Received: by 2002:a05:7412:ba23:b0:fa:4c10:6cad with SMTP id jp35csp2220339rdb; Sun, 21 Jan 2024 12:41:54 -0800 (PST) X-Google-Smtp-Source: AGHT+IEYvDAvKANH7Etxqpw9Kc5RU9sbDnap8tQAaM56bF+pXzMl940DYc3QhC1UCsemXold5WMe X-Received: by 2002:a05:6402:42c2:b0:55c:2853:2228 with SMTP id i2-20020a05640242c200b0055c28532228mr768833edc.29.1705869714685; Sun, 21 Jan 2024 12:41:54 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1705869714; cv=pass; d=google.com; s=arc-20160816; b=LNiliU/Jgy93IZWpM/TdZbRqTW24lniml1GCr5yxfYML67RDfeCg4ocjjrRt7Flq+w 6V76VD/uRgcvRXqNDcx1sI1PSHUEkVdA7PEmsh5ADAAIhkRYMm9g2HLgOduEKJUcwO6A FCcpNmh9k7xg0QyPKNMxKWrZOC1Ivew7Akdr3WZOQ6fOfq+ovddy9HgbvCLl99QWsT5e BQketwR2hF5V/UO+6pu2iti07wuYgWMUGKr/5BzBDoW2JO7ndaXBHl/gYdnUIaUuWpMM nHQZpxJAozf4aCqYHau+RIpljnMsAUDJmwe19nv7oIkXYmYbCA8Flr9xZtRJSqbgzXGN ugYw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from; bh=x6ahsrJKRgyGRx2Q5qS8R9hqphG3/Ozc+FINaMVYqiw=; fh=PBT+T+L/Wk7fQyAuF/ivTwxWqTQzcP6BniPDJctp9Xs=; b=ufJPMe3jZXytl33jesCQ6SjDG0ifEMgwxLstFpMi5J5Z8H+5MCpyD4JzD4Sg/cmEpU Qv4gHr77CMpq50A0SgcTJSiesV++XrcM8mG9ersDlI9kxkkjtAA9F3IFUxGuOlOj8FNM 2BuJBPNhuVX736ddyM+zj+T8wmsboKBbbMxBkJuFYl1hYyW4bV+pucCrZ6zqDliFatrJ mEfH7+StVeOsjdp6k3/P5WAK+QDsetpdQIb/aD/KWqJr9RmzAlAQXUGhT8EJnS6K9zRJ ptRh4fTcICdUdULqkQrjduJ0rOC+QwMdSlnKB8Zug9U8yEhBdPEnHB3pGm1rvIYzmpKU BTyw== ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=c--e.de); spf=pass (google.com: domain of linux-kernel+bounces-32184-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-32184-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id t15-20020aa7d4cf000000b0055a34e06c03si3750293edr.611.2024.01.21.12.41.54 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 21 Jan 2024 12:41:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-32184-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=c--e.de); spf=pass (google.com: domain of linux-kernel+bounces-32184-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-32184-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 734981F217C1 for ; Sun, 21 Jan 2024 20:41:54 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id E398C38DD5; Sun, 21 Jan 2024 20:41:42 +0000 (UTC) Received: from cae.in-ulm.de (cae.in-ulm.de [217.10.14.231]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 55CC0381A9; Sun, 21 Jan 2024 20:41:38 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.10.14.231 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705869702; cv=none; b=pzZJ8DUXSKeM2a1K3SVm2nMEevWEB1StrXB8wjLti3pAZpNfttKtf2bx0a9uKauiZcFWpzar6uUHjKR8iX2W4csgjCBBNVH2wO8eFvZXjbh8Qd94g/iaSo+omOXaSLzQV5vbGiK82LsQtyP32M3kCGOQIY9ccJDyl63XPtriXnU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705869702; c=relaxed/simple; bh=A1sAifn2sBFzYOkWtoxj0vCZieiNpW4Rdqd4QI70m+E=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=l97Vdgn7WQ5ECaM2ovzuln5+6TmLHFJ4GQGLeM0WGOeEinW8bx94rsuJl6BtvtnSUoL58epl6MQ7GDF7LTmeoYBll9JWm8FhkZ8bIHGltJqEWlHBqTGaBMURBBv7QUspfhrDSs/rN4P0ldWIIg0p/dk+saNMUa86Db8AxE+yW64= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=c--e.de; spf=pass smtp.mailfrom=c--e.de; arc=none smtp.client-ip=217.10.14.231 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=c--e.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=c--e.de Received: by cae.in-ulm.de (Postfix, from userid 1000) id 1D1C01401CF; Sun, 21 Jan 2024 21:41:37 +0100 (CET) From: "Christian A. Ehrhardt" To: Heikki Krogerus , linux-usb@vger.kernel.org Cc: "Christian A. Ehrhardt" , Dell.Client.Kernel@dell.com, Greg Kroah-Hartman , Neil Armstrong , Hans de Goede , Jack Pham , Fabrice Gasnier , =?UTF-8?q?Samuel=20=C4=8Cavoj?= , linux-kernel@vger.kernel.org Subject: [PATCH v3 0/3] UCSI fixes Date: Sun, 21 Jan 2024 21:41:20 +0100 Message-Id: <20240121204123.275441-1-lk@c--e.de> X-Mailer: git-send-email 2.30.2 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit This small series contains two general bugfixes to ucsi_acpi and a quirk to make the UCSI controller on various Dell laptops work. The changes can be applied idependently but all three are required to fix the Dell issues. For details on the general bugfixes please refer to the individual commit messages. The UCSI interface on a Dell Latitude 5431 stops working after the first async event with: GET_CONNECTOR_STATUS failed (-110) The core problem is that when sending the ACK_CC_CI command to clear the connector status changed condition the PPM expects us to send anothr ack for the command completion condition. However, the UCSI spec states that no ack for the command completion is required when the command is ACK_CC_CI (or PPM_RESET). There are various reports that suggest that several Dell laptops are affected by this problem. E.g. the kernel bugzilla has this report which is most likely an instance of this bug: https://bugzilla.kernel.org/show_bug.cgi?id=216426 This led me to the somewhat bold conclusion that the quirk should probably be applied to on Dell systems. To mitigate potential problems from this dell quirk includes a probe mechanism that detect the need for the quirk once and we only deviate from the UCSI spec if the quirk is actually required. Changes in v3 from v2: - Add an info message if the quirk is enabled. - Fix checkpatch errors etc. - Add Fixes: and CC: stable. Changes in v2 from v1: - Add a second general bugfix. - Remove module parmater and generic quirk infrastructure. - Implement quirk directly in ucsi_acpi.c - Add probe logic to reliably detect the need for the quirk Christian A. Ehrhardt (3): usb: ucsi: Add missing ppm_lock usb: ucsi_acpi: Fix command completion handling usb: ucsi_acpi: Quirk to ack a connector change ack cmd drivers/usb/typec/ucsi/ucsi.c | 2 + drivers/usb/typec/ucsi/ucsi_acpi.c | 86 +++++++++++++++++++++++++++--- 2 files changed, 81 insertions(+), 7 deletions(-) -- 2.40.1