@@ -82,6 +82,16 @@ config ARM_SCPI_POWER_DOMAIN
This enables support for the SCPI power domains which can be
enabled or disabled via the SCP firmware
+config ARM_DEBUGFS
+ bool "ARM TF-A debugfs"
+ help
+ Select Y to implement a firmware debug filesystem accessed
+ through kernel debug sysfs.
+
+ This feature depends on a Trusted-Firmware-A build option
+ (USE_DEBUGFS). It exposes an internal filesystem used to
+ peek/poke firmware data through file abstractions.
+
config EDD
tristate "BIOS Enhanced Disk Drive calls determine boot disk"
depends on X86
@@ -2,10 +2,12 @@
#
# Makefile for the linux kernel.
#
+obj-$(CONFIG_ARM_DEBUGFS) += arm_debugfs.o
obj-$(CONFIG_ARM_PSCI_FW) += psci.o
obj-$(CONFIG_ARM_PSCI_CHECKER) += psci_checker.o
obj-$(CONFIG_ARM_SCPI_PROTOCOL) += arm_scpi.o
obj-$(CONFIG_ARM_SCPI_POWER_DOMAIN) += scpi_pm_domain.o
+
obj-$(CONFIG_DMI) += dmi_scan.o
obj-$(CONFIG_DMI_SYSFS) += dmi-sysfs.o
obj-$(CONFIG_EDD) += edd.o
new file mode 100644
@@ -0,0 +1,411 @@
+// SPDX-License-Identifier: GPL-2.0
+/*
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 as
+ * published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * Copyright (C) 2020 ARM Limited
+ */
+
+/* #define DEBUG */
+
+#include <linux/kernel.h>
+#include <linux/module.h>
+#include <linux/debugfs.h>
+#include <linux/arm-smccc.h>
+#include <linux/slab.h>
+#include <linux/uaccess.h>
+
+#define VERSION_MAJOR 0
+#define VERSION_MINOR 2
+
+#define ARM_SIP_SVC_DEBUGFS (0xC2000030)
+
+#define SMC_OK (0)
+
+#define ARM_DEBUGFS_MOUNT 0
+#define ARM_DEBUGFS_CREATE 1
+#define ARM_DEBUGFS_OPEN 2
+#define ARM_DEBUGFS_CLOSE 3
+#define ARM_DEBUGFS_READ 4
+#define ARM_DEBUGFS_WRITE 5
+#define ARM_DEBUGFS_SEEK 6
+#define ARM_DEBUGFS_BIND 7
+#define ARM_DEBUGFS_STAT 8
+#define ARM_DEBUGFS_INIT 10
+#define ARM_DEBUGFS_VERSION 11
+
+#define NAMELEN 13 /* Maximum length of a file name */
+#define MAX_PATH_LEN 256
+
+#define QID_CHDIR 0x8000
+
+#define ARM_DEBUGFS_KSEEK_SET (0)
+
+enum devflags {
+ ARM_DEBUGFS_OREAD = 1 << 0,
+ ARM_DEBUGFS_OWRITE = 1 << 1,
+ ARM_DEBUGFS_ORDWR = 1 << 2,
+ ARM_DEBUGFS_OBIND = 1 << 3,
+ ARM_DEBUGFS_ODIR = 1 << 4,
+ ARM_DEBUGFS_OSTAT = 1 << 5,
+};
+
+struct dir {
+ char name[NAMELEN];
+ long length;
+ unsigned char mode;
+ unsigned char type;
+ unsigned char dev;
+ unsigned short qid;
+};
+
+union debugfs_parms {
+ struct {
+ char fname[MAX_PATH_LEN];
+ } open;
+
+ struct mount {
+ char srv[MAX_PATH_LEN];
+ char where[MAX_PATH_LEN];
+ char spec[MAX_PATH_LEN];
+ } mount;
+
+ struct {
+ char path[MAX_PATH_LEN];
+ struct dir dir;
+ } stat;
+
+ struct {
+ char oldpath[MAX_PATH_LEN];
+ char newpath[MAX_PATH_LEN];
+ } bind;
+};
+
+static struct {
+ void *shared_buffer;
+ struct dentry *tfa_rootdir;
+ void *read_buffer;
+
+ /* This mutex protects the shared buffer and forbids concurrent */
+ /* entry into the debugfs internal firmware layers. */
+ struct mutex debugfs_lock;
+} g;
+
+static int version(void)
+{
+ struct arm_smccc_res res;
+
+ arm_smccc_1_1_smc(ARM_SIP_SVC_DEBUGFS, ARM_DEBUGFS_VERSION, &res);
+
+ return (res.a0 == SMC_OK) ? res.a1 : -EIO;
+}
+
+static int tfa_9p_init(void *shared_buffer)
+{
+ struct arm_smccc_res res;
+ phys_addr_t buffer_phys;
+
+ buffer_phys = virt_to_phys(shared_buffer);
+ if (!buffer_phys)
+ return -ENOMEM;
+
+ pr_debug("shared buffer 0x%p (PA 0x%llx)\n",
+ shared_buffer, buffer_phys);
+
+ /* Pass the kernel allocated shared buffer PA */
+ arm_smccc_1_1_smc(ARM_SIP_SVC_DEBUGFS, ARM_DEBUGFS_INIT, buffer_phys,
+ &res);
+
+ return res.a0;
+}
+
+static int open(const char *name, int flags)
+{
+ union debugfs_parms *parms = g.shared_buffer;
+ struct arm_smccc_res res;
+
+ mutex_lock(&g.debugfs_lock);
+ strlcpy(parms->open.fname, name, MAX_PATH_LEN);
+ arm_smccc_1_1_smc(ARM_SIP_SVC_DEBUGFS, ARM_DEBUGFS_OPEN, flags, &res);
+ mutex_unlock(&g.debugfs_lock);
+
+ return (res.a0 == SMC_OK) ? res.a1 : -EIO;
+}
+
+static int read(int fd, void *buf, size_t size)
+{
+ struct arm_smccc_res res;
+ int ret = -EIO;
+
+ mutex_lock(&g.debugfs_lock);
+ arm_smccc_1_1_smc(ARM_SIP_SVC_DEBUGFS, ARM_DEBUGFS_READ, fd, size,
+ &res);
+
+ if (res.a0 != SMC_OK)
+ goto exit_unlock;
+
+ if (res.a1 > size) {
+ ret = -EIO;
+ goto exit_unlock;
+ }
+
+ memcpy(buf, g.shared_buffer, size);
+ ret = res.a1;
+
+exit_unlock:
+ mutex_unlock(&g.debugfs_lock);
+
+ return ret;
+}
+
+static int seek(int fd, long off, int whence)
+{
+ struct arm_smccc_res res;
+
+ mutex_lock(&g.debugfs_lock);
+ arm_smccc_1_1_smc(ARM_SIP_SVC_DEBUGFS, ARM_DEBUGFS_SEEK, fd, off,
+ whence, &res);
+ mutex_unlock(&g.debugfs_lock);
+
+ return (res.a0 == SMC_OK) ? res.a1 : -EIO;
+}
+
+static int stat(const char *name, struct dir *entry)
+{
+ union debugfs_parms *parms = g.shared_buffer;
+ struct arm_smccc_res res;
+
+ mutex_lock(&g.debugfs_lock);
+ strlcpy(parms->stat.path, name, MAX_PATH_LEN);
+ arm_smccc_1_1_smc(ARM_SIP_SVC_DEBUGFS, ARM_DEBUGFS_STAT, &res);
+ mutex_unlock(&g.debugfs_lock);
+
+ if (res.a0 == SMC_OK)
+ memcpy(entry, &parms->stat.dir, sizeof(struct dir));
+
+ return (res.a0 == SMC_OK) ? res.a1 : -EIO;
+}
+
+static int close(int fd)
+{
+ struct arm_smccc_res res;
+
+ mutex_lock(&g.debugfs_lock);
+ arm_smccc_1_1_smc(ARM_SIP_SVC_DEBUGFS, ARM_DEBUGFS_CLOSE, fd, &res);
+ mutex_unlock(&g.debugfs_lock);
+
+ return (res.a0 == SMC_OK) ? 0 : -EIO;
+}
+
+static void dir_print(struct dir *dir)
+{
+ pr_devel("%s name %s, len %ld, mode %d, type %d, dev %d, qid 0x%x\n",
+ __func__, dir->name, dir->length, dir->mode, dir->type,
+ dir->dev, dir->qid);
+}
+
+ssize_t debugfs_read(struct file *file, char __user *user_buf, size_t length,
+ loff_t *offset)
+{
+ char *debugfs_path, *tfa_path, *buf = (char *)g.read_buffer;
+ char pathname[MAX_PATH_LEN];
+ int ret, fd, read_size = 0;
+ struct dir dir_entry;
+
+ if (!offset || !user_buf || !length)
+ return 0;
+
+ /* Convert path object to an ascii absolute path string */
+ debugfs_path = d_path(&file->f_path, pathname, MAX_PATH_LEN);
+ if (!debugfs_path || IS_ERR(debugfs_path))
+ return 0;
+
+ /* Extrapolate the relative path in the firmware 9p hierarchy */
+ tfa_path = strstr(debugfs_path, "/tfa/");
+ if (!tfa_path)
+ return 0;
+
+ /* Skip debugfs absolute directory path */
+ tfa_path += 4;
+
+ /* Check file presence and get file size */
+ ret = stat(tfa_path, &dir_entry);
+ if (ret < 0) {
+ pr_err("%s stat failed\n", __func__);
+ return 0;
+ }
+
+ /* Discard read operation if offset is out of bounds */
+ if (*offset >= dir_entry.length)
+ return 0;
+
+ fd = open(tfa_path, ARM_DEBUGFS_OREAD);
+ if (fd < 0) {
+ pr_err("%s open failed\n", __func__);
+ return 0;
+ }
+
+ if (*offset > 0) {
+ ret = seek(fd, *offset, ARM_DEBUGFS_KSEEK_SET);
+ if (ret < 0) {
+ pr_err("%s seek failed ret=%d\n", __func__, ret);
+ goto exit_close;
+ }
+ }
+
+ /* Restrict length to one page frame size maximum */
+ if (length > PAGE_SIZE)
+ length = PAGE_SIZE;
+
+ read_size = read(fd, buf, length);
+ if (read_size <= 0) {
+ pr_err("%s read failed ret=%d\n", __func__, read_size);
+ goto exit_close;
+ }
+
+ if (copy_to_user(user_buf, buf, read_size)) {
+ pr_err("%s copy to user failed\n", __func__);
+ goto exit_close;
+ }
+
+ *offset += read_size;
+
+exit_close:
+ ret = close(fd);
+ if (ret < 0)
+ pr_err("%s close failed\n", __func__);
+
+ return read_size;
+}
+
+const struct file_operations debugfs_ops = {
+ .read = debugfs_read
+};
+
+static int arm_debugfs_walk_dir(struct dentry *parent_dir, const char *path)
+{
+ int ret, fd;
+ struct dir dir;
+ struct dentry *dent, *fent;
+ char abs_path[MAX_PATH_LEN];
+
+ /* open root directory */
+ fd = open(path, ARM_DEBUGFS_OREAD);
+ if (fd < 0) {
+ pr_err("open failed %d\n", fd);
+ return -EIO;
+ }
+
+ /* read directory entries */
+ do {
+ ret = read(fd, &dir, sizeof(dir));
+ if (ret > 0) {
+ dir_print(&dir);
+ if (dir.qid & QID_CHDIR) {
+ dent = debugfs_create_dir(dir.name, parent_dir);
+ snprintf(abs_path, MAX_PATH_LEN, "%s%s/",
+ path, dir.name);
+ (void)arm_debugfs_walk_dir(dent, abs_path);
+ } else {
+ fent = debugfs_create_file(dir.name, O_RDONLY,
+ parent_dir, NULL,
+ &debugfs_ops);
+ }
+ }
+ } while (ret > 0);
+
+ /* close root directory handle */
+ ret = close(fd);
+ if (ret < 0) {
+ pr_err("close failed %d\n", ret);
+ return -EIO;
+ }
+
+ return 0;
+}
+
+static int __init arm_debugfs_init(void)
+{
+ int ret;
+
+ /* Requires debugfs framework */
+ ret = debugfs_initialized();
+ if (!ret)
+ return ret;
+
+ /*
+ * Request ARM TF-A debugfs interface version also used as
+ * a means to detect such interface presence.
+ */
+ ret = version();
+ if (ret < 0) {
+ pr_err("%s failed getting interface version.\n", __func__);
+ return ret;
+ }
+
+ pr_debug("%s interface version 0x%x\n", __func__, ret);
+
+ /* Create a top-level debugfs directory */
+ g.tfa_rootdir = debugfs_create_dir("tfa", NULL);
+ if (!g.tfa_rootdir)
+ return -EIO;
+
+ /* Allocate a shared buffer page */
+ g.shared_buffer = (void *)__get_free_page(GFP_KERNEL);
+ if (!g.shared_buffer)
+ goto exit_dir;
+
+ g.read_buffer = kzalloc(PAGE_SIZE, GFP_KERNEL);
+ if (!g.read_buffer)
+ goto exit_free_shared_buffer;
+
+ /* Initialize ARM firmware debugfs interface */
+ ret = tfa_9p_init(g.shared_buffer);
+ if (ret)
+ goto exit_free_read_buffer;
+
+ mutex_init(&g.debugfs_lock);
+
+ ret = arm_debugfs_walk_dir(g.tfa_rootdir, "/");
+ if (ret)
+ goto exit_mutex_destroy;
+
+ pr_info("ARM TF-A debugfs v%u.%u interface initialized.\n",
+ VERSION_MAJOR, VERSION_MINOR);
+
+ return 0;
+
+exit_mutex_destroy:
+ mutex_destroy(&g.debugfs_lock);
+
+exit_free_read_buffer:
+ kfree(g.read_buffer);
+
+exit_free_shared_buffer:
+ free_page((uintptr_t)g.shared_buffer);
+
+exit_dir:
+ debugfs_remove_recursive(g.tfa_rootdir);
+
+ return ret;
+}
+module_init(arm_debugfs_init);
+
+static void __exit arm_debugfs_exit(void)
+{
+ debugfs_remove_recursive(g.tfa_rootdir);
+ mutex_destroy(&g.debugfs_lock);
+ free_page((uintptr_t)g.shared_buffer);
+ pr_info("ARM debugfs exited.\n");
+}
+module_exit(arm_debugfs_exit);
+
+MODULE_LICENSE("GPL");
+MODULE_DESCRIPTION("ARM debugfs");
+MODULE_VERSION("0.2");
This patch implements the kernel driver part of a generic firmware debug interface. It requires a specific support in the Trusted Firmware to expose such interface. It consists in a set of 9p primitives invoked through SMC. This permits access to an internal firmware namespace using unix-like paths. Signed-off-by: Olivier Deprez <olivier.deprez@arm.com> --- drivers/firmware/Kconfig | 10 + drivers/firmware/Makefile | 2 + drivers/firmware/arm_debugfs.c | 411 +++++++++++++++++++++++++++++++++ 3 files changed, 423 insertions(+) create mode 100644 drivers/firmware/arm_debugfs.c This kernel driver patch illustrates the concept of a generic firmware debug interface. The intent is for firmware to expose debug data by means of abstracted directories and files. The primitives are borrowed from 9p. At the user level, simple open/read/write/close function wrappers are provided. Those wrappers translate into calling the firmware through SMC eventually passing parameters through a shared buffer. Following design proposal: https://lists.trustedfirmware.org/pipermail/tf-a/2019-November/000123.html The TF-A firmware side is merged and visible at: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/lib/debugfs Documentation: https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/components/debugfs-design.rst https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/tree/docs/components/arm-sip-service.rst The design is still open to evolve. Please provide comments on the general concept/acceptance. Example of exposed firmware data: fip image flash contents / # find /sys/kernel/debug/tfa /sys/kernel/debug/tfa /sys/kernel/debug/tfa/fip /sys/kernel/debug/tfa/blobs /sys/kernel/debug/tfa/blobs/fip.bin /sys/kernel/debug/tfa/blobs/ctl /sys/kernel/debug/tfa/dev / # xxd -l32 /sys/kernel/debug/tfa/blobs/fip.bin 00000000: 0100 64aa 7856 3412 0000 0000 0000 0000 ..d.xV4......... 00000010: 5ff9 ec0b 4d22 3e4d a544 c39d 81c7 3f0a _...M">M.D....?. / # cksum /sys/kernel/debug/tfa/blobs/fip.bin 4222949163 1048576 /sys/kernel/debug/tfa/blobs/fip.bin