linux-bluetooth.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations
@ 2019-07-30  9:33 Marcel Holtmann
  2019-07-31  2:45 ` Al Cho
  2019-08-01 13:31 ` Sasha Levin
  0 siblings, 2 replies; 9+ messages in thread
From: Marcel Holtmann @ 2019-07-30  9:33 UTC (permalink / raw)
  To: torvalds; +Cc: linux-kernel, linux-bluetooth

From: Vladis Dronov <vdronov@redhat.com>

Certain ttys operations (pty_unix98_ops) lack tiocmget() and tiocmset()
functions which are called by the certain HCI UART protocols (hci_ath,
hci_bcm, hci_intel, hci_mrvl, hci_qca) via hci_uart_set_flow_control()
or directly. This leads to an execution at NULL and can be triggered by
an unprivileged user. Fix this by adding a helper function and a check
for the missing tty operations in the protocols code.

This fixes CVE-2019-10207. The Fixes: lines list commits where calls to
tiocm[gs]et() or hci_uart_set_flow_control() were added to the HCI UART
protocols.

Link: https://syzkaller.appspot.com/bug?id=1b42faa2848963564a5b1b7f8c837ea7b55ffa50
Reported-by: syzbot+79337b501d6aa974d0f6@syzkaller.appspotmail.com
Cc: stable@vger.kernel.org # v2.6.36+
Fixes: b3190df62861 ("Bluetooth: Support for Atheros AR300x serial chip")
Fixes: 118612fb9165 ("Bluetooth: hci_bcm: Add suspend/resume PM functions")
Fixes: ff2895592f0f ("Bluetooth: hci_intel: Add Intel baudrate configuration support")
Fixes: 162f812f23ba ("Bluetooth: hci_uart: Add Marvell support")
Fixes: fa9ad876b8e0 ("Bluetooth: hci_qca: Add support for Qualcomm Bluetooth chip wcn3990")
Signed-off-by: Vladis Dronov <vdronov@redhat.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
---
 drivers/bluetooth/hci_ath.c   |  3 +++
 drivers/bluetooth/hci_bcm.c   |  3 +++
 drivers/bluetooth/hci_intel.c |  3 +++
 drivers/bluetooth/hci_ldisc.c | 13 +++++++++++++
 drivers/bluetooth/hci_mrvl.c  |  3 +++
 drivers/bluetooth/hci_qca.c   |  3 +++
 drivers/bluetooth/hci_uart.h  |  1 +
 7 files changed, 29 insertions(+)

diff --git a/drivers/bluetooth/hci_ath.c b/drivers/bluetooth/hci_ath.c
index a55be205b91a..dbfe34664633 100644
--- a/drivers/bluetooth/hci_ath.c
+++ b/drivers/bluetooth/hci_ath.c
@@ -98,6 +98,9 @@ static int ath_open(struct hci_uart *hu)
 
 	BT_DBG("hu %p", hu);
 
+	if (!hci_uart_has_flow_control(hu))
+		return -EOPNOTSUPP;
+
 	ath = kzalloc(sizeof(*ath), GFP_KERNEL);
 	if (!ath)
 		return -ENOMEM;
diff --git a/drivers/bluetooth/hci_bcm.c b/drivers/bluetooth/hci_bcm.c
index 8905ad2edde7..ae2624fce913 100644
--- a/drivers/bluetooth/hci_bcm.c
+++ b/drivers/bluetooth/hci_bcm.c
@@ -406,6 +406,9 @@ static int bcm_open(struct hci_uart *hu)
 
 	bt_dev_dbg(hu->hdev, "hu %p", hu);
 
+	if (!hci_uart_has_flow_control(hu))
+		return -EOPNOTSUPP;
+
 	bcm = kzalloc(sizeof(*bcm), GFP_KERNEL);
 	if (!bcm)
 		return -ENOMEM;
diff --git a/drivers/bluetooth/hci_intel.c b/drivers/bluetooth/hci_intel.c
index 207bae5e0d46..31f25153087d 100644
--- a/drivers/bluetooth/hci_intel.c
+++ b/drivers/bluetooth/hci_intel.c
@@ -391,6 +391,9 @@ static int intel_open(struct hci_uart *hu)
 
 	BT_DBG("hu %p", hu);
 
+	if (!hci_uart_has_flow_control(hu))
+		return -EOPNOTSUPP;
+
 	intel = kzalloc(sizeof(*intel), GFP_KERNEL);
 	if (!intel)
 		return -ENOMEM;
diff --git a/drivers/bluetooth/hci_ldisc.c b/drivers/bluetooth/hci_ldisc.c
index 8950e07889fe..85a30fb9177b 100644
--- a/drivers/bluetooth/hci_ldisc.c
+++ b/drivers/bluetooth/hci_ldisc.c
@@ -292,6 +292,19 @@ static int hci_uart_send_frame(struct hci_dev *hdev, struct sk_buff *skb)
 	return 0;
 }
 
+/* Check the underlying device or tty has flow control support */
+bool hci_uart_has_flow_control(struct hci_uart *hu)
+{
+	/* serdev nodes check if the needed operations are present */
+	if (hu->serdev)
+		return true;
+
+	if (hu->tty->driver->ops->tiocmget && hu->tty->driver->ops->tiocmset)
+		return true;
+
+	return false;
+}
+
 /* Flow control or un-flow control the device */
 void hci_uart_set_flow_control(struct hci_uart *hu, bool enable)
 {
diff --git a/drivers/bluetooth/hci_mrvl.c b/drivers/bluetooth/hci_mrvl.c
index f98e5cc343b2..fbc3f7c3a5c7 100644
--- a/drivers/bluetooth/hci_mrvl.c
+++ b/drivers/bluetooth/hci_mrvl.c
@@ -59,6 +59,9 @@ static int mrvl_open(struct hci_uart *hu)
 
 	BT_DBG("hu %p", hu);
 
+	if (!hci_uart_has_flow_control(hu))
+		return -EOPNOTSUPP;
+
 	mrvl = kzalloc(sizeof(*mrvl), GFP_KERNEL);
 	if (!mrvl)
 		return -ENOMEM;
diff --git a/drivers/bluetooth/hci_qca.c b/drivers/bluetooth/hci_qca.c
index 9a5c9c1f9484..82a0a3691a63 100644
--- a/drivers/bluetooth/hci_qca.c
+++ b/drivers/bluetooth/hci_qca.c
@@ -473,6 +473,9 @@ static int qca_open(struct hci_uart *hu)
 
 	BT_DBG("hu %p qca_open", hu);
 
+	if (!hci_uart_has_flow_control(hu))
+		return -EOPNOTSUPP;
+
 	qca = kzalloc(sizeof(struct qca_data), GFP_KERNEL);
 	if (!qca)
 		return -ENOMEM;
diff --git a/drivers/bluetooth/hci_uart.h b/drivers/bluetooth/hci_uart.h
index f11af3912ce6..6ab631101019 100644
--- a/drivers/bluetooth/hci_uart.h
+++ b/drivers/bluetooth/hci_uart.h
@@ -104,6 +104,7 @@ int hci_uart_wait_until_sent(struct hci_uart *hu);
 int hci_uart_init_ready(struct hci_uart *hu);
 void hci_uart_init_work(struct work_struct *work);
 void hci_uart_set_baudrate(struct hci_uart *hu, unsigned int speed);
+bool hci_uart_has_flow_control(struct hci_uart *hu);
 void hci_uart_set_flow_control(struct hci_uart *hu, bool enable);
 void hci_uart_set_speeds(struct hci_uart *hu, unsigned int init_speed,
 			 unsigned int oper_speed);
-- 
2.21.0


^ permalink raw reply related	[flat|nested] 9+ messages in thread

* Re: [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations
  2019-07-30  9:33 [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations Marcel Holtmann
@ 2019-07-31  2:45 ` Al Cho
  2019-08-01 13:31 ` Sasha Levin
  1 sibling, 0 replies; 9+ messages in thread
From: Al Cho @ 2019-07-31  2:45 UTC (permalink / raw)
  To: Marcel Holtmann, torvalds; +Cc: linux-bluetooth, linux-kernel

On Tue, 2019-07-30 at 11:33 +0200, Marcel Holtmann wrote:
> From: Vladis Dronov <vdronov@redhat.com>
> 
> Certain ttys operations (pty_unix98_ops) lack tiocmget() and
> tiocmset()
> functions which are called by the certain HCI UART protocols
> (hci_ath,
> hci_bcm, hci_intel, hci_mrvl, hci_qca) via
> hci_uart_set_flow_control()
> or directly. This leads to an execution at NULL and can be triggered
> by
> an unprivileged user. Fix this by adding a helper function and a
> check
> for the missing tty operations in the protocols code.
> 
> This fixes CVE-2019-10207. The Fixes: lines list commits where calls
> to
> tiocm[gs]et() or hci_uart_set_flow_control() were added to the HCI
> UART
> protocols.
> 
> Link: 
> https://syzkaller.appspot.com/bug?id=1b42faa2848963564a5b1b7f8c837ea7b55ffa50
> Reported-by: syzbot+79337b501d6aa974d0f6@syzkaller.appspotmail.com
> Cc: stable@vger.kernel.org # v2.6.36+
> Fixes: b3190df62861 ("Bluetooth: Support for Atheros AR300x serial
> chip")
> Fixes: 118612fb9165 ("Bluetooth: hci_bcm: Add suspend/resume PM
> functions")
> Fixes: ff2895592f0f ("Bluetooth: hci_intel: Add Intel baudrate
> configuration support")
> Fixes: 162f812f23ba ("Bluetooth: hci_uart: Add Marvell support")
> Fixes: fa9ad876b8e0 ("Bluetooth: hci_qca: Add support for Qualcomm
> Bluetooth chip wcn3990")
> Signed-off-by: Vladis Dronov <vdronov@redhat.com>
> Signed-off-by: Marcel Holtmann <marcel@holtmann.org>

Reviewed-by: Yu-Chen, Cho <acho@suse.com>
Tested-by: Yu-Chen, Cho <acho@suse.com>

> ---
>  drivers/bluetooth/hci_ath.c   |  3 +++
>  drivers/bluetooth/hci_bcm.c   |  3 +++
>  drivers/bluetooth/hci_intel.c |  3 +++
>  drivers/bluetooth/hci_ldisc.c | 13 +++++++++++++
>  drivers/bluetooth/hci_mrvl.c  |  3 +++
>  drivers/bluetooth/hci_qca.c   |  3 +++
>  drivers/bluetooth/hci_uart.h  |  1 +
>  7 files changed, 29 insertions(+)
> 
> diff --git a/drivers/bluetooth/hci_ath.c
> b/drivers/bluetooth/hci_ath.c
> index a55be205b91a..dbfe34664633 100644
> --- a/drivers/bluetooth/hci_ath.c
> +++ b/drivers/bluetooth/hci_ath.c
> @@ -98,6 +98,9 @@ static int ath_open(struct hci_uart *hu)
>  
>  	BT_DBG("hu %p", hu);
>  
> +	if (!hci_uart_has_flow_control(hu))
> +		return -EOPNOTSUPP;
> +
>  	ath = kzalloc(sizeof(*ath), GFP_KERNEL);
>  	if (!ath)
>  		return -ENOMEM;
> diff --git a/drivers/bluetooth/hci_bcm.c
> b/drivers/bluetooth/hci_bcm.c
> index 8905ad2edde7..ae2624fce913 100644
> --- a/drivers/bluetooth/hci_bcm.c
> +++ b/drivers/bluetooth/hci_bcm.c
> @@ -406,6 +406,9 @@ static int bcm_open(struct hci_uart *hu)
>  
>  	bt_dev_dbg(hu->hdev, "hu %p", hu);
>  
> +	if (!hci_uart_has_flow_control(hu))
> +		return -EOPNOTSUPP;
> +
>  	bcm = kzalloc(sizeof(*bcm), GFP_KERNEL);
>  	if (!bcm)
>  		return -ENOMEM;
> diff --git a/drivers/bluetooth/hci_intel.c
> b/drivers/bluetooth/hci_intel.c
> index 207bae5e0d46..31f25153087d 100644
> --- a/drivers/bluetooth/hci_intel.c
> +++ b/drivers/bluetooth/hci_intel.c
> @@ -391,6 +391,9 @@ static int intel_open(struct hci_uart *hu)
>  
>  	BT_DBG("hu %p", hu);
>  
> +	if (!hci_uart_has_flow_control(hu))
> +		return -EOPNOTSUPP;
> +
>  	intel = kzalloc(sizeof(*intel), GFP_KERNEL);
>  	if (!intel)
>  		return -ENOMEM;
> diff --git a/drivers/bluetooth/hci_ldisc.c
> b/drivers/bluetooth/hci_ldisc.c
> index 8950e07889fe..85a30fb9177b 100644
> --- a/drivers/bluetooth/hci_ldisc.c
> +++ b/drivers/bluetooth/hci_ldisc.c
> @@ -292,6 +292,19 @@ static int hci_uart_send_frame(struct hci_dev
> *hdev, struct sk_buff *skb)
>  	return 0;
>  }
>  
> +/* Check the underlying device or tty has flow control support */
> +bool hci_uart_has_flow_control(struct hci_uart *hu)
> +{
> +	/* serdev nodes check if the needed operations are present */
> +	if (hu->serdev)
> +		return true;
> +
> +	if (hu->tty->driver->ops->tiocmget && hu->tty->driver->ops-
> >tiocmset)
> +		return true;
> +
> +	return false;
> +}
> +
>  /* Flow control or un-flow control the device */
>  void hci_uart_set_flow_control(struct hci_uart *hu, bool enable)
>  {
> diff --git a/drivers/bluetooth/hci_mrvl.c
> b/drivers/bluetooth/hci_mrvl.c
> index f98e5cc343b2..fbc3f7c3a5c7 100644
> --- a/drivers/bluetooth/hci_mrvl.c
> +++ b/drivers/bluetooth/hci_mrvl.c
> @@ -59,6 +59,9 @@ static int mrvl_open(struct hci_uart *hu)
>  
>  	BT_DBG("hu %p", hu);
>  
> +	if (!hci_uart_has_flow_control(hu))
> +		return -EOPNOTSUPP;
> +
>  	mrvl = kzalloc(sizeof(*mrvl), GFP_KERNEL);
>  	if (!mrvl)
>  		return -ENOMEM;
> diff --git a/drivers/bluetooth/hci_qca.c
> b/drivers/bluetooth/hci_qca.c
> index 9a5c9c1f9484..82a0a3691a63 100644
> --- a/drivers/bluetooth/hci_qca.c
> +++ b/drivers/bluetooth/hci_qca.c
> @@ -473,6 +473,9 @@ static int qca_open(struct hci_uart *hu)
>  
>  	BT_DBG("hu %p qca_open", hu);
>  
> +	if (!hci_uart_has_flow_control(hu))
> +		return -EOPNOTSUPP;
> +
>  	qca = kzalloc(sizeof(struct qca_data), GFP_KERNEL);
>  	if (!qca)
>  		return -ENOMEM;
> diff --git a/drivers/bluetooth/hci_uart.h
> b/drivers/bluetooth/hci_uart.h
> index f11af3912ce6..6ab631101019 100644
> --- a/drivers/bluetooth/hci_uart.h
> +++ b/drivers/bluetooth/hci_uart.h
> @@ -104,6 +104,7 @@ int hci_uart_wait_until_sent(struct hci_uart
> *hu);
>  int hci_uart_init_ready(struct hci_uart *hu);
>  void hci_uart_init_work(struct work_struct *work);
>  void hci_uart_set_baudrate(struct hci_uart *hu, unsigned int speed);
> +bool hci_uart_has_flow_control(struct hci_uart *hu);
>  void hci_uart_set_flow_control(struct hci_uart *hu, bool enable);
>  void hci_uart_set_speeds(struct hci_uart *hu, unsigned int
> init_speed,
>  			 unsigned int oper_speed);


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations
  2019-07-30  9:33 [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations Marcel Holtmann
  2019-07-31  2:45 ` Al Cho
@ 2019-08-01 13:31 ` Sasha Levin
  2019-08-01 13:50   ` Greg KH
  1 sibling, 1 reply; 9+ messages in thread
From: Sasha Levin @ 2019-08-01 13:31 UTC (permalink / raw)
  To: Sasha Levin, Marcel Holtmann, Vladis Dronov, torvalds
  Cc: linux-kernel, linux-bluetooth, stable

Hi,

[This is an automated email]

This commit has been processed because it contains a "Fixes:" tag,
fixing commit: .

The bot has tested the following trees: v5.2.4, v5.1.21, v4.19.62, v4.14.134, v4.9.186, v4.4.186.

v5.2.4: Build OK!
v5.1.21: Build OK!
v4.19.62: Build OK!
v4.14.134: Failed to apply! Possible dependencies:
    25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")

v4.9.186: Failed to apply! Possible dependencies:
    25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")

v4.4.186: Failed to apply! Possible dependencies:
    162f812f23ba ("Bluetooth: hci_uart: Add Marvell support")
    25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
    395174bb07c1 ("Bluetooth: hci_uart: Add Intel/AG6xx support")
    9e69130c4efc ("Bluetooth: hci_uart: Add Nokia Protocol identifier")


NOTE: The patch will not be queued to stable trees until it is upstream.

How should we proceed with this patch?

--
Thanks,
Sasha

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations
  2019-08-01 13:31 ` Sasha Levin
@ 2019-08-01 13:50   ` Greg KH
  2019-08-01 13:55     ` Vladis Dronov
  2019-08-01 17:16     ` Sasha Levin
  0 siblings, 2 replies; 9+ messages in thread
From: Greg KH @ 2019-08-01 13:50 UTC (permalink / raw)
  To: Sasha Levin
  Cc: Marcel Holtmann, Vladis Dronov, torvalds, linux-kernel,
	linux-bluetooth, stable

On Thu, Aug 01, 2019 at 01:31:31PM +0000, Sasha Levin wrote:
> Hi,
> 
> [This is an automated email]
> 
> This commit has been processed because it contains a "Fixes:" tag,
> fixing commit: .
> 
> The bot has tested the following trees: v5.2.4, v5.1.21, v4.19.62, v4.14.134, v4.9.186, v4.4.186.
> 
> v5.2.4: Build OK!
> v5.1.21: Build OK!
> v4.19.62: Build OK!
> v4.14.134: Failed to apply! Possible dependencies:
>     25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
> 
> v4.9.186: Failed to apply! Possible dependencies:
>     25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
> 
> v4.4.186: Failed to apply! Possible dependencies:
>     162f812f23ba ("Bluetooth: hci_uart: Add Marvell support")
>     25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
>     395174bb07c1 ("Bluetooth: hci_uart: Add Intel/AG6xx support")
>     9e69130c4efc ("Bluetooth: hci_uart: Add Nokia Protocol identifier")
> 
> 
> NOTE: The patch will not be queued to stable trees until it is upstream.
> 
> How should we proceed with this patch?

Already fixed up by hand and queued up, your automated email is a bit
slow :)

greg k-h

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations
  2019-08-01 13:50   ` Greg KH
@ 2019-08-01 13:55     ` Vladis Dronov
  2019-08-01 14:06       ` Greg KH
  2019-08-01 17:16     ` Sasha Levin
  1 sibling, 1 reply; 9+ messages in thread
From: Vladis Dronov @ 2019-08-01 13:55 UTC (permalink / raw)
  To: Greg KH
  Cc: Sasha Levin, Marcel Holtmann, torvalds, linux-kernel,
	linux-bluetooth, stable

Thank you, Greg!

I've just noticed the patch landed in the upstream and was going to start stable
backports, but it appeared you've already done this.

So, not only automated mailers are slow :)

Best regards,
Vladis Dronov | Red Hat, Inc. | The Core Kernel | Senior Software Engineer

----- Original Message -----
> From: "Greg KH" <greg@kroah.com>
> To: "Sasha Levin" <sashal@kernel.org>
> Cc: "Marcel Holtmann" <marcel@holtmann.org>, "Vladis Dronov" <vdronov@redhat.com>, torvalds@linux-foundation.org,
> linux-kernel@vger.kernel.org, linux-bluetooth@vger.kernel.org, stable@vger.kernel.org
> Sent: Thursday, August 1, 2019 3:50:44 PM
> Subject: Re: [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations
> 
> On Thu, Aug 01, 2019 at 01:31:31PM +0000, Sasha Levin wrote:
> > Hi,
> > 
> > [This is an automated email]
> > 
> > This commit has been processed because it contains a "Fixes:" tag,
> > fixing commit: .
> > 
> > The bot has tested the following trees: v5.2.4, v5.1.21, v4.19.62,
> > v4.14.134, v4.9.186, v4.4.186.
> > 
> > v5.2.4: Build OK!
> > v5.1.21: Build OK!
> > v4.19.62: Build OK!
> > v4.14.134: Failed to apply! Possible dependencies:
> >     25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
> > 
> > v4.9.186: Failed to apply! Possible dependencies:
> >     25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
> > 
> > v4.4.186: Failed to apply! Possible dependencies:
> >     162f812f23ba ("Bluetooth: hci_uart: Add Marvell support")
> >     25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
> >     395174bb07c1 ("Bluetooth: hci_uart: Add Intel/AG6xx support")
> >     9e69130c4efc ("Bluetooth: hci_uart: Add Nokia Protocol identifier")
> > 
> > 
> > NOTE: The patch will not be queued to stable trees until it is upstream.
> > 
> > How should we proceed with this patch?
> 
> Already fixed up by hand and queued up, your automated email is a bit
> slow :)
> 
> greg k-h
> 

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations
  2019-08-01 13:55     ` Vladis Dronov
@ 2019-08-01 14:06       ` Greg KH
  2019-08-01 14:31         ` Vladis Dronov
  0 siblings, 1 reply; 9+ messages in thread
From: Greg KH @ 2019-08-01 14:06 UTC (permalink / raw)
  To: Vladis Dronov
  Cc: Sasha Levin, Marcel Holtmann, torvalds, linux-kernel,
	linux-bluetooth, stable

On Thu, Aug 01, 2019 at 09:55:55AM -0400, Vladis Dronov wrote:
> Thank you, Greg!
> 
> I've just noticed the patch landed in the upstream and was going to start stable
> backports, but it appeared you've already done this.

Verifying that I got the 4.4.y and 4.9.y and 4.14.y backports done
properly would be good, as I took a guess at them :)

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations
  2019-08-01 14:06       ` Greg KH
@ 2019-08-01 14:31         ` Vladis Dronov
  0 siblings, 0 replies; 9+ messages in thread
From: Vladis Dronov @ 2019-08-01 14:31 UTC (permalink / raw)
  To: Greg KH
  Cc: Sasha Levin, Marcel Holtmann, torvalds, linux-kernel,
	linux-bluetooth, stable

Hello, Greg, all,

I've just double-checked your backports, indeed, they are fine.

Check for operations is not added for protocols which does not
use these operations. Thanks!

Best regards,
Vladis Dronov | Red Hat, Inc. | The Core Kernel | Senior Software Engineer

----- Original Message -----
> From: "Greg KH" <greg@kroah.com>
> To: "Vladis Dronov" <vdronov@redhat.com>
> Cc: "Sasha Levin" <sashal@kernel.org>, "Marcel Holtmann" <marcel@holtmann.org>, torvalds@linux-foundation.org,
> linux-kernel@vger.kernel.org, linux-bluetooth@vger.kernel.org, stable@vger.kernel.org
> Sent: Thursday, August 1, 2019 4:06:39 PM
> Subject: Re: [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations
> 
> On Thu, Aug 01, 2019 at 09:55:55AM -0400, Vladis Dronov wrote:
> > Thank you, Greg!
> > 
> > I've just noticed the patch landed in the upstream and was going to start
> > stable
> > backports, but it appeared you've already done this.
> 
> Verifying that I got the 4.4.y and 4.9.y and 4.14.y backports done
> properly would be good, as I took a guess at them :)
> 
> thanks,
> 
> greg k-h

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations
  2019-08-01 13:50   ` Greg KH
  2019-08-01 13:55     ` Vladis Dronov
@ 2019-08-01 17:16     ` Sasha Levin
  2019-08-01 17:48       ` Greg KH
  1 sibling, 1 reply; 9+ messages in thread
From: Sasha Levin @ 2019-08-01 17:16 UTC (permalink / raw)
  To: Greg KH
  Cc: Marcel Holtmann, Vladis Dronov, torvalds, linux-kernel,
	linux-bluetooth, stable

On Thu, Aug 01, 2019 at 03:50:44PM +0200, Greg KH wrote:
>On Thu, Aug 01, 2019 at 01:31:31PM +0000, Sasha Levin wrote:
>> Hi,
>>
>> [This is an automated email]
>>
>> This commit has been processed because it contains a "Fixes:" tag,
>> fixing commit: .
>>
>> The bot has tested the following trees: v5.2.4, v5.1.21, v4.19.62, v4.14.134, v4.9.186, v4.4.186.
>>
>> v5.2.4: Build OK!
>> v5.1.21: Build OK!
>> v4.19.62: Build OK!
>> v4.14.134: Failed to apply! Possible dependencies:
>>     25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
>>
>> v4.9.186: Failed to apply! Possible dependencies:
>>     25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
>>
>> v4.4.186: Failed to apply! Possible dependencies:
>>     162f812f23ba ("Bluetooth: hci_uart: Add Marvell support")
>>     25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
>>     395174bb07c1 ("Bluetooth: hci_uart: Add Intel/AG6xx support")
>>     9e69130c4efc ("Bluetooth: hci_uart: Add Nokia Protocol identifier")
>>
>>
>> NOTE: The patch will not be queued to stable trees until it is upstream.
>>
>> How should we proceed with this patch?
>
>Already fixed up by hand and queued up, your automated email is a bit
>slow :)

/me scratches head

The patch went out two days ago:
https://lore.kernel.org/lkml/20190730093345.25573-1-marcel@holtmann.org/

How did it make it upstream already?

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations
  2019-08-01 17:16     ` Sasha Levin
@ 2019-08-01 17:48       ` Greg KH
  0 siblings, 0 replies; 9+ messages in thread
From: Greg KH @ 2019-08-01 17:48 UTC (permalink / raw)
  To: Sasha Levin
  Cc: Marcel Holtmann, Vladis Dronov, torvalds, linux-kernel,
	linux-bluetooth, stable

On Thu, Aug 01, 2019 at 01:16:39PM -0400, Sasha Levin wrote:
> On Thu, Aug 01, 2019 at 03:50:44PM +0200, Greg KH wrote:
> > On Thu, Aug 01, 2019 at 01:31:31PM +0000, Sasha Levin wrote:
> > > Hi,
> > > 
> > > [This is an automated email]
> > > 
> > > This commit has been processed because it contains a "Fixes:" tag,
> > > fixing commit: .
> > > 
> > > The bot has tested the following trees: v5.2.4, v5.1.21, v4.19.62, v4.14.134, v4.9.186, v4.4.186.
> > > 
> > > v5.2.4: Build OK!
> > > v5.1.21: Build OK!
> > > v4.19.62: Build OK!
> > > v4.14.134: Failed to apply! Possible dependencies:
> > >     25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
> > > 
> > > v4.9.186: Failed to apply! Possible dependencies:
> > >     25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
> > > 
> > > v4.4.186: Failed to apply! Possible dependencies:
> > >     162f812f23ba ("Bluetooth: hci_uart: Add Marvell support")
> > >     25a13e382de2 ("bluetooth: hci_qca: Replace GFP_ATOMIC with GFP_KERNEL")
> > >     395174bb07c1 ("Bluetooth: hci_uart: Add Intel/AG6xx support")
> > >     9e69130c4efc ("Bluetooth: hci_uart: Add Nokia Protocol identifier")
> > > 
> > > 
> > > NOTE: The patch will not be queued to stable trees until it is upstream.
> > > 
> > > How should we proceed with this patch?
> > 
> > Already fixed up by hand and queued up, your automated email is a bit
> > slow :)
> 
> /me scratches head
> 
> The patch went out two days ago:
> https://lore.kernel.org/lkml/20190730093345.25573-1-marcel@holtmann.org/
> 
> How did it make it upstream already?

It's in Linus's tree as b36a1552d731 ("Bluetooth: hci_uart: check for
missing tty operations") now.

thanks,

greg k-h

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2019-08-01 17:49 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-07-30  9:33 [PATCH v5.3-rc2] Bluetooth: hci_uart: check for missing tty operations Marcel Holtmann
2019-07-31  2:45 ` Al Cho
2019-08-01 13:31 ` Sasha Levin
2019-08-01 13:50   ` Greg KH
2019-08-01 13:55     ` Vladis Dronov
2019-08-01 14:06       ` Greg KH
2019-08-01 14:31         ` Vladis Dronov
2019-08-01 17:16     ` Sasha Levin
2019-08-01 17:48       ` Greg KH

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).