Received: by 10.223.185.116 with SMTP id b49csp2593705wrg; Mon, 5 Mar 2018 05:43:58 -0800 (PST) X-Google-Smtp-Source: AG47ELumxIIkz2+telgd96VbNUAqbLGkyqO4QkmAkvkW8JLlqujiXqp8ODG8tcuOAiho0oOmUYOK X-Received: by 2002:a17:902:b904:: with SMTP id bf4-v6mr12952588plb.195.1520257437882; Mon, 05 Mar 2018 05:43:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1520257437; cv=none; d=google.com; s=arc-20160816; b=GBtXQle5GxTaDf3jV66FXks8AdcEnALcCm0qvD6LbELXWrFvX0I+jSiiT3/QMwf8LD v5aG5obSXxeAIehe69mts+g5APAJFr8P1NUPP22l+emDseGgwh1tR9U4DLyGOHftt/dQ ou5PsioNABTzfHc2ZCQmH+dUrARwCRngUcymdejn5En0lE9q+UjDAMBgx+DW/9JjkrIl oQ4wGNiVeq5g+EoLtGy8R+PbH/ncwPNuY3vgKMUzsngo+NSNB68HE846dchWgjJGu2kn eY96GrC0sR5DQ69c2zgw20PxW4VVuhhNg1M0rb+29ZS5et8tVcf5AfihxRPUmjcjJ8Mv lNaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=YrkgT9GU0HY6PPvoNQUg+F3By+bWqNzmFlcdtVOBaU8=; b=aqGgK2D/Ah7WDVc9Gyn38P0A1cId7uWFfpS15PT9uycSN4QqEHS0oo9oF1tFaQB4zV /Tf3DUa5/43Gw83/rhTJD1SqncRvt7BzoTKTOHkWlJZGzdvZS7LXHe+tUyEDgqLvshtk CaOR+EIPCxP2TnUK3zOAWEBg4G+sX8ETPg64k0F3ix5ftana7mRO3HNv5O/G2vvLWYMO ju+6QpBP/ob15aDjWqLo04/CKlGtMYGmRKRlYdzxD1RRtay4wU4JfNy/TOtkpVUsUL7N pBmLOsbbE/47P+cfMuzJ/Zy3LYQmyKMQzgWLZpYdStmgcp8Y22r9oAIwdQ7KbWao2aqQ a7Tw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=zNrMjHfd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e1si8277558pgq.413.2018.03.05.05.43.43; Mon, 05 Mar 2018 05:43:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=zNrMjHfd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933659AbeCELOc (ORCPT + 99 others); Mon, 5 Mar 2018 06:14:32 -0500 Received: from fllnx209.ext.ti.com ([198.47.19.16]:64266 "EHLO fllnx209.ext.ti.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933116AbeCELOa (ORCPT ); Mon, 5 Mar 2018 06:14:30 -0500 Received: from dflxv15.itg.ti.com ([128.247.5.124]) by fllnx209.ext.ti.com (8.15.1/8.15.1) with ESMTP id w25BESKX001179; Mon, 5 Mar 2018 05:14:28 -0600 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ti.com; s=ti-com-17Q1; t=1520248468; bh=JMy9Pz7mAeJbtszmBoBhxQ9l/WjztjY+7A9NiVAO8aM=; h=Subject:To:CC:References:From:Date:In-Reply-To; b=zNrMjHfda76jgnC14zOb2aejiRZS6lDeNROfkdUQvYTfKk01OxKaq2FaR3GOwPJ/P zWrEx1Hfeg/YHBY3NIVzgxXU+lOfi8L7eooz8qdzvylDbCSvYA3iT09r3+yv3bKsQB mHQLsMuot1lobEQRweV8ikivDgbyBCkd0S1g1vuE= Received: from DLEE106.ent.ti.com (dlee106.ent.ti.com [157.170.170.36]) by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id w25BES2j019717; Mon, 5 Mar 2018 05:14:28 -0600 Received: from DLEE111.ent.ti.com (157.170.170.22) by DLEE106.ent.ti.com (157.170.170.36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1261.35; Mon, 5 Mar 2018 05:14:28 -0600 Received: from dflp33.itg.ti.com (10.64.6.16) by DLEE111.ent.ti.com (157.170.170.22) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1261.35 via Frontend Transport; Mon, 5 Mar 2018 05:14:28 -0600 Received: from [192.168.2.6] (ileax41-snat.itg.ti.com [10.172.224.153]) by dflp33.itg.ti.com (8.14.3/8.13.8) with ESMTP id w25BEQFH029007; Mon, 5 Mar 2018 05:14:27 -0600 Subject: Re: [PATCH] usb: dwc3: Prevent indefinite sleep in _dwc3_set_mode during suspend/resume To: Felipe Balbi , Baolin Wang CC: USB , LKML References: <1519730526-22274-1-git-send-email-rogerq@ti.com> <87sh9l5z4l.fsf@linux.intel.com> <94cd6377-1327-2309-8d69-6ab0de2bdfd4@ti.com> <87po4i3o1v.fsf@linux.intel.com> <87k1uq3ho6.fsf@linux.intel.com> From: Roger Quadros Message-ID: <8ec0485e-89af-568b-e34a-b0cd490817d0@ti.com> Date: Mon, 5 Mar 2018 13:14:26 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <87k1uq3ho6.fsf@linux.intel.com> Content-Type: text/plain; charset="utf-8" Content-Language: en-GB Content-Transfer-Encoding: 8bit X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/03/18 13:06, Felipe Balbi wrote: > > Hi, > > Baolin Wang writes: >>>> Roger Quadros writes: >>>>>> Roger Quadros writes: >>>>>>> In the following test we get stuck by sleeping forever in _dwc3_set_mode() >>>>>>> after which dual-role switching doesn't work. >>>>>>> >>>>>>> On dra7-evm's dual-role port, >>>>>>> - Load g_zero gadget driver and enumerate to host >>>>>>> - suspend to mem >>>>>>> - disconnect USB cable to host and connect otg cable with Pen drive in it. >>>>>>> - resume system >>>>>>> - we sleep indefinitely in _dwc3_set_mode due to. >>>>>>> dwc3_gadget_exit()->usb_del_gadget_udc()->udc_stop()-> >>>>>>> dwc3_gadget_stop()->wait_event_lock_irq() >>>>>>> >>>>>>> Let's clear the DWC3_EP_END_TRANSFER_PENDING flag on all endpoints >>>>>>> so we don't wait in dwc3_gadget_stop(). >>>>>>> >>>>>>> Signed-off-by: Roger Quadros >>>>>>> --- >>>>>>> drivers/usb/dwc3/gadget.c | 14 ++++++++++++++ >>>>>>> 1 file changed, 14 insertions(+) >>>>>>> >>>>>>> diff --git a/drivers/usb/dwc3/gadget.c b/drivers/usb/dwc3/gadget.c >>>>>>> index 2bda4eb..0a360da 100644 >>>>>>> --- a/drivers/usb/dwc3/gadget.c >>>>>>> +++ b/drivers/usb/dwc3/gadget.c >>>>>>> @@ -3273,6 +3273,20 @@ int dwc3_gadget_init(struct dwc3 *dwc) >>>>>>> >>>>>>> void dwc3_gadget_exit(struct dwc3 *dwc) >>>>>>> { >>>>>>> + int epnum; >>>>>>> + unsigned long flags; >>>>>>> + >>>>>>> + spin_lock_irqsave(&dwc->lock, flags); >>>>>>> + for (epnum = 2; epnum < DWC3_ENDPOINTS_NUM; epnum++) { >>>>>>> + struct dwc3_ep *dep = dwc->eps[epnum]; >>>>>>> + >>>>>>> + if (!dep) >>>>>>> + continue; >>>>>>> + >>>>>>> + dep->flags &= ~DWC3_EP_END_TRANSFER_PENDING; >>>>>>> + } >>>>>>> + spin_unlock_irqrestore(&dwc->lock, flags); >>>>>>> + >>>>>>> usb_del_gadget_udc(&dwc->gadget); >>>>>>> dwc3_gadget_free_endpoints(dwc); >>>>>> >>>>>> free endpoints is a better place for this. It's already going to free >>>>>> the memory anyway. Might as well clear all flags to 0 there. >>>>>> >>>>> >>>>> But it won't solve the deadlock issue. Since dwc3_gadget_free_endpoints() >>>>> is called after usb_del_gadget_udc() and the deadlock happens when >>>>> >>>>> usb_del_gadget_udc()->udc_stop()->dwc3_gadget_stop()->wait_event_lock_irq() >>>>> >>>>> and DWC3_EP_END_TRANSFER_PENDING flag is set. >>>> >>>> indeed. Iterating twice over the entire endpoint list seems >>>> wasteful. Perhaps we just shouldn't wait when removing the UDC since >>>> that's essentially what this patch will do, right? If you clear the flag >>>> before calling ->udc_stop(), this means the loop in dwc3_gadget_stop() >>>> will do nothing. Might as well remove it. >>>> >>> >>> This means that we will never wait for DWC3_EP_END_TRANSFER_PENDING to clear >>> in dwc3_gadget_stop() like we used to. This is perfectly fine, right? >>> >>> It makes sense to me as dwc3_gadget_stop() calls __dwc3_gadget_stop() which >>> masks all interrupts and nobody will ever clear that flag if it was set. >> >> I don't think so. It can not mask the endpoint events, please check >> the events which will be masked in DEVTEN register. The reason why we >> should wait for DWC3_EP_END_TRANSFER_PENDING to clear is that, >> sometimes the DWC3_DEPEVT_EPCMDCMPLT event will be triggered later >> than 100us, but now we may have freed the gadget irq which will cause >> crash. > > We could mask command complete events as soon as ->udc_stop() is called, > right? Hmm, actually, __dwc3_gadget_stop() already clears DEVTEN > completely. But which bit in DEVTEN says Endpoint events are disabled? > > /me goes check databook > > At least on revision 2.60a of the databook, bit 10 is reserved. I wonder > if that's the start of all the problems. Anybody has access to older and > newer databook revisions so we can cross-check? > I can access v2.40 and v3.10 books. bit 10 is reserved on both Differences in v2.4 vs v3.10 are: bit 8 reserved vs L1SUSPEN bit 13 reserved vs StopOnDisconnectEn bit 14 reserved vs L1WKUPEVTEN -- cheers, -roger Texas Instruments Finland Oy, Porkkalankatu 22, 00180 Helsinki. Y-tunnus/Business ID: 0615521-4. Kotipaikka/Domicile: Helsinki