Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp2897884pxb; Tue, 24 Aug 2021 10:07:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwtR1HFqfwaRQ0T1qbAzRgL1E6VpQfJYg9dDErjuIF1mqbgXO7gT14RG0cx1sFCIdglkMtg X-Received: by 2002:a02:ca06:: with SMTP id i6mr35075447jak.81.1629824854119; Tue, 24 Aug 2021 10:07:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629824854; cv=none; d=google.com; s=arc-20160816; b=A2pfUGlHseYyRJOl+tbZfQYnzqqft9UnAkYQITLTIS6dT0aPZwXT8ENqxYmrdh8tt3 YuGh9eWhvmCC/MJ0TBc9GnM7s/OSlkpW9PWseSMTIFENTKYankpooQnS/1QALyMMxbzJ JLZ8gJ3wVExxGUbbFGBxxL8Gdg8UP5cdo4UOm/GL8CW1IA1UgWUVrVJavwsmMNRpINUl ar57B7B2B03pACRdQFReUfPa8XfCQxsWABxQ3yi5GBt3+IiGb9yL38zhw+42QOtrMVFw 3ssb0Rk7AFPcZiwA7tLGMKdQVnea4as32VBuo5sd5vWPRPdCAmMozXk9ZoiUzqe+rMqz 6zKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=TlcDZ4nfLgp2xilfEVVG6RwL3j0EHr4W0AwWlBN3f0g=; b=JRBcf8jEmA9pQrSleAwJxwHLapmsJmvPIal6KXXCHc00JDHMkpRx59/fbmSew1qqAW EcxLlsl/TuiHeiHEYAExFvr9Rc4bQXbq+3B/TS8MJoGOCyZ+/99W/EMho6XRCjaQk427 8nQqbKd7fcp/ooRA2RDfxu6XUlByqMWQlyn9i9TkNRlPrADFM+jRALt3TCQrUo70rR43 C9DkD7Ay0KWMNu9TUtQll2Ibb/1Ss75///6CYI4w2UqGjjq25L/VCIZFeGrK/0ZnSwZ7 s3sodWu8miJxGdMOMCL07lhEMpxF4J8+fj6507iV6ycypr4AoK0+VoVmtKtFesa4/oaN hTHA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=SrO3O1hq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w13si17307329jae.1.2021.08.24.10.07.18; Tue, 24 Aug 2021 10:07:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=SrO3O1hq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238798AbhHXRGf (ORCPT + 99 others); Tue, 24 Aug 2021 13:06:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:46494 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238831AbhHXRDM (ORCPT ); Tue, 24 Aug 2021 13:03:12 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id B7F9C61440; Tue, 24 Aug 2021 16:59:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1629824358; bh=BPh9j8X9s2guM4I89V3cQlAiCTj3qrmRw1ftKVjQguQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SrO3O1hqb1U+Ify7a9JjT3F0OXZjraxEKzhgG3JnwqR8SqMGuxiAXyCPVwiheFH6Z F9H5/qzJzffMCwELII7IjgnMIaFgzXwvlyjfQPabEWbL1deADtXgr+CRt8k1Q9xfRH xVLYvAjpsAxrbXhgDag4aOKXGaZQCeV2wJ+nOsrIB4cJkQ+HxooNdVS38w1n4bGt9r YQghThPMiNDmkWajLw1XrWJfiMHR7jKOZobLzXuJx8iGkZIKh9Xa5onCIiIWOdVCkV LjpcVcmFyOSoVH8IdPKqk0uAO/9swCbaqN0AleGtLcWWt9FUQRbj1XOAzrT1NPCW+6 XCOiiITxVWT7w== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Dan Carpenter , syzbot+b4d54814b339b5c6bbd4@syzkaller.appspotmail.com, Hans Verkuil , Mauro Carvalho Chehab , Sasha Levin Subject: [PATCH 5.10 08/98] media: zr364xx: fix memory leaks in probe() Date: Tue, 24 Aug 2021 12:57:38 -0400 Message-Id: <20210824165908.709932-9-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210824165908.709932-1-sashal@kernel.org> References: <20210824165908.709932-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.61-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.10.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.10.61-rc1 X-KernelTest-Deadline: 2021-08-26T16:58+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Carpenter [ Upstream commit ea354b6ddd6f09be29424f41fa75a3e637fea234 ] Syzbot discovered that the probe error handling doesn't clean up the resources allocated in zr364xx_board_init(). There are several related bugs in this code so I have re-written the error handling. 1) Introduce a new function zr364xx_board_uninit() which cleans up the resources in zr364xx_board_init(). 2) In zr364xx_board_init() if the call to zr364xx_start_readpipe() fails then release the "cam->buffer.frame[i].lpvbits" memory before returning. This way every function either allocates everything successfully or it cleans up after itself. 3) Re-write the probe function so that each failure path goto frees the most recent allocation. That way we don't free anything before it has been allocated and we can also verify that everything is freed. 4) Originally, in the probe function the "cam->v4l2_dev.release" pointer was set to "zr364xx_release" near the start but I moved that assignment to the end, after everything had succeeded. The release function was never actually called during the probe cleanup process, but with this change I wanted to make it clear that we don't want to call zr364xx_release() until everything is allocated successfully. Next I re-wrote the zr364xx_release() function. Ideally this would have been a simple matter of copy and pasting the cleanup code from probe and adding an additional call to video_unregister_device(). But there are a couple quirks to note. 1) The probe function does not call videobuf_mmap_free() and I don't know where the videobuf_mmap is allocated. I left the code as-is to avoid introducing a bug in code I don't understand. 2) The zr364xx_board_uninit() has a call to zr364xx_stop_readpipe() which is a change from the original behavior with regards to unloading the driver. Calling zr364xx_stop_readpipe() on a stopped pipe is not a problem so this is safe and is potentially a bugfix. Reported-by: syzbot+b4d54814b339b5c6bbd4@syzkaller.appspotmail.com Signed-off-by: Dan Carpenter Signed-off-by: Hans Verkuil Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Sasha Levin --- drivers/media/usb/zr364xx/zr364xx.c | 49 ++++++++++++++++++----------- 1 file changed, 31 insertions(+), 18 deletions(-) diff --git a/drivers/media/usb/zr364xx/zr364xx.c b/drivers/media/usb/zr364xx/zr364xx.c index 5c8997d7de23..8636acf2dad0 100644 --- a/drivers/media/usb/zr364xx/zr364xx.c +++ b/drivers/media/usb/zr364xx/zr364xx.c @@ -1184,15 +1184,11 @@ out: return err; } -static void zr364xx_release(struct v4l2_device *v4l2_dev) +static void zr364xx_board_uninit(struct zr364xx_camera *cam) { - struct zr364xx_camera *cam = - container_of(v4l2_dev, struct zr364xx_camera, v4l2_dev); unsigned long i; - v4l2_device_unregister(&cam->v4l2_dev); - - videobuf_mmap_free(&cam->vb_vidq); + zr364xx_stop_readpipe(cam); /* release sys buffers */ for (i = 0; i < FRAMES; i++) { @@ -1203,9 +1199,19 @@ static void zr364xx_release(struct v4l2_device *v4l2_dev) cam->buffer.frame[i].lpvbits = NULL; } - v4l2_ctrl_handler_free(&cam->ctrl_handler); /* release transfer buffer */ kfree(cam->pipe->transfer_buffer); +} + +static void zr364xx_release(struct v4l2_device *v4l2_dev) +{ + struct zr364xx_camera *cam = + container_of(v4l2_dev, struct zr364xx_camera, v4l2_dev); + + videobuf_mmap_free(&cam->vb_vidq); + v4l2_ctrl_handler_free(&cam->ctrl_handler); + zr364xx_board_uninit(cam); + v4l2_device_unregister(&cam->v4l2_dev); kfree(cam); } @@ -1379,11 +1385,14 @@ static int zr364xx_board_init(struct zr364xx_camera *cam) /* start read pipe */ err = zr364xx_start_readpipe(cam); if (err) - goto err_free; + goto err_free_frames; DBG(": board initialized\n"); return 0; +err_free_frames: + for (i = 0; i < FRAMES; i++) + vfree(cam->buffer.frame[i].lpvbits); err_free: kfree(cam->pipe->transfer_buffer); cam->pipe->transfer_buffer = NULL; @@ -1412,12 +1421,10 @@ static int zr364xx_probe(struct usb_interface *intf, if (!cam) return -ENOMEM; - cam->v4l2_dev.release = zr364xx_release; err = v4l2_device_register(&intf->dev, &cam->v4l2_dev); if (err < 0) { dev_err(&udev->dev, "couldn't register v4l2_device\n"); - kfree(cam); - return err; + goto free_cam; } hdl = &cam->ctrl_handler; v4l2_ctrl_handler_init(hdl, 1); @@ -1426,7 +1433,7 @@ static int zr364xx_probe(struct usb_interface *intf, if (hdl->error) { err = hdl->error; dev_err(&udev->dev, "couldn't register control\n"); - goto fail; + goto unregister; } /* save the init method used by this camera */ cam->method = id->driver_info; @@ -1499,7 +1506,7 @@ static int zr364xx_probe(struct usb_interface *intf, if (!cam->read_endpoint) { err = -ENOMEM; dev_err(&intf->dev, "Could not find bulk-in endpoint\n"); - goto fail; + goto unregister; } /* v4l */ @@ -1510,10 +1517,11 @@ static int zr364xx_probe(struct usb_interface *intf, /* load zr364xx board specific */ err = zr364xx_board_init(cam); - if (!err) - err = v4l2_ctrl_handler_setup(hdl); if (err) - goto fail; + goto unregister; + err = v4l2_ctrl_handler_setup(hdl); + if (err) + goto board_uninit; spin_lock_init(&cam->slock); @@ -1528,16 +1536,21 @@ static int zr364xx_probe(struct usb_interface *intf, err = video_register_device(&cam->vdev, VFL_TYPE_VIDEO, -1); if (err) { dev_err(&udev->dev, "video_register_device failed\n"); - goto fail; + goto free_handler; } + cam->v4l2_dev.release = zr364xx_release; dev_info(&udev->dev, DRIVER_DESC " controlling device %s\n", video_device_node_name(&cam->vdev)); return 0; -fail: +free_handler: v4l2_ctrl_handler_free(hdl); +board_uninit: + zr364xx_board_uninit(cam); +unregister: v4l2_device_unregister(&cam->v4l2_dev); +free_cam: kfree(cam); return err; } -- 2.30.2