Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp1164799ybf; Thu, 27 Feb 2020 06:11:33 -0800 (PST) X-Google-Smtp-Source: APXvYqyR/SO9ShXBMUQmzWgpc3T86CS3xLxNqBSAYFmU7Ni8EUoXWSd+vjRA4Jk3+UGhbnGCH0o2 X-Received: by 2002:aca:c6ca:: with SMTP id w193mr2884420oif.165.1582812693567; Thu, 27 Feb 2020 06:11:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582812693; cv=none; d=google.com; s=arc-20160816; b=DYuKUnHlMsAcotk4RbvYLb7DGi8AzCjCZbozhWSWAL3JIGMVWvCgKKN+Luf9Rf2y02 URrepQ70TtEaGmKDr6GWtLbNgY3grucFgnOMZFn73Ik0rcG+n0f+Ma5Evc1ot8zfJZQy SBDR9Lg5sMq9wiFb0vYAvhSRNG2mvTbeAR2PDJ5vyJZcwo5gH45/SNP1u22AqNx2vwLy bOnDoHrXjsvQzFo607pv7vwOVWQWSQsCnIKoa9VEIyVYQvunqQDUrMUyK+nR/OL5gwSV 0t790vNrt0nCfeQvTfkdpaEanM+kusZ34KOllrab8wkAM2uTHz6KhyQqzDgW57NjgWJL hEqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tQOF88vtaBVvCqOIYKGGnhm0Gj8I7lbMUFGDD31sKck=; b=FGddBwD2MV0b2YYFSjQiKejV0wBxuvA+23NL1dFJLwnzN3DS4pym1tIEZnVihOh8sp ILPLCYU2NglRyRUhnduP/0X+jrmMx9FAVktAdAN/Q5eQ5r5FtckDvXpgJjHKj7qZCdmn DevTQgryx6g5ABJkyuljfsoOLohA8XDM4GNT05PXILS3KE4W7kO0aoqW9AAAm7yJJOTI OWl70/K1J7B1kyXLDtC55mnW4KYxlSd2x+u8vMfCiS86n/oqwV0/eFldYPVpOrdl7m/L 7oHSusooDBSmFURfy+qEbYlJZV7DeyPEXbdW2Z4iMlzePB9mfWmypkBOzGO5WXgi21mj oumw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=edWTdBzr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t10si1654668otp.310.2020.02.27.06.11.16; Thu, 27 Feb 2020 06:11:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=edWTdBzr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388027AbgB0OJ2 (ORCPT + 99 others); Thu, 27 Feb 2020 09:09:28 -0500 Received: from mail.kernel.org ([198.145.29.99]:47320 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388384AbgB0OJX (ORCPT ); Thu, 27 Feb 2020 09:09:23 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D4BB321D7E; Thu, 27 Feb 2020 14:09:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582812562; bh=40/YJTNEfQFz961lGWDIvzjZtpTxZbNNhGx8Y5tN/3c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=edWTdBzrrPekgdUWg3Of7sZwEMXnTHTgWtfCmcICKMPkIaNSNAwbTmNyclG9+wxmm W6IESbpvr6PwU+N/BfHHABqxbaRVjHIJtA1MTNvrLhaopMuRj214VPKnkxUKRACUd/ KwyjhlzVAyRl4+EtFLZ9AAvZu40550HFxYC3NQ8Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Peter Chen , Mathias Nyman , Fabio Estevam Subject: [PATCH 5.4 027/135] usb: host: xhci: update event ring dequeue pointer on purpose Date: Thu, 27 Feb 2020 14:36:07 +0100 Message-Id: <20200227132233.228653421@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200227132228.710492098@linuxfoundation.org> References: <20200227132228.710492098@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Peter Chen commit dc0ffbea5729a3abafa577ebfce87f18b79e294b upstream. On some situations, the software handles TRB events slower than adding TRBs, then xhci_handle_event can't return zero long time, the xHC will consider the event ring is full, and trigger "Event Ring Full" error, but in fact, the software has already finished lots of events, just no chance to update ERDP (event ring dequeue pointer). In this commit, we force update ERDP if half of TRBS_PER_SEGMENT events have handled to avoid "Event Ring Full" error. Signed-off-by: Peter Chen Signed-off-by: Mathias Nyman Link: https://lore.kernel.org/r/1573836603-10871-2-git-send-email-mathias.nyman@linux.intel.com Signed-off-by: Fabio Estevam Signed-off-by: Greg Kroah-Hartman --- drivers/usb/host/xhci-ring.c | 60 ++++++++++++++++++++++++++++++------------- 1 file changed, 43 insertions(+), 17 deletions(-) --- a/drivers/usb/host/xhci-ring.c +++ b/drivers/usb/host/xhci-ring.c @@ -2741,6 +2741,42 @@ static int xhci_handle_event(struct xhci } /* + * Update Event Ring Dequeue Pointer: + * - When all events have finished + * - To avoid "Event Ring Full Error" condition + */ +static void xhci_update_erst_dequeue(struct xhci_hcd *xhci, + union xhci_trb *event_ring_deq) +{ + u64 temp_64; + dma_addr_t deq; + + temp_64 = xhci_read_64(xhci, &xhci->ir_set->erst_dequeue); + /* If necessary, update the HW's version of the event ring deq ptr. */ + if (event_ring_deq != xhci->event_ring->dequeue) { + deq = xhci_trb_virt_to_dma(xhci->event_ring->deq_seg, + xhci->event_ring->dequeue); + if (deq == 0) + xhci_warn(xhci, "WARN something wrong with SW event ring dequeue ptr\n"); + /* + * Per 4.9.4, Software writes to the ERDP register shall + * always advance the Event Ring Dequeue Pointer value. + */ + if ((temp_64 & (u64) ~ERST_PTR_MASK) == + ((u64) deq & (u64) ~ERST_PTR_MASK)) + return; + + /* Update HC event ring dequeue pointer */ + temp_64 &= ERST_PTR_MASK; + temp_64 |= ((u64) deq & (u64) ~ERST_PTR_MASK); + } + + /* Clear the event handler busy flag (RW1C) */ + temp_64 |= ERST_EHB; + xhci_write_64(xhci, temp_64, &xhci->ir_set->erst_dequeue); +} + +/* * xHCI spec says we can get an interrupt, and if the HC has an error condition, * we might get bad data out of the event ring. Section 4.10.2.7 has a list of * indicators of an event TRB error, but we check the status *first* to be safe. @@ -2751,9 +2787,9 @@ irqreturn_t xhci_irq(struct usb_hcd *hcd union xhci_trb *event_ring_deq; irqreturn_t ret = IRQ_NONE; unsigned long flags; - dma_addr_t deq; u64 temp_64; u32 status; + int event_loop = 0; spin_lock_irqsave(&xhci->lock, flags); /* Check if the xHC generated the interrupt, or the irq is shared */ @@ -2807,24 +2843,14 @@ irqreturn_t xhci_irq(struct usb_hcd *hcd /* FIXME this should be a delayed service routine * that clears the EHB. */ - while (xhci_handle_event(xhci) > 0) {} - - temp_64 = xhci_read_64(xhci, &xhci->ir_set->erst_dequeue); - /* If necessary, update the HW's version of the event ring deq ptr. */ - if (event_ring_deq != xhci->event_ring->dequeue) { - deq = xhci_trb_virt_to_dma(xhci->event_ring->deq_seg, - xhci->event_ring->dequeue); - if (deq == 0) - xhci_warn(xhci, "WARN something wrong with SW event " - "ring dequeue ptr.\n"); - /* Update HC event ring dequeue pointer */ - temp_64 &= ERST_PTR_MASK; - temp_64 |= ((u64) deq & (u64) ~ERST_PTR_MASK); + while (xhci_handle_event(xhci) > 0) { + if (event_loop++ < TRBS_PER_SEGMENT / 2) + continue; + xhci_update_erst_dequeue(xhci, event_ring_deq); + event_loop = 0; } - /* Clear the event handler busy flag (RW1C); event ring is empty. */ - temp_64 |= ERST_EHB; - xhci_write_64(xhci, temp_64, &xhci->ir_set->erst_dequeue); + xhci_update_erst_dequeue(xhci, event_ring_deq); ret = IRQ_HANDLED; out: