pfr_update.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * ACPI Platform Firmware Runtime Update Device driver
  4. *
  5. * Copyright (C) 2021 Intel Corporation
  6. * Author: Chen Yu <[email protected]>
  7. *
  8. * pfr_update driver is used for Platform Firmware Runtime
  9. * Update, which includes the code injection and driver update.
  10. */
  11. #include <linux/acpi.h>
  12. #include <linux/device.h>
  13. #include <linux/efi.h>
  14. #include <linux/err.h>
  15. #include <linux/errno.h>
  16. #include <linux/file.h>
  17. #include <linux/fs.h>
  18. #include <linux/idr.h>
  19. #include <linux/miscdevice.h>
  20. #include <linux/module.h>
  21. #include <linux/platform_device.h>
  22. #include <linux/string.h>
  23. #include <linux/uaccess.h>
  24. #include <linux/uio.h>
  25. #include <linux/uuid.h>
  26. #include <uapi/linux/pfrut.h>
  27. #define PFRU_FUNC_STANDARD_QUERY 0
  28. #define PFRU_FUNC_QUERY_UPDATE_CAP 1
  29. #define PFRU_FUNC_QUERY_BUF 2
  30. #define PFRU_FUNC_START 3
  31. #define PFRU_CODE_INJECT_TYPE 1
  32. #define PFRU_DRIVER_UPDATE_TYPE 2
  33. #define PFRU_REVID_1 1
  34. #define PFRU_REVID_2 2
  35. #define PFRU_DEFAULT_REV_ID PFRU_REVID_1
  36. enum cap_index {
  37. CAP_STATUS_IDX = 0,
  38. CAP_UPDATE_IDX = 1,
  39. CAP_CODE_TYPE_IDX = 2,
  40. CAP_FW_VER_IDX = 3,
  41. CAP_CODE_RT_VER_IDX = 4,
  42. CAP_DRV_TYPE_IDX = 5,
  43. CAP_DRV_RT_VER_IDX = 6,
  44. CAP_DRV_SVN_IDX = 7,
  45. CAP_PLAT_ID_IDX = 8,
  46. CAP_OEM_ID_IDX = 9,
  47. CAP_OEM_INFO_IDX = 10,
  48. CAP_NR_IDX
  49. };
  50. enum buf_index {
  51. BUF_STATUS_IDX = 0,
  52. BUF_EXT_STATUS_IDX = 1,
  53. BUF_ADDR_LOW_IDX = 2,
  54. BUF_ADDR_HI_IDX = 3,
  55. BUF_SIZE_IDX = 4,
  56. BUF_NR_IDX
  57. };
  58. enum update_index {
  59. UPDATE_STATUS_IDX = 0,
  60. UPDATE_EXT_STATUS_IDX = 1,
  61. UPDATE_AUTH_TIME_LOW_IDX = 2,
  62. UPDATE_AUTH_TIME_HI_IDX = 3,
  63. UPDATE_EXEC_TIME_LOW_IDX = 4,
  64. UPDATE_EXEC_TIME_HI_IDX = 5,
  65. UPDATE_NR_IDX
  66. };
  67. enum pfru_start_action {
  68. START_STAGE = 0,
  69. START_ACTIVATE = 1,
  70. START_STAGE_ACTIVATE = 2,
  71. };
  72. struct pfru_device {
  73. u32 rev_id, index;
  74. struct device *parent_dev;
  75. struct miscdevice miscdev;
  76. };
  77. static DEFINE_IDA(pfru_ida);
  78. /*
  79. * Manual reference:
  80. * https://uefi.org/sites/default/files/resources/Intel_MM_OS_Interface_Spec_Rev100.pdf
  81. *
  82. * pfru_guid is the parameter for _DSM method
  83. */
  84. static const guid_t pfru_guid =
  85. GUID_INIT(0xECF9533B, 0x4A3C, 0x4E89, 0x93, 0x9E, 0xC7, 0x71,
  86. 0x12, 0x60, 0x1C, 0x6D);
  87. /* pfru_code_inj_guid is the UUID to identify code injection EFI capsule file */
  88. static const guid_t pfru_code_inj_guid =
  89. GUID_INIT(0xB2F84B79, 0x7B6E, 0x4E45, 0x88, 0x5F, 0x3F, 0xB9,
  90. 0xBB, 0x18, 0x54, 0x02);
  91. /* pfru_drv_update_guid is the UUID to identify driver update EFI capsule file */
  92. static const guid_t pfru_drv_update_guid =
  93. GUID_INIT(0x4569DD8C, 0x75F1, 0x429A, 0xA3, 0xD6, 0x24, 0xDE,
  94. 0x80, 0x97, 0xA0, 0xDF);
  95. static inline int pfru_valid_revid(u32 id)
  96. {
  97. return id == PFRU_REVID_1 || id == PFRU_REVID_2;
  98. }
  99. static inline struct pfru_device *to_pfru_dev(struct file *file)
  100. {
  101. return container_of(file->private_data, struct pfru_device, miscdev);
  102. }
  103. static int query_capability(struct pfru_update_cap_info *cap_hdr,
  104. struct pfru_device *pfru_dev)
  105. {
  106. acpi_handle handle = ACPI_HANDLE(pfru_dev->parent_dev);
  107. union acpi_object *out_obj;
  108. int ret = -EINVAL;
  109. out_obj = acpi_evaluate_dsm_typed(handle, &pfru_guid,
  110. pfru_dev->rev_id,
  111. PFRU_FUNC_QUERY_UPDATE_CAP,
  112. NULL, ACPI_TYPE_PACKAGE);
  113. if (!out_obj)
  114. return ret;
  115. if (out_obj->package.count < CAP_NR_IDX ||
  116. out_obj->package.elements[CAP_STATUS_IDX].type != ACPI_TYPE_INTEGER ||
  117. out_obj->package.elements[CAP_UPDATE_IDX].type != ACPI_TYPE_INTEGER ||
  118. out_obj->package.elements[CAP_CODE_TYPE_IDX].type != ACPI_TYPE_BUFFER ||
  119. out_obj->package.elements[CAP_FW_VER_IDX].type != ACPI_TYPE_INTEGER ||
  120. out_obj->package.elements[CAP_CODE_RT_VER_IDX].type != ACPI_TYPE_INTEGER ||
  121. out_obj->package.elements[CAP_DRV_TYPE_IDX].type != ACPI_TYPE_BUFFER ||
  122. out_obj->package.elements[CAP_DRV_RT_VER_IDX].type != ACPI_TYPE_INTEGER ||
  123. out_obj->package.elements[CAP_DRV_SVN_IDX].type != ACPI_TYPE_INTEGER ||
  124. out_obj->package.elements[CAP_PLAT_ID_IDX].type != ACPI_TYPE_BUFFER ||
  125. out_obj->package.elements[CAP_OEM_ID_IDX].type != ACPI_TYPE_BUFFER ||
  126. out_obj->package.elements[CAP_OEM_INFO_IDX].type != ACPI_TYPE_BUFFER)
  127. goto free_acpi_buffer;
  128. cap_hdr->status = out_obj->package.elements[CAP_STATUS_IDX].integer.value;
  129. if (cap_hdr->status != DSM_SUCCEED) {
  130. ret = -EBUSY;
  131. dev_dbg(pfru_dev->parent_dev, "Error Status:%d\n", cap_hdr->status);
  132. goto free_acpi_buffer;
  133. }
  134. cap_hdr->update_cap = out_obj->package.elements[CAP_UPDATE_IDX].integer.value;
  135. memcpy(&cap_hdr->code_type,
  136. out_obj->package.elements[CAP_CODE_TYPE_IDX].buffer.pointer,
  137. out_obj->package.elements[CAP_CODE_TYPE_IDX].buffer.length);
  138. cap_hdr->fw_version =
  139. out_obj->package.elements[CAP_FW_VER_IDX].integer.value;
  140. cap_hdr->code_rt_version =
  141. out_obj->package.elements[CAP_CODE_RT_VER_IDX].integer.value;
  142. memcpy(&cap_hdr->drv_type,
  143. out_obj->package.elements[CAP_DRV_TYPE_IDX].buffer.pointer,
  144. out_obj->package.elements[CAP_DRV_TYPE_IDX].buffer.length);
  145. cap_hdr->drv_rt_version =
  146. out_obj->package.elements[CAP_DRV_RT_VER_IDX].integer.value;
  147. cap_hdr->drv_svn =
  148. out_obj->package.elements[CAP_DRV_SVN_IDX].integer.value;
  149. memcpy(&cap_hdr->platform_id,
  150. out_obj->package.elements[CAP_PLAT_ID_IDX].buffer.pointer,
  151. out_obj->package.elements[CAP_PLAT_ID_IDX].buffer.length);
  152. memcpy(&cap_hdr->oem_id,
  153. out_obj->package.elements[CAP_OEM_ID_IDX].buffer.pointer,
  154. out_obj->package.elements[CAP_OEM_ID_IDX].buffer.length);
  155. cap_hdr->oem_info_len =
  156. out_obj->package.elements[CAP_OEM_INFO_IDX].buffer.length;
  157. ret = 0;
  158. free_acpi_buffer:
  159. ACPI_FREE(out_obj);
  160. return ret;
  161. }
  162. static int query_buffer(struct pfru_com_buf_info *info,
  163. struct pfru_device *pfru_dev)
  164. {
  165. acpi_handle handle = ACPI_HANDLE(pfru_dev->parent_dev);
  166. union acpi_object *out_obj;
  167. int ret = -EINVAL;
  168. out_obj = acpi_evaluate_dsm_typed(handle, &pfru_guid,
  169. pfru_dev->rev_id, PFRU_FUNC_QUERY_BUF,
  170. NULL, ACPI_TYPE_PACKAGE);
  171. if (!out_obj)
  172. return ret;
  173. if (out_obj->package.count < BUF_NR_IDX ||
  174. out_obj->package.elements[BUF_STATUS_IDX].type != ACPI_TYPE_INTEGER ||
  175. out_obj->package.elements[BUF_EXT_STATUS_IDX].type != ACPI_TYPE_INTEGER ||
  176. out_obj->package.elements[BUF_ADDR_LOW_IDX].type != ACPI_TYPE_INTEGER ||
  177. out_obj->package.elements[BUF_ADDR_HI_IDX].type != ACPI_TYPE_INTEGER ||
  178. out_obj->package.elements[BUF_SIZE_IDX].type != ACPI_TYPE_INTEGER)
  179. goto free_acpi_buffer;
  180. info->status = out_obj->package.elements[BUF_STATUS_IDX].integer.value;
  181. info->ext_status =
  182. out_obj->package.elements[BUF_EXT_STATUS_IDX].integer.value;
  183. if (info->status != DSM_SUCCEED) {
  184. ret = -EBUSY;
  185. dev_dbg(pfru_dev->parent_dev, "Error Status:%d\n", info->status);
  186. dev_dbg(pfru_dev->parent_dev, "Error Extended Status:%d\n", info->ext_status);
  187. goto free_acpi_buffer;
  188. }
  189. info->addr_lo =
  190. out_obj->package.elements[BUF_ADDR_LOW_IDX].integer.value;
  191. info->addr_hi =
  192. out_obj->package.elements[BUF_ADDR_HI_IDX].integer.value;
  193. info->buf_size = out_obj->package.elements[BUF_SIZE_IDX].integer.value;
  194. ret = 0;
  195. free_acpi_buffer:
  196. ACPI_FREE(out_obj);
  197. return ret;
  198. }
  199. static int get_image_type(const struct efi_manage_capsule_image_header *img_hdr,
  200. struct pfru_device *pfru_dev)
  201. {
  202. const efi_guid_t *image_type_id = &img_hdr->image_type_id;
  203. /* check whether this is a code injection or driver update */
  204. if (guid_equal(image_type_id, &pfru_code_inj_guid))
  205. return PFRU_CODE_INJECT_TYPE;
  206. if (guid_equal(image_type_id, &pfru_drv_update_guid))
  207. return PFRU_DRIVER_UPDATE_TYPE;
  208. return -EINVAL;
  209. }
  210. static int adjust_efi_size(const struct efi_manage_capsule_image_header *img_hdr,
  211. int size)
  212. {
  213. /*
  214. * The (u64 hw_ins) was introduced in UEFI spec version 2,
  215. * and (u64 capsule_support) was introduced in version 3.
  216. * The size needs to be adjusted accordingly. That is to
  217. * say, version 1 should subtract the size of hw_ins+capsule_support,
  218. * and version 2 should sbstract the size of capsule_support.
  219. */
  220. size += sizeof(struct efi_manage_capsule_image_header);
  221. switch (img_hdr->ver) {
  222. case 1:
  223. return size - 2 * sizeof(u64);
  224. case 2:
  225. return size - sizeof(u64);
  226. default:
  227. /* only support version 1 and 2 */
  228. return -EINVAL;
  229. }
  230. }
  231. static bool applicable_image(const void *data, struct pfru_update_cap_info *cap,
  232. struct pfru_device *pfru_dev)
  233. {
  234. struct pfru_payload_hdr *payload_hdr;
  235. const efi_capsule_header_t *cap_hdr = data;
  236. const struct efi_manage_capsule_header *m_hdr;
  237. const struct efi_manage_capsule_image_header *m_img_hdr;
  238. const struct efi_image_auth *auth;
  239. int type, size;
  240. /*
  241. * If the code in the capsule is older than the current
  242. * firmware code, the update will be rejected by the firmware,
  243. * so check the version of it upfront without engaging the
  244. * Management Mode update mechanism which may be costly.
  245. */
  246. size = cap_hdr->headersize;
  247. m_hdr = data + size;
  248. /*
  249. * Current data structure size plus variable array indicated
  250. * by number of (emb_drv_cnt + payload_cnt)
  251. */
  252. size += offsetof(struct efi_manage_capsule_header, offset_list) +
  253. (m_hdr->emb_drv_cnt + m_hdr->payload_cnt) * sizeof(u64);
  254. m_img_hdr = data + size;
  255. type = get_image_type(m_img_hdr, pfru_dev);
  256. if (type < 0)
  257. return false;
  258. size = adjust_efi_size(m_img_hdr, size);
  259. if (size < 0)
  260. return false;
  261. auth = data + size;
  262. size += sizeof(u64) + auth->auth_info.hdr.len;
  263. payload_hdr = (struct pfru_payload_hdr *)(data + size);
  264. /* finally compare the version */
  265. if (type == PFRU_CODE_INJECT_TYPE)
  266. return payload_hdr->rt_ver >= cap->code_rt_version;
  267. return payload_hdr->rt_ver >= cap->drv_rt_version;
  268. }
  269. static void print_update_debug_info(struct pfru_updated_result *result,
  270. struct pfru_device *pfru_dev)
  271. {
  272. dev_dbg(pfru_dev->parent_dev, "Update result:\n");
  273. dev_dbg(pfru_dev->parent_dev, "Authentication Time Low:%lld\n",
  274. result->low_auth_time);
  275. dev_dbg(pfru_dev->parent_dev, "Authentication Time High:%lld\n",
  276. result->high_auth_time);
  277. dev_dbg(pfru_dev->parent_dev, "Execution Time Low:%lld\n",
  278. result->low_exec_time);
  279. dev_dbg(pfru_dev->parent_dev, "Execution Time High:%lld\n",
  280. result->high_exec_time);
  281. }
  282. static int start_update(int action, struct pfru_device *pfru_dev)
  283. {
  284. union acpi_object *out_obj, in_obj, in_buf;
  285. struct pfru_updated_result update_result;
  286. acpi_handle handle;
  287. int ret = -EINVAL;
  288. memset(&in_obj, 0, sizeof(in_obj));
  289. memset(&in_buf, 0, sizeof(in_buf));
  290. in_obj.type = ACPI_TYPE_PACKAGE;
  291. in_obj.package.count = 1;
  292. in_obj.package.elements = &in_buf;
  293. in_buf.type = ACPI_TYPE_INTEGER;
  294. in_buf.integer.value = action;
  295. handle = ACPI_HANDLE(pfru_dev->parent_dev);
  296. out_obj = acpi_evaluate_dsm_typed(handle, &pfru_guid,
  297. pfru_dev->rev_id, PFRU_FUNC_START,
  298. &in_obj, ACPI_TYPE_PACKAGE);
  299. if (!out_obj)
  300. return ret;
  301. if (out_obj->package.count < UPDATE_NR_IDX ||
  302. out_obj->package.elements[UPDATE_STATUS_IDX].type != ACPI_TYPE_INTEGER ||
  303. out_obj->package.elements[UPDATE_EXT_STATUS_IDX].type != ACPI_TYPE_INTEGER ||
  304. out_obj->package.elements[UPDATE_AUTH_TIME_LOW_IDX].type != ACPI_TYPE_INTEGER ||
  305. out_obj->package.elements[UPDATE_AUTH_TIME_HI_IDX].type != ACPI_TYPE_INTEGER ||
  306. out_obj->package.elements[UPDATE_EXEC_TIME_LOW_IDX].type != ACPI_TYPE_INTEGER ||
  307. out_obj->package.elements[UPDATE_EXEC_TIME_HI_IDX].type != ACPI_TYPE_INTEGER)
  308. goto free_acpi_buffer;
  309. update_result.status =
  310. out_obj->package.elements[UPDATE_STATUS_IDX].integer.value;
  311. update_result.ext_status =
  312. out_obj->package.elements[UPDATE_EXT_STATUS_IDX].integer.value;
  313. if (update_result.status != DSM_SUCCEED) {
  314. ret = -EBUSY;
  315. dev_dbg(pfru_dev->parent_dev, "Error Status:%d\n", update_result.status);
  316. dev_dbg(pfru_dev->parent_dev, "Error Extended Status:%d\n",
  317. update_result.ext_status);
  318. goto free_acpi_buffer;
  319. }
  320. update_result.low_auth_time =
  321. out_obj->package.elements[UPDATE_AUTH_TIME_LOW_IDX].integer.value;
  322. update_result.high_auth_time =
  323. out_obj->package.elements[UPDATE_AUTH_TIME_HI_IDX].integer.value;
  324. update_result.low_exec_time =
  325. out_obj->package.elements[UPDATE_EXEC_TIME_LOW_IDX].integer.value;
  326. update_result.high_exec_time =
  327. out_obj->package.elements[UPDATE_EXEC_TIME_HI_IDX].integer.value;
  328. print_update_debug_info(&update_result, pfru_dev);
  329. ret = 0;
  330. free_acpi_buffer:
  331. ACPI_FREE(out_obj);
  332. return ret;
  333. }
  334. static long pfru_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
  335. {
  336. struct pfru_update_cap_info cap_hdr;
  337. struct pfru_device *pfru_dev = to_pfru_dev(file);
  338. void __user *p = (void __user *)arg;
  339. u32 rev;
  340. int ret;
  341. switch (cmd) {
  342. case PFRU_IOC_QUERY_CAP:
  343. ret = query_capability(&cap_hdr, pfru_dev);
  344. if (ret)
  345. return ret;
  346. if (copy_to_user(p, &cap_hdr, sizeof(cap_hdr)))
  347. return -EFAULT;
  348. return 0;
  349. case PFRU_IOC_SET_REV:
  350. if (copy_from_user(&rev, p, sizeof(rev)))
  351. return -EFAULT;
  352. if (!pfru_valid_revid(rev))
  353. return -EINVAL;
  354. pfru_dev->rev_id = rev;
  355. return 0;
  356. case PFRU_IOC_STAGE:
  357. return start_update(START_STAGE, pfru_dev);
  358. case PFRU_IOC_ACTIVATE:
  359. return start_update(START_ACTIVATE, pfru_dev);
  360. case PFRU_IOC_STAGE_ACTIVATE:
  361. return start_update(START_STAGE_ACTIVATE, pfru_dev);
  362. default:
  363. return -ENOTTY;
  364. }
  365. }
  366. static ssize_t pfru_write(struct file *file, const char __user *buf,
  367. size_t len, loff_t *ppos)
  368. {
  369. struct pfru_device *pfru_dev = to_pfru_dev(file);
  370. struct pfru_update_cap_info cap;
  371. struct pfru_com_buf_info buf_info;
  372. phys_addr_t phy_addr;
  373. struct iov_iter iter;
  374. struct iovec iov;
  375. char *buf_ptr;
  376. int ret;
  377. ret = query_buffer(&buf_info, pfru_dev);
  378. if (ret)
  379. return ret;
  380. if (len > buf_info.buf_size)
  381. return -EINVAL;
  382. iov.iov_base = (void __user *)buf;
  383. iov.iov_len = len;
  384. iov_iter_init(&iter, ITER_SOURCE, &iov, 1, len);
  385. /* map the communication buffer */
  386. phy_addr = (phys_addr_t)((buf_info.addr_hi << 32) | buf_info.addr_lo);
  387. buf_ptr = memremap(phy_addr, buf_info.buf_size, MEMREMAP_WB);
  388. if (!buf_ptr)
  389. return -ENOMEM;
  390. if (!copy_from_iter_full(buf_ptr, len, &iter)) {
  391. ret = -EINVAL;
  392. goto unmap;
  393. }
  394. /* check if the capsule header has a valid version number */
  395. ret = query_capability(&cap, pfru_dev);
  396. if (ret)
  397. goto unmap;
  398. if (!applicable_image(buf_ptr, &cap, pfru_dev))
  399. ret = -EINVAL;
  400. unmap:
  401. memunmap(buf_ptr);
  402. return ret ?: len;
  403. }
  404. static const struct file_operations acpi_pfru_fops = {
  405. .owner = THIS_MODULE,
  406. .write = pfru_write,
  407. .unlocked_ioctl = pfru_ioctl,
  408. .llseek = noop_llseek,
  409. };
  410. static int acpi_pfru_remove(struct platform_device *pdev)
  411. {
  412. struct pfru_device *pfru_dev = platform_get_drvdata(pdev);
  413. misc_deregister(&pfru_dev->miscdev);
  414. return 0;
  415. }
  416. static void pfru_put_idx(void *data)
  417. {
  418. struct pfru_device *pfru_dev = data;
  419. ida_free(&pfru_ida, pfru_dev->index);
  420. }
  421. static int acpi_pfru_probe(struct platform_device *pdev)
  422. {
  423. acpi_handle handle = ACPI_HANDLE(&pdev->dev);
  424. struct pfru_device *pfru_dev;
  425. int ret;
  426. if (!acpi_has_method(handle, "_DSM")) {
  427. dev_dbg(&pdev->dev, "Missing _DSM\n");
  428. return -ENODEV;
  429. }
  430. pfru_dev = devm_kzalloc(&pdev->dev, sizeof(*pfru_dev), GFP_KERNEL);
  431. if (!pfru_dev)
  432. return -ENOMEM;
  433. ret = ida_alloc(&pfru_ida, GFP_KERNEL);
  434. if (ret < 0)
  435. return ret;
  436. pfru_dev->index = ret;
  437. ret = devm_add_action_or_reset(&pdev->dev, pfru_put_idx, pfru_dev);
  438. if (ret)
  439. return ret;
  440. pfru_dev->rev_id = PFRU_DEFAULT_REV_ID;
  441. pfru_dev->parent_dev = &pdev->dev;
  442. pfru_dev->miscdev.minor = MISC_DYNAMIC_MINOR;
  443. pfru_dev->miscdev.name = devm_kasprintf(&pdev->dev, GFP_KERNEL,
  444. "pfru%d", pfru_dev->index);
  445. if (!pfru_dev->miscdev.name)
  446. return -ENOMEM;
  447. pfru_dev->miscdev.nodename = devm_kasprintf(&pdev->dev, GFP_KERNEL,
  448. "acpi_pfr_update%d", pfru_dev->index);
  449. if (!pfru_dev->miscdev.nodename)
  450. return -ENOMEM;
  451. pfru_dev->miscdev.fops = &acpi_pfru_fops;
  452. pfru_dev->miscdev.parent = &pdev->dev;
  453. ret = misc_register(&pfru_dev->miscdev);
  454. if (ret)
  455. return ret;
  456. platform_set_drvdata(pdev, pfru_dev);
  457. return 0;
  458. }
  459. static const struct acpi_device_id acpi_pfru_ids[] = {
  460. {"INTC1080"},
  461. {}
  462. };
  463. MODULE_DEVICE_TABLE(acpi, acpi_pfru_ids);
  464. static struct platform_driver acpi_pfru_driver = {
  465. .driver = {
  466. .name = "pfr_update",
  467. .acpi_match_table = acpi_pfru_ids,
  468. },
  469. .probe = acpi_pfru_probe,
  470. .remove = acpi_pfru_remove,
  471. };
  472. module_platform_driver(acpi_pfru_driver);
  473. MODULE_DESCRIPTION("Platform Firmware Runtime Update device driver");
  474. MODULE_LICENSE("GPL v2");