This is a tiny clean up for typos in the firmware_class README. Signed-off-by: Kees Cook <keescook@chromium.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
		
			
				
	
	
		
			128 lines
		
	
	
	
		
			4.5 KiB
			
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			128 lines
		
	
	
	
		
			4.5 KiB
			
		
	
	
	
		
			Text
		
	
	
	
	
	
 | 
						|
 request_firmware() hotplug interface:
 | 
						|
 ------------------------------------
 | 
						|
	Copyright (C) 2003 Manuel Estrada Sainz
 | 
						|
 | 
						|
 Why:
 | 
						|
 ---
 | 
						|
 | 
						|
 Today, the most extended way to use firmware in the Linux kernel is linking
 | 
						|
 it statically in a header file. Which has political and technical issues:
 | 
						|
 | 
						|
  1) Some firmware is not legal to redistribute.
 | 
						|
  2) The firmware occupies memory permanently, even though it often is just
 | 
						|
     used once.
 | 
						|
  3) Some people, like the Debian crowd, don't consider some firmware free
 | 
						|
     enough and remove entire drivers (e.g.: keyspan).
 | 
						|
 | 
						|
 High level behavior (mixed):
 | 
						|
 ============================
 | 
						|
 | 
						|
 1), kernel(driver):
 | 
						|
	- calls request_firmware(&fw_entry, $FIRMWARE, device)
 | 
						|
	- kernel searchs the fimware image with name $FIRMWARE directly
 | 
						|
	in the below search path of root filesystem:
 | 
						|
		User customized search path by module parameter 'path'[1]
 | 
						|
		"/lib/firmware/updates/" UTS_RELEASE,
 | 
						|
		"/lib/firmware/updates",
 | 
						|
		"/lib/firmware/" UTS_RELEASE,
 | 
						|
		"/lib/firmware"
 | 
						|
	- If found, goto 7), else goto 2)
 | 
						|
 | 
						|
	[1], the 'path' is a string parameter which length should be less
 | 
						|
	than 256, user should pass 'firmware_class.path=$CUSTOMIZED_PATH'
 | 
						|
	if firmware_class is built in kernel(the general situation)
 | 
						|
 | 
						|
 2), userspace:
 | 
						|
 	- /sys/class/firmware/xxx/{loading,data} appear.
 | 
						|
	- hotplug gets called with a firmware identifier in $FIRMWARE
 | 
						|
	  and the usual hotplug environment.
 | 
						|
		- hotplug: echo 1 > /sys/class/firmware/xxx/loading
 | 
						|
 | 
						|
 3), kernel: Discard any previous partial load.
 | 
						|
 | 
						|
 4), userspace:
 | 
						|
		- hotplug: cat appropriate_firmware_image > \
 | 
						|
					/sys/class/firmware/xxx/data
 | 
						|
 | 
						|
 5), kernel: grows a buffer in PAGE_SIZE increments to hold the image as it
 | 
						|
	 comes in.
 | 
						|
 | 
						|
 6), userspace:
 | 
						|
		- hotplug: echo 0 > /sys/class/firmware/xxx/loading
 | 
						|
 | 
						|
 7), kernel: request_firmware() returns and the driver has the firmware
 | 
						|
	 image in fw_entry->{data,size}. If something went wrong
 | 
						|
	 request_firmware() returns non-zero and fw_entry is set to
 | 
						|
	 NULL.
 | 
						|
 | 
						|
 8), kernel(driver): Driver code calls release_firmware(fw_entry) releasing
 | 
						|
		 the firmware image and any related resource.
 | 
						|
 | 
						|
 High level behavior (driver code):
 | 
						|
 ==================================
 | 
						|
 | 
						|
	 if(request_firmware(&fw_entry, $FIRMWARE, device) == 0)
 | 
						|
	 	copy_fw_to_device(fw_entry->data, fw_entry->size);
 | 
						|
	 release_firmware(fw_entry);
 | 
						|
 | 
						|
 Sample/simple hotplug script:
 | 
						|
 ============================
 | 
						|
 | 
						|
	# Both $DEVPATH and $FIRMWARE are already provided in the environment.
 | 
						|
 | 
						|
	HOTPLUG_FW_DIR=/usr/lib/hotplug/firmware/
 | 
						|
 | 
						|
	echo 1 > /sys/$DEVPATH/loading
 | 
						|
	cat $HOTPLUG_FW_DIR/$FIRMWARE > /sys/$DEVPATH/data
 | 
						|
	echo 0 > /sys/$DEVPATH/loading
 | 
						|
 | 
						|
 Random notes:
 | 
						|
 ============
 | 
						|
 | 
						|
 - "echo -1 > /sys/class/firmware/xxx/loading" will cancel the load at
 | 
						|
   once and make request_firmware() return with error.
 | 
						|
 | 
						|
 - firmware_data_read() and firmware_loading_show() are just provided
 | 
						|
   for testing and completeness, they are not called in normal use.
 | 
						|
 | 
						|
 - There is also /sys/class/firmware/timeout which holds a timeout in
 | 
						|
   seconds for the whole load operation.
 | 
						|
 | 
						|
 - request_firmware_nowait() is also provided for convenience in
 | 
						|
   user contexts to request firmware asynchronously, but can't be called
 | 
						|
   in atomic contexts.
 | 
						|
 | 
						|
 | 
						|
 about in-kernel persistence:
 | 
						|
 ---------------------------
 | 
						|
 Under some circumstances, as explained below, it would be interesting to keep
 | 
						|
 firmware images in non-swappable kernel memory or even in the kernel image
 | 
						|
 (probably within initramfs).
 | 
						|
 | 
						|
 Note that this functionality has not been implemented.
 | 
						|
 | 
						|
 - Why OPTIONAL in-kernel persistence may be a good idea sometimes:
 | 
						|
 
 | 
						|
	- If the device that needs the firmware is needed to access the
 | 
						|
	  filesystem. When upon some error the device has to be reset and the
 | 
						|
	  firmware reloaded, it won't be possible to get it from userspace.
 | 
						|
	  e.g.:
 | 
						|
		- A diskless client with a network card that needs firmware.
 | 
						|
		- The filesystem is stored in a disk behind an scsi device
 | 
						|
		  that needs firmware.
 | 
						|
	- Replacing buggy DSDT/SSDT ACPI tables on boot.
 | 
						|
	  Note: this would require the persistent objects to be included
 | 
						|
	  within the kernel image, probably within initramfs.
 | 
						|
	  
 | 
						|
   And the same device can be needed to access the filesystem or not depending
 | 
						|
   on the setup, so I think that the choice on what firmware to make
 | 
						|
   persistent should be left to userspace.
 | 
						|
 | 
						|
 about firmware cache:
 | 
						|
 --------------------
 | 
						|
 After firmware cache mechanism is introduced during system sleep,
 | 
						|
 request_firmware can be called safely inside device's suspend and
 | 
						|
 resume callback, and callers needn't cache the firmware by
 | 
						|
 themselves any more for dealing with firmware loss during system
 | 
						|
 resume.
 |