Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3506931imu; Mon, 7 Jan 2019 04:46:24 -0800 (PST) X-Google-Smtp-Source: ALg8bN6GKqF/IJF4GPkKeQv3phdX9Q6zKfPzs7Ky4Rom1Bv/1u+cmgnGD0UcDq0coZS+pJ2MYBEb X-Received: by 2002:a65:610d:: with SMTP id z13mr10984130pgu.427.1546865184284; Mon, 07 Jan 2019 04:46:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546865184; cv=none; d=google.com; s=arc-20160816; b=vXdYhmaD6z4k6HC1mOtKr7NFne+21WuEmg9+pNFNidl5WNCrx14/Dxyl9o4CxPnNLL 5e/2m5Z5MM7QGYe7h8RwvR27O67qz+z6fyQ0N7BgIYetuJlEbKOjuJNwV2W3+/HSfML5 3UyPXiDy6nL80n2bLxeRJ6anC/2Js2JyySdrheSINAMx4KHFacI7vbyNic+a4umyxiv2 Mv5cY/to0OE0katwSErncalWHuJPD5ZoXktcTHtQaAJ5aWfRed/KwOUyh4yjfX/m4tJ6 4zg+awb/iwUwiJIm1c12kJXTDiCfDP3cN0wHP6tV0lcLrcL6dlrBVWPPJp1wdd3UbvBJ HVFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=4+NbRZgkz14YnW/Rwqa4EDOJyUm83AthbZoTZA/45Ug=; b=a3wibtVNzcn6L4vBL3ZSbZwZDqh5JFoQJZ/8QSs0vtJlHTTKOKjgi95JkmSAajUfxv y3/NzEg/eY/a0DwseY19AuiGwtTA0NgE4hP2MLSAyILR/Mo2Mot+JxXo0YLeqQTQUF8D L4qxmNLtw6pe9qIZCAcIOMu9ro2W5V311Lc+oh08plv9vHdmVz0Xf2ZUaqSUjcKryj1J 4C6ZkDYnnWbcwEVKhwl14bkGh9/nI6giDQCfFqraYVqwGPJQQ22lxZyoYSQCPI+gEF2j Gd32qxuX/oj6fx5Q3TAuLs/ALqu3G1asM2qlvPcMvOoYdvGJPXQd0qSirnUzhZk+CjxQ 0Xfw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AStHazmG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w12si63651672pfn.212.2019.01.07.04.46.08; Mon, 07 Jan 2019 04:46:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AStHazmG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728363AbfAGMnH (ORCPT + 99 others); Mon, 7 Jan 2019 07:43:07 -0500 Received: from mail.kernel.org ([198.145.29.99]:58850 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728360AbfAGMnD (ORCPT ); Mon, 7 Jan 2019 07:43:03 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 787A520449; Mon, 7 Jan 2019 12:43:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1546864983; bh=IM19D94wImMedyDRitErZIJpMYcxhDRL/ChA6J2DdSQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AStHazmGHNjUPQL9x7x5AX8ITP847l2/Zz612J3WcP6PaX5WsbLNvr7JUumvUCMjA nigKDisHr0A8lPyokMPL94q9Ppxhl81VmXYNpAkpNxnsiFo86yvr/Z7p2Yw7tWTv3m T3Lvqvy/RFELswLycmaxH2+NPaonqts8M3XO4/Qs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Hans Verkuil , Hans Verkuil , Mauro Carvalho Chehab Subject: [PATCH 4.20 111/145] media: cec-pin: fix broken tx_ignore_nack_until_eom error injection Date: Mon, 7 Jan 2019 13:32:28 +0100 Message-Id: <20190107104451.689915401@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190107104437.308206189@linuxfoundation.org> References: <20190107104437.308206189@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ From: Hans Verkuil commit ac791f19a273a7fe254a7596f193af6534582a9f upstream. If the tx_ignore_nack_until_eom error injection was activated, then tx_nacked was never set instead of setting it when the last byte of the message was transmitted. As a result the transmit was marked as OK, when it should have been NACKed. Modify the condition so that it always sets tx_nacked when the last byte of the message was transmitted. Signed-off-by: Hans Verkuil Cc: # for v4.17 and up Signed-off-by: Hans Verkuil Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Greg Kroah-Hartman --- drivers/media/cec/cec-pin.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/drivers/media/cec/cec-pin.c +++ b/drivers/media/cec/cec-pin.c @@ -601,8 +601,9 @@ static void cec_pin_tx_states(struct cec break; /* Was the message ACKed? */ ack = cec_msg_is_broadcast(&pin->tx_msg) ? v : !v; - if (!ack && !pin->tx_ignore_nack_until_eom && - pin->tx_bit / 10 < pin->tx_msg.len && !pin->tx_post_eom) { + if (!ack && (!pin->tx_ignore_nack_until_eom || + pin->tx_bit / 10 == pin->tx_msg.len - 1) && + !pin->tx_post_eom) { /* * Note: the CEC spec is ambiguous regarding * what action to take when a NACK appears