linux-usb.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [Bug 212045] New: dwc2 gadget mode read call blocks
@ 2021-03-03 23:51 bugzilla-daemon
  2021-03-05  9:30 ` [Bug 212045] " bugzilla-daemon
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: bugzilla-daemon @ 2021-03-03 23:51 UTC (permalink / raw)
  To: linux-usb

https://bugzilla.kernel.org/show_bug.cgi?id=212045

            Bug ID: 212045
           Summary: dwc2 gadget mode read call blocks
           Product: Drivers
           Version: 2.5
    Kernel Version: 5.9
          Hardware: All
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: USB
          Assignee: drivers_usb@kernel-bugs.kernel.org
          Reporter: tomasz@grobelny.net
        Regression: No

When implementing USB gadget on Odroid N2 I write descriptors for two endpoints
so I get ep0, ep1 and ep2 files. I open those files and try to read from ep0
and ep2. While ep0 more or less works, for ep2 I get weird behaviour: the
select() call returns 1 indicating that there is data to read and then read()
call blocks. It happens even if I set the file descriptor to O_NONBLOCK. Here
is the kernel log: https://pastebin.pl/view/aaa2d7f0

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2021-03-10 10:14 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2021-03-03 23:51 [Bug 212045] New: dwc2 gadget mode read call blocks bugzilla-daemon
2021-03-05  9:30 ` [Bug 212045] " bugzilla-daemon
2021-03-05 10:37 ` bugzilla-daemon
2021-03-10 10:13 ` bugzilla-daemon

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).