Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3754217pxv; Mon, 19 Jul 2021 08:01:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwxmadiiftZXQZmy6gMc83GPJwmoxvRZr5uinW2G7mRGPqSi1nSniDfDaVC5AoIKgMV/6o2 X-Received: by 2002:a50:ee88:: with SMTP id f8mr35157036edr.331.1626706889442; Mon, 19 Jul 2021 08:01:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626706889; cv=none; d=google.com; s=arc-20160816; b=gBEyPQpmwZMupVKNo6/gL7O1fxWwlyFroikpTOfZNfaksxIaO38ShWOyfp5h60C0s1 zj7sprexzL6TKBz1sd8n4K2B1R6RokLnlCuv+Nk75ZKqhLlKjmgPIZlccXIGndN4cf7R Gx9dEb1pqpeVvEBzmybF5gqB4dVmi3Jc9/PkTrkEYSJ5cXi+cVxA+FiJBLuv5r6pr9wE zZyLAZ+TigfBRdyjqnJWTmrdKy1b2vnB3MJgXz2cqq+2CQUJ+K39B4dq9IuXlwNTG2wO /8lcYyrnQw1b4dcAZKcKN7iFEZYmdYxT6SkSlPH0LvgGrF+Yn9Ra+2XwCwgTK23sLsuA Z5Wg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=exrditYzHlLHY2Tp+xP5cYzS9BebwV5cqm7zHnkk5ns=; b=o0ecImFJMep4hkMqdnMwuG0tpTXWploGLrsiMFI7LwD/ahBPgZmEZUcGgJwSREwq7T CihkB4bpknOigjBYBjgYQFscBNXCps7TqBb/gLznEki2Z1EC2SRFFbU9wS6AUPP7ITG5 0kxzX7PFigvyXO1R9aJuJUspN3LLCz4cAvXCV+lqS7Ovh6dXR6b/+hdLSZKxBuGIlkBK Q47X/tzBC3JNyNswgEw0WoMZv4WMhVGgDBiToMCO3qeCSrXcxYvcAnIuo0oeekZx59Tc WpxQtChcermxt8YKjy2MO8iviDxKkAnuyDUinxsIsuyKIOnslP+37/YVtbCScKEl7l4p MdDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=oex6gArI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o20si22095156edv.34.2021.07.19.08.01.05; Mon, 19 Jul 2021 08:01:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=oex6gArI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241751AbhGSORJ (ORCPT + 99 others); Mon, 19 Jul 2021 10:17:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:49968 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241602AbhGSOQv (ORCPT ); Mon, 19 Jul 2021 10:16:51 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 75FCD61003; Mon, 19 Jul 2021 14:57:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626706650; bh=jVmxjZNXcJK59WVMVoPTVOsGq6hwS92KUvUnEJAV4xQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=oex6gArINna/UQHJ+Xywpp0XZgs+8LGVEEBQtaEY/IKFh86A/waNN1E3lYVpXwNLg H1MUZT77bJ0jOygvPUmXNrpGSKU1YEkhK/O1zQYMXfp9M8h/bjqiY8DSIDSKZEzQz1 +PZO6iUEKLOSY/i9Pi1Qbeff502Du1LOvF3BnODA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Linyu Yuan Subject: [PATCH 4.4 005/188] usb: gadget: eem: fix echo command packet response issue Date: Mon, 19 Jul 2021 16:49:49 +0200 Message-Id: <20210719144914.343056041@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210719144913.076563739@linuxfoundation.org> References: <20210719144913.076563739@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Linyu Yuan commit 4249d6fbc10fd997abdf8a1ea49c0389a0edf706 upstream. when receive eem echo command, it will send a response, but queue this response to the usb request which allocate from gadget device endpoint zero, and transmit the request to IN endpoint of eem interface. on dwc3 gadget, it will trigger following warning in function __dwc3_gadget_ep_queue(), if (WARN(req->dep != dep, "request %pK belongs to '%s'\n", &req->request, req->dep->name)) return -EINVAL; fix it by allocating a usb request from IN endpoint of eem interface, and transmit the usb request to same IN endpoint of eem interface. Signed-off-by: Linyu Yuan Cc: stable Link: https://lore.kernel.org/r/20210616115142.34075-1-linyyuan@codeaurora.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/gadget/function/f_eem.c | 43 ++++++++++++++++++++++++++++++++---- 1 file changed, 39 insertions(+), 4 deletions(-) --- a/drivers/usb/gadget/function/f_eem.c +++ b/drivers/usb/gadget/function/f_eem.c @@ -34,6 +34,11 @@ struct f_eem { u8 ctrl_id; }; +struct in_context { + struct sk_buff *skb; + struct usb_ep *ep; +}; + static inline struct f_eem *func_to_eem(struct usb_function *f) { return container_of(f, struct f_eem, port.func); @@ -327,9 +332,12 @@ fail: static void eem_cmd_complete(struct usb_ep *ep, struct usb_request *req) { - struct sk_buff *skb = (struct sk_buff *)req->context; + struct in_context *ctx = req->context; - dev_kfree_skb_any(skb); + dev_kfree_skb_any(ctx->skb); + kfree(req->buf); + usb_ep_free_request(ctx->ep, req); + kfree(ctx); } /* @@ -413,7 +421,9 @@ static int eem_unwrap(struct gether *por * b15: bmType (0 == data, 1 == command) */ if (header & BIT(15)) { - struct usb_request *req = cdev->req; + struct usb_request *req; + struct in_context *ctx; + struct usb_ep *ep; u16 bmEEMCmd; /* EEM command packet format: @@ -442,11 +452,36 @@ static int eem_unwrap(struct gether *por skb_trim(skb2, len); put_unaligned_le16(BIT(15) | BIT(11) | len, skb_push(skb2, 2)); + + ep = port->in_ep; + req = usb_ep_alloc_request(ep, GFP_ATOMIC); + if (!req) { + dev_kfree_skb_any(skb2); + goto next; + } + + req->buf = kmalloc(skb2->len, GFP_KERNEL); + if (!req->buf) { + usb_ep_free_request(ep, req); + dev_kfree_skb_any(skb2); + goto next; + } + + ctx = kmalloc(sizeof(*ctx), GFP_KERNEL); + if (!ctx) { + kfree(req->buf); + usb_ep_free_request(ep, req); + dev_kfree_skb_any(skb2); + goto next; + } + ctx->skb = skb2; + ctx->ep = ep; + skb_copy_bits(skb2, 0, req->buf, skb2->len); req->length = skb2->len; req->complete = eem_cmd_complete; req->zero = 1; - req->context = skb2; + req->context = ctx; if (usb_ep_queue(port->in_ep, req, GFP_ATOMIC)) DBG(cdev, "echo response queue fail\n"); break;