Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp1858360rwb; Fri, 19 Aug 2022 10:33:01 -0700 (PDT) X-Google-Smtp-Source: AA6agR6H7KRQ3nnRJBcuUumfchR32tlLIt2kvAk2ugr+BIasTfkqBwtrk2uKhVr+YpthZZtwSFDm X-Received: by 2002:a05:6402:496:b0:443:a5f5:d3b with SMTP id k22-20020a056402049600b00443a5f50d3bmr7062263edv.331.1660930381374; Fri, 19 Aug 2022 10:33:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660930381; cv=none; d=google.com; s=arc-20160816; b=m9rT51UVqOezhImDVMJnKtZk/B00ZgwCEeBC9FNWRgSgACVU0tbUl1YDuCZDn7Sp3g XGKimXCnYs4vMkFa6smfiWTOYvn/qYBaXTyvy/RvhcXsFDMjUiy3voDNB1yhPMtBVhHV PRoFEBj24xMTaAYB6XG1PtCB8g0qm10HvVCjsPg9yrUFi6y4cZbBAq6jpEkDwucohXCo qviDPIrFqWiGs+2+fgMkN8YL/app5mDUYjptjNr4RA+y52RHXzwJIJlivvb/oLqqCS/Q S8egb4q67R70jLnmYjmce3m7tYwZ/JEwdkBw7pU8ItYgfoQJOIn6JvyeC5SfU1Vly2WM ykbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Ufe3FhhhrIGbL9oHd8iLafMdcwk3m7y7vRn6Wb73q6k=; b=k+8HnWm1tfjmBJy4lXPYFPVkTNN+Ppr205JZHmarplK3BtbBoncshAI0z4dyyHNi+z 162M+k/9vVQs/BveDfkbTXUgx1X+MsbIfX+HPL4NWm8wIrSkDOgyRakcOvAB5KawGxpK 9OVcTtWa+PfECp0yeVsF5Xm9GaauxRfIOjZ49VGbJ8XWQP6z8YK5v9qhFdoVu/Ch+Vgr 4Ify0ubBiEIRpd5RXsWCq66TXEb0Sf748FngWjajigBYH88xLokB8yhYXjrDdeHxdALB 1xGehyQz85LeHldAbOWGB8rc1IMtt/cdA+xr55vGUFx9dqrXlQQXijOm22JUQ++q6gcc 3m3g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=REGcYcgJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id du19-20020a17090772d300b0072b4b0b6908si3382712ejc.892.2022.08.19.10.32.35; Fri, 19 Aug 2022 10:33:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=REGcYcgJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1353375AbiHSQhM (ORCPT + 99 others); Fri, 19 Aug 2022 12:37:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35912 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1353668AbiHSQcV (ORCPT ); Fri, 19 Aug 2022 12:32:21 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9241F107755; Fri, 19 Aug 2022 09:06:29 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 690DB617A7; Fri, 19 Aug 2022 16:06:28 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 59A06C433C1; Fri, 19 Aug 2022 16:06:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1660925187; bh=ZTKYh249t17VI4W2hEGLebc9KiFdDmApGgO4WR5MDvQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=REGcYcgJW9vO1Y1ow+pRnsUMLGiP7PzSjyhtxoIttSP/4jFBgEJQc0cir+V8HpmrC GsPf3lDiMiM2GWH9IErlMNEmLLVKGirZpcwcKHyOZqKK4GO3NALhBxtDA+6RAnsWeS mZByN/oLcb31VvkO0yB4rSowQFiksgaTNJVFQBX8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Daniel Starke , Sasha Levin Subject: [PATCH 5.10 382/545] tty: n_gsm: fix user open not possible at responder until initiator open Date: Fri, 19 Aug 2022 17:42:32 +0200 Message-Id: <20220819153846.515894494@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220819153829.135562864@linuxfoundation.org> References: <20220819153829.135562864@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Daniel Starke [ Upstream commit ac77f0077c3265197d378158c85a55eee6d21508 ] After setting up the control channel on both sides the responder side may want to open a virtual tty to listen on until the initiator starts an application on a user channel. The current implementation allows the open() but no other operation, like termios. These fail with EINVAL. The responder sided application has no means to detect an open by the initiator sided application this way. And the initiator sided applications usually expect the responder sided application to listen on the user channel upon open. Set the user channel into half-open state on responder side once a user application opens the virtual tty to allow IO operations on it. Furthermore, keep the user channel constipated until the initiator side opens it to give the responder sided application the chance to detect the new connection and to avoid data loss if the responder sided application starts sending before the user channel is open. Fixes: e1eaea46bb40 ("tty: n_gsm line discipline") Signed-off-by: Daniel Starke Link: https://lore.kernel.org/r/20220701061652.39604-1-daniel.starke@siemens.com Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/tty/n_gsm.c | 31 +++++++++++++++++++++++++++++-- 1 file changed, 29 insertions(+), 2 deletions(-) diff --git a/drivers/tty/n_gsm.c b/drivers/tty/n_gsm.c index 405b55bceba8..c95f7d8314fc 100644 --- a/drivers/tty/n_gsm.c +++ b/drivers/tty/n_gsm.c @@ -1429,6 +1429,8 @@ static void gsm_dlci_close(struct gsm_dlci *dlci) if (debug & 8) pr_debug("DLCI %d goes closed.\n", dlci->addr); dlci->state = DLCI_CLOSED; + /* Prevent us from sending data before the link is up again */ + dlci->constipated = true; if (dlci->addr != 0) { tty_port_tty_hangup(&dlci->port, false); spin_lock_irqsave(&dlci->lock, flags); @@ -1458,6 +1460,7 @@ static void gsm_dlci_open(struct gsm_dlci *dlci) del_timer(&dlci->t1); /* This will let a tty open continue */ dlci->state = DLCI_OPEN; + dlci->constipated = false; if (debug & 8) pr_debug("DLCI %d goes open.\n", dlci->addr); wake_up(&dlci->gsm->event); @@ -1535,6 +1538,25 @@ static void gsm_dlci_begin_open(struct gsm_dlci *dlci) mod_timer(&dlci->t1, jiffies + gsm->t1 * HZ / 100); } +/** + * gsm_dlci_set_opening - change state to opening + * @dlci: DLCI to open + * + * Change internal state to wait for DLCI open from initiator side. + * We set off timers and responses upon reception of an SABM. + */ +static void gsm_dlci_set_opening(struct gsm_dlci *dlci) +{ + switch (dlci->state) { + case DLCI_CLOSED: + case DLCI_CLOSING: + dlci->state = DLCI_OPENING; + break; + default: + break; + } +} + /** * gsm_dlci_begin_close - start channel open procedure * @dlci: DLCI to open @@ -1673,10 +1695,13 @@ static struct gsm_dlci *gsm_dlci_alloc(struct gsm_mux *gsm, int addr) dlci->addr = addr; dlci->adaption = gsm->adaption; dlci->state = DLCI_CLOSED; - if (addr) + if (addr) { dlci->data = gsm_dlci_data; - else + /* Prevent us from sending data before the link is up */ + dlci->constipated = true; + } else { dlci->data = gsm_dlci_command; + } gsm->dlci[addr] = dlci; return dlci; } @@ -3036,6 +3061,8 @@ static int gsmtty_open(struct tty_struct *tty, struct file *filp) /* Start sending off SABM messages */ if (gsm->initiator) gsm_dlci_begin_open(dlci); + else + gsm_dlci_set_opening(dlci); /* And wait for virtual carrier */ return tty_port_block_til_ready(port, tty, filp); } -- 2.35.1