2013-06-27 00:08:25 +00:00
|
|
|
/*-
|
2017-11-27 15:37:16 +00:00
|
|
|
* SPDX-License-Identifier: BSD-2-Clause-FreeBSD
|
|
|
|
*
|
2013-06-27 00:08:25 +00:00
|
|
|
* Copyright (c) 2013 EMC Corp.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Copyright (C) 2012-2013 Intel Corporation
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/ioccom.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
|
|
|
|
#include <ctype.h>
|
2013-07-09 21:14:15 +00:00
|
|
|
#include <err.h>
|
2013-06-27 00:08:25 +00:00
|
|
|
#include <fcntl.h>
|
2013-07-09 21:14:15 +00:00
|
|
|
#include <inttypes.h>
|
2013-06-27 00:08:25 +00:00
|
|
|
#include <stdbool.h>
|
|
|
|
#include <stddef.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include "nvmecontrol.h"
|
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
/* Tables for command line parsing */
|
|
|
|
|
|
|
|
static cmd_fn_t firmware;
|
|
|
|
|
|
|
|
#define NONE 0xffffffffu
|
|
|
|
static struct options {
|
|
|
|
bool activate;
|
|
|
|
uint32_t slot;
|
|
|
|
const char *fw_img;
|
|
|
|
const char *dev;
|
|
|
|
} opt = {
|
|
|
|
.activate = false,
|
|
|
|
.slot = NONE,
|
|
|
|
.fw_img = NULL,
|
|
|
|
.dev = NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct opts firmware_opts[] = {
|
|
|
|
#define OPT(l, s, t, opt, addr, desc) { l, s, t, &opt.addr, desc }
|
|
|
|
OPT("activate", 'a', arg_none, opt, activate,
|
|
|
|
"Attempt to activate firmware"),
|
|
|
|
OPT("slot", 's', arg_uint32, opt, slot,
|
|
|
|
"Slot to activate and/or download firmware to"),
|
|
|
|
OPT("firmware", 'f', arg_path, opt, fw_img,
|
|
|
|
"Firmware image to download"),
|
|
|
|
{ NULL, 0, arg_none, NULL, NULL }
|
|
|
|
};
|
|
|
|
#undef OPT
|
|
|
|
|
|
|
|
static const struct args firmware_args[] = {
|
2020-04-20 14:54:41 +00:00
|
|
|
{ arg_string, &opt.dev, "controller-id|namespace-id" },
|
2019-07-16 17:24:03 +00:00
|
|
|
{ arg_none, NULL, NULL },
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct cmd firmware_cmd = {
|
|
|
|
.name = "firmware",
|
|
|
|
.fn = firmware,
|
2019-07-31 04:19:53 +00:00
|
|
|
.descr = "Download firmware image to controller",
|
2019-07-16 17:24:03 +00:00
|
|
|
.ctx_size = sizeof(opt),
|
|
|
|
.opts = firmware_opts,
|
|
|
|
.args = firmware_args,
|
|
|
|
};
|
|
|
|
|
|
|
|
CMD_COMMAND(firmware_cmd);
|
|
|
|
|
|
|
|
/* End of tables for command line parsing */
|
2018-12-02 23:10:55 +00:00
|
|
|
|
2013-06-27 00:08:25 +00:00
|
|
|
static int
|
|
|
|
slot_has_valid_firmware(int fd, int slot)
|
|
|
|
{
|
|
|
|
struct nvme_firmware_page fw;
|
|
|
|
int has_fw = false;
|
|
|
|
|
|
|
|
read_logpage(fd, NVME_LOG_FIRMWARE_SLOT,
|
2019-08-02 20:16:21 +00:00
|
|
|
NVME_GLOBAL_NAMESPACE_TAG, 0, 0, 0, &fw, sizeof(fw));
|
2013-06-27 00:08:25 +00:00
|
|
|
|
|
|
|
if (fw.revision[slot-1] != 0LLU)
|
|
|
|
has_fw = true;
|
|
|
|
|
|
|
|
return (has_fw);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-07-16 17:24:03 +00:00
|
|
|
read_image_file(const char *path, void **buf, int32_t *size)
|
2013-06-27 00:08:25 +00:00
|
|
|
{
|
|
|
|
struct stat sb;
|
2013-07-09 21:14:15 +00:00
|
|
|
int32_t filesize;
|
2013-06-27 00:08:25 +00:00
|
|
|
int fd;
|
|
|
|
|
|
|
|
*size = 0;
|
|
|
|
*buf = NULL;
|
|
|
|
|
2013-07-09 21:14:15 +00:00
|
|
|
if ((fd = open(path, O_RDONLY)) < 0)
|
|
|
|
err(1, "unable to open '%s'", path);
|
|
|
|
if (fstat(fd, &sb) < 0)
|
|
|
|
err(1, "unable to stat '%s'", path);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The NVMe spec does not explicitly state a maximum firmware image
|
|
|
|
* size, although one can be inferred from the dword size limitation
|
|
|
|
* for the size and offset fields in the Firmware Image Download
|
|
|
|
* command.
|
|
|
|
*
|
|
|
|
* Technically, the max is UINT32_MAX * sizeof(uint32_t), since the
|
|
|
|
* size and offsets are specified in terms of dwords (not bytes), but
|
|
|
|
* realistically INT32_MAX is sufficient here and simplifies matters
|
|
|
|
* a bit.
|
|
|
|
*/
|
|
|
|
if (sb.st_size > INT32_MAX)
|
|
|
|
errx(1, "size of file '%s' is too large (%jd bytes)",
|
|
|
|
path, (intmax_t)sb.st_size);
|
|
|
|
filesize = (int32_t)sb.st_size;
|
|
|
|
if ((*buf = malloc(filesize)) == NULL)
|
2013-07-12 18:13:41 +00:00
|
|
|
errx(1, "unable to malloc %d bytes", filesize);
|
2013-07-09 21:14:15 +00:00
|
|
|
if ((*size = read(fd, *buf, filesize)) < 0)
|
|
|
|
err(1, "error reading '%s'", path);
|
|
|
|
/* XXX assuming no short reads */
|
|
|
|
if (*size != filesize)
|
|
|
|
errx(1,
|
|
|
|
"error reading '%s' (read %d bytes, requested %d bytes)",
|
|
|
|
path, *size, filesize);
|
Fix various Coverity-detected errors in nvmecontrol
This fixes several Coverity-detected errors in nvmecontrol. While in
here, a couple additional errors with shift/mask confusion that were
not diagnosed by Coverity are also fixed.
CIDs addressed: 1040299, 1040300, 1403972, 1403973, 1403985, 1403988,
1403990, 1404374, 1404427, 1404469, 1404510, 1404534, 1418118
CID 1403657 (resource leak of shared library handle) was marked
"intentional" in the Coverity scan database.
Reviewed by: vangyzen, robert.herndon_dell.com
Reviewed by: daniel.william.ryan_gmail.com (earlier version)
Reviewed by: rramsden_isilon.com (earlier version), imp
MFC after: 5 days
Sponsored by: Dell EMC Isilon
Differential Revision: https://reviews.freebsd.org/D24203
2020-04-02 13:52:54 +00:00
|
|
|
close(fd);
|
2013-06-27 00:08:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2020-09-21 15:45:49 +00:00
|
|
|
update_firmware(int fd, uint8_t *payload, int32_t payload_size, uint8_t fwug)
|
2013-06-27 00:08:25 +00:00
|
|
|
{
|
|
|
|
struct nvme_pt_command pt;
|
2020-09-21 15:45:49 +00:00
|
|
|
uint64_t max_xfer_size;
|
2013-07-09 21:14:15 +00:00
|
|
|
int32_t off, resid, size;
|
2013-06-27 00:08:25 +00:00
|
|
|
void *chunk;
|
|
|
|
|
|
|
|
off = 0;
|
|
|
|
resid = payload_size;
|
|
|
|
|
2020-09-21 15:45:49 +00:00
|
|
|
if (fwug != 0 && fwug != 0xFF)
|
|
|
|
max_xfer_size = ((uint64_t)fwug << 12);
|
|
|
|
else if (ioctl(fd, NVME_GET_MAX_XFER_SIZE, &max_xfer_size) < 0)
|
2020-09-21 18:34:13 +00:00
|
|
|
err(1, "query max transfer size failed");
|
|
|
|
if (max_xfer_size > NVME_MAX_XFER_SIZE)
|
|
|
|
max_xfer_size = NVME_MAX_XFER_SIZE;
|
2020-09-21 15:45:49 +00:00
|
|
|
|
|
|
|
if ((chunk = aligned_alloc(PAGE_SIZE, max_xfer_size)) == NULL)
|
|
|
|
errx(1, "unable to malloc %zd bytes", (size_t)max_xfer_size);
|
2013-06-27 00:08:25 +00:00
|
|
|
|
|
|
|
while (resid > 0) {
|
2020-09-21 15:45:49 +00:00
|
|
|
size = (resid >= (int32_t)max_xfer_size) ?
|
|
|
|
max_xfer_size : resid;
|
2013-06-27 00:08:25 +00:00
|
|
|
memcpy(chunk, payload + off, size);
|
|
|
|
|
|
|
|
memset(&pt, 0, sizeof(pt));
|
2018-08-22 04:29:24 +00:00
|
|
|
pt.cmd.opc = NVME_OPC_FIRMWARE_IMAGE_DOWNLOAD;
|
2018-02-22 13:32:31 +00:00
|
|
|
pt.cmd.cdw10 = htole32((size / sizeof(uint32_t)) - 1);
|
|
|
|
pt.cmd.cdw11 = htole32(off / sizeof(uint32_t));
|
2013-06-27 00:08:25 +00:00
|
|
|
pt.buf = chunk;
|
|
|
|
pt.len = size;
|
|
|
|
pt.is_read = 0;
|
|
|
|
|
2013-07-09 21:14:15 +00:00
|
|
|
if (ioctl(fd, NVME_PASSTHROUGH_CMD, &pt) < 0)
|
|
|
|
err(1, "firmware download request failed");
|
2013-06-27 00:08:25 +00:00
|
|
|
|
2013-07-09 21:14:15 +00:00
|
|
|
if (nvme_completion_is_error(&pt.cpl))
|
|
|
|
errx(1, "firmware download request returned error");
|
2013-06-27 00:08:25 +00:00
|
|
|
|
|
|
|
resid -= size;
|
|
|
|
off += size;
|
|
|
|
}
|
Fix various Coverity-detected errors in nvmecontrol
This fixes several Coverity-detected errors in nvmecontrol. While in
here, a couple additional errors with shift/mask confusion that were
not diagnosed by Coverity are also fixed.
CIDs addressed: 1040299, 1040300, 1403972, 1403973, 1403985, 1403988,
1403990, 1404374, 1404427, 1404469, 1404510, 1404534, 1418118
CID 1403657 (resource leak of shared library handle) was marked
"intentional" in the Coverity scan database.
Reviewed by: vangyzen, robert.herndon_dell.com
Reviewed by: daniel.william.ryan_gmail.com (earlier version)
Reviewed by: rramsden_isilon.com (earlier version), imp
MFC after: 5 days
Sponsored by: Dell EMC Isilon
Differential Revision: https://reviews.freebsd.org/D24203
2020-04-02 13:52:54 +00:00
|
|
|
free(chunk);
|
2013-06-27 00:08:25 +00:00
|
|
|
}
|
|
|
|
|
2013-11-12 21:14:19 +00:00
|
|
|
static int
|
2013-06-27 00:08:25 +00:00
|
|
|
activate_firmware(int fd, int slot, int activate_action)
|
|
|
|
{
|
|
|
|
struct nvme_pt_command pt;
|
2018-02-22 13:32:31 +00:00
|
|
|
uint16_t sct, sc;
|
2013-06-27 00:08:25 +00:00
|
|
|
|
|
|
|
memset(&pt, 0, sizeof(pt));
|
2018-08-22 04:29:24 +00:00
|
|
|
pt.cmd.opc = NVME_OPC_FIRMWARE_ACTIVATE;
|
2018-02-22 13:32:31 +00:00
|
|
|
pt.cmd.cdw10 = htole32((activate_action << 3) | slot);
|
2013-06-27 00:08:25 +00:00
|
|
|
pt.is_read = 0;
|
|
|
|
|
2013-07-09 21:14:15 +00:00
|
|
|
if (ioctl(fd, NVME_PASSTHROUGH_CMD, &pt) < 0)
|
|
|
|
err(1, "firmware activate request failed");
|
2013-06-27 00:08:25 +00:00
|
|
|
|
2018-02-22 13:32:31 +00:00
|
|
|
sct = NVME_STATUS_GET_SCT(pt.cpl.status);
|
|
|
|
sc = NVME_STATUS_GET_SC(pt.cpl.status);
|
|
|
|
|
|
|
|
if (sct == NVME_SCT_COMMAND_SPECIFIC &&
|
|
|
|
sc == NVME_SC_FIRMWARE_REQUIRES_RESET)
|
2013-11-12 21:14:19 +00:00
|
|
|
return 1;
|
|
|
|
|
2013-07-09 21:14:15 +00:00
|
|
|
if (nvme_completion_is_error(&pt.cpl))
|
|
|
|
errx(1, "firmware activate request returned error");
|
2013-11-12 21:14:19 +00:00
|
|
|
|
|
|
|
return 0;
|
2013-06-27 00:08:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2019-07-16 17:24:03 +00:00
|
|
|
firmware(const struct cmd *f, int argc, char *argv[])
|
2013-06-27 00:08:25 +00:00
|
|
|
{
|
2019-07-16 17:24:03 +00:00
|
|
|
int fd = -1;
|
2013-11-12 21:14:19 +00:00
|
|
|
int activate_action, reboot_required;
|
2019-07-16 17:24:03 +00:00
|
|
|
char prompt[64];
|
2013-06-27 00:08:25 +00:00
|
|
|
void *buf = NULL;
|
2020-04-20 14:54:41 +00:00
|
|
|
char *path;
|
2019-08-01 21:44:07 +00:00
|
|
|
int32_t size = 0, nsid;
|
2018-02-22 13:32:31 +00:00
|
|
|
uint16_t oacs_fw;
|
|
|
|
uint8_t fw_slot1_ro, fw_num_slots;
|
2013-06-27 00:08:25 +00:00
|
|
|
struct nvme_controller_data cdata;
|
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
if (arg_parse(argc, argv, f))
|
|
|
|
return;
|
2013-06-27 00:08:25 +00:00
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
if (opt.slot == 0) {
|
|
|
|
fprintf(stderr,
|
|
|
|
"0 is not a valid slot number. "
|
|
|
|
"Slot numbers start at 1.\n");
|
|
|
|
arg_help(argc, argv, f);
|
|
|
|
} else if (opt.slot > 7 && opt.slot != NONE) {
|
|
|
|
fprintf(stderr,
|
|
|
|
"Slot number %s specified which is "
|
|
|
|
"greater than max allowed slot number of "
|
|
|
|
"7.\n", optarg);
|
|
|
|
arg_help(argc, argv, f);
|
2013-06-27 00:08:25 +00:00
|
|
|
}
|
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
if (!opt.activate && opt.fw_img == NULL) {
|
2013-06-27 00:08:25 +00:00
|
|
|
fprintf(stderr,
|
|
|
|
"Neither a replace ([-f path_to_firmware]) nor "
|
|
|
|
"activate ([-a]) firmware image action\n"
|
|
|
|
"was specified.\n");
|
2019-07-16 17:24:03 +00:00
|
|
|
arg_help(argc, argv, f);
|
2013-06-27 00:08:25 +00:00
|
|
|
}
|
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
if (opt.activate && opt.fw_img == NULL && opt.slot == 0) {
|
2013-06-27 00:08:25 +00:00
|
|
|
fprintf(stderr,
|
|
|
|
"Slot number to activate not specified.\n");
|
2019-07-16 17:24:03 +00:00
|
|
|
arg_help(argc, argv, f);
|
2013-06-27 00:08:25 +00:00
|
|
|
}
|
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
open_dev(opt.dev, &fd, 1, 1);
|
2020-04-20 14:54:41 +00:00
|
|
|
get_nsid(fd, &path, &nsid);
|
2019-08-01 21:44:07 +00:00
|
|
|
if (nsid != 0) {
|
|
|
|
close(fd);
|
2020-04-20 14:54:41 +00:00
|
|
|
open_dev(path, &fd, 1, 1);
|
2019-08-01 21:44:07 +00:00
|
|
|
}
|
2020-04-20 14:54:41 +00:00
|
|
|
free(path);
|
2019-08-01 21:44:07 +00:00
|
|
|
|
2013-06-27 00:08:25 +00:00
|
|
|
read_controller_data(fd, &cdata);
|
|
|
|
|
2018-02-22 13:32:31 +00:00
|
|
|
oacs_fw = (cdata.oacs >> NVME_CTRLR_DATA_OACS_FIRMWARE_SHIFT) &
|
|
|
|
NVME_CTRLR_DATA_OACS_FIRMWARE_MASK;
|
|
|
|
|
|
|
|
if (oacs_fw == 0)
|
2013-07-09 21:14:15 +00:00
|
|
|
errx(1,
|
|
|
|
"controller does not support firmware activate/download");
|
2013-06-27 00:08:25 +00:00
|
|
|
|
2018-02-22 13:32:31 +00:00
|
|
|
fw_slot1_ro = (cdata.frmw >> NVME_CTRLR_DATA_FRMW_SLOT1_RO_SHIFT) &
|
|
|
|
NVME_CTRLR_DATA_FRMW_SLOT1_RO_MASK;
|
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
if (opt.fw_img && opt.slot == 1 && fw_slot1_ro)
|
|
|
|
errx(1, "slot %d is marked as read only", opt.slot);
|
2013-06-27 00:08:25 +00:00
|
|
|
|
2018-02-22 13:32:31 +00:00
|
|
|
fw_num_slots = (cdata.frmw >> NVME_CTRLR_DATA_FRMW_NUM_SLOTS_SHIFT) &
|
|
|
|
NVME_CTRLR_DATA_FRMW_NUM_SLOTS_MASK;
|
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
if (opt.slot > fw_num_slots)
|
2013-07-09 21:14:15 +00:00
|
|
|
errx(1,
|
|
|
|
"slot %d specified but controller only supports %d slots",
|
2019-07-16 17:24:03 +00:00
|
|
|
opt.slot, fw_num_slots);
|
2013-06-27 00:08:25 +00:00
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
if (opt.activate && opt.fw_img == NULL &&
|
|
|
|
!slot_has_valid_firmware(fd, opt.slot))
|
2013-07-09 21:14:15 +00:00
|
|
|
errx(1,
|
|
|
|
"slot %d does not contain valid firmware,\n"
|
|
|
|
"try 'nvmecontrol logpage -p 3 %s' to get a list "
|
|
|
|
"of available images\n",
|
2019-07-16 17:24:03 +00:00
|
|
|
opt.slot, opt.dev);
|
2013-06-27 00:08:25 +00:00
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
if (opt.fw_img)
|
|
|
|
read_image_file(opt.fw_img, &buf, &size);
|
2013-07-09 21:20:08 +00:00
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
if (opt.fw_img != NULL&& opt.activate)
|
2013-06-27 00:08:25 +00:00
|
|
|
printf("You are about to download and activate "
|
|
|
|
"firmware image (%s) to controller %s.\n"
|
|
|
|
"This may damage your controller and/or "
|
|
|
|
"overwrite an existing firmware image.\n",
|
2019-07-16 17:24:03 +00:00
|
|
|
opt.fw_img, opt.dev);
|
|
|
|
else if (opt.activate)
|
2013-06-27 00:08:25 +00:00
|
|
|
printf("You are about to activate a new firmware "
|
|
|
|
"image on controller %s.\n"
|
|
|
|
"This may damage your controller.\n",
|
2019-07-16 17:24:03 +00:00
|
|
|
opt.dev);
|
|
|
|
else if (opt.fw_img != NULL)
|
2013-06-27 00:08:25 +00:00
|
|
|
printf("You are about to download firmware image "
|
|
|
|
"(%s) to controller %s.\n"
|
|
|
|
"This may damage your controller and/or "
|
|
|
|
"overwrite an existing firmware image.\n",
|
2019-07-16 17:24:03 +00:00
|
|
|
opt.fw_img, opt.dev);
|
2013-06-27 00:08:25 +00:00
|
|
|
|
|
|
|
printf("Are you sure you want to continue? (yes/no) ");
|
|
|
|
while (1) {
|
|
|
|
fgets(prompt, sizeof(prompt), stdin);
|
|
|
|
if (strncasecmp(prompt, "yes", 3) == 0)
|
|
|
|
break;
|
|
|
|
if (strncasecmp(prompt, "no", 2) == 0)
|
2013-07-09 21:14:15 +00:00
|
|
|
exit(1);
|
2013-06-27 00:08:25 +00:00
|
|
|
printf("Please answer \"yes\" or \"no\". ");
|
|
|
|
}
|
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
if (opt.fw_img != NULL) {
|
2020-09-21 15:45:49 +00:00
|
|
|
update_firmware(fd, buf, size, cdata.fwug);
|
2019-07-16 17:24:03 +00:00
|
|
|
if (opt.activate)
|
2013-11-12 21:14:19 +00:00
|
|
|
activate_action = NVME_AA_REPLACE_ACTIVATE;
|
2013-06-27 00:08:25 +00:00
|
|
|
else
|
2013-11-12 21:14:19 +00:00
|
|
|
activate_action = NVME_AA_REPLACE_NO_ACTIVATE;
|
2013-06-27 00:08:25 +00:00
|
|
|
} else {
|
2013-11-12 21:14:19 +00:00
|
|
|
activate_action = NVME_AA_ACTIVATE;
|
2013-06-27 00:08:25 +00:00
|
|
|
}
|
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
reboot_required = activate_firmware(fd, opt.slot, activate_action);
|
2013-11-12 21:14:19 +00:00
|
|
|
|
2019-07-16 17:24:03 +00:00
|
|
|
if (opt.activate) {
|
2013-11-12 21:14:19 +00:00
|
|
|
if (reboot_required) {
|
|
|
|
printf("New firmware image activated but requires "
|
|
|
|
"conventional reset (i.e. reboot) to "
|
|
|
|
"complete activation.\n");
|
|
|
|
} else {
|
|
|
|
printf("New firmware image activated and will take "
|
|
|
|
"effect after next controller reset.\n"
|
|
|
|
"Controller reset can be initiated via "
|
|
|
|
"'nvmecontrol reset %s'\n",
|
2019-07-16 17:24:03 +00:00
|
|
|
opt.dev);
|
2013-11-12 21:14:19 +00:00
|
|
|
}
|
2013-06-27 00:08:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
close(fd);
|
2013-07-09 21:14:15 +00:00
|
|
|
exit(0);
|
2013-06-27 00:08:25 +00:00
|
|
|
}
|