Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp1394942ybp; Thu, 17 Oct 2019 12:08:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqyZ1CMLLPF5FmsLevVD/YxFkGqIo/jdDoL7RlMNl66jar+WVPPEoJQDFRs/86a2WgWlDYLq X-Received: by 2002:a17:906:19cf:: with SMTP id h15mr5244371ejd.184.1571339333356; Thu, 17 Oct 2019 12:08:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571339333; cv=none; d=google.com; s=arc-20160816; b=ND5FiCSzCsTFSppLB892aSdOReT+4erHHToVwQg0zE/wXw2XuRW0x5xAWdslbQJHIA F6qik29wYHsjbALlUb0LzZaOSQJk+oUp+CQsqEAgdq/5qoLl+q3sHhe3H3vgc1x6Lm+k kCciPzEJJRQjIun/4XfrRwo1jSOVfYvFz2x0c1CCAfzIRE4ryO0JWV9MX1Pfct6X04wH 2xTHiEkfBz626dbX4w89cs767SX/T3Qvy9ssX7uiRsskRRjjgaDSkNgde7GCTC0ZoSpK 829MQnvIDh3zthHYoVDy4+84IeRZ8QzjjXSQf7X62Z76+2Xj8/KIQZjAZTK6GwQd3sts zfug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=W/T870vuRwY/Puxic+zUxKbtTVyKJp7XrcvOrQk9WNU=; b=M1o9G9IYlqCrQILwXCAbDkzRj8xDF2zG7hSrmj1Gf8lX2VEsdcrYUIII5D5pFl4kpw PLT/cSIBQy6ix4DqLiNErYfHRvlNXxmAJt4pUXSGYaG7OuxYqqg7ffJZmuK+ySKQkQ4q s5dSpDB0OnEjPFnDNCtJbtXS9isbKBX1qQOAh8gfaYxYqNzFlxO9IFsjxI0Z2ImMnsX5 xQtjo4F1LrhnaNBpOHLchJyb9B7WWiPMwPLO9ibvIy/U36uShUTym7BYJCbw+3jqceuT E5aMX3Ipso1t35mX9H8doHmmtZyeNf3TghDaOhqzZHjkcFCniRVK56cGkptfHnbxLxzT C+kw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zhvdwaoo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e1si1919753ejf.28.2019.10.17.12.08.24; Thu, 17 Oct 2019 12:08:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zhvdwaoo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2439262AbfJPWMn (ORCPT + 99 others); Wed, 16 Oct 2019 18:12:43 -0400 Received: from mail.kernel.org ([198.145.29.99]:47662 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2406507AbfJPV4N (ORCPT ); Wed, 16 Oct 2019 17:56:13 -0400 Received: from localhost (unknown [192.55.54.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3635A20872; Wed, 16 Oct 2019 21:56:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1571262973; bh=LgVAG5PeN9vkdUBi+ZqFOcr+Y6j7z+12r4Irna2Ly/8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zhvdwaooSOYXvV/usfBq3XYQx+fUmj2oe54mJm8EhzTU61AF2w5O2NRN5BE/8vFuw ol9D+oeZXNXdBeKPSfI1CmEqAJYJFwCcnhHJOY8cZHPsfZepfVu/9VZWInZOmSJC8O PIpYKFHP8h+HPi0sF8WpbR3qTV2vy76aQXEFx1Cg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mathias Nyman Subject: [PATCH 4.14 08/65] xhci: Fix false warning message about wrong bounce buffer write length Date: Wed, 16 Oct 2019 14:50:22 -0700 Message-Id: <20191016214801.649672190@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191016214756.457746573@linuxfoundation.org> References: <20191016214756.457746573@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mathias Nyman commit c03101ff4f74bb30679c1a03d551ecbef1024bf6 upstream. The check printing out the "WARN Wrong bounce buffer write length:" uses incorrect values when comparing bytes written from scatterlist to bounce buffer. Actual copied lengths are fine. The used seg->bounce_len will be set to equal new_buf_len a few lines later in the code, but is incorrect when doing the comparison. The patch which added this false warning was backported to 4.8+ kernels so this should be backported as far as well. Cc: # v4.8+ Fixes: 597c56e372da ("xhci: update bounce buffer with correct sg num") Signed-off-by: Mathias Nyman Link: https://lore.kernel.org/r/1570190373-30684-2-git-send-email-mathias.nyman@linux.intel.com Signed-off-by: Greg Kroah-Hartman --- drivers/usb/host/xhci-ring.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/usb/host/xhci-ring.c +++ b/drivers/usb/host/xhci-ring.c @@ -3223,10 +3223,10 @@ static int xhci_align_td(struct xhci_hcd if (usb_urb_dir_out(urb)) { len = sg_pcopy_to_buffer(urb->sg, urb->num_sgs, seg->bounce_buf, new_buff_len, enqd_len); - if (len != seg->bounce_len) + if (len != new_buff_len) xhci_warn(xhci, "WARN Wrong bounce buffer write length: %zu != %d\n", - len, seg->bounce_len); + len, new_buff_len); seg->bounce_dma = dma_map_single(dev, seg->bounce_buf, max_pkt, DMA_TO_DEVICE); } else {