Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2502697imm; Mon, 28 May 2018 09:17:28 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpPsnXa40dSlT0pUsF+ntULsAMpkGja5ArXbvC2+0C2ikCtIxfRMeIVT5dt9/TNzzJOUKc4 X-Received: by 2002:a17:902:bb0b:: with SMTP id l11-v6mr14560025pls.190.1527524247985; Mon, 28 May 2018 09:17:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527524247; cv=none; d=google.com; s=arc-20160816; b=jDgIlubsqIT5PIH/obJSstbtHpLRUyjRLqgC7osaJWSfqTBZC4dQmrJe8wajtIpEXa lDgtg1UBWMN7OWG+maFACfcIXaVbVP/FUKUTmx02THgU2Uqu+I1fSSg9k6iGYQIMLRjH 7JjLd7+obrAm+8+cU5BhgXp/EAnZnd8iN70P73XrigF7YAIenFKcHRHHd4mIwVJz61KD YLzqQyARpkfQTwzdAKXroA5Js6GtXJ8KxMZ9j9PjNpzQ92YDlVsM2PbPhiUVc18d2Roy LDQQutNiWaBGt9kWWca2sNRGtOxLqznTS0vTwTQtUZtN6bgz/ptG5Cln3SMm9n2p+aYk JCUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=dWt4MU053+yVQh5gIfeGuGq8i6uvdJryYf/924fKOT8=; b=gv97Uj4PpsvWER0i5BFq+iJwexnBYpp71TMYSTPbm0mja0OdNZjVTAsP0du3cxJtLA 9f8+owxPQx2jLU8rw5tkmghs/YccC+HQLlqI+JywHkCBBYdh/mp9BX+U1SyCx5MFhEG9 xy0TyCJv/hQ6d2YU+7ySAV+36x6Ncl9RIpiw544xfJXI6eWUMTuh+TDz5qMIhlyQkAQP NoOfOMdvysjbk7MvpjmhmlhsTlfLm84Ka6axhqv4kRz3fHXwPOCzS7Ge0xt6TYWfwKU2 qcNBS6KQzwKCjF9GsuBv3XCLXpVgA2jvPu4fTP7PPf7R7Ir32wVxsxInlgYCs2FzZzV/ k6/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kSMF/xgj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n3-v6si29918347plp.550.2018.05.28.09.17.13; Mon, 28 May 2018 09:17:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kSMF/xgj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S939925AbeE1QQ2 (ORCPT + 99 others); Mon, 28 May 2018 12:16:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:60984 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965219AbeE1KMx (ORCPT ); Mon, 28 May 2018 06:12:53 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 98BE52086D; Mon, 28 May 2018 10:12:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527502373; bh=WfreGlHHLzV8txflGA73u3OZ0iPH6R/ZDWIi+JV16NA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kSMF/xgjVEmq0kIWk9Y8wyNJzD8ZvvOHzoT+lx8tba0hzup7ewqSDW1Spsr15eh8y UR0UqBimW22bJCVl09xwM+xnrgBYffDrLWNnwisyecyghJ2dSnE7akW5W4qUxoSwQS beiOHpL95Ggigy2OMHwPUzdZiJAQMz9zRJ76rNxs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Arnd Bergmann , Laurent Pinchart , Sakari Ailus , Mauro Carvalho Chehab , Sasha Levin Subject: [PATCH 3.18 162/185] media: s3c-camif: fix out-of-bounds array access Date: Mon, 28 May 2018 12:03:23 +0200 Message-Id: <20180528100111.871074495@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180528100050.700971285@linuxfoundation.org> References: <20180528100050.700971285@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Arnd Bergmann [ Upstream commit a398e043637a4819a0e96467bfecaabf3224dd62 ] While experimenting with older compiler versions, I ran into a warning that no longer shows up on gcc-4.8 or newer: drivers/media/platform/s3c-camif/camif-capture.c: In function '__camif_subdev_try_format': drivers/media/platform/s3c-camif/camif-capture.c:1265:25: error: array subscript is below array bounds This is an off-by-one bug, leading to an access before the start of the array, while newer compilers silently assume this undefined behavior cannot happen and leave the loop at index 0 if no other entry matches. As Sylvester explains, we actually need to ensure that the value is within the range, so this reworks the loop to be easier to parse correctly, and an additional check to fall back on the first format value for any unexpected input. I found an existing gcc bug for it and added a reduced version of the function there. Link: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69249#c3 Fixes: babde1c243b2 ("[media] V4L: Add driver for S3C24XX/S3C64XX SoC series camera interface") Signed-off-by: Arnd Bergmann Reviewed-by: Laurent Pinchart Acked-by: Sakari Ailus Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/media/platform/s3c-camif/camif-capture.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) --- a/drivers/media/platform/s3c-camif/camif-capture.c +++ b/drivers/media/platform/s3c-camif/camif-capture.c @@ -1280,16 +1280,17 @@ static void __camif_subdev_try_format(st { const struct s3c_camif_variant *variant = camif->variant; const struct vp_pix_limits *pix_lim; - int i = ARRAY_SIZE(camif_mbus_formats); + unsigned int i; /* FIXME: constraints against codec or preview path ? */ pix_lim = &variant->vp_pix_limits[VP_CODEC]; - while (i-- >= 0) + for (i = 0; i < ARRAY_SIZE(camif_mbus_formats); i++) if (camif_mbus_formats[i] == mf->code) break; - mf->code = camif_mbus_formats[i]; + if (i == ARRAY_SIZE(camif_mbus_formats)) + mf->code = camif_mbus_formats[0]; if (pad == CAMIF_SD_PAD_SINK) { v4l_bound_align_image(&mf->width, 8, CAMIF_MAX_PIX_WIDTH,