On Wed, May 11, 2022 at 09:19:57PM -0400, Alan Stern wrote: > On Wed, May 11, 2022 at 10:37:27PM +0200, Michael Grzeschik wrote: > > > > + if (udev) { > > > > + port_dev->child = NULL; > > > > > > That assignment is not necessary; usb_disconnect() will take care of it. > > > > Here are two things that are in play. > > > > First I have to set port_dev->child = NULL before calling > > usb_disconnect. Otherwise the following automatic hub_suspend call (in > > case this was the last operational port of the hub) will print the > > message "device x-y not suspended yet" and will fail the hub to > > suspend. > > > > When calling usb_autoresume_device(udev) instead and before calling > > usb_disconnect, this is no longer the case. The hub will be succesfully > > suspended. > > > > The second thing is the assignment. I still have to explicitly assign NULL to > > port_dev->child. Otherwise a following enable of this port via this sysfs will > > run into an hub_event with the usb_disonnect for the device on that port. But > > this will spit out a ugly traceback leading with the following error: > > > > [ 21.718574] usb 2-1.1: USB disconnect, device number -1 > > > > [ 21.719100] Unable to handle kernel paging request at virtual address 96d628cc24e2e078 > > [ 21.719807] Mem abort info: > > [ 21.720065] ESR = 0x96000044 > > [ 21.720348] EC = 0x25: DABT (current EL), IL = 32 bits > > [ 21.720827] SET = 0, FnV = 0 > > [ 21.721109] EA = 0, S1PTW = 0 > > [ 21.721447] FSC = 0x04: level 0 translation fault > > [ 21.721891] Data abort info: > > [ 21.722157] ISV = 0, ISS = 0x00000044 > > [ 21.722505] CM = 0, WnR = 1 > > [ 21.722779] [96d628cc24e2e078] address between user and kernel address ranges > > [ 21.723429] Internal error: Oops: 96000044 [#1] PREEMPT SMP > > [ 21.723927] Modules linked in: uio_pdrv_genirq fuse > > [ 21.724380] CPU: 0 PID: 58 Comm: kworker/0:3 Not tainted 5.18.0-rc6+ #93 > > [ 21.724977] Hardware name: Radxa ROCK3 Model A (DT) > > [ 21.725412] Workqueue: usb_hub_wq hub_event > > [ 21.725802] pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) > > [ 21.726419] pc : usb_disable_endpoint+0x7c/0xdc > > [ 21.726832] lr : usb_disable_device_endpoints+0xbc/0xe0 > > [ 21.727301] sp : ffffffc009b33b30 > > [ 21.727597] x29: ffffffc009b33b30 x28: ffffff8003ad4ed8 x27: 0000000000000001 > > [ 21.728239] x26: ffffff8004344928 x25: 0000000000000000 x24: ffffffc0096eb8e0 > > [ 21.728885] x23: ffffff80043448a8 x22: ffffff8003961800 x21: 0000000000000001 > > [ 21.729527] x20: 96d628cc24e2e034 x19: ffffff8004344800 x18: ffffffffffffffff > > [ 21.730168] x17: 0000000000000001 x16: 0000000000000001 x15: ffffffc089b33857 > > [ 21.730810] x14: 0000000000000000 x13: 312d207265626d75 x12: 6e20656369766564 > > [ 21.731452] x11: 00000000fffff7ff x10: 00000000fffff7ff x9 : ffffffc00871b8dc > > [ 21.732093] x8 : 000000000000bfe8 x7 : ffffffc009b33a38 x6 : 0000000000000001 > > [ 21.732733] x5 : ffffffc009569000 x4 : ffffffc009569050 x3 : ffffff8004344878 > > [ 21.733374] x2 : 0000000000000001 x1 : 000000000000008f x0 : 0000000000000001 > > [ 21.734015] Call trace: > > [ 21.734235] usb_disable_endpoint+0x7c/0xdc > > [ 21.734616] usb_disable_device_endpoints+0xbc/0xe0 > > [ 21.735054] usb_disable_device+0x1c0/0x260 > > [ 21.735432] usb_disconnect+0x108/0x300 > > [ 21.735778] hub_event+0x1378/0x19c0 > > [ 21.736102] process_one_work+0x220/0x49c > > [ 21.736469] worker_thread+0x154/0x450 > > [ 21.736810] kthread+0xfc/0x110 > > [ 21.737096] ret_from_fork+0x10/0x20 > > [ 21.737429] Code: f941c474 340001e0 f901c47f b4ffff14 (b900469f) > > [ 21.737970] ---[ end trace 0000000000000000 ]--- > > > > Did I miss something? > > No: You found a real bug in the hub driver! usb_disconnect() really > is supposed to set port_dev->child to NULL at some point, but it > doesn't. In fact, port_dev->child never gets set back to NULL (except > in the trivial case where a newly attached device fails to initialize > and enumerate). > > I'll work on a patch to fix this, and I'll CC: you when it's ready. I take it back. This isn't a bug; it's a mistake in the way you called usb_disconnect(). Your patch did: if (udev) { port_dev->child = NULL; usb_disconnect(&udev); } The argument to usb_disconnect() is supposed to be &port_dev->child, not &udev. You can see near the end of the function that it sets *pdev to NULL; this is where port_dev->child gets cleared. Not incidentally, usb_disconnect() requires that you hold hdev's device lock when you call it (this is mentioned in the kerneldoc, although the requirement that pdev points to port_dev->child isn't -- the kerneldoc for that function could stand to be improved). Alan Stern