Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934127AbcCOPAO (ORCPT ); Tue, 15 Mar 2016 11:00:14 -0400 Received: from mail-wm0-f54.google.com ([74.125.82.54]:37910 "EHLO mail-wm0-f54.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751200AbcCOPAI (ORCPT ); Tue, 15 Mar 2016 11:00:08 -0400 From: Nicolai Stange To: Mauro Carvalho Chehab Cc: Takashi Iwai , Nicolai Stange , Jaroslav Kysela , alsa-devel@alsa-project.org, Shuah Khan , linux-kernel@vger.kernel.org Subject: Re: [PATCH] [media] sound/usb: fix NULL dereference in usb_audio_probe() References: <1458045306-4170-1-git-send-email-nicstange@gmail.com> <20160315115339.2a50466a@recife.lan> Date: Tue, 15 Mar 2016 16:00:04 +0100 In-Reply-To: <20160315115339.2a50466a@recife.lan> (Mauro Carvalho Chehab's message of "Tue, 15 Mar 2016 11:53:39 -0300") Message-ID: <87vb4nokgb.fsf@gmail.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.0.92 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3976 Lines: 102 Mauro Carvalho Chehab writes: > Em Tue, 15 Mar 2016 13:41:28 +0100 > Takashi Iwai escreveu: > >> On Tue, 15 Mar 2016 13:35:06 +0100, >> Nicolai Stange wrote: >> > >> > With commit >> > >> > aebb2b89bff0 ("[media] sound/usb: Use Media Controller API to share >> > media resources") >> > >> > an access to quirk->media_device without checking for quirk != NULL has >> > been introduced in usb_audio_probe(). >> > >> > With a Plantronics USB headset (device ID 0x047f:0xc010) attached, >> > this results in the following splat at boot time: >> > >> > BUG: unable to handle kernel NULL pointer dereference at 0000000000000014 >> > IP: [] usb_audio_probe+0x2cc/0x9a0 [snd_usb_audio] >> > Oops: 0000 [#1] SMP >> > [...] >> > CPU: 2 PID: 696 Comm: systemd-udevd Not tainted 4.5.0-next-20160315 #13 >> > Hardware name: Dell Inc. Latitude E6540/0725FP, BIOS A10 06/26/2014 >> > task: ffff88021c88d7c0 ti: ffff88003d5b0000 task.ti: ffff88003d5b0000 >> > RIP: 0010:[] [] >> > usb_audio_probe+0x2cc/0x9a0 [snd_usb_audio] >> > [...] >> > Call Trace: >> > [] usb_probe_interface+0x136/0x2d0 >> > [] driver_probe_device+0x22c/0x440 >> > [] __driver_attach+0xd1/0xf0 >> > [] ? driver_probe_device+0x440/0x440 >> > [] bus_for_each_dev+0x6c/0xc0 >> > [] driver_attach+0x1e/0x20 >> > [] bus_add_driver+0x1c3/0x280 >> > [] driver_register+0x60/0xe0 >> > [] usb_register_driver+0x81/0x140 >> > [] ? 0xffffffffa08c7000 >> > [] usb_audio_driver_init+0x1e/0x1000 [snd_usb_audio] >> > [] do_one_initcall+0xb3/0x1f0 >> > [] ? __vunmap+0x81/0xd0 >> > [] ? kmem_cache_alloc_trace+0x182/0x1d0 >> > [] ? do_init_module+0x27/0x1d8 >> > [] do_init_module+0x5f/0x1d8 >> > [] load_module+0x1fe5/0x27a0 >> > [] ? __symbol_put+0x60/0x60 >> > [] ? vfs_read+0x110/0x130 >> > [] SYSC_finit_module+0xe6/0x120 >> > [] SyS_finit_module+0xe/0x10 >> > [] do_syscall_64+0x64/0x110 >> > [] entry_SYSCALL64_slow_path+0x25/0x25 >> > >> > After encountering this, the system-udevd process seems to be blocked >> > until it is killed when hitting its timeout of 3min. >> > >> > In analogy to the other accesses to members of quirk in usb_audio_probe(), >> > check for quirk != NULL before accessing its ->media_device. >> > >> > Fixes: aebb2b89bff0 ("[media] sound/usb: Use Media Controller API to share >> > media resources") >> > Signed-off-by: Nicolai Stange >> >> Reviewed-by: Takashi Iwai >> >> Mauro, please merge through your tree. I haven't merged MC changes >> into my tree yet. > > OK, I'll send this fix together with some other patches in a couple > of days (it needs to go first to linux-next ;) ). > Thank you all! Nicolai >> >> >> > --- >> > Applicable to linux-next-20160315. >> > >> > sound/usb/card.c | 2 +- >> > 1 file changed, 1 insertion(+), 1 deletion(-) >> > >> > diff --git a/sound/usb/card.c b/sound/usb/card.c >> > index 63244bb..479621e 100644 >> > --- a/sound/usb/card.c >> > +++ b/sound/usb/card.c >> > @@ -612,7 +612,7 @@ static int usb_audio_probe(struct usb_interface *intf, >> > if (err < 0) >> > goto __error; >> > >> > - if (quirk->media_device) { >> > + if (quirk && quirk->media_device) { >> > /* don't want to fail when media_snd_device_create() fails */ >> > media_snd_device_create(chip, intf); >> > } >> > -- >> > 2.7.2 >> > >> >