Linux Hardware Monitor development
 help / color / mirror / Atom feed
From: sashiko-bot@kernel.org
To: "Wilken Gottwalt" <wilken.gottwalt@posteo.net>
Cc: linux-hwmon@vger.kernel.org
Subject: Re: [PATCH] hwmon: corsair-psu: fix and readd locking of command buffer
Date: Thu, 14 May 2026 05:45:03 +0000	[thread overview]
Message-ID: <20260514054503.A1F72C2BCB7@smtp.kernel.org> (raw)
In-Reply-To: <agR9YW7hGTJ_l7ms@monster.localdomain>

Thank you for your contribution! Sashiko AI review found 3 potential issue(s) to consider:
- [High] The driver unsafely shares a single buffer (`priv->cmd_buffer`) for both transmitting commands and receiving asynchronous HID events, leading to a critical data race.
- [Medium] The patch introduces a custom mutex instead of using the hwmon subsystem's mandated locking API, violating subsystem guidelines and creating redundant locking.
- [Low] The newly introduced mutex is initialized but never destroyed, potentially leaking lockdep tracking state on module removal.
--

commit e6fd3791fd5a9cb958361af0e5c07256d1d52355
Author: Wilken Gottwalt <wilken.gottwalt@posteo.net>

hwmon: corsair-psu: fix and readd locking of command buffer

This commit re-adds a locking mechanism to protect chained commands from
parallel access by hwmon and debugfs subsystems. It introduces a custom
mutex in the corsairpsu_data structure to serialize these operations.

> diff --git a/drivers/hwmon/corsair-psu.c b/drivers/hwmon/corsair-psu.c
> index dddbd2463f8da..f1e59a8debb8f 100644
> --- a/drivers/hwmon/corsair-psu.c
> +++ b/drivers/hwmon/corsair-psu.c
[ ... ]
> @@ -122,6 +123,7 @@ struct corsairpsu_data {
>  	struct device *hwmon_dev;
>  	struct dentry *debugfs;
>  	struct completion wait_completion;
> +	struct mutex lock; /* serializes chained commands and parallel debugfs/hwmon access */
>  	u8 *cmd_buffer;

This isn't a bug introduced by this patch, but could sharing a single
cmd_buffer for both transmitting and receiving cause a data race?

If a delayed reply from a previous command arrives right after
reinit_completion() in corsairpsu_usb_cmd(), the async event handler might
overwrite cmd_buffer. Because hid_hw_output_report() executes right after
reinit_completion(), could this result in transmitting a corrupted buffer
to the hardware?

>  	char vendor[REPLY_SIZE];
>  	char product[REPLY_SIZE];
[ ... ]
> @@ -217,6 +221,7 @@ static int corsairpsu_request(struct corsairpsu_data *priv, u8 cmd, u8 rail, voi
>  {
>  	int ret;
>  
> +	mutex_lock(&priv->lock);
>  	switch (cmd) {
>  	case PSU_CMD_RAIL_VOLTS_HCRIT:
>  	case PSU_CMD_RAIL_VOLTS_LCRIT:

The hwmon subsystem guidelines state that drivers should use hwmon_lock() and
hwmon_unlock() to implement locking required for interrupt handling or for
attributes registered by other means.

Should this use the subsystem-provided hwmon_lock(priv->hwmon_dev) instead
of introducing a custom mutex to protect against concurrent debugfs access?

[ ... ]
> @@ -789,6 +798,7 @@ static int corsairpsu_probe(struct hid_device *hdev, const struct hid_device_id
>  
>  	priv->hdev = hdev;
>  	hid_set_drvdata(hdev, priv);
> +	mutex_init(&priv->lock);
>  	init_completion(&priv->wait_completion);
>  
>  	hid_device_io_start(hdev);

If the custom mutex is kept, could initializing it with mutex_init() leak
lockdep tracking state when the module is removed?

Since the device data is allocated with devm_kzalloc(), would it be safer
to use devm_mutex_init() to ensure the lock is properly destroyed during
cleanup?

-- 
Sashiko AI review · https://sashiko.dev/#/patchset/agR9YW7hGTJ_l7ms@monster.localdomain?part=1

      parent reply	other threads:[~2026-05-14  5:45 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-05-13 13:32 [PATCH] hwmon: corsair-psu: fix and readd locking of command buffer Wilken Gottwalt
2026-05-13 13:43 ` Guenter Roeck
2026-05-13 14:05   ` Guenter Roeck
2026-05-13 14:21     ` Wilken Gottwalt
2026-05-13 14:58       ` Guenter Roeck
2026-05-13 15:53         ` Wilken Gottwalt
2026-05-13 16:42           ` Guenter Roeck
2026-05-13 17:50             ` Wilken Gottwalt
2026-05-13 18:10               ` Guenter Roeck
2026-05-14  6:12                 ` Wilken Gottwalt
2026-05-13 18:16               ` Guenter Roeck
2026-05-14  5:45 ` sashiko-bot [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260514054503.A1F72C2BCB7@smtp.kernel.org \
    --to=sashiko-bot@kernel.org \
    --cc=linux-hwmon@vger.kernel.org \
    --cc=sashiko-reviews@lists.linux.dev \
    --cc=wilken.gottwalt@posteo.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox