* [PATCH] w1: fix NULL pointer dereference in probe
@ 2025-01-11 18:18 Chenyuan Yang
2025-01-18 13:15 ` Christoph Winklhofer
2025-02-03 11:54 ` Krzysztof Kozlowski
0 siblings, 2 replies; 3+ messages in thread
From: Chenyuan Yang @ 2025-01-11 18:18 UTC (permalink / raw)
To: krzk, cj.winklhofer; +Cc: linux-kernel, zijie98, Chenyuan Yang
The w1_uart_probe() function calls w1_uart_serdev_open() (which includes
devm_serdev_device_open()) before setting the client ops via
serdev_device_set_client_ops(). This ordering can trigger a NULL pointer
dereference in the serdev controller's receive_buf handler, as it assumes
serdev->ops is valid when SERPORT_ACTIVE is set.
This is similar to the issue fixed in commit 5e700b384ec1
("platform/chrome: cros_ec_uart: properly fix race condition") where
devm_serdev_device_open() was called before fully initializing the
device.
Fix the race by ensuring client ops are set before enabling the port via
w1_uart_serdev_open().
Fixes: a3c08804364e ("w1: add UART w1 bus driver")
Signed-off-by: Chenyuan Yang <chenyuan0y@gmail.com>
---
drivers/w1/masters/w1-uart.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/w1/masters/w1-uart.c b/drivers/w1/masters/w1-uart.c
index a31782e56ba7..c87eea347806 100644
--- a/drivers/w1/masters/w1-uart.c
+++ b/drivers/w1/masters/w1-uart.c
@@ -372,11 +372,11 @@ static int w1_uart_probe(struct serdev_device *serdev)
init_completion(&w1dev->rx_byte_received);
mutex_init(&w1dev->rx_mutex);
+ serdev_device_set_drvdata(serdev, w1dev);
+ serdev_device_set_client_ops(serdev, &w1_uart_serdev_ops);
ret = w1_uart_serdev_open(w1dev);
if (ret < 0)
return ret;
- serdev_device_set_drvdata(serdev, w1dev);
- serdev_device_set_client_ops(serdev, &w1_uart_serdev_ops);
return w1_add_master_device(&w1dev->bus);
}
--
2.34.1
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [PATCH] w1: fix NULL pointer dereference in probe
2025-01-11 18:18 [PATCH] w1: fix NULL pointer dereference in probe Chenyuan Yang
@ 2025-01-18 13:15 ` Christoph Winklhofer
2025-02-03 11:54 ` Krzysztof Kozlowski
1 sibling, 0 replies; 3+ messages in thread
From: Christoph Winklhofer @ 2025-01-18 13:15 UTC (permalink / raw)
To: Chenyuan Yang; +Cc: krzk, linux-kernel, zijie98
On Sat, Jan 11, 2025 at 12:18:03PM -0600, Chenyuan Yang wrote:
> The w1_uart_probe() function calls w1_uart_serdev_open() (which includes
> devm_serdev_device_open()) before setting the client ops via
> serdev_device_set_client_ops(). This ordering can trigger a NULL pointer
> dereference in the serdev controller's receive_buf handler, as it assumes
> serdev->ops is valid when SERPORT_ACTIVE is set.
>
> This is similar to the issue fixed in commit 5e700b384ec1
> ("platform/chrome: cros_ec_uart: properly fix race condition") where
> devm_serdev_device_open() was called before fully initializing the
> device.
>
> Fix the race by ensuring client ops are set before enabling the port via
> w1_uart_serdev_open().
>
> Fixes: a3c08804364e ("w1: add UART w1 bus driver")
> Signed-off-by: Chenyuan Yang <chenyuan0y@gmail.com>
> ---
> drivers/w1/masters/w1-uart.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
Acked-by: Christoph Winklhofer <cj.winklhofer@gmail.com>
Thanks for the fix!
I tested it with a Raspberry PI and DS18B20 sensor.
Best,
Christoph
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCH] w1: fix NULL pointer dereference in probe
2025-01-11 18:18 [PATCH] w1: fix NULL pointer dereference in probe Chenyuan Yang
2025-01-18 13:15 ` Christoph Winklhofer
@ 2025-02-03 11:54 ` Krzysztof Kozlowski
1 sibling, 0 replies; 3+ messages in thread
From: Krzysztof Kozlowski @ 2025-02-03 11:54 UTC (permalink / raw)
To: krzk, cj.winklhofer, Chenyuan Yang; +Cc: linux-kernel, zijie98
On Sat, 11 Jan 2025 12:18:03 -0600, Chenyuan Yang wrote:
> The w1_uart_probe() function calls w1_uart_serdev_open() (which includes
> devm_serdev_device_open()) before setting the client ops via
> serdev_device_set_client_ops(). This ordering can trigger a NULL pointer
> dereference in the serdev controller's receive_buf handler, as it assumes
> serdev->ops is valid when SERPORT_ACTIVE is set.
>
> This is similar to the issue fixed in commit 5e700b384ec1
> ("platform/chrome: cros_ec_uart: properly fix race condition") where
> devm_serdev_device_open() was called before fully initializing the
> device.
>
> [...]
Applied, thanks!
[1/1] w1: fix NULL pointer dereference in probe
https://git.kernel.org/krzk/linux-w1/c/0dd6770a72f138dabea9eae87f3da6ffa68f0d06
Best regards,
--
Krzysztof Kozlowski <krzysztof.kozlowski@linaro.org>
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2025-02-03 11:54 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-01-11 18:18 [PATCH] w1: fix NULL pointer dereference in probe Chenyuan Yang
2025-01-18 13:15 ` Christoph Winklhofer
2025-02-03 11:54 ` Krzysztof Kozlowski
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox