Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3567084pxb; Mon, 24 Jan 2022 12:23:16 -0800 (PST) X-Google-Smtp-Source: ABdhPJwkbdcwuhAG/+PLhwX7JnQppR7YuZCn/6xhj4duEaOZRcFQ5uji1jzRHiTn7UrlKamLks0J X-Received: by 2002:a17:90a:53:: with SMTP id 19mr23061pjb.159.1643055796093; Mon, 24 Jan 2022 12:23:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643055796; cv=none; d=google.com; s=arc-20160816; b=WnM6hqlJVaei9HZAnIHmf9qS4kZTkk5Nb3TkRUSjfIIkflYheyRWkWVClViPT1gp3K HN3SS7gBm2ECWGSmHwDKlLhUmwOlr29Ib+GmSvxZldJW6/zqBW5C/6iGyoLjmZdoMk8J iWAFQS3vEUTt8niaIkraa+kX82zwA+jJb5R/zsSpogzPdjM94sMzvAI3u4vie7ueOvoj Zfhpi+qArPLQGNKZR9rrjhRc7Z312ixi+T+9F0TVtmH8Owp1CZlsizclkvklOWlKNEKQ sCXtiaIS7E8Gf99FDBgDYCmh75oRtJmy2He0EknrX1yyqF3lwkQM+sgsAPaY2ymhHGDV BCYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=aQ+oKuwng4yDfu7koOk3V/6I04NhAisxTMM43PY7oIE=; b=LEvV+cwMgySmaK2DKtrxQ4090X6iQzf55zhwXPxjyoDz3m0qgThoDoQ6mL9vy/U38U K2Zaw+VCD2wtvxRa+uaM056IKjsHOF/+9/HVE//xDU34qsllDDcX4U4nP3kNgH9keTAg 9KbHO+toTIJFexAweCWsEGnb95ih4zhdTrZU0PmS5jPxRF99hmpjYIhJgnOjY2lbl2yA PIp8I7Td2jQ72B21fHo1L2a+1M+Qu3T95pEKRC7fOiq7ObDLpFpYIwIoAmUXxpNpcskB XEiKT1oXOHdV2PhEqrBDy+3nDu0EhEsDXjlvMFWj9roU+9/tYeUuDCtar2SgIHORXOa9 aFCQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=rXFEViF9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n18si13075184pff.307.2022.01.24.12.23.04; Mon, 24 Jan 2022 12:23:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=rXFEViF9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1351763AbiAXT2h (ORCPT + 99 others); Mon, 24 Jan 2022 14:28:37 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49500 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1348651AbiAXTTX (ORCPT ); Mon, 24 Jan 2022 14:19:23 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A75CBC02B8CB; Mon, 24 Jan 2022 11:07:37 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 1F2CDB81236; Mon, 24 Jan 2022 19:07:36 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 48929C340E5; Mon, 24 Jan 2022 19:07:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643051254; bh=YeXAOZqsXJopt9g24xu3z88wjjco8btdyftcUw/InUg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=rXFEViF9KwCrP66jovUtKLBE0mRdnZrCenfYzddrXsQK4Io5GXJWDfEjGznep1zeY PiudWPgFT8j5xyuWXQskCRrF7qujax+75cJnXCzb4xcUpESdW7TFT3XZFdEXKbxWMA 4jPr0eKpNxSMAe6FutvjXlPNq/JG8ispSDIIrHTA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Zhou Qingyang , Hans Verkuil , Mauro Carvalho Chehab , Sasha Levin Subject: [PATCH 4.14 102/186] media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() Date: Mon, 24 Jan 2022 19:42:57 +0100 Message-Id: <20220124183940.395935956@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124183937.101330125@linuxfoundation.org> References: <20220124183937.101330125@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Zhou Qingyang [ Upstream commit 348df8035301dd212e3cc2860efe4c86cb0d3303 ] In hexium_attach(dev, info), saa7146_vv_init() is called to allocate a new memory for dev->vv_data. In hexium_detach(), saa7146_vv_release() will be called and there is a dereference of dev->vv_data in saa7146_vv_release(), which could lead to a NULL pointer dereference on failure of saa7146_vv_init() according to the following logic. Both hexium_attach() and hexium_detach() are callback functions of the variable 'extension', so there exists a possible call chain directly from hexium_attach() to hexium_detach(): hexium_attach(dev, info) -- fail to alloc memory to dev->vv_data | in saa7146_vv_init(). | | hexium_detach() -- a dereference of dev->vv_data in saa7146_vv_release() Fix this bug by adding a check of saa7146_vv_init(). This bug was found by a static analyzer. The analysis employs differential checking to identify inconsistent security operations (e.g., checks or kfrees) between two code paths and confirms that the inconsistent operations are not recovered in the current function or the callers, so they constitute bugs. Note that, as a bug found by static analysis, it can be a false positive or hard to trigger. Multiple researchers have cross-reviewed the bug. Builds with CONFIG_VIDEO_HEXIUM_ORION=m show no new warnings, and our static analyzer no longer warns about this code. Signed-off-by: Zhou Qingyang Signed-off-by: Hans Verkuil Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Sasha Levin --- drivers/media/pci/saa7146/hexium_orion.c | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/drivers/media/pci/saa7146/hexium_orion.c b/drivers/media/pci/saa7146/hexium_orion.c index cb71653a66694..908de2f768441 100644 --- a/drivers/media/pci/saa7146/hexium_orion.c +++ b/drivers/media/pci/saa7146/hexium_orion.c @@ -366,10 +366,16 @@ static struct saa7146_ext_vv vv_data; static int hexium_attach(struct saa7146_dev *dev, struct saa7146_pci_extension_data *info) { struct hexium *hexium = (struct hexium *) dev->ext_priv; + int ret; DEB_EE("\n"); - saa7146_vv_init(dev, &vv_data); + ret = saa7146_vv_init(dev, &vv_data); + if (ret) { + pr_err("Error in saa7146_vv_init()\n"); + return ret; + } + vv_data.vid_ops.vidioc_enum_input = vidioc_enum_input; vv_data.vid_ops.vidioc_g_input = vidioc_g_input; vv_data.vid_ops.vidioc_s_input = vidioc_s_input; -- 2.34.1