On 2/6/25 5:13 PM, Jason Gunthorpe wrote: > Add the FWCTL_RPC ioctl which allows a request/response RPC call to device > firmware. Drivers implementing this call must follow the security > guidelines under Documentation/userspace-api/fwctl.rst > > The core code provides some memory management helpers to get the messages > copied from and back to userspace. The driver is responsible for > allocating the output message memory and delivering the message to the > device. > > Reviewed-by: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx> > Signed-off-by: Jason Gunthorpe <jgg@xxxxxxxxxx> Reviewed-by: Dave Jiang <dave.jiang@xxxxxxxxx> > --- > drivers/fwctl/main.c | 60 +++++++++++++++++++++++++++++++++ > include/linux/fwctl.h | 8 +++++ > include/uapi/fwctl/fwctl.h | 68 ++++++++++++++++++++++++++++++++++++++ > 3 files changed, 136 insertions(+) > > diff --git a/drivers/fwctl/main.c b/drivers/fwctl/main.c > index 4b6792f2031e86..a5e26944b830b5 100644 > --- a/drivers/fwctl/main.c > +++ b/drivers/fwctl/main.c > @@ -8,17 +8,20 @@ > #include <linux/container_of.h> > #include <linux/fs.h> > #include <linux/module.h> > +#include <linux/sizes.h> > #include <linux/slab.h> > > #include <uapi/fwctl/fwctl.h> > > enum { > FWCTL_MAX_DEVICES = 4096, > + MAX_RPC_LEN = SZ_2M, > }; > static_assert(FWCTL_MAX_DEVICES < (1U << MINORBITS)); > > static dev_t fwctl_dev; > static DEFINE_IDA(fwctl_ida); > +static unsigned long fwctl_tainted; > > struct fwctl_ucmd { > struct fwctl_uctx *uctx; > @@ -76,9 +79,65 @@ static int fwctl_cmd_info(struct fwctl_ucmd *ucmd) > return ucmd_respond(ucmd, sizeof(*cmd)); > } > > +static int fwctl_cmd_rpc(struct fwctl_ucmd *ucmd) > +{ > + struct fwctl_device *fwctl = ucmd->uctx->fwctl; > + struct fwctl_rpc *cmd = ucmd->cmd; > + size_t out_len; > + > + if (cmd->in_len > MAX_RPC_LEN || cmd->out_len > MAX_RPC_LEN) > + return -EMSGSIZE; > + > + switch (cmd->scope) { > + case FWCTL_RPC_CONFIGURATION: > + case FWCTL_RPC_DEBUG_READ_ONLY: > + break; > + > + case FWCTL_RPC_DEBUG_WRITE_FULL: > + if (!capable(CAP_SYS_RAWIO)) > + return -EPERM; > + fallthrough; > + case FWCTL_RPC_DEBUG_WRITE: > + if (!test_and_set_bit(0, &fwctl_tainted)) { > + dev_warn( > + &fwctl->dev, > + "%s(%d): has requested full access to the physical device device", > + current->comm, task_pid_nr(current)); > + add_taint(TAINT_FWCTL, LOCKDEP_STILL_OK); > + } > + break; > + default: > + return -EOPNOTSUPP; > + } > + > + void *inbuf __free(kvfree) = kvzalloc(cmd->in_len, GFP_KERNEL_ACCOUNT); > + if (!inbuf) > + return -ENOMEM; > + if (copy_from_user(inbuf, u64_to_user_ptr(cmd->in), cmd->in_len)) > + return -EFAULT; > + > + out_len = cmd->out_len; > + void *outbuf __free(kvfree) = fwctl->ops->fw_rpc( > + ucmd->uctx, cmd->scope, inbuf, cmd->in_len, &out_len); > + if (IS_ERR(outbuf)) > + return PTR_ERR(outbuf); > + if (outbuf == inbuf) { > + /* The driver can re-use inbuf as outbuf */ > + inbuf = NULL; > + } > + > + if (copy_to_user(u64_to_user_ptr(cmd->out), outbuf, > + min(cmd->out_len, out_len))) > + return -EFAULT; > + > + cmd->out_len = out_len; > + return ucmd_respond(ucmd, sizeof(*cmd)); > +} > + > /* On stack memory for the ioctl structs */ > union ucmd_buffer { > struct fwctl_info info; > + struct fwctl_rpc rpc; > }; > > struct fwctl_ioctl_op { > @@ -99,6 +158,7 @@ struct fwctl_ioctl_op { > } > static const struct fwctl_ioctl_op fwctl_ioctl_ops[] = { > IOCTL_OP(FWCTL_INFO, fwctl_cmd_info, struct fwctl_info, out_device_data), > + IOCTL_OP(FWCTL_RPC, fwctl_cmd_rpc, struct fwctl_rpc, out), > }; > > static long fwctl_fops_ioctl(struct file *filp, unsigned int cmd, > diff --git a/include/linux/fwctl.h b/include/linux/fwctl.h > index 9b6cc8ae1aa0ca..c2fcaa17a2bcd5 100644 > --- a/include/linux/fwctl.h > +++ b/include/linux/fwctl.h > @@ -47,6 +47,14 @@ struct fwctl_ops { > * ignore length on input, the core code will handle everything. > */ > void *(*info)(struct fwctl_uctx *uctx, size_t *length); > + /** > + * @fw_rpc: Implement FWCTL_RPC. Deliver rpc_in/in_len to the FW and > + * return the response and set out_len. rpc_in can be returned as the > + * response pointer. Otherwise the returned pointer is freed with > + * kvfree(). > + */ > + void *(*fw_rpc)(struct fwctl_uctx *uctx, enum fwctl_rpc_scope scope, > + void *rpc_in, size_t in_len, size_t *out_len); > }; > > /** > diff --git a/include/uapi/fwctl/fwctl.h b/include/uapi/fwctl/fwctl.h > index ac66853200a5a8..7a21f2f011917a 100644 > --- a/include/uapi/fwctl/fwctl.h > +++ b/include/uapi/fwctl/fwctl.h > @@ -67,4 +67,72 @@ struct fwctl_info { > }; > #define FWCTL_INFO _IO(FWCTL_TYPE, FWCTL_CMD_INFO) > > +/** > + * enum fwctl_rpc_scope - Scope of access for the RPC > + * > + * Refer to fwctl.rst for a more detailed discussion of these scopes. > + */ > +enum fwctl_rpc_scope { > + /** > + * @FWCTL_RPC_CONFIGURATION: Device configuration access scope > + * > + * Read/write access to device configuration. When configuration > + * is written to the device it remains in a fully supported state. > + */ > + FWCTL_RPC_CONFIGURATION = 0, > + /** > + * @FWCTL_RPC_DEBUG_READ_ONLY: Read only access to debug information > + * > + * Readable debug information. Debug information is compatible with > + * kernel lockdown, and does not disclose any sensitive information. For > + * instance exposing any encryption secrets from this information is > + * forbidden. > + */ > + FWCTL_RPC_DEBUG_READ_ONLY = 1, > + /** > + * @FWCTL_RPC_DEBUG_WRITE: Writable access to lockdown compatible debug information > + * > + * Allows write access to data in the device which may leave a fully > + * supported state. This is intended to permit intensive and possibly > + * invasive debugging. This scope will taint the kernel. > + */ > + FWCTL_RPC_DEBUG_WRITE = 2, > + /** > + * @FWCTL_RPC_DEBUG_WRITE_FULL: Write access to all debug information > + * > + * Allows read/write access to everything. Requires CAP_SYS_RAW_IO, so > + * it is not required to follow lockdown principals. If in doubt > + * debugging should be placed in this scope. This scope will taint the > + * kernel. > + */ > + FWCTL_RPC_DEBUG_WRITE_FULL = 3, > +}; > + > +/** > + * struct fwctl_rpc - ioctl(FWCTL_RPC) > + * @size: sizeof(struct fwctl_rpc) > + * @scope: One of enum fwctl_rpc_scope, required scope for the RPC > + * @in_len: Length of the in memory > + * @out_len: Length of the out memory > + * @in: Request message in device specific format > + * @out: Response message in device specific format > + * > + * Deliver a Remote Procedure Call to the device FW and return the response. The > + * call's parameters and return are marshaled into linear buffers of memory. Any > + * errno indicates that delivery of the RPC to the device failed. Return status > + * originating in the device during a successful delivery must be encoded into > + * out. > + * > + * The format of the buffers matches the out_device_type from FWCTL_INFO. > + */ > +struct fwctl_rpc { > + __u32 size; > + __u32 scope; > + __u32 in_len; > + __u32 out_len; > + __aligned_u64 in; > + __aligned_u64 out; > +}; > +#define FWCTL_RPC _IO(FWCTL_TYPE, FWCTL_CMD_RPC) > + > #endif