Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1060777ybl; Wed, 14 Aug 2019 10:05:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqwtbZ/3CVDAAvmxPf8rIZiWQNVs3ucinLlxMRdYYG5NhvkDqejQDeah0PC9HmULO/A38PdE X-Received: by 2002:a17:902:a01:: with SMTP id 1mr410625plo.278.1565802320535; Wed, 14 Aug 2019 10:05:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565802320; cv=none; d=google.com; s=arc-20160816; b=voj2HKq3EohCxQoH9CmGi/uSbkm7PELYF69ujI9UfjeExfZDInRrCRBajdinZ2/vlg sdzyYhLnXTSeP5FoRtoL7M9GctipbZnsnbDDRS6aZBoKK4UTRE4qO9y7DWc1TOpiA8S4 3Bj7Hbk+cGQGccCDBq4WAXS8CAH0jApscndjKpCXuATASt4fyA3k6N32tmHU0MW+bajD yhE3emFI7kUbBUfe3/XSHyjcb1SQkYw5tP6bfQd2B/SOPqWYzDNB4zdL61FFkBTeXOXd VjOw+3wixLVXTaxi9LsQgwKWE3O8yk43f/9YdFc3fLQA3H2MhXV/YTfExb+UUaUda3g2 Ndqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=2gs1+mkR5pjCXISHtm7Fi8xPZJ8dPcesiva5i37bAjg=; b=X8VnnoWq6XnPXfW/ByG/upxVqN7hAbL8jMA50abkTqoNZwudvTC1ltanx4tlx6NzV8 K03eMW8dokntIcNGjb6JQACYRqFkRY45qwk/54kj44uWRjcTyx5uzpT1rySnlOkgPFaq 9TCNKuSV/cgTlOLgukHeempGdjTBLKdVJJhBlM/JJ7KFRyak4j9sqXjhgVqiAitE7733 GX+yC6H4V8Pc4gAYk0YMcjB5M65gY8GZbSZ7v4q58O7LdLYm9e3sk3IcIoEqKJfa/S9y hq33IfR7tkbLhXLBRJJbb1G4W/f7NTaQyfdamOyKLzUcMvnngR30RGKiiNE/r5WswuMB zTLg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QnkSVxqu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id gn5si245764plb.170.2019.08.14.10.05.04; Wed, 14 Aug 2019 10:05:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QnkSVxqu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729029AbfHNRDr (ORCPT + 99 others); Wed, 14 Aug 2019 13:03:47 -0400 Received: from mail.kernel.org ([198.145.29.99]:52452 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729013AbfHNRDp (ORCPT ); Wed, 14 Aug 2019 13:03:45 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AD68F214DA; Wed, 14 Aug 2019 17:03:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565802225; bh=pw2S9biRZW0NJD5hbga/Us6myqSwih6fQg6FdYbZjzw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QnkSVxquOyOUPuGA2onRwB5N4VA+02FU6HY9TRjFEG1G7F9i+QGST9sfQK9HJUQkX ZruFYJ+8fUtcR+Ini7zdodNqRPMQlAC1p4vZoquwu7uTa3nTCD97I+oeF962v4yW6P RcbVLwUAgO/vYLKS4ZxKCTth5bDbe0zLWSNUruNE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Douglas Gilbert , Guenter Roeck , Jun Li , Heikki Krogerus Subject: [PATCH 5.2 043/144] usb: typec: tcpm: Add NULL check before dereferencing config Date: Wed, 14 Aug 2019 18:59:59 +0200 Message-Id: <20190814165801.631613102@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190814165759.466811854@linuxfoundation.org> References: <20190814165759.466811854@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Guenter Roeck commit 1957de95d425d1c06560069dc7277a73a8b28683 upstream. When instantiating tcpm on an NXP OM 13588 board with NXP PTN5110, the following crash is seen when writing into the 'preferred_role' sysfs attribute. Unable to handle kernel NULL pointer dereference at virtual address 00000028 pgd = f69149ad [00000028] *pgd=00000000 Internal error: Oops: 5 [#1] THUMB2 Modules linked in: tcpci tcpm CPU: 0 PID: 1882 Comm: bash Not tainted 5.1.18-sama5-armv7-r2 #4 Hardware name: Atmel SAMA5 PC is at tcpm_try_role+0x3a/0x4c [tcpm] LR is at tcpm_try_role+0x15/0x4c [tcpm] pc : [] lr : [] psr: 60030033 sp : dc1a1e88 ip : c03fb47d fp : 00000000 r10: dc216190 r9 : dc1a1f78 r8 : 00000001 r7 : df4ae044 r6 : dd032e90 r5 : dd1ce340 r4 : df4ae054 r3 : 00000000 r2 : 00000000 r1 : 00000000 r0 : df4ae044 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA Thumb Segment none Control: 50c53c7d Table: 3efec059 DAC: 00000051 Process bash (pid: 1882, stack limit = 0x6a6d4aa5) Stack: (0xdc1a1e88 to 0xdc1a2000) 1e80: dd05d808 dd1ce340 00000001 00000007 dd1ce340 c03fb4a7 1ea0: 00000007 00000007 dc216180 00000000 00000000 c01e1e03 00000000 00000000 1ec0: c0907008 dee98b40 c01e1d5d c06106c4 00000000 00000000 00000007 c0194e8b 1ee0: 0000000a 00000400 00000000 c01a97db dc22bf00 ffffe000 df4b6a00 df745900 1f00: 00000001 00000001 000000dd c01a9c2f 7aeab3be c0907008 00000000 dc22bf00 1f20: c0907008 00000000 00000000 00000000 00000000 7aeab3be 00000007 dee98b40 1f40: 005dc318 dc1a1f78 00000000 00000000 00000007 c01969f7 0000000a c01a20cb 1f60: dee98b40 c0907008 dee98b40 005dc318 00000000 c0196b9b 00000000 00000000 1f80: dee98b40 7aeab3be 00000074 005dc318 b6f3bdb0 00000004 c0101224 dc1a0000 1fa0: 00000004 c0101001 00000074 005dc318 00000001 005dc318 00000007 00000000 1fc0: 00000074 005dc318 b6f3bdb0 00000004 00000007 00000007 00000000 00000000 1fe0: 00000004 be800880 b6ed35b3 b6e5c746 60030030 00000001 00000000 00000000 [] (tcpm_try_role [tcpm]) from [] (preferred_role_store+0x2b/0x5c) [] (preferred_role_store) from [] (kernfs_fop_write+0xa7/0x150) [] (kernfs_fop_write) from [] (__vfs_write+0x1f/0x104) [] (__vfs_write) from [] (vfs_write+0x6b/0x104) [] (vfs_write) from [] (ksys_write+0x43/0x94) [] (ksys_write) from [] (ret_fast_syscall+0x1/0x62) Since commit 96232cbc6c994 ("usb: typec: tcpm: support get typec and pd config from device properties"), the 'config' pointer in struct tcpc_dev is optional when registering a Type-C port. Since it is optional, we have to check if it is NULL before dereferencing it. Reported-by: Douglas Gilbert Cc: Douglas Gilbert Fixes: 96232cbc6c994 ("usb: typec: tcpm: support get typec and pd config from device properties") Signed-off-by: Guenter Roeck Cc: stable Reviewed-by: Jun Li Reviewed-by: Heikki Krogerus Link: https://lore.kernel.org/r/1563979112-22483-1-git-send-email-linux@roeck-us.net Signed-off-by: Greg Kroah-Hartman --- drivers/usb/typec/tcpm/tcpm.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) --- a/drivers/usb/typec/tcpm/tcpm.c +++ b/drivers/usb/typec/tcpm/tcpm.c @@ -379,7 +379,8 @@ static enum tcpm_state tcpm_default_stat return SNK_UNATTACHED; else if (port->try_role == TYPEC_SOURCE) return SRC_UNATTACHED; - else if (port->tcpc->config->default_role == TYPEC_SINK) + else if (port->tcpc->config && + port->tcpc->config->default_role == TYPEC_SINK) return SNK_UNATTACHED; /* Fall through to return SRC_UNATTACHED */ } else if (port->port_type == TYPEC_PORT_SNK) { @@ -4127,7 +4128,7 @@ static int tcpm_try_role(const struct ty mutex_lock(&port->lock); if (tcpc->try_role) ret = tcpc->try_role(tcpc, role); - if (!ret && !tcpc->config->try_role_hw) + if (!ret && (!tcpc->config || !tcpc->config->try_role_hw)) port->try_role = role; port->try_src_count = 0; port->try_snk_count = 0; @@ -4714,7 +4715,7 @@ static int tcpm_copy_caps(struct tcpm_po port->typec_caps.prefer_role = tcfg->default_role; port->typec_caps.type = tcfg->type; port->typec_caps.data = tcfg->data; - port->self_powered = port->tcpc->config->self_powered; + port->self_powered = tcfg->self_powered; return 0; }