From patchwork Wed Mar 26 12:30:46 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Manjunatha Venkatesh X-Patchwork-Id: 14033397 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 43AD6C36016 for ; Mon, 31 Mar 2025 10:04:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=vV6wIIaxziLktAOX0YpP7tjHphKb7Rs/CKtUTbucf4g=; b=MzYabd6+5ngivA rZEAmzfGDGM1aVWmCB6G1nhjObOodHVIKIopVOUQVG2o3maHjjcn4cHoKdGAfdjYoX7rGGoWI7W4Z /YkrGduJlWcqnI5Pj/4iDPQO5X8inMRVNcBx83V0A1VDssOab7gKtLOgp8Z00E/nUxM8caISXB0Nu N8SvD1ekz7XSMbrsGieZecW24Sc1wh21qoyAnA9ZZ7XDXp9iUg7l3Gd5vKo2IkARkJKRt316L3ctk 7eZrEyrnBbssjgg6zXTDpppHW51qK9wxUepUqR3NCNNYVbnfjGOley8rVYP7TMCP3iBly3ft5Qmdh 77k6We1l25tadd5veHeA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98.1 #2 (Red Hat Linux)) id 1tzC0E-0000000Hb2V-086U; Mon, 31 Mar 2025 10:04:22 +0000 Received: from inva021.nxp.com ([92.121.34.21]) by bombadil.infradead.org with esmtps (Exim 4.98.1 #2 (Red Hat Linux)) id 1txPuN-00000008SZt-3yci for linux-i3c@lists.infradead.org; Wed, 26 Mar 2025 12:31:01 +0000 Received: from inva021.nxp.com (localhost [127.0.0.1]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id 613AF2022B6; Wed, 26 Mar 2025 13:30:56 +0100 (CET) Received: from aprdc01srsp001v.ap-rdc01.nxp.com (aprdc01srsp001v.ap-rdc01.nxp.com [165.114.16.16]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id 21774202163; Wed, 26 Mar 2025 13:30:56 +0100 (CET) Received: from lsv03121.swis.in-blr01.nxp.com (lsv03121.swis.in-blr01.nxp.com [92.120.146.118]) by aprdc01srsp001v.ap-rdc01.nxp.com (Postfix) with ESMTP id C472B1800092; Wed, 26 Mar 2025 20:30:54 +0800 (+08) From: Manjunatha Venkatesh To: alexandre.belloni@bootlin.com, arnd@arndb.de, gregkh@linuxfoundation.org, bbrezillon@kernel.org, linux-i3c@lists.infradead.org, linux-kernel@vger.kernel.org, frank.li@nxp.com Cc: rvmanjumce@gmail.com, Manjunatha Venkatesh , stable@vger.kernel.org Subject: [PATCH v6] i3c: Add NULL pointer check in i3c_master_queue_ibi() Date: Wed, 26 Mar 2025 18:00:46 +0530 Message-ID: <20250326123047.2797946-1-manjunatha.venkatesh@nxp.com> X-Mailer: git-send-email 2.46.1 MIME-Version: 1.0 X-Virus-Scanned: ClamAV using ClamSMTP X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20250326_053100_117114_13871AAA X-CRM114-Status: UNSURE ( 9.79 ) X-CRM114-Notice: Please train this message. X-Mailman-Approved-At: Mon, 31 Mar 2025 02:45:26 -0700 X-BeenThere: linux-i3c@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-i3c" Errors-To: linux-i3c-bounces+linux-i3c=archiver.kernel.org@lists.infradead.org The I3C master driver may receive an IBI from a target device that has not been probed yet. In such cases, the master calls `i3c_master_queue_ibi()` to queue an IBI work task, leading to "Unable to handle kernel read from unreadable memory" and resulting in a kernel panic. Typical IBI handling flow: 1. The I3C master scans target devices and probes their respective drivers. 2. The target device driver calls `i3c_device_request_ibi()` to enable IBI and assigns `dev->ibi = ibi`. 3. The I3C master receives an IBI from the target device and calls `i3c_master_queue_ibi()` to queue the target device driver’s IBI handler task. However, since target device events are asynchronous to the I3C probe sequence, step 3 may occur before step 2, causing `dev->ibi` to be `NULL`, leading to a kernel panic. Add a NULL pointer check in `i3c_master_queue_ibi()` to prevent accessing an uninitialized `dev->ibi`, ensuring stability. Fixes: 3a379bbcea0af ("i3c: Add core I3C infrastructure") Cc: stable@vger.kernel.org Link: https://lore.kernel.org/lkml/Z9gjGYudiYyl3bSe@lizhi-Precision-Tower-5810/ Signed-off-by: Manjunatha Venkatesh --- Changes since v5: - Updated subject and commit message with some more information. drivers/i3c/master.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/i3c/master.c b/drivers/i3c/master.c index d5dc4180afbc..c65006aa0684 100644 --- a/drivers/i3c/master.c +++ b/drivers/i3c/master.c @@ -2561,6 +2561,9 @@ static void i3c_master_unregister_i3c_devs(struct i3c_master_controller *master) */ void i3c_master_queue_ibi(struct i3c_dev_desc *dev, struct i3c_ibi_slot *slot) { + if (!dev->ibi || !slot) + return; + atomic_inc(&dev->ibi->pending_ibis); queue_work(dev->ibi->wq, &slot->work); }