Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1647808rwb; Thu, 1 Dec 2022 22:07:53 -0800 (PST) X-Google-Smtp-Source: AA0mqf5IpGMEpldK2UEAYV0tU6JOtTZu3PF4zd3DlL/gpetAsTEUj8WE18oC7zsaL2afNeAVP566 X-Received: by 2002:a17:902:8601:b0:189:7372:144c with SMTP id f1-20020a170902860100b001897372144cmr31720875plo.106.1669961273289; Thu, 01 Dec 2022 22:07:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669961273; cv=none; d=google.com; s=arc-20160816; b=w/ztltVQlZ4E/38i1VFoOaXCpz+t8quvZ/CDj8wJkR84Y8AOrqoB6/2Vk52kLtBUt1 SR9YWC3mEvKzabZx1XRKalzAFPy6BItglrVNEU9IOardPbmq00uug/fsfX/sz9g4jqgd Yr70a3fUXeTBucKNxP3SXgjyibo85uY1i9ArTb/kEV56+ksv+iY8qS4RyTAh0v3ZBPs/ FVXpXVXRQSf6XpkFl2UfF30dph8+lHg0Z+VZZibFxxmyn6Znh5kAt391t1Zipt7kUCKq AFTvGVs/9Ah+FgpGIb4V0EwBs11ye8yYaofTZi36s0AY9O6U1cefox0GlZLqvHxDbj1f +m9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:authenticated-by; bh=2tcwmVvay40OqPAmL+9ELDcq34PwIzMe0DVtT+++v/g=; b=NrSQ4XUHFirfNHijWGVUVRtee0aME3tEbKGvNr5O7MghZkcj7kwTTViMMx905RBmMP jzq3RIljmiHesUlHeOP/xkDuQsibRzbBflEcCWBktDmjFcG/Ird9w8CBOk+VncWxsMII U1TX6nVHsQpdqJ+ZhlxbwHiGm+kJ//xtW55u4OSOsDa2oDfGWetggadcdzV6g7aNEjuq gCT+1PaB5Ww8yWIXdkjWkrSruUNa7E0+nlclSFMqwYhgNG84097eneBGIVzRTGAcl4MF 8tbe2NKzYjyLAZl3h+MX4zMmrx5hIiAgrD7Rs2g2ffKpAVYszdy0OqhwiHPRFGTAWxAP aYsA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 18-20020a631652000000b00470096ba718si6588771pgw.200.2022.12.01.22.07.40; Thu, 01 Dec 2022 22:07:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232213AbiLBGGh (ORCPT + 66 others); Fri, 2 Dec 2022 01:06:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59330 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230211AbiLBGGf (ORCPT ); Fri, 2 Dec 2022 01:06:35 -0500 Received: from rtits2.realtek.com.tw (rtits2.realtek.com [211.75.126.72]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5DA7CDC84A for ; Thu, 1 Dec 2022 22:06:31 -0800 (PST) Authenticated-By: X-SpamFilter-By: ArmorX SpamTrap 5.77 with qID 2B265bh06001501, This message is accepted by code: ctloc85258 Received: from mail.realtek.com (rtexh36505.realtek.com.tw[172.21.6.25]) by rtits2.realtek.com.tw (8.15.2/2.81/5.90) with ESMTPS id 2B265bh06001501 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=FAIL); Fri, 2 Dec 2022 14:05:37 +0800 Received: from RTEXMBS04.realtek.com.tw (172.21.6.97) by RTEXH36505.realtek.com.tw (172.21.6.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.32; Fri, 2 Dec 2022 14:06:23 +0800 Received: from localhost (172.21.69.188) by RTEXMBS04.realtek.com.tw (172.21.6.97) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.7; Fri, 2 Dec 2022 14:06:22 +0800 From: Ping-Ke Shih To: CC: , Subject: [PATCH 0/2] wifi: rtw89: adjust early loading firmware for SECURITY_LOADPIN_ENFORCE Date: Fri, 2 Dec 2022 14:05:19 +0800 Message-ID: <20221202060521.501512-1-pkshih@realtek.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [172.21.69.188] X-ClientProxiedBy: RTEXMBS02.realtek.com.tw (172.21.6.95) To RTEXMBS04.realtek.com.tw (172.21.6.97) X-KSE-ServerInfo: RTEXMBS04.realtek.com.tw, 9 X-KSE-AntiSpam-Interceptor-Info: trusted connection X-KSE-Antiphishing-Info: Clean X-KSE-Antiphishing-ScanningType: Deterministic X-KSE-Antiphishing-Method: None X-KSE-Antiphishing-Bases: 12/02/2022 05:46:00 X-KSE-AttachmentFiltering-Interceptor-Info: no applicable attachment filtering rules found X-KSE-Antivirus-Interceptor-Info: scan successful X-KSE-Antivirus-Info: =?big5?B?Q2xlYW4sIGJhc2VzOiAyMDIyLzEyLzIgpFekyCAwMToyMDowMA==?= X-KSE-BulkMessagesFiltering-Scan-Result: protection disabled X-KSE-ServerInfo: RTEXH36505.realtek.com.tw, 9 X-KSE-Attachment-Filter-Triggered-Rules: Clean X-KSE-Attachment-Filter-Triggered-Filters: Clean X-KSE-BulkMessagesFiltering-Scan-Result: protection disabled X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Originally, we early load partial firmware to know its capability before register_hw(), because it can save some loading time. However, a platform can enable SECURITY_LOADPIN_ENFORCE that disallows to load firmware partially, so we load full firmware instead in this kind of platform. The costs of loading partial and full firmware are about 10us and 100us in 10+ years old computer, so I think this isn't very critical for users. We are still thinking if we can fork a work during PCI probe to load firmware and register_hw(), but this will be a big change of initial flow. Before the implement, this patchset can let driver works as expectation and avoid kernel warning if SECURITY_LOADPIN_ENFORCE is enabled. Zong-Zhe Yang (2): wifi: rtw89: don't request partial firmware if SECURITY_LOADPIN_ENFORCE wifi: rtw89: request full firmware only once if it's early requested drivers/net/wireless/realtek/rtw89/core.c | 6 ++- drivers/net/wireless/realtek/rtw89/fw.c | 60 +++++++++++++++++------ drivers/net/wireless/realtek/rtw89/fw.h | 22 +++++++-- 3 files changed, 69 insertions(+), 19 deletions(-) -- 2.25.1