Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp451400ybl; Tue, 28 Jan 2020 06:12:03 -0800 (PST) X-Google-Smtp-Source: APXvYqziG0bqX+jqnJC4z5EQMnLlSHbX66uWXn/KMXooCxzkARr7i4wVFqv127WrGz5KnZqB84rq X-Received: by 2002:aca:ab52:: with SMTP id u79mr2728696oie.145.1580220723739; Tue, 28 Jan 2020 06:12:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580220723; cv=none; d=google.com; s=arc-20160816; b=lGl5hlyUF3RZv/zld5/rvv7ihzdat8ZM7n//eGRZIWD3pUtDrhmssxHFaNyPQiE7FO OJjjGyV08aR6WQtpOqVfEDdFGBHQo8+TejQaSurrBFzhC+FuHMx+/1cpmeINZYiMccxo PW6i/NUv0h6yWANnPoBzMINkhkA9Zkw7oN17j5ty5/D88eBJa4Cd8XG/0K7ONMNl0OoP e3kC7IeXYOuJFI6L+wc+jJbuFpgXY6oWfu9+gERziylHJBIsG11IC/AihdXkvmbUZG+g +AEetl4kLMgEUwBoACpAA11BFKEQBHU00al6JyfVgvjT6V+3FCEuhncA7HJLCHRhorof 4S2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=IdbMtHw6x/n/ocJQoF6DACIvO6sDplc2/ODxJn5BYa0=; b=RZMTP+OIZtg+Hz4EyiEMLC9dCJxZvq8k9nDusBd6pnKWfz5LfkrXTWlS6Led0mXFCL MUAd5q+BBcD7RwOO9CktbuRN55zsuVeudcoESE8drDRzcyd//imdc/sA3kbcSSYAiiX8 t+BmhLl2HQWHN0+O24942Cu3KUxxoMuiC+TCKmwtATkOpUKa4xBoBOk9P54UeWrUo4iO 10AnortBNsk4f6dyyeX8zuvHo4HWao7vol1HPMJxey/x3GHb8bbsiAMWPoSLI+kMLrU2 99Da5FcLxZGmCNxiilYdRHE8G8QADpE3IixSD91Wh5jr+cWQ1DJ6gMvTtpymxdsG9dgj wHWw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Rk0ziGdF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k128si2890864oih.274.2020.01.28.06.11.48; Tue, 28 Jan 2020 06:12:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Rk0ziGdF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729151AbgA1OKn (ORCPT + 99 others); Tue, 28 Jan 2020 09:10:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:59518 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728221AbgA1OKh (ORCPT ); Tue, 28 Jan 2020 09:10:37 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7263322522; Tue, 28 Jan 2020 14:10:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580220636; bh=LKiMuTIVEY/+zw/FO2kiHhJx5KEHLNwlCEuiVe1so8s=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Rk0ziGdFPkcygAEOVRsra/rb48CFy0l0jjNsDHLWxlRm/Y6KMNov1eCeGvr9MKUAL 6VLharrnu0nxeFnWlWURHbSNRvcEImUX+XGIomyiqpEWDe0/xZPaKoif7r+VRAyzyc cORBnUJQzXs/YKwKfjsq7JF4d5ZiU9dvfkQCN74s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Hans Verkuil , Mauro Carvalho Chehab , Sasha Levin Subject: [PATCH 4.4 087/183] media: omap_vout: potential buffer overflow in vidioc_dqbuf() Date: Tue, 28 Jan 2020 15:05:06 +0100 Message-Id: <20200128135838.702805691@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200128135829.486060649@linuxfoundation.org> References: <20200128135829.486060649@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Carpenter [ Upstream commit dd6e2a981bfe83aa4a493143fd8cf1edcda6c091 ] The "b->index" is a u32 the comes from the user in the ioctl. It hasn't been checked. We aren't supposed to use it but we're instead supposed to use the value that gets written to it when we call videobuf_dqbuf(). The videobuf_dqbuf() first memsets it to zero and then re-initializes it inside the videobuf_status() function. It's this final value which we want. Hans Verkuil pointed out that we need to check the return from videobuf_dqbuf(). I ended up doing a little cleanup related to that as well. Fixes: 72915e851da9 ("[media] V4L2: OMAP: VOUT: dma map and unmap v4l2 buffers in qbuf and dqbuf") Signed-off-by: Dan Carpenter Signed-off-by: Hans Verkuil Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Sasha Levin --- drivers/media/platform/omap/omap_vout.c | 15 ++++++--------- 1 file changed, 6 insertions(+), 9 deletions(-) diff --git a/drivers/media/platform/omap/omap_vout.c b/drivers/media/platform/omap/omap_vout.c index 5963595761096..cf015bfc559bb 100644 --- a/drivers/media/platform/omap/omap_vout.c +++ b/drivers/media/platform/omap/omap_vout.c @@ -1580,23 +1580,20 @@ static int vidioc_dqbuf(struct file *file, void *fh, struct v4l2_buffer *b) unsigned long size; struct videobuf_buffer *vb; - vb = q->bufs[b->index]; - if (!vout->streaming) return -EINVAL; - if (file->f_flags & O_NONBLOCK) - /* Call videobuf_dqbuf for non blocking mode */ - ret = videobuf_dqbuf(q, (struct v4l2_buffer *)b, 1); - else - /* Call videobuf_dqbuf for blocking mode */ - ret = videobuf_dqbuf(q, (struct v4l2_buffer *)b, 0); + ret = videobuf_dqbuf(q, b, !!(file->f_flags & O_NONBLOCK)); + if (ret) + return ret; + + vb = q->bufs[b->index]; addr = (unsigned long) vout->buf_phy_addr[vb->i]; size = (unsigned long) vb->size; dma_unmap_single(vout->vid_dev->v4l2_dev.dev, addr, size, DMA_TO_DEVICE); - return ret; + return 0; } static int vidioc_streamon(struct file *file, void *fh, enum v4l2_buf_type i) -- 2.20.1