linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Jerry Hoemann <jerry.hoemann@hpe.com>
To: Dan Williams <dan.j.williams@intel.com>
Cc: "linux-nvdimm@lists.01.org" <linux-nvdimm@lists.01.org>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>
Subject: Re: [PATCH v4 3/6] libnvdimm, acpi, nfit: Add bus level dsm mask for pass thru.
Date: Tue, 4 Jul 2017 14:08:49 -0600	[thread overview]
Message-ID: <20170704200849.GA15713@anatevka.americas.hpqcorp.net> (raw)
In-Reply-To: <CAPcyv4iMNjea939-E8of0nuyze8nHMEOp3ecii8+Y3pyYE0Ecw@mail.gmail.com>

On Sat, Jul 01, 2017 at 01:46:03PM -0700, Dan Williams wrote:
> On Sat, Jul 1, 2017 at 1:38 PM, Jerry Hoemann <jerry.hoemann@hpe.com> wrote:
> > On Sat, Jul 01, 2017 at 01:10:31PM -0700, Dan Williams wrote:
> >> On Sat, Jul 1, 2017 at 1:08 PM, Dan Williams <dan.j.williams@intel.com> wrote:
> >> > On Sat, Jul 1, 2017 at 12:58 PM, Jerry Hoemann <jerry.hoemann@hpe.com> wrote:
> >> >> On Fri, Jun 30, 2017 at 08:55:22PM -0700, Dan Williams wrote:
> >> >>
> >> >> ...
> >> >>
> >> >>> On Fri, Jun 30, 2017 at 9:09 AM, Jerry Hoemann <jerry.hoemann@hpe.com> wrote:
> >> >>> > +               if (cmd == ND_CMD_CALL)
> >> >>> > +                       dsm_mask = nd_desc->bus_dsm_mask;
> >> >>> >                 desc = nd_cmd_bus_desc(cmd);
> >> >>> >                 uuid = to_nfit_uuid(NFIT_DEV_BUS);
> >> >>> >                 handle = adev->handle;
> >> >>> > @@ -1613,6 +1615,7 @@ static void acpi_nfit_init_dsms(struct acpi_nfit_desc *acpi_desc)
> >> >>> >         struct nvdimm_bus_descriptor *nd_desc = &acpi_desc->nd_desc;
> >> >>> >         const u8 *uuid = to_nfit_uuid(NFIT_DEV_BUS);
> >> >>> >         struct acpi_device *adev;
> >> >>> > +       unsigned long dsm_mask;
> >> >>> >         int i;
> >> >>> >
> >> >>> >         nd_desc->cmd_mask = acpi_desc->bus_cmd_force_en;
> >> >>> > @@ -1624,6 +1627,11 @@ static void acpi_nfit_init_dsms(struct acpi_nfit_desc *acpi_desc)
> >> >>> >                 if (acpi_check_dsm(adev->handle, uuid, 1, 1ULL << i))
> >> >>> >                         set_bit(i, &nd_desc->cmd_mask);
> >> >>> >         set_bit(ND_CMD_CALL, &nd_desc->cmd_mask);
> >> >>> > +
> >> >>> > +       dsm_mask = 0x3bf;
> >> >>>
> >> >>> I went ahead and fixed this up to use dsm_mask defined like this:
> >> >>>
> >> >>> +       dsm_mask =
> >> >>> +               (1 << ND_CMD_ARS_CAP) |
> >> >>> +               (1 << ND_CMD_ARS_START) |
> >> >>> +               (1 << ND_CMD_ARS_STATUS) |
> >> >>> +               (1 << ND_CMD_CLEAR_ERROR) |
> >> >>> +               (1 << NFIT_CMD_TRANSLATE_SPA) |
> >> >>> +               (1 << NFIT_CMD_ARS_INJECT_SET) |
> >> >>> +               (1 << NFIT_CMD_ARS_INJECT_CLEAR) |
> >> >>> +               (1 << NFIT_CMD_ARS_INJECT_GET);
> >> >>>
> >> >>> This drops function number 0 which userspace has no need to call.
> >> >>
> >> >> Actually I like to call function 0.  Its an excellent test when
> >> >> modifying the code path as its a no side effects function whose output
> >> >> is known in advance and instantly recognizable.  I also use it when
> >> >> testing new firmware.
> >> >>
> >> >> What is the downside to allowing it?  What bad things happen?
> >> >
> >> > It allows implementations to bypass the standardization process and
> >> > ship new root DSMs. It's always possible to patch the kernel locally
> >> > for development, so I see no reason to ship this capability globally.
> >
> > I don't understand this comment, but I think your next comment
> > essentially says to disregard this comment?
> 
> Yes, sorry.
> 
> >> Actually, just the discovery portion does not lead to this leak, but
> >> it's redundant when we have the 'dsm_mask' sysfs attribute.
> >
> > No.  The generation of the mask in sysfs is not done by
> > executing the code in acpi_nfit_ctl.  One of the reasons I call
> > function 0 to test changes I am making to the ioctl path itself.
> > The sysfs has nothing to do with that path and cannot be used
> > to serve this purpose.
> >
> > And since the content of sysfs has been edited it also can not be
> > used as a basic test of firmware.
> >
> > What is the downside to allowing the calling of function 0?
> 
> It needlessly expands the kernel ABI. I would suggest, if you want to

No.  It is not needless.  It is not an ABI extension.
Same goes for the override feature.

I hope that ACPI doesn't extend the specification in the future because
we'll just have to redo these patches yet again.



-- 

-----------------------------------------------------------------------------
Jerry Hoemann                  Software Engineer   Hewlett Packard Enterprise
-----------------------------------------------------------------------------

  reply	other threads:[~2017-07-04 20:08 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-06-30 16:09 [PATCH v3 0/7] Enable DSM pass thru for root functions Jerry Hoemann
2017-06-30 16:09 ` [PATCH v4 1/6] libnvdimm: passthru functions clear to send Jerry Hoemann
2017-06-30 16:09 ` [PATCH v4 2/6] acpi, nfit: Enable DSM pass thru for root functions Jerry Hoemann
2017-06-30 16:09 ` [PATCH v4 3/6] libnvdimm, acpi, nfit: Add bus level dsm mask for pass thru Jerry Hoemann
2017-07-01  3:55   ` Dan Williams
2017-07-01 19:58     ` Jerry Hoemann
2017-07-01 20:08       ` Dan Williams
2017-07-01 20:10         ` Dan Williams
2017-07-01 20:38           ` Jerry Hoemann
2017-07-01 20:46             ` Dan Williams
2017-07-04 20:08               ` Jerry Hoemann [this message]
2017-07-04 20:37                 ` Dan Williams
2017-07-05 15:26                   ` Linda Knippers
2017-07-05 16:24                   ` Jerry Hoemann
2017-07-05 16:35                     ` Dan Williams
2017-07-05 23:14                       ` Jerry Hoemann
2017-07-06  5:25                         ` Dan Williams
2017-06-30 16:09 ` [PATCH v4 4/6] acpi, nfit: Show bus_dsm_mask in sysfs Jerry Hoemann
2017-06-30 16:09 ` [PATCH v4 5/6] libnvdimm: New ACPI 6.2 DSM functions Jerry Hoemann
2017-06-30 16:09 ` [PATCH v4 6/6] nfit allow override of root dsm mask Jerry Hoemann
2017-07-01  3:49   ` Dan Williams

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170704200849.GA15713@anatevka.americas.hpqcorp.net \
    --to=jerry.hoemann@hpe.com \
    --cc=dan.j.williams@intel.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-nvdimm@lists.01.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).