lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <174341425769.1100556.13422322396999492211.b4-ty@bootlin.com>
Date: Mon, 31 Mar 2025 11:44:24 +0200
From: Alexandre Belloni <alexandre.belloni@...tlin.com>
To: arnd@...db.de, gregkh@...uxfoundation.org, bbrezillon@...nel.org,
	linux-i3c@...ts.infradead.org, linux-kernel@...r.kernel.org,
	frank.li@....com,
	Manjunatha Venkatesh <manjunatha.venkatesh@....com>
Cc: rvmanjumce@...il.com, stable@...r.kernel.org
Subject: Re: [PATCH v6] i3c: Add NULL pointer check in i3c_master_queue_ibi()

On Wed, 26 Mar 2025 18:00:46 +0530, Manjunatha Venkatesh wrote:
> The I3C master driver may receive an IBI from a target device that has not
> been probed yet. In such cases, the master calls `i3c_master_queue_ibi()`
> to queue an IBI work task, leading to "Unable to handle kernel read from
> unreadable memory" and resulting in a kernel panic.
> 
> Typical IBI handling flow:
> 1. The I3C master scans target devices and probes their respective drivers.
> 2. The target device driver calls `i3c_device_request_ibi()` to enable IBI
>    and assigns `dev->ibi = ibi`.
> 3. The I3C master receives an IBI from the target device and calls
>    `i3c_master_queue_ibi()` to queue the target device driver’s IBI
>    handler task.
> 
> [...]

Applied, thanks!

[1/1] i3c: Add NULL pointer check in i3c_master_queue_ibi()
      https://git.kernel.org/abelloni/c/bd496a44f041

Best regards,

-- 
Alexandre Belloni, co-owner and COO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ