From patchwork Thu Nov 23 00:48:19 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Armin Wolf X-Patchwork-Id: 168658 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:6358:6f03:b0:164:83eb:24d7 with SMTP id r3csp1607648rwn; Wed, 22 Nov 2023 16:52:19 -0800 (PST) X-Google-Smtp-Source: AGHT+IFiupYAh8vDEHrQ4+RwOn4FG79warElDvqDRtiJrFnz01G2QxXTdBGDpYIRDlPK5ijHYPp5 X-Received: by 2002:a05:6870:d3c3:b0:1e9:bbfe:6457 with SMTP id l3-20020a056870d3c300b001e9bbfe6457mr5729590oag.6.1700700739220; Wed, 22 Nov 2023 16:52:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700700739; cv=none; d=google.com; s=arc-20160816; b=gUQPbIv3LjrcCrgBkatdePPLjtDRc8tkezbmP8/gZPzO8QvCwIYvJNiDna34jmt+lC H16+OqhxGTzNwQXDuLRSFqiTbuJPq8vECf8arQr7BLsZ+8dW4W0EK2qWialaTymru/Ch XjM2t8PvN+HI74Fw3Ov2/FcN6tpZioOZ5Xcv9AY7jLLwjjdHyqnqSGYRv9RsedfYz8Kd 30TT27g9OKgv+T7QV5F8emntJ8aXfWS6R/4Gt5PQVPjtHJdsEE/5c5gSqAllZ2KRM9l3 BHLg1rjfj4iBqwD9k6GYPTGrHvKPdhCk4knWrPhvDmPsTJhRS6Ml4cNHhI1gBPltbbJh xjlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:ui-outboundreport:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=YQOaD0isR9P5/SPrubRbWBRUfnphefV6kQLdftB4VHU=; fh=LbJc+26ESPHxBsYHQvEuE116sbQvfgEPUOE2p6r6f4A=; b=XaU1H18/0hqHf/v+dQV+VUMBY3HXoa7HfzLmLzGMFA+ZYK367rwYYqgl1t2owmmf9v uEe/0d10IQWIS12O4qT9zV+xE+tCAkIC7obrDm2hF9XYTwoNQ8y/hwONaG4ryfv59KrE RJxIgd5n9LBHmhSXCabaztHPG4ZLDQK0dIh7m2yKdMHBJ0zxrWqoRbicsudjbLRlGrUL MwT+ZVC8uzkJdK5BUN11Itae/QpUKYkpJG3zM8e672JU9khBgb5pmCgjpN1cs8Ux+3QN DptSUJGSdh1dQjmSO3T5AdVIeM0OvcxZbuZmrwnmewuIevgqa9qOXVG5LNx7kLxiAuUZ CNDQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmx.de header.s=s31663417 header.b="NdJ4HKu/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmx.de Received: from morse.vger.email (morse.vger.email. [23.128.96.31]) by mx.google.com with ESMTPS id iz2-20020a170902ef8200b001cc16aa4981si72970plb.39.2023.11.22.16.52.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 22 Nov 2023 16:52:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) client-ip=23.128.96.31; Authentication-Results: mx.google.com; dkim=pass header.i=@gmx.de header.s=s31663417 header.b="NdJ4HKu/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmx.de Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 215A3807E41A; Wed, 22 Nov 2023 16:50:28 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234394AbjKWAuI (ORCPT + 99 others); Wed, 22 Nov 2023 19:50:08 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49076 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231179AbjKWAtu (ORCPT ); Wed, 22 Nov 2023 19:49:50 -0500 Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9F9D1171F; Wed, 22 Nov 2023 16:49:18 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.de; s=s31663417; t=1700700531; x=1701305331; i=w_armin@gmx.de; bh=IpekB6HD5lK7F+Kd+JJ/yZUrtd4vGeb83HYctPW2R2A=; h=X-UI-Sender-Class:From:To:Cc:Subject:Date:In-Reply-To: References; b=NdJ4HKu/4pf25CY2MZm6gSq/iAN3XQT6Z8G+8KOQAdRChXMM9vMexkHsZ16giomR u9TQxLoqSYXjUKbZdM/LJUig0e34CQP6G6D9HVbHsZY7tc2fUHxqChbqCwOV6oZK/ 3CVVYsMH3beNP8RlV0CbhTRVhmjoqUysmb1W+z4jQlH+gb2avSDziI9niVPQ8vAhR C5zjkfOcCNMRnUYlUayNW3p0a68DWdeYJxIdFuMS70VgTCfwXVBWfqnVCUm6ISbIs IBV/px230m+lF/5TPTe1KCjPhb68txNd7TysHG75PJClK8zlH2vocu9IzTM+5DFui pHiVE8NgYwEBY9h/CA== X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a Received: from mx-amd-b650.users.agdsn.de ([141.30.226.129]) by mail.gmx.net (mrgmx104 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MwQXN-1rMfpu0oSr-00sLCa; Thu, 23 Nov 2023 01:48:51 +0100 From: Armin Wolf To: pali@kernel.org Cc: jdelvare@suse.com, linux@roeck-us.net, hdegoede@redhat.com, markgross@kernel.org, ilpo.jarvinen@linux.intel.com, platform-driver-x86@vger.kernel.org, linux-hwmon@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v4 8/9] hwmon: (dell-smm) Document the WMI SMM interface Date: Thu, 23 Nov 2023 01:48:19 +0100 Message-Id: <20231123004820.50635-9-W_Armin@gmx.de> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20231123004820.50635-1-W_Armin@gmx.de> References: <20231123004820.50635-1-W_Armin@gmx.de> MIME-Version: 1.0 X-Provags-ID: V03:K1:jfeSQcpPOAV12U7567kj2GLK7TAcbn+LqR+47Zhm2vMDhL47PDT kH/3wLvLTHRuKXeW9AnRV7+T889shCc9R1mOwcP17d3PEstgxlLEtFv2A4dmAW/fTg8V48n a6laLjfk28PRBUdKv2ZmohZyVhUS0yZNTDkZScvM4XbGROwrY64KVhX7niMk2rznXyEy6Kl Iv4sFQ3caidVxOZgrE6SQ== UI-OutboundReport: notjunk:1;M01:P0:8JXhW/qO+Zs=;h+T4cUIgBQMOQdKZEU/teBj3t4n i7AQl3qZyclJo4S+GOIwYibtiZdooOORDmwWgbUXX9Mx27iuc50to6wffpCJSZviCvMjE0BPt YR4NkCbI6szgJgc5p89HcRVyM+eShAdI9J/cQcm6e8AToRkvdzxqvcJsBErpqbJfaSX8/kbGE StFPuQXDIf5yaclpnbrFGK8lNrPX6iTKgpaNRSLLJfIniI+Z/7XLT4lh6UDi7My+xSQFE2hXs T+BT4REcOn5vuyhe2tk78hEtGKIdaWsh8pjrXjFfm/dTJSz+8pEwRunbFqTllfl7t8vPXjBkc zUOFS0jM7dSVI5C/sg9+RI6udbe3vDt+kv5w6Lk1EKXybghY2TBReHqxtRhWgeVOkh8uQfeCk skigdNF26DvAHS5UDj/pxcQJmF/dRXQYeWJjtA0kCarYsmqnl2pm8gLEjjj7wrYQkU0vt0/MU nL1wkqXO72ZDtz8v9Pcdr6Su0WSDCGADOWUYULuOZFaNeCfRCiuCl1fk0RozeKCdTd0E3DTCE RdA89SnXNAVaN0PVMiXzRIXqaMZUBau/ONxEEQ3cBoHDjqQL/N0ypYcuq140DNh2EXcCvpITB kGMDOJkF6PWvE9EqyIMhXRs+DTNmMJF7IcR/a/Xp6czr0XMvpGTTKVs/aVL692C7mS0fu1TeC d57+HARJOEvXr4p7fVUtGtQIH8GoXnvHj1aLsyrtWIT82kJxqi2NvPdEuP729QRXn1g+aUxF4 m4qT8H7mPgmLYsgiwAGurL2LAD/KiUtdba1K9wHZ4p/qu33wiReUBEjz69Jsv+DhLHqEpRifu f3AohTK+0RN7lIfjIFNY6jvN8zrLc6dXDtepZqQ5Rf0/sSfiAZSOWL6KvBEW8d3TWpyrDKOJc usV0DFgtzutjNz7FZsSwqA5IgnJV+ke370JTrGls6z/UhOV4ZjOvZgsGcCmb9R6uVK1Ye9Nvo 3im6R+Q1GYDYuQC6dLw9f9jOO7U= X-Spam-Status: No, score=-0.6 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Wed, 22 Nov 2023 16:50:29 -0800 (PST) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1783313978395080696 X-GMAIL-MSGID: 1783313978395080696 Document the WMI SMM interface so that future developers can better understand how it works. Reviewed-by: Hans de Goede Signed-off-by: Armin Wolf --- Documentation/hwmon/dell-smm-hwmon.rst | 38 ++++++++++++++++++++++++-- 1 file changed, 35 insertions(+), 3 deletions(-) -- 2.39.2 diff --git a/Documentation/hwmon/dell-smm-hwmon.rst b/Documentation/hwmon/dell-smm-hwmon.rst index d8f1d6859b96..977263cb57a8 100644 --- a/Documentation/hwmon/dell-smm-hwmon.rst +++ b/Documentation/hwmon/dell-smm-hwmon.rst @@ -186,8 +186,7 @@ SMM Interface The driver uses the SMM interface to send commands to the system BIOS. This interface is normally used by Dell's 32-bit diagnostic program or on newer notebook models by the buildin BIOS diagnostics. -The SMM is triggered by writing to the special ioports ``0xb2`` and ``0x84``, -and may cause short hangs when the BIOS code is taking too long to +The SMM may cause short hangs when the BIOS code is taking too long to execute. The SMM handler inside the system BIOS looks at the contents of the @@ -210,7 +209,40 @@ The SMM handler can signal a failure by either: - setting the lower sixteen bits of ``eax`` to ``0xffff`` - not modifying ``eax`` at all -- setting the carry flag +- setting the carry flag (legacy SMM interface only) + +Legacy SMM Interface +-------------------- + +When using the legacy SMM interface, a SMM is triggered by writing the least significant byte +of the command code to the special ioports ``0xb2`` and ``0x84``. This interface is not +described inside the ACPI tables and can thus only be detected by issuing a test SMM call. + +WMI SMM Interface +----------------- + +On modern Dell machines, the SMM calls are done over ACPI WMI: + +:: + + #pragma namespace("\\\\.\\root\\dcim\\sysman\\diagnostics") + [WMI, Provider("Provider_DiagnosticsServices"), Dynamic, Locale("MS\\0x409"), + Description("RunDellDiag"), guid("{F1DDEE52-063C-4784-A11E-8A06684B9B01}")] + class LegacyDiags { + [key, read] string InstanceName; + [read] boolean Active; + + [WmiMethodId(1), Implemented, read, write, Description("Legacy Method ")] + void Execute([in, out] uint32 EaxLen, [in, out, WmiSizeIs("EaxLen") : ToInstance] uint8 EaxVal[], + [in, out] uint32 EbxLen, [in, out, WmiSizeIs("EbxLen") : ToInstance] uint8 EbxVal[], + [in, out] uint32 EcxLen, [in, out, WmiSizeIs("EcxLen") : ToInstance] uint8 EcxVal[], + [in, out] uint32 EdxLen, [in, out, WmiSizeIs("EdxLen") : ToInstance] uint8 EdxVal[]); + }; + +Some machines support only the WMI SMM interface, while some machines support both interfaces. +The driver automatically detects which interfaces are present and will use the WMI SMM interface +if the legacy SMM interface is not present. The WMI SMM interface is usually slower than the +legacy SMM interface since ACPI methods need to be called in order to trigger a SMM. SMM command codes -----------------