Message ID | 20241003131351.472015-1-prabhakar.mahadev-lad.rj@bp.renesas.com |
---|---|
State | New |
Headers | show |
Series | gpiolib: Fix potential NULL pointer dereference in gpiod_get_label() | expand |
On Thu, Oct 3, 2024 at 3:14 PM Prabhakar <prabhakar.csengg@gmail.com> wrote: > From: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> > > In `gpiod_get_label()`, it is possible that `srcu_dereference_check()` may > return a NULL pointer, leading to a scenario where `label->str` is accessed > without verifying if `label` itself is NULL. > > This patch adds a proper NULL check for `label` before accessing > `label->str`. The check for `label->str != NULL` is removed because > `label->str` can never be NULL if `label` is not NULL. > > This fixes the issue where the label name was being printed as `(efault)` > when dumping the sysfs GPIO file when `label == NULL`. > > Signed-off-by: Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com> Neat! Took me an aha-erlebnis to realize why it didn't crash immediately when accessing label->str, but it just returns the address relative to the zero base... Reviewed-by: Geert Uytterhoeven <geert+renesas@glider.be> Gr{oetje,eeting}s, Geert
diff --git a/drivers/gpio/gpiolib.c b/drivers/gpio/gpiolib.c index c6afbf434366..d5952ab7752c 100644 --- a/drivers/gpio/gpiolib.c +++ b/drivers/gpio/gpiolib.c @@ -114,12 +114,12 @@ const char *gpiod_get_label(struct gpio_desc *desc) srcu_read_lock_held(&desc->gdev->desc_srcu)); if (test_bit(FLAG_USED_AS_IRQ, &flags)) - return label->str ?: "interrupt"; + return label ? label->str : "interrupt"; if (!test_bit(FLAG_REQUESTED, &flags)) return NULL; - return label->str; + return label ? label->str : NULL; } static void desc_free_label(struct rcu_head *rh)