How about this? It's informational only, but ought to result in complaints whenever ACPI tries to touch something that other hardware has reserved. We can't fail these accesses, but in theory we could consider some sort of locking layer that made it possible to interact anyway. I haven't even checked if this builds, but I think the concept is reasonable. diff --git a/drivers/acpi/osl.c b/drivers/acpi/osl.c index d870fb2..088abd1 100644 --- a/drivers/acpi/osl.c +++ b/drivers/acpi/osl.c @@ -35,6 +35,7 @@ #include <linux/kmod.h> #include <linux/delay.h> #include <linux/workqueue.h> +#include <linux/ioport.h> #include <linux/nmi.h> #include <acpi/acpi.h> #include <asm/io.h> @@ -338,6 +339,10 @@ acpi_status acpi_os_read_port(acpi_io_address port, u32 * value, u32 width) { u32 dummy; + if (__check_region(&ioport_resource, port, width/8)) + printk (KERN_INFO "ACPI read from allocated ioport %lx\n", + port); + if (!value) value = &dummy; @@ -362,6 +367,10 @@ EXPORT_SYMBOL(acpi_os_read_port); acpi_status acpi_os_write_port(acpi_io_address port, u32 value, u32 width) { + if (__check_region(&ioport_resource, port, width/8)) + printk (KERN_INFO "ACPI write to allocated ioport %lx\n", + port); + switch (width) { case 8: outb(value, port); @@ -387,6 +396,10 @@ acpi_os_read_memory(acpi_physical_address phys_addr, u32 * value, u32 width) u32 dummy; void __iomem *virt_addr; + if (__check_region(&iomem_resource, phys_addr, width/8)) + printk (KERN_INFO "ACPI read from allocated iomem %lx\n", + phys_addr); + virt_addr = ioremap(phys_addr, width); if (!value) value = &dummy; @@ -415,6 +428,10 @@ acpi_os_write_memory(acpi_physical_address phys_addr, u32 value, u32 width) { void __iomem *virt_addr; + if (__check_region(&iomem_resource, phys_addr, width/8)) + printk (KERN_INFO "ACPI write to allocated iomem %lx\n", + phys_addr); + virt_addr = ioremap(phys_addr, width); switch (width) { -- Matthew Garrett | mjg59@xxxxxxxxxxxxx - To unsubscribe from this list: send the line "unsubscribe linux-acpi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html