]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
5.15-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 28 Feb 2022 07:59:35 +0000 (08:59 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 28 Feb 2022 07:59:35 +0000 (08:59 +0100)
added patches:
tty-n_gsm-fix-deadlock-in-gsmtty_open.patch
tty-n_gsm-fix-null-pointer-access-due-to-dlci-release.patch
tty-n_gsm-fix-proper-link-termination-after-failed-open.patch
tty-n_gsm-fix-wrong-modem-processing-in-convergence-layer-type-2.patch
tty-n_gsm-fix-wrong-tty-control-line-for-flow-control.patch

queue-5.15/series
queue-5.15/tty-n_gsm-fix-deadlock-in-gsmtty_open.patch [new file with mode: 0644]
queue-5.15/tty-n_gsm-fix-null-pointer-access-due-to-dlci-release.patch [new file with mode: 0644]
queue-5.15/tty-n_gsm-fix-proper-link-termination-after-failed-open.patch [new file with mode: 0644]
queue-5.15/tty-n_gsm-fix-wrong-modem-processing-in-convergence-layer-type-2.patch [new file with mode: 0644]
queue-5.15/tty-n_gsm-fix-wrong-tty-control-line-for-flow-control.patch [new file with mode: 0644]

index ef5ee0372d24adc72f7a86773571e9b8a52496ec..a74c947f2a6e51225d23f787043118260a4fee37 100644 (file)
@@ -126,3 +126,8 @@ ib-qib-fix-duplicate-sysfs-directory-name.patch
 riscv-fix-nommu_k210_sdcard_defconfig.patch
 riscv-fix-oops-caused-by-irqsoff-latency-tracer.patch
 tty-n_gsm-fix-encoding-of-control-signal-octet-bit-dv.patch
+tty-n_gsm-fix-proper-link-termination-after-failed-open.patch
+tty-n_gsm-fix-null-pointer-access-due-to-dlci-release.patch
+tty-n_gsm-fix-wrong-tty-control-line-for-flow-control.patch
+tty-n_gsm-fix-wrong-modem-processing-in-convergence-layer-type-2.patch
+tty-n_gsm-fix-deadlock-in-gsmtty_open.patch
diff --git a/queue-5.15/tty-n_gsm-fix-deadlock-in-gsmtty_open.patch b/queue-5.15/tty-n_gsm-fix-deadlock-in-gsmtty_open.patch
new file mode 100644 (file)
index 0000000..3944432
--- /dev/null
@@ -0,0 +1,42 @@
+From a2ab75b8e76e455af7867e3835fd9cdf386b508f Mon Sep 17 00:00:00 2001
+From: "daniel.starke@siemens.com" <daniel.starke@siemens.com>
+Date: Thu, 17 Feb 2022 23:31:23 -0800
+Subject: tty: n_gsm: fix deadlock in gsmtty_open()
+
+From: daniel.starke@siemens.com <daniel.starke@siemens.com>
+
+commit a2ab75b8e76e455af7867e3835fd9cdf386b508f upstream.
+
+In the current implementation the user may open a virtual tty which then
+could fail to establish the underlying DLCI. The function gsmtty_open()
+gets stuck in tty_port_block_til_ready() while waiting for a carrier rise.
+This happens if the remote side fails to acknowledge the link establishment
+request in time or completely. At some point gsm_dlci_close() is called
+to abort the link establishment attempt. The function tries to inform the
+associated virtual tty by performing a hangup. But the blocking loop within
+tty_port_block_til_ready() is not informed about this event.
+The patch proposed here fixes this by resetting the initialization state of
+the virtual tty to ensure the loop exits and triggering it to make
+tty_port_block_til_ready() return.
+
+Fixes: e1eaea46bb40 ("tty: n_gsm line discipline")
+Cc: stable@vger.kernel.org
+Signed-off-by: Daniel Starke <daniel.starke@siemens.com>
+Link: https://lore.kernel.org/r/20220218073123.2121-7-daniel.starke@siemens.com
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/tty/n_gsm.c |    3 +++
+ 1 file changed, 3 insertions(+)
+
+--- a/drivers/tty/n_gsm.c
++++ b/drivers/tty/n_gsm.c
+@@ -1431,6 +1431,9 @@ static void gsm_dlci_close(struct gsm_dl
+       if (dlci->addr != 0) {
+               tty_port_tty_hangup(&dlci->port, false);
+               kfifo_reset(&dlci->fifo);
++              /* Ensure that gsmtty_open() can return. */
++              tty_port_set_initialized(&dlci->port, 0);
++              wake_up_interruptible(&dlci->port.open_wait);
+       } else
+               dlci->gsm->dead = true;
+       wake_up(&dlci->gsm->event);
diff --git a/queue-5.15/tty-n_gsm-fix-null-pointer-access-due-to-dlci-release.patch b/queue-5.15/tty-n_gsm-fix-null-pointer-access-due-to-dlci-release.patch
new file mode 100644 (file)
index 0000000..6c87292
--- /dev/null
@@ -0,0 +1,45 @@
+From 96b169f05cdcc844b400695184d77e42071d14f2 Mon Sep 17 00:00:00 2001
+From: "daniel.starke@siemens.com" <daniel.starke@siemens.com>
+Date: Thu, 17 Feb 2022 23:31:20 -0800
+Subject: tty: n_gsm: fix NULL pointer access due to DLCI release
+
+From: daniel.starke@siemens.com <daniel.starke@siemens.com>
+
+commit 96b169f05cdcc844b400695184d77e42071d14f2 upstream.
+
+The here fixed commit made the tty hangup asynchronous to avoid a circular
+locking warning. I could not reproduce this warning. Furthermore, due to
+the asynchronous hangup the function call now gets queued up while the
+underlying tty is being freed. Depending on the timing this results in a
+NULL pointer access in the global work queue scheduler. To be precise in
+process_one_work(). Therefore, the previous commit made the issue worse
+which it tried to fix.
+
+This patch fixes this by falling back to the old behavior which uses a
+blocking tty hangup call before freeing up the associated tty.
+
+Fixes: 7030082a7415 ("tty: n_gsm: avoid recursive locking with async port hangup")
+Cc: stable@vger.kernel.org
+Signed-off-by: Daniel Starke <daniel.starke@siemens.com>
+Link: https://lore.kernel.org/r/20220218073123.2121-4-daniel.starke@siemens.com
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/tty/n_gsm.c |    7 ++++++-
+ 1 file changed, 6 insertions(+), 1 deletion(-)
+
+--- a/drivers/tty/n_gsm.c
++++ b/drivers/tty/n_gsm.c
+@@ -1722,7 +1722,12 @@ static void gsm_dlci_release(struct gsm_
+               gsm_destroy_network(dlci);
+               mutex_unlock(&dlci->mutex);
+-              tty_hangup(tty);
++              /* We cannot use tty_hangup() because in tty_kref_put() the tty
++               * driver assumes that the hangup queue is free and reuses it to
++               * queue release_one_tty() -> NULL pointer panic in
++               * process_one_work().
++               */
++              tty_vhangup(tty);
+               tty_port_tty_set(&dlci->port, NULL);
+               tty_kref_put(tty);
diff --git a/queue-5.15/tty-n_gsm-fix-proper-link-termination-after-failed-open.patch b/queue-5.15/tty-n_gsm-fix-proper-link-termination-after-failed-open.patch
new file mode 100644 (file)
index 0000000..ac4bfd4
--- /dev/null
@@ -0,0 +1,38 @@
+From e3b7468f082d106459e86e8dc6fb9bdd65553433 Mon Sep 17 00:00:00 2001
+From: "daniel.starke@siemens.com" <daniel.starke@siemens.com>
+Date: Thu, 17 Feb 2022 23:31:19 -0800
+Subject: tty: n_gsm: fix proper link termination after failed open
+
+From: daniel.starke@siemens.com <daniel.starke@siemens.com>
+
+commit e3b7468f082d106459e86e8dc6fb9bdd65553433 upstream.
+
+Trying to open a DLCI by sending a SABM frame may fail with a timeout.
+The link is closed on the initiator side without informing the responder
+about this event. The responder assumes the link is open after sending a
+UA frame to answer the SABM frame. The link gets stuck in a half open
+state.
+
+This patch fixes this by initiating the proper link termination procedure
+after link setup timeout instead of silently closing it down.
+
+Fixes: e1eaea46bb40 ("tty: n_gsm line discipline")
+Cc: stable@vger.kernel.org
+Signed-off-by: Daniel Starke <daniel.starke@siemens.com>
+Link: https://lore.kernel.org/r/20220218073123.2121-3-daniel.starke@siemens.com
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/tty/n_gsm.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/drivers/tty/n_gsm.c
++++ b/drivers/tty/n_gsm.c
+@@ -1488,7 +1488,7 @@ static void gsm_dlci_t1(struct timer_lis
+                       dlci->mode = DLCI_MODE_ADM;
+                       gsm_dlci_open(dlci);
+               } else {
+-                      gsm_dlci_close(dlci);
++                      gsm_dlci_begin_close(dlci); /* prevent half open link */
+               }
+               break;
diff --git a/queue-5.15/tty-n_gsm-fix-wrong-modem-processing-in-convergence-layer-type-2.patch b/queue-5.15/tty-n_gsm-fix-wrong-modem-processing-in-convergence-layer-type-2.patch
new file mode 100644 (file)
index 0000000..e933e84
--- /dev/null
@@ -0,0 +1,115 @@
+From 687f9ad43c52501f46164758e908a5dd181a87fc Mon Sep 17 00:00:00 2001
+From: "daniel.starke@siemens.com" <daniel.starke@siemens.com>
+Date: Thu, 17 Feb 2022 23:31:22 -0800
+Subject: tty: n_gsm: fix wrong modem processing in convergence layer type 2
+
+From: daniel.starke@siemens.com <daniel.starke@siemens.com>
+
+commit 687f9ad43c52501f46164758e908a5dd181a87fc upstream.
+
+The function gsm_process_modem() exists to handle modem status bits of
+incoming frames. This includes incoming MSC (modem status command) frames
+and convergence layer type 2 data frames. The function, however, was only
+designed to handle MSC frames as it expects the command length. Within
+gsm_dlci_data() it is wrongly assumed that this is the same as the data
+frame length. This is only true if the data frame contains only 1 byte of
+payload.
+
+This patch names the length parameter of gsm_process_modem() in a generic
+manner to reflect its association. It also corrects all calls to the
+function to handle the variable number of modem status octets correctly in
+both cases.
+
+Fixes: 7263287af93d ("tty: n_gsm: Fixed logic to decode break signal from modem status")
+Cc: stable@vger.kernel.org
+Signed-off-by: Daniel Starke <daniel.starke@siemens.com>
+Link: https://lore.kernel.org/r/20220218073123.2121-6-daniel.starke@siemens.com
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/tty/n_gsm.c |   23 ++++++++++++++---------
+ 1 file changed, 14 insertions(+), 9 deletions(-)
+
+--- a/drivers/tty/n_gsm.c
++++ b/drivers/tty/n_gsm.c
+@@ -1009,25 +1009,25 @@ static void gsm_control_reply(struct gsm
+  *    @tty: virtual tty bound to the DLCI
+  *    @dlci: DLCI to affect
+  *    @modem: modem bits (full EA)
+- *    @clen: command length
++ *    @slen: number of signal octets
+  *
+  *    Used when a modem control message or line state inline in adaption
+  *    layer 2 is processed. Sort out the local modem state and throttles
+  */
+ static void gsm_process_modem(struct tty_struct *tty, struct gsm_dlci *dlci,
+-                                                      u32 modem, int clen)
++                                                      u32 modem, int slen)
+ {
+       int  mlines = 0;
+       u8 brk = 0;
+       int fc;
+-      /* The modem status command can either contain one octet (v.24 signals)
+-         or two octets (v.24 signals + break signals). The length field will
+-         either be 2 or 3 respectively. This is specified in section
+-         5.4.6.3.7 of the  27.010 mux spec. */
++      /* The modem status command can either contain one octet (V.24 signals)
++       * or two octets (V.24 signals + break signals). This is specified in
++       * section 5.4.6.3.7 of the 07.10 mux spec.
++       */
+-      if (clen == 2)
++      if (slen == 1)
+               modem = modem & 0x7f;
+       else {
+               brk = modem & 0x7f;
+@@ -1084,6 +1084,7 @@ static void gsm_control_modem(struct gsm
+       unsigned int brk = 0;
+       struct gsm_dlci *dlci;
+       int len = clen;
++      int slen;
+       const u8 *dp = data;
+       struct tty_struct *tty;
+@@ -1103,6 +1104,7 @@ static void gsm_control_modem(struct gsm
+               return;
+       dlci = gsm->dlci[addr];
++      slen = len;
+       while (gsm_read_ea(&modem, *dp++) == 0) {
+               len--;
+               if (len == 0)
+@@ -1119,7 +1121,7 @@ static void gsm_control_modem(struct gsm
+               modem |= (brk & 0x7f);
+       }
+       tty = tty_port_tty_get(&dlci->port);
+-      gsm_process_modem(tty, dlci, modem, clen);
++      gsm_process_modem(tty, dlci, modem, slen);
+       if (tty) {
+               tty_wakeup(tty);
+               tty_kref_put(tty);
+@@ -1567,6 +1569,7 @@ static void gsm_dlci_data(struct gsm_dlc
+       struct tty_struct *tty;
+       unsigned int modem = 0;
+       int len = clen;
++      int slen = 0;
+       if (debug & 16)
+               pr_debug("%d bytes for tty\n", len);
+@@ -1579,12 +1582,14 @@ static void gsm_dlci_data(struct gsm_dlc
+       case 2:         /* Asynchronous serial with line state in each frame */
+               while (gsm_read_ea(&modem, *data++) == 0) {
+                       len--;
++                      slen++;
+                       if (len == 0)
+                               return;
+               }
++              slen++;
+               tty = tty_port_tty_get(port);
+               if (tty) {
+-                      gsm_process_modem(tty, dlci, modem, clen);
++                      gsm_process_modem(tty, dlci, modem, slen);
+                       tty_kref_put(tty);
+               }
+               fallthrough;
diff --git a/queue-5.15/tty-n_gsm-fix-wrong-tty-control-line-for-flow-control.patch b/queue-5.15/tty-n_gsm-fix-wrong-tty-control-line-for-flow-control.patch
new file mode 100644 (file)
index 0000000..3a8db40
--- /dev/null
@@ -0,0 +1,51 @@
+From c19d93542a6081577e6da9bf5e887979c72e80c1 Mon Sep 17 00:00:00 2001
+From: "daniel.starke@siemens.com" <daniel.starke@siemens.com>
+Date: Thu, 17 Feb 2022 23:31:21 -0800
+Subject: tty: n_gsm: fix wrong tty control line for flow control
+
+From: daniel.starke@siemens.com <daniel.starke@siemens.com>
+
+commit c19d93542a6081577e6da9bf5e887979c72e80c1 upstream.
+
+tty flow control is handled via gsmtty_throttle() and gsmtty_unthrottle().
+Both functions propagate the outgoing hardware flow control state to the
+remote side via MSC (modem status command) frames. The local state is taken
+from the RTS (ready to send) flag of the tty. However, RTS gets mapped to
+DTR (data terminal ready), which is wrong.
+This patch corrects this by mapping RTS to RTS.
+
+Fixes: e1eaea46bb40 ("tty: n_gsm line discipline")
+Cc: stable@vger.kernel.org
+Signed-off-by: Daniel Starke <daniel.starke@siemens.com>
+Link: https://lore.kernel.org/r/20220218073123.2121-5-daniel.starke@siemens.com
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/tty/n_gsm.c |    8 ++++----
+ 1 file changed, 4 insertions(+), 4 deletions(-)
+
+--- a/drivers/tty/n_gsm.c
++++ b/drivers/tty/n_gsm.c
+@@ -3180,9 +3180,9 @@ static void gsmtty_throttle(struct tty_s
+       if (dlci->state == DLCI_CLOSED)
+               return;
+       if (C_CRTSCTS(tty))
+-              dlci->modem_tx &= ~TIOCM_DTR;
++              dlci->modem_tx &= ~TIOCM_RTS;
+       dlci->throttled = true;
+-      /* Send an MSC with DTR cleared */
++      /* Send an MSC with RTS cleared */
+       gsmtty_modem_update(dlci, 0);
+ }
+@@ -3192,9 +3192,9 @@ static void gsmtty_unthrottle(struct tty
+       if (dlci->state == DLCI_CLOSED)
+               return;
+       if (C_CRTSCTS(tty))
+-              dlci->modem_tx |= TIOCM_DTR;
++              dlci->modem_tx |= TIOCM_RTS;
+       dlci->throttled = false;
+-      /* Send an MSC with DTR set */
++      /* Send an MSC with RTS set */
+       gsmtty_modem_update(dlci, 0);
+ }