Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp759937ybl; Wed, 4 Dec 2019 10:23:11 -0800 (PST) X-Google-Smtp-Source: APXvYqxLU0cciwx2weFr6RFDquWfdqsIBla+rDlFTxsE3Bet8KUc/xgwE42mSh4hWs2lLUxJmgmz X-Received: by 2002:a9d:61c4:: with SMTP id h4mr3768661otk.310.1575483791390; Wed, 04 Dec 2019 10:23:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575483791; cv=none; d=google.com; s=arc-20160816; b=oAYi3SQMOrp2BKqCJQY6qRUAJeQown2hn+TDJX9ZOckKigcaoaNE37uDoT0BgSBc0A Xo2l2ZuICgKeKB09W2D+PPADCyFMYftowYgWFjz7jI3pK6PvAVQyX8JUUgTenYFPBQ/6 4hd2pZsVfL9ZlxvLlb8oz1Z2wZa2wRGIN9eB6WsmidFD3HYyF295hgiOZk31lMq4pUsl BQ49G/adjZ/A4Op9dyxc6Nm1QsmNFC1N9mVkHoZ6tYpS39w7YCJVPQlo5EZVKreDgRpc fl5meGFRFbUmygNXJVPlC4ax1mR+y799QS336m4oO+OJLeiPGBaWZK9KAlW5E09z6eWB ixCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=KROlE9YTWrygWsLPM2DFRkU7YgkYSMAmEGn3Am3ItIM=; b=WG6hA/YK1e2AtQPH1IjbjV4xfV6H8ZQUTsGikMCfD9235fczlQzXga7ZuUh3+GFJbS MLwIkdlLWmxIG1Bo68fGvVP8quhHW6RVgZwi17sGnU2CG3RcRotZ/uJBu8V8ceN6eEkm mpoqJQT5eGlgXaY7AAkpLqe6Gj1ywiatd/SthXmW2WfiTo30y9MFBhcG8yOVpZOol/Gt XOgs0dVNn9ES8q+pa/EC9LleFYvGRbnqR91XRH8kCXNwU+b8egw66UcxNK04dZIbiwja XKcrbz+Ojq8dJdJGip3CoocUoRBWexPr7w/YTZxJMQtNwXMaOjff9SseM9yMqP7vANMD J5NA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wX+se30i; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h3si3722756otq.203.2019.12.04.10.22.58; Wed, 04 Dec 2019 10:23:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wX+se30i; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730542AbfLDSGZ (ORCPT + 99 others); Wed, 4 Dec 2019 13:06:25 -0500 Received: from mail.kernel.org ([198.145.29.99]:54606 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730539AbfLDSGX (ORCPT ); Wed, 4 Dec 2019 13:06:23 -0500 Received: from localhost (unknown [217.68.49.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 66F0C206DF; Wed, 4 Dec 2019 18:06:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575482782; bh=M3ojh6xd7Sh422K7jc7cJuoAtbq2AUgs1fVwY82uxaM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wX+se30i9E5lwFCSREDEhHP5tlZDfQcMFtwfDUAgdYFPdnsqZdnx11y1pP8qa99F9 o+tvFFqfHIJOOUXv+N0tf0p4cAyhGKuPeHLTqlZvQnuKNXvvYc7qG8bMDpkbQjluUK gb4lrYaz2W/1VVHbhIqE31ajiEPCqdNUx+R6toNk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, He Zhe , Darwin Dingel , Sasha Levin Subject: [PATCH 4.14 131/209] serial: 8250: Fix serial8250 initialization crash Date: Wed, 4 Dec 2019 18:55:43 +0100 Message-Id: <20191204175332.178927173@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191204175321.609072813@linuxfoundation.org> References: <20191204175321.609072813@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: He Zhe [ Upstream commit 352c4cf40c4a7d439fa5d30aa2160f54b394da82 ] The initialization code of interrupt backoff work might reference NULL pointer and cause the following crash, if no port was found. [ 10.017727] CPU 0 Unable to handle kernel paging request at virtual address 000001b0, epc == 807088e0, ra == 8070863c ---- snip ---- [ 11.704470] [<807088e0>] serial8250_register_8250_port+0x318/0x4ac [ 11.747251] [<80708d74>] serial8250_probe+0x148/0x1c0 [ 11.789301] [<80728450>] platform_drv_probe+0x40/0x94 [ 11.830515] [<807264f8>] really_probe+0xf8/0x318 [ 11.870876] [<80726b7c>] __driver_attach+0x110/0x12c [ 11.910960] [<80724374>] bus_for_each_dev+0x78/0xcc [ 11.951134] [<80725958>] bus_add_driver+0x200/0x234 [ 11.989756] [<807273d8>] driver_register+0x84/0x148 [ 12.029832] [<80d72f84>] serial8250_init+0x138/0x198 [ 12.070447] [<80100e6c>] do_one_initcall+0x5c/0x2a0 [ 12.110104] [<80d3a208>] kernel_init_freeable+0x370/0x484 [ 12.150722] [<80a49420>] kernel_init+0x10/0xf8 [ 12.191517] [<8010756c>] ret_from_kernel_thread+0x14/0x1c This patch makes sure the initialization code can be reached only if a port is found. Fixes: 6d7f677a2afa ("serial: 8250: Rate limit serial port rx interrupts during input overruns") Signed-off-by: He Zhe Reviewed-by: Darwin Dingel Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/tty/serial/8250/8250_core.c | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/drivers/tty/serial/8250/8250_core.c b/drivers/tty/serial/8250/8250_core.c index ceeea4b159c4b..c698ebab6d3bd 100644 --- a/drivers/tty/serial/8250/8250_core.c +++ b/drivers/tty/serial/8250/8250_core.c @@ -1077,15 +1077,16 @@ int serial8250_register_8250_port(struct uart_8250_port *up) ret = 0; } - } - /* Initialise interrupt backoff work if required */ - if (up->overrun_backoff_time_ms > 0) { - uart->overrun_backoff_time_ms = up->overrun_backoff_time_ms; - INIT_DELAYED_WORK(&uart->overrun_backoff, - serial_8250_overrun_backoff_work); - } else { - uart->overrun_backoff_time_ms = 0; + /* Initialise interrupt backoff work if required */ + if (up->overrun_backoff_time_ms > 0) { + uart->overrun_backoff_time_ms = + up->overrun_backoff_time_ms; + INIT_DELAYED_WORK(&uart->overrun_backoff, + serial_8250_overrun_backoff_work); + } else { + uart->overrun_backoff_time_ms = 0; + } } mutex_unlock(&serial_mutex); -- 2.20.1