From patchwork Thu Aug 27 19:52:22 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Raul Rangel X-Patchwork-Id: 11741791 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 849B813B6 for ; Thu, 27 Aug 2020 19:52:50 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 5FC1722D00 for ; Thu, 27 Aug 2020 19:52:50 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="h6KWwkxP" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727000AbgH0Twt (ORCPT ); Thu, 27 Aug 2020 15:52:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52284 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727794AbgH0Tws (ORCPT ); Thu, 27 Aug 2020 15:52:48 -0400 Received: from mail-io1-xd42.google.com (mail-io1-xd42.google.com [IPv6:2607:f8b0:4864:20::d42]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 03F82C061232 for ; Thu, 27 Aug 2020 12:52:47 -0700 (PDT) Received: by mail-io1-xd42.google.com with SMTP id w20so7168712iom.1 for ; Thu, 27 Aug 2020 12:52:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=q0WhZouPxdjBeMn9cOMGc/oviRw39ohzYxmzF+C0NwU=; b=h6KWwkxPlwBK4h7b7HqbG3b5fEkTxuKNqI0GpTCxCozsrKoF4/t0e/K3To4U9HVUBU 2IN3B07JvfH5poIPywwuXVexJeJma9l0Oby5c1Yhwg6m/Z7FzseKd+rkiQk3VmWIJ0GR uvz5HGhAYP1RdqrW1/22HIyzxtVTyn6zsF+sw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=q0WhZouPxdjBeMn9cOMGc/oviRw39ohzYxmzF+C0NwU=; b=ptaoSyKTmMiPwJFss3I9yr+yKO6PwpyEuTZv/f3ebxfWgO8ClAtRN6bTqP8bCIBWs1 cnPIzP2JHdpfAfk21I4VfhfxDZX9+vepXG+Iu6HegNpfe351D8pqX2xMA/h7yiwvvckf 2AHUTosa/3Yh7CWrr0u0yE2nu3mZQZmncQ965VpeJyv722VRkLRzwCcvS8MWZTNGwSN/ q9lQ2ivQ5uvY9p5NMzmvxWvyGQAbOW7/gbVEa8+wc+wuhqcQjM/n8lPrEaUk6W4HyAyL PX7/kOelXatQk971+cudveWibTlLbTqCySVohKAKSNcjxQSRrHsDShAGfnd0w5fthkPv 1Sdg== X-Gm-Message-State: AOAM5306WLHlPniVm9MizjPbsAVYbbiCZCzSfmYcBt/+c3/IAvBkd8J8 x3353mRnEOibNgY+sVa9Njt9P8dmMKQxByHQ X-Google-Smtp-Source: ABdhPJwHitgH1o5QcDfe5KVSSK78tz1srdPlHOWaobSgLbMA3g5GVCvAS1wn2r0+wGMAZm8oxUEHkw== X-Received: by 2002:a02:840f:: with SMTP id k15mr21153082jah.100.1598557966378; Thu, 27 Aug 2020 12:52:46 -0700 (PDT) Received: from rrangel920.bld.corp.google.com (h184-60-195-141.arvdco.broadband.dynamic.tds.net. [184.60.195.141]) by smtp.gmail.com with ESMTPSA id t90sm1664808ill.50.2020.08.27.12.52.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Aug 2020 12:52:45 -0700 (PDT) From: Raul E Rangel To: linux-input@vger.kernel.org Cc: dmitry.torokhov@gmail.com, Shirish.S@amd.com, Raul E Rangel , Andy Shevchenko , Dan Murphy , Darren Hart , Jacek Anaszewski , "Lee, Chun-Yi" , Pavel Machek , Rajat Jain , Stephen Boyd , linux-kernel@vger.kernel.org, linux-leds@vger.kernel.org, platform-driver-x86@vger.kernel.org Subject: [PATCH 1/2] Input: i8042 - Prevent intermixing i8042 commands Date: Thu, 27 Aug 2020 13:52:22 -0600 Message-Id: <20200827135205.1.I6981f9a9f0c12e60f8038f3b574184f8ffc1b9b5@changeid> X-Mailer: git-send-email 2.28.0.297.g1956fa8f8d-goog MIME-Version: 1.0 Sender: linux-input-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-input@vger.kernel.org The i8042_mutex must be held by writers of the AUX and KBD ports, as well as users of i8042_command. There were a lot of users of i8042_command that were not calling i8042_lock_chip/i8042_unlock_chip. This resulted in i8042_commands being issues in between PS/2 transactions. This change moves the mutex lock into i8042_command and removes the burden of locking the mutex from the callers. It is expected that the i8042_mutex is locked before calling i8042_aux_write or i8042_kbd_write. This is currently done by the PS/2 layer via ps2_begin_command and ps2_end_command. Other modules (serio_raw) do not currently lock the mutex, so there is still a possibility for intermixed commands. Signed-off-by: Raul E Rangel --- drivers/input/serio/i8042.c | 29 ++++++++++++++--------------- drivers/leds/leds-clevo-mail.c | 9 --------- drivers/platform/x86/acer-wmi.c | 2 -- drivers/platform/x86/amilo-rfkill.c | 2 -- include/linux/i8042.h | 10 ---------- 5 files changed, 14 insertions(+), 38 deletions(-) diff --git a/drivers/input/serio/i8042.c b/drivers/input/serio/i8042.c index 0dddf273afd94..8590e51bcc087 100644 --- a/drivers/input/serio/i8042.c +++ b/drivers/input/serio/i8042.c @@ -137,8 +137,7 @@ static DEFINE_SPINLOCK(i8042_lock); /* * Writers to AUX and KBD ports as well as users issuing i8042_command - * directly should acquire i8042_mutex (by means of calling - * i8042_lock_chip() and i8042_unlock_ship() helpers) to ensure that + * directly should acquire i8042_mutex to ensure that * they do not disturb each other (unfortunately in many i8042 * implementations write to one of the ports will immediately abort * command that is being processed by another port). @@ -173,18 +172,6 @@ static irqreturn_t i8042_interrupt(int irq, void *dev_id); static bool (*i8042_platform_filter)(unsigned char data, unsigned char str, struct serio *serio); -void i8042_lock_chip(void) -{ - mutex_lock(&i8042_mutex); -} -EXPORT_SYMBOL(i8042_lock_chip); - -void i8042_unlock_chip(void) -{ - mutex_unlock(&i8042_mutex); -} -EXPORT_SYMBOL(i8042_unlock_chip); - int i8042_install_filter(bool (*filter)(unsigned char data, unsigned char str, struct serio *serio)) { @@ -343,10 +330,14 @@ int i8042_command(unsigned char *param, int command) unsigned long flags; int retval; + mutex_lock(&i8042_mutex); + spin_lock_irqsave(&i8042_lock, flags); retval = __i8042_command(param, command); spin_unlock_irqrestore(&i8042_lock, flags); + mutex_unlock(&i8042_mutex); + return retval; } EXPORT_SYMBOL(i8042_command); @@ -379,10 +370,18 @@ static int i8042_kbd_write(struct serio *port, unsigned char c) static int i8042_aux_write(struct serio *serio, unsigned char c) { struct i8042_port *port = serio->port_data; + unsigned long flags; + int retval = 0; + + spin_lock_irqsave(&i8042_lock, flags); - return i8042_command(&c, port->mux == -1 ? + retval = __i8042_command(&c, port->mux == -1 ? I8042_CMD_AUX_SEND : I8042_CMD_MUX_SEND + port->mux); + + spin_unlock_irqrestore(&i8042_lock, flags); + + return retval; } diff --git a/drivers/leds/leds-clevo-mail.c b/drivers/leds/leds-clevo-mail.c index f512e99b976b1..6c3d7e54f95cf 100644 --- a/drivers/leds/leds-clevo-mail.c +++ b/drivers/leds/leds-clevo-mail.c @@ -95,17 +95,12 @@ MODULE_DEVICE_TABLE(dmi, clevo_mail_led_dmi_table); static void clevo_mail_led_set(struct led_classdev *led_cdev, enum led_brightness value) { - i8042_lock_chip(); - if (value == LED_OFF) i8042_command(NULL, CLEVO_MAIL_LED_OFF); else if (value <= LED_HALF) i8042_command(NULL, CLEVO_MAIL_LED_BLINK_0_5HZ); else i8042_command(NULL, CLEVO_MAIL_LED_BLINK_1HZ); - - i8042_unlock_chip(); - } static int clevo_mail_led_blink(struct led_classdev *led_cdev, @@ -114,8 +109,6 @@ static int clevo_mail_led_blink(struct led_classdev *led_cdev, { int status = -EINVAL; - i8042_lock_chip(); - if (*delay_on == 0 /* ms */ && *delay_off == 0 /* ms */) { /* Special case: the leds subsystem requested us to * chose one user friendly blinking of the LED, and @@ -142,8 +135,6 @@ static int clevo_mail_led_blink(struct led_classdev *led_cdev, *delay_on, *delay_off); } - i8042_unlock_chip(); - return status; } diff --git a/drivers/platform/x86/acer-wmi.c b/drivers/platform/x86/acer-wmi.c index 60c18f21588dd..6cb6f800503b2 100644 --- a/drivers/platform/x86/acer-wmi.c +++ b/drivers/platform/x86/acer-wmi.c @@ -1044,9 +1044,7 @@ static acpi_status WMID_set_u32(u32 value, u32 cap) return AE_BAD_PARAMETER; if (quirks->mailled == 1) { param = value ? 0x92 : 0x93; - i8042_lock_chip(); i8042_command(¶m, 0x1059); - i8042_unlock_chip(); return 0; } break; diff --git a/drivers/platform/x86/amilo-rfkill.c b/drivers/platform/x86/amilo-rfkill.c index 493e169c8f615..ce68d0c9ac29f 100644 --- a/drivers/platform/x86/amilo-rfkill.c +++ b/drivers/platform/x86/amilo-rfkill.c @@ -30,9 +30,7 @@ static int amilo_a1655_rfkill_set_block(void *data, bool blocked) u8 param = blocked ? A1655_WIFI_OFF : A1655_WIFI_ON; int rc; - i8042_lock_chip(); rc = i8042_command(¶m, A1655_WIFI_COMMAND); - i8042_unlock_chip(); return rc; } diff --git a/include/linux/i8042.h b/include/linux/i8042.h index 0261e2fb36364..1c081081c161d 100644 --- a/include/linux/i8042.h +++ b/include/linux/i8042.h @@ -55,8 +55,6 @@ struct serio; #if defined(CONFIG_SERIO_I8042) || defined(CONFIG_SERIO_I8042_MODULE) -void i8042_lock_chip(void); -void i8042_unlock_chip(void); int i8042_command(unsigned char *param, int command); int i8042_install_filter(bool (*filter)(unsigned char data, unsigned char str, struct serio *serio)); @@ -65,14 +63,6 @@ int i8042_remove_filter(bool (*filter)(unsigned char data, unsigned char str, #else -static inline void i8042_lock_chip(void) -{ -} - -static inline void i8042_unlock_chip(void) -{ -} - static inline int i8042_command(unsigned char *param, int command) { return -ENODEV; From patchwork Thu Aug 27 19:52:23 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Raul Rangel X-Patchwork-Id: 11741795 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id D9AF614E5 for ; Thu, 27 Aug 2020 19:52:52 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id BDE9522B4B for ; Thu, 27 Aug 2020 19:52:52 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="EuPx8TyB" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727881AbgH0Tww (ORCPT ); Thu, 27 Aug 2020 15:52:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52292 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726851AbgH0Twu (ORCPT ); Thu, 27 Aug 2020 15:52:50 -0400 Received: from mail-io1-xd42.google.com (mail-io1-xd42.google.com [IPv6:2607:f8b0:4864:20::d42]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 87A2DC06121B for ; Thu, 27 Aug 2020 12:52:50 -0700 (PDT) Received: by mail-io1-xd42.google.com with SMTP id g13so7112842ioo.9 for ; Thu, 27 Aug 2020 12:52:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=fIqWlMBbgKgUZW+HB8etDtKQeLffAbAjf8iY4VxAZag=; b=EuPx8TyBG4bYxErvqUCUVFJiqwUgxZcKPXyVPxd+CyMWl5ib4E3/0iaYIcXGzsArGn iBfFSwOhaynbxXystbjE2m0IAfzR649Pv8j45rW3aJg8v3/yaktcZZPEFw8FPTI5nTIr c1w4dCCG4sOKT8nsTS8Gihdn4e+9klHeiSkXs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=fIqWlMBbgKgUZW+HB8etDtKQeLffAbAjf8iY4VxAZag=; b=iZxkFKBDARnLu6W5mVocEfF3K1O+kxBAEGHNL2NG55PrdUPcvNf9MPjTeGeHFxLKir S5/lnDT4lLlXBD6A9jIADXC7F0bMk/bTCiE7m5I+39GpUC9r3VEk6HzEl7XiCVLP8+CM 2IYR9so/BeqZGGr6rmxAEP0wM2n3veptLk8JqSuafNyalssTxYBxzpSIgvyzVi1Ezwkt 5h39T6WD0My4S5vaoupZPjPBlQPBlMPK7uvncY7B/ItEx4b87q0nQp7x8mFOplq7lOVp RXfVrfV9towBlp7T43CHVdWIo5OXCpYgo7UhDMW/XNI2jeB/TqtxObpToD4U+eFbrneW 36uw== X-Gm-Message-State: AOAM531/AFw08UHVVHcThegkFezbiPKO5QB48BXakgA0CVME5ODcfKqU Kkl0HU8/osMJHlGTHE7cnVBb4C01U5n+qxcj X-Google-Smtp-Source: ABdhPJzhubCDa6AAuurccePp5pH9tvFbrx+5wirCv5ldX4LxqAbDK+mm9OfqtnsZKuE4ZQuYfZWnuw== X-Received: by 2002:a5d:80cb:: with SMTP id h11mr18210363ior.189.1598557969816; Thu, 27 Aug 2020 12:52:49 -0700 (PDT) Received: from rrangel920.bld.corp.google.com (h184-60-195-141.arvdco.broadband.dynamic.tds.net. [184.60.195.141]) by smtp.gmail.com with ESMTPSA id t90sm1664808ill.50.2020.08.27.12.52.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Aug 2020 12:52:49 -0700 (PDT) From: Raul E Rangel To: linux-input@vger.kernel.org Cc: dmitry.torokhov@gmail.com, Shirish.S@amd.com, Raul E Rangel , Rajat Jain , Stephen Boyd , linux-kernel@vger.kernel.org Subject: [PATCH 2/2] Input: i8042 - Lock i8042_mutex before flushing Date: Thu, 27 Aug 2020 13:52:23 -0600 Message-Id: <20200827135205.2.I1417edfd3526143f14fea2546787ba4bb6f32ae8@changeid> X-Mailer: git-send-email 2.28.0.297.g1956fa8f8d-goog In-Reply-To: <20200827135205.1.I6981f9a9f0c12e60f8038f3b574184f8ffc1b9b5@changeid> References: <20200827135205.1.I6981f9a9f0c12e60f8038f3b574184f8ffc1b9b5@changeid> MIME-Version: 1.0 Sender: linux-input-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-input@vger.kernel.org Make i8042_flush lock the i8042_mutex before flushing the buffer. This will prevent i8042_flush from clearing the buffer while a PS/2 command is in progress. I'm not sure if this is really possible. We already hold the lock when calling i8042_command, so this makes i8042_flush have the same behavior. Signed-off-by: Raul E Rangel --- drivers/input/serio/i8042.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/input/serio/i8042.c b/drivers/input/serio/i8042.c index 8590e51bcc087..b693154641500 100644 --- a/drivers/input/serio/i8042.c +++ b/drivers/input/serio/i8042.c @@ -254,6 +254,8 @@ static int i8042_flush(void) int count = 0; int retval = 0; + mutex_lock(&i8042_mutex); + spin_lock_irqsave(&i8042_lock, flags); while ((str = i8042_read_status()) & I8042_STR_OBF) { @@ -270,6 +272,8 @@ static int i8042_flush(void) spin_unlock_irqrestore(&i8042_lock, flags); + mutex_unlock(&i8042_mutex); + return retval; }