Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp120074pxb; Fri, 17 Sep 2021 20:57:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzzupt4FeyY4hadYi5o+OS/tNXOkepXe5+aIRuRgR/m0iPgAOJZdiO0uDAu1nW+kvkO816W X-Received: by 2002:a05:6e02:12a1:: with SMTP id f1mr10274706ilr.293.1631937446220; Fri, 17 Sep 2021 20:57:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631937446; cv=none; d=google.com; s=arc-20160816; b=if0usO5etdEDndgocTF0NWMv6UCwGE68dXnVJqRG0+MyiZwmUuAzkv9OHEG9KgZZr4 2bdGsULZGzab2whFAInnrGBoYz353KYG9e+C8/0WM+ewosoYVYlaVqbJeGSDklutkYVk ijg4CEwAMLXjaaaSFtZE0B3Kl28ROQbmR9a8aQUUWBpDx7n/ltHH99poAaZobNrAwtzC x+yGRFZLRXuiBu3eNTsH2n0DjJDZl2Hw7xEngx1kTieoG8F+v6YiZWmKa2yn80AmAwjb w3E3wyjVMMxcznqz/NRohFb2pQX8/m5mS5AYyM3W6K4IkxHytgNLSTKWxT7S+KNYbBfi WNZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dmarc-filter:sender:dkim-signature; bh=3uMedPcUv077Mf9fMSfbmEjiZrh/j5ykEvM/UU/MKD4=; b=ahLUH6V0Lu0+jcY4NK63L1GoXxbrE+ERJv7x5Py9ZsaP6hUoazM7qoqJ4tzOPH8F9y 4GFSQljhpxY+EvATt1yATZX8P7IuJNc5stv2smINl6kCWs8wWCKVrEr1kE2c+TZ39h1/ Zg95oUESYfMDSL8ehSsd6hBqzRkfAAjrdyePIix6unknT3mh2hjdhRDNCLJceDnxEArz yReRWWdHx23p8mrC28JIqDzhMuGQeI7827VCxFRKhLP7qrInU/aLO0SG0tpd7CH5L7oA EqYayBgCw1NoMpCmSR/1qpLryqHMzULVLXHKHdHy7z0oP+86ghRI5lkh9a659J1Py4YE r6xw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b=vpxfZvd0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d16si8015888ile.11.2021.09.17.20.57.14; Fri, 17 Sep 2021 20:57:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b=vpxfZvd0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244011AbhIQUIQ (ORCPT + 99 others); Fri, 17 Sep 2021 16:08:16 -0400 Received: from so254-9.mailgun.net ([198.61.254.9]:42236 "EHLO so254-9.mailgun.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244253AbhIQUIO (ORCPT ); Fri, 17 Sep 2021 16:08:14 -0400 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1631909210; h=Content-Transfer-Encoding: Content-Type: In-Reply-To: MIME-Version: Date: Message-ID: From: References: Cc: To: Subject: Sender; bh=3uMedPcUv077Mf9fMSfbmEjiZrh/j5ykEvM/UU/MKD4=; b=vpxfZvd0SkRNOdGTZGtaENfTg5clok8lvUIg19s9ErVFXnoiXAe9Z9wsZY0LIrgbIPLotpw/ two8zUhTvKPgpgPE6AQ/23RFRKHiTsz384K2Z46FvUquUIhF6j42YGf+VhFXZVN31GoY9K8I E08DHjgH40ckgdt1kzSVAAWk8Dk= X-Mailgun-Sending-Ip: 198.61.254.9 X-Mailgun-Sid: WyI0MWYwYSIsICJsaW51eC1rZXJuZWxAdmdlci5rZXJuZWwub3JnIiwgImJlOWU0YSJd Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by smtp-out-n06.prod.us-west-2.postgun.com with SMTP id 6144f550b585cc7d241a448f (version=TLS1.2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); Fri, 17 Sep 2021 20:06:40 GMT Sender: quic_subbaram=quicinc.com@mg.codeaurora.org Received: by smtp.codeaurora.org (Postfix, from userid 1001) id 55C94C43460; Fri, 17 Sep 2021 20:06:40 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.4 required=2.0 tests=ALL_TRUSTED,BAYES_00, NICE_REPLY_A,SPF_FAIL,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from [10.47.233.232] (Global_NAT1.qualcomm.com [129.46.96.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: subbaram) by smtp.codeaurora.org (Postfix) with ESMTPSA id 91329C4338F; Fri, 17 Sep 2021 20:06:38 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 smtp.codeaurora.org 91329C4338F Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; dmarc=fail (p=none dis=none) header.from=quicinc.com Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; spf=fail smtp.mailfrom=quicinc.com Subject: Re: [PATCH v2] thermal: Fix a NULL pointer dereference To: Daniel Lezcano , Zhang Rui , Amit Kucheria Cc: linux-pm@vger.kernel.org, linux-kernel@vger.kernel.org, David Collins , Manaf Meethalavalappu Pallikunhi , Ram Chandrasekar , stable@vger.kernel.org References: <1631041289-11804-1-git-send-email-quic_subbaram@quicinc.com> <55999619-22c7-63fd-7006-f91f144e4a60@linaro.org> From: Subbaraman Narayanamurthy Message-ID: <7930989e-baf1-04f4-59ad-d65122149b9b@quicinc.com> Date: Fri, 17 Sep 2021 13:06:38 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <55999619-22c7-63fd-7006-f91f144e4a60@linaro.org> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/17/21 2:31 AM, Daniel Lezcano wrote: > On 07/09/2021 21:01, Subbaraman Narayanamurthy wrote: >> of_parse_thermal_zones() parses the thermal-zones node and registers a >> thermal_zone device for each subnode. However, if a thermal zone is >> consuming a thermal sensor and that thermal sensor device hasn't probed >> yet, an attempt to set trip_point_*_temp for that thermal zone device >> can cause a NULL pointer dereference. Fix it. >> >> console:/sys/class/thermal/thermal_zone87 # echo 120000 > trip_point_0_temp >> ... >> Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020 >> ... >> Call trace: >> of_thermal_set_trip_temp+0x40/0xc4 >> trip_point_temp_store+0xc0/0x1dc >> dev_attr_store+0x38/0x88 >> sysfs_kf_write+0x64/0xc0 >> kernfs_fop_write_iter+0x108/0x1d0 >> vfs_write+0x2f4/0x368 >> ksys_write+0x7c/0xec >> __arm64_sys_write+0x20/0x30 >> el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc >> do_el0_svc+0x28/0xa0 >> el0_svc+0x14/0x24 >> el0_sync_handler+0x88/0xec >> el0_sync+0x1c0/0x200 >> >> While at it, fix the possible NULL pointer dereference in other >> functions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(), >> of_thermal_get_trend(). >> >> Cc: stable@vger.kernel.org >> Suggested-by: David Collins >> Signed-off-by: Subbaraman Narayanamurthy >> --- >> Changes for v2: >> - Added checks in of_thermal_get_temp(), of_thermal_set_emul_temp(), of_thermal_get_trend(). >> >> drivers/thermal/thermal_of.c | 9 ++++++--- >> 1 file changed, 6 insertions(+), 3 deletions(-) >> >> diff --git a/drivers/thermal/thermal_of.c b/drivers/thermal/thermal_of.c >> index 6379f26..9233f7e 100644 >> --- a/drivers/thermal/thermal_of.c >> +++ b/drivers/thermal/thermal_of.c >> @@ -89,7 +89,7 @@ static int of_thermal_get_temp(struct thermal_zone_device *tz, >> { >> struct __thermal_zone *data = tz->devdata; >> >> - if (!data->ops->get_temp) >> + if (!data->ops || !data->ops->get_temp) > comment (1) > > AFAICT, if data->ops != NULL then data->ops->get_temp is also != NULL > because of the code allocating/freeing the ops structure. > > The tests can be replaced by (!data->ops), no ? Thanks Daniel for reviewing the patch. I agree that even if a sensor module is unregistered, that would call "thermal_zone_of_sensor_unregister" which would eventually set NULL on get_temp() and get_trend() and "tzd->ops" as well. However, of_thermal_get_temp() is trying to call "data->ops->get_temp" which comes from a sensor driver when it registers. There is no guarantee that it would be non-NULL right? Thinking of which, I think having both checks would be valid. > >> return -EINVAL; >> >> return data->ops->get_temp(data->sensor_data, temp); >> @@ -186,6 +186,9 @@ static int of_thermal_set_emul_temp(struct thermal_zone_device *tz, >> { >> struct __thermal_zone *data = tz->devdata; >> >> + if (!data->ops || !data->ops->set_emul_temp) >> + return -EINVAL; >> + > comment (2) > > The test looks pointless here (I mean both of them). > > If of_thermal_set_emul_temp() is called it is because the callback was > set in thermal_zone_of_add_sensor(). > > This one does: > > tz->ops = ops; > > and > if (ops->set_emul_temp) > tzd->ops->set_emul_temp = of_thermal_set_emul_temp; > > If I'm not wrong if we are called, then data->ops && > data->ops->set_emul_temp is always true, right ? > I've not exercised this condition yet. However, the original problem we've observed was when thermal HAL was trying to set trip thresholds on a thermal zone device for which the sensor device is not probed yet. This had happened randomly because of vendor modules taking time to be loaded and probed. I don't know if there would be any userspace entity that can try to set emulated temperature for a thermal zone even before a sensor device is probed. Without a sensor driver probed, "tz->ops" would not have a valid pointer right? So, I think checking for "data->ops" should be good. Another possibility is, a sensor might not have "set_emul_temp" callback. So checking for "ops->set_emul_temp" should be still valid. >> return data->ops->set_emul_temp(data->sensor_data, temp); >> } >> >> @@ -194,7 +197,7 @@ static int of_thermal_get_trend(struct thermal_zone_device *tz, int trip, >> { >> struct __thermal_zone *data = tz->devdata; >> >> - if (!data->ops->get_trend) >> + if (!data->ops || !data->ops->get_trend) >> return -EINVAL; > Same comment as (1) of_thermal_get_trend() is trying to call "data->ops->get_trend" which comes from a sensor driver when it registers. From what I can see, there are lot of drivers which don't pass "get_trend" in their ops. So there is no guarantee that it would be non-NULL right? Thinking of which, I think having both checks would be valid. > >> return data->ops->get_trend(data->sensor_data, trip, trend); >> @@ -301,7 +304,7 @@ static int of_thermal_set_trip_temp(struct thermal_zone_device *tz, int trip, >> if (trip >= data->ntrips || trip < 0) >> return -EDOM; >> >> - if (data->ops->set_trip_temp) { >> + if (data->ops && data->ops->set_trip_temp) { > Same comment as (2) Without a sensor driver probed, "tz->ops" would not have a valid pointer right? So, I think checking for "data->ops" should be good. Another possibility is, a sensor device might not have "set_trip_temp" callback but just "set_trips". So checking for "data->ops->set_trip_temp" might be still valid. > >> int ret; >> >> ret = data->ops->set_trip_temp(data->sensor_data, trip, temp); >> >