From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id DA9CEC43331 for ; Wed, 25 Mar 2020 22:38:33 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id B82FB20658 for ; Wed, 25 Mar 2020 22:38:33 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727451AbgCYWid (ORCPT ); Wed, 25 Mar 2020 18:38:33 -0400 Received: from mga11.intel.com ([192.55.52.93]:25610 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727384AbgCYWic (ORCPT ); Wed, 25 Mar 2020 18:38:32 -0400 IronPort-SDR: z3UfsXyymmQ2a3fB8GnyEEHpQ6UKzAwElxvSKDzo4BErteOlwr/d61eClCekm48fTnW3gAkIz5 RjWA8C4LNOig== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Mar 2020 15:38:31 -0700 IronPort-SDR: WJpufqhInHMpKaD/eTIsZfNtUgyJCcvJW4kZRhUTVetTqUZXjUkDzT38LDF+dRj4o6UuY8CaI5 mmBKiCZrsplA== X-IronPort-AV: E=Sophos;i="5.72,306,1580803200"; d="scan'208";a="393774794" Received: from spandruv-mobl.amr.corp.intel.com ([10.134.90.138]) by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Mar 2020 15:38:30 -0700 Message-ID: <6f90d8fa0301b19ddae3e7558df6408e23f4e04b.camel@linux.intel.com> Subject: Re: [PATCH v2] platform: x86: Add ACPI driver for ChromeOS From: Srinivas Pandruvada To: Enric Balletbo i Serra , Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, vbendeb@chromium.org, groeck@chromium.org, bleung@chromium.org, dtor@chromium.org, gwendal@chromium.org, andy@infradead.org, Collabora Kernel ML , Ayman Bagabas , Darren Hart , Dmitry Torokhov , Jeremy Soller , Mattias Jacobsson <2pi@mok.nu>, Mauro Carvalho Chehab , Rajat Jain , Yauhen Kharuzhy , platform-driver-x86@vger.kernel.org Date: Wed, 25 Mar 2020 15:38:28 -0700 In-Reply-To: References: <20200322094334.1872663-1-enric.balletbo@collabora.com> <20200322111022.GA72939@kroah.com> <20200324164956.GE2518746@kroah.com> <3444110c-d6c0-16df-9b5d-12578ed442c5@collabora.com> <3166e472e0ef5c0db8da3ab7d846b47795e69057.camel@linux.intel.com> <51a98cae11de1529bdaa695a0c1eeb2043191b3f.camel@linux.intel.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.34.2 (3.34.2-1.fc31) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2020-03-25 at 22:54 +0100, Enric Balletbo i Serra wrote: > Hi Srinivas, > [cut] > Evaluating \CRHW.HWID > 0x1 Outstanding allocations after evaluation of \CRHW.HWID > Evaluation of \CRHW.HWID returned object 0x55b9e373fd60, external > buffer length 38 > [Package] Contains 1 Elements: > [String] Length 00 = "" > > > I found that the VBTx are addresses setup in the following file. > > src/vendorcode/google/chromeos/acpi/gnvs.asl: > > VBT0, 32, // 0x000 - Boot Reason > VBT1, 32, // 0x004 - Active Main Firmware > VBT2, 32, // 0x008 - Active EC Firmware > VBT3, 16, // 0x00c - CHSW > VBT4, 2048, // 0x00e - HWID > VBT5, 512, // 0x10e - FWID > VBT6, 512, // 0x14e - FRID > VBT7, 32, // 0x18e - active main firmware type > VBT8, 32, // 0x192 - Recovery Reason > VBT9, 32, // 0x196 - FMAP base address > CHVD, 24576, // 0x19a - VDAT space filled by verified boot > VBTA, 32, // 0xd9a - pointer to smbios FWID > MEHH, 256, // 0xd9e - Management Engine Hash > RMOB, 32, // 0xdbe - RAM oops base address > RMOL, 32, // 0xdc2 - RAM oops length > ROVP, 32, // 0xdc6 - pointer to RO_VPD > ROVL, 32, // 0xdca - size of RO_VPD > RWVP, 32, // 0xdce - pointer to RW_VPD > RWVL, 32, // 0xdd2 - size of RW_VPD > // 0xdd6 > > Can I assume that the info I want is only accessible in runtime and > is not > exported via the static tables? Yes. Basically these are pointing to a memory address. From user space you can't read this memory. We are planing to do something for this, but it will take sometime. Thanks, Srinivas > > Thanks, > Enric