Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp695178ybv; Thu, 13 Feb 2020 07:55:01 -0800 (PST) X-Google-Smtp-Source: APXvYqwZhv4AxUzEMsa/ZT9YojBhIIEhk87UTE2gZvHxl5jnElUvcHZDB/nZoucsp/7Z/MS6Yyfu X-Received: by 2002:a05:6830:139a:: with SMTP id d26mr14355523otq.75.1581609301004; Thu, 13 Feb 2020 07:55:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581609300; cv=none; d=google.com; s=arc-20160816; b=fF3pn+F0cI1TyR4nHDVnNgPeQ65KqJhDIItyHlEa1PKhNLH/b4tzWCobFUyrTBBGmJ L4q10kkSvOhEQb6wxXCqGYnlTsqFaLIl1uGV2aeP/UrdXY4e5xOcOSL8kcNr+e0V36mh mdjVdanWoZATs2EssmvqHtYS9alJ10aagvzWH9BA73dsK3trJUYm9bfJ3AxhkidnXr3R EHy0vQPb0bCUlt0Yk3gQCQNBiJ2nrOSdEXpyAuDqIc9HWWw/UAdNjvbCzNVvF4t5MPJR cvqitrWQw4e8TNvJnP1pBY5iC41rbWWCNLPO/dyizI5mL8LZ46npnXD2X3f43E95sWHg PIdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=XrchoCJBHbNksLZghus3xH4CHlH0SMyN7wM0ih2WCdg=; b=IyYcKD7v4WPC1ZVJDhS/2EYRyVsafG47/qMdRXJHOkVnhj5gIQbG89lSuXG01Cklbq 8leK+ImygqjOq/CHL08L9seEPOPukm5UZnRR13VJJBHefFo/twTjoWWj8w7wBxJaGJMn E26ozwjsI0Eq/wOEq0tqdmn/nuf5hGdKE+/nzgGwFSHHCjR6c7+r1Vf7fGVaebnK94P2 P/LSEqpcVuhjaKerwCryEYe2wYQfRau77NHluLqpLAbuDR0BS2qC/s7WFne+1EnBr92Q Z77Q/XSOI/4nO+R/R4Nhm4P/AV3O4L3KKTjBuXIZLOsgNXh3PmtaDetZEzgt9MYKTVPg M/gw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="z8/FOZNP"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d83si1293210oib.166.2020.02.13.07.54.46; Thu, 13 Feb 2020 07:55:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="z8/FOZNP"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729090AbgBMPZv (ORCPT + 99 others); Thu, 13 Feb 2020 10:25:51 -0500 Received: from mail.kernel.org ([198.145.29.99]:36746 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728584AbgBMPYH (ORCPT ); Thu, 13 Feb 2020 10:24:07 -0500 Received: from localhost (unknown [104.132.1.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AD7DA20848; Thu, 13 Feb 2020 15:24:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581607445; bh=RkvVxjVniafEYFLD5/3Du9E96eZyu/XJaraLUL93oyg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=z8/FOZNP65GGBcPrMSw6L6IJ23ogCszPMMuajbNYu4I+HbSOPeuDl6WvpFhucS+8o NL/Fs8ynGv6NUU5K/gRH/BwmSdYZhI12cVv9y2tUU5iIsRivCUH9HhnYVyb+ALMZOv xKWkdxSPLzudeJpELsdejofXyfcfcC8RWOCC9G8o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Wayne Lin , Lyude Paul , Sasha Levin Subject: [PATCH 4.9 087/116] drm/dp_mst: Remove VCPI while disabling topology mgr Date: Thu, 13 Feb 2020 07:20:31 -0800 Message-Id: <20200213151916.429278047@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200213151842.259660170@linuxfoundation.org> References: <20200213151842.259660170@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Wayne Lin [ Upstream commit 64e62bdf04ab8529f45ed0a85122c703035dec3a ] [Why] This patch is trying to address the issue observed when hotplug DP daisy chain monitors. e.g. src-mstb-mstb-sst -> src (unplug) mstb-mstb-sst -> src-mstb-mstb-sst (plug in again) Once unplug a DP MST capable device, driver will call drm_dp_mst_topology_mgr_set_mst() to disable MST. In this function, it cleans data of topology manager while disabling mst_state. However, it doesn't clean up the proposed_vcpis of topology manager. If proposed_vcpi is not reset, once plug in MST daisy chain monitors later, code will fail at checking port validation while trying to allocate payloads. When MST capable device is plugged in again and try to allocate payloads by calling drm_dp_update_payload_part1(), this function will iterate over all proposed virtual channels to see if any proposed VCPI's num_slots is greater than 0. If any proposed VCPI's num_slots is greater than 0 and the port which the specific virtual channel directed to is not in the topology, code then fails at the port validation. Since there are stale VCPI allocations from the previous topology enablement in proposed_vcpi[], code will fail at port validation and reurn EINVAL. [How] Clean up the data of stale proposed_vcpi[] and reset mgr->proposed_vcpis to NULL while disabling mst in drm_dp_mst_topology_mgr_set_mst(). Changes since v1: *Add on more details in commit message to describe the issue which the patch is trying to fix Signed-off-by: Wayne Lin [added cc to stable] Signed-off-by: Lyude Paul Link: https://patchwork.freedesktop.org/patch/msgid/20191205090043.7580-1-Wayne.Lin@amd.com Cc: # v3.17+ Signed-off-by: Sasha Levin --- drivers/gpu/drm/drm_dp_mst_topology.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/drivers/gpu/drm/drm_dp_mst_topology.c b/drivers/gpu/drm/drm_dp_mst_topology.c index 17aedaaf364c1..8b1d497b7f99f 100644 --- a/drivers/gpu/drm/drm_dp_mst_topology.c +++ b/drivers/gpu/drm/drm_dp_mst_topology.c @@ -2042,6 +2042,7 @@ static bool drm_dp_get_vc_payload_bw(int dp_link_bw, int drm_dp_mst_topology_mgr_set_mst(struct drm_dp_mst_topology_mgr *mgr, bool mst_state) { int ret = 0; + int i = 0; struct drm_dp_mst_branch *mstb = NULL; mutex_lock(&mgr->lock); @@ -2106,10 +2107,21 @@ int drm_dp_mst_topology_mgr_set_mst(struct drm_dp_mst_topology_mgr *mgr, bool ms /* this can fail if the device is gone */ drm_dp_dpcd_writeb(mgr->aux, DP_MSTM_CTRL, 0); ret = 0; + mutex_lock(&mgr->payload_lock); memset(mgr->payloads, 0, mgr->max_payloads * sizeof(struct drm_dp_payload)); mgr->payload_mask = 0; set_bit(0, &mgr->payload_mask); + for (i = 0; i < mgr->max_payloads; i++) { + struct drm_dp_vcpi *vcpi = mgr->proposed_vcpis[i]; + + if (vcpi) { + vcpi->vcpi = 0; + vcpi->num_slots = 0; + } + mgr->proposed_vcpis[i] = NULL; + } mgr->vcpi_mask = 0; + mutex_unlock(&mgr->payload_lock); } out_unlock: -- 2.20.1