Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1524875pxb; Sat, 29 Jan 2022 08:27:41 -0800 (PST) X-Google-Smtp-Source: ABdhPJweRtdUISs8OaH5xyOTRVnJ7T0Orwi+wIZzpjTMdiAIZa+g8qx9I9olFIOJjAzQEhWY764x X-Received: by 2002:aa7:d799:: with SMTP id s25mr13067584edq.272.1643473661301; Sat, 29 Jan 2022 08:27:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643473661; cv=none; d=google.com; s=arc-20160816; b=C7Ng/tNArYcRhkFq4V0pU3/cV/xGz1A5awM1OAoYxuqdu2ecDKTDUfHhcpfhuu4XmB GwpHWb+G/yBi4YafW/86IH0ttMQtXEj7EFV36elpBWerEI5Dk+OxhPDMMqP3hu+hqEtf gRohWbij0mDXSgG8lZbJAnhQutgKC9iPY2D8arM831T2PushU5SaZI8GJMAtVM0yFRI/ BiLnRNoEskr+OdITxiUixXmKV1mRZNzW6vPtFiUSzmNXL0k2ZAqrpbXWwJxzTzuW+s0C vZtrfSy6xTYDYCI3+4tkRm78sVCBhd4yRVf74sHZuKOeoNrKS9Zr27hwTuV3aNfAKzTp 0dMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Xy7V1RKBgPy7ej3aLewZ5fgpZQ6691qdKaJczzqlNHk=; b=PENmJziPEmGQ8DR+gXTjtT9rVAygjUvBtp3Niz/xBYq47HrR0FWTHPabTDNYRTS9bQ fBXoPFslPpf13Imj2JtPQ2IMgqHaOa2m1Hv39BakTolnKxi+ldfj4pqMX22Rz94+uQPS TW+6w0SeTDCJQzOSRDmrOqJ/3xDTUGuy6mgYCmnAC4K/43AjyE+U+lFi24rIRiOlKNMB DCWSQdnpSSER0kTJ6i9Pt64MCmnf9G63ACO1xWWeAlgCpkyq0eRWrjfDD410ICsS9pn+ aWRR/+dFzG5x2TDWl1n8DvJ12IBORsvamkxeCa+ik9OUR893RwnMDaeThgCvGh7yDmT7 C9Cw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ventanamicro.com header.s=google header.b=dvy7Hfy2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b9si3628555ede.136.2022.01.29.08.27.16; Sat, 29 Jan 2022 08:27:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ventanamicro.com header.s=google header.b=dvy7Hfy2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237447AbiA1FQK (ORCPT + 99 others); Fri, 28 Jan 2022 00:16:10 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55910 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232856AbiA1FQJ (ORCPT ); Fri, 28 Jan 2022 00:16:09 -0500 Received: from mail-pf1-x42c.google.com (mail-pf1-x42c.google.com [IPv6:2607:f8b0:4864:20::42c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2F3BBC06173B for ; Thu, 27 Jan 2022 21:16:09 -0800 (PST) Received: by mail-pf1-x42c.google.com with SMTP id e28so5124798pfj.5 for ; Thu, 27 Jan 2022 21:16:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ventanamicro.com; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=Xy7V1RKBgPy7ej3aLewZ5fgpZQ6691qdKaJczzqlNHk=; b=dvy7Hfy2AHdOXqtC7FdYxoxNBYCQzybLnMezlpbU7QfAVQ94QYX7yYbzPaX4ZM99aa JGTaixtkYrNUgotaWxqqyRofLShMxqEjk4rlkyGfzntMnDprBkc5c76+8oDm835SA6Gs rL+x0Bkz+dD/OLxKax+lWYebU1P+JkSxNJTT8vrlLwJtOVbzIN5v7OWTnPJBttegPugO FV6mPeqs51H88DF5LBRHkc2a+Fhhu0ldsNGOwPi/kk1LWGwO2Nf0sNZXyMYfNU2b735I djNR59SP7DmpBilvPJAAqvWfmbCixzOOPSuPHhOiCzHB9ATSCnef3wMrY/NG6KdMbat9 pdUg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=Xy7V1RKBgPy7ej3aLewZ5fgpZQ6691qdKaJczzqlNHk=; b=uoj18li5TbzUD9ZgXkvKYGF1UvI6Mb3JefERbcbKZuXGeFoPCzEen/q46uzpMmZrSl GEDtT2kA53J/H01W0XbhJW01zebJW7mvIHQnwt0llU9VPXKsKwK/uGpbshxendLPc6nE 1uMx7yV+mmshB0O3PrWIatE3JBis3LrUAhQQZnWG5WaVkQKJVOyOOW1xGfEUR9FpR1HP lXjqxhceZMe4xzQ79daqrPmmByT7l61RpGo2MN7e+eoxEoKPw6VoH6KsEh/BCPsEnLMn XMPhIkpStiUPTF3wCbPdJS3+MfzkNeHk4KLl+LOY+vu8w1Ck0ICdaHisKDY6cKUpDBCV WJKQ== X-Gm-Message-State: AOAM5300O5pXZfUFK2e5kkmGPohZSoESlwHIw4TYXpVLbjFyolL10S9O OfwK3yq5ulmENBARDlrmFHmxMw== X-Received: by 2002:a63:f650:: with SMTP id u16mr5337290pgj.2.1643346968484; Thu, 27 Jan 2022 21:16:08 -0800 (PST) Received: from sunil-ThinkPad-T490 ([49.206.3.187]) by smtp.gmail.com with ESMTPSA id b22sm7617198pfl.121.2022.01.27.21.16.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Jan 2022 21:16:08 -0800 (PST) Date: Fri, 28 Jan 2022 10:46:00 +0530 From: Sunil V L To: Heinrich Schuchardt Cc: Ard Biesheuvel , Paul Walmsley , Palmer Dabbelt , Albert Ou , linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, Anup Patel , Atish Patra , Abner Chang , Jessica Clarke Subject: Re: [RFC PATCH 1/1] riscv/efi_stub: Add support for RISCV_EFI_BOOT_PROTOCOL Message-ID: <20220128051600.GB5018@sunil-ThinkPad-T490> References: <20220126110615.33371-1-sunilvl@ventanamicro.com> <20220126110615.33371-2-sunilvl@ventanamicro.com> <667AE324-A8D2-41ED-B9DF-62750F3C2574@gmx.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <667AE324-A8D2-41ED-B9DF-62750F3C2574@gmx.de> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 27, 2022 at 08:47:35AM +0100, Heinrich Schuchardt wrote: > Am 26. Januar 2022 12:06:15 MEZ schrieb Sunil V L : > >This patch adds the support for getting the boot hart ID in > >Linux EFI stub using RISCV_EFI_BOOT_PROTOCOL. > > It would be helpful to add a link to the spec in the commit message and maybe a comment that this protocol is needed for the ACPI use case. Sure. Will add. > > > > >Signed-off-by: Sunil V L > >--- > > drivers/firmware/efi/libstub/efistub.h | 15 ++++++++++++ > > drivers/firmware/efi/libstub/riscv-stub.c | 28 ++++++++++++++++++++--- > > include/linux/efi.h | 1 + > > 3 files changed, 41 insertions(+), 3 deletions(-) > > > >diff --git a/drivers/firmware/efi/libstub/efistub.h b/drivers/firmware/efi/libstub/efistub.h > >index edb77b0621ea..0428f8816942 100644 > >--- a/drivers/firmware/efi/libstub/efistub.h > >+++ b/drivers/firmware/efi/libstub/efistub.h > >@@ -720,6 +720,21 @@ union efi_tcg2_protocol { > > } mixed_mode; > > }; > > > >+typedef union riscv_efi_boot_protocol riscv_efi_boot_protocol_t; > >+ > >+union riscv_efi_boot_protocol { > >+ struct { > >+ u64 revision; > >+ efi_status_t (__efiapi *get_boot_hartid)( > >+ riscv_efi_boot_protocol_t *, > >+ size_t *); > > I prefer to have parameter names for readability Sure. Will add. > > According to the platform specification mhartid is MXLEN wide. UINTN (size_t) is SXLEN wide. > > Does this have any implications on how we define the protocol? I don't think so. EFI and kernel will be at same privilige level. So, it is not really an issue for this protocol. But when MXLEN > SXLEN (ex: 64 vs 32), then implementation need to ensure hartid value is 32 bit only so that when it is passed from M-mode firmware to S-mode, it gets correct value. But again this is not an issue from this EFI protocol perspective. > > >+ }; > >+ struct { > >+ u32 revision; > >+ u32 get_boot_hartid;>+ } mixed_mode; > >+}; > >+ > > typedef union efi_load_file_protocol efi_load_file_protocol_t; > > typedef union efi_load_file_protocol efi_load_file2_protocol_t; > > > >diff --git a/drivers/firmware/efi/libstub/riscv-stub.c b/drivers/firmware/efi/libstub/riscv-stub.c > >index 380e4e251399..c7add4eb5453 100644 > >--- a/drivers/firmware/efi/libstub/riscv-stub.c > >+++ b/drivers/firmware/efi/libstub/riscv-stub.c > >@@ -46,12 +46,34 @@ static u32 get_boot_hartid_from_fdt(void) > > return fdt32_to_cpu(*prop); > > } > > > >+static u32 get_boot_hartid_from_efi(void) > >+{ > > The returned value must be UINTN /size_t like the protocol. This width must be carried to the legacy entry point of Linux. > > >+ efi_guid_t boot_protocol_guid = RISCV_EFI_BOOT_PROTOCOL_GUID; > >+ efi_status_t status; > >+ riscv_efi_boot_protocol_t *boot_protocol; > >+ size_t boot_hart_id; > >+ > >+ status = efi_bs_call(locate_protocol, &boot_protocol_guid, NULL, > >+ (void **)&boot_protocol); > >+ if (status == EFI_SUCCESS) { > >+ status = efi_call_proto(boot_protocol, > >+ get_boot_hartid, &boot_hart_id); > >+ if (status == EFI_SUCCESS) { > >+ return (u32)boot_hart_id; > >+ } > >+ } > >+ return U32_MAX; > > U32_MAX is a legal value for the hart id. Yeah. This is an existing issue in get_boot_hartid_from_fdt() for which I have sent a fix patch. Once that gets accepted, I will fix get_boot_hartid_from_efi() and send RFC V2 patch. > > >+} > >+ > > efi_status_t check_platform_features(void) > > { > >- hartid = get_boot_hartid_from_fdt(); > >+ hartid = get_boot_hartid_from_efi(); > > if (hartid == U32_MAX) { > >- efi_err("/chosen/boot-hartid missing or invalid!\n"); > >- return EFI_UNSUPPORTED; > >+ hartid = get_boot_hartid_from_fdt(); > >+ if (hartid == U32_MAX) { > > U32_MAX is a legal value for the hart id. Please, separate status and value. Will fix it. Thank you very much for the feedback. Sunil > > Best regards > > Heinrich > > >+ efi_err("/chosen/boot-hartid missing or invalid!\n"); > >+ return EFI_UNSUPPORTED; > >+ } > > } > > return EFI_SUCCESS; > > } > >diff --git a/include/linux/efi.h b/include/linux/efi.h > >index ccd4d3f91c98..9822c730207c 100644 > >--- a/include/linux/efi.h > >+++ b/include/linux/efi.h > >@@ -380,6 +380,7 @@ void efi_native_runtime_setup(void); > > #define EFI_CONSOLE_OUT_DEVICE_GUID EFI_GUID(0xd3b36f2c, 0xd551, 0x11d4, 0x9a, 0x46, 0x00, 0x90, 0x27, 0x3f, 0xc1, 0x4d) > > #define APPLE_PROPERTIES_PROTOCOL_GUID EFI_GUID(0x91bd12fe, 0xf6c3, 0x44fb, 0xa5, 0xb7, 0x51, 0x22, 0xab, 0x30, 0x3a, 0xe0) > > #define EFI_TCG2_PROTOCOL_GUID EFI_GUID(0x607f766c, 0x7455, 0x42be, 0x93, 0x0b, 0xe4, 0xd7, 0x6d, 0xb2, 0x72, 0x0f) > >+#define RISCV_EFI_BOOT_PROTOCOL_GUID EFI_GUID(0xccd15fec, 0x6f73, 0x4eec, 0x83, 0x95, 0x3e, 0x69, 0xe4, 0xb9, 0x40, 0xbf) > > #define EFI_LOAD_FILE_PROTOCOL_GUID EFI_GUID(0x56ec3091, 0x954c, 0x11d2, 0x8e, 0x3f, 0x00, 0xa0, 0xc9, 0x69, 0x72, 0x3b) > > #define EFI_LOAD_FILE2_PROTOCOL_GUID EFI_GUID(0x4006c0c1, 0xfcb3, 0x403e, 0x99, 0x6d, 0x4a, 0x6c, 0x87, 0x24, 0xe0, 0x6d) > > #define EFI_RT_PROPERTIES_TABLE_GUID EFI_GUID(0xeb66918a, 0x7eef, 0x402a, 0x84, 0x2e, 0x93, 0x1d, 0x21, 0xc3, 0x8a, 0xe9) >