Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp453805ybl; Tue, 28 Jan 2020 06:14:01 -0800 (PST) X-Google-Smtp-Source: APXvYqw5OmFlJ5zI8RjL/3pbnhNMIJsCt2uFt/c8RtuJgeSBd5hUVflFutwuNScQUuC0AmKiWECU X-Received: by 2002:a05:6808:8ca:: with SMTP id k10mr2851786oij.164.1580220841259; Tue, 28 Jan 2020 06:14:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580220841; cv=none; d=google.com; s=arc-20160816; b=V7BGJY4G2U8BNHEZdPnfOAfvgBKh/yftSsi3TRbLKsZmnGwXMDR8tORF0m0NMsStYG ShgxTQt5B8PK5K/NzeMv/T/CXcDuVzn5bDHLX9Hfh5KII44q21g0H1wQMsoydusVqU4l mvkwUUirs+c+yzxJw2b0EBPwByNT0Y6jAIMEgOaffBgKPHyIpf3cZe4PTW8tdqOhwXgf WLMrMh5rPsrmWsvTPJmBWAHztp36aI/EZU98+iKiakc56Gko+muQpFsAKvQ7YjMarurg PEwDk2jA4+HxyzaFqn7XOrQMbnT4vyZhwW7ehp5IElgxuH+TdXmdcMWhyGp2+RrGeNKG Ni2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=kA5QQiUnDy4SwJdZtKgEYSWjQ3celAuwS/mxQSsI2o0=; b=nBRP2hasdM6i7kH0P+Pi7r5vle1O96dCY6WZd+rGlOf+Ku+klfkzxoJ/gGTjqzcr/j grSV9cRsaQ5tG1mDY57qHPmOWhrhqKNHvL2UxwS8ns3xXe8+YXFav1o8mEeGEsIkfQyd 8GVWZnBNjiwpPx1MlKwSIhjuWkIZgpAnrGk08mxSm9omFVQdgzuszOk1fX9tQZ6NbGda oGZxTU9/HDrE/yNBEHAXg6BJPTwFfb+wvfxS1Jz9RDv7VUboclkCOYVjnEKbnrrfj6sS Y1XIIM+W7eq2kG6nmpuMpX1cH3zfYSkd0BTWAn6JDiSYrLXeeeH00VuTkLXRmsoAToZb 2Jqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=k2PF5aOU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m4si8791841otn.281.2020.01.28.06.13.48; Tue, 28 Jan 2020 06:14:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=k2PF5aOU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728543AbgA1OLr (ORCPT + 99 others); Tue, 28 Jan 2020 09:11:47 -0500 Received: from mail.kernel.org ([198.145.29.99]:60932 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727097AbgA1OLp (ORCPT ); Tue, 28 Jan 2020 09:11:45 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 313D024688; Tue, 28 Jan 2020 14:11:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580220704; bh=BDmzMUOv+jwCWIgzcr7uhDx7cxYkavGXJYJFdjJ7oTE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=k2PF5aOUD984aZiF9AYeq84sJ1fcwFYqLRhOtiggoUJYchk+CjfiUSo6Ja0auKgEY H1k9VYsrxzIxUPz75rP5dYth+gbunUqN5JoXZl9OLoYEpF4HfjWa3XuVFVK7a5hUpH MZHg3vZst7ciNPnJiKd/fUP1fKA6YiseqhKc+ssA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Guenter Roeck , Sasha Levin Subject: [PATCH 4.4 076/183] hwmon: (w83627hf) Use request_muxed_region for Super-IO accesses Date: Tue, 28 Jan 2020 15:04:55 +0100 Message-Id: <20200128135837.549555723@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200128135829.486060649@linuxfoundation.org> References: <20200128135829.486060649@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Guenter Roeck [ Upstream commit e95fd518d05bfc087da6fcdea4900a57cfb083bd ] Super-IO accesses may fail on a system with no or unmapped LPC bus. Also, other drivers may attempt to access the LPC bus at the same time, resulting in undefined behavior. Use request_muxed_region() to ensure that IO access on the requested address space is supported, and to ensure that access by multiple drivers is synchronized. Fixes: b72656dbc491 ("hwmon: (w83627hf) Stop using globals for I/O port numbers") Signed-off-by: Guenter Roeck Signed-off-by: Sasha Levin --- drivers/hwmon/w83627hf.c | 42 +++++++++++++++++++++++++++++++++++----- 1 file changed, 37 insertions(+), 5 deletions(-) diff --git a/drivers/hwmon/w83627hf.c b/drivers/hwmon/w83627hf.c index 721295b9a0517..43c0f89cefdf0 100644 --- a/drivers/hwmon/w83627hf.c +++ b/drivers/hwmon/w83627hf.c @@ -130,17 +130,23 @@ superio_select(struct w83627hf_sio_data *sio, int ld) outb(ld, sio->sioaddr + 1); } -static inline void +static inline int superio_enter(struct w83627hf_sio_data *sio) { + if (!request_muxed_region(sio->sioaddr, 2, DRVNAME)) + return -EBUSY; + outb(0x87, sio->sioaddr); outb(0x87, sio->sioaddr); + + return 0; } static inline void superio_exit(struct w83627hf_sio_data *sio) { outb(0xAA, sio->sioaddr); + release_region(sio->sioaddr, 2); } #define W627_DEVID 0x52 @@ -1275,7 +1281,7 @@ static DEVICE_ATTR(name, S_IRUGO, show_name, NULL); static int __init w83627hf_find(int sioaddr, unsigned short *addr, struct w83627hf_sio_data *sio_data) { - int err = -ENODEV; + int err; u16 val; static __initconst char *const names[] = { @@ -1287,7 +1293,11 @@ static int __init w83627hf_find(int sioaddr, unsigned short *addr, }; sio_data->sioaddr = sioaddr; - superio_enter(sio_data); + err = superio_enter(sio_data); + if (err) + return err; + + err = -ENODEV; val = force_id ? force_id : superio_inb(sio_data, DEVID); switch (val) { case W627_DEVID: @@ -1641,9 +1651,21 @@ static int w83627thf_read_gpio5(struct platform_device *pdev) struct w83627hf_sio_data *sio_data = dev_get_platdata(&pdev->dev); int res = 0xff, sel; - superio_enter(sio_data); + if (superio_enter(sio_data)) { + /* + * Some other driver reserved the address space for itself. + * We don't want to fail driver instantiation because of that, + * so display a warning and keep going. + */ + dev_warn(&pdev->dev, + "Can not read VID data: Failed to enable SuperIO access\n"); + return res; + } + superio_select(sio_data, W83627HF_LD_GPIO5); + res = 0xff; + /* Make sure these GPIO pins are enabled */ if (!(superio_inb(sio_data, W83627THF_GPIO5_EN) & (1<<3))) { dev_dbg(&pdev->dev, "GPIO5 disabled, no VID function\n"); @@ -1674,7 +1696,17 @@ static int w83687thf_read_vid(struct platform_device *pdev) struct w83627hf_sio_data *sio_data = dev_get_platdata(&pdev->dev); int res = 0xff; - superio_enter(sio_data); + if (superio_enter(sio_data)) { + /* + * Some other driver reserved the address space for itself. + * We don't want to fail driver instantiation because of that, + * so display a warning and keep going. + */ + dev_warn(&pdev->dev, + "Can not read VID data: Failed to enable SuperIO access\n"); + return res; + } + superio_select(sio_data, W83627HF_LD_HWM); /* Make sure these GPIO pins are enabled */ -- 2.20.1