Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp864561imm; Fri, 13 Jul 2018 07:36:37 -0700 (PDT) X-Google-Smtp-Source: AAOMgpeUOF55Y5VR0HaC6nv14zykN8vFX1sZaG0Nfy29VIsZW4r8pI3ScMpEC7zr23R7ZRMDVTfn X-Received: by 2002:a62:1d97:: with SMTP id d145-v6mr7476402pfd.101.1531492597652; Fri, 13 Jul 2018 07:36:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531492597; cv=none; d=google.com; s=arc-20160816; b=gx4lJI3VahMtggMnDQyIVcu577ZpnGoNDsPF6lXXVfiGcYVY+3xn/u18KPwDRaICzZ ZvGyLkDaTfgqLDWal2XPv1aQFqGOYiYzQ79ejWBG3Ijmqbwj7JLT0xyHz6xKnb6EZDvL 4GlkcfvSOR59KZ2tTR0b/EbV9wfhmBsV4H2UoMcotXAxLXRWfM7yyKKTY3qo859+bCaB Fs3x6gXmg96FdaIAjC8IN2Lo+LVLC+pPt7UkpXqd/74nOqd9hO8zDaUggnmH3HQEcwXo LKxhfusdVdHSU3HGfo2nIgs06I6HYloO7davYyDYTgFw6J+QyHuhdYfMibEYFm9jzQqB srHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=66qaj0PAKSIXHDa1gCZO5guv4m2CO/4QjBruF/OPVrw=; b=CvudMvM6lHVIwtPVx/NQkMFsQwti+8WXGdpPIbIZn2Spaj4s1umMPkbG3xRXSw64t7 LRh9rhxWCDkGZwwzedGxOP8MwMFhVGjf/sJtDtp0oKO9mqke4peXK82cL4/0GGW/De8X rkuKe9u/Jl379va+ty9H2L5Zzyo1Q6h+uh0J06Lzyyxcs6eI8H/+JOenTK1zjjin82fE Oj2mNhHpwcqp6fND/3mkrC6R1X+IKvxGW4vxZLKfEBcAl8wR57/KVPFicZ9csizyqsqA K6YZ1i6qQTFMqNVeaEz1k4DcWHPwcmeyyupEiNf7BdQFn4iWtXQOdaORzjqfjwV0OIwN oFbw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=aeITVGzU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m32-v6si19251145pgl.622.2018.07.13.07.36.22; Fri, 13 Jul 2018 07:36:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=aeITVGzU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729781AbeGMOtf (ORCPT + 99 others); Fri, 13 Jul 2018 10:49:35 -0400 Received: from mail-ua0-f196.google.com ([209.85.217.196]:36718 "EHLO mail-ua0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729644AbeGMOtf (ORCPT ); Fri, 13 Jul 2018 10:49:35 -0400 Received: by mail-ua0-f196.google.com with SMTP id y8-v6so20738213uan.3; Fri, 13 Jul 2018 07:34:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=66qaj0PAKSIXHDa1gCZO5guv4m2CO/4QjBruF/OPVrw=; b=aeITVGzU5M83sYtLJAA2wCfhJ9G+cy9CCcOlIRNYl+FkOY8atHac6GJjRJj3S94u64 36WWtnLgTrZxjrbB1TQvg2xWVONehCQOSSTus/Snn7Dx1NtQ7uxk+wcCBkQ+hs76dxqP gfpFsayn3RJbi8glFqza8akgWh4HfByUybDyyC9I2HP56UKuetxoy3elZ20/2VlnJOPv lxY0y1Zv+31OKeff661efDUw4KkrMGraiAAcnjPEFVyXf598ptj+K9WOk9OBZZmX2aLm btyOyJ6SQUpgBWDEbhvh5EfiYyWZBVsXdwFIiQiVONGYATTkJ3plAeiyGdHNFnNbxEGt hAQg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=66qaj0PAKSIXHDa1gCZO5guv4m2CO/4QjBruF/OPVrw=; b=QuQc2RvXDoYEfjJkj3hRGuiFp9+gj2Eaif9tXeOyqyz/Ct2LsARpVc/8cPUW0uFd3d u24YXgt7CVvD8w5d4ly1ek+jpgNm4MUvHKSBU8TS6X39wO4lQh7G46xAvzchWnZtcUCr sitB81FsVQV7kEqF0tf+lzX1XO95gmIERwHaKlKOIVSt3VH+eg1KNl2j/5Dd4qLm/frf j9pU9Zv1mZ9wq+2vnuyb26Ca6rt2TktLr5PLdEARWdIwDOqGSp78tc+7JBZPMwu0qkvn aZfBlomxm54OGUfouqMmC2LA0OPet23Welwm+rTezNHPAZQviXyLtNOzYg3aCrVz546S IW+g== X-Gm-Message-State: AOUpUlGjjfUdR7XO4WTsnDj1ZLa0/zpOVo4ZE8A8D7Mdhae5+eSvxk0k 13KWHeJnS0Pywod7amrZqRr03LTZ243WG9dejaQ= X-Received: by 2002:ab0:6037:: with SMTP id n23-v6mr4468834ual.28.1531492479762; Fri, 13 Jul 2018 07:34:39 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a67:2149:0:0:0:0:0 with HTTP; Fri, 13 Jul 2018 07:34:38 -0700 (PDT) In-Reply-To: <4e26f407-58c0-09b6-6735-f004d5e86969@gmail.com> References: <45b8bde6-aaa8-3f3f-0528-81e5e931751c@gmail.com> <20180609010420.GA112645@localhost.localdomain> <8307f1e0-c480-3f78-9327-e248208e5349@gmail.com> <367a12e9-7d10-98e4-4791-69cdc7d01129@gmail.com> <73c53c23c0824e4595292bfafc6054ee@ausx13mpc120.AMER.DELL.COM> <4e26f407-58c0-09b6-6735-f004d5e86969@gmail.com> From: Andy Shevchenko Date: Fri, 13 Jul 2018 17:34:38 +0300 Message-ID: Subject: Re: [PATCH v5] dcdbas: Add support for WSMT ACPI table To: Stuart Hayes Cc: Mario Limonciello , Darren Hart , Linux Kernel Mailing List , Platform Driver Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 3, 2018 at 7:20 PM, Stuart Hayes wrote: > > If the WSMT ACPI table is present and indicates that a fixed communication > buffer should be used, use the firmware-specified buffer instead of > allocating a buffer in memory for communications between the dcdbas driver > and firmare. > > Signed-off-by: Stuart Hayes > --- > v2 Bumped driver version to 5.6.0-3.3 > v3 Removed dependency on ACPI in Kconfig > Moved the added #include to be in alphabetical order > Added comments in smi_request_store() > Simplified checksum code > Changed loop searching 0xf0000 to be more readable > Reworked calculation of remap_size & smi_data_buf_size > v4 Fixed comment that starts with "Calling Interface SMI" > Fixed formatting of first "if" statement in dcdbas_check_wsmt() > v5 Reworked comment that starts with "Calling Interface SMI" > Changed EPS scanning loop to check every 16 bytes > Mario, any comments on this? For now I pushed this to my review and testing queue, thanks! > > drivers/firmware/dcdbas.c | 123 +++++++++++++++++++++++++++++++++++++++++++--- > drivers/firmware/dcdbas.h | 10 ++++ > 2 files changed, 127 insertions(+), 6 deletions(-) > > diff --git a/drivers/firmware/dcdbas.c b/drivers/firmware/dcdbas.c > index 0bdea60c65dd..ae28e48ff7dc 100644 > --- a/drivers/firmware/dcdbas.c > +++ b/drivers/firmware/dcdbas.c > @@ -21,6 +21,7 @@ > */ > > #include > +#include > #include > #include > #include > @@ -41,7 +42,7 @@ > #include "dcdbas.h" > > #define DRIVER_NAME "dcdbas" > -#define DRIVER_VERSION "5.6.0-3.2" > +#define DRIVER_VERSION "5.6.0-3.3" > #define DRIVER_DESCRIPTION "Dell Systems Management Base Driver" > > static struct platform_device *dcdbas_pdev; > @@ -49,19 +50,23 @@ static struct platform_device *dcdbas_pdev; > static u8 *smi_data_buf; > static dma_addr_t smi_data_buf_handle; > static unsigned long smi_data_buf_size; > +static unsigned long max_smi_data_buf_size = MAX_SMI_DATA_BUF_SIZE; > static u32 smi_data_buf_phys_addr; > static DEFINE_MUTEX(smi_data_lock); > +static u8 *eps_buffer; > > static unsigned int host_control_action; > static unsigned int host_control_smi_type; > static unsigned int host_control_on_shutdown; > > +static bool wsmt_enabled; > + > /** > * smi_data_buf_free: free SMI data buffer > */ > static void smi_data_buf_free(void) > { > - if (!smi_data_buf) > + if (!smi_data_buf || wsmt_enabled) > return; > > dev_dbg(&dcdbas_pdev->dev, "%s: phys: %x size: %lu\n", > @@ -86,7 +91,7 @@ static int smi_data_buf_realloc(unsigned long size) > if (smi_data_buf_size >= size) > return 0; > > - if (size > MAX_SMI_DATA_BUF_SIZE) > + if (size > max_smi_data_buf_size) > return -EINVAL; > > /* new buffer is needed */ > @@ -169,7 +174,7 @@ static ssize_t smi_data_write(struct file *filp, struct kobject *kobj, > { > ssize_t ret; > > - if ((pos + count) > MAX_SMI_DATA_BUF_SIZE) > + if ((pos + count) > max_smi_data_buf_size) > return -EINVAL; > > mutex_lock(&smi_data_lock); > @@ -322,8 +327,20 @@ static ssize_t smi_request_store(struct device *dev, > ret = count; > break; > case 1: > - /* Calling Interface SMI */ > - smi_cmd->ebx = (u32) virt_to_phys(smi_cmd->command_buffer); > + /* > + * Calling Interface SMI > + * > + * Provide physical address of command buffer field within > + * the struct smi_cmd to BIOS. > + * > + * Because the address that smi_cmd (smi_data_buf) points to > + * will be from memremap() of a non-memory address if WSMT > + * is present, we can't use virt_to_phys() on smi_cmd, so > + * we have to use the physical address that was saved when > + * the virtual address for smi_cmd was received. > + */ > + smi_cmd->ebx = smi_data_buf_phys_addr + > + offsetof(struct smi_cmd, command_buffer); > ret = dcdbas_smi_request(smi_cmd); > if (!ret) > ret = count; > @@ -482,6 +499,93 @@ static void dcdbas_host_control(void) > } > } > > +/* WSMT */ > + > +static u8 checksum(u8 *buffer, u8 length) > +{ > + u8 sum = 0; > + u8 *end = buffer + length; > + > + while (buffer < end) > + sum += *buffer++; > + return sum; > +} > + > +static inline struct smm_eps_table *check_eps_table(u8 *addr) > +{ > + struct smm_eps_table *eps = (struct smm_eps_table *)addr; > + > + if (strncmp(eps->smm_comm_buff_anchor, SMM_EPS_SIG, 4) != 0) > + return NULL; > + > + if (checksum(addr, eps->length) != 0) > + return NULL; > + > + return eps; > +} > + > +static int dcdbas_check_wsmt(void) > +{ > + struct acpi_table_wsmt *wsmt = NULL; > + struct smm_eps_table *eps = NULL; > + u64 remap_size; > + u8 *addr; > + > + acpi_get_table(ACPI_SIG_WSMT, 0, (struct acpi_table_header **)&wsmt); > + if (!wsmt) > + return 0; > + > + /* Check if WSMT ACPI table shows that protection is enabled */ > + if (!(wsmt->protection_flags & ACPI_WSMT_FIXED_COMM_BUFFERS) || > + !(wsmt->protection_flags & ACPI_WSMT_COMM_BUFFER_NESTED_PTR_PROTECTION)) > + return 0; > + > + /* Scan for EPS (entry point structure) */ > + for (addr = (u8 *)__va(0xf0000); > + addr < (u8 *)__va(0x100000 - sizeof(struct smm_eps_table)); > + addr += 16) { > + eps = check_eps_table(addr); > + if (eps) > + break; > + } > + > + if (!eps) { > + dev_dbg(&dcdbas_pdev->dev, "found WSMT, but no EPS found\n"); > + return -ENODEV; > + } > + > + /* > + * Get physical address of buffer and map to virtual address. > + * Table gives size in 4K pages, regardless of actual system page size. > + */ > + if (upper_32_bits(eps->smm_comm_buff_addr + 8)) { > + dev_warn(&dcdbas_pdev->dev, "found WSMT, but EPS buffer address is above 4GB\n"); > + return -EINVAL; > + } > + /* > + * Limit remap size to MAX_SMI_DATA_BUF_SIZE + 8 (since the first 8 > + * bytes are used for a semaphore, not the data buffer itself). > + */ > + remap_size = eps->num_of_4k_pages * PAGE_SIZE; > + if (remap_size > MAX_SMI_DATA_BUF_SIZE + 8) > + remap_size = MAX_SMI_DATA_BUF_SIZE + 8; > + eps_buffer = memremap(eps->smm_comm_buff_addr, remap_size, MEMREMAP_WB); > + if (!eps_buffer) { > + dev_warn(&dcdbas_pdev->dev, "found WSMT, but failed to map EPS buffer\n"); > + return -ENOMEM; > + } > + > + /* First 8 bytes is for a semaphore, not part of the smi_data_buf */ > + smi_data_buf_phys_addr = eps->smm_comm_buff_addr + 8; > + smi_data_buf = eps_buffer + 8; > + smi_data_buf_size = remap_size - 8; > + max_smi_data_buf_size = smi_data_buf_size; > + wsmt_enabled = true; > + dev_info(&dcdbas_pdev->dev, > + "WSMT found, using firmware-provided SMI buffer.\n"); > + return 1; > +} > + > /** > * dcdbas_reboot_notify: handle reboot notification for host control > */ > @@ -548,6 +652,11 @@ static int dcdbas_probe(struct platform_device *dev) > > dcdbas_pdev = dev; > > + /* Check if ACPI WSMT table specifies protected SMI buffer address */ > + error = dcdbas_check_wsmt(); > + if (error < 0) > + return error; > + > /* > * BIOS SMI calls require buffer addresses be in 32-bit address space. > * This is done by setting the DMA mask below. > @@ -635,6 +744,8 @@ static void __exit dcdbas_exit(void) > */ > if (dcdbas_pdev) > smi_data_buf_free(); > + if (eps_buffer) > + memunmap(eps_buffer); > platform_device_unregister(dcdbas_pdev_reg); > platform_driver_unregister(&dcdbas_driver); > } > diff --git a/drivers/firmware/dcdbas.h b/drivers/firmware/dcdbas.h > index ca3cb0a54ab6..52729a494b00 100644 > --- a/drivers/firmware/dcdbas.h > +++ b/drivers/firmware/dcdbas.h > @@ -53,6 +53,7 @@ > #define EXPIRED_TIMER (0) > > #define SMI_CMD_MAGIC (0x534D4931) > +#define SMM_EPS_SIG "$SCB" > > #define DCDBAS_DEV_ATTR_RW(_name) \ > DEVICE_ATTR(_name,0600,_name##_show,_name##_store); > @@ -103,5 +104,14 @@ struct apm_cmd { > > int dcdbas_smi_request(struct smi_cmd *smi_cmd); > > +struct smm_eps_table { > + char smm_comm_buff_anchor[4]; > + u8 length; > + u8 checksum; > + u8 version; > + u64 smm_comm_buff_addr; > + u64 num_of_4k_pages; > +} __packed; > + > #endif /* _DCDBAS_H_ */ > > -- > 2.14.2 > -- With Best Regards, Andy Shevchenko