From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 60B56C433DF for ; Wed, 14 Oct 2020 09:59:46 +0000 (UTC) Received: from lists.ozlabs.org (lists.ozlabs.org [203.11.71.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 5541B20757 for ; Wed, 14 Oct 2020 09:59:44 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=yadro.com header.i=@yadro.com header.b="XNBhw3pk" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 5541B20757 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=yadro.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=openbmc-bounces+openbmc=archiver.kernel.org@lists.ozlabs.org Received: from bilbo.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3]) by lists.ozlabs.org (Postfix) with ESMTP id 4CB7Ds5lygzDqXd for ; Wed, 14 Oct 2020 20:59:41 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=yadro.com (client-ip=89.207.88.252; helo=mta-01.yadro.com; envelope-from=a.kartashev@yadro.com; receiver=) Authentication-Results: lists.ozlabs.org; dmarc=pass (p=none dis=none) header.from=yadro.com Authentication-Results: lists.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=yadro.com header.i=@yadro.com header.a=rsa-sha256 header.s=mta-01 header.b=XNBhw3pk; dkim-atps=neutral Received: from mta-01.yadro.com (mta-02.yadro.com [89.207.88.252]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4CB7Bv2rGwzDqYt for ; Wed, 14 Oct 2020 20:57:59 +1100 (AEDT) Received: from localhost (unknown [127.0.0.1]) by mta-01.yadro.com (Postfix) with ESMTP id BCDA84137C for ; Wed, 14 Oct 2020 09:57:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=yadro.com; h= content-transfer-encoding:mime-version:user-agent:content-type :content-type:organization:references:in-reply-to:date:date:from :from:subject:subject:message-id:received:received:received; s= mta-01; t=1602669471; x=1604483872; bh=56VAc1P4279HzD/OwCcTu2xu7 t/uDZZAinmLSehFXOw=; b=XNBhw3pkQB9A1bsM5lxrAFazuM6vjISOTdRsaFMxk EkJuzQa2d9tg4YEgmL18+nZ5J3bKJniWkHJULIeeYpDPFHTPqrKG5istpeRq2FGp N1FvNKYLVBugSt72B9CioT41RGAi+IJe95nrFgDC+PVzM3tbX+bRj0VmHFa4wBIR Ko= X-Virus-Scanned: amavisd-new at yadro.com Received: from mta-01.yadro.com ([127.0.0.1]) by localhost (mta-01.yadro.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OPthPFzAcCqp for ; Wed, 14 Oct 2020 12:57:51 +0300 (MSK) Received: from T-EXCH-04.corp.yadro.com (t-exch-04.corp.yadro.com [172.17.100.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mta-01.yadro.com (Postfix) with ESMTPS id B4B63412D0 for ; Wed, 14 Oct 2020 12:57:51 +0300 (MSK) Received: from [10.199.1.14] (10.199.1.14) by T-EXCH-04.corp.yadro.com (172.17.100.104) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.669.32; Wed, 14 Oct 2020 12:57:51 +0300 Message-ID: <6853d70a5f647ac66dded94db7425de046e238cb.camel@yadro.com> Subject: Re: [redfish/v1/Systems/system/Processors] How does it work on wolf pass? From: Andrei Kartashev To: Date: Wed, 14 Oct 2020 12:57:50 +0300 In-Reply-To: References: <943f9c80-1f3c-b64d-1cb7-02b90d999be2@linux.intel.com> Organization: YADRO Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Originating-IP: [10.199.1.14] X-ClientProxiedBy: T-EXCH-01.corp.yadro.com (172.17.10.101) To T-EXCH-04.corp.yadro.com (172.17.100.104) X-BeenThere: openbmc@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development list for OpenBMC List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: openbmc-bounces+openbmc=archiver.kernel.org@lists.ozlabs.org Sender: "openbmc" Hi Brad, It is already pulled: https://github.com/openbmc/smbios-mdr/ But.. The main problem here is that the BIOS has to know it should share smbios table. Currently we struggling this problem since our BIOS lack this ability and we have to implement it in BIOS. BTW, I first time see this patch. According to what I know, today's implementation is sending smbios table from BIOS to BMC via ipmi. There are OEM commands for this implemented in intel-ipmi-oem. On Wed, 2020-10-14 at 17:06 +0800, Brad Chou wrote: > Hi Bills, > > I am also interesting in this kind of SMBIOS table processing. > > May I know if Intel has plan to pull this feature into > https://github.com/openbmc ? > > > By the way, I notice that a patch is also required to make it work. > > https://github.com/Intel-BMC/openbmc/blob/4c732e83b4ca9a869c0a3f6e9b7e22ac9c76a78f/meta-openbmc-mods/meta-common/recipes-kernel/linux/linux-aspeed/0035-Implement-a-memory-driver-share-memory.patch > > It says BIOS is using BMC VGA shared memory to transfer the whole > SMBIOS > table to BMC, particularly a 16MB size memory allocated at > 0x9ff0:0000. > > My question is, if the BMC VGA memory hardware strap settings is > 64MB, > that is BMC already occupy all VGA memory as frame buffer. > > Can BIOS still use the VGA share memory to transfer SMBIOS table ? > > > Brad Chou > > > On 10/13/20 12:23 AM, Bills, Jason M wrote: > > [External E-mail] CAUTION: This email originated from outside of > > the > > organization. Do not click links or open attachments unless you > > recognize the sender and know the content is safe. > > > > > > > > > > On 10/9/2020 5:57 PM, Zhenfei Tai wrote: > > > Hi, > > > > > > I've been testing bmcweb and noticed the response from the URI > > > `redfish/v1/Systems/system/Processors` contains an empty > > > collection. > > > > > > { > > > "@odata.context": > > > "/redfish/v1/$metadata#ProcessorCollection.ProcessorCollection", > > > "@odata.id ;": > > > "/redfish/v1/Systems/system/Processors/", > > > "@odata.type": "#ProcessorCollection.ProcessorCollection", > > > "Members": [], > > > "Members@odata.count": 0, > > > "Name": "Processor Collection" > > > } > > > > > > Looking at bmcweb code, it seems to look for dbus interfaces > > > `xyz.openbmc_project.Inventory.Item.Cpu` and > > > `xyz.openbmc_project.Inventory.Item.Accelerator`. However they > > > can't > > > be seen in dbus. > > > > > > # busctl tree --no-pager xyz.openbmc_project.Inventory.Item.Cpu > > > Failed to introspect object / of service > > > xyz.openbmc_project.Inventory.Item.Cpu: The name is not > > > activatable > > > > > > Entity-manager and cpu-sensor are running in addition to bmcweb. > > > The > > > entity-manager config is below and I can see the config is picked > > > up > > > in `xyz.openbmc_project.EntityManager`. > > > > > > { > > > "Exposes": [ > > > { > > > "Address": "0x30", > > > "Bus": 0, > > > "CpuID": 1, > > > "Name": "CPU 1", > > > "Type": "XeonCPU" > > > }, > > > { > > > "Address": "0x31", > > > "Bus": 0, > > > "CpuID": 2, > > > "Name": "CPU 2", > > > "Type": "XeonCPU" > > > } > > > ], > > > "Name": "internal_code_name", > > > "Probe": > > > "xyz.openbmc_project.FruDevice({'BOARD_PRODUCT_NAME': > > > 'internal_product_name'})", > > > "Type": "Board" > > > } > > > > > > I'm not sure what else is required to have the URI work > > > properly. > > > Could someone familiar with this issue help? > > On Intel systems, we currently get most CPU information from the > > SMBIOS tables which are provided to the BMC through something > > called > > the MDR. That application is available here: > > https://github.com/Intel-BMC/mdrv2. > > > > When we have seen empty CPU or memory resource collections in > > Redfish, > > it has usually been caused by a failure to get the SMBIOS data from > > BIOS. > > > > > Thanks, > > > Zhenfei -- Best regards, Andrei Kartashev