Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3593093pxb; Mon, 24 Jan 2022 13:03:40 -0800 (PST) X-Google-Smtp-Source: ABdhPJzvkDDiUsm5d+uMggvo8xkXjCzH48lRhURJRXIIgTjVsBjs8CGNb+J2TkAW8xrt9kPAFlP1 X-Received: by 2002:a17:90a:9c5:: with SMTP id 63mr151064pjo.144.1643058220119; Mon, 24 Jan 2022 13:03:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643058220; cv=none; d=google.com; s=arc-20160816; b=WQKd8CCbnnb3Rp5tK1pOdJO60jZqUKeAzIPGkN8TtC2aCpSSXk9Z7SfD+KfHzEjUTH u27GPZkCVJTwE1InYqDnio3bVgRlxAWu5EGFyabNR0uRsmMlgCyehkli6a5qjO21cGvP WHOiaCUoG9fBWgenHRCpdDidhTaDCt9kXzZp2zcA3olBOrxG/XDOPpySFvCsdMqsRlIt Zpjq06NG+ekUp26CrZPKxvy2UX8q7w6Vezc2MbJFOwKaQ+c+yB1NSqEXxkAnrNMvoO7E jdHjfgp/YT+UlJBmojvhu/vE+PEAIahB/4Uo/381J4Xhn03ou04s8wk1Bh8ZY8t6lqLf /yQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=dX20c9aF4ZeVa+fyEviBWKNlITfY2zKIPRwQ068OtG0=; b=tLkHSQT++R9PoAq9mtECtkDp1xApfSic71TmDjOlb9xrePTux1u5D3nXCNwoceDWal J11as1nUTu9tKUkYrE6kKccKOAjDYmzCIR6sR561/arcTaMoX80e3bGcKi7cYRAKNI3A mCIGG3gE1hiPc+js43r2ItmrcRGR3CUqxWhT8ZKWkzNM54aV8RBR7d1aajkY+i1BIyWp kxsWlauV2e/hTm/I8B5iy0TOTcFGSAUaJBnFBTRlC92qF/Q59EGlSlZKQ57Tst+gdsR3 a6F1V4oB4mWBNEM0VKhI2Loxe47h0x1Eh+0ATkGVmUQAscv/60YEX252OZiynRu3uGTR j7GQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0Xjq6jHO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y12si13901322plk.292.2022.01.24.13.03.16; Mon, 24 Jan 2022 13:03:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0Xjq6jHO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1383072AbiAXU0q (ORCPT + 99 others); Mon, 24 Jan 2022 15:26:46 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59478 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1347462AbiAXT6o (ORCPT ); Mon, 24 Jan 2022 14:58:44 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0A134C047CFB; Mon, 24 Jan 2022 11:27:59 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 82712B8122F; Mon, 24 Jan 2022 19:27:57 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B2F0AC340E5; Mon, 24 Jan 2022 19:27:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643052476; bh=Yp1NnFfvlH+1ASCwb2Hc7AdUpcyrvhhExdH1MabsrVw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0Xjq6jHOahJydU2phcUygrU3kn7I8+7JflXeRkRiUKW6Hwn9DjbzDRL7YXQxUIyHR WQuNP26z2Cy1b+JLIPCcnpSnPFWaeqAD7GTrc/4uvSz3QBsJV5rdra7KfAYTo3lTnt vuxXB3guWeDgWUAzifDlen4dApS8AeYcmnQT+EOk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Zhou Qingyang , Hans Verkuil , Mauro Carvalho Chehab , Sasha Levin Subject: [PATCH 5.4 072/320] media: dib8000: Fix a memleak in dib8000_init() Date: Mon, 24 Jan 2022 19:40:56 +0100 Message-Id: <20220124183956.175905593@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124183953.750177707@linuxfoundation.org> References: <20220124183953.750177707@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Zhou Qingyang [ Upstream commit 8dbdcc7269a83305ee9d677b75064d3530a48ee2 ] In dib8000_init(), the variable fe is not freed or passed out on the failure of dib8000_identify(&state->i2c), which could lead to a memleak. Fix this bug by adding a kfree of fe in the error path. This bug was found by a static analyzer. The analysis employs differential checking to identify inconsistent security operations (e.g., checks or kfrees) between two code paths and confirms that the inconsistent operations are not recovered in the current function or the callers, so they constitute bugs. Note that, as a bug found by static analysis, it can be a false positive or hard to trigger. Multiple researchers have cross-reviewed the bug. Builds with CONFIG_DVB_DIB8000=m show no new warnings, and our static analyzer no longer warns about this code. Fixes: 77e2c0f5d471 ("V4L/DVB (12900): DiB8000: added support for DiBcom ISDB-T/ISDB-Tsb demodulator DiB8000") Signed-off-by: Zhou Qingyang Signed-off-by: Hans Verkuil Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Sasha Levin --- drivers/media/dvb-frontends/dib8000.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/media/dvb-frontends/dib8000.c b/drivers/media/dvb-frontends/dib8000.c index bb02354a48b81..d67f2dd997d06 100644 --- a/drivers/media/dvb-frontends/dib8000.c +++ b/drivers/media/dvb-frontends/dib8000.c @@ -4473,8 +4473,10 @@ static struct dvb_frontend *dib8000_init(struct i2c_adapter *i2c_adap, u8 i2c_ad state->timf_default = cfg->pll->timf; - if (dib8000_identify(&state->i2c) == 0) + if (dib8000_identify(&state->i2c) == 0) { + kfree(fe); goto error; + } dibx000_init_i2c_master(&state->i2c_master, DIB8000, state->i2c.adap, state->i2c.addr); -- 2.34.1