On Fri, 2015-06-26 at 09:31 +0200, Johan Hovold wrote:
> On Wed, Jun 24, 2015 at 12:18:27AM -0500, Peter Berger wrote:
> > On Mon, 2015-06-22 at 11:43 +0200, Johan Hovold wrote:
> > > On Thu, Jun 18, 2015 at 06:43:35AM -0500, Peter E. Berger wrote:
> > > > From: "Peter E. Berger" <[email protected]>
> > > >
> > > > The io_ti driver fails to download firmware to Edgeport
> > > > devices such as the EP/416, even when the on-disk firmware image
> > > > (/lib/firmware/edgeport/down3.bin) is more current than the version
> > > > on the EP/416. The current download code is broken in a few ways.
> > > > Notably it mis-uses global variables OperationalMajorVersion and
> > > > OperationalMinorVersion (reading their values before they've been
> > > > properly initialized and subsequently initializing them multiple times
> > > > without synchronization). This patch drops the global variables and
> > > > replaces the redundant calls to request_firmware()/release_firmware()
> > > > in download_fw() with a single call pair in edge_startup(); the firmware
> > > > image pointer is then passed to download_fw() and build_i2c_fw_hdr().
> > > >
> > > > Also, the firmware has a "build_number" field, though it apparently is
> > > > unused (according to observations of the three firmware images I have
> > > > seen and confirmed by Digi Tech Support). This comment describes its
> > > > structure, in case it is populated in a future release.
> > > >
> > > > Signed-off-by: Peter E. Berger <[email protected]>
> > > > ---
> > > > drivers/usb/serial/io_ti.c | 100
> > > > +++++++++++++++++++++++----------------------
> > > > 1 file changed, 51 insertions(+), 49 deletions(-)
> > > >
> > > > diff --git a/drivers/usb/serial/io_ti.c b/drivers/usb/serial/io_ti.c
> > > > index 69378a7..c76820b 100644
> > > > --- a/drivers/usb/serial/io_ti.c
> > > > +++ b/drivers/usb/serial/io_ti.c
> > > > @@ -101,6 +101,7 @@ struct edgeport_serial {
> > > > struct mutex es_lock;
> > > > int num_ports_open;
> > > > struct usb_serial *serial;
> > > > + int fw_version;
> > > > };
> > > >
> > > >
> > > > @@ -187,10 +188,6 @@ static const struct usb_device_id
> > > > id_table_combined[] = {
> > > >
> > > > MODULE_DEVICE_TABLE(usb, id_table_combined);
> > > >
> > > > -static unsigned char OperationalMajorVersion;
> > > > -static unsigned char OperationalMinorVersion;
> > > > -static unsigned short OperationalBuildNumber;
> > > > -
> > > > static int closing_wait = EDGE_CLOSING_WAIT;
> > > > static bool ignore_cpu_rev;
> > > > static int default_uart_mode; /* RS232 */
> > > > @@ -751,18 +748,18 @@ exit:
> > > > }
> > > >
> > > > /* Build firmware header used for firmware update */
> > > > -static int build_i2c_fw_hdr(__u8 *header, struct device *dev)
> > > > +static int build_i2c_fw_hdr(u8 *header, struct device *dev,
> > > > + const struct firmware *fw)
> > > > {
> > > > __u8 *buffer;
> > > > int buffer_size;
> > > > int i;
> > > > - int err;
> > > > __u8 cs = 0;
> > > > struct ti_i2c_desc *i2c_header;
> > > > struct ti_i2c_image_header *img_header;
> > > > struct ti_i2c_firmware_rec *firmware_rec;
> > > > - const struct firmware *fw;
> > > > - const char *fw_name = "edgeport/down3.bin";
> > > > + u8 fw_major_version = fw->data[0];
> > > > + u8 fw_minor_version = fw->data[1];
> > > >
> > > > /* In order to update the I2C firmware we must change the type
> > > > 2 record
> > > > * to type 0xF2. This will force the UMP to come up in Boot
> > > > Mode.
> > > > @@ -785,24 +782,11 @@ static int build_i2c_fw_hdr(__u8 *header, struct
> > > > device *dev)
> > > > // Set entire image of 0xffs
> > > > memset(buffer, 0xff, buffer_size);
> > > >
> > > > - err = request_firmware(&fw, fw_name, dev);
> > > > - if (err) {
> > > > - dev_err(dev, "Failed to load image \"%s\" err %d\n",
> > > > - fw_name, err);
> > > > - kfree(buffer);
> > > > - return err;
> > > > - }
> > > > -
> > > > - /* Save Download Version Number */
> > > > - OperationalMajorVersion = fw->data[0];
> > > > - OperationalMinorVersion = fw->data[1];
> > > > - OperationalBuildNumber = fw->data[2] | (fw->data[3] << 8);
> > > > -
> > > > /* Copy version number into firmware record */
> > > > firmware_rec = (struct ti_i2c_firmware_rec *)buffer;
> > > >
> > > > - firmware_rec->Ver_Major = OperationalMajorVersion;
> > > > - firmware_rec->Ver_Minor = OperationalMinorVersion;
> > > > + firmware_rec->Ver_Major = fw_major_version;
> > > > + firmware_rec->Ver_Minor = fw_minor_version;
> > > >
> > > > /* Pointer to fw_down memory image */
> > > > img_header = (struct ti_i2c_image_header *)&fw->data[4];
> > >
> > > Note that sanity checks on the firmware size are missing here; you could
> > > fix that as a follow up.
> >
> > I did some digging and it looks like we can actually do several sanity
> > checks on the firmware image. It seems that the Edgeport firmware
> > images have a 7-byte header:
> > u8 major_version;
> > u8 minor_version;
> > le16 build_number;
> > le16 length;
> > u8 checksum;
> >
> > "length" appears to be the number of bytes of actual data following the
> > header.
> >
> > "checksum" is apparently (from the images I have seen) the low order
> > byte resulting from adding the values of all the data bytes.
> >
> > So, I'm testing a new ck_fw_sanity() function that checks for these
> > error conditions:
> > 1. NULL (missing) firmware image
> > 2. Incomplete firmware header:
> > #define FW_HEADER_SIZE 7
> > fw->size < FW_HEADER_SIZE
> > 3. Bad firmware size:
> > fw->size != FW_HEADER_SIZE + length_data
> > 4. Bad firmware checksum:
> > compute checksum and compare to the stored version
> >
> > I call ck_fw_sanity() at the top of download_fw(), so, by the time we
> > call build_i2c_fw_hdr(), the firmware image has already been sanity
> > checked. Initial testing looks good to me. Do you agree that I should
> > include my new ck_fw_sanity() function and its invocations (as a new,
> > separate 4th patch) in the upcoming v7 patchset?
>
> That sounds like a good idea, although I suggest you check for NULL
> already when requesting the firmware, and then call the verification
> function in download_fw.
OK. I took the fw == NULL check out of check_fw_sanity() (which is
called by download_fw()) and moved it instead to edge_startup() where we
call request_firmware().
>
> Before getting some confirmation from the vendor on steps 3 and 4, you
> should probably only warn about these (if anything) but continue the
> download anyway.
Agreed. I described my guesses about steps 3 and 4 to Digi Tech Support
and heard back yesterday saying that they were correct. So in patchset
v7 I'm treating these as error conditions. Let me know if you disagree.
>
> > > > @@ -811,8 +795,6 @@ static int build_i2c_fw_hdr(__u8 *header, struct
> > > > device *dev)
> > > > &fw->data[4 + sizeof(struct ti_i2c_image_header)],
> > > > le16_to_cpu(img_header->Length));
> > > >
> > > > - release_firmware(fw);
> > > > -
> > > > for (i=0; i < buffer_size; i++) {
> > > > cs = (__u8)(cs + buffer[i]);
> > > > }
> > > > @@ -826,8 +808,8 @@ static int build_i2c_fw_hdr(__u8 *header, struct
> > > > device *dev)
> > > > i2c_header->Type = I2C_DESC_TYPE_FIRMWARE_BLANK;
> > > > i2c_header->Size = cpu_to_le16(buffer_size);
> > > > i2c_header->CheckSum = cs;
> > > > - firmware_rec->Ver_Major = OperationalMajorVersion;
> > > > - firmware_rec->Ver_Minor = OperationalMinorVersion;
> > > > + firmware_rec->Ver_Major = fw_major_version;
> > > > + firmware_rec->Ver_Minor = fw_minor_version;
> > > >
> > > > return 0;
> > > > }
> > > > @@ -934,7 +916,8 @@ static int ti_cpu_rev(struct
> > > > edge_ti_manuf_descriptor *desc)
> > > > * This routine downloads the main operating code into the TI5052,
> > > > using the
> > > > * boot code already burned into E2PROM or ROM.
> > > > */
> > > > -static int download_fw(struct edgeport_serial *serial)
> > > > +static int download_fw(struct edgeport_serial *serial,
> > > > + const struct firmware *fw)
> > > > {
> > > > struct device *dev = &serial->serial->dev->dev;
> > > > int status = 0;
> > > > @@ -943,6 +926,8 @@ static int download_fw(struct edgeport_serial
> > > > *serial)
> > > > struct usb_interface_descriptor *interface;
> > > > int download_cur_ver;
> > > > int download_new_ver;
> > > > + u8 fw_major_version = fw->data[0];
> > > > + u8 fw_minor_version = fw->data[1];
> > > >
> > > > /* This routine is entered by both the BOOT mode and the
> > > > Download mode
> > > > * We can determine which code is running by the reading the
> > > > config
> > >
> > > If it wasn't for the horrible error handling in this function, you'd
> > > really want to request the firmware here before checking the boot mode
> > > (but releasing it would then currently involve changing just about every
> > > error path).
> >
> > Agreed! My colleague, Al Borchers, and I submitted some minor patches
> > for this driver in the early days of usb-serial (after we wrote
> > digi_acceleport.c), and I recall this function being frightful even
> > then. Given its current state, I think our best approach is to leave
> > the request_firmware() and release_firmware() calls in edge_startup(),
> > which I think agrees with your opinion.
>
> Yes.
>
> > > You should at least add the missing sanity checks here, though. That is,
> > > verify the firmware size before parsing the firmware header. Note that
> > > fw->size >= 4 is assumed in one of the branches below.
> >
> > Agreed. In my current test implementation I call the new
> > check_fw_sanity() function (described above) here, before parsing the
> > firmware header. Sound OK?
>
> Absolutely.
>
> > I think I'm close to being able to submit a v7 patchset.
>
> Great. Thanks for fixing this!
>
> Johan
--
To unsubscribe from this list: send the line "unsubscribe linux-usb" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html