Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp150126ybp; Tue, 8 Oct 2019 15:38:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqxM63JVSZIwGIqiBUcrNttGXFqlxkzQnpIpLP5xZjpgk+rHJzCoRPcN4UvLvqJrWpCnrV/F X-Received: by 2002:aa7:d145:: with SMTP id r5mr286094edo.275.1570574326989; Tue, 08 Oct 2019 15:38:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570574326; cv=none; d=google.com; s=arc-20160816; b=otX6mEmxjBeoyYMfbs5urHDIugFaLEckZ8kVamHff9F3VpnGvs3shWsZuj86d83N3A 6UUoAcwUCfpgWcBC5GyJPfnTd0TivcO++v/o573HYYnFNRSRcmBCa5doMiosZtp1zFns pr2mHu65JO3vQaIHiQI5WJ1ruSQoJwAIbVTRGewZ0acgr9HbzNzuWcoCRbhY7XahZU3K I9U/tW27edy3FuFKABdquspaMcn16ms2xuCNUa86wN2OT2G490pGwn+pzqS/Yt+iPcaR Khqjksqa7lKmsr95k4SgHJGetF+8UVwI8Ta99IPB7rK5NsO7h4tbt29pGWTV3+MuVwup p3oA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=VC4mv5XGXFruUlsFXW0NMhXbbPQw/AuYeawaNDJPGzY=; b=iaaf9F2xJ6Th8bgBWhO9tXB9eJqRFq65nzwp8CEyueJx81TY/L/01f73x8cloZuPl/ M3ZkxMovJQI/4hMV/AqViHjMV3nvu6UJPPvdt+1AY3tLkmmj3FIYtU7jjOU60elNGmnD EWJMbkQgr/cyesRptnWNY+gjsOLod8BtcTM562yKeMP0jmNvwKr8PrSOOU8mS8+efA/z i6sSWxPT5PL3dLPe6llHy/0Xi5p5afJ95quDNOkIKranFdU7gdDk28+R6db9RJuoBgwF xDG6vTk7w2UguMtDKNKaG6bEgIVeeFINdtX0h0WxQW3AFny8OaaOnQ9Gma3KIqVQ2jXK MfAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=CzDAXewQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f20si212795edm.365.2019.10.08.15.38.21; Tue, 08 Oct 2019 15:38:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=CzDAXewQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725879AbfJHWhY (ORCPT + 99 others); Tue, 8 Oct 2019 18:37:24 -0400 Received: from mail-pf1-f194.google.com ([209.85.210.194]:42737 "EHLO mail-pf1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725848AbfJHWhY (ORCPT ); Tue, 8 Oct 2019 18:37:24 -0400 Received: by mail-pf1-f194.google.com with SMTP id q12so252568pff.9 for ; Tue, 08 Oct 2019 15:37:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=VC4mv5XGXFruUlsFXW0NMhXbbPQw/AuYeawaNDJPGzY=; b=CzDAXewQ/uqRQSI/BP3FF11jEUDkE2OG4DlXubxjf9hE0jRUkIjqtwa9rzyJvPHRzN gElY4mMMN9fKegzA4yKqmZQVgnUjTGcQjkV3VMgYyF/8uZFntijtBWPWy2pkOHPRlPiv 0TjdJ5pvEWIvM6QbQDQdLz14P0gYPaLsp7Obk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=VC4mv5XGXFruUlsFXW0NMhXbbPQw/AuYeawaNDJPGzY=; b=U/3chgJhPK6BoSFw1sAaK9EDeNBHYH15UuayxJZ0A8c7N24YEBOOpEaT+jb0QP9Wvj LYhixwaCXRjFc7o3852a6M+UDr9iWdQsVom2ZiwUN7oomwzbvwf4t3stq/SF0GjKS9Uz FRYa4wTTDzQt6qnFUNeK2V7JlOcX+FNHJ0+lT+gAWg1rkhadXXC/o6+T5f4KDyxols+G r97LhRig025H18AbpeLwCVMoQa+/MX42q00xBhYk1Da7X0eQn1HSQ8G2CaA45dRRplfQ sBDSYwQbQdlYciOuaomQAmJe3lSLRGGFhi3canCKVlGqpMScOG3cGNCn9YfQJFSIsupM EsZw== X-Gm-Message-State: APjAAAW9Oa2OmqwX3mz+G++OItwZP4dNFaScUjBCT7/6gL7s0HT5M6Tf hHXsjkFCPZ5oCNl770+I1WGV/g== X-Received: by 2002:a63:27c1:: with SMTP id n184mr771895pgn.193.1570574243485; Tue, 08 Oct 2019 15:37:23 -0700 (PDT) Received: from evgreen2.mtv.corp.google.com ([2620:15c:202:201:ffda:7716:9afc:1301]) by smtp.gmail.com with ESMTPSA id p11sm183106pgb.1.2019.10.08.15.37.22 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 08 Oct 2019 15:37:22 -0700 (PDT) From: Evan Green To: Dmitry Torokhov Cc: Evan Green , Pan Bian , Allison Randal , linux-kernel@vger.kernel.org, Thomas Gleixner , Kate Stewart , linux-input@vger.kernel.org, Greg Kroah-Hartman Subject: [PATCH] Input: synaptics-rmi4 - Avoid processing unknown IRQs Date: Tue, 8 Oct 2019 15:36:57 -0700 Message-Id: <20191008223657.163366-1-evgreen@chromium.org> X-Mailer: git-send-email 2.21.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org rmi_process_interrupt_requests() calls handle_nested_irq() for each interrupt status bit it finds. If the irq domain mapping for this bit had not yet been set up, then it ends up calling handle_nested_irq(0), which causes a NULL pointer dereference. There's already code that masks the irq_status bits coming out of the hardware with current_irq_mask, presumably to avoid this situation. However current_irq_mask seems to more reflect the actual mask set in the hardware rather than the IRQs software has set up and registered for. For example, in rmi_driver_reset_handler(), the current_irq_mask is initialized based on what is read from the hardware. If the reset value of this mask enables IRQs that Linux has not set up yet, then we end up in this situation. There appears to be a third unused bitmask that used to serve this purpose, fn_irq_bits. Use that bitmask instead of current_irq_mask to avoid calling handle_nested_irq() on IRQs that have not yet been set up. Signed-off-by: Evan Green --- drivers/input/rmi4/rmi_driver.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/input/rmi4/rmi_driver.c b/drivers/input/rmi4/rmi_driver.c index 772493b1f665..190b9974526b 100644 --- a/drivers/input/rmi4/rmi_driver.c +++ b/drivers/input/rmi4/rmi_driver.c @@ -146,7 +146,7 @@ static int rmi_process_interrupt_requests(struct rmi_device *rmi_dev) } mutex_lock(&data->irq_mutex); - bitmap_and(data->irq_status, data->irq_status, data->current_irq_mask, + bitmap_and(data->irq_status, data->irq_status, data->fn_irq_bits, data->irq_count); /* * At this point, irq_status has all bits that are set in the @@ -385,6 +385,8 @@ static int rmi_driver_set_irq_bits(struct rmi_device *rmi_dev, bitmap_copy(data->current_irq_mask, data->new_irq_mask, data->num_of_irq_regs); + bitmap_or(data->fn_irq_bits, data->fn_irq_bits, mask, data->irq_count); + error_unlock: mutex_unlock(&data->irq_mutex); return error; @@ -398,6 +400,8 @@ static int rmi_driver_clear_irq_bits(struct rmi_device *rmi_dev, struct device *dev = &rmi_dev->dev; mutex_lock(&data->irq_mutex); + bitmap_andnot(data->fn_irq_bits, + data->fn_irq_bits, mask, data->irq_count); bitmap_andnot(data->new_irq_mask, data->current_irq_mask, mask, data->irq_count); -- 2.21.0