Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Doug Warzecha | 1800 | 64.33% | 3 | 9.38% |
Stuart Hayes | 461 | 16.48% | 3 | 9.38% |
Juergen Gross | 239 | 8.54% | 2 | 6.25% |
Dmitry Torokhov | 152 | 5.43% | 1 | 3.12% |
Russell King | 59 | 2.11% | 2 | 6.25% |
Arjan van de Ven | 14 | 0.50% | 1 | 3.12% |
Chris Wright | 10 | 0.36% | 1 | 3.12% |
Rui Zhang | 10 | 0.36% | 1 | 3.12% |
Matthew Garrett | 9 | 0.32% | 1 | 3.12% |
Harvey Harrison | 8 | 0.29% | 1 | 3.12% |
Matt Domsch | 6 | 0.21% | 1 | 3.12% |
Greg Kroah-Hartman | 5 | 0.18% | 1 | 3.12% |
Akinobu Mita | 4 | 0.14% | 1 | 3.12% |
Avi Kivity | 3 | 0.11% | 1 | 3.12% |
Arnd Bergmann | 3 | 0.11% | 1 | 3.12% |
Li Yang | 2 | 0.07% | 1 | 3.12% |
Sebastian Andrzej Siewior | 2 | 0.07% | 1 | 3.12% |
Mike Travis | 2 | 0.07% | 1 | 3.12% |
Uwe Kleine-König | 2 | 0.07% | 1 | 3.12% |
Barnabás Pőcze | 1 | 0.04% | 1 | 3.12% |
Darren Hart | 1 | 0.04% | 1 | 3.12% |
Arvind Yadav | 1 | 0.04% | 1 | 3.12% |
Alan Stern | 1 | 0.04% | 1 | 3.12% |
Mauro Carvalho Chehab | 1 | 0.04% | 1 | 3.12% |
Andi Kleen | 1 | 0.04% | 1 | 3.12% |
Thomas Gleixner | 1 | 0.04% | 1 | 3.12% |
Total | 2798 | 32 |
// SPDX-License-Identifier: GPL-2.0-only /* * dcdbas.c: Dell Systems Management Base Driver * * The Dell Systems Management Base Driver provides a sysfs interface for * systems management software to perform System Management Interrupts (SMIs) * and Host Control Actions (power cycle or power off after OS shutdown) on * Dell systems. * * See Documentation/driver-api/dcdbas.rst for more information. * * Copyright (C) 1995-2006 Dell Inc. */ #include <linux/platform_device.h> #include <linux/acpi.h> #include <linux/dma-mapping.h> #include <linux/dmi.h> #include <linux/errno.h> #include <linux/cpu.h> #include <linux/gfp.h> #include <linux/init.h> #include <linux/io.h> #include <linux/kernel.h> #include <linux/mc146818rtc.h> #include <linux/module.h> #include <linux/reboot.h> #include <linux/sched.h> #include <linux/smp.h> #include <linux/spinlock.h> #include <linux/string.h> #include <linux/types.h> #include <linux/mutex.h> #include "dcdbas.h" #define DRIVER_NAME "dcdbas" #define DRIVER_VERSION "5.6.0-3.4" #define DRIVER_DESCRIPTION "Dell Systems Management Base Driver" static struct platform_device *dcdbas_pdev; static unsigned long max_smi_data_buf_size = MAX_SMI_DATA_BUF_SIZE; static DEFINE_MUTEX(smi_data_lock); static u8 *bios_buffer; static struct smi_buffer smi_buf; static unsigned int host_control_action; static unsigned int host_control_smi_type; static unsigned int host_control_on_shutdown; static bool wsmt_enabled; int dcdbas_smi_alloc(struct smi_buffer *smi_buffer, unsigned long size) { smi_buffer->virt = dma_alloc_coherent(&dcdbas_pdev->dev, size, &smi_buffer->dma, GFP_KERNEL); if (!smi_buffer->virt) { dev_dbg(&dcdbas_pdev->dev, "%s: failed to allocate memory size %lu\n", __func__, size); return -ENOMEM; } smi_buffer->size = size; dev_dbg(&dcdbas_pdev->dev, "%s: phys: %x size: %lu\n", __func__, (u32)smi_buffer->dma, smi_buffer->size); return 0; } EXPORT_SYMBOL_GPL(dcdbas_smi_alloc); void dcdbas_smi_free(struct smi_buffer *smi_buffer) { if (!smi_buffer->virt) return; dev_dbg(&dcdbas_pdev->dev, "%s: phys: %x size: %lu\n", __func__, (u32)smi_buffer->dma, smi_buffer->size); dma_free_coherent(&dcdbas_pdev->dev, smi_buffer->size, smi_buffer->virt, smi_buffer->dma); smi_buffer->virt = NULL; smi_buffer->dma = 0; smi_buffer->size = 0; } EXPORT_SYMBOL_GPL(dcdbas_smi_free); /** * smi_data_buf_free: free SMI data buffer */ static void smi_data_buf_free(void) { if (!smi_buf.virt || wsmt_enabled) return; dcdbas_smi_free(&smi_buf); } /** * smi_data_buf_realloc: grow SMI data buffer if needed */ static int smi_data_buf_realloc(unsigned long size) { struct smi_buffer tmp; int ret; if (smi_buf.size >= size) return 0; if (size > max_smi_data_buf_size) return -EINVAL; /* new buffer is needed */ ret = dcdbas_smi_alloc(&tmp, size); if (ret) return ret; /* memory zeroed by dma_alloc_coherent */ if (smi_buf.virt) memcpy(tmp.virt, smi_buf.virt, smi_buf.size); /* free any existing buffer */ smi_data_buf_free(); /* set up new buffer for use */ smi_buf = tmp; return 0; } static ssize_t smi_data_buf_phys_addr_show(struct device *dev, struct device_attribute *attr, char *buf) { return sprintf(buf, "%x\n", (u32)smi_buf.dma); } static ssize_t smi_data_buf_size_show(struct device *dev, struct device_attribute *attr, char *buf) { return sprintf(buf, "%lu\n", smi_buf.size); } static ssize_t smi_data_buf_size_store(struct device *dev, struct device_attribute *attr, const char *buf, size_t count) { unsigned long buf_size; ssize_t ret; buf_size = simple_strtoul(buf, NULL, 10); /* make sure SMI data buffer is at least buf_size */ mutex_lock(&smi_data_lock); ret = smi_data_buf_realloc(buf_size); mutex_unlock(&smi_data_lock); if (ret) return ret; return count; } static ssize_t smi_data_read(struct file *filp, struct kobject *kobj, struct bin_attribute *bin_attr, char *buf, loff_t pos, size_t count) { ssize_t ret; mutex_lock(&smi_data_lock); ret = memory_read_from_buffer(buf, count, &pos, smi_buf.virt, smi_buf.size); mutex_unlock(&smi_data_lock); return ret; } static ssize_t smi_data_write(struct file *filp, struct kobject *kobj, struct bin_attribute *bin_attr, char *buf, loff_t pos, size_t count) { ssize_t ret; if ((pos + count) > max_smi_data_buf_size) return -EINVAL; mutex_lock(&smi_data_lock); ret = smi_data_buf_realloc(pos + count); if (ret) goto out; memcpy(smi_buf.virt + pos, buf, count); ret = count; out: mutex_unlock(&smi_data_lock); return ret; } static ssize_t host_control_action_show(struct device *dev, struct device_attribute *attr, char *buf) { return sprintf(buf, "%u\n", host_control_action); } static ssize_t host_control_action_store(struct device *dev, struct device_attribute *attr, const char *buf, size_t count) { ssize_t ret; /* make sure buffer is available for host control command */ mutex_lock(&smi_data_lock); ret = smi_data_buf_realloc(sizeof(struct apm_cmd)); mutex_unlock(&smi_data_lock); if (ret) return ret; host_control_action = simple_strtoul(buf, NULL, 10); return count; } static ssize_t host_control_smi_type_show(struct device *dev, struct device_attribute *attr, char *buf) { return sprintf(buf, "%u\n", host_control_smi_type); } static ssize_t host_control_smi_type_store(struct device *dev, struct device_attribute *attr, const char *buf, size_t count) { host_control_smi_type = simple_strtoul(buf, NULL, 10); return count; } static ssize_t host_control_on_shutdown_show(struct device *dev, struct device_attribute *attr, char *buf) { return sprintf(buf, "%u\n", host_control_on_shutdown); } static ssize_t host_control_on_shutdown_store(struct device *dev, struct device_attribute *attr, const char *buf, size_t count) { host_control_on_shutdown = simple_strtoul(buf, NULL, 10); return count; } static int raise_smi(void *par) { struct smi_cmd *smi_cmd = par; if (smp_processor_id() != 0) { dev_dbg(&dcdbas_pdev->dev, "%s: failed to get CPU 0\n", __func__); return -EBUSY; } /* generate SMI */ /* inb to force posted write through and make SMI happen now */ asm volatile ( "outb %b0,%w1\n" "inb %w1" : /* no output args */ : "a" (smi_cmd->command_code), "d" (smi_cmd->command_address), "b" (smi_cmd->ebx), "c" (smi_cmd->ecx) : "memory" ); return 0; } /** * dcdbas_smi_request: generate SMI request * * Called with smi_data_lock. */ int dcdbas_smi_request(struct smi_cmd *smi_cmd) { int ret; if (smi_cmd->magic != SMI_CMD_MAGIC) { dev_info(&dcdbas_pdev->dev, "%s: invalid magic value\n", __func__); return -EBADR; } /* SMI requires CPU 0 */ cpus_read_lock(); ret = smp_call_on_cpu(0, raise_smi, smi_cmd, true); cpus_read_unlock(); return ret; } EXPORT_SYMBOL(dcdbas_smi_request); /** * smi_request_store: * * The valid values are: * 0: zero SMI data buffer * 1: generate calling interface SMI * 2: generate raw SMI * * User application writes smi_cmd to smi_data before telling driver * to generate SMI. */ static ssize_t smi_request_store(struct device *dev, struct device_attribute *attr, const char *buf, size_t count) { struct smi_cmd *smi_cmd; unsigned long val = simple_strtoul(buf, NULL, 10); ssize_t ret; mutex_lock(&smi_data_lock); if (smi_buf.size < sizeof(struct smi_cmd)) { ret = -ENODEV; goto out; } smi_cmd = (struct smi_cmd *)smi_buf.virt; switch (val) { case 2: /* Raw SMI */ ret = dcdbas_smi_request(smi_cmd); if (!ret) ret = count; break; case 1: /* * Calling Interface SMI * * Provide physical address of command buffer field within * the struct smi_cmd to BIOS. * * Because the address that smi_cmd (smi_buf.virt) points to * will be from memremap() of a non-memory address if WSMT * is present, we can't use virt_to_phys() on smi_cmd, so * we have to use the physical address that was saved when * the virtual address for smi_cmd was received. */ smi_cmd->ebx = (u32)smi_buf.dma + offsetof(struct smi_cmd, command_buffer); ret = dcdbas_smi_request(smi_cmd); if (!ret) ret = count; break; case 0: memset(smi_buf.virt, 0, smi_buf.size); ret = count; break; default: ret = -EINVAL; break; } out: mutex_unlock(&smi_data_lock); return ret; } /** * host_control_smi: generate host control SMI * * Caller must set up the host control command in smi_buf.virt. */ static int host_control_smi(void) { struct apm_cmd *apm_cmd; u8 *data; unsigned long flags; u32 num_ticks; s8 cmd_status; u8 index; apm_cmd = (struct apm_cmd *)smi_buf.virt; apm_cmd->status = ESM_STATUS_CMD_UNSUCCESSFUL; switch (host_control_smi_type) { case HC_SMITYPE_TYPE1: spin_lock_irqsave(&rtc_lock, flags); /* write SMI data buffer physical address */ data = (u8 *)&smi_buf.dma; for (index = PE1300_CMOS_CMD_STRUCT_PTR; index < (PE1300_CMOS_CMD_STRUCT_PTR + 4); index++, data++) { outb(index, (CMOS_BASE_PORT + CMOS_PAGE2_INDEX_PORT_PIIX4)); outb(*data, (CMOS_BASE_PORT + CMOS_PAGE2_DATA_PORT_PIIX4)); } /* first set status to -1 as called by spec */ cmd_status = ESM_STATUS_CMD_UNSUCCESSFUL; outb((u8) cmd_status, PCAT_APM_STATUS_PORT); /* generate SMM call */ outb(ESM_APM_CMD, PCAT_APM_CONTROL_PORT); spin_unlock_irqrestore(&rtc_lock, flags); /* wait a few to see if it executed */ num_ticks = TIMEOUT_USEC_SHORT_SEMA_BLOCKING; while ((s8)inb(PCAT_APM_STATUS_PORT) == ESM_STATUS_CMD_UNSUCCESSFUL) { num_ticks--; if (num_ticks == EXPIRED_TIMER) return -ETIME; } break; case HC_SMITYPE_TYPE2: case HC_SMITYPE_TYPE3: spin_lock_irqsave(&rtc_lock, flags); /* write SMI data buffer physical address */ data = (u8 *)&smi_buf.dma; for (index = PE1400_CMOS_CMD_STRUCT_PTR; index < (PE1400_CMOS_CMD_STRUCT_PTR + 4); index++, data++) { outb(index, (CMOS_BASE_PORT + CMOS_PAGE1_INDEX_PORT)); outb(*data, (CMOS_BASE_PORT + CMOS_PAGE1_DATA_PORT)); } /* generate SMM call */ if (host_control_smi_type == HC_SMITYPE_TYPE3) outb(ESM_APM_CMD, PCAT_APM_CONTROL_PORT); else outb(ESM_APM_CMD, PE1400_APM_CONTROL_PORT); /* restore RTC index pointer since it was written to above */ CMOS_READ(RTC_REG_C); spin_unlock_irqrestore(&rtc_lock, flags); /* read control port back to serialize write */ cmd_status = inb(PE1400_APM_CONTROL_PORT); /* wait a few to see if it executed */ num_ticks = TIMEOUT_USEC_SHORT_SEMA_BLOCKING; while (apm_cmd->status == ESM_STATUS_CMD_UNSUCCESSFUL) { num_ticks--; if (num_ticks == EXPIRED_TIMER) return -ETIME; } break; default: dev_dbg(&dcdbas_pdev->dev, "%s: invalid SMI type %u\n", __func__, host_control_smi_type); return -ENOSYS; } return 0; } /** * dcdbas_host_control: initiate host control * * This function is called by the driver after the system has * finished shutting down if the user application specified a * host control action to perform on shutdown. It is safe to * use smi_buf.virt at this point because the system has finished * shutting down and no userspace apps are running. */ static void dcdbas_host_control(void) { struct apm_cmd *apm_cmd; u8 action; if (host_control_action == HC_ACTION_NONE) return; action = host_control_action; host_control_action = HC_ACTION_NONE; if (!smi_buf.virt) { dev_dbg(&dcdbas_pdev->dev, "%s: no SMI buffer\n", __func__); return; } if (smi_buf.size < sizeof(struct apm_cmd)) { dev_dbg(&dcdbas_pdev->dev, "%s: SMI buffer too small\n", __func__); return; } apm_cmd = (struct apm_cmd *)smi_buf.virt; /* power off takes precedence */ if (action & HC_ACTION_HOST_CONTROL_POWEROFF) { apm_cmd->command = ESM_APM_POWER_CYCLE; apm_cmd->reserved = 0; *((s16 *)&apm_cmd->parameters.shortreq.parm[0]) = (s16) 0; host_control_smi(); } else if (action & HC_ACTION_HOST_CONTROL_POWERCYCLE) { apm_cmd->command = ESM_APM_POWER_CYCLE; apm_cmd->reserved = 0; *((s16 *)&apm_cmd->parameters.shortreq.parm[0]) = (s16) 20; host_control_smi(); } } /* WSMT */ static u8 checksum(u8 *buffer, u8 length) { u8 sum = 0; u8 *end = buffer + length; while (buffer < end) sum += *buffer++; return sum; } static inline struct smm_eps_table *check_eps_table(u8 *addr) { struct smm_eps_table *eps = (struct smm_eps_table *)addr; if (strncmp(eps->smm_comm_buff_anchor, SMM_EPS_SIG, 4) != 0) return NULL; if (checksum(addr, eps->length) != 0) return NULL; return eps; } static int dcdbas_check_wsmt(void) { const struct dmi_device *dev = NULL; struct acpi_table_wsmt *wsmt = NULL; struct smm_eps_table *eps = NULL; u64 bios_buf_paddr; u64 remap_size; u8 *addr; acpi_get_table(ACPI_SIG_WSMT, 0, (struct acpi_table_header **)&wsmt); if (!wsmt) return 0; /* Check if WSMT ACPI table shows that protection is enabled */ if (!(wsmt->protection_flags & ACPI_WSMT_FIXED_COMM_BUFFERS) || !(wsmt->protection_flags & ACPI_WSMT_COMM_BUFFER_NESTED_PTR_PROTECTION)) return 0; /* * BIOS could provide the address/size of the protected buffer * in an SMBIOS string or in an EPS structure in 0xFxxxx. */ /* Check SMBIOS for buffer address */ while ((dev = dmi_find_device(DMI_DEV_TYPE_OEM_STRING, NULL, dev))) if (sscanf(dev->name, "30[%16llx;%8llx]", &bios_buf_paddr, &remap_size) == 2) goto remap; /* Scan for EPS (entry point structure) */ for (addr = (u8 *)__va(0xf0000); addr < (u8 *)__va(0x100000 - sizeof(struct smm_eps_table)); addr += 16) { eps = check_eps_table(addr); if (eps) break; } if (!eps) { dev_dbg(&dcdbas_pdev->dev, "found WSMT, but no firmware buffer found\n"); return -ENODEV; } bios_buf_paddr = eps->smm_comm_buff_addr; remap_size = eps->num_of_4k_pages * PAGE_SIZE; remap: /* * Get physical address of buffer and map to virtual address. * Table gives size in 4K pages, regardless of actual system page size. */ if (upper_32_bits(bios_buf_paddr + 8)) { dev_warn(&dcdbas_pdev->dev, "found WSMT, but buffer address is above 4GB\n"); return -EINVAL; } /* * Limit remap size to MAX_SMI_DATA_BUF_SIZE + 8 (since the first 8 * bytes are used for a semaphore, not the data buffer itself). */ if (remap_size > MAX_SMI_DATA_BUF_SIZE + 8) remap_size = MAX_SMI_DATA_BUF_SIZE + 8; bios_buffer = memremap(bios_buf_paddr, remap_size, MEMREMAP_WB); if (!bios_buffer) { dev_warn(&dcdbas_pdev->dev, "found WSMT, but failed to map buffer\n"); return -ENOMEM; } /* First 8 bytes is for a semaphore, not part of the smi_buf.virt */ smi_buf.dma = bios_buf_paddr + 8; smi_buf.virt = bios_buffer + 8; smi_buf.size = remap_size - 8; max_smi_data_buf_size = smi_buf.size; wsmt_enabled = true; dev_info(&dcdbas_pdev->dev, "WSMT found, using firmware-provided SMI buffer.\n"); return 1; } /** * dcdbas_reboot_notify: handle reboot notification for host control */ static int dcdbas_reboot_notify(struct notifier_block *nb, unsigned long code, void *unused) { switch (code) { case SYS_DOWN: case SYS_HALT: case SYS_POWER_OFF: if (host_control_on_shutdown) { /* firmware is going to perform host control action */ printk(KERN_WARNING "Please wait for shutdown " "action to complete...\n"); dcdbas_host_control(); } break; } return NOTIFY_DONE; } static struct notifier_block dcdbas_reboot_nb = { .notifier_call = dcdbas_reboot_notify, .next = NULL, .priority = INT_MIN }; static DCDBAS_BIN_ATTR_RW(smi_data); static struct bin_attribute *dcdbas_bin_attrs[] = { &bin_attr_smi_data, NULL }; static DCDBAS_DEV_ATTR_RW(smi_data_buf_size); static DCDBAS_DEV_ATTR_RO(smi_data_buf_phys_addr); static DCDBAS_DEV_ATTR_WO(smi_request); static DCDBAS_DEV_ATTR_RW(host_control_action); static DCDBAS_DEV_ATTR_RW(host_control_smi_type); static DCDBAS_DEV_ATTR_RW(host_control_on_shutdown); static struct attribute *dcdbas_dev_attrs[] = { &dev_attr_smi_data_buf_size.attr, &dev_attr_smi_data_buf_phys_addr.attr, &dev_attr_smi_request.attr, &dev_attr_host_control_action.attr, &dev_attr_host_control_smi_type.attr, &dev_attr_host_control_on_shutdown.attr, NULL }; static const struct attribute_group dcdbas_attr_group = { .attrs = dcdbas_dev_attrs, .bin_attrs = dcdbas_bin_attrs, }; static int dcdbas_probe(struct platform_device *dev) { int error; host_control_action = HC_ACTION_NONE; host_control_smi_type = HC_SMITYPE_NONE; dcdbas_pdev = dev; /* Check if ACPI WSMT table specifies protected SMI buffer address */ error = dcdbas_check_wsmt(); if (error < 0) return error; /* * BIOS SMI calls require buffer addresses be in 32-bit address space. * This is done by setting the DMA mask below. */ error = dma_set_coherent_mask(&dcdbas_pdev->dev, DMA_BIT_MASK(32)); if (error) return error; error = sysfs_create_group(&dev->dev.kobj, &dcdbas_attr_group); if (error) return error; register_reboot_notifier(&dcdbas_reboot_nb); dev_info(&dev->dev, "%s (version %s)\n", DRIVER_DESCRIPTION, DRIVER_VERSION); return 0; } static void dcdbas_remove(struct platform_device *dev) { unregister_reboot_notifier(&dcdbas_reboot_nb); sysfs_remove_group(&dev->dev.kobj, &dcdbas_attr_group); } static struct platform_driver dcdbas_driver = { .driver = { .name = DRIVER_NAME, }, .probe = dcdbas_probe, .remove_new = dcdbas_remove, }; static const struct platform_device_info dcdbas_dev_info __initconst = { .name = DRIVER_NAME, .id = PLATFORM_DEVID_NONE, .dma_mask = DMA_BIT_MASK(32), }; static struct platform_device *dcdbas_pdev_reg; /** * dcdbas_init: initialize driver */ static int __init dcdbas_init(void) { int error; error = platform_driver_register(&dcdbas_driver); if (error) return error; dcdbas_pdev_reg = platform_device_register_full(&dcdbas_dev_info); if (IS_ERR(dcdbas_pdev_reg)) { error = PTR_ERR(dcdbas_pdev_reg); goto err_unregister_driver; } return 0; err_unregister_driver: platform_driver_unregister(&dcdbas_driver); return error; } /** * dcdbas_exit: perform driver cleanup */ static void __exit dcdbas_exit(void) { /* * make sure functions that use dcdbas_pdev are called * before platform_device_unregister */ unregister_reboot_notifier(&dcdbas_reboot_nb); /* * We have to free the buffer here instead of dcdbas_remove * because only in module exit function we can be sure that * all sysfs attributes belonging to this module have been * released. */ if (dcdbas_pdev) smi_data_buf_free(); if (bios_buffer) memunmap(bios_buffer); platform_device_unregister(dcdbas_pdev_reg); platform_driver_unregister(&dcdbas_driver); } subsys_initcall_sync(dcdbas_init); module_exit(dcdbas_exit); MODULE_DESCRIPTION(DRIVER_DESCRIPTION " (version " DRIVER_VERSION ")"); MODULE_VERSION(DRIVER_VERSION); MODULE_AUTHOR("Dell Inc."); MODULE_LICENSE("GPL"); /* Any System or BIOS claiming to be by Dell */ MODULE_ALIAS("dmi:*:[bs]vnD[Ee][Ll][Ll]*:*");
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1