Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2990494imu; Mon, 19 Nov 2018 09:04:06 -0800 (PST) X-Google-Smtp-Source: AJdET5cvzZPcRDWgtsndoXQvcJQxlSzmXSFnkAEl6/DEu0t8uUXKbhTXJid+LodBEGSbtvQCKGcM X-Received: by 2002:a62:3a04:: with SMTP id h4mr23564593pfa.119.1542647046581; Mon, 19 Nov 2018 09:04:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542647046; cv=none; d=google.com; s=arc-20160816; b=uQ4jyR6NzDVz9mWIddo+2nd4Inby/QNBRUPSlTmGU3PkguChbhjZKDmkoQF830xpBv ui+qF9DRk1qXGDMo9xOxdrfXTGB/4cuFjlgHenH00duwDDiRDw5IyEv6rcExCyy/A4bc CUuYbj8Qw4T+VcpMriXof64zTKnrgdfRnaJFVo4s3TEnnqMz2cjdLuTbzSG/Gy6ursHi 2vd90hXow+rLOWJY/plvoIliouK47hcUY+TbMewxNrCTVkQJfNVBeMiQ8Wn3muvT01Jx 2PsMRrEXzsRFRaJOcvDYyxEwWk7albuxw5MU4AzBx9FLMqWB87mK4cCxGq3h0SjxHkLo 3fwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=iU0FVnTUjqOIHwBCgL4R3i2vFXicn0WFgt99cJJwHq8=; b=iWHkx92iQCnp9TGuv23oW5X1Bczf4jNGS6NUzurjT95sPatdh1yObz9YaewRtD9zaN fH9O+jn6JN5iZObayQI4RWWt4z6UuIifAzGxPN2PxiHHxKmKU7HqAt3E7yMDW6pfsCxe WrWINFjA3qBBz8fzPi8DrlERQg2OTcADuOlnOyaHcvqdfG50mecvtPE5ADB9iw5O2IfY n2CE7wfY7ncWCW7QYTALrkb15WtzCT9w+oaWez41fRc8cYPngurDm65/d3Z8XhqdmGzO J0BW/YYUzklrEg11xh7Pjmr+s6KTtQTiEExvrHL8Dil7BJnAazRQGp2wEboFzR2BUejn CvkQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="XF/hAvLR"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t130si12096205pgb.521.2018.11.19.09.03.51; Mon, 19 Nov 2018 09:04:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="XF/hAvLR"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405654AbeKTDZn (ORCPT + 99 others); Mon, 19 Nov 2018 22:25:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:38962 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2405645AbeKTDZm (ORCPT ); Mon, 19 Nov 2018 22:25:42 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AB37522353; Mon, 19 Nov 2018 17:01:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542646886; bh=0u8efe9F5PhtpMH3msGc9aNnTxgB487LGjtjIvk8zAA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XF/hAvLRo5Xo33HRgzDKEXK7Ew5FXWV7h+BPUFG5UDqXj/MGlVaBvL7QQ66ABX4xG SP0VjQ73q8XfuO9BDif3F2tXQT9AOtC3wYXEh6hhTiDbBweFyhJLsgN29DVPBCLnRP Bt/wyGs4ZiRM0lprO0lfvt/pEFUEjQgat+sD8D4c= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mikulas Patocka , =?UTF-8?q?Ville=20Syrj=C3=A4l=C3=A4?= , Bartlomiej Zolnierkiewicz Subject: [PATCH 4.4 128/160] mach64: fix image corruption due to reading accelerator registers Date: Mon, 19 Nov 2018 17:29:27 +0100 Message-Id: <20181119162642.817263568@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181119162630.031306128@linuxfoundation.org> References: <20181119162630.031306128@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Mikulas Patocka commit c09bcc91bb94ed91f1391bffcbe294963d605732 upstream. Reading the registers without waiting for engine idle returns unpredictable values. These unpredictable values result in display corruption - if atyfb_imageblit reads the content of DP_PIX_WIDTH with the bit DP_HOST_TRIPLE_EN set (from previous invocation), the driver would never ever clear the bit, resulting in display corruption. We don't want to wait for idle because it would degrade performance, so this patch modifies the driver so that it never reads accelerator registers. HOST_CNTL doesn't have to be read, we can just write it with HOST_BYTE_ALIGN because no other part of the driver cares if HOST_BYTE_ALIGN is set. DP_PIX_WIDTH is written in the functions atyfb_copyarea and atyfb_fillrect with the default value and in atyfb_imageblit with the value set according to the source image data. Signed-off-by: Mikulas Patocka Reviewed-by: Ville Syrjälä Cc: stable@vger.kernel.org Signed-off-by: Bartlomiej Zolnierkiewicz Signed-off-by: Greg Kroah-Hartman --- drivers/video/fbdev/aty/mach64_accel.c | 22 +++++++++------------- 1 file changed, 9 insertions(+), 13 deletions(-) --- a/drivers/video/fbdev/aty/mach64_accel.c +++ b/drivers/video/fbdev/aty/mach64_accel.c @@ -126,7 +126,7 @@ void aty_init_engine(struct atyfb_par *p /* set host attributes */ wait_for_fifo(13, par); - aty_st_le32(HOST_CNTL, 0, par); + aty_st_le32(HOST_CNTL, HOST_BYTE_ALIGN, par); /* set pattern attributes */ aty_st_le32(PAT_REG0, 0, par); @@ -232,7 +232,8 @@ void atyfb_copyarea(struct fb_info *info rotation = rotation24bpp(dx, direction); } - wait_for_fifo(4, par); + wait_for_fifo(5, par); + aty_st_le32(DP_PIX_WIDTH, par->crtc.dp_pix_width, par); aty_st_le32(DP_SRC, FRGD_SRC_BLIT, par); aty_st_le32(SRC_Y_X, (sx << 16) | sy, par); aty_st_le32(SRC_HEIGHT1_WIDTH1, (width << 16) | area->height, par); @@ -268,7 +269,8 @@ void atyfb_fillrect(struct fb_info *info rotation = rotation24bpp(dx, DST_X_LEFT_TO_RIGHT); } - wait_for_fifo(3, par); + wait_for_fifo(4, par); + aty_st_le32(DP_PIX_WIDTH, par->crtc.dp_pix_width, par); aty_st_le32(DP_FRGD_CLR, color, par); aty_st_le32(DP_SRC, BKGD_SRC_BKGD_CLR | FRGD_SRC_FRGD_CLR | MONO_SRC_ONE, @@ -283,7 +285,7 @@ void atyfb_imageblit(struct fb_info *inf { struct atyfb_par *par = (struct atyfb_par *) info->par; u32 src_bytes, dx = image->dx, dy = image->dy, width = image->width; - u32 pix_width_save, pix_width, host_cntl, rotation = 0, src, mix; + u32 pix_width, rotation = 0, src, mix; if (par->asleep) return; @@ -295,8 +297,7 @@ void atyfb_imageblit(struct fb_info *inf return; } - pix_width = pix_width_save = aty_ld_le32(DP_PIX_WIDTH, par); - host_cntl = aty_ld_le32(HOST_CNTL, par) | HOST_BYTE_ALIGN; + pix_width = par->crtc.dp_pix_width; switch (image->depth) { case 1: @@ -369,12 +370,11 @@ void atyfb_imageblit(struct fb_info *inf mix = FRGD_MIX_D_XOR_S | BKGD_MIX_D; } - wait_for_fifo(6, par); - aty_st_le32(DP_WRITE_MASK, 0xFFFFFFFF, par); + wait_for_fifo(5, par); aty_st_le32(DP_PIX_WIDTH, pix_width, par); aty_st_le32(DP_MIX, mix, par); aty_st_le32(DP_SRC, src, par); - aty_st_le32(HOST_CNTL, host_cntl, par); + aty_st_le32(HOST_CNTL, HOST_BYTE_ALIGN, par); aty_st_le32(DST_CNTL, DST_Y_TOP_TO_BOTTOM | DST_X_LEFT_TO_RIGHT | rotation, par); draw_rect(dx, dy, width, image->height, par); @@ -423,8 +423,4 @@ void atyfb_imageblit(struct fb_info *inf aty_st_le32(HOST_DATA0, get_unaligned_le32(pbitmap), par); } } - - /* restore pix_width */ - wait_for_fifo(1, par); - aty_st_le32(DP_PIX_WIDTH, pix_width_save, par); }