GNU Linux-libre 5.10.153-gnu1
[releases.git] / drivers / platform / x86 / dell-smbios-base.c
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  *  Common functions for kernel modules using Dell SMBIOS
4  *
5  *  Copyright (c) Red Hat <mjg@redhat.com>
6  *  Copyright (c) 2014 Gabriele Mazzotta <gabriele.mzt@gmail.com>
7  *  Copyright (c) 2014 Pali Rohár <pali@kernel.org>
8  *
9  *  Based on documentation in the libsmbios package:
10  *  Copyright (C) 2005-2014 Dell Inc.
11  */
12 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13
14 #include <linux/kernel.h>
15 #include <linux/module.h>
16 #include <linux/capability.h>
17 #include <linux/dmi.h>
18 #include <linux/err.h>
19 #include <linux/mutex.h>
20 #include <linux/platform_device.h>
21 #include <linux/slab.h>
22 #include "dell-smbios.h"
23
24 static u32 da_supported_commands;
25 static int da_num_tokens;
26 static struct platform_device *platform_device;
27 static struct calling_interface_token *da_tokens;
28 static struct device_attribute *token_location_attrs;
29 static struct device_attribute *token_value_attrs;
30 static struct attribute **token_attrs;
31 static DEFINE_MUTEX(smbios_mutex);
32
33 struct smbios_device {
34         struct list_head list;
35         struct device *device;
36         int (*call_fn)(struct calling_interface_buffer *arg);
37 };
38
39 struct smbios_call {
40         u32 need_capability;
41         int cmd_class;
42         int cmd_select;
43 };
44
45 /* calls that are whitelisted for given capabilities */
46 static struct smbios_call call_whitelist[] = {
47         /* generally tokens are allowed, but may be further filtered or
48          * restricted by token blacklist or whitelist
49          */
50         {CAP_SYS_ADMIN, CLASS_TOKEN_READ,       SELECT_TOKEN_STD},
51         {CAP_SYS_ADMIN, CLASS_TOKEN_READ,       SELECT_TOKEN_AC},
52         {CAP_SYS_ADMIN, CLASS_TOKEN_READ,       SELECT_TOKEN_BAT},
53         {CAP_SYS_ADMIN, CLASS_TOKEN_WRITE,      SELECT_TOKEN_STD},
54         {CAP_SYS_ADMIN, CLASS_TOKEN_WRITE,      SELECT_TOKEN_AC},
55         {CAP_SYS_ADMIN, CLASS_TOKEN_WRITE,      SELECT_TOKEN_BAT},
56         /* used by userspace: fwupdate */
57         {CAP_SYS_ADMIN, CLASS_ADMIN_PROP,       SELECT_ADMIN_PROP},
58         /* used by userspace: fwupd */
59         {CAP_SYS_ADMIN, CLASS_INFO,             SELECT_DOCK},
60         {CAP_SYS_ADMIN, CLASS_FLASH_INTERFACE,  SELECT_FLASH_INTERFACE},
61 };
62
63 /* calls that are explicitly blacklisted */
64 static struct smbios_call call_blacklist[] = {
65         {0x0000,  1,  7}, /* manufacturing use */
66         {0x0000,  6,  5}, /* manufacturing use */
67         {0x0000, 11,  3}, /* write once */
68         {0x0000, 11,  7}, /* write once */
69         {0x0000, 11, 11}, /* write once */
70         {0x0000, 19, -1}, /* diagnostics */
71         /* handled by kernel: dell-laptop */
72         {0x0000, CLASS_INFO, SELECT_RFKILL},
73         {0x0000, CLASS_KBD_BACKLIGHT, SELECT_KBD_BACKLIGHT},
74 };
75
76 struct token_range {
77         u32 need_capability;
78         u16 min;
79         u16 max;
80 };
81
82 /* tokens that are whitelisted for given capabilities */
83 static struct token_range token_whitelist[] = {
84         /* used by userspace: fwupdate */
85         {CAP_SYS_ADMIN, CAPSULE_EN_TOKEN,       CAPSULE_DIS_TOKEN},
86         /* can indicate to userspace that WMI is needed */
87         {0x0000,        WSMT_EN_TOKEN,          WSMT_DIS_TOKEN}
88 };
89
90 /* tokens that are explicitly blacklisted */
91 static struct token_range token_blacklist[] = {
92         {0x0000, 0x0058, 0x0059}, /* ME use */
93         {0x0000, 0x00CD, 0x00D0}, /* raid shadow copy */
94         {0x0000, 0x013A, 0x01FF}, /* sata shadow copy */
95         {0x0000, 0x0175, 0x0176}, /* write once */
96         {0x0000, 0x0195, 0x0197}, /* diagnostics */
97         {0x0000, 0x01DC, 0x01DD}, /* manufacturing use */
98         {0x0000, 0x027D, 0x0284}, /* diagnostics */
99         {0x0000, 0x02E3, 0x02E3}, /* manufacturing use */
100         {0x0000, 0x02FF, 0x02FF}, /* manufacturing use */
101         {0x0000, 0x0300, 0x0302}, /* manufacturing use */
102         {0x0000, 0x0325, 0x0326}, /* manufacturing use */
103         {0x0000, 0x0332, 0x0335}, /* fan control */
104         {0x0000, 0x0350, 0x0350}, /* manufacturing use */
105         {0x0000, 0x0363, 0x0363}, /* manufacturing use */
106         {0x0000, 0x0368, 0x0368}, /* manufacturing use */
107         {0x0000, 0x03F6, 0x03F7}, /* manufacturing use */
108         {0x0000, 0x049E, 0x049F}, /* manufacturing use */
109         {0x0000, 0x04A0, 0x04A3}, /* disagnostics */
110         {0x0000, 0x04E6, 0x04E7}, /* manufacturing use */
111         {0x0000, 0x4000, 0x7FFF}, /* internal BIOS use */
112         {0x0000, 0x9000, 0x9001}, /* internal BIOS use */
113         {0x0000, 0xA000, 0xBFFF}, /* write only */
114         {0x0000, 0xEFF0, 0xEFFF}, /* internal BIOS use */
115         /* handled by kernel: dell-laptop */
116         {0x0000, BRIGHTNESS_TOKEN,      BRIGHTNESS_TOKEN},
117         {0x0000, KBD_LED_OFF_TOKEN,     KBD_LED_AUTO_TOKEN},
118         {0x0000, KBD_LED_AC_TOKEN,      KBD_LED_AC_TOKEN},
119         {0x0000, KBD_LED_AUTO_25_TOKEN, KBD_LED_AUTO_75_TOKEN},
120         {0x0000, KBD_LED_AUTO_100_TOKEN,        KBD_LED_AUTO_100_TOKEN},
121         {0x0000, GLOBAL_MIC_MUTE_ENABLE,        GLOBAL_MIC_MUTE_DISABLE},
122 };
123
124 static LIST_HEAD(smbios_device_list);
125
126 int dell_smbios_error(int value)
127 {
128         switch (value) {
129         case 0: /* Completed successfully */
130                 return 0;
131         case -1: /* Completed with error */
132                 return -EIO;
133         case -2: /* Function not supported */
134                 return -ENXIO;
135         default: /* Unknown error */
136                 return -EINVAL;
137         }
138 }
139 EXPORT_SYMBOL_GPL(dell_smbios_error);
140
141 int dell_smbios_register_device(struct device *d, void *call_fn)
142 {
143         struct smbios_device *priv;
144
145         priv = devm_kzalloc(d, sizeof(struct smbios_device), GFP_KERNEL);
146         if (!priv)
147                 return -ENOMEM;
148         get_device(d);
149         priv->device = d;
150         priv->call_fn = call_fn;
151         mutex_lock(&smbios_mutex);
152         list_add_tail(&priv->list, &smbios_device_list);
153         mutex_unlock(&smbios_mutex);
154         dev_dbg(d, "Added device: %s\n", d->driver->name);
155         return 0;
156 }
157 EXPORT_SYMBOL_GPL(dell_smbios_register_device);
158
159 void dell_smbios_unregister_device(struct device *d)
160 {
161         struct smbios_device *priv;
162
163         mutex_lock(&smbios_mutex);
164         list_for_each_entry(priv, &smbios_device_list, list) {
165                 if (priv->device == d) {
166                         list_del(&priv->list);
167                         put_device(d);
168                         break;
169                 }
170         }
171         mutex_unlock(&smbios_mutex);
172         dev_dbg(d, "Remove device: %s\n", d->driver->name);
173 }
174 EXPORT_SYMBOL_GPL(dell_smbios_unregister_device);
175
176 int dell_smbios_call_filter(struct device *d,
177                             struct calling_interface_buffer *buffer)
178 {
179         u16 t = 0;
180         int i;
181
182         /* can't make calls over 30 */
183         if (buffer->cmd_class > 30) {
184                 dev_dbg(d, "class too big: %u\n", buffer->cmd_class);
185                 return -EINVAL;
186         }
187
188         /* supported calls on the particular system */
189         if (!(da_supported_commands & (1 << buffer->cmd_class))) {
190                 dev_dbg(d, "invalid command, supported commands: 0x%8x\n",
191                         da_supported_commands);
192                 return -EINVAL;
193         }
194
195         /* match against call blacklist  */
196         for (i = 0; i < ARRAY_SIZE(call_blacklist); i++) {
197                 if (buffer->cmd_class != call_blacklist[i].cmd_class)
198                         continue;
199                 if (buffer->cmd_select != call_blacklist[i].cmd_select &&
200                     call_blacklist[i].cmd_select != -1)
201                         continue;
202                 dev_dbg(d, "blacklisted command: %u/%u\n",
203                         buffer->cmd_class, buffer->cmd_select);
204                 return -EINVAL;
205         }
206
207         /* if a token call, find token ID */
208
209         if ((buffer->cmd_class == CLASS_TOKEN_READ ||
210              buffer->cmd_class == CLASS_TOKEN_WRITE) &&
211              buffer->cmd_select < 3) {
212                 /* tokens enabled ? */
213                 if (!da_tokens) {
214                         dev_dbg(d, "no token support on this system\n");
215                         return -EINVAL;
216                 }
217
218                 /* find the matching token ID */
219                 for (i = 0; i < da_num_tokens; i++) {
220                         if (da_tokens[i].location != buffer->input[0])
221                                 continue;
222                         t = da_tokens[i].tokenID;
223                         break;
224                 }
225
226                 /* token call; but token didn't exist */
227                 if (!t) {
228                         dev_dbg(d, "token at location %04x doesn't exist\n",
229                                 buffer->input[0]);
230                         return -EINVAL;
231                 }
232
233                 /* match against token blacklist */
234                 for (i = 0; i < ARRAY_SIZE(token_blacklist); i++) {
235                         if (!token_blacklist[i].min || !token_blacklist[i].max)
236                                 continue;
237                         if (t >= token_blacklist[i].min &&
238                             t <= token_blacklist[i].max)
239                                 return -EINVAL;
240                 }
241
242                 /* match against token whitelist */
243                 for (i = 0; i < ARRAY_SIZE(token_whitelist); i++) {
244                         if (!token_whitelist[i].min || !token_whitelist[i].max)
245                                 continue;
246                         if (t < token_whitelist[i].min ||
247                             t > token_whitelist[i].max)
248                                 continue;
249                         if (!token_whitelist[i].need_capability ||
250                             capable(token_whitelist[i].need_capability)) {
251                                 dev_dbg(d, "whitelisted token: %x\n", t);
252                                 return 0;
253                         }
254
255                 }
256         }
257         /* match against call whitelist */
258         for (i = 0; i < ARRAY_SIZE(call_whitelist); i++) {
259                 if (buffer->cmd_class != call_whitelist[i].cmd_class)
260                         continue;
261                 if (buffer->cmd_select != call_whitelist[i].cmd_select)
262                         continue;
263                 if (!call_whitelist[i].need_capability ||
264                     capable(call_whitelist[i].need_capability)) {
265                         dev_dbg(d, "whitelisted capable command: %u/%u\n",
266                         buffer->cmd_class, buffer->cmd_select);
267                         return 0;
268                 }
269                 dev_dbg(d, "missing capability %d for %u/%u\n",
270                         call_whitelist[i].need_capability,
271                         buffer->cmd_class, buffer->cmd_select);
272
273         }
274
275         /* not in a whitelist, only allow processes with capabilities */
276         if (capable(CAP_SYS_RAWIO)) {
277                 dev_dbg(d, "Allowing %u/%u due to CAP_SYS_RAWIO\n",
278                         buffer->cmd_class, buffer->cmd_select);
279                 return 0;
280         }
281
282         return -EACCES;
283 }
284 EXPORT_SYMBOL_GPL(dell_smbios_call_filter);
285
286 int dell_smbios_call(struct calling_interface_buffer *buffer)
287 {
288         int (*call_fn)(struct calling_interface_buffer *) = NULL;
289         struct device *selected_dev = NULL;
290         struct smbios_device *priv;
291         int ret;
292
293         mutex_lock(&smbios_mutex);
294         list_for_each_entry(priv, &smbios_device_list, list) {
295                 if (!selected_dev || priv->device->id >= selected_dev->id) {
296                         dev_dbg(priv->device, "Trying device ID: %d\n",
297                                 priv->device->id);
298                         call_fn = priv->call_fn;
299                         selected_dev = priv->device;
300                 }
301         }
302
303         if (!selected_dev) {
304                 ret = -ENODEV;
305                 pr_err("No dell-smbios drivers are loaded\n");
306                 goto out_smbios_call;
307         }
308
309         ret = call_fn(buffer);
310
311 out_smbios_call:
312         mutex_unlock(&smbios_mutex);
313         return ret;
314 }
315 EXPORT_SYMBOL_GPL(dell_smbios_call);
316
317 struct calling_interface_token *dell_smbios_find_token(int tokenid)
318 {
319         int i;
320
321         if (!da_tokens)
322                 return NULL;
323
324         for (i = 0; i < da_num_tokens; i++) {
325                 if (da_tokens[i].tokenID == tokenid)
326                         return &da_tokens[i];
327         }
328
329         return NULL;
330 }
331 EXPORT_SYMBOL_GPL(dell_smbios_find_token);
332
333 static BLOCKING_NOTIFIER_HEAD(dell_laptop_chain_head);
334
335 int dell_laptop_register_notifier(struct notifier_block *nb)
336 {
337         return blocking_notifier_chain_register(&dell_laptop_chain_head, nb);
338 }
339 EXPORT_SYMBOL_GPL(dell_laptop_register_notifier);
340
341 int dell_laptop_unregister_notifier(struct notifier_block *nb)
342 {
343         return blocking_notifier_chain_unregister(&dell_laptop_chain_head, nb);
344 }
345 EXPORT_SYMBOL_GPL(dell_laptop_unregister_notifier);
346
347 void dell_laptop_call_notifier(unsigned long action, void *data)
348 {
349         blocking_notifier_call_chain(&dell_laptop_chain_head, action, data);
350 }
351 EXPORT_SYMBOL_GPL(dell_laptop_call_notifier);
352
353 static void __init parse_da_table(const struct dmi_header *dm)
354 {
355         /* Final token is a terminator, so we don't want to copy it */
356         int tokens = (dm->length-11)/sizeof(struct calling_interface_token)-1;
357         struct calling_interface_token *new_da_tokens;
358         struct calling_interface_structure *table =
359                 container_of(dm, struct calling_interface_structure, header);
360
361         /*
362          * 4 bytes of table header, plus 7 bytes of Dell header
363          * plus at least 6 bytes of entry
364          */
365
366         if (dm->length < 17)
367                 return;
368
369         da_supported_commands = table->supportedCmds;
370
371         new_da_tokens = krealloc(da_tokens, (da_num_tokens + tokens) *
372                                  sizeof(struct calling_interface_token),
373                                  GFP_KERNEL);
374
375         if (!new_da_tokens)
376                 return;
377         da_tokens = new_da_tokens;
378
379         memcpy(da_tokens+da_num_tokens, table->tokens,
380                sizeof(struct calling_interface_token) * tokens);
381
382         da_num_tokens += tokens;
383 }
384
385 static void zero_duplicates(struct device *dev)
386 {
387         int i, j;
388
389         for (i = 0; i < da_num_tokens; i++) {
390                 if (da_tokens[i].tokenID == 0)
391                         continue;
392                 for (j = i+1; j < da_num_tokens; j++) {
393                         if (da_tokens[j].tokenID == 0)
394                                 continue;
395                         if (da_tokens[i].tokenID == da_tokens[j].tokenID) {
396                                 dev_dbg(dev, "Zeroing dup token ID %x(%x/%x)\n",
397                                         da_tokens[j].tokenID,
398                                         da_tokens[j].location,
399                                         da_tokens[j].value);
400                                 da_tokens[j].tokenID = 0;
401                         }
402                 }
403         }
404 }
405
406 static void __init find_tokens(const struct dmi_header *dm, void *dummy)
407 {
408         switch (dm->type) {
409         case 0xd4: /* Indexed IO */
410         case 0xd5: /* Protected Area Type 1 */
411         case 0xd6: /* Protected Area Type 2 */
412                 break;
413         case 0xda: /* Calling interface */
414                 parse_da_table(dm);
415                 break;
416         }
417 }
418
419 static int match_attribute(struct device *dev,
420                            struct device_attribute *attr)
421 {
422         int i;
423
424         for (i = 0; i < da_num_tokens * 2; i++) {
425                 if (!token_attrs[i])
426                         continue;
427                 if (strcmp(token_attrs[i]->name, attr->attr.name) == 0)
428                         return i/2;
429         }
430         dev_dbg(dev, "couldn't match: %s\n", attr->attr.name);
431         return -EINVAL;
432 }
433
434 static ssize_t location_show(struct device *dev,
435                              struct device_attribute *attr, char *buf)
436 {
437         int i;
438
439         if (!capable(CAP_SYS_ADMIN))
440                 return -EPERM;
441
442         i = match_attribute(dev, attr);
443         if (i > 0)
444                 return scnprintf(buf, PAGE_SIZE, "%08x", da_tokens[i].location);
445         return 0;
446 }
447
448 static ssize_t value_show(struct device *dev,
449                           struct device_attribute *attr, char *buf)
450 {
451         int i;
452
453         if (!capable(CAP_SYS_ADMIN))
454                 return -EPERM;
455
456         i = match_attribute(dev, attr);
457         if (i > 0)
458                 return scnprintf(buf, PAGE_SIZE, "%08x", da_tokens[i].value);
459         return 0;
460 }
461
462 static struct attribute_group smbios_attribute_group = {
463         .name = "tokens"
464 };
465
466 static struct platform_driver platform_driver = {
467         .driver = {
468                 .name = "dell-smbios",
469         },
470 };
471
472 static int build_tokens_sysfs(struct platform_device *dev)
473 {
474         char *location_name;
475         char *value_name;
476         size_t size;
477         int ret;
478         int i, j;
479
480         /* (number of tokens  + 1 for null terminated */
481         size = sizeof(struct device_attribute) * (da_num_tokens + 1);
482         token_location_attrs = kzalloc(size, GFP_KERNEL);
483         if (!token_location_attrs)
484                 return -ENOMEM;
485         token_value_attrs = kzalloc(size, GFP_KERNEL);
486         if (!token_value_attrs)
487                 goto out_allocate_value;
488
489         /* need to store both location and value + terminator*/
490         size = sizeof(struct attribute *) * ((2 * da_num_tokens) + 1);
491         token_attrs = kzalloc(size, GFP_KERNEL);
492         if (!token_attrs)
493                 goto out_allocate_attrs;
494
495         for (i = 0, j = 0; i < da_num_tokens; i++) {
496                 /* skip empty */
497                 if (da_tokens[i].tokenID == 0)
498                         continue;
499                 /* add location */
500                 location_name = kasprintf(GFP_KERNEL, "%04x_location",
501                                           da_tokens[i].tokenID);
502                 if (location_name == NULL)
503                         goto out_unwind_strings;
504                 sysfs_attr_init(&token_location_attrs[i].attr);
505                 token_location_attrs[i].attr.name = location_name;
506                 token_location_attrs[i].attr.mode = 0444;
507                 token_location_attrs[i].show = location_show;
508                 token_attrs[j++] = &token_location_attrs[i].attr;
509
510                 /* add value */
511                 value_name = kasprintf(GFP_KERNEL, "%04x_value",
512                                        da_tokens[i].tokenID);
513                 if (value_name == NULL)
514                         goto loop_fail_create_value;
515                 sysfs_attr_init(&token_value_attrs[i].attr);
516                 token_value_attrs[i].attr.name = value_name;
517                 token_value_attrs[i].attr.mode = 0444;
518                 token_value_attrs[i].show = value_show;
519                 token_attrs[j++] = &token_value_attrs[i].attr;
520                 continue;
521
522 loop_fail_create_value:
523                 kfree(location_name);
524                 goto out_unwind_strings;
525         }
526         smbios_attribute_group.attrs = token_attrs;
527
528         ret = sysfs_create_group(&dev->dev.kobj, &smbios_attribute_group);
529         if (ret)
530                 goto out_unwind_strings;
531         return 0;
532
533 out_unwind_strings:
534         while (i--) {
535                 kfree(token_location_attrs[i].attr.name);
536                 kfree(token_value_attrs[i].attr.name);
537         }
538         kfree(token_attrs);
539 out_allocate_attrs:
540         kfree(token_value_attrs);
541 out_allocate_value:
542         kfree(token_location_attrs);
543
544         return -ENOMEM;
545 }
546
547 static void free_group(struct platform_device *pdev)
548 {
549         int i;
550
551         sysfs_remove_group(&pdev->dev.kobj,
552                                 &smbios_attribute_group);
553         for (i = 0; i < da_num_tokens; i++) {
554                 kfree(token_location_attrs[i].attr.name);
555                 kfree(token_value_attrs[i].attr.name);
556         }
557         kfree(token_attrs);
558         kfree(token_value_attrs);
559         kfree(token_location_attrs);
560 }
561
562 static int __init dell_smbios_init(void)
563 {
564         int ret, wmi, smm;
565
566         if (!dmi_find_device(DMI_DEV_TYPE_OEM_STRING, "Dell System", NULL) &&
567             !dmi_find_device(DMI_DEV_TYPE_OEM_STRING, "www.dell.com", NULL)) {
568                 pr_err("Unable to run on non-Dell system\n");
569                 return -ENODEV;
570         }
571
572         dmi_walk(find_tokens, NULL);
573
574         ret = platform_driver_register(&platform_driver);
575         if (ret)
576                 goto fail_platform_driver;
577
578         platform_device = platform_device_alloc("dell-smbios", 0);
579         if (!platform_device) {
580                 ret = -ENOMEM;
581                 goto fail_platform_device_alloc;
582         }
583         ret = platform_device_add(platform_device);
584         if (ret)
585                 goto fail_platform_device_add;
586
587         /* register backends */
588         wmi = init_dell_smbios_wmi();
589         if (wmi)
590                 pr_debug("Failed to initialize WMI backend: %d\n", wmi);
591         smm = init_dell_smbios_smm();
592         if (smm)
593                 pr_debug("Failed to initialize SMM backend: %d\n", smm);
594         if (wmi && smm) {
595                 pr_err("No SMBIOS backends available (wmi: %d, smm: %d)\n",
596                         wmi, smm);
597                 ret = -ENODEV;
598                 goto fail_create_group;
599         }
600
601         if (da_tokens)  {
602                 /* duplicate tokens will cause problems building sysfs files */
603                 zero_duplicates(&platform_device->dev);
604
605                 ret = build_tokens_sysfs(platform_device);
606                 if (ret)
607                         goto fail_sysfs;
608         }
609
610         return 0;
611
612 fail_sysfs:
613         free_group(platform_device);
614
615 fail_create_group:
616         platform_device_del(platform_device);
617
618 fail_platform_device_add:
619         platform_device_put(platform_device);
620
621 fail_platform_device_alloc:
622         platform_driver_unregister(&platform_driver);
623
624 fail_platform_driver:
625         kfree(da_tokens);
626         return ret;
627 }
628
629 static void __exit dell_smbios_exit(void)
630 {
631         exit_dell_smbios_wmi();
632         exit_dell_smbios_smm();
633         mutex_lock(&smbios_mutex);
634         if (platform_device) {
635                 if (da_tokens)
636                         free_group(platform_device);
637                 platform_device_unregister(platform_device);
638                 platform_driver_unregister(&platform_driver);
639         }
640         kfree(da_tokens);
641         mutex_unlock(&smbios_mutex);
642 }
643
644 module_init(dell_smbios_init);
645 module_exit(dell_smbios_exit);
646
647 MODULE_AUTHOR("Matthew Garrett <mjg@redhat.com>");
648 MODULE_AUTHOR("Gabriele Mazzotta <gabriele.mzt@gmail.com>");
649 MODULE_AUTHOR("Pali Rohár <pali@kernel.org>");
650 MODULE_AUTHOR("Mario Limonciello <mario.limonciello@dell.com>");
651 MODULE_DESCRIPTION("Common functions for kernel modules using Dell SMBIOS");
652 MODULE_LICENSE("GPL");