:
|
|
return -EHWPOISON;
|
|
case NXP_NCI_FW_RESULT_PH_STATUS_FIRST_CHUNK:
|
|
return 0;
|
|
case NXP_NCI_FW_RESULT_PH_STATUS_NEXT_CHUNK:
|
|
return 0;
|
|
case NXP_NCI_FW_RESULT_PH_STATUS_INTERNAL_ERROR_5:
|
|
return -EINVAL;
|
|
default:
|
|
return -EIO;
|
|
}
|
|
}
|
|
|
|
static u16 nxp_nci_fw_check_crc(struct sk_buff *skb)
|
|
{
|
|
u16 crc, frame_crc;
|
|
size_t len = skb->len - NXP_NCI_FW_CRC_LEN;
|
|
|
|
crc = nxp_nci_fw_crc(skb->data, len);
|
|
frame_crc = get_unaligned_be16(skb->data + len);
|
|
|
|
return (crc ^ frame_crc);
|
|
}
|
|
|
|
void nxp_nci_fw_recv_frame(struct nci_dev *ndev, struct sk_buff *skb)
|
|
{
|
|
struct nxp_nci_info *info = nci_get_drvdata(ndev);
|
|
struct nxp_nci_fw_info *fw_info = &info->fw_info;
|
|
|
|
complete(&fw_info->cmd_completion);
|
|
|
|
if (skb) {
|
|
if (nxp_nci_fw_check_crc(skb) != 0x00)
|
|
fw_info->cmd_result = -EBADMSG;
|
|
else
|
|
fw_info->cmd_result = nxp_nci_fw_read_status(
|
|
*skb_pull(skb, NXP_NCI_FW_HDR_LEN));
|
|
kfree_skb(skb);
|
|
} else {
|
|
fw_info->cmd_result = -EIO;
|
|
}
|
|
|
|
if (fw_info->fw)
|
|
schedule_work(&fw_info->work);
|
|
}
|
|
EXPORT_SYMBOL(nxp_nci_fw_recv_frame);
|