Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp555633pxu; Fri, 23 Oct 2020 07:48:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyvM4uq4+beFkShOEnoGxu+4aOlTKyzJdd/sHqoQtCkNEZZ98I/TZ1AwWQL7c7iUVpHCdCM X-Received: by 2002:a05:6402:941:: with SMTP id h1mr2437610edz.154.1603464520766; Fri, 23 Oct 2020 07:48:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603464520; cv=none; d=google.com; s=arc-20160816; b=jGSRVQJw4MmEoEruYApoo3zwibwbVzByNsCriq9teuYGQ935rJuNdMkYKrJN3olVEx a0Js6KEb1toFzTLDYbhuy2TTM1zDaSO63IvxYmEpJTkGrjttdDeMOApoRa0BFUysD1Hc MyFUJOvU3Ki/BW////rLdtg3nAypa5IyclFatRB6dflH7+JCaNozwYY/xuYezzRzGBZk h1+NgyG0xID94vIIyQWduDvJBQUBYwzc4VA6mMBRKmYMyiCsv8tGr4I/nV7YQY399VqX TzXwQVc4QOno0kxBGv22qvD0NdXpWDwN/0L4tNSmI4sbujwt7jQKs1e7pL1bxlL/i9ex MgtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=1fU4iynhRY7EUL0uvCaPOuIxC4d1WEm+isPbQS2w0SU=; b=cIHaxzNohQFx2jhc7E3IRNEpKSb4qjN3kJoEkymdplRD66PPs52ZkNUyzPlswTU0OU 6KuO+nD75SfRuu4R1KxibUY7auNacg4+PhnkRGdTU1DSgM41FAO9LWVqZIokbL1bH++0 KCcETpYYr80eJcrXBNYQQHx8Gjhkys1ZQTyYIC5Nc5TLiAl+QbUnK1+fgnOfMoOTkg9l MecxUUlMVB7w6beJpPcsTSiKBuBAD14/CbJ2se+o1dKi+XYFPynItIbcD6o/2W8BdooX xlseOIRJ+vN6swTxpeaKX7lMj7l0S3fmLHzapdrdJc9rRlFoF9T+c96nOoX/Z/F5Loy0 r2KA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n16si954548eja.205.2020.10.23.07.48.18; Fri, 23 Oct 2020 07:48:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S374696AbgJWHrQ (ORCPT + 99 others); Fri, 23 Oct 2020 03:47:16 -0400 Received: from mx2.suse.de ([195.135.220.15]:59584 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S374596AbgJWHrO (ORCPT ); Fri, 23 Oct 2020 03:47:14 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 5ECCEAC43; Fri, 23 Oct 2020 07:47:13 +0000 (UTC) From: Takashi Iwai To: dri-devel@lists.freedesktop.org Cc: amd-gfx@lists.freedesktop.org, linux-kernel@vger.kernel.org Subject: [PATCH 1/3] drm/amd/display: Fix kernel panic by dal_gpio_open() error Date: Fri, 23 Oct 2020 09:46:54 +0200 Message-Id: <20201023074656.11855-2-tiwai@suse.de> X-Mailer: git-send-email 2.16.4 In-Reply-To: <20201023074656.11855-1-tiwai@suse.de> References: <20201023074656.11855-1-tiwai@suse.de> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently both error code paths handled in dal_gpio_open_ex() issues ASSERT_CRITICAL(), and this leads to a kernel panic unnecessarily if CONFIG_KGDB is enabled. Since basically both are non-critical errors and can be recovered, drop those assert calls and use a safer one, BREAK_TO_DEBUGGER(), for allowing the debugging, instead. BugLink: https://bugzilla.opensuse.org/show_bug.cgi?id=1177973 Cc: Signed-off-by: Takashi Iwai --- drivers/gpu/drm/amd/display/dc/gpio/gpio_base.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/gpu/drm/amd/display/dc/gpio/gpio_base.c b/drivers/gpu/drm/amd/display/dc/gpio/gpio_base.c index f67c18375bfd..dac427b68fd7 100644 --- a/drivers/gpu/drm/amd/display/dc/gpio/gpio_base.c +++ b/drivers/gpu/drm/amd/display/dc/gpio/gpio_base.c @@ -63,13 +63,13 @@ enum gpio_result dal_gpio_open_ex( enum gpio_mode mode) { if (gpio->pin) { - ASSERT_CRITICAL(false); + BREAK_TO_DEBUGGER(); return GPIO_RESULT_ALREADY_OPENED; } // No action if allocation failed during gpio construct if (!gpio->hw_container.ddc) { - ASSERT_CRITICAL(false); + BREAK_TO_DEBUGGER(); return GPIO_RESULT_NON_SPECIFIC_ERROR; } gpio->mode = mode; -- 2.16.4