Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp6200243rwl; Wed, 22 Mar 2023 07:43:49 -0700 (PDT) X-Google-Smtp-Source: AK7set9rfWwyN4j8lx4Y7+plWKB7J/7Avgt76e9dkFjy4hMUstmrktUclF76x/MWiTAtzmUhYxBC X-Received: by 2002:a17:906:4441:b0:932:40f4:5c49 with SMTP id i1-20020a170906444100b0093240f45c49mr6857113ejp.67.1679496229150; Wed, 22 Mar 2023 07:43:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679496229; cv=none; d=google.com; s=arc-20160816; b=CREwkYsuLXZih/1KnqZH+p9rNqQhQDuwkDjrtNcg0zyveIIjVPSkiy1vJoZ4Y4aY/u leOzaFlOQb+bRTx2YSjngVdpu8bKV0pwULjhp6CyHPqE0LOJVILsbwfZPCQwqu690alk 1WAh1a4lFpiDRcLLbEsEUInfvEWZqP1tVOLjbNX5iKZ0eZEpkoQRMadx+iJqhzpGOg8a aV0zvL3YuMrToOUBeA8mKjuJL1rn4x960Dk5SZJBuqfg5wCMwtRs0dLAFski1MZtddeV /9xoIgY9I3cN8HvoJ+1Kj0VuxZzVvNuHMI7vthEXeOKiK40VQAqmvQxSbTimZii4DTDd e7ng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=tGthDeCTr8NmeeaPhwloXXzXraU/l6YFpmWDMPP9KbU=; b=LS/EBndIe/KEaYsb83xscN/SKNNDBncNU4PBYgqi6SSlNDAEf4d1HUG+vLOB507ro6 WsEG94qYh33FWZtDWPrHpt4AaDbLMjcfjAkxmm80V+n4v6YDFbhWZZdYKGnBBg77FzXn WsbWrpCKaHe+3ELAMH+0IAUE/MRgT3Net3UnT8ryi5+gFzwjnEg9C6xJZJcBhpDZkqwP 1t6GIoMGN+YPMxRFO6QhcNUsrbCDsWY0KPgxBRxK42+Kg60aDgNHT3UFcmtka/yBT5lJ QxaPkRdFnXqSDbyPXH+rGcK/RdquwV0Z9/Q+CgGRnZKtnpPS79LQqCnmAd13buZqufi/ sbJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hq35-20020a1709073f2300b0093a0e786128si5691837ejc.175.2023.03.22.07.43.23; Wed, 22 Mar 2023 07:43:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231598AbjCVOms (ORCPT + 99 others); Wed, 22 Mar 2023 10:42:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42694 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231597AbjCVOmd (ORCPT ); Wed, 22 Mar 2023 10:42:33 -0400 Received: from netrider.rowland.org (netrider.rowland.org [192.131.102.5]) by lindbergh.monkeyblade.net (Postfix) with SMTP id B3F9A664E9 for ; Wed, 22 Mar 2023 07:42:02 -0700 (PDT) Received: (qmail 1103683 invoked by uid 1000); 22 Mar 2023 10:41:46 -0400 Date: Wed, 22 Mar 2023 10:41:46 -0400 From: Alan Stern To: Krishna Kurapati Cc: Thinh Nguyen , Greg Kroah-Hartman , "Rafael J . Wysocki" , Geert Uytterhoeven , Sebastian Reichel , Colin Ian King , Jiantao Zhang , linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org, quic_ppratap@quicinc.com, quic_wcheng@quicinc.com, quic_jackp@quicinc.com, quic_ugoswami@quicinc.com Subject: Re: [RFC 2/2] usb: gadget: udc: Handle gadget_connect failure during bind operation Message-ID: References: <20230322092740.28491-1-quic_kriskura@quicinc.com> <20230322092740.28491-3-quic_kriskura@quicinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230322092740.28491-3-quic_kriskura@quicinc.com> X-Spam-Status: No, score=0.2 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, SPF_HELO_PASS,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 22, 2023 at 02:57:40PM +0530, Krishna Kurapati wrote: > In the event, gadget_connect call (which invokes pullup) fails, > propagate the error to udc bind operation which inturn sends the > error to configfs. The userspace can then retry enumeartion if > it chooses to. > > Signed-off-by: Krishna Kurapati > --- > drivers/usb/gadget/udc/core.c | 17 +++++++++++++---- > 1 file changed, 13 insertions(+), 4 deletions(-) > > diff --git a/drivers/usb/gadget/udc/core.c b/drivers/usb/gadget/udc/core.c > index 23b0629a8774..26bfed5c3a45 100644 > --- a/drivers/usb/gadget/udc/core.c > +++ b/drivers/usb/gadget/udc/core.c > @@ -1051,12 +1051,16 @@ EXPORT_SYMBOL_GPL(usb_gadget_set_state); > > /* ------------------------------------------------------------------------- */ > > -static void usb_udc_connect_control(struct usb_udc *udc) > +static int usb_udc_connect_control(struct usb_udc *udc) > { > + int ret; > + > if (udc->vbus) > - usb_gadget_connect(udc->gadget); > + ret = usb_gadget_connect(udc->gadget); > else > - usb_gadget_disconnect(udc->gadget); > + ret = usb_gadget_disconnect(udc->gadget); > + > + return ret; > } > > /** > @@ -1500,11 +1504,16 @@ static int gadget_bind_driver(struct device *dev) > if (ret) > goto err_start; > usb_gadget_enable_async_callbacks(udc); > - usb_udc_connect_control(udc); > + ret = usb_udc_connect_control(udc); > + if (ret) > + goto err_connect_control; > > kobject_uevent(&udc->dev.kobj, KOBJ_CHANGE); > return 0; > > + err_connect_control: At this point you need to copy the code in gadget_unbind_driver(). In particular, this should have: + usb_gadget_disable_async_callbacks(udc); + if (gadget->irq) + synchronize_irq(gadget->irq); Alan Stern > + usb_gadget_udc_stop(udc); > + > err_start: > driver->unbind(udc->gadget); > > -- > 2.40.0 >