Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp5819470rwl; Sun, 8 Jan 2023 23:32:32 -0800 (PST) X-Google-Smtp-Source: AMrXdXtse+PSO1oO/tC+YXtygXkxTBaUVVT2SFdqSKaqbigIZ1kce3yWc3nmOrYDzDhb26jSbvrG X-Received: by 2002:a05:6402:2409:b0:493:597e:2192 with SMTP id t9-20020a056402240900b00493597e2192mr13145865eda.38.1673249552437; Sun, 08 Jan 2023 23:32:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673249552; cv=none; d=google.com; s=arc-20160816; b=BLaSoyV9zut1OtLdnjHuKSVTKI3iymf20hQivr85/X62b5OuJf8f8TURC7g8y9sK2y rwYPDC0bPDBkjkJwjXWCogFbTEhPpW5eDMNnc5eL5OOHYnwvh6RCpiNA5dNLqWvrQ9fd CdoLQTetBqZA1b9ASZAwsws4k35BGMqaFLWqogpu07WO36wZI3CjX4el2sdYnOG844Sd alzlVa4BNeKyzYDeE8SzRubDab+8//QQ6EGHKsKld4GPxqGBbJ6VLHF02HWe6IRxWu+T fqhITrv4sfLguWITJHXAw/x7NgP2B9FJ/PA67IAInE9Bass6Zsnul6Z2Rre/HoItpzmT ho9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=uT0Mq48ZlRMvwajxL4lzX4MGf/UZE9fla3NQAZQBIS8=; b=ewLOivN7omO+vWoKWJDunB6SH1Qf6Ip7Gy1ontnarh5xeyBixhiIuIvY0mGgpP+Lug pCuopsUPa3vnPUd5ikaGcNPFktVWTwzozcIlXn5+jU6LIPbKI/2s7c+RoRmF7RpwGc+s MX28gOl0xmgoYFTrwAszY6Nu7pKK7xG4b2JGVwWfWrI2kvAcgvRgMmFlh4NxiFuU7nVs FbwWESb482jZ/VFJ8bde0nXyncX1JklTHhR1viG7YE02jwywijjpToTnx1Zm78FU9PCV EJHHVBltErID7IBuxkVjuz+BO+g/KFDRfbQgOylg531hau+2Xh1BRay1/asHDJUJBe8K foiQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id cw6-20020a056402228600b004974112a35dsi7294664edb.541.2023.01.08.23.32.19; Sun, 08 Jan 2023 23:32:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234278AbjAIHUm (ORCPT + 56 others); Mon, 9 Jan 2023 02:20:42 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36458 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233151AbjAIHUY (ORCPT ); Mon, 9 Jan 2023 02:20:24 -0500 Received: from mg.richtek.com (mg.richtek.com [220.130.44.152]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 9E806FE9; Sun, 8 Jan 2023 23:20:17 -0800 (PST) X-MailGates: (flag:4,DYNAMIC,BADHELO,RELAY,NOHOST:PASS)(compute_score:DE LIVER,40,3) Received: from 192.168.10.46 by mg.richtek.com with MailGates ESMTP Server V5.0(16471:0:AUTH_RELAY) (envelope-from ); Mon, 09 Jan 2023 15:19:51 +0800 (CST) Received: from ex3.rt.l (192.168.10.46) by ex3.rt.l (192.168.10.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.20; Mon, 9 Jan 2023 15:19:51 +0800 Received: from linuxcarl2.richtek.com (192.168.10.154) by ex3.rt.l (192.168.10.45) with Microsoft SMTP Server id 15.2.1118.20 via Frontend Transport; Mon, 9 Jan 2023 15:19:51 +0800 From: To: , , CC: , , , , , , ChiYuan Huang , Subject: [PATCH RESEND v2] usb: typec: tcpm: Fix altmode re-registration causes sysfs create fail Date: Mon, 9 Jan 2023 15:19:50 +0800 Message-ID: <1673248790-15794-1-git-send-email-cy_huang@richtek.com> X-Mailer: git-send-email 1.8.3.1 MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: ChiYuan Huang There's the altmode re-registeration issue after data role swap (DR_SWAP). Comparing to USBPD 2.0, in USBPD 3.0, it loose the limit that only DFP can initiate the VDM command to get partner identity information. For a USBPD 3.0 UFP device, it may already get the identity information from its port partner before DR_SWAP. If DR_SWAP send or receive at the mean time, 'send_discover' flag will be raised again. It causes discover identify action restart while entering ready state. And after all discover actions are done, the 'tcpm_register_altmodes' will be called. If old altmode is not unregistered, this sysfs create fail can be found. In 'DR_SWAP_CHANGE_DR' state case, only DFP will unregister altmodes. For UFP, the original altmodes keep registered. This patch fix the logic that after DR_SWAP, 'tcpm_unregister_altmodes' must be called whatever the current data role is. Reviewed-by: Macpaul Lin Fixes: ae8a2ca8a221 ("usb: typec: Group all TCPCI/TCPM code together) Reported-by: TommyYl Chen Cc: stable@vger.kernel.org Signed-off-by: ChiYuan Huang --- Since v2: - Correct the mail sent from Richtek. - Add 'Reviewed-by' tag. Hi, Greg: Please check this one. I have strongly requested our MIS to remove the confidential string. ChiYuan Huang. --- drivers/usb/typec/tcpm/tcpm.c | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/drivers/usb/typec/tcpm/tcpm.c b/drivers/usb/typec/tcpm/tcpm.c index 904c7b4..59b366b 100644 --- a/drivers/usb/typec/tcpm/tcpm.c +++ b/drivers/usb/typec/tcpm/tcpm.c @@ -4594,14 +4594,13 @@ static void run_state_machine(struct tcpm_port *port) tcpm_set_state(port, ready_state(port), 0); break; case DR_SWAP_CHANGE_DR: - if (port->data_role == TYPEC_HOST) { - tcpm_unregister_altmodes(port); + tcpm_unregister_altmodes(port); + if (port->data_role == TYPEC_HOST) tcpm_set_roles(port, true, port->pwr_role, TYPEC_DEVICE); - } else { + else tcpm_set_roles(port, true, port->pwr_role, TYPEC_HOST); - } tcpm_ams_finish(port); tcpm_set_state(port, ready_state(port), 0); break; -- 2.7.4