Message ID | 20230517115955.1078339-1-badhri@google.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:b0ea:0:b0:3b6:4342:cba0 with SMTP id b10csp1086580vqo; Wed, 17 May 2023 05:14:12 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4J+cgxjrAHdO4DzQt1HAJeTBtrkhryyoXDa0Fef3k4rUhII0mv7kvfRSKloPJHpZOHTip9 X-Received: by 2002:a17:903:11d1:b0:1a9:8ba4:d0e3 with SMTP id q17-20020a17090311d100b001a98ba4d0e3mr46583626plh.59.1684325652051; Wed, 17 May 2023 05:14:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684325652; cv=none; d=google.com; s=arc-20160816; b=aGqX3AogHoOQ+LqKS0LqM+9g3y3ji512uSCx+60Dxz+c/JkRIg06IH/WHi0seh6HYK QN831/2jrMxRx0dYO+wfcK6dTanpNsZE5SEjDYT1ooGE6Q232dU8Id5nXJYx9cpbZeh5 zhfDPHDdgGRDCv3SNFylTkhT9NIgRClTasrMUtfu3OXmaSiPMoGd1f7a7NT6ZRp1syFM RikHMK6xtszNUjNbCEujeMAGNCdV5zi8jcGSza3m1GMG1cVxvlE0IyDzOCF/0jOW98qA VU+UhCDApOmScrDMasvbRZJT5O7G3LNB9bAdbg4KIJ8lTztSybRDY2y2XBMjtl/rNG9Y jF8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:mime-version:date :dkim-signature; bh=D/MAqz2kFbEJtuNrHyReKvnqpR0qHORuHaOkTgOMC34=; b=Hazs+pg2GReQsUM9e+fxaB/T6w0dO650GTpVOXvt2F4WzmamdtCZdf68DaD//rUwEP 2jYIIoRhhifxZ5rl+KpNmSVStPjOcFKQA6U0HwUw8uxA0Cw4U6T0rO4W2taPnQRuxyLo r6KEx07tRC37LHegTh+C/VPMY+LHCPLUaVWTDUrWtdBE2uJuKAnuUtGT3CwDLBv10FH8 I2A+fRpRC8je7J5cBtslSoxCDPouPhSaZdr10w7On/n7aH9SBoGBdjDty6lDabF203Qf go+6FpCQijCzb+Br/H/qdranyk1p9KrBB4PzBDPzQdmMoYeyzBuKt9kaHrh5Z1SXKYML lokw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=x+eOcBsA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c9-20020a170902d48900b001aafecaa768si21573100plg.641.2023.05.17.05.13.57; Wed, 17 May 2023 05:14:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=x+eOcBsA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231460AbjEQMAg (ORCPT <rfc822;pacteraone@gmail.com> + 99 others); Wed, 17 May 2023 08:00:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45206 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231426AbjEQMA0 (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Wed, 17 May 2023 08:00:26 -0400 Received: from mail-yw1-x114a.google.com (mail-yw1-x114a.google.com [IPv6:2607:f8b0:4864:20::114a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B5D7565AA for <linux-kernel@vger.kernel.org>; Wed, 17 May 2023 05:00:08 -0700 (PDT) Received: by mail-yw1-x114a.google.com with SMTP id 00721157ae682-561a80d872dso8991157b3.3 for <linux-kernel@vger.kernel.org>; Wed, 17 May 2023 05:00:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1684324807; x=1686916807; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=D/MAqz2kFbEJtuNrHyReKvnqpR0qHORuHaOkTgOMC34=; b=x+eOcBsA8fYI8sl6n1Pnu2JjRKBDnkK0SI0ouTSHJoSQVXvO1OerMgxoROiHq9ilmt ucZAGvmcVNB8cj1XrLD9pOx00YcxGx7JOhxVo6MlGdMc8oGyydzeH4zzQ6RmGCWTMvC/ 42MRj1SKbmGCgBh+GhBUyq8ZSPmzaFjpb9M+/T/PB+TtqwP/p69aQaAAIlKUHDdt4MUF ww7Cr3KNTnbnxfwrMUFu3dETJvu3vbsv9mvQHxoZNzmN611mN3NQC7hw2FsvxQPEg1WL OGVbgd/rJx9GcPGKdUJiiNmcY+m5MguudOqFBLtCgEJ1zUy7nE0poo8I/TcDOoK4iJMm ePAA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1684324807; x=1686916807; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=D/MAqz2kFbEJtuNrHyReKvnqpR0qHORuHaOkTgOMC34=; b=KWdshnPDAiKyKS5OpP6HKhRI86C+W9H4OTK4Mb8Qb5SRsyY+xCz48rM+n+mB0ntAbE P/VJ2LAQG70//eFuR8G2y9ErF+PMjNE/yxvFc5MyQB4Z0LHI4N2gNcKe/rK+4tndSc9h O2ctZQJvoklnvvRQ+zW/LwoXA6HVNubjsJZ4rFRE8VOR3ojQHoftjqtSCU1tqGZlOUoB OeuXfsr+2mZnWwm/kaTKQS1r93aQzvXbbFR1piFs2QK1XDZ6f/vW+Cp+v1gczvQkJ0KG yIPMGG/l9F/GJffUhk5f3bGz1Epc4Sao3coB0cWAkAX/adGT6MyeHPsfnTbpj9fcbBm4 /Faw== X-Gm-Message-State: AC+VfDxQZaq+TywkBkCrWRSmhqn8uP8Jcp172C7syuea4u/7pY5dkQgm KM9P5BOA2HERgohlZt0/fH+yHC4CzU8= X-Received: from badhri.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:6442]) (user=badhri job=sendgmr) by 2002:a81:ad51:0:b0:561:c732:75b6 with SMTP id l17-20020a81ad51000000b00561c73275b6mr901523ywk.10.1684324807546; Wed, 17 May 2023 05:00:07 -0700 (PDT) Date: Wed, 17 May 2023 11:59:55 +0000 Mime-Version: 1.0 X-Mailer: git-send-email 2.40.1.606.ga4b1b128d6-goog Message-ID: <20230517115955.1078339-1-badhri@google.com> Subject: [PATCH v1] usb: gadget: udc: core: Offload usb_udc_vbus_handler processing From: Badhri Jagan Sridharan <badhri@google.com> To: gregkh@linuxfoundation.org, stern@rowland.harvard.edu, colin.i.king@gmail.com, xuetao09@huawei.com, quic_eserrao@quicinc.com, water.zhangjiantao@huawei.com, peter.chen@freescale.com, balbi@ti.com, francesco@dolcini.it, alistair@alistair23.me, stephan@gerhold.net, bagasdotme@gmail.com, luca@z3ntu.xyz Cc: linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org, Badhri Jagan Sridharan <badhri@google.com>, Francesco Dolcini <francesco.dolcini@toradex.com> Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1766143455312581436?= X-GMAIL-MSGID: =?utf-8?q?1766143455312581436?= |
Series |
[v1] usb: gadget: udc: core: Offload usb_udc_vbus_handler processing
|
|
Commit Message
Badhri Jagan Sridharan
May 17, 2023, 11:59 a.m. UTC
chipidea udc calls usb_udc_vbus_handler from udc_start gadget
ops causing a deadlock. Avoid this by offloading usb_udc_vbus_handler
processing.
============================================
WARNING: possible recursive locking detected
640-rc1-000-devel-00005-gcda3c69ebc14 #1 Not tainted
-------------------------------------------
CPU0
----
lock(&udc->connect_lock);
lock(&udc->connect_lock);
DEADLOCK
stack backtrace:
CPU: 1 PID: 566 Comm: echo Not tainted 640-rc1-000-devel-00005-gcda3c69ebc14 #1
Hardware name: Freescale iMX7 Dual (Device Tree)
unwind_backtrace from show_stack+0x10/0x14
show_stack from dump_stack_lvl+0x70/0xb0
dump_stack_lvl from __lock_acquire+0x924/0x22c4
__lock_acquire from lock_acquire+0x100/0x370
lock_acquire from __mutex_lock+0xa8/0xfb4
__mutex_lock from mutex_lock_nested+0x1c/0x24
mutex_lock_nested from usb_udc_vbus_handler+0x1c/0x60
usb_udc_vbus_handler from ci_udc_start+0x74/0x9c
ci_udc_start from gadget_bind_driver+0x130/0x230
gadget_bind_driver from really_probe+0xd8/0x3fc
really_probe from __driver_probe_device+0x94/0x1f0
__driver_probe_device from driver_probe_device+0x2c/0xc4
driver_probe_device from __driver_attach+0x114/0x1cc
__driver_attach from bus_for_each_dev+0x7c/0xcc
bus_for_each_dev from bus_add_driver+0xd4/0x200
bus_add_driver from driver_register+0x7c/0x114
driver_register from usb_gadget_register_driver_owner+0x40/0xe0
usb_gadget_register_driver_owner from gadget_dev_desc_UDC_store+0xd4/0x110
gadget_dev_desc_UDC_store from configfs_write_iter+0xac/0x118
configfs_write_iter from vfs_write+0x1b4/0x40c
vfs_write from ksys_write+0x70/0xf8
ksys_write from ret_fast_syscall+0x0/0x1c
Fixes: 0db213ea8eed ("usb: gadget: udc: core: Invoke usb_gadget_connect only when started")
Cc: stable@vger.kernel.org
Reported-by: Stephan Gerhold <stephan@gerhold.net>
Closes: https://lore.kernel.org/all/ZF4bMptC3Lf2Hnee@gerhold.net/
Reported-by: Francesco Dolcini <francesco.dolcini@toradex.com>
Closes: https://lore.kernel.org/all/ZF4BvgsOyoKxdPFF@francesco-nb.int.toradex.com/
Reported-by: Alistair <alistair@alistair23.me>
Closes: https://lore.kernel.org/lkml/0cf8c588b701d7cf25ffe1a9217b81716e6a5c51.camel@alistair23.me/
Signed-off-by: Badhri Jagan Sridharan <badhri@google.com>
---
drivers/usb/gadget/udc/core.c | 55 +++++++++++++++++++++++++++++++----
1 file changed, 49 insertions(+), 6 deletions(-)
base-commit: 6bae03b0484b54f699d69339fbec5658e885c224
Comments
Hi Francesco, Alistair, Stephan, Bagas, Lucas, Thanks for sharing the stack traces ! Requesting your help on validating the patch as I dont have the same hardware with me which reproduces the issue. Let me know if you are still seeing the crash. Thanks, Badhri On Wed, May 17, 2023 at 5:00 AM Badhri Jagan Sridharan <badhri@google.com> wrote: > > chipidea udc calls usb_udc_vbus_handler from udc_start gadget > ops causing a deadlock. Avoid this by offloading usb_udc_vbus_handler > processing. > > ============================================ > WARNING: possible recursive locking detected > 640-rc1-000-devel-00005-gcda3c69ebc14 #1 Not tainted > ------------------------------------------- > > CPU0 > ---- > lock(&udc->connect_lock); > lock(&udc->connect_lock); > > DEADLOCK > > stack backtrace: > CPU: 1 PID: 566 Comm: echo Not tainted 640-rc1-000-devel-00005-gcda3c69ebc14 #1 > Hardware name: Freescale iMX7 Dual (Device Tree) > unwind_backtrace from show_stack+0x10/0x14 > show_stack from dump_stack_lvl+0x70/0xb0 > dump_stack_lvl from __lock_acquire+0x924/0x22c4 > __lock_acquire from lock_acquire+0x100/0x370 > lock_acquire from __mutex_lock+0xa8/0xfb4 > __mutex_lock from mutex_lock_nested+0x1c/0x24 > mutex_lock_nested from usb_udc_vbus_handler+0x1c/0x60 > usb_udc_vbus_handler from ci_udc_start+0x74/0x9c > ci_udc_start from gadget_bind_driver+0x130/0x230 > gadget_bind_driver from really_probe+0xd8/0x3fc > really_probe from __driver_probe_device+0x94/0x1f0 > __driver_probe_device from driver_probe_device+0x2c/0xc4 > driver_probe_device from __driver_attach+0x114/0x1cc > __driver_attach from bus_for_each_dev+0x7c/0xcc > bus_for_each_dev from bus_add_driver+0xd4/0x200 > bus_add_driver from driver_register+0x7c/0x114 > driver_register from usb_gadget_register_driver_owner+0x40/0xe0 > usb_gadget_register_driver_owner from gadget_dev_desc_UDC_store+0xd4/0x110 > gadget_dev_desc_UDC_store from configfs_write_iter+0xac/0x118 > configfs_write_iter from vfs_write+0x1b4/0x40c > vfs_write from ksys_write+0x70/0xf8 > ksys_write from ret_fast_syscall+0x0/0x1c > > Fixes: 0db213ea8eed ("usb: gadget: udc: core: Invoke usb_gadget_connect only when started") > Cc: stable@vger.kernel.org > Reported-by: Stephan Gerhold <stephan@gerhold.net> > Closes: https://lore.kernel.org/all/ZF4bMptC3Lf2Hnee@gerhold.net/ > Reported-by: Francesco Dolcini <francesco.dolcini@toradex.com> > Closes: https://lore.kernel.org/all/ZF4BvgsOyoKxdPFF@francesco-nb.int.toradex.com/ > Reported-by: Alistair <alistair@alistair23.me> > Closes: https://lore.kernel.org/lkml/0cf8c588b701d7cf25ffe1a9217b81716e6a5c51.camel@alistair23.me/ > Signed-off-by: Badhri Jagan Sridharan <badhri@google.com> > --- > drivers/usb/gadget/udc/core.c | 55 +++++++++++++++++++++++++++++++---- > 1 file changed, 49 insertions(+), 6 deletions(-) > > diff --git a/drivers/usb/gadget/udc/core.c b/drivers/usb/gadget/udc/core.c > index 69041cca5d24..bbcfab50f657 100644 > --- a/drivers/usb/gadget/udc/core.c > +++ b/drivers/usb/gadget/udc/core.c > @@ -41,6 +41,9 @@ static const struct bus_type gadget_bus_type; > * functions. usb_gadget_connect_locked, usb_gadget_disconnect_locked, > * usb_udc_connect_control_locked, usb_gadget_udc_start_locked, usb_gadget_udc_stop_locked are > * called with this lock held. > + * @vbus_events: list head for processing vbus updates on usb_udc_vbus_handler. > + * @vbus_events_lock: protects vbus_events list > + * @vbus_work: work item that invokes usb_udc_connect_control_locked. > * > * This represents the internal data structure which is used by the UDC-class > * to hold information about udc driver and gadget together. > @@ -53,6 +56,19 @@ struct usb_udc { > bool vbus; > bool started; > struct mutex connect_lock; > + struct list_head vbus_events; > + struct mutex vbus_events_lock; > + struct work_struct vbus_work; > +}; > + > +/** > + * struct vbus_event - used to notify vbus updates posted through usb_udc_vbus_handler. > + * @vbus_on: true when vbus is on. false other wise. > + * @node: list node for maintaining a list of pending updates to be processed. > + */ > +struct vbus_event { > + bool vbus_on; > + struct list_head node; > }; > > static struct class *udc_class; > @@ -1134,6 +1150,23 @@ static int usb_udc_connect_control_locked(struct usb_udc *udc) __must_hold(&udc- > return ret; > } > > +static void vbus_event_work(struct work_struct *work) > +{ > + struct vbus_event *event, *n; > + struct usb_udc *udc = container_of(work, struct usb_udc, vbus_work); > + > + mutex_lock(&udc->vbus_events_lock); > + list_for_each_entry_safe(event, n, &udc->vbus_events, node) { > + mutex_lock(&udc->connect_lock); > + udc->vbus = event->vbus_on; > + usb_udc_connect_control_locked(udc); > + list_del(&event->node); > + kfree(event); > + mutex_unlock(&udc->connect_lock); > + } > + mutex_unlock(&udc->vbus_events_lock); > +} > + > /** > * usb_udc_vbus_handler - updates the udc core vbus status, and try to > * connect or disconnect gadget > @@ -1146,13 +1179,20 @@ static int usb_udc_connect_control_locked(struct usb_udc *udc) __must_hold(&udc- > void usb_udc_vbus_handler(struct usb_gadget *gadget, bool status) > { > struct usb_udc *udc = gadget->udc; > + struct vbus_event *vbus_event; > > - mutex_lock(&udc->connect_lock); > - if (udc) { > - udc->vbus = status; > - usb_udc_connect_control_locked(udc); > - } > - mutex_unlock(&udc->connect_lock); > + if (!udc) > + return; > + > + vbus_event = kzalloc(sizeof(*vbus_event), GFP_KERNEL); > + if (!vbus_event) > + return; > + > + mutex_lock(&udc->vbus_events_lock); > + vbus_event->vbus_on = status; > + list_add_tail(&vbus_event->node, &udc->vbus_events); > + mutex_unlock(&udc->vbus_events_lock); > + schedule_work(&udc->vbus_work); > } > EXPORT_SYMBOL_GPL(usb_udc_vbus_handler); > > @@ -1379,6 +1419,9 @@ int usb_add_gadget(struct usb_gadget *gadget) > udc->gadget = gadget; > gadget->udc = udc; > mutex_init(&udc->connect_lock); > + INIT_LIST_HEAD(&udc->vbus_events); > + mutex_init(&udc->vbus_events_lock); > + INIT_WORK(&udc->vbus_work, vbus_event_work); > > udc->started = false; > > > base-commit: 6bae03b0484b54f699d69339fbec5658e885c224 > -- > 2.40.1.606.ga4b1b128d6-goog >
On Wed, May 17, 2023 at 11:59:55AM +0000, Badhri Jagan Sridharan wrote: > chipidea udc calls usb_udc_vbus_handler from udc_start gadget > ops causing a deadlock. Avoid this by offloading usb_udc_vbus_handler > processing. Surely that is the wrong approach. The real problem here is that usb_udc_vbus_handler() gets called from within a udc_start routine. But this is totally unnecessary, because the UDC core will call usb_udc_connect_control_locked() itself, later on during gadget_bind_driver(). So a proper solution would be simply to remove the unnecessary usb_udc_vbus_handler() call from the chipidea driver (and similarly for the max3420_udc driver). Similar changes may be needed in these drivers' udc_stop routines. Alan Stern
On Wed, May 17, 2023 at 7:44 AM Alan Stern <stern@rowland.harvard.edu> wrote: > > On Wed, May 17, 2023 at 11:59:55AM +0000, Badhri Jagan Sridharan wrote: > > chipidea udc calls usb_udc_vbus_handler from udc_start gadget > > ops causing a deadlock. Avoid this by offloading usb_udc_vbus_handler > > processing. > > Surely that is the wrong approach. > > The real problem here is that usb_udc_vbus_handler() gets called from > within a udc_start routine. But this is totally unnecessary, because > the UDC core will call usb_udc_connect_control_locked() itself, later on > during gadget_bind_driver(). Hi Alan, usb_udc_vbus_handler sets the udc->vbus flag as well apart from calling usb_udc_connect_control_locked(). So, removing usb_udc_vbus_handler from chip specific start callback might prevent the controller from starting. void usb_udc_vbus_handler(struct usb_gadget *gadget, bool status) { struct usb_udc *udc = gadget->udc; mutex_lock(&udc->connect_lock); if (udc) { udc->vbus = status; usb_udc_connect_control_locked(udc); Thanks, Badhri > > So a proper solution would be simply to remove the unnecessary > usb_udc_vbus_handler() call from the chipidea driver (and similarly for > the max3420_udc driver). > > Similar changes may be needed in these drivers' udc_stop routines. > > Alan Stern
On Wed, May 17, 2023 at 10:19:25AM -0700, Badhri Jagan Sridharan wrote: > On Wed, May 17, 2023 at 7:44 AM Alan Stern <stern@rowland.harvard.edu> wrote: > > > > On Wed, May 17, 2023 at 11:59:55AM +0000, Badhri Jagan Sridharan wrote: > > > chipidea udc calls usb_udc_vbus_handler from udc_start gadget > > > ops causing a deadlock. Avoid this by offloading usb_udc_vbus_handler > > > processing. > > > > Surely that is the wrong approach. > > > > The real problem here is that usb_udc_vbus_handler() gets called from > > within a udc_start routine. But this is totally unnecessary, because > > the UDC core will call usb_udc_connect_control_locked() itself, later on > > during gadget_bind_driver(). > > Hi Alan, > > usb_udc_vbus_handler sets the udc->vbus flag as well apart from > calling usb_udc_connect_control_locked(). So, removing usb_udc_vbus_handler > from chip specific start callback might prevent the controller from > starting. > > void usb_udc_vbus_handler(struct usb_gadget *gadget, bool status) > { > struct usb_udc *udc = gadget->udc; > > mutex_lock(&udc->connect_lock); > if (udc) { > udc->vbus = status; > usb_udc_connect_control_locked(udc); Then add "udc->vbus = true;" at the appropriate spot in gadget_bind_driver(). Alan Stern PS: I just noticed that in max3420_udc.c, the max_3420_vbus_handler() function calls usb_udc_vbus_handler() from within an interrupt handler. This won't work, since interrupt handlers aren't allowed to sleep and therefore can't lock mutexes.
On Wed, May 17, 2023 at 1:01 PM Alan Stern <stern@rowland.harvard.edu> wrote: > > On Wed, May 17, 2023 at 10:19:25AM -0700, Badhri Jagan Sridharan wrote: > > On Wed, May 17, 2023 at 7:44 AM Alan Stern <stern@rowland.harvard.edu> wrote: > > > > > > On Wed, May 17, 2023 at 11:59:55AM +0000, Badhri Jagan Sridharan wrote: > > > > chipidea udc calls usb_udc_vbus_handler from udc_start gadget > > > > ops causing a deadlock. Avoid this by offloading usb_udc_vbus_handler > > > > processing. > > > > > > Surely that is the wrong approach. > > > > > > The real problem here is that usb_udc_vbus_handler() gets called from > > > within a udc_start routine. But this is totally unnecessary, because > > > the UDC core will call usb_udc_connect_control_locked() itself, later on > > > during gadget_bind_driver(). > > > > Hi Alan, > > > > usb_udc_vbus_handler sets the udc->vbus flag as well apart from > > calling usb_udc_connect_control_locked(). So, removing usb_udc_vbus_handler > > from chip specific start callback might prevent the controller from > > starting. > > > > void usb_udc_vbus_handler(struct usb_gadget *gadget, bool status) > > { > > struct usb_udc *udc = gadget->udc; > > > > mutex_lock(&udc->connect_lock); > > if (udc) { > > udc->vbus = status; > > usb_udc_connect_control_locked(udc); > > Then add "udc->vbus = true;" at the appropriate spot in > gadget_bind_driver(). Not sure if I am misunderstanding something. "udc->vbus = true" is set by usb_udc_vbus_handler based on invocation from the chip level gadget driver and gadget_bind_driver() does not seem to have the context for udc->vbus. Do you still think it makes sense to add "udc->vbus = true;" to gadget_bind_driver() ? > > > Alan Stern > > PS: I just noticed that in max3420_udc.c, the max_3420_vbus_handler() > function calls usb_udc_vbus_handler() from within an interrupt handler. > This won't work, since interrupt handlers aren't allowed to sleep and > therefore can't lock mutexes. Good point ! I didn't notice that usb_udc_vbus_handler() is invoked from interrupt context as well. I was looking at turning connect_lock into a spin lock. But looks like udc_lock which is acquired in usb_gadget_disconnect_locked is a mutex, So keeping connect_lock as mutex and changing vbus_events_lock into spin_lock is what that seems to be possible. Sending out V2 of this patch with these changes so that it's easier to see what I am referring to. Eager to know your thoughts ! Thanks, Badhri
diff --git a/drivers/usb/gadget/udc/core.c b/drivers/usb/gadget/udc/core.c index 69041cca5d24..bbcfab50f657 100644 --- a/drivers/usb/gadget/udc/core.c +++ b/drivers/usb/gadget/udc/core.c @@ -41,6 +41,9 @@ static const struct bus_type gadget_bus_type; * functions. usb_gadget_connect_locked, usb_gadget_disconnect_locked, * usb_udc_connect_control_locked, usb_gadget_udc_start_locked, usb_gadget_udc_stop_locked are * called with this lock held. + * @vbus_events: list head for processing vbus updates on usb_udc_vbus_handler. + * @vbus_events_lock: protects vbus_events list + * @vbus_work: work item that invokes usb_udc_connect_control_locked. * * This represents the internal data structure which is used by the UDC-class * to hold information about udc driver and gadget together. @@ -53,6 +56,19 @@ struct usb_udc { bool vbus; bool started; struct mutex connect_lock; + struct list_head vbus_events; + struct mutex vbus_events_lock; + struct work_struct vbus_work; +}; + +/** + * struct vbus_event - used to notify vbus updates posted through usb_udc_vbus_handler. + * @vbus_on: true when vbus is on. false other wise. + * @node: list node for maintaining a list of pending updates to be processed. + */ +struct vbus_event { + bool vbus_on; + struct list_head node; }; static struct class *udc_class; @@ -1134,6 +1150,23 @@ static int usb_udc_connect_control_locked(struct usb_udc *udc) __must_hold(&udc- return ret; } +static void vbus_event_work(struct work_struct *work) +{ + struct vbus_event *event, *n; + struct usb_udc *udc = container_of(work, struct usb_udc, vbus_work); + + mutex_lock(&udc->vbus_events_lock); + list_for_each_entry_safe(event, n, &udc->vbus_events, node) { + mutex_lock(&udc->connect_lock); + udc->vbus = event->vbus_on; + usb_udc_connect_control_locked(udc); + list_del(&event->node); + kfree(event); + mutex_unlock(&udc->connect_lock); + } + mutex_unlock(&udc->vbus_events_lock); +} + /** * usb_udc_vbus_handler - updates the udc core vbus status, and try to * connect or disconnect gadget @@ -1146,13 +1179,20 @@ static int usb_udc_connect_control_locked(struct usb_udc *udc) __must_hold(&udc- void usb_udc_vbus_handler(struct usb_gadget *gadget, bool status) { struct usb_udc *udc = gadget->udc; + struct vbus_event *vbus_event; - mutex_lock(&udc->connect_lock); - if (udc) { - udc->vbus = status; - usb_udc_connect_control_locked(udc); - } - mutex_unlock(&udc->connect_lock); + if (!udc) + return; + + vbus_event = kzalloc(sizeof(*vbus_event), GFP_KERNEL); + if (!vbus_event) + return; + + mutex_lock(&udc->vbus_events_lock); + vbus_event->vbus_on = status; + list_add_tail(&vbus_event->node, &udc->vbus_events); + mutex_unlock(&udc->vbus_events_lock); + schedule_work(&udc->vbus_work); } EXPORT_SYMBOL_GPL(usb_udc_vbus_handler); @@ -1379,6 +1419,9 @@ int usb_add_gadget(struct usb_gadget *gadget) udc->gadget = gadget; gadget->udc = udc; mutex_init(&udc->connect_lock); + INIT_LIST_HEAD(&udc->vbus_events); + mutex_init(&udc->vbus_events_lock); + INIT_WORK(&udc->vbus_work, vbus_event_work); udc->started = false;