Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3562828pxb; Mon, 24 Jan 2022 12:17:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJzUE7DCp060bZWTC4lV9544gwPE7VBBL40RV5qN/0rEqMagtMZS+XCpE3OLFRpBWYl7nHXZ X-Received: by 2002:a17:902:e750:b0:14b:4bef:a2e0 with SMTP id p16-20020a170902e75000b0014b4befa2e0mr6515315plf.2.1643055434378; Mon, 24 Jan 2022 12:17:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643055434; cv=none; d=google.com; s=arc-20160816; b=bjd6TQ1zaY2JWwhBo+RI4pWSIM01d/I5iAeu9CCUp4AF5kwKhV4k3KxVyNm1MjB/m/ dc4kyLGG63Rst4XkrFqht9976tgTT/qDdT5LdfTg4WtpUuJC4ySq6CeNDyAbGpNKKwcd OOD5muvOGFjMDzy8zead6GNAfP0FK5ZLG+aOazi7sOeDTSXcEaodcqn6E2ILvLb11Yob sqpIl99qIGauAjTmkqZRN7B3S9eXP2W8XDm9rXB4lCzyukmt4tXaulRZe3GhypJTRfpw h7JgCVMJq4yztX9VaunyBi6t8QSA+7ugq0sCZ5TxC5vqH+qnJ/PrOKA/+PPzSyEAyrHd a1Qg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3dCXtxz4FtGCY6s3IQTBJRArDawXzV4nz01+oRnDeNY=; b=n37juYmOSmA4x1mo46KFBV0lFNLmaF0u7mp01Ti5IiQZEZGvkjCgXAh4R67DibP4Fh /G7K9GfaqxvkhbEve0VHrXkKT0U3tHgmQA/hcucMf+CvP1xDQVIyaGz4UpKeBpI7yiE5 AEKpPThgYLaK9IxX6BI2EO33nZxkN5ExkUuCctiTpjpKR8/0tpgFJKy4q5BRICm8yPIu P7SYr2nQ0grOYjP4Gx7KyApxj3DLg38nwvAklOzDeFVfQ3y2jCV5rV+cntMPk75PK9IP gkfakafLDi0yS7ryBvRwyRWvdVyYrfWBle7ikxMZNI4Ym1W02wrx7VnIURqC40GqnbLn 6M9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Z2fUqZAu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o9si13014531pfh.255.2022.01.24.12.17.02; Mon, 24 Jan 2022 12:17:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Z2fUqZAu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347426AbiAXTSa (ORCPT + 99 others); Mon, 24 Jan 2022 14:18:30 -0500 Received: from dfw.source.kernel.org ([139.178.84.217]:38996 "EHLO dfw.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343934AbiAXTJV (ORCPT ); Mon, 24 Jan 2022 14:09:21 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 166F7611A9; Mon, 24 Jan 2022 19:09:20 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C702EC340E5; Mon, 24 Jan 2022 19:09:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643051359; bh=iMVmUcIEnhx1/dyD/Ep+9ykJlQn0RTzeVgSkysfS/jI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Z2fUqZAu7celpbh6xhK5eBSCRDT4Do1AB+tr2ihVskjymq8MR+zS67dP92MvRV6Mk vkVsyO9kgxasQutxodnooJDezIy7QaHrtw5yJqYlTWSzYuPi6MePpYrHr30rbdGOUr ytghmwiwtmlo18m0TgsQgwJ6bMIjkfLZmUv3fA4s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Zhou Qingyang , Mauro Carvalho Chehab , Sasha Levin Subject: [PATCH 4.14 109/186] media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() Date: Mon, 24 Jan 2022 19:43:04 +0100 Message-Id: <20220124183940.618283778@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124183937.101330125@linuxfoundation.org> References: <20220124183937.101330125@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Zhou Qingyang [ Upstream commit 3af86b046933ba513d08399dba0d4d8b50d607d0 ] In hexium_attach(dev, info), saa7146_vv_init() is called to allocate a new memory for dev->vv_data. saa7146_vv_release() will be called on failure of saa7146_register_device(). There is a dereference of dev->vv_data in saa7146_vv_release(), which could lead to a NULL pointer dereference on failure of saa7146_vv_init(). Fix this bug by adding a check of saa7146_vv_init(). This bug was found by a static analyzer. The analysis employs differential checking to identify inconsistent security operations (e.g., checks or kfrees) between two code paths and confirms that the inconsistent operations are not recovered in the current function or the callers, so they constitute bugs. Note that, as a bug found by static analysis, it can be a false positive or hard to trigger. Multiple researchers have cross-reviewed the bug. Builds with CONFIG_VIDEO_HEXIUM_GEMINI=m show no new warnings, and our static analyzer no longer warns about this code. Link: https://lore.kernel.org/linux-media/20211203154030.111210-1-zhou1615@umn.edu Signed-off-by: Zhou Qingyang Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Sasha Levin --- drivers/media/common/saa7146/saa7146_fops.c | 2 +- drivers/media/pci/saa7146/hexium_gemini.c | 7 ++++++- 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/drivers/media/common/saa7146/saa7146_fops.c b/drivers/media/common/saa7146/saa7146_fops.c index 930d2c94d5d30..2c9365a39270a 100644 --- a/drivers/media/common/saa7146/saa7146_fops.c +++ b/drivers/media/common/saa7146/saa7146_fops.c @@ -524,7 +524,7 @@ int saa7146_vv_init(struct saa7146_dev* dev, struct saa7146_ext_vv *ext_vv) ERR("out of memory. aborting.\n"); kfree(vv); v4l2_ctrl_handler_free(hdl); - return -1; + return -ENOMEM; } saa7146_video_uops.init(dev,vv); diff --git a/drivers/media/pci/saa7146/hexium_gemini.c b/drivers/media/pci/saa7146/hexium_gemini.c index a527d86b93a77..7f498aebb4112 100644 --- a/drivers/media/pci/saa7146/hexium_gemini.c +++ b/drivers/media/pci/saa7146/hexium_gemini.c @@ -296,7 +296,12 @@ static int hexium_attach(struct saa7146_dev *dev, struct saa7146_pci_extension_d hexium_set_input(hexium, 0); hexium->cur_input = 0; - saa7146_vv_init(dev, &vv_data); + ret = saa7146_vv_init(dev, &vv_data); + if (ret) { + i2c_del_adapter(&hexium->i2c_adapter); + kfree(hexium); + return ret; + } vv_data.vid_ops.vidioc_enum_input = vidioc_enum_input; vv_data.vid_ops.vidioc_g_input = vidioc_g_input; -- 2.34.1