Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1684308ybz; Thu, 16 Apr 2020 13:38:40 -0700 (PDT) X-Google-Smtp-Source: APiQypJfl4Wjm0jClwinIJSU0QwCm1nF8YICy1iHY3nA3OvmJqbF+drmMxUX3XIrKtbHXlOE56YL X-Received: by 2002:a17:906:d1c4:: with SMTP id bs4mr11330060ejb.109.1587069519872; Thu, 16 Apr 2020 13:38:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587069519; cv=none; d=google.com; s=arc-20160816; b=ZLiUtsTaJNVJV3hMRQnrhGJ0U5wUHYKdJIzJsPO5AR2FdWpfxVbQ8Kyow5/75cOVnb DXNfphc+dq/yhXjIIymLmViyUatqReuj/r8Cb2juQTLbxL55VXL+LPxBjtxktndhWXY0 tyWlNImqQMJxE834hbZIWdhxZg9jvtrvjLPt0hioSp3sXQ72XQyVChTglWUTgcgoMWSU U66xeEkZYnp5OJ3p7JmiUKSt+J4YRRjLyzystyaqDJgI8X5ndl0E6gV7+yeCZ/ud/b/V 0QHAzCcjzz3NV4Gg37CaDkFouzFjlPeRsmpsBG+kmYy0IpsFmDreezzuL1096TVsPHA9 qhMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=mTRRTKNSdMVpmIj+KsARCU29t+JetII7xmJ0kZJ9OiQ=; b=ccqBv314Ho+IF1zxpk5dXfvYyYu3xs6Uo93qaWwlGYDsXBoNEylwbdXnxtHvmXlGy6 UGaHPwB/f3not8D5EQiueVykpmCdIni6pdqk3BxfRe7kjoI2/1jePpQGZM700+L3DH4y PKJkUXm9rNDtaSND4VlLl3NAmUTT8jIoGZXRfc8xUT3mwKAHlSsycsfVbdpmMc5R6xzc DcHeVD+xKl5i+9PjeaXffbo/PaGUljlv6LtHEhKvOP2+vt2k8UbXlW4sRwfirf3lJArT LxRCKHbXzcMzqnNz7WUtXzfjlcLGPK0JrYVXhN5NGo6WShojd7g/F8Nvf8KGxwvfxlwh UQAA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=U06ecuRO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bu17si1633254edb.276.2020.04.16.13.38.16; Thu, 16 Apr 2020 13:38:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=U06ecuRO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2896786AbgDPPxo (ORCPT + 99 others); Thu, 16 Apr 2020 11:53:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:43730 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2896402AbgDPNcs (ORCPT ); Thu, 16 Apr 2020 09:32:48 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 09001221EB; Thu, 16 Apr 2020 13:31:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587043888; bh=LoemScDtwq3mKzvNIvuf4pkxIjr/iGO4pf7UOgojR8A=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=U06ecuROZpseln+qta9b2DmSBw9LZKEgN+hpLhJN8ezlQCiwZnjijj7Oepipkuipp XDVmsnkWWJNd/8VVEytoOE+LfE4ZPLFJNmOLmcle1SCuCki23VsETHMhZ6Bzqvq01r LC8dTUdOQxREGg7rgWkDOwrPxO70aipmwd2nfkIk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sean Paul , Wayne Lin , =?UTF-8?q?Ville=20Syrj=C3=A4l=C3=A4?= , Lyude Paul , Sasha Levin Subject: [PATCH 4.19 141/146] drm/dp_mst: Fix clearing payload state on topology disable Date: Thu, 16 Apr 2020 15:24:42 +0200 Message-Id: <20200416131301.651728040@linuxfoundation.org> X-Mailer: git-send-email 2.26.1 In-Reply-To: <20200416131242.353444678@linuxfoundation.org> References: <20200416131242.353444678@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Lyude Paul [ Upstream commit 8732fe46b20c951493bfc4dba0ad08efdf41de81 ] The issues caused by: commit 64e62bdf04ab ("drm/dp_mst: Remove VCPI while disabling topology mgr") Prompted me to take a closer look at how we clear the payload state in general when disabling the topology, and it turns out there's actually two subtle issues here. The first is that we're not grabbing &mgr.payload_lock when clearing the payloads in drm_dp_mst_topology_mgr_set_mst(). Seeing as the canonical lock order is &mgr.payload_lock -> &mgr.lock (because we always want &mgr.lock to be the inner-most lock so topology validation always works), this makes perfect sense. It also means that -technically- there could be racing between someone calling drm_dp_mst_topology_mgr_set_mst() to disable the topology, along with a modeset occurring that's modifying the payload state at the same time. The second is the more obvious issue that Wayne Lin discovered, that we're not clearing proposed_payloads when disabling the topology. I actually can't see any obvious places where the racing caused by the first issue would break something, and it could be that some of our higher-level locks already prevent this by happenstance, but better safe then sorry. So, let's make it so that drm_dp_mst_topology_mgr_set_mst() first grabs &mgr.payload_lock followed by &mgr.lock so that we never race when modifying the payload state. Then, we also clear proposed_payloads to fix the original issue of enabling a new topology with a dirty payload state. This doesn't clear any of the drm_dp_vcpi structures, but those are getting destroyed along with the ports anyway. Changes since v1: * Use sizeof(mgr->payloads[0])/sizeof(mgr->proposed_vcpis[0]) instead - vsyrjala Cc: Sean Paul Cc: Wayne Lin Cc: Ville Syrjälä Cc: stable@vger.kernel.org # v4.4+ Signed-off-by: Lyude Paul Reviewed-by: Ville Syrjälä Link: https://patchwork.freedesktop.org/patch/msgid/20200122194321.14953-1-lyude@redhat.com Signed-off-by: Sasha Levin --- drivers/gpu/drm/drm_dp_mst_topology.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/drivers/gpu/drm/drm_dp_mst_topology.c b/drivers/gpu/drm/drm_dp_mst_topology.c index b4fd20062bb80..5f508ec321fef 100644 --- a/drivers/gpu/drm/drm_dp_mst_topology.c +++ b/drivers/gpu/drm/drm_dp_mst_topology.c @@ -2117,6 +2117,7 @@ int drm_dp_mst_topology_mgr_set_mst(struct drm_dp_mst_topology_mgr *mgr, bool ms int ret = 0; struct drm_dp_mst_branch *mstb = NULL; + mutex_lock(&mgr->payload_lock); mutex_lock(&mgr->lock); if (mst_state == mgr->mst_state) goto out_unlock; @@ -2175,7 +2176,10 @@ int drm_dp_mst_topology_mgr_set_mst(struct drm_dp_mst_topology_mgr *mgr, bool ms /* this can fail if the device is gone */ drm_dp_dpcd_writeb(mgr->aux, DP_MSTM_CTRL, 0); ret = 0; - memset(mgr->payloads, 0, mgr->max_payloads * sizeof(struct drm_dp_payload)); + memset(mgr->payloads, 0, + mgr->max_payloads * sizeof(mgr->payloads[0])); + memset(mgr->proposed_vcpis, 0, + mgr->max_payloads * sizeof(mgr->proposed_vcpis[0])); mgr->payload_mask = 0; set_bit(0, &mgr->payload_mask); mgr->vcpi_mask = 0; @@ -2183,6 +2187,7 @@ int drm_dp_mst_topology_mgr_set_mst(struct drm_dp_mst_topology_mgr *mgr, bool ms out_unlock: mutex_unlock(&mgr->lock); + mutex_unlock(&mgr->payload_lock); if (mstb) drm_dp_put_mst_branch_device(mstb); return ret; -- 2.20.1