1. 29 11月, 2017 1 次提交
  2. 21 11月, 2017 1 次提交
  3. 19 11月, 2017 3 次提交
  4. 17 11月, 2017 1 次提交
  5. 16 11月, 2017 1 次提交
  6. 14 11月, 2017 1 次提交
  7. 11 11月, 2017 1 次提交
  8. 10 11月, 2017 1 次提交
  9. 09 11月, 2017 1 次提交
  10. 08 11月, 2017 4 次提交
  11. 07 11月, 2017 2 次提交
  12. 06 11月, 2017 3 次提交
  13. 05 11月, 2017 3 次提交
  14. 04 11月, 2017 7 次提交
    • M
      tools/wmi: add a sample for dell smbios communication over WMI · 9d64fc08
      Mario Limonciello 提交于
      This application uses the character device /dev/wmi/dell-smbios
      to perform SMBIOS communications from userspace.
      
      It offers demonstrations of a few simple tasks:
       - Running a class/select command
       - Querying a token value
       - Activating a token
      Signed-off-by: NMario Limonciello <mario.limonciello@dell.com>
      Reviewed-by: NEdward O'Callaghan <quasisec@google.com>
      Signed-off-by: NDarren Hart (VMware) <dvhart@infradead.org>
      9d64fc08
    • M
      platform/x86: wmi: create userspace interface for drivers · 44b6b766
      Mario Limonciello 提交于
      For WMI operations that are only Set or Query readable and writable sysfs
      attributes created by WMI vendor drivers or the bus driver makes sense.
      
      For other WMI operations that are run on Method, there needs to be a
      way to guarantee to userspace that the results from the method call
      belong to the data request to the method call.  Sysfs attributes don't
      work well in this scenario because two userspace processes may be
      competing at reading/writing an attribute and step on each other's
      data.
      
      When a WMI vendor driver declares a callback method in the wmi_driver
      the WMI bus driver will create a character device that maps to that
      function.  This callback method will be responsible for filtering
      invalid requests and performing the actual call.
      
      That character device will correspond to this path:
      /dev/wmi/$driver
      
      Performing read() on this character device will provide the size
      of the buffer that the character device needs to perform calls.
      This buffer size can be set by vendor drivers through a new symbol
      or when MOF parsing is available by the MOF.
      
      Performing ioctl() on this character device will be interpretd
      by the WMI bus driver. It will perform sanity tests for size of
      data, test them for a valid instance, copy the data from userspace
      and pass iton to the vendor driver to further process and run.
      
      This creates an implicit policy that each driver will only be allowed
      a single character device.  If a module matches multiple GUID's,
      the wmi_devices will need to be all handled by the same wmi_driver.
      
      The WMI vendor drivers will be responsible for managing inappropriate
      access to this character device and proper locking on data used by
      it.
      
      When a WMI vendor driver is unloaded the WMI bus driver will clean
      up the character device and any memory allocated for the call.
      Signed-off-by: NMario Limonciello <mario.limonciello@dell.com>
      Reviewed-by: NEdward O'Callaghan <quasisec@google.com>
      Signed-off-by: NDarren Hart (VMware) <dvhart@infradead.org>
      44b6b766
    • M
      platform/x86: dell-smbios-wmi: Add new WMI dispatcher driver · 1a258e67
      Mario Limonciello 提交于
      The dell-smbios stack only currently uses an SMI interface which grants
      direct access to physical memory to the firmware SMM methods via a pointer.
      
      This dispatcher driver adds a WMI-ACPI interface that is detected by WMI
      probe and preferred over the SMI interface in dell-smbios.
      
      Changing this to operate over WMI-ACPI will use an ACPI OperationRegion
      for a buffer of data storage when SMM calls are performed.
      
      This is a safer approach to use in kernel drivers as the SMM will
      only have access to that OperationRegion.
      Signed-off-by: NMario Limonciello <mario.limonciello@dell.com>
      Reviewed-by: NEdward O'Callaghan <quasisec@google.com>
      Signed-off-by: NDarren Hart (VMware) <dvhart@infradead.org>
      1a258e67
    • M
      platform/x86: dell-smbios: Introduce dispatcher for SMM calls · 549b4930
      Mario Limonciello 提交于
      This splits up the dell-smbios driver into two drivers:
      * dell-smbios
      * dell-smbios-smm
      
      dell-smbios can operate with multiple different dispatcher drivers to
      perform SMBIOS operations.
      
      Also modify the interface that dell-laptop and dell-wmi use align to this
      model more closely.  Rather than a single global buffer being allocated
      for all drivers, each driver will allocate and be responsible for it's own
      buffer. The pointer will be passed to the calling function and each
      dispatcher driver will then internally copy it to the proper location to
      perform it's call.
      
      Add defines for calls used by these methods in the dell-smbios.h header
      for tracking purposes.
      Signed-off-by: NMario Limonciello <mario.limonciello@dell.com>
      Reviewed-by: NEdward O'Callaghan <quasisec@google.com>
      Signed-off-by: NDarren Hart (VMware) <dvhart@infradead.org>
      549b4930
    • M
      platform/x86: dell-smbios: Add a sysfs interface for SMBIOS tokens · 33b9ca1e
      Mario Limonciello 提交于
      Currently userspace tools can access system tokens via the dcdbas
      kernel module and a SMI call that will cause the platform to execute
      SMM code.
      
      With a goal in mind of deprecating the dcdbas kernel module a different
      method for accessing these tokens from userspace needs to be created.
      
      This is intentionally marked to only be readable as a process with
      CAP_SYS_ADMIN as it can contain sensitive information about the
      platform's configuration.
      
      While adding this interface I found that some tokens are duplicated.
      These need to be ignored from sysfs to avoid duplicate files.
      
      MAINTAINERS was missing for this driver.  Add myself and Pali to
      maintainers list for it.
      Signed-off-by: NMario Limonciello <mario.limonciello@dell.com>
      Reviewed-by: NEdward O'Callaghan <quasisec@google.com>
      Signed-off-by: NDarren Hart (VMware) <dvhart@infradead.org>
      33b9ca1e
    • M
      platform/x86: dell-wmi-descriptor: split WMI descriptor into it's own driver · 92b8c540
      Mario Limonciello 提交于
      All communication on individual GUIDs should occur in separate drivers.
      Allowing a driver to communicate with the bus to another GUID is just
      a hack that discourages drivers to adopt the bus model.
      
      The information found from the WMI descriptor driver is now exported
      for use by other drivers.
      Signed-off-by: NMario Limonciello <mario.limonciello@dell.com>
      Reviewed-by: NEdward O'Callaghan <quasisec@google.com>
      Signed-off-by: NDarren Hart (VMware) <dvhart@infradead.org>
      92b8c540
    • P
      Update MIPS email addresses · fb615d61
      Paul Burton 提交于
      MIPS will soon not be a part of Imagination Technologies, and as such
      many @imgtec.com email addresses will no longer be valid. This patch
      updates the addresses for those who:
      
       - Have 10 or more patches in mainline authored using an @imgtec.com
         email address, or any patches dated within the past year.
      
       - Are still with Imagination but leaving as part of the MIPS business
         unit, as determined from an internal email address list.
      
       - Haven't already updated their email address (ie. JamesH) or expressed
         a desire to be excluded (ie. Maciej).
      
       - Acked v2 or earlier of this patch, which leaves Deng-Cheng, Matt &
         myself.
      
      New addresses are of the form firstname.lastname@mips.com, and all
      verified against an internal email address list.  An entry is added to
      .mailmap for each person such that get_maintainer.pl will report the new
      addresses rather than @imgtec.com addresses which will soon be dead.
      
      Instances of the affected addresses throughout the tree are then
      mechanically replaced with the new @mips.com address.
      Signed-off-by: NPaul Burton <paul.burton@mips.com>
      Cc: Deng-Cheng Zhu <dengcheng.zhu@imgtec.com>
      Cc: Deng-Cheng Zhu <dengcheng.zhu@mips.com>
      Acked-by: NDengcheng Zhu <dengcheng.zhu@mips.com>
      Cc: Matt Redfearn <matt.redfearn@imgtec.com>
      Cc: Matt Redfearn <matt.redfearn@mips.com>
      Acked-by: NMatt Redfearn <matt.redfearn@mips.com>
      Cc: Andrew Morton <akpm@linux-foundation.org>
      Cc: linux-kernel@vger.kernel.org
      Cc: linux-mips@linux-mips.org
      Cc: trivial@kernel.org
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      fb615d61
  15. 03 11月, 2017 3 次提交
  16. 02 11月, 2017 5 次提交
  17. 01 11月, 2017 2 次提交