18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * dcdbas.c: Dell Systems Management Base Driver 48c2ecf20Sopenharmony_ci * 58c2ecf20Sopenharmony_ci * The Dell Systems Management Base Driver provides a sysfs interface for 68c2ecf20Sopenharmony_ci * systems management software to perform System Management Interrupts (SMIs) 78c2ecf20Sopenharmony_ci * and Host Control Actions (power cycle or power off after OS shutdown) on 88c2ecf20Sopenharmony_ci * Dell systems. 98c2ecf20Sopenharmony_ci * 108c2ecf20Sopenharmony_ci * See Documentation/driver-api/dcdbas.rst for more information. 118c2ecf20Sopenharmony_ci * 128c2ecf20Sopenharmony_ci * Copyright (C) 1995-2006 Dell Inc. 138c2ecf20Sopenharmony_ci */ 148c2ecf20Sopenharmony_ci 158c2ecf20Sopenharmony_ci#include <linux/platform_device.h> 168c2ecf20Sopenharmony_ci#include <linux/acpi.h> 178c2ecf20Sopenharmony_ci#include <linux/dma-mapping.h> 188c2ecf20Sopenharmony_ci#include <linux/dmi.h> 198c2ecf20Sopenharmony_ci#include <linux/errno.h> 208c2ecf20Sopenharmony_ci#include <linux/cpu.h> 218c2ecf20Sopenharmony_ci#include <linux/gfp.h> 228c2ecf20Sopenharmony_ci#include <linux/init.h> 238c2ecf20Sopenharmony_ci#include <linux/io.h> 248c2ecf20Sopenharmony_ci#include <linux/kernel.h> 258c2ecf20Sopenharmony_ci#include <linux/mc146818rtc.h> 268c2ecf20Sopenharmony_ci#include <linux/module.h> 278c2ecf20Sopenharmony_ci#include <linux/reboot.h> 288c2ecf20Sopenharmony_ci#include <linux/sched.h> 298c2ecf20Sopenharmony_ci#include <linux/smp.h> 308c2ecf20Sopenharmony_ci#include <linux/spinlock.h> 318c2ecf20Sopenharmony_ci#include <linux/string.h> 328c2ecf20Sopenharmony_ci#include <linux/types.h> 338c2ecf20Sopenharmony_ci#include <linux/mutex.h> 348c2ecf20Sopenharmony_ci 358c2ecf20Sopenharmony_ci#include "dcdbas.h" 368c2ecf20Sopenharmony_ci 378c2ecf20Sopenharmony_ci#define DRIVER_NAME "dcdbas" 388c2ecf20Sopenharmony_ci#define DRIVER_VERSION "5.6.0-3.4" 398c2ecf20Sopenharmony_ci#define DRIVER_DESCRIPTION "Dell Systems Management Base Driver" 408c2ecf20Sopenharmony_ci 418c2ecf20Sopenharmony_cistatic struct platform_device *dcdbas_pdev; 428c2ecf20Sopenharmony_ci 438c2ecf20Sopenharmony_cistatic u8 *smi_data_buf; 448c2ecf20Sopenharmony_cistatic dma_addr_t smi_data_buf_handle; 458c2ecf20Sopenharmony_cistatic unsigned long smi_data_buf_size; 468c2ecf20Sopenharmony_cistatic unsigned long max_smi_data_buf_size = MAX_SMI_DATA_BUF_SIZE; 478c2ecf20Sopenharmony_cistatic u32 smi_data_buf_phys_addr; 488c2ecf20Sopenharmony_cistatic DEFINE_MUTEX(smi_data_lock); 498c2ecf20Sopenharmony_cistatic u8 *bios_buffer; 508c2ecf20Sopenharmony_ci 518c2ecf20Sopenharmony_cistatic unsigned int host_control_action; 528c2ecf20Sopenharmony_cistatic unsigned int host_control_smi_type; 538c2ecf20Sopenharmony_cistatic unsigned int host_control_on_shutdown; 548c2ecf20Sopenharmony_ci 558c2ecf20Sopenharmony_cistatic bool wsmt_enabled; 568c2ecf20Sopenharmony_ci 578c2ecf20Sopenharmony_ci/** 588c2ecf20Sopenharmony_ci * smi_data_buf_free: free SMI data buffer 598c2ecf20Sopenharmony_ci */ 608c2ecf20Sopenharmony_cistatic void smi_data_buf_free(void) 618c2ecf20Sopenharmony_ci{ 628c2ecf20Sopenharmony_ci if (!smi_data_buf || wsmt_enabled) 638c2ecf20Sopenharmony_ci return; 648c2ecf20Sopenharmony_ci 658c2ecf20Sopenharmony_ci dev_dbg(&dcdbas_pdev->dev, "%s: phys: %x size: %lu\n", 668c2ecf20Sopenharmony_ci __func__, smi_data_buf_phys_addr, smi_data_buf_size); 678c2ecf20Sopenharmony_ci 688c2ecf20Sopenharmony_ci dma_free_coherent(&dcdbas_pdev->dev, smi_data_buf_size, smi_data_buf, 698c2ecf20Sopenharmony_ci smi_data_buf_handle); 708c2ecf20Sopenharmony_ci smi_data_buf = NULL; 718c2ecf20Sopenharmony_ci smi_data_buf_handle = 0; 728c2ecf20Sopenharmony_ci smi_data_buf_phys_addr = 0; 738c2ecf20Sopenharmony_ci smi_data_buf_size = 0; 748c2ecf20Sopenharmony_ci} 758c2ecf20Sopenharmony_ci 768c2ecf20Sopenharmony_ci/** 778c2ecf20Sopenharmony_ci * smi_data_buf_realloc: grow SMI data buffer if needed 788c2ecf20Sopenharmony_ci */ 798c2ecf20Sopenharmony_cistatic int smi_data_buf_realloc(unsigned long size) 808c2ecf20Sopenharmony_ci{ 818c2ecf20Sopenharmony_ci void *buf; 828c2ecf20Sopenharmony_ci dma_addr_t handle; 838c2ecf20Sopenharmony_ci 848c2ecf20Sopenharmony_ci if (smi_data_buf_size >= size) 858c2ecf20Sopenharmony_ci return 0; 868c2ecf20Sopenharmony_ci 878c2ecf20Sopenharmony_ci if (size > max_smi_data_buf_size) 888c2ecf20Sopenharmony_ci return -EINVAL; 898c2ecf20Sopenharmony_ci 908c2ecf20Sopenharmony_ci /* new buffer is needed */ 918c2ecf20Sopenharmony_ci buf = dma_alloc_coherent(&dcdbas_pdev->dev, size, &handle, GFP_KERNEL); 928c2ecf20Sopenharmony_ci if (!buf) { 938c2ecf20Sopenharmony_ci dev_dbg(&dcdbas_pdev->dev, 948c2ecf20Sopenharmony_ci "%s: failed to allocate memory size %lu\n", 958c2ecf20Sopenharmony_ci __func__, size); 968c2ecf20Sopenharmony_ci return -ENOMEM; 978c2ecf20Sopenharmony_ci } 988c2ecf20Sopenharmony_ci /* memory zeroed by dma_alloc_coherent */ 998c2ecf20Sopenharmony_ci 1008c2ecf20Sopenharmony_ci if (smi_data_buf) 1018c2ecf20Sopenharmony_ci memcpy(buf, smi_data_buf, smi_data_buf_size); 1028c2ecf20Sopenharmony_ci 1038c2ecf20Sopenharmony_ci /* free any existing buffer */ 1048c2ecf20Sopenharmony_ci smi_data_buf_free(); 1058c2ecf20Sopenharmony_ci 1068c2ecf20Sopenharmony_ci /* set up new buffer for use */ 1078c2ecf20Sopenharmony_ci smi_data_buf = buf; 1088c2ecf20Sopenharmony_ci smi_data_buf_handle = handle; 1098c2ecf20Sopenharmony_ci smi_data_buf_phys_addr = (u32) virt_to_phys(buf); 1108c2ecf20Sopenharmony_ci smi_data_buf_size = size; 1118c2ecf20Sopenharmony_ci 1128c2ecf20Sopenharmony_ci dev_dbg(&dcdbas_pdev->dev, "%s: phys: %x size: %lu\n", 1138c2ecf20Sopenharmony_ci __func__, smi_data_buf_phys_addr, smi_data_buf_size); 1148c2ecf20Sopenharmony_ci 1158c2ecf20Sopenharmony_ci return 0; 1168c2ecf20Sopenharmony_ci} 1178c2ecf20Sopenharmony_ci 1188c2ecf20Sopenharmony_cistatic ssize_t smi_data_buf_phys_addr_show(struct device *dev, 1198c2ecf20Sopenharmony_ci struct device_attribute *attr, 1208c2ecf20Sopenharmony_ci char *buf) 1218c2ecf20Sopenharmony_ci{ 1228c2ecf20Sopenharmony_ci return sprintf(buf, "%x\n", smi_data_buf_phys_addr); 1238c2ecf20Sopenharmony_ci} 1248c2ecf20Sopenharmony_ci 1258c2ecf20Sopenharmony_cistatic ssize_t smi_data_buf_size_show(struct device *dev, 1268c2ecf20Sopenharmony_ci struct device_attribute *attr, 1278c2ecf20Sopenharmony_ci char *buf) 1288c2ecf20Sopenharmony_ci{ 1298c2ecf20Sopenharmony_ci return sprintf(buf, "%lu\n", smi_data_buf_size); 1308c2ecf20Sopenharmony_ci} 1318c2ecf20Sopenharmony_ci 1328c2ecf20Sopenharmony_cistatic ssize_t smi_data_buf_size_store(struct device *dev, 1338c2ecf20Sopenharmony_ci struct device_attribute *attr, 1348c2ecf20Sopenharmony_ci const char *buf, size_t count) 1358c2ecf20Sopenharmony_ci{ 1368c2ecf20Sopenharmony_ci unsigned long buf_size; 1378c2ecf20Sopenharmony_ci ssize_t ret; 1388c2ecf20Sopenharmony_ci 1398c2ecf20Sopenharmony_ci buf_size = simple_strtoul(buf, NULL, 10); 1408c2ecf20Sopenharmony_ci 1418c2ecf20Sopenharmony_ci /* make sure SMI data buffer is at least buf_size */ 1428c2ecf20Sopenharmony_ci mutex_lock(&smi_data_lock); 1438c2ecf20Sopenharmony_ci ret = smi_data_buf_realloc(buf_size); 1448c2ecf20Sopenharmony_ci mutex_unlock(&smi_data_lock); 1458c2ecf20Sopenharmony_ci if (ret) 1468c2ecf20Sopenharmony_ci return ret; 1478c2ecf20Sopenharmony_ci 1488c2ecf20Sopenharmony_ci return count; 1498c2ecf20Sopenharmony_ci} 1508c2ecf20Sopenharmony_ci 1518c2ecf20Sopenharmony_cistatic ssize_t smi_data_read(struct file *filp, struct kobject *kobj, 1528c2ecf20Sopenharmony_ci struct bin_attribute *bin_attr, 1538c2ecf20Sopenharmony_ci char *buf, loff_t pos, size_t count) 1548c2ecf20Sopenharmony_ci{ 1558c2ecf20Sopenharmony_ci ssize_t ret; 1568c2ecf20Sopenharmony_ci 1578c2ecf20Sopenharmony_ci mutex_lock(&smi_data_lock); 1588c2ecf20Sopenharmony_ci ret = memory_read_from_buffer(buf, count, &pos, smi_data_buf, 1598c2ecf20Sopenharmony_ci smi_data_buf_size); 1608c2ecf20Sopenharmony_ci mutex_unlock(&smi_data_lock); 1618c2ecf20Sopenharmony_ci return ret; 1628c2ecf20Sopenharmony_ci} 1638c2ecf20Sopenharmony_ci 1648c2ecf20Sopenharmony_cistatic ssize_t smi_data_write(struct file *filp, struct kobject *kobj, 1658c2ecf20Sopenharmony_ci struct bin_attribute *bin_attr, 1668c2ecf20Sopenharmony_ci char *buf, loff_t pos, size_t count) 1678c2ecf20Sopenharmony_ci{ 1688c2ecf20Sopenharmony_ci ssize_t ret; 1698c2ecf20Sopenharmony_ci 1708c2ecf20Sopenharmony_ci if ((pos + count) > max_smi_data_buf_size) 1718c2ecf20Sopenharmony_ci return -EINVAL; 1728c2ecf20Sopenharmony_ci 1738c2ecf20Sopenharmony_ci mutex_lock(&smi_data_lock); 1748c2ecf20Sopenharmony_ci 1758c2ecf20Sopenharmony_ci ret = smi_data_buf_realloc(pos + count); 1768c2ecf20Sopenharmony_ci if (ret) 1778c2ecf20Sopenharmony_ci goto out; 1788c2ecf20Sopenharmony_ci 1798c2ecf20Sopenharmony_ci memcpy(smi_data_buf + pos, buf, count); 1808c2ecf20Sopenharmony_ci ret = count; 1818c2ecf20Sopenharmony_ciout: 1828c2ecf20Sopenharmony_ci mutex_unlock(&smi_data_lock); 1838c2ecf20Sopenharmony_ci return ret; 1848c2ecf20Sopenharmony_ci} 1858c2ecf20Sopenharmony_ci 1868c2ecf20Sopenharmony_cistatic ssize_t host_control_action_show(struct device *dev, 1878c2ecf20Sopenharmony_ci struct device_attribute *attr, 1888c2ecf20Sopenharmony_ci char *buf) 1898c2ecf20Sopenharmony_ci{ 1908c2ecf20Sopenharmony_ci return sprintf(buf, "%u\n", host_control_action); 1918c2ecf20Sopenharmony_ci} 1928c2ecf20Sopenharmony_ci 1938c2ecf20Sopenharmony_cistatic ssize_t host_control_action_store(struct device *dev, 1948c2ecf20Sopenharmony_ci struct device_attribute *attr, 1958c2ecf20Sopenharmony_ci const char *buf, size_t count) 1968c2ecf20Sopenharmony_ci{ 1978c2ecf20Sopenharmony_ci ssize_t ret; 1988c2ecf20Sopenharmony_ci 1998c2ecf20Sopenharmony_ci /* make sure buffer is available for host control command */ 2008c2ecf20Sopenharmony_ci mutex_lock(&smi_data_lock); 2018c2ecf20Sopenharmony_ci ret = smi_data_buf_realloc(sizeof(struct apm_cmd)); 2028c2ecf20Sopenharmony_ci mutex_unlock(&smi_data_lock); 2038c2ecf20Sopenharmony_ci if (ret) 2048c2ecf20Sopenharmony_ci return ret; 2058c2ecf20Sopenharmony_ci 2068c2ecf20Sopenharmony_ci host_control_action = simple_strtoul(buf, NULL, 10); 2078c2ecf20Sopenharmony_ci return count; 2088c2ecf20Sopenharmony_ci} 2098c2ecf20Sopenharmony_ci 2108c2ecf20Sopenharmony_cistatic ssize_t host_control_smi_type_show(struct device *dev, 2118c2ecf20Sopenharmony_ci struct device_attribute *attr, 2128c2ecf20Sopenharmony_ci char *buf) 2138c2ecf20Sopenharmony_ci{ 2148c2ecf20Sopenharmony_ci return sprintf(buf, "%u\n", host_control_smi_type); 2158c2ecf20Sopenharmony_ci} 2168c2ecf20Sopenharmony_ci 2178c2ecf20Sopenharmony_cistatic ssize_t host_control_smi_type_store(struct device *dev, 2188c2ecf20Sopenharmony_ci struct device_attribute *attr, 2198c2ecf20Sopenharmony_ci const char *buf, size_t count) 2208c2ecf20Sopenharmony_ci{ 2218c2ecf20Sopenharmony_ci host_control_smi_type = simple_strtoul(buf, NULL, 10); 2228c2ecf20Sopenharmony_ci return count; 2238c2ecf20Sopenharmony_ci} 2248c2ecf20Sopenharmony_ci 2258c2ecf20Sopenharmony_cistatic ssize_t host_control_on_shutdown_show(struct device *dev, 2268c2ecf20Sopenharmony_ci struct device_attribute *attr, 2278c2ecf20Sopenharmony_ci char *buf) 2288c2ecf20Sopenharmony_ci{ 2298c2ecf20Sopenharmony_ci return sprintf(buf, "%u\n", host_control_on_shutdown); 2308c2ecf20Sopenharmony_ci} 2318c2ecf20Sopenharmony_ci 2328c2ecf20Sopenharmony_cistatic ssize_t host_control_on_shutdown_store(struct device *dev, 2338c2ecf20Sopenharmony_ci struct device_attribute *attr, 2348c2ecf20Sopenharmony_ci const char *buf, size_t count) 2358c2ecf20Sopenharmony_ci{ 2368c2ecf20Sopenharmony_ci host_control_on_shutdown = simple_strtoul(buf, NULL, 10); 2378c2ecf20Sopenharmony_ci return count; 2388c2ecf20Sopenharmony_ci} 2398c2ecf20Sopenharmony_ci 2408c2ecf20Sopenharmony_cistatic int raise_smi(void *par) 2418c2ecf20Sopenharmony_ci{ 2428c2ecf20Sopenharmony_ci struct smi_cmd *smi_cmd = par; 2438c2ecf20Sopenharmony_ci 2448c2ecf20Sopenharmony_ci if (smp_processor_id() != 0) { 2458c2ecf20Sopenharmony_ci dev_dbg(&dcdbas_pdev->dev, "%s: failed to get CPU 0\n", 2468c2ecf20Sopenharmony_ci __func__); 2478c2ecf20Sopenharmony_ci return -EBUSY; 2488c2ecf20Sopenharmony_ci } 2498c2ecf20Sopenharmony_ci 2508c2ecf20Sopenharmony_ci /* generate SMI */ 2518c2ecf20Sopenharmony_ci /* inb to force posted write through and make SMI happen now */ 2528c2ecf20Sopenharmony_ci asm volatile ( 2538c2ecf20Sopenharmony_ci "outb %b0,%w1\n" 2548c2ecf20Sopenharmony_ci "inb %w1" 2558c2ecf20Sopenharmony_ci : /* no output args */ 2568c2ecf20Sopenharmony_ci : "a" (smi_cmd->command_code), 2578c2ecf20Sopenharmony_ci "d" (smi_cmd->command_address), 2588c2ecf20Sopenharmony_ci "b" (smi_cmd->ebx), 2598c2ecf20Sopenharmony_ci "c" (smi_cmd->ecx) 2608c2ecf20Sopenharmony_ci : "memory" 2618c2ecf20Sopenharmony_ci ); 2628c2ecf20Sopenharmony_ci 2638c2ecf20Sopenharmony_ci return 0; 2648c2ecf20Sopenharmony_ci} 2658c2ecf20Sopenharmony_ci/** 2668c2ecf20Sopenharmony_ci * dcdbas_smi_request: generate SMI request 2678c2ecf20Sopenharmony_ci * 2688c2ecf20Sopenharmony_ci * Called with smi_data_lock. 2698c2ecf20Sopenharmony_ci */ 2708c2ecf20Sopenharmony_ciint dcdbas_smi_request(struct smi_cmd *smi_cmd) 2718c2ecf20Sopenharmony_ci{ 2728c2ecf20Sopenharmony_ci int ret; 2738c2ecf20Sopenharmony_ci 2748c2ecf20Sopenharmony_ci if (smi_cmd->magic != SMI_CMD_MAGIC) { 2758c2ecf20Sopenharmony_ci dev_info(&dcdbas_pdev->dev, "%s: invalid magic value\n", 2768c2ecf20Sopenharmony_ci __func__); 2778c2ecf20Sopenharmony_ci return -EBADR; 2788c2ecf20Sopenharmony_ci } 2798c2ecf20Sopenharmony_ci 2808c2ecf20Sopenharmony_ci /* SMI requires CPU 0 */ 2818c2ecf20Sopenharmony_ci get_online_cpus(); 2828c2ecf20Sopenharmony_ci ret = smp_call_on_cpu(0, raise_smi, smi_cmd, true); 2838c2ecf20Sopenharmony_ci put_online_cpus(); 2848c2ecf20Sopenharmony_ci 2858c2ecf20Sopenharmony_ci return ret; 2868c2ecf20Sopenharmony_ci} 2878c2ecf20Sopenharmony_ci 2888c2ecf20Sopenharmony_ci/** 2898c2ecf20Sopenharmony_ci * smi_request_store: 2908c2ecf20Sopenharmony_ci * 2918c2ecf20Sopenharmony_ci * The valid values are: 2928c2ecf20Sopenharmony_ci * 0: zero SMI data buffer 2938c2ecf20Sopenharmony_ci * 1: generate calling interface SMI 2948c2ecf20Sopenharmony_ci * 2: generate raw SMI 2958c2ecf20Sopenharmony_ci * 2968c2ecf20Sopenharmony_ci * User application writes smi_cmd to smi_data before telling driver 2978c2ecf20Sopenharmony_ci * to generate SMI. 2988c2ecf20Sopenharmony_ci */ 2998c2ecf20Sopenharmony_cistatic ssize_t smi_request_store(struct device *dev, 3008c2ecf20Sopenharmony_ci struct device_attribute *attr, 3018c2ecf20Sopenharmony_ci const char *buf, size_t count) 3028c2ecf20Sopenharmony_ci{ 3038c2ecf20Sopenharmony_ci struct smi_cmd *smi_cmd; 3048c2ecf20Sopenharmony_ci unsigned long val = simple_strtoul(buf, NULL, 10); 3058c2ecf20Sopenharmony_ci ssize_t ret; 3068c2ecf20Sopenharmony_ci 3078c2ecf20Sopenharmony_ci mutex_lock(&smi_data_lock); 3088c2ecf20Sopenharmony_ci 3098c2ecf20Sopenharmony_ci if (smi_data_buf_size < sizeof(struct smi_cmd)) { 3108c2ecf20Sopenharmony_ci ret = -ENODEV; 3118c2ecf20Sopenharmony_ci goto out; 3128c2ecf20Sopenharmony_ci } 3138c2ecf20Sopenharmony_ci smi_cmd = (struct smi_cmd *)smi_data_buf; 3148c2ecf20Sopenharmony_ci 3158c2ecf20Sopenharmony_ci switch (val) { 3168c2ecf20Sopenharmony_ci case 2: 3178c2ecf20Sopenharmony_ci /* Raw SMI */ 3188c2ecf20Sopenharmony_ci ret = dcdbas_smi_request(smi_cmd); 3198c2ecf20Sopenharmony_ci if (!ret) 3208c2ecf20Sopenharmony_ci ret = count; 3218c2ecf20Sopenharmony_ci break; 3228c2ecf20Sopenharmony_ci case 1: 3238c2ecf20Sopenharmony_ci /* 3248c2ecf20Sopenharmony_ci * Calling Interface SMI 3258c2ecf20Sopenharmony_ci * 3268c2ecf20Sopenharmony_ci * Provide physical address of command buffer field within 3278c2ecf20Sopenharmony_ci * the struct smi_cmd to BIOS. 3288c2ecf20Sopenharmony_ci * 3298c2ecf20Sopenharmony_ci * Because the address that smi_cmd (smi_data_buf) points to 3308c2ecf20Sopenharmony_ci * will be from memremap() of a non-memory address if WSMT 3318c2ecf20Sopenharmony_ci * is present, we can't use virt_to_phys() on smi_cmd, so 3328c2ecf20Sopenharmony_ci * we have to use the physical address that was saved when 3338c2ecf20Sopenharmony_ci * the virtual address for smi_cmd was received. 3348c2ecf20Sopenharmony_ci */ 3358c2ecf20Sopenharmony_ci smi_cmd->ebx = smi_data_buf_phys_addr + 3368c2ecf20Sopenharmony_ci offsetof(struct smi_cmd, command_buffer); 3378c2ecf20Sopenharmony_ci ret = dcdbas_smi_request(smi_cmd); 3388c2ecf20Sopenharmony_ci if (!ret) 3398c2ecf20Sopenharmony_ci ret = count; 3408c2ecf20Sopenharmony_ci break; 3418c2ecf20Sopenharmony_ci case 0: 3428c2ecf20Sopenharmony_ci memset(smi_data_buf, 0, smi_data_buf_size); 3438c2ecf20Sopenharmony_ci ret = count; 3448c2ecf20Sopenharmony_ci break; 3458c2ecf20Sopenharmony_ci default: 3468c2ecf20Sopenharmony_ci ret = -EINVAL; 3478c2ecf20Sopenharmony_ci break; 3488c2ecf20Sopenharmony_ci } 3498c2ecf20Sopenharmony_ci 3508c2ecf20Sopenharmony_ciout: 3518c2ecf20Sopenharmony_ci mutex_unlock(&smi_data_lock); 3528c2ecf20Sopenharmony_ci return ret; 3538c2ecf20Sopenharmony_ci} 3548c2ecf20Sopenharmony_ciEXPORT_SYMBOL(dcdbas_smi_request); 3558c2ecf20Sopenharmony_ci 3568c2ecf20Sopenharmony_ci/** 3578c2ecf20Sopenharmony_ci * host_control_smi: generate host control SMI 3588c2ecf20Sopenharmony_ci * 3598c2ecf20Sopenharmony_ci * Caller must set up the host control command in smi_data_buf. 3608c2ecf20Sopenharmony_ci */ 3618c2ecf20Sopenharmony_cistatic int host_control_smi(void) 3628c2ecf20Sopenharmony_ci{ 3638c2ecf20Sopenharmony_ci struct apm_cmd *apm_cmd; 3648c2ecf20Sopenharmony_ci u8 *data; 3658c2ecf20Sopenharmony_ci unsigned long flags; 3668c2ecf20Sopenharmony_ci u32 num_ticks; 3678c2ecf20Sopenharmony_ci s8 cmd_status; 3688c2ecf20Sopenharmony_ci u8 index; 3698c2ecf20Sopenharmony_ci 3708c2ecf20Sopenharmony_ci apm_cmd = (struct apm_cmd *)smi_data_buf; 3718c2ecf20Sopenharmony_ci apm_cmd->status = ESM_STATUS_CMD_UNSUCCESSFUL; 3728c2ecf20Sopenharmony_ci 3738c2ecf20Sopenharmony_ci switch (host_control_smi_type) { 3748c2ecf20Sopenharmony_ci case HC_SMITYPE_TYPE1: 3758c2ecf20Sopenharmony_ci spin_lock_irqsave(&rtc_lock, flags); 3768c2ecf20Sopenharmony_ci /* write SMI data buffer physical address */ 3778c2ecf20Sopenharmony_ci data = (u8 *)&smi_data_buf_phys_addr; 3788c2ecf20Sopenharmony_ci for (index = PE1300_CMOS_CMD_STRUCT_PTR; 3798c2ecf20Sopenharmony_ci index < (PE1300_CMOS_CMD_STRUCT_PTR + 4); 3808c2ecf20Sopenharmony_ci index++, data++) { 3818c2ecf20Sopenharmony_ci outb(index, 3828c2ecf20Sopenharmony_ci (CMOS_BASE_PORT + CMOS_PAGE2_INDEX_PORT_PIIX4)); 3838c2ecf20Sopenharmony_ci outb(*data, 3848c2ecf20Sopenharmony_ci (CMOS_BASE_PORT + CMOS_PAGE2_DATA_PORT_PIIX4)); 3858c2ecf20Sopenharmony_ci } 3868c2ecf20Sopenharmony_ci 3878c2ecf20Sopenharmony_ci /* first set status to -1 as called by spec */ 3888c2ecf20Sopenharmony_ci cmd_status = ESM_STATUS_CMD_UNSUCCESSFUL; 3898c2ecf20Sopenharmony_ci outb((u8) cmd_status, PCAT_APM_STATUS_PORT); 3908c2ecf20Sopenharmony_ci 3918c2ecf20Sopenharmony_ci /* generate SMM call */ 3928c2ecf20Sopenharmony_ci outb(ESM_APM_CMD, PCAT_APM_CONTROL_PORT); 3938c2ecf20Sopenharmony_ci spin_unlock_irqrestore(&rtc_lock, flags); 3948c2ecf20Sopenharmony_ci 3958c2ecf20Sopenharmony_ci /* wait a few to see if it executed */ 3968c2ecf20Sopenharmony_ci num_ticks = TIMEOUT_USEC_SHORT_SEMA_BLOCKING; 3978c2ecf20Sopenharmony_ci while ((cmd_status = inb(PCAT_APM_STATUS_PORT)) 3988c2ecf20Sopenharmony_ci == ESM_STATUS_CMD_UNSUCCESSFUL) { 3998c2ecf20Sopenharmony_ci num_ticks--; 4008c2ecf20Sopenharmony_ci if (num_ticks == EXPIRED_TIMER) 4018c2ecf20Sopenharmony_ci return -ETIME; 4028c2ecf20Sopenharmony_ci } 4038c2ecf20Sopenharmony_ci break; 4048c2ecf20Sopenharmony_ci 4058c2ecf20Sopenharmony_ci case HC_SMITYPE_TYPE2: 4068c2ecf20Sopenharmony_ci case HC_SMITYPE_TYPE3: 4078c2ecf20Sopenharmony_ci spin_lock_irqsave(&rtc_lock, flags); 4088c2ecf20Sopenharmony_ci /* write SMI data buffer physical address */ 4098c2ecf20Sopenharmony_ci data = (u8 *)&smi_data_buf_phys_addr; 4108c2ecf20Sopenharmony_ci for (index = PE1400_CMOS_CMD_STRUCT_PTR; 4118c2ecf20Sopenharmony_ci index < (PE1400_CMOS_CMD_STRUCT_PTR + 4); 4128c2ecf20Sopenharmony_ci index++, data++) { 4138c2ecf20Sopenharmony_ci outb(index, (CMOS_BASE_PORT + CMOS_PAGE1_INDEX_PORT)); 4148c2ecf20Sopenharmony_ci outb(*data, (CMOS_BASE_PORT + CMOS_PAGE1_DATA_PORT)); 4158c2ecf20Sopenharmony_ci } 4168c2ecf20Sopenharmony_ci 4178c2ecf20Sopenharmony_ci /* generate SMM call */ 4188c2ecf20Sopenharmony_ci if (host_control_smi_type == HC_SMITYPE_TYPE3) 4198c2ecf20Sopenharmony_ci outb(ESM_APM_CMD, PCAT_APM_CONTROL_PORT); 4208c2ecf20Sopenharmony_ci else 4218c2ecf20Sopenharmony_ci outb(ESM_APM_CMD, PE1400_APM_CONTROL_PORT); 4228c2ecf20Sopenharmony_ci 4238c2ecf20Sopenharmony_ci /* restore RTC index pointer since it was written to above */ 4248c2ecf20Sopenharmony_ci CMOS_READ(RTC_REG_C); 4258c2ecf20Sopenharmony_ci spin_unlock_irqrestore(&rtc_lock, flags); 4268c2ecf20Sopenharmony_ci 4278c2ecf20Sopenharmony_ci /* read control port back to serialize write */ 4288c2ecf20Sopenharmony_ci cmd_status = inb(PE1400_APM_CONTROL_PORT); 4298c2ecf20Sopenharmony_ci 4308c2ecf20Sopenharmony_ci /* wait a few to see if it executed */ 4318c2ecf20Sopenharmony_ci num_ticks = TIMEOUT_USEC_SHORT_SEMA_BLOCKING; 4328c2ecf20Sopenharmony_ci while (apm_cmd->status == ESM_STATUS_CMD_UNSUCCESSFUL) { 4338c2ecf20Sopenharmony_ci num_ticks--; 4348c2ecf20Sopenharmony_ci if (num_ticks == EXPIRED_TIMER) 4358c2ecf20Sopenharmony_ci return -ETIME; 4368c2ecf20Sopenharmony_ci } 4378c2ecf20Sopenharmony_ci break; 4388c2ecf20Sopenharmony_ci 4398c2ecf20Sopenharmony_ci default: 4408c2ecf20Sopenharmony_ci dev_dbg(&dcdbas_pdev->dev, "%s: invalid SMI type %u\n", 4418c2ecf20Sopenharmony_ci __func__, host_control_smi_type); 4428c2ecf20Sopenharmony_ci return -ENOSYS; 4438c2ecf20Sopenharmony_ci } 4448c2ecf20Sopenharmony_ci 4458c2ecf20Sopenharmony_ci return 0; 4468c2ecf20Sopenharmony_ci} 4478c2ecf20Sopenharmony_ci 4488c2ecf20Sopenharmony_ci/** 4498c2ecf20Sopenharmony_ci * dcdbas_host_control: initiate host control 4508c2ecf20Sopenharmony_ci * 4518c2ecf20Sopenharmony_ci * This function is called by the driver after the system has 4528c2ecf20Sopenharmony_ci * finished shutting down if the user application specified a 4538c2ecf20Sopenharmony_ci * host control action to perform on shutdown. It is safe to 4548c2ecf20Sopenharmony_ci * use smi_data_buf at this point because the system has finished 4558c2ecf20Sopenharmony_ci * shutting down and no userspace apps are running. 4568c2ecf20Sopenharmony_ci */ 4578c2ecf20Sopenharmony_cistatic void dcdbas_host_control(void) 4588c2ecf20Sopenharmony_ci{ 4598c2ecf20Sopenharmony_ci struct apm_cmd *apm_cmd; 4608c2ecf20Sopenharmony_ci u8 action; 4618c2ecf20Sopenharmony_ci 4628c2ecf20Sopenharmony_ci if (host_control_action == HC_ACTION_NONE) 4638c2ecf20Sopenharmony_ci return; 4648c2ecf20Sopenharmony_ci 4658c2ecf20Sopenharmony_ci action = host_control_action; 4668c2ecf20Sopenharmony_ci host_control_action = HC_ACTION_NONE; 4678c2ecf20Sopenharmony_ci 4688c2ecf20Sopenharmony_ci if (!smi_data_buf) { 4698c2ecf20Sopenharmony_ci dev_dbg(&dcdbas_pdev->dev, "%s: no SMI buffer\n", __func__); 4708c2ecf20Sopenharmony_ci return; 4718c2ecf20Sopenharmony_ci } 4728c2ecf20Sopenharmony_ci 4738c2ecf20Sopenharmony_ci if (smi_data_buf_size < sizeof(struct apm_cmd)) { 4748c2ecf20Sopenharmony_ci dev_dbg(&dcdbas_pdev->dev, "%s: SMI buffer too small\n", 4758c2ecf20Sopenharmony_ci __func__); 4768c2ecf20Sopenharmony_ci return; 4778c2ecf20Sopenharmony_ci } 4788c2ecf20Sopenharmony_ci 4798c2ecf20Sopenharmony_ci apm_cmd = (struct apm_cmd *)smi_data_buf; 4808c2ecf20Sopenharmony_ci 4818c2ecf20Sopenharmony_ci /* power off takes precedence */ 4828c2ecf20Sopenharmony_ci if (action & HC_ACTION_HOST_CONTROL_POWEROFF) { 4838c2ecf20Sopenharmony_ci apm_cmd->command = ESM_APM_POWER_CYCLE; 4848c2ecf20Sopenharmony_ci apm_cmd->reserved = 0; 4858c2ecf20Sopenharmony_ci *((s16 *)&apm_cmd->parameters.shortreq.parm[0]) = (s16) 0; 4868c2ecf20Sopenharmony_ci host_control_smi(); 4878c2ecf20Sopenharmony_ci } else if (action & HC_ACTION_HOST_CONTROL_POWERCYCLE) { 4888c2ecf20Sopenharmony_ci apm_cmd->command = ESM_APM_POWER_CYCLE; 4898c2ecf20Sopenharmony_ci apm_cmd->reserved = 0; 4908c2ecf20Sopenharmony_ci *((s16 *)&apm_cmd->parameters.shortreq.parm[0]) = (s16) 20; 4918c2ecf20Sopenharmony_ci host_control_smi(); 4928c2ecf20Sopenharmony_ci } 4938c2ecf20Sopenharmony_ci} 4948c2ecf20Sopenharmony_ci 4958c2ecf20Sopenharmony_ci/* WSMT */ 4968c2ecf20Sopenharmony_ci 4978c2ecf20Sopenharmony_cistatic u8 checksum(u8 *buffer, u8 length) 4988c2ecf20Sopenharmony_ci{ 4998c2ecf20Sopenharmony_ci u8 sum = 0; 5008c2ecf20Sopenharmony_ci u8 *end = buffer + length; 5018c2ecf20Sopenharmony_ci 5028c2ecf20Sopenharmony_ci while (buffer < end) 5038c2ecf20Sopenharmony_ci sum += *buffer++; 5048c2ecf20Sopenharmony_ci return sum; 5058c2ecf20Sopenharmony_ci} 5068c2ecf20Sopenharmony_ci 5078c2ecf20Sopenharmony_cistatic inline struct smm_eps_table *check_eps_table(u8 *addr) 5088c2ecf20Sopenharmony_ci{ 5098c2ecf20Sopenharmony_ci struct smm_eps_table *eps = (struct smm_eps_table *)addr; 5108c2ecf20Sopenharmony_ci 5118c2ecf20Sopenharmony_ci if (strncmp(eps->smm_comm_buff_anchor, SMM_EPS_SIG, 4) != 0) 5128c2ecf20Sopenharmony_ci return NULL; 5138c2ecf20Sopenharmony_ci 5148c2ecf20Sopenharmony_ci if (checksum(addr, eps->length) != 0) 5158c2ecf20Sopenharmony_ci return NULL; 5168c2ecf20Sopenharmony_ci 5178c2ecf20Sopenharmony_ci return eps; 5188c2ecf20Sopenharmony_ci} 5198c2ecf20Sopenharmony_ci 5208c2ecf20Sopenharmony_cistatic int dcdbas_check_wsmt(void) 5218c2ecf20Sopenharmony_ci{ 5228c2ecf20Sopenharmony_ci const struct dmi_device *dev = NULL; 5238c2ecf20Sopenharmony_ci struct acpi_table_wsmt *wsmt = NULL; 5248c2ecf20Sopenharmony_ci struct smm_eps_table *eps = NULL; 5258c2ecf20Sopenharmony_ci u64 bios_buf_paddr; 5268c2ecf20Sopenharmony_ci u64 remap_size; 5278c2ecf20Sopenharmony_ci u8 *addr; 5288c2ecf20Sopenharmony_ci 5298c2ecf20Sopenharmony_ci acpi_get_table(ACPI_SIG_WSMT, 0, (struct acpi_table_header **)&wsmt); 5308c2ecf20Sopenharmony_ci if (!wsmt) 5318c2ecf20Sopenharmony_ci return 0; 5328c2ecf20Sopenharmony_ci 5338c2ecf20Sopenharmony_ci /* Check if WSMT ACPI table shows that protection is enabled */ 5348c2ecf20Sopenharmony_ci if (!(wsmt->protection_flags & ACPI_WSMT_FIXED_COMM_BUFFERS) || 5358c2ecf20Sopenharmony_ci !(wsmt->protection_flags & ACPI_WSMT_COMM_BUFFER_NESTED_PTR_PROTECTION)) 5368c2ecf20Sopenharmony_ci return 0; 5378c2ecf20Sopenharmony_ci 5388c2ecf20Sopenharmony_ci /* 5398c2ecf20Sopenharmony_ci * BIOS could provide the address/size of the protected buffer 5408c2ecf20Sopenharmony_ci * in an SMBIOS string or in an EPS structure in 0xFxxxx. 5418c2ecf20Sopenharmony_ci */ 5428c2ecf20Sopenharmony_ci 5438c2ecf20Sopenharmony_ci /* Check SMBIOS for buffer address */ 5448c2ecf20Sopenharmony_ci while ((dev = dmi_find_device(DMI_DEV_TYPE_OEM_STRING, NULL, dev))) 5458c2ecf20Sopenharmony_ci if (sscanf(dev->name, "30[%16llx;%8llx]", &bios_buf_paddr, 5468c2ecf20Sopenharmony_ci &remap_size) == 2) 5478c2ecf20Sopenharmony_ci goto remap; 5488c2ecf20Sopenharmony_ci 5498c2ecf20Sopenharmony_ci /* Scan for EPS (entry point structure) */ 5508c2ecf20Sopenharmony_ci for (addr = (u8 *)__va(0xf0000); 5518c2ecf20Sopenharmony_ci addr < (u8 *)__va(0x100000 - sizeof(struct smm_eps_table)); 5528c2ecf20Sopenharmony_ci addr += 16) { 5538c2ecf20Sopenharmony_ci eps = check_eps_table(addr); 5548c2ecf20Sopenharmony_ci if (eps) 5558c2ecf20Sopenharmony_ci break; 5568c2ecf20Sopenharmony_ci } 5578c2ecf20Sopenharmony_ci 5588c2ecf20Sopenharmony_ci if (!eps) { 5598c2ecf20Sopenharmony_ci dev_dbg(&dcdbas_pdev->dev, "found WSMT, but no firmware buffer found\n"); 5608c2ecf20Sopenharmony_ci return -ENODEV; 5618c2ecf20Sopenharmony_ci } 5628c2ecf20Sopenharmony_ci bios_buf_paddr = eps->smm_comm_buff_addr; 5638c2ecf20Sopenharmony_ci remap_size = eps->num_of_4k_pages * PAGE_SIZE; 5648c2ecf20Sopenharmony_ci 5658c2ecf20Sopenharmony_ciremap: 5668c2ecf20Sopenharmony_ci /* 5678c2ecf20Sopenharmony_ci * Get physical address of buffer and map to virtual address. 5688c2ecf20Sopenharmony_ci * Table gives size in 4K pages, regardless of actual system page size. 5698c2ecf20Sopenharmony_ci */ 5708c2ecf20Sopenharmony_ci if (upper_32_bits(bios_buf_paddr + 8)) { 5718c2ecf20Sopenharmony_ci dev_warn(&dcdbas_pdev->dev, "found WSMT, but buffer address is above 4GB\n"); 5728c2ecf20Sopenharmony_ci return -EINVAL; 5738c2ecf20Sopenharmony_ci } 5748c2ecf20Sopenharmony_ci /* 5758c2ecf20Sopenharmony_ci * Limit remap size to MAX_SMI_DATA_BUF_SIZE + 8 (since the first 8 5768c2ecf20Sopenharmony_ci * bytes are used for a semaphore, not the data buffer itself). 5778c2ecf20Sopenharmony_ci */ 5788c2ecf20Sopenharmony_ci if (remap_size > MAX_SMI_DATA_BUF_SIZE + 8) 5798c2ecf20Sopenharmony_ci remap_size = MAX_SMI_DATA_BUF_SIZE + 8; 5808c2ecf20Sopenharmony_ci 5818c2ecf20Sopenharmony_ci bios_buffer = memremap(bios_buf_paddr, remap_size, MEMREMAP_WB); 5828c2ecf20Sopenharmony_ci if (!bios_buffer) { 5838c2ecf20Sopenharmony_ci dev_warn(&dcdbas_pdev->dev, "found WSMT, but failed to map buffer\n"); 5848c2ecf20Sopenharmony_ci return -ENOMEM; 5858c2ecf20Sopenharmony_ci } 5868c2ecf20Sopenharmony_ci 5878c2ecf20Sopenharmony_ci /* First 8 bytes is for a semaphore, not part of the smi_data_buf */ 5888c2ecf20Sopenharmony_ci smi_data_buf_phys_addr = bios_buf_paddr + 8; 5898c2ecf20Sopenharmony_ci smi_data_buf = bios_buffer + 8; 5908c2ecf20Sopenharmony_ci smi_data_buf_size = remap_size - 8; 5918c2ecf20Sopenharmony_ci max_smi_data_buf_size = smi_data_buf_size; 5928c2ecf20Sopenharmony_ci wsmt_enabled = true; 5938c2ecf20Sopenharmony_ci dev_info(&dcdbas_pdev->dev, 5948c2ecf20Sopenharmony_ci "WSMT found, using firmware-provided SMI buffer.\n"); 5958c2ecf20Sopenharmony_ci return 1; 5968c2ecf20Sopenharmony_ci} 5978c2ecf20Sopenharmony_ci 5988c2ecf20Sopenharmony_ci/** 5998c2ecf20Sopenharmony_ci * dcdbas_reboot_notify: handle reboot notification for host control 6008c2ecf20Sopenharmony_ci */ 6018c2ecf20Sopenharmony_cistatic int dcdbas_reboot_notify(struct notifier_block *nb, unsigned long code, 6028c2ecf20Sopenharmony_ci void *unused) 6038c2ecf20Sopenharmony_ci{ 6048c2ecf20Sopenharmony_ci switch (code) { 6058c2ecf20Sopenharmony_ci case SYS_DOWN: 6068c2ecf20Sopenharmony_ci case SYS_HALT: 6078c2ecf20Sopenharmony_ci case SYS_POWER_OFF: 6088c2ecf20Sopenharmony_ci if (host_control_on_shutdown) { 6098c2ecf20Sopenharmony_ci /* firmware is going to perform host control action */ 6108c2ecf20Sopenharmony_ci printk(KERN_WARNING "Please wait for shutdown " 6118c2ecf20Sopenharmony_ci "action to complete...\n"); 6128c2ecf20Sopenharmony_ci dcdbas_host_control(); 6138c2ecf20Sopenharmony_ci } 6148c2ecf20Sopenharmony_ci break; 6158c2ecf20Sopenharmony_ci } 6168c2ecf20Sopenharmony_ci 6178c2ecf20Sopenharmony_ci return NOTIFY_DONE; 6188c2ecf20Sopenharmony_ci} 6198c2ecf20Sopenharmony_ci 6208c2ecf20Sopenharmony_cistatic struct notifier_block dcdbas_reboot_nb = { 6218c2ecf20Sopenharmony_ci .notifier_call = dcdbas_reboot_notify, 6228c2ecf20Sopenharmony_ci .next = NULL, 6238c2ecf20Sopenharmony_ci .priority = INT_MIN 6248c2ecf20Sopenharmony_ci}; 6258c2ecf20Sopenharmony_ci 6268c2ecf20Sopenharmony_cistatic DCDBAS_BIN_ATTR_RW(smi_data); 6278c2ecf20Sopenharmony_ci 6288c2ecf20Sopenharmony_cistatic struct bin_attribute *dcdbas_bin_attrs[] = { 6298c2ecf20Sopenharmony_ci &bin_attr_smi_data, 6308c2ecf20Sopenharmony_ci NULL 6318c2ecf20Sopenharmony_ci}; 6328c2ecf20Sopenharmony_ci 6338c2ecf20Sopenharmony_cistatic DCDBAS_DEV_ATTR_RW(smi_data_buf_size); 6348c2ecf20Sopenharmony_cistatic DCDBAS_DEV_ATTR_RO(smi_data_buf_phys_addr); 6358c2ecf20Sopenharmony_cistatic DCDBAS_DEV_ATTR_WO(smi_request); 6368c2ecf20Sopenharmony_cistatic DCDBAS_DEV_ATTR_RW(host_control_action); 6378c2ecf20Sopenharmony_cistatic DCDBAS_DEV_ATTR_RW(host_control_smi_type); 6388c2ecf20Sopenharmony_cistatic DCDBAS_DEV_ATTR_RW(host_control_on_shutdown); 6398c2ecf20Sopenharmony_ci 6408c2ecf20Sopenharmony_cistatic struct attribute *dcdbas_dev_attrs[] = { 6418c2ecf20Sopenharmony_ci &dev_attr_smi_data_buf_size.attr, 6428c2ecf20Sopenharmony_ci &dev_attr_smi_data_buf_phys_addr.attr, 6438c2ecf20Sopenharmony_ci &dev_attr_smi_request.attr, 6448c2ecf20Sopenharmony_ci &dev_attr_host_control_action.attr, 6458c2ecf20Sopenharmony_ci &dev_attr_host_control_smi_type.attr, 6468c2ecf20Sopenharmony_ci &dev_attr_host_control_on_shutdown.attr, 6478c2ecf20Sopenharmony_ci NULL 6488c2ecf20Sopenharmony_ci}; 6498c2ecf20Sopenharmony_ci 6508c2ecf20Sopenharmony_cistatic const struct attribute_group dcdbas_attr_group = { 6518c2ecf20Sopenharmony_ci .attrs = dcdbas_dev_attrs, 6528c2ecf20Sopenharmony_ci .bin_attrs = dcdbas_bin_attrs, 6538c2ecf20Sopenharmony_ci}; 6548c2ecf20Sopenharmony_ci 6558c2ecf20Sopenharmony_cistatic int dcdbas_probe(struct platform_device *dev) 6568c2ecf20Sopenharmony_ci{ 6578c2ecf20Sopenharmony_ci int error; 6588c2ecf20Sopenharmony_ci 6598c2ecf20Sopenharmony_ci host_control_action = HC_ACTION_NONE; 6608c2ecf20Sopenharmony_ci host_control_smi_type = HC_SMITYPE_NONE; 6618c2ecf20Sopenharmony_ci 6628c2ecf20Sopenharmony_ci dcdbas_pdev = dev; 6638c2ecf20Sopenharmony_ci 6648c2ecf20Sopenharmony_ci /* Check if ACPI WSMT table specifies protected SMI buffer address */ 6658c2ecf20Sopenharmony_ci error = dcdbas_check_wsmt(); 6668c2ecf20Sopenharmony_ci if (error < 0) 6678c2ecf20Sopenharmony_ci return error; 6688c2ecf20Sopenharmony_ci 6698c2ecf20Sopenharmony_ci /* 6708c2ecf20Sopenharmony_ci * BIOS SMI calls require buffer addresses be in 32-bit address space. 6718c2ecf20Sopenharmony_ci * This is done by setting the DMA mask below. 6728c2ecf20Sopenharmony_ci */ 6738c2ecf20Sopenharmony_ci error = dma_set_coherent_mask(&dcdbas_pdev->dev, DMA_BIT_MASK(32)); 6748c2ecf20Sopenharmony_ci if (error) 6758c2ecf20Sopenharmony_ci return error; 6768c2ecf20Sopenharmony_ci 6778c2ecf20Sopenharmony_ci error = sysfs_create_group(&dev->dev.kobj, &dcdbas_attr_group); 6788c2ecf20Sopenharmony_ci if (error) 6798c2ecf20Sopenharmony_ci return error; 6808c2ecf20Sopenharmony_ci 6818c2ecf20Sopenharmony_ci register_reboot_notifier(&dcdbas_reboot_nb); 6828c2ecf20Sopenharmony_ci 6838c2ecf20Sopenharmony_ci dev_info(&dev->dev, "%s (version %s)\n", 6848c2ecf20Sopenharmony_ci DRIVER_DESCRIPTION, DRIVER_VERSION); 6858c2ecf20Sopenharmony_ci 6868c2ecf20Sopenharmony_ci return 0; 6878c2ecf20Sopenharmony_ci} 6888c2ecf20Sopenharmony_ci 6898c2ecf20Sopenharmony_cistatic int dcdbas_remove(struct platform_device *dev) 6908c2ecf20Sopenharmony_ci{ 6918c2ecf20Sopenharmony_ci unregister_reboot_notifier(&dcdbas_reboot_nb); 6928c2ecf20Sopenharmony_ci sysfs_remove_group(&dev->dev.kobj, &dcdbas_attr_group); 6938c2ecf20Sopenharmony_ci 6948c2ecf20Sopenharmony_ci return 0; 6958c2ecf20Sopenharmony_ci} 6968c2ecf20Sopenharmony_ci 6978c2ecf20Sopenharmony_cistatic struct platform_driver dcdbas_driver = { 6988c2ecf20Sopenharmony_ci .driver = { 6998c2ecf20Sopenharmony_ci .name = DRIVER_NAME, 7008c2ecf20Sopenharmony_ci }, 7018c2ecf20Sopenharmony_ci .probe = dcdbas_probe, 7028c2ecf20Sopenharmony_ci .remove = dcdbas_remove, 7038c2ecf20Sopenharmony_ci}; 7048c2ecf20Sopenharmony_ci 7058c2ecf20Sopenharmony_cistatic const struct platform_device_info dcdbas_dev_info __initconst = { 7068c2ecf20Sopenharmony_ci .name = DRIVER_NAME, 7078c2ecf20Sopenharmony_ci .id = -1, 7088c2ecf20Sopenharmony_ci .dma_mask = DMA_BIT_MASK(32), 7098c2ecf20Sopenharmony_ci}; 7108c2ecf20Sopenharmony_ci 7118c2ecf20Sopenharmony_cistatic struct platform_device *dcdbas_pdev_reg; 7128c2ecf20Sopenharmony_ci 7138c2ecf20Sopenharmony_ci/** 7148c2ecf20Sopenharmony_ci * dcdbas_init: initialize driver 7158c2ecf20Sopenharmony_ci */ 7168c2ecf20Sopenharmony_cistatic int __init dcdbas_init(void) 7178c2ecf20Sopenharmony_ci{ 7188c2ecf20Sopenharmony_ci int error; 7198c2ecf20Sopenharmony_ci 7208c2ecf20Sopenharmony_ci error = platform_driver_register(&dcdbas_driver); 7218c2ecf20Sopenharmony_ci if (error) 7228c2ecf20Sopenharmony_ci return error; 7238c2ecf20Sopenharmony_ci 7248c2ecf20Sopenharmony_ci dcdbas_pdev_reg = platform_device_register_full(&dcdbas_dev_info); 7258c2ecf20Sopenharmony_ci if (IS_ERR(dcdbas_pdev_reg)) { 7268c2ecf20Sopenharmony_ci error = PTR_ERR(dcdbas_pdev_reg); 7278c2ecf20Sopenharmony_ci goto err_unregister_driver; 7288c2ecf20Sopenharmony_ci } 7298c2ecf20Sopenharmony_ci 7308c2ecf20Sopenharmony_ci return 0; 7318c2ecf20Sopenharmony_ci 7328c2ecf20Sopenharmony_ci err_unregister_driver: 7338c2ecf20Sopenharmony_ci platform_driver_unregister(&dcdbas_driver); 7348c2ecf20Sopenharmony_ci return error; 7358c2ecf20Sopenharmony_ci} 7368c2ecf20Sopenharmony_ci 7378c2ecf20Sopenharmony_ci/** 7388c2ecf20Sopenharmony_ci * dcdbas_exit: perform driver cleanup 7398c2ecf20Sopenharmony_ci */ 7408c2ecf20Sopenharmony_cistatic void __exit dcdbas_exit(void) 7418c2ecf20Sopenharmony_ci{ 7428c2ecf20Sopenharmony_ci /* 7438c2ecf20Sopenharmony_ci * make sure functions that use dcdbas_pdev are called 7448c2ecf20Sopenharmony_ci * before platform_device_unregister 7458c2ecf20Sopenharmony_ci */ 7468c2ecf20Sopenharmony_ci unregister_reboot_notifier(&dcdbas_reboot_nb); 7478c2ecf20Sopenharmony_ci 7488c2ecf20Sopenharmony_ci /* 7498c2ecf20Sopenharmony_ci * We have to free the buffer here instead of dcdbas_remove 7508c2ecf20Sopenharmony_ci * because only in module exit function we can be sure that 7518c2ecf20Sopenharmony_ci * all sysfs attributes belonging to this module have been 7528c2ecf20Sopenharmony_ci * released. 7538c2ecf20Sopenharmony_ci */ 7548c2ecf20Sopenharmony_ci if (dcdbas_pdev) 7558c2ecf20Sopenharmony_ci smi_data_buf_free(); 7568c2ecf20Sopenharmony_ci if (bios_buffer) 7578c2ecf20Sopenharmony_ci memunmap(bios_buffer); 7588c2ecf20Sopenharmony_ci platform_device_unregister(dcdbas_pdev_reg); 7598c2ecf20Sopenharmony_ci platform_driver_unregister(&dcdbas_driver); 7608c2ecf20Sopenharmony_ci} 7618c2ecf20Sopenharmony_ci 7628c2ecf20Sopenharmony_cisubsys_initcall_sync(dcdbas_init); 7638c2ecf20Sopenharmony_cimodule_exit(dcdbas_exit); 7648c2ecf20Sopenharmony_ci 7658c2ecf20Sopenharmony_ciMODULE_DESCRIPTION(DRIVER_DESCRIPTION " (version " DRIVER_VERSION ")"); 7668c2ecf20Sopenharmony_ciMODULE_VERSION(DRIVER_VERSION); 7678c2ecf20Sopenharmony_ciMODULE_AUTHOR("Dell Inc."); 7688c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL"); 7698c2ecf20Sopenharmony_ci/* Any System or BIOS claiming to be by Dell */ 7708c2ecf20Sopenharmony_ciMODULE_ALIAS("dmi:*:[bs]vnD[Ee][Ll][Ll]*:*"); 771