From nobody Mon Nov 10 12:51:57 2025 Delivered-To: importer@patchew.org Received-SPF: temperror (zoho.com: Error in retrieving data from DNS) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=temperror (zoho.com: Error in retrieving data from DNS) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1556189654; cv=none; d=zoho.com; s=zohoarc; b=MgeBAgU5U1kWcCkC85/O15Iz9gheHtUIO6pgwBSpqqfQkAo4ic6sasWXF+sPRBK5wq2lx+6PGovP+87YbsD6YuFuRMug14eJgCR05NC8P+eyCKOXd+dQJ8cexaHdj5z6sW0k68WHiBnrfUyOfSoFMh+96ISEVfaX9gslR+upCuI= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1556189654; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=05t2EJlmncjBM4RP5ZqF4g9EYArKHC0suBSsixwzP4E=; b=Hy9AJH6jZs6Dj7U4B0B2K2XSW8zrQHsmwa5zYQ2vHq//5azt4OmzdWBW7DSIIIL/AMqFcnB0aiejkdmvkUgGS3D/OEHS1k8fq0emGAXavUnrkBYilBE9gzeQo4uEU7sjBfmTc42nGgKJ73i3eNcWE27DrjJPysdTCRkVWaqvKIw= ARC-Authentication-Results: i=1; mx.zoho.com; spf=temperror (zoho.com: Error in retrieving data from DNS) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (209.51.188.17 [209.51.188.17]) by mx.zohomail.com with SMTPS id 1556189654780935.9987829619871; Thu, 25 Apr 2019 03:54:14 -0700 (PDT) Received: from localhost ([127.0.0.1]:55174 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hJc0s-0004eN-2c for importer@patchew.org; Thu, 25 Apr 2019 06:53:58 -0400 Received: from eggs.gnu.org ([209.51.188.92]:54572) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hJbyr-0003IL-5R for qemu-devel@nongnu.org; Thu, 25 Apr 2019 06:51:54 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hJbqq-0000Np-CR for qemu-devel@nongnu.org; Thu, 25 Apr 2019 06:43:37 -0400 Received: from mx1.redhat.com ([209.132.183.28]:47976) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hJbqq-0000Ls-2e for qemu-devel@nongnu.org; Thu, 25 Apr 2019 06:43:36 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 486288123D for ; Thu, 25 Apr 2019 10:43:35 +0000 (UTC) Received: from lacos-laptop-7.usersys.redhat.com (ovpn-120-105.rdu2.redhat.com [10.10.120.105]) by smtp.corp.redhat.com (Postfix) with ESMTP id EFBFF5D9C5; Thu, 25 Apr 2019 10:43:32 +0000 (UTC) From: Laszlo Ersek To: qemu devel list Date: Thu, 25 Apr 2019 12:43:25 +0200 Message-Id: <20190425104326.12835-2-lersek@redhat.com> In-Reply-To: <20190425104326.12835-1-lersek@redhat.com> References: <20190425104326.12835-1-lersek@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 25 Apr 2019 10:43:35 +0000 (UTC) Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH 1/2] tests/uefi-test-tools: report the SMBIOS entry point structures X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Igor Mammedov , =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Type: text/plain; charset="utf-8" On UEFI systems, the SMBIOS entry point (a.k.a. anchor) structures are found similarly to the ACPI RSD PTR table(s): by scanning the ConfigurationTable array in the EFI system table for well-known GUIDs. Locate the SMBIOS 2.1 (32-bit) and 3.0 (64-bit) anchors in the BiosTablesTest UEFI application, and report the addresses in new fields appended to the BIOS_TABLES_TEST structure. Cc: "Philippe Mathieu-Daud=C3=A9" Cc: Igor Mammedov Launchpad: https://bugs.launchpad.net/qemu/+bug/1821884 Signed-off-by: Laszlo Ersek Reviewed-by: Igor Mammedov Reviewed-by: Philippe Mathieu-Daud=C3=A9 --- tests/uefi-test-tools/UefiTestToolsPkg/Include/Guid/BiosTablesTest.h |= 25 +++++++++++++++----- tests/uefi-test-tools/UefiTestToolsPkg/BiosTablesTest/BiosTablesTest.inf |= 2 ++ tests/uefi-test-tools/UefiTestToolsPkg/BiosTablesTest/BiosTablesTest.c |= 23 ++++++++++++++---- 3 files changed, 40 insertions(+), 10 deletions(-) diff --git a/tests/uefi-test-tools/UefiTestToolsPkg/Include/Guid/BiosTables= Test.h b/tests/uefi-test-tools/UefiTestToolsPkg/Include/Guid/BiosTablesTest= .h index 0b72c61254af..7a74c121d596 100644 --- a/tests/uefi-test-tools/UefiTestToolsPkg/Include/Guid/BiosTablesTest.h +++ b/tests/uefi-test-tools/UefiTestToolsPkg/Include/Guid/BiosTablesTest.h @@ -1,13 +1,14 @@ /** @file - Expose the address(es) of the ACPI RSD PTR table(s) in a MB-aligned stru= cture - to the hypervisor. + Expose the address(es) of the ACPI RSD PTR table(s) and the SMBIOS entry + point(s) in a MB-aligned structure to the hypervisor. =20 The hypervisor locates the MB-aligned structure based on the signature G= UID - that is at offset 0 in the structure. Once the RSD PTR address(es) are - retrieved, the hypervisor may perform various ACPI checks. + that is at offset 0 in the structure. Once the RSD PTR and SMBIOS anchor + address(es) are retrieved, the hypervisor may perform various ACPI and S= MBIOS + checks. =20 - This feature is a development aid, for supporting ACPI table unit tests = in - hypervisors. Do not enable in production builds. + This feature is a development aid, for supporting ACPI and SMBIOS table = unit + tests in hypervisors. Do not enable in production builds. =20 Copyright (C) 2019, Red Hat, Inc. =20 @@ -61,6 +62,18 @@ typedef struct { // EFI_PHYSICAL_ADDRESS Rsdp10; EFI_PHYSICAL_ADDRESS Rsdp20; + // + // The Smbios21 and Smbios30 fields may be read when the signature GUID + // matches. Smbios21 is the guest-physical address of the SMBIOS 2.1 (32= -bit) + // Entry Point Structure from the SMBIOS v3.2.0 specification, in 8-byte + // little endian representation. Smbios30 is the guest-physical address = of + // the SMBIOS 3.0 (64-bit) Entry Point Structure from the same specifica= tion, + // in the same representation. Each of these fields may be zero + // (independently of the other) if the UEFI System Table does not provid= e the + // corresponding UEFI Configuration Table. + // + EFI_PHYSICAL_ADDRESS Smbios21; + EFI_PHYSICAL_ADDRESS Smbios30; } BIOS_TABLES_TEST; #pragma pack () =20 diff --git a/tests/uefi-test-tools/UefiTestToolsPkg/BiosTablesTest/BiosTabl= esTest.inf b/tests/uefi-test-tools/UefiTestToolsPkg/BiosTablesTest/BiosTabl= esTest.inf index 924d8a80d00b..708bc1e7982b 100644 --- a/tests/uefi-test-tools/UefiTestToolsPkg/BiosTablesTest/BiosTablesTest.= inf +++ b/tests/uefi-test-tools/UefiTestToolsPkg/BiosTablesTest/BiosTablesTest.= inf @@ -35,6 +35,8 @@ gBiosTablesTestGuid gEfiAcpi10TableGuid gEfiAcpi20TableGuid + gEfiSmbios3TableGuid + gEfiSmbiosTableGuid =20 [Packages] MdePkg/MdePkg.dec diff --git a/tests/uefi-test-tools/UefiTestToolsPkg/BiosTablesTest/BiosTabl= esTest.c b/tests/uefi-test-tools/UefiTestToolsPkg/BiosTablesTest/BiosTables= Test.c index b208e17fb00f..75891e68ec20 100644 --- a/tests/uefi-test-tools/UefiTestToolsPkg/BiosTablesTest/BiosTablesTest.c +++ b/tests/uefi-test-tools/UefiTestToolsPkg/BiosTablesTest/BiosTablesTest.c @@ -14,6 +14,7 @@ =20 #include #include +#include #include #include #include @@ -55,6 +56,8 @@ BiosTablesTestMain ( volatile BIOS_TABLES_TEST *BiosTablesTest; CONST VOID *Rsdp10; CONST VOID *Rsdp20; + CONST VOID *Smbios21; + CONST VOID *Smbios30; CONST EFI_CONFIGURATION_TABLE *ConfigTable; CONST EFI_CONFIGURATION_TABLE *ConfigTablesEnd; volatile EFI_GUID *InverseSignature; @@ -77,31 +80,43 @@ BiosTablesTestMain ( } =20 // - // Locate both gEfiAcpi10TableGuid and gEfiAcpi20TableGuid config tables= in - // one go. + // Locate all the gEfiAcpi10TableGuid, gEfiAcpi20TableGuid, + // gEfiSmbiosTableGuid, gEfiSmbios3TableGuid config tables in one go. // Rsdp10 =3D NULL; Rsdp20 =3D NULL; + Smbios21 =3D NULL; + Smbios30 =3D NULL; ConfigTable =3D gST->ConfigurationTable; ConfigTablesEnd =3D gST->ConfigurationTable + gST->NumberOfTableEntries; - while ((Rsdp10 =3D=3D NULL || Rsdp20 =3D=3D NULL) && ConfigTable < Confi= gTablesEnd) { + while ((Rsdp10 =3D=3D NULL || Rsdp20 =3D=3D NULL || + Smbios21 =3D=3D NULL || Smbios30 =3D=3D NULL) && + ConfigTable < ConfigTablesEnd) { if (CompareGuid (&ConfigTable->VendorGuid, &gEfiAcpi10TableGuid)) { Rsdp10 =3D ConfigTable->VendorTable; } else if (CompareGuid (&ConfigTable->VendorGuid, &gEfiAcpi20TableGuid= )) { Rsdp20 =3D ConfigTable->VendorTable; + } else if (CompareGuid (&ConfigTable->VendorGuid, &gEfiSmbiosTableGuid= )) { + Smbios21 =3D ConfigTable->VendorTable; + } else if (CompareGuid (&ConfigTable->VendorGuid, &gEfiSmbios3TableGui= d)) { + Smbios30 =3D ConfigTable->VendorTable; } ++ConfigTable; } =20 AsciiPrint ("%a: BiosTablesTest=3D%p Rsdp10=3D%p Rsdp20=3D%p\n", gEfiCallerBaseName, Pages, Rsdp10, Rsdp20); + AsciiPrint ("%a: Smbios21=3D%p Smbios30=3D%p\n", gEfiCallerBaseName, Smb= ios21, + Smbios30); =20 // - // Store the RSD PTR address(es) first, then the signature second. + // Store the config table addresses first, then the signature second. // BiosTablesTest =3D Pages; BiosTablesTest->Rsdp10 =3D (UINTN)Rsdp10; BiosTablesTest->Rsdp20 =3D (UINTN)Rsdp20; + BiosTablesTest->Smbios21 =3D (UINTN)Smbios21; + BiosTablesTest->Smbios30 =3D (UINTN)Smbios30; =20 MemoryFence(); =20 --=20 2.19.1.3.g30247aa5d201