lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 14 Aug 2017 22:52:06 +0200 From: Hans de Goede <hdegoede@...hat.com> To: Andy Shevchenko <andy.shevchenko@...il.com> Cc: Darren Hart <dvhart@...radead.org>, Andy Shevchenko <andy@...radead.org>, Platform Driver <platform-driver-x86@...r.kernel.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org> Subject: Re: [PATCH] platform/x86: intel_cht_int33fe: Work around BIOS bug on some devices Hi, On 14-08-17 22:45, Andy Shevchenko wrote: > On Mon, Aug 14, 2017 at 11:14 PM, Hans de Goede <hdegoede@...hat.com> wrote: >> At least one BIOS enumerates the max17047 both through the INT33FE ACPI >> device (it is right there in the resources table) as well as through a >> separate MAX17047 device. >> >> This commit checks for the max17047 already being enumerated through >> a separate MAX17047 ACPI device and if so it uses the i2c-client >> instantiated for this and attaches the device-props for the max17047 to >> that i2c-client. > >> +int cht_int33fe_check_for_max17047(struct device *dev, void *data) >> +{ >> + const char *name = dev_name(dev); >> + struct i2c_client **max17047 = data; >> + >> + if (name && strcmp(name, "i2c-MAX17047:00") == 0) { > > Can we stop using bad practice of comparing against _instance_? > If device is suppose to be single in the system, wouldn't _HID be enough? Yes _HID would be enough, but that takes some extra code with little gain IMHO, we are effectively checking the HID here as that is where the device-name comes from. Anyways if you strongly prefer a HID check I can do a v2 doing that either way let me know. Regards, Hans > >> + *max17047 = to_i2c_client(dev); >> + return 1; >> + } >> + >> + return 0; >> +} > >
Powered by blists - more mailing lists