Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp1946301ima; Thu, 25 Oct 2018 07:24:16 -0700 (PDT) X-Google-Smtp-Source: AJdET5eg8GAlLe+TtNywari5PviF6f8Qd1X5urvjq/rJnGObV2fSTFxorcaZ5HTGhWHByzOCl6MG X-Received: by 2002:a63:2ad4:: with SMTP id q203-v6mr1649520pgq.356.1540477456049; Thu, 25 Oct 2018 07:24:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540477456; cv=none; d=google.com; s=arc-20160816; b=XsgALbQ1PRsQSvOqSnHBEtrYVc1jyDS0gt9Cydc7ikNlCCCNRgYyxEN7hc0n07QtyI +LnwPebXmlcdfIcoZFUZKrC7NkRa7fNKCJIJFoe1dgKM/n4agRbjVpuae5E68Vn5COBe PgpjOCNVd6YEgroYDF8x22kmIzxK7daWypvI//1tisXA1u92M9ri6sfAVZ5ZbNz+uPas 0jIyFlFtYmJv+trDzLXluZoaztsm6eU+ZV2iMSW7T40zWUGVq0sA2ZmRproX7QgI/l7t RYUt1lYNXxyDa1HnOEpTBbr1MjYpgahg890ZnAUPQHrbBStscrrQIblZkpF+skwyfNpT 2t9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=q68PjkznWM15VHJQQzQVcOQ9XLgZncaLZFkNxCrY1Iw=; b=H2jwLz27NvvX2kwzb7l9z1SaFuP8ANG6U8V+m0eGODWON7A2IewaFPaR6jzRBHg4fz /7hVFwAhWrWX5gw8K3s4cpSZD0bhGFegunVxR//IeWQ0RVxHM+S614+2uY9bYDK7jSAo GyRMCmw3p9LJIBoBQ5s1dQq0NYAsOREUp67Xfr0hlgX14YTIOHCxA7P5JEC+sTrENhpW udAeCTfpHeUuNOtCnSwFbuOaAlxuHt02AYrdMXXr+/YprYjr3iT4ujC9gScIdwZR+hW0 zgMNSuWkVJE0pu1czP33NSO5VQL/UrIvYEeG8lSke30DZW6IShimlnEO29b2w844Wql9 t6ww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0g+ZR34L; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 31-v6si3549107pli.292.2018.10.25.07.23.31; Thu, 25 Oct 2018 07:24:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0g+ZR34L; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731406AbeJYWyK (ORCPT + 99 others); Thu, 25 Oct 2018 18:54:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:37022 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731391AbeJYWyJ (ORCPT ); Thu, 25 Oct 2018 18:54:09 -0400 Received: from sasha-vm.mshome.net (unknown [167.98.65.38]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 89139208A3; Thu, 25 Oct 2018 14:21:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1540477271; bh=iROB2lFz13Ms++6tgn5UEhtXSEDe1Nojtrp1/U3H6sQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0g+ZR34L7u+h2AQoCLrNV9/ZPdGIRWOHOfUKFDWqRD2EY2BzJBbhumLWqBs9RJmQN gCaAC0i/njR8az0tgEEfO0M5UKN6Db1o6JcNLmhYwh1BoUfL558MCbBHEVXMiCAEjU C6/ZFl0wZPIZaZCe74cFHOHsaKpo3Xu3nOsWfYGs= From: Sasha Levin To: stable@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Alex Williamson , Bjorn Helgaas , Sasha Levin Subject: [PATCH AUTOSEL 3.18 88/98] PCI: Fix devfn for VPD access through function 0 Date: Thu, 25 Oct 2018 10:18:43 -0400 Message-Id: <20181025141853.214051-88-sashal@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20181025141853.214051-1-sashal@kernel.org> References: <20181025141853.214051-1-sashal@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alex Williamson [ Upstream commit 9d9240756e63dd87d6cbf5da8b98ceb8f8192b55 ] Commit 932c435caba8 ("PCI: Add dev_flags bit to access VPD through function 0") passes PCI_SLOT(devfn) for the devfn parameter of pci_get_slot(). Generally this works because we're fairly well guaranteed that a PCIe device is at slot address 0, but for the general case, including conventional PCI, it's incorrect. We need to get the slot and then convert it back into a devfn. Fixes: 932c435caba8 ("PCI: Add dev_flags bit to access VPD through function 0") Signed-off-by: Alex Williamson Signed-off-by: Bjorn Helgaas Acked-by: Myron Stowe Acked-by: Mark Rustad CC: stable@vger.kernel.org Signed-off-by: Sasha Levin --- drivers/pci/access.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/drivers/pci/access.c b/drivers/pci/access.c index 7f249b9ab2ce..2f15e7bb9f44 100644 --- a/drivers/pci/access.c +++ b/drivers/pci/access.c @@ -355,7 +355,8 @@ static const struct pci_vpd_ops pci_vpd_pci22_ops = { static ssize_t pci_vpd_f0_read(struct pci_dev *dev, loff_t pos, size_t count, void *arg) { - struct pci_dev *tdev = pci_get_slot(dev->bus, PCI_SLOT(dev->devfn)); + struct pci_dev *tdev = pci_get_slot(dev->bus, + PCI_DEVFN(PCI_SLOT(dev->devfn), 0)); ssize_t ret; if (!tdev) @@ -369,7 +370,8 @@ static ssize_t pci_vpd_f0_read(struct pci_dev *dev, loff_t pos, size_t count, static ssize_t pci_vpd_f0_write(struct pci_dev *dev, loff_t pos, size_t count, const void *arg) { - struct pci_dev *tdev = pci_get_slot(dev->bus, PCI_SLOT(dev->devfn)); + struct pci_dev *tdev = pci_get_slot(dev->bus, + PCI_DEVFN(PCI_SLOT(dev->devfn), 0)); ssize_t ret; if (!tdev) @@ -388,7 +390,8 @@ static const struct pci_vpd_ops pci_vpd_f0_ops = { static int pci_vpd_f0_dev_check(struct pci_dev *dev) { - struct pci_dev *tdev = pci_get_slot(dev->bus, PCI_SLOT(dev->devfn)); + struct pci_dev *tdev = pci_get_slot(dev->bus, + PCI_DEVFN(PCI_SLOT(dev->devfn), 0)); int ret = 0; if (!tdev) -- 2.17.1