Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp671152ybh; Tue, 10 Mar 2020 06:13:23 -0700 (PDT) X-Google-Smtp-Source: ADFU+vsOTwQycjIcWYGkGrilmejAvGDgqIV4Vb4qqKBqsqR5LDjfNei/Kj76e99UMoD6YDUc7CpD X-Received: by 2002:a05:6830:160c:: with SMTP id g12mr17036303otr.86.1583846003672; Tue, 10 Mar 2020 06:13:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583846003; cv=none; d=google.com; s=arc-20160816; b=c9IRFa0MzcXOo5Trrc+VGbfandUpbttH/YmojAdGf7PFgaQEcQxOrpOtr5Xc5uea6i 1ZSqK/1GLmys3UDtE6DwBDg4DfHrJ2U50z0J+2MLeR2+inxOnbzTqtSfed1SuQyby3sz zIVyvZPpPWE+gP+T/cNARH5/nKw8xKlHAuotoXayr84ku8/hOgQ+hw7toXM6X1EiPxyw 73+4zyDqt7yKcgIoBhhfEYEcavmB0yHcdfSZmPXayC2sqtiFNshA6UEXfM/+9H0kA1YV J/SykJXwCht34MefwvG33wP058EaV0nWOo3c557Mb6g11HlQWCZh0RX6EzxQKKtX3edV lpmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ZWi8Um0jWDqbaA+Rpte29tEXStZMHKDtljqmABRGYdE=; b=sggAgBUQUS3llpGJ9N3HFu+KJF+S91fZKYeK/53AYac0kDE2ZLCjODbchNJEQMI48R GoTzq0Kkdm/B0IuxVb8uG3g8evoU7MoLjB0nOIH3RmEeM+ll91i70USZWkYT9P68/bcE i7WMU2x0GfeTHO6jBkXuumzvPmrBIG0c+9ueqIARgydQyxcpCJe3c23hKUKGbvgynLca jxpQIUeEsR1KMuzNf2RvmWKuKziLKcfi1AEG1ycTxRnHwgsbj504l3cijr9hbEz1NH3N BMn60oxa7YHBY9ycvPvBR9muwBrvTXe3np3gbnjG56iD06V+vyv6WANFjneCgWqDr0WQ fg1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="N/1KLIKN"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f23si8192689oti.283.2020.03.10.06.13.11; Tue, 10 Mar 2020 06:13:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="N/1KLIKN"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731227AbgCJNLf (ORCPT + 99 others); Tue, 10 Mar 2020 09:11:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:33096 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730887AbgCJNLc (ORCPT ); Tue, 10 Mar 2020 09:11:32 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 98E9B208E4; Tue, 10 Mar 2020 13:11:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583845892; bh=1Ab1FCoddUe1BX9XPSIJ0DoL+dXn+oXOQ+sECh6PTO0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=N/1KLIKNIaBHdNgx9wSw7+XBrgWB8NFamn2EMV2WH2Da3nJkiqJFo5F9Zb+WfG3DW f2TuM4pW/V9ch5SUg1lwx0koovXpljqB8arGr479/SAC6R0BTe88wi64PZ/vsSD7Dl yNIlgyisG0JHmKbsZqCbXupHZVLsGlRHNt+GBHNQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sergey Organov , =?UTF-8?q?Micha=C5=82=20Miros=C5=82aw?= , Felipe Balbi , Sasha Levin Subject: [PATCH 4.19 12/86] usb: gadget: serial: fix Tx stall after buffer overflow Date: Tue, 10 Mar 2020 13:44:36 +0100 Message-Id: <20200310124531.459641903@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200310124530.808338541@linuxfoundation.org> References: <20200310124530.808338541@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sergey Organov [ Upstream commit e4bfded56cf39b8d02733c1e6ef546b97961e18a ] Symptom: application opens /dev/ttyGS0 and starts sending (writing) to it while either USB cable is not connected, or nobody listens on the other side of the cable. If driver circular buffer overflows before connection is established, no data will be written to the USB layer until/unless /dev/ttyGS0 is closed and re-opened again by the application (the latter besides having no means of being notified about the event of establishing of the connection.) Fix: on open and/or connect, kick Tx to flush circular buffer data to USB layer. Signed-off-by: Sergey Organov Reviewed-by: Michał Mirosław Signed-off-by: Felipe Balbi Signed-off-by: Sasha Levin --- drivers/usb/gadget/function/u_serial.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/usb/gadget/function/u_serial.c b/drivers/usb/gadget/function/u_serial.c index d4d317db89df5..38afe96c5cd26 100644 --- a/drivers/usb/gadget/function/u_serial.c +++ b/drivers/usb/gadget/function/u_serial.c @@ -567,8 +567,10 @@ static int gs_start_io(struct gs_port *port) port->n_read = 0; started = gs_start_rx(port); - /* unblock any pending writes into our circular buffer */ if (started) { + gs_start_tx(port); + /* Unblock any pending writes into our circular buffer, in case + * we didn't in gs_start_tx() */ tty_wakeup(port->port.tty); } else { gs_free_requests(ep, head, &port->read_allocated); -- 2.20.1