smcinvoke_kernel.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2021, The Linux Foundation. All rights reserved.
  4. * Copyright (c) 2022-2023 Qualcomm Innovation Center, Inc. All rights reserved.
  5. */
  6. #include <linux/file.h>
  7. #include <linux/fs.h>
  8. #include <linux/fdtable.h>
  9. #include <linux/anon_inodes.h>
  10. #include <linux/delay.h>
  11. #include <linux/kref.h>
  12. #include <linux/types.h>
  13. #include <linux/slab.h>
  14. #include <linux/firmware.h>
  15. #include <linux/elf.h>
  16. #include "smcinvoke.h"
  17. #include "smcinvoke_object.h"
  18. #include "IClientEnv.h"
  19. #if IS_ENABLED(CONFIG_QSEECOM_COMPAT)
  20. #include "IQSEEComCompat.h"
  21. #include "IQSEEComCompatAppLoader.h"
  22. #include "linux/qseecom_api.h"
  23. #if IS_ENABLED(CONFIG_QSEECOM_PROXY)
  24. #include <linux/qseecom_kernel.h>
  25. #else
  26. #include "misc/qseecom_kernel.h"
  27. #endif
  28. #endif
  29. #define MAX_FW_APP_SIZE 256 //Application name size.
  30. #define FILE_EXT_SIZE 5 //File extension like .mbn etc
  31. const uint32_t CQSEEComCompatAppLoader_UID = 122;
  32. extern struct device *class_dev;
  33. struct qseecom_compat_context {
  34. void *dev; /* in/out */
  35. unsigned char *sbuf; /* in/out */
  36. uint32_t sbuf_len; /* in/out */
  37. struct qtee_shm shm;
  38. uint8_t app_arch;
  39. struct Object client_env;
  40. struct Object app_loader;
  41. struct Object app_controller;
  42. };
  43. struct tzobject_context {
  44. int fd;
  45. struct kref refs;
  46. };
  47. static int invoke_over_smcinvoke(void *cxt,
  48. uint32_t op,
  49. union ObjectArg *args,
  50. uint32_t counts);
  51. static struct Object tzobject_new(int fd)
  52. {
  53. struct tzobject_context *me =
  54. kzalloc(sizeof(struct tzobject_context), GFP_KERNEL);
  55. if (!me)
  56. return Object_NULL;
  57. kref_init(&me->refs);
  58. me->fd = fd;
  59. pr_debug("%s: me->fd = %d, me->refs = %u\n", __func__,
  60. me->fd, kref_read(&me->refs));
  61. return (struct Object) { invoke_over_smcinvoke, me };
  62. }
  63. static void tzobject_delete(struct kref *refs)
  64. {
  65. struct tzobject_context *me = container_of(refs,
  66. struct tzobject_context, refs);
  67. pr_info("%s: me->fd = %d, me->refs = %d, files = %p\n",
  68. __func__, me->fd, kref_read(&me->refs), current->files);
  69. /*
  70. * after _close_fd(), ref_cnt will be 0,
  71. * but smcinvoke_release() was still not called,
  72. * so we first call smcinvoke_release_from_kernel_client() to
  73. * free filp and ask TZ to release object, then call _close_fd()
  74. */
  75. smcinvoke_release_from_kernel_client(me->fd);
  76. close_fd(me->fd);
  77. kfree(me);
  78. }
  79. int getObjectFromHandle(int handle, struct Object *obj)
  80. {
  81. int ret = 0;
  82. if (handle == SMCINVOKE_USERSPACE_OBJ_NULL) {
  83. /* NULL object*/
  84. Object_ASSIGN_NULL(*obj);
  85. } else if (handle > SMCINVOKE_USERSPACE_OBJ_NULL) {
  86. *obj = tzobject_new(handle);
  87. if (Object_isNull(*obj))
  88. ret = OBJECT_ERROR_BADOBJ;
  89. } else {
  90. pr_err("CBobj not supported for handle %d\n", handle);
  91. ret = OBJECT_ERROR_BADOBJ;
  92. }
  93. return ret;
  94. }
  95. int getHandleFromObject(struct Object obj, int *handle)
  96. {
  97. int ret = 0;
  98. if (Object_isNull(obj)) {
  99. /* set NULL Object's fd to be -1 */
  100. *handle = SMCINVOKE_USERSPACE_OBJ_NULL;
  101. return ret;
  102. }
  103. if (obj.invoke == invoke_over_smcinvoke) {
  104. struct tzobject_context *ctx = (struct tzobject_context *)(obj.context);
  105. if (ctx != NULL) {
  106. *handle = ctx->fd;
  107. } else {
  108. pr_err("Failed to get tzobject_context obj handle, ret = %d\n", ret);
  109. ret = OBJECT_ERROR_BADOBJ;
  110. }
  111. } else {
  112. pr_err("CBobj not supported\n");
  113. ret = OBJECT_ERROR_BADOBJ;
  114. }
  115. return ret;
  116. }
  117. static int marshalIn(struct smcinvoke_cmd_req *req,
  118. union smcinvoke_arg *argptr,
  119. uint32_t op, union ObjectArg *args,
  120. uint32_t counts)
  121. {
  122. size_t i = 0;
  123. req->op = op;
  124. req->counts = counts;
  125. req->argsize = sizeof(union smcinvoke_arg);
  126. req->args = (uintptr_t)argptr;
  127. FOR_ARGS(i, counts, buffers) {
  128. argptr[i].b.addr = (uintptr_t) args[i].b.ptr;
  129. argptr[i].b.size = args[i].b.size;
  130. }
  131. FOR_ARGS(i, counts, OI) {
  132. int handle = -1, ret;
  133. ret = getHandleFromObject(args[i].o, &handle);
  134. if (ret) {
  135. pr_err("invalid OI[%zu]\n", i);
  136. return OBJECT_ERROR_BADOBJ;
  137. }
  138. argptr[i].o.fd = handle;
  139. }
  140. FOR_ARGS(i, counts, OO) {
  141. argptr[i].o.fd = SMCINVOKE_USERSPACE_OBJ_NULL;
  142. }
  143. return OBJECT_OK;
  144. }
  145. static int marshalOut(struct smcinvoke_cmd_req *req,
  146. union smcinvoke_arg *argptr,
  147. union ObjectArg *args, uint32_t counts,
  148. struct tzobject_context *me)
  149. {
  150. int ret = req->result;
  151. bool failed = false;
  152. size_t i = 0;
  153. argptr = (union smcinvoke_arg *)(uintptr_t)(req->args);
  154. FOR_ARGS(i, counts, BO) {
  155. args[i].b.size = argptr[i].b.size;
  156. }
  157. FOR_ARGS(i, counts, OO) {
  158. ret = getObjectFromHandle(argptr[i].o.fd, &(args[i].o));
  159. if (ret) {
  160. pr_err("Failed to get OO[%zu] from handle = %d\n",
  161. i, (int)argptr[i].o.fd);
  162. failed = true;
  163. break;
  164. }
  165. pr_debug("Succeed to create OO for args[%zu].o, fd = %d\n",
  166. i, (int)argptr[i].o.fd);
  167. }
  168. if (failed) {
  169. FOR_ARGS(i, counts, OO) {
  170. Object_ASSIGN_NULL(args[i].o);
  171. }
  172. /* Only overwrite ret value if invoke result is 0 */
  173. if (ret == 0)
  174. ret = OBJECT_ERROR_BADOBJ;
  175. }
  176. return ret;
  177. }
  178. static int invoke_over_smcinvoke(void *cxt,
  179. uint32_t op,
  180. union ObjectArg *args,
  181. uint32_t counts)
  182. {
  183. int ret = OBJECT_OK;
  184. struct smcinvoke_cmd_req req = {0, 0, 0, 0, 0};
  185. size_t i = 0;
  186. struct tzobject_context *me = NULL;
  187. uint32_t method;
  188. union smcinvoke_arg *argptr = NULL;
  189. FOR_ARGS(i, counts, OO) {
  190. args[i].o = Object_NULL;
  191. }
  192. me = (struct tzobject_context *)cxt;
  193. method = ObjectOp_methodID(op);
  194. pr_debug("%s: cxt = %p, fd = %d, op = %u, cnt = %x, refs = %u\n",
  195. __func__, me, me->fd, op, counts, kref_read(&me->refs));
  196. if (ObjectOp_isLocal(op)) {
  197. switch (method) {
  198. case Object_OP_retain:
  199. kref_get(&me->refs);
  200. return OBJECT_OK;
  201. case Object_OP_release:
  202. kref_put(&me->refs, tzobject_delete);
  203. return OBJECT_OK;
  204. }
  205. return OBJECT_ERROR_REMOTE;
  206. }
  207. argptr = kcalloc(OBJECT_COUNTS_TOTAL(counts),
  208. sizeof(union smcinvoke_arg), GFP_KERNEL);
  209. if (argptr == NULL)
  210. return OBJECT_ERROR_KMEM;
  211. ret = marshalIn(&req, argptr, op, args, counts);
  212. if (ret)
  213. goto exit;
  214. ret = process_invoke_request_from_kernel_client(me->fd, &req);
  215. if (ret) {
  216. pr_err("INVOKE failed with ret = %d, result = %d\n"
  217. "obj.context = %p, fd = %d, op = %d, counts = 0x%x\n",
  218. ret, req.result, me, me->fd, op, counts);
  219. FOR_ARGS(i, counts, OO) {
  220. struct smcinvoke_obj obj = argptr[i].o;
  221. if (obj.fd >= 0) {
  222. pr_err("Close OO[%zu].fd = %lld\n", i, obj.fd);
  223. close_fd(obj.fd);
  224. }
  225. }
  226. if (ret == -EBUSY) {
  227. ret = OBJECT_ERROR_BUSY;
  228. }
  229. else if (ret == -ENOMEM){
  230. ret = OBJECT_ERROR_KMEM;
  231. } else {
  232. ret = OBJECT_ERROR_UNAVAIL;
  233. }
  234. goto exit;
  235. }
  236. if (!req.result)
  237. ret = marshalOut(&req, argptr, args, counts, me);
  238. exit:
  239. kfree(argptr);
  240. return ret | req.result;
  241. }
  242. int get_root_obj(struct Object *rootObj)
  243. {
  244. int ret = 0;
  245. int root_fd = -1;
  246. ret = get_root_fd(&root_fd);
  247. if (ret) {
  248. pr_err("Failed to get root fd, ret = %d\n", ret);
  249. return ret;
  250. }
  251. *rootObj = tzobject_new(root_fd);
  252. if (Object_isNull(*rootObj)) {
  253. close_fd(root_fd);
  254. ret = -ENOMEM;
  255. }
  256. return ret;
  257. }
  258. /*
  259. * Get a client environment using a NULL credentials Object
  260. */
  261. int32_t get_client_env_object(struct Object *clientEnvObj)
  262. {
  263. int32_t ret = OBJECT_ERROR;
  264. int retry_count = 0;
  265. struct Object rootObj = Object_NULL;
  266. /* get rootObj */
  267. ret = get_root_obj(&rootObj);
  268. if (ret) {
  269. pr_err("Failed to create rootobj\n");
  270. return ret;
  271. }
  272. /* get client env */
  273. do {
  274. ret = IClientEnv_registerWithCredentials(rootObj,
  275. Object_NULL, clientEnvObj);
  276. if (ret == OBJECT_ERROR_BUSY) {
  277. pr_err("Secure side is busy,will retry after 5 ms, retry_count = %d",retry_count);
  278. msleep(SMCINVOKE_INTERFACE_BUSY_WAIT_MS);
  279. }
  280. } while ((ret == OBJECT_ERROR_BUSY) && (retry_count++ < SMCINVOKE_INTERFACE_MAX_RETRY));
  281. if (ret)
  282. pr_err("Failed to get ClientEnvObject, ret = %d\n", ret);
  283. Object_release(rootObj);
  284. return ret;
  285. }
  286. EXPORT_SYMBOL(get_client_env_object);
  287. #if IS_ENABLED(CONFIG_QSEECOM_COMPAT)
  288. static int load_app(struct qseecom_compat_context *cxt, const char *app_name)
  289. {
  290. size_t fw_size = 0;
  291. u8 *imgbuf_va = NULL;
  292. int ret = 0;
  293. char dist_name[MAX_FW_APP_SIZE] = {0};
  294. size_t dist_name_len = 0;
  295. struct qtee_shm shm = {0};
  296. if (strnlen(app_name, MAX_FW_APP_SIZE) == MAX_FW_APP_SIZE) {
  297. pr_err("The app_name (%s) with length %zu is not valid\n",
  298. app_name, strnlen(app_name, MAX_FW_APP_SIZE));
  299. return -EINVAL;
  300. }
  301. ret = IQSEEComCompatAppLoader_lookupTA(cxt->app_loader,
  302. app_name, strlen(app_name), &cxt->app_controller);
  303. if (!ret) {
  304. pr_info("app %s exists\n", app_name);
  305. return ret;
  306. }
  307. imgbuf_va = firmware_request_from_smcinvoke(app_name, &fw_size, &shm);
  308. if (imgbuf_va == NULL) {
  309. pr_err("Failed on firmware_request_from_smcinvoke\n");
  310. return -EINVAL;
  311. }
  312. ret = IQSEEComCompatAppLoader_loadFromBuffer(
  313. cxt->app_loader, imgbuf_va, fw_size,
  314. app_name, strlen(app_name),
  315. dist_name, MAX_FW_APP_SIZE, &dist_name_len,
  316. &cxt->app_controller);
  317. if (ret) {
  318. pr_err("loadFromBuffer failed for app %s, ret = %d\n",
  319. app_name, ret);
  320. goto exit_release_shm;
  321. }
  322. cxt->app_arch = *(uint8_t *)(imgbuf_va + EI_CLASS);
  323. pr_info("%s %d, loaded app %s, dist_name %s, dist_name_len %zu\n",
  324. __func__, __LINE__, app_name, dist_name, dist_name_len);
  325. exit_release_shm:
  326. qtee_shmbridge_free_shm(&shm);
  327. return ret;
  328. }
  329. static int __qseecom_start_app(struct qseecom_handle **handle,
  330. char *app_name, uint32_t size)
  331. {
  332. int ret = 0;
  333. struct qseecom_compat_context *cxt = NULL;
  334. pr_warn("%s, start app %s, size %u\n",
  335. __func__, app_name, size);
  336. if (app_name == NULL || handle == NULL) {
  337. pr_err("app_name is null or invalid handle\n");
  338. return -EINVAL;
  339. }
  340. /* allocate qseecom_compat_context */
  341. cxt = kzalloc(sizeof(struct qseecom_compat_context), GFP_KERNEL);
  342. if (!cxt)
  343. return -ENOMEM;
  344. /* get client env */
  345. ret = get_client_env_object(&cxt->client_env);
  346. if (ret) {
  347. pr_err("failed to get clientEnv when loading app %s, ret %d\n",
  348. app_name, ret);
  349. ret = -EINVAL;
  350. goto exit_free_cxt;
  351. }
  352. /* get apploader with CQSEEComCompatAppLoader_UID */
  353. ret = IClientEnv_open(cxt->client_env, CQSEEComCompatAppLoader_UID,
  354. &cxt->app_loader);
  355. if (ret) {
  356. pr_err("failed to get apploader when loading app %s, ret %d\n",
  357. app_name, ret);
  358. ret = -EINVAL;
  359. goto exit_release_clientenv;
  360. }
  361. /* load app*/
  362. ret = load_app(cxt, app_name);
  363. if (ret) {
  364. pr_err("failed to load app %s, ret = %d\n",
  365. app_name, ret);
  366. ret = -EINVAL;
  367. goto exit_release_apploader;
  368. }
  369. /* Get the physical address of the req/resp buffer */
  370. ret = qtee_shmbridge_allocate_shm(size, &cxt->shm);
  371. if (ret) {
  372. pr_err("qtee_shmbridge_allocate_shm failed, ret :%d\n", ret);
  373. ret = -EINVAL;
  374. goto exit_release_appcontroller;
  375. }
  376. cxt->sbuf = cxt->shm.vaddr;
  377. cxt->sbuf_len = size;
  378. *handle = (struct qseecom_handle *)cxt;
  379. return ret;
  380. exit_release_appcontroller:
  381. Object_release(cxt->app_controller);
  382. exit_release_apploader:
  383. Object_release(cxt->app_loader);
  384. exit_release_clientenv:
  385. Object_release(cxt->client_env);
  386. exit_free_cxt:
  387. kfree(cxt);
  388. return ret;
  389. }
  390. static int __qseecom_shutdown_app(struct qseecom_handle **handle)
  391. {
  392. struct qseecom_compat_context *cxt = NULL;
  393. if ((handle == NULL) || (*handle == NULL)) {
  394. pr_err("Handle is NULL\n");
  395. return -EINVAL;
  396. }
  397. cxt = (struct qseecom_compat_context *)(*handle);
  398. qtee_shmbridge_free_shm(&cxt->shm);
  399. Object_release(cxt->app_controller);
  400. Object_release(cxt->app_loader);
  401. Object_release(cxt->client_env);
  402. kfree(cxt);
  403. *handle = NULL;
  404. return 0;
  405. }
  406. static int __qseecom_send_command(struct qseecom_handle *handle, void *send_buf,
  407. uint32_t sbuf_len, void *resp_buf, uint32_t rbuf_len)
  408. {
  409. struct qseecom_compat_context *cxt =
  410. (struct qseecom_compat_context *)handle;
  411. size_t out_len = 0;
  412. pr_debug("%s, sbuf_len %u, rbuf_len %u\n",
  413. __func__, sbuf_len, rbuf_len);
  414. if (!handle || !send_buf || !resp_buf || !sbuf_len || !rbuf_len) {
  415. pr_err("One of params is invalid. %s, handle %p, send_buf %p,resp_buf %p,sbuf_len %u, rbuf_len %u\n",
  416. __func__, handle, send_buf, resp_buf, sbuf_len, rbuf_len);
  417. return -EINVAL;
  418. }
  419. return IQSEEComCompat_sendRequest(cxt->app_controller,
  420. send_buf, sbuf_len,
  421. resp_buf, rbuf_len,
  422. send_buf, sbuf_len, &out_len,
  423. resp_buf, rbuf_len, &out_len,
  424. NULL, 0, /* embedded offset array */
  425. (cxt->app_arch == ELFCLASS64),
  426. Object_NULL, Object_NULL,
  427. Object_NULL, Object_NULL);
  428. }
  429. #if IS_ENABLED(CONFIG_QSEECOM_PROXY)
  430. const static struct qseecom_drv_ops qseecom_driver_ops = {
  431. .qseecom_send_command = __qseecom_send_command,
  432. .qseecom_start_app = __qseecom_start_app,
  433. .qseecom_shutdown_app = __qseecom_shutdown_app,
  434. };
  435. int get_qseecom_kernel_fun_ops(void)
  436. {
  437. return provide_qseecom_kernel_fun_ops(&qseecom_driver_ops);
  438. }
  439. #else
  440. int qseecom_start_app(struct qseecom_handle **handle,
  441. char *app_name, uint32_t size)
  442. {
  443. return __qseecom_start_app(handle, app_name, size);
  444. }
  445. EXPORT_SYMBOL(qseecom_start_app);
  446. int qseecom_shutdown_app(struct qseecom_handle **handle)
  447. {
  448. return __qseecom_shutdown_app(handle);
  449. }
  450. EXPORT_SYMBOL(qseecom_shutdown_app);
  451. int qseecom_send_command(struct qseecom_handle *handle, void *send_buf,
  452. uint32_t sbuf_len, void *resp_buf, uint32_t rbuf_len)
  453. {
  454. return __qseecom_send_command(handle, send_buf, sbuf_len,
  455. resp_buf, rbuf_len);
  456. }
  457. EXPORT_SYMBOL(qseecom_send_command);
  458. #endif
  459. #endif
  460. char *firmware_request_from_smcinvoke(const char *appname, size_t *fw_size, struct qtee_shm *shm)
  461. {
  462. int rc = 0;
  463. const struct firmware *fw_entry = NULL, *fw_entry00 = NULL, *fw_entrylast = NULL;
  464. char fw_name[MAX_FW_APP_SIZE + FILE_EXT_SIZE] = "\0";
  465. int num_images = 0, phi = 0;
  466. unsigned char app_arch = 0;
  467. u8 *img_data_ptr = NULL;
  468. size_t bufferOffset = 0, phdr_table_offset = 0;
  469. size_t *offset = NULL;
  470. Elf32_Phdr phdr32;
  471. Elf64_Phdr phdr64;
  472. struct elf32_hdr *ehdr = NULL;
  473. struct elf64_hdr *ehdr64 = NULL;
  474. /* load b00*/
  475. snprintf(fw_name, sizeof(fw_name), "%s.b00", appname);
  476. rc = firmware_request_nowarn(&fw_entry00, fw_name, class_dev);
  477. if (rc) {
  478. pr_err("Load %s failed, ret:%d\n", fw_name, rc);
  479. return NULL;
  480. }
  481. app_arch = *(unsigned char *)(fw_entry00->data + EI_CLASS);
  482. /*Get the offsets for split images header*/
  483. if (app_arch == ELFCLASS32) {
  484. ehdr = (struct elf32_hdr *)fw_entry00->data;
  485. num_images = ehdr->e_phnum;
  486. offset = kcalloc(num_images, sizeof(size_t), GFP_KERNEL);
  487. if (offset == NULL)
  488. goto release_fw_entry00;
  489. phdr_table_offset = (size_t) ehdr->e_phoff;
  490. for (phi = 1; phi < num_images; ++phi) {
  491. bufferOffset = phdr_table_offset + phi * sizeof(Elf32_Phdr);
  492. phdr32 = *(Elf32_Phdr *)(fw_entry00->data + bufferOffset);
  493. offset[phi] = (size_t)phdr32.p_offset;
  494. }
  495. } else if (app_arch == ELFCLASS64) {
  496. ehdr64 = (struct elf64_hdr *)fw_entry00->data;
  497. num_images = ehdr64->e_phnum;
  498. offset = kcalloc(num_images, sizeof(size_t), GFP_KERNEL);
  499. if (offset == NULL)
  500. goto release_fw_entry00;
  501. phdr_table_offset = (size_t) ehdr64->e_phoff;
  502. for (phi = 1; phi < num_images; ++phi) {
  503. bufferOffset = phdr_table_offset + phi * sizeof(Elf64_Phdr);
  504. phdr64 = *(Elf64_Phdr *)(fw_entry00->data + bufferOffset);
  505. offset[phi] = (size_t)phdr64.p_offset;
  506. }
  507. } else {
  508. pr_err("QSEE %s app, arch %u is not supported\n", appname, app_arch);
  509. goto release_fw_entry00;
  510. }
  511. /*Find the size of last split bin image*/
  512. snprintf(fw_name, ARRAY_SIZE(fw_name), "%s.b%02d", appname, num_images-1);
  513. rc = firmware_request_nowarn(&fw_entrylast, fw_name, class_dev);
  514. if (rc) {
  515. pr_err("Failed to locate blob %s\n", fw_name);
  516. goto release_fw_entry00;
  517. }
  518. /*Total size of image will be the offset of last image + the size of last split image*/
  519. *fw_size = fw_entrylast->size + offset[num_images-1];
  520. /*Allocate memory for the buffer that will hold the split image*/
  521. rc = qtee_shmbridge_allocate_shm((*fw_size), shm);
  522. if (rc) {
  523. pr_err("smbridge alloc failed for size: %zu\n", *fw_size);
  524. goto release_fw_entrylast;
  525. }
  526. img_data_ptr = shm->vaddr;
  527. /*
  528. * Copy contents of split bins to the buffer
  529. */
  530. memcpy(img_data_ptr, fw_entry00->data, fw_entry00->size);
  531. for (phi = 1; phi < num_images-1; phi++) {
  532. snprintf(fw_name, ARRAY_SIZE(fw_name), "%s.b%02d", appname, phi);
  533. rc = firmware_request_nowarn(&fw_entry, fw_name, class_dev);
  534. if (rc) {
  535. pr_err("Failed to locate blob %s\n", fw_name);
  536. qtee_shmbridge_free_shm(shm);
  537. img_data_ptr = NULL;
  538. goto release_fw_entrylast;
  539. }
  540. memcpy(img_data_ptr + offset[phi], fw_entry->data, fw_entry->size);
  541. release_firmware(fw_entry);
  542. fw_entry = NULL;
  543. }
  544. memcpy(img_data_ptr + offset[phi], fw_entrylast->data, fw_entrylast->size);
  545. release_fw_entrylast:
  546. release_firmware(fw_entrylast);
  547. release_fw_entry00:
  548. release_firmware(fw_entry00);
  549. kfree(offset);
  550. return img_data_ptr;
  551. }
  552. EXPORT_SYMBOL(firmware_request_from_smcinvoke);