diff options
author | Yazen Ghannam <yazen.ghannam@amd.com> | 2024-06-06 19:12:57 +0300 |
---|---|---|
committer | Borislav Petkov (AMD) <bp@alien8.de> | 2024-06-12 12:38:58 +0300 |
commit | dc5243921be1b6a0b4259dbcec3dc95016ad8427 (patch) | |
tree | 7720b7401dece7f39bd57f5e3f76229bb5c0f838 /drivers/hwmon/k10temp.c | |
parent | c2d79cc5455c891de6c93e1e0c73d806e299c54f (diff) | |
download | linux-dc5243921be1b6a0b4259dbcec3dc95016ad8427.tar.xz |
x86/amd_nb: Enhance SMN access error checking
AMD Zen-based systems use a System Management Network (SMN) that
provides access to implementation-specific registers.
SMN accesses are done indirectly through an index/data pair in PCI
config space. The accesses can fail for a variety of reasons.
Include code comments to describe some possible scenarios.
Require error checking for callers of amd_smn_read() and amd_smn_write().
This is needed because many error conditions cannot be checked by these
functions.
[ bp: Touchup comment. ]
Signed-off-by: Yazen Ghannam <yazen.ghannam@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Reviewed-by: Mario Limonciello <mario.limonciello@amd.com>
Link: https://lore.kernel.org/r/20240606-fix-smn-bad-read-v4-4-ffde21931c3f@amd.com
Diffstat (limited to 'drivers/hwmon/k10temp.c')
0 files changed, 0 insertions, 0 deletions