]> git.baikalelectronics.ru Git - kernel.git/commitdiff
fbdev/efifb: Release PCI device's runtime PM ref during FB destroy
authorImre Deak <imre.deak@intel.com>
Mon, 9 Aug 2021 13:31:46 +0000 (16:31 +0300)
committerImre Deak <imre.deak@intel.com>
Fri, 13 Aug 2021 13:38:04 +0000 (16:38 +0300)
Atm the EFI FB platform driver gets a runtime PM reference for the
associated GFX PCI device during probing the EFI FB platform device and
releases it only when the platform device gets unbound.

When fbcon switches to the FB provided by the PCI device's driver (for
instance i915/drmfb), the EFI FB will get only unregistered without the
EFI FB platform device getting unbound, keeping the runtime PM reference
acquired during the platform device probing. This reference will prevent
the PCI driver from runtime suspending the device.

Fix this by releasing the RPM reference from the EFI FB's destroy hook,
called when the FB gets unregistered.

While at it assert that pm_runtime_get_sync() didn't fail.

v2:
- Move pm_runtime_get_sync() before register_framebuffer() to avoid its
  race wrt. efifb_destroy()->pm_runtime_put(). (Daniel)
- Assert that pm_runtime_get_sync() didn't fail.
- Clarify commit message wrt. platform/PCI device/driver and driver
  removal vs. device unbinding.

Fixes: a6c0fd3d5a8b ("efifb: Ensure graphics device for efifb stays at PCI D0")
Cc: Kai-Heng Feng <kai.heng.feng@canonical.com>
Cc: Daniel Vetter <daniel.vetter@ffwll.ch>
Reviewed-by: Daniel Vetter <daniel.vetter@ffwll.ch> (v1)
Acked-by: Alex Deucher <alexander.deucher@amd.com>
Acked-by: Kai-Heng Feng <kai.heng.feng@canonical.com>
Signed-off-by: Imre Deak <imre.deak@intel.com>
Link: https://patchwork.freedesktop.org/patch/msgid/20210809133146.2478382-1-imre.deak@intel.com
drivers/video/fbdev/efifb.c

index 8ea8f079cde267282f8e6bfb5805f56232994fea..edca3703b9640ccf905cc627140535852806738c 100644 (file)
@@ -47,6 +47,8 @@ static bool use_bgrt = true;
 static bool request_mem_succeeded = false;
 static u64 mem_flags = EFI_MEMORY_WC | EFI_MEMORY_UC;
 
+static struct pci_dev *efifb_pci_dev;  /* dev with BAR covering the efifb */
+
 static struct fb_var_screeninfo efifb_defined = {
        .activate               = FB_ACTIVATE_NOW,
        .height                 = -1,
@@ -243,6 +245,9 @@ static inline void efifb_show_boot_graphics(struct fb_info *info) {}
 
 static void efifb_destroy(struct fb_info *info)
 {
+       if (efifb_pci_dev)
+               pm_runtime_put(&efifb_pci_dev->dev);
+
        if (info->screen_base) {
                if (mem_flags & (EFI_MEMORY_UC | EFI_MEMORY_WC))
                        iounmap(info->screen_base);
@@ -333,7 +338,6 @@ ATTRIBUTE_GROUPS(efifb);
 
 static bool pci_dev_disabled;  /* FB base matches BAR of a disabled device */
 
-static struct pci_dev *efifb_pci_dev;  /* dev with BAR covering the efifb */
 static struct resource *bar_resource;
 static u64 bar_offset;
 
@@ -569,17 +573,22 @@ static int efifb_probe(struct platform_device *dev)
                pr_err("efifb: cannot allocate colormap\n");
                goto err_groups;
        }
+
+       if (efifb_pci_dev)
+               WARN_ON(pm_runtime_get_sync(&efifb_pci_dev->dev) < 0);
+
        err = register_framebuffer(info);
        if (err < 0) {
                pr_err("efifb: cannot register framebuffer\n");
-               goto err_fb_dealoc;
+               goto err_put_rpm_ref;
        }
        fb_info(info, "%s frame buffer device\n", info->fix.id);
-       if (efifb_pci_dev)
-               pm_runtime_get_sync(&efifb_pci_dev->dev);
        return 0;
 
-err_fb_dealoc:
+err_put_rpm_ref:
+       if (efifb_pci_dev)
+               pm_runtime_put(&efifb_pci_dev->dev);
+
        fb_dealloc_cmap(&info->cmap);
 err_groups:
        sysfs_remove_groups(&dev->dev.kobj, efifb_groups);
@@ -603,8 +612,6 @@ static int efifb_remove(struct platform_device *pdev)
        unregister_framebuffer(info);
        sysfs_remove_groups(&pdev->dev.kobj, efifb_groups);
        framebuffer_release(info);
-       if (efifb_pci_dev)
-               pm_runtime_put(&efifb_pci_dev->dev);
 
        return 0;
 }