Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp3780420pxt; Tue, 10 Aug 2021 11:08:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy/Ddqsu16gwAmygOESDSOtFvMoQXoSFZSadEaPKipk9tPVrm4YCF0b8BfEPlOyf+g4Kw8L X-Received: by 2002:aa7:c45a:: with SMTP id n26mr6609911edr.218.1628618938855; Tue, 10 Aug 2021 11:08:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628618938; cv=none; d=google.com; s=arc-20160816; b=gskdZs4nmofgxY6zxnn3SwrT2A+NBON18whb/wTt4O9MP1zsMRd1Cbmj3krp/cjnOa l6Rzh/0ITSbeKJghSJzByMvWgzHBNkobD1+L0/A0MXxU9aG4WjnKhdurH5FurzKylRoO PEdmH7Ivfaqy+GzvG94acmQwa9+YCOJDMbybBa3H5jHXPPZIy1ys7/q6Hg7uGETIUkMH rxIBurg8oXJysAhZIamyEYe1cYEjFAJk+UHf9UY1/ixUyM0LSPzA83EpqwLl0PkIkTvC 9PF473pKvPj3rTc0tTQZHbZqco/AfE9DnGQJmN68/XxQ6inGRu0E0XzbajhFaCz6zIVD uqUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=DM94OHarA8cL1a14oTSeMyDy5TaZeZ+bAn11+B8FE3U=; b=nehcuXKSEJpqRJ8ZzfG10YjgtDyliXxRl3i5Jvp6GL045aLDMONZSAVx97nwf6Vc+/ S4Y1rYkGVqB2y5SksU/SortjifCjh6aT2qeL4C1Phh768S+ksXtYLDnzsz+dqX1wBlOJ 2HUlbAKGdfuHaaKjXvoczhpmEwT1hhm+EUionivofN77vopMBhaJjz8rBQWP9GLXFKXP Db58h7F26WMVbqPJq8bYLi3qNc6tnAnken/CvkjFGBcT3n7h7Dn6FhOpwiDLorY6xKnK dm9QeXW2hp0DA8TH8UjuCtSUqMDZV790th+D/ID9HaScBLOngtq9sc46Q9lETGuxbJ8W J9Bg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wWHwkDT2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i2si23778250edf.568.2021.08.10.11.08.34; Tue, 10 Aug 2021 11:08:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wWHwkDT2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238351AbhHJSEH (ORCPT + 99 others); Tue, 10 Aug 2021 14:04:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:60846 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238384AbhHJR7d (ORCPT ); Tue, 10 Aug 2021 13:59:33 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id AD2FE613A4; Tue, 10 Aug 2021 17:46:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1628617585; bh=BTEEXW6O5jYkijye2zWVLsXsrNnU0Sn38gQur0kljJI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wWHwkDT2MsQYSOVsyKOuriNA5OPhqLS4z+ik3qtt4r+BqK75X8o7Z9eq0AdO2AuhT 9V/sRHb88olR7s0N/qdWsWEXxBB4OVtxes3Jpsj86a7klj3VR8HPNE4IZFGvRrERBS X0RodUbOi5yZXPV+KyPNwE2bAGjZOV3jhtn/wgRY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christian Kellner , Mika Westerberg Subject: [PATCH 5.13 123/175] Revert "thunderbolt: Hide authorized attribute if router does not support PCIe tunnels" Date: Tue, 10 Aug 2021 19:30:31 +0200 Message-Id: <20210810173005.004696881@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210810173000.928681411@linuxfoundation.org> References: <20210810173000.928681411@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mika Westerberg commit 8e3341257e3b5774ec8cd3ef1ba0c0d3fada322b upstream. This reverts commit 6f3badead6a078cf3c71f381f9d84ac922984a00. It turns out bolt depends on having authorized attribute visible under each device. Hiding it makes bolt crash as several people have reported on various bug trackers. For this reason revert the commit. Link: https://gitlab.freedesktop.org/bolt/bolt/-/issues/174 Link: https://bugzilla.redhat.com/show_bug.cgi?id=1979765 Link: https://bugs.archlinux.org/task/71569 Cc: stable@vger.kernel.org Cc: Christian Kellner Fixes: 6f3badead6a0 ("thunderbolt: Hide authorized attribute if router does not support PCIe tunnels") Signed-off-by: Mika Westerberg Link: https://lore.kernel.org/r/20210727142501.27476-1-mika.westerberg@linux.intel.com Signed-off-by: Greg Kroah-Hartman --- drivers/thunderbolt/switch.c | 15 +-------------- 1 file changed, 1 insertion(+), 14 deletions(-) --- a/drivers/thunderbolt/switch.c +++ b/drivers/thunderbolt/switch.c @@ -1740,18 +1740,6 @@ static struct attribute *switch_attrs[] NULL, }; -static bool has_port(const struct tb_switch *sw, enum tb_port_type type) -{ - const struct tb_port *port; - - tb_switch_for_each_port(sw, port) { - if (!port->disabled && port->config.type == type) - return true; - } - - return false; -} - static umode_t switch_attr_is_visible(struct kobject *kobj, struct attribute *attr, int n) { @@ -1760,8 +1748,7 @@ static umode_t switch_attr_is_visible(st if (attr == &dev_attr_authorized.attr) { if (sw->tb->security_level == TB_SECURITY_NOPCIE || - sw->tb->security_level == TB_SECURITY_DPONLY || - !has_port(sw, TB_TYPE_PCIE_UP)) + sw->tb->security_level == TB_SECURITY_DPONLY) return 0; } else if (attr == &dev_attr_device.attr) { if (!sw->device)