Received: by 2002:a05:7208:9594:b0:7e:5202:c8b4 with SMTP id gs20csp2159528rbb; Tue, 27 Feb 2024 12:32:34 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUb10HNqSv8aZ3N1jZHZVGXjx1PTEdL3IoabVLaXQ5+AOVHYGMXRlAI4oH2QBD88X1stRbLpdyxooZmMGC0itS4PSUQGDjrwQE+qAbMyg== X-Google-Smtp-Source: AGHT+IH/v3tq0K/8OknyVpcxHFkWm9FSNitayj+dJPectuMMBFZsxqMFob+7Z51cPvkbbBxEHYtU X-Received: by 2002:a05:620a:1363:b0:787:d4b1:92d8 with SMTP id d3-20020a05620a136300b00787d4b192d8mr3327238qkl.29.1709065954306; Tue, 27 Feb 2024 12:32:34 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709065954; cv=pass; d=google.com; s=arc-20160816; b=OROjcQEvG8HWFsPHIQZDCmuBKOcchXMs9tnJqb/dDE1byr/IG3pDX/waJXikVJFO/y 8ivx2q5HDfSlBRMIAOgPwRjmwGlfhf4YkVOpIq+T3gQ1wrwtcE/Yi6TnwHKcz/j02Uhn R+6Fyw9Z80wuSnt9LBH1r4B4Jh8vSfeLHb/d1aoF8nmGKb19jFNa+nT5x+0Pa8japYMd iPGunxr2IFkKZMDE3/1nE4S17323y2hX6WBYL0KAVJP4m+5Z4qeNhlP6mBJY8wYoI+5P f1mBth/U/wd2lGySGDHIWqNnloof6eq+XhnFoyUIAnG/HF30/uS93JxULBxdVy2clTp5 ++zw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=user-agent:in-reply-to:content-disposition:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:references :message-id:subject:cc:to:from:date:dkim-signature; bh=FPePnebFN0ukeRHbFqdGuW2oJizD+PVPklO+wsGSGyI=; fh=/gyGctSVQfAEE22FbyQYUnvDZBKkjdMMVRhAx5akSKs=; b=Jnzj++jIV8ob3NllRcvQVsYISLKAFtBaLPcPRf0o1apUl4xxDPhzvIk37ikc4B6nUX rle0aqjUf/bQYKPcVnUfwBpJ2RQz19l8iMR9x7cmwFlBa48tjlhE8drVRkEUlmZKBBds 7Ks626GmAlvq6XSgWhRuqRORZV5lPhsPvdl7c7VmoeypoA/nw9k4w5GnfuG/fB50pizA 8Xu9ln+Xqc0v395gHcGGVw07Gat01+rzdxCHRJGvlzaExfKSoSstPN4RPHiHEYChXa7y 2GIyCYuZEQ2YVNhGAPwAfJK6MdPmw3iJE8MxCo0YRA/RFB0oO4o/5P/NTkWwx0CJnIB8 x7eA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=FuvgDUrH; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-83976-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-83976-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id wl3-20020a05620a57c300b007872e2ba7c4si8013803qkn.65.2024.02.27.12.32.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 27 Feb 2024 12:32:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-83976-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=FuvgDUrH; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-83976-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-83976-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id E02211C23FED for ; Tue, 27 Feb 2024 20:31:11 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 6258F14DFE0; Tue, 27 Feb 2024 20:31:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="FuvgDUrH" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5EE0548CFC; Tue, 27 Feb 2024 20:31:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709065862; cv=none; b=jIh2UUzeBK00zI8/WxXkrURxw6Rtpv7QxVs5jBfZdL1T/WcbIPJgV0ighi3lHIuDAXOY8t4DTn+h2qQxpU64aA3dbS14wPhrnev83rqfc0ZQ1W9cYrMnZmLcYM+z3SLenIohQQHvQruv7dI6vda5NBDQDD/1Zi3TKcshmIqaS+w= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709065862; c=relaxed/simple; bh=s2fJU4PGPX0iBUCNPxf3jMS4MyiqzfVfw3V2mKgYkXM=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=stJ83nIU0JM62fl9AGZm9biKEvyYFS3amdU48R1bsy4gPcQEvSb7pXdWJevLcDeIMEczhxunwnxVv7wcyyh0hElXZkvCiiNwASq5nNvXZO3GwL81bELTpKqnhvzI6ASAiO03feZLpWLbU28Dt/lcs4ltY8vIWK2QVWhVCbKN+oA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=FuvgDUrH; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 96C7FC433C7; Tue, 27 Feb 2024 20:31:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1709065861; bh=s2fJU4PGPX0iBUCNPxf3jMS4MyiqzfVfw3V2mKgYkXM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=FuvgDUrHZB8V64Abu//gGiN4v3/5U3wVHhxpWEfxp5zMEVBekbnWG5Lck/Z9+cDJq mrSmUtFddQtYbT0HlaXtK7NIoAtMJWRv2zoYuPctN6lDAQAK0/jJ03iIqUOkXlQwiG V4TnYGZpbetv0RxXljIN4KeK2GQTlpFQLVWE8DFbFOMMYF6Pdh960WtWlI1e1WF9fk rYQ+7BxNIbUnGXR5GaD34oB1nJZIQA+rwYG8j82c67q/DnWKxz2zTIzR8yXfSJrIfa NeG4YLdGG6JH05NPumgFnJShc9UknG+S36v1NCaXu5Bbriyqp2U7t3KypyibdA4ru5 CZumIVt455KQA== Received: by pali.im (Postfix) id B07C4828; Tue, 27 Feb 2024 21:30:58 +0100 (CET) Date: Tue, 27 Feb 2024 21:30:58 +0100 From: Pali =?utf-8?B?Um9ow6Fy?= To: Armin Wolf Cc: jithu.joseph@intel.com, linux@weissschuh.net, hdegoede@redhat.com, ilpo.jarvinen@linux.intel.com, Dell.Client.Kernel@dell.com, jdelvare@suse.com, linux@roeck-us.net, platform-driver-x86@vger.kernel.org, linux-hwmon@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 2/3] platform/x86: wmi: Do not instantiate older WMI drivers multiple times Message-ID: <20240227203058.eun4ylvhk4t7uogk@pali> References: <20240226193557.2888-1-W_Armin@gmx.de> <20240226193557.2888-2-W_Armin@gmx.de> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240226193557.2888-2-W_Armin@gmx.de> User-Agent: NeoMutt/20180716 On Monday 26 February 2024 20:35:56 Armin Wolf wrote: > Many older WMI drivers cannot be instantiated multiple times for > two reasons: > > - they are using the legacy GUID-based WMI API > - they are singletons (with global state) > > Prevent such WMI drivers from binding to WMI devices with a duplicated > GUID, as this would mean that the WMI driver will be instantiated at > least two times (one for the original GUID and one for the duplicated > GUID). > WMI drivers which can be instantiated multiple times can signal this > by setting a flag inside struct wmi_driver. What do you think about opposite direction? Adding ".singleton = true" into every driver which is not compatible with duplicated initialization and having the default value that drivers are not singletons. But if the direction it to not accept new "legacy" drivers and start get rid of all "legacy" drivers by rewriting them, then it does not matter if "no_singleton" or "is_singleton" is used... > Tested on a ASUS Prime B650-Plus. > > Signed-off-by: Armin Wolf > --- > drivers/hwmon/dell-smm-hwmon.c | 1 + > drivers/platform/x86/dell/dell-wmi-ddv.c | 1 + > drivers/platform/x86/intel/wmi/sbl-fw-update.c | 1 + > drivers/platform/x86/intel/wmi/thunderbolt.c | 1 + > drivers/platform/x86/wmi-bmof.c | 1 + > drivers/platform/x86/wmi.c | 12 ++++++++++++ > include/linux/wmi.h | 2 ++ > 7 files changed, 19 insertions(+) > > diff --git a/drivers/hwmon/dell-smm-hwmon.c b/drivers/hwmon/dell-smm-hwmon.c > index 6d8c0f328b7b..168d669c4eca 100644 > --- a/drivers/hwmon/dell-smm-hwmon.c > +++ b/drivers/hwmon/dell-smm-hwmon.c > @@ -1587,6 +1587,7 @@ static struct wmi_driver dell_smm_wmi_driver = { > }, > .id_table = dell_smm_wmi_id_table, > .probe = dell_smm_wmi_probe, > + .no_singleton = true, > }; > > /* > diff --git a/drivers/platform/x86/dell/dell-wmi-ddv.c b/drivers/platform/x86/dell/dell-wmi-ddv.c > index db1e9240dd02..0b2299f7a2de 100644 > --- a/drivers/platform/x86/dell/dell-wmi-ddv.c > +++ b/drivers/platform/x86/dell/dell-wmi-ddv.c > @@ -882,6 +882,7 @@ static struct wmi_driver dell_wmi_ddv_driver = { > }, > .id_table = dell_wmi_ddv_id_table, > .probe = dell_wmi_ddv_probe, > + .no_singleton = true, > }; > module_wmi_driver(dell_wmi_ddv_driver); > > diff --git a/drivers/platform/x86/intel/wmi/sbl-fw-update.c b/drivers/platform/x86/intel/wmi/sbl-fw-update.c > index 040153ad67c1..75c82c08117f 100644 > --- a/drivers/platform/x86/intel/wmi/sbl-fw-update.c > +++ b/drivers/platform/x86/intel/wmi/sbl-fw-update.c > @@ -131,6 +131,7 @@ static struct wmi_driver intel_wmi_sbl_fw_update_driver = { > .probe = intel_wmi_sbl_fw_update_probe, > .remove = intel_wmi_sbl_fw_update_remove, > .id_table = intel_wmi_sbl_id_table, > + .no_singleton = true, > }; > module_wmi_driver(intel_wmi_sbl_fw_update_driver); > > diff --git a/drivers/platform/x86/intel/wmi/thunderbolt.c b/drivers/platform/x86/intel/wmi/thunderbolt.c > index e2ad3f46f356..08df560a2c7a 100644 > --- a/drivers/platform/x86/intel/wmi/thunderbolt.c > +++ b/drivers/platform/x86/intel/wmi/thunderbolt.c > @@ -63,6 +63,7 @@ static struct wmi_driver intel_wmi_thunderbolt_driver = { > .dev_groups = tbt_groups, > }, > .id_table = intel_wmi_thunderbolt_id_table, > + .no_singleton = true, > }; > > module_wmi_driver(intel_wmi_thunderbolt_driver); > diff --git a/drivers/platform/x86/wmi-bmof.c b/drivers/platform/x86/wmi-bmof.c > index 644d2fd889c0..df6f0ae6e6c7 100644 > --- a/drivers/platform/x86/wmi-bmof.c > +++ b/drivers/platform/x86/wmi-bmof.c > @@ -94,6 +94,7 @@ static struct wmi_driver wmi_bmof_driver = { > .probe = wmi_bmof_probe, > .remove = wmi_bmof_remove, > .id_table = wmi_bmof_id_table, > + .no_singleton = true, > }; > > module_wmi_driver(wmi_bmof_driver); > diff --git a/drivers/platform/x86/wmi.c b/drivers/platform/x86/wmi.c > index 29dfe52eb802..349deced87e8 100644 > --- a/drivers/platform/x86/wmi.c > +++ b/drivers/platform/x86/wmi.c > @@ -883,6 +883,18 @@ static int wmi_dev_probe(struct device *dev) > struct wmi_driver *wdriver = drv_to_wdrv(dev->driver); > int ret = 0; > > + /* Some older WMI drivers will break if instantiated multiple times, > + * so they are blocked from probing WMI devices with a duplicated GUID. > + * > + * New WMI drivers should support being instantiated multiple times. > + */ > + if (test_bit(WMI_GUID_DUPLICATED, &wblock->flags) && !wdriver->no_singleton) { > + dev_warn(dev, "Legacy driver %s cannot be instantiated multiple times\n", > + dev->driver->name); > + > + return -ENODEV; > + } > + > if (wdriver->notify) { > if (test_bit(WMI_NO_EVENT_DATA, &wblock->flags) && !wdriver->no_notify_data) > return -ENODEV; > diff --git a/include/linux/wmi.h b/include/linux/wmi.h > index 781958310bfb..63cca3b58d6d 100644 > --- a/include/linux/wmi.h > +++ b/include/linux/wmi.h > @@ -49,6 +49,7 @@ u8 wmidev_instance_count(struct wmi_device *wdev); > * @driver: Driver model structure > * @id_table: List of WMI GUIDs supported by this driver > * @no_notify_data: Driver supports WMI events which provide no event data > + * @no_singleton: Driver can be instantiated multiple times > * @probe: Callback for device binding > * @remove: Callback for device unbinding > * @notify: Callback for receiving WMI events > @@ -59,6 +60,7 @@ struct wmi_driver { > struct device_driver driver; > const struct wmi_device_id *id_table; > bool no_notify_data; > + bool no_singleton; > > int (*probe)(struct wmi_device *wdev, const void *context); > void (*remove)(struct wmi_device *wdev); > -- > 2.39.2 >