Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3600461pxb; Mon, 24 Jan 2022 13:13:47 -0800 (PST) X-Google-Smtp-Source: ABdhPJyxSa8un5oAY1qBbE/cekmATJtkLgiBFD1kCp6kk6GpNhv8Kqs8D2RXECnSlKoSD3ojq0/a X-Received: by 2002:a63:94:: with SMTP id 142mr12938852pga.154.1643058827677; Mon, 24 Jan 2022 13:13:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643058827; cv=none; d=google.com; s=arc-20160816; b=nZo4o6+bko0sK14DITuAPaqXVMq1bg2JmfTNg0ZrcEAPq11U+c8zpUOl2emhvtqcEQ dLlMx4/VCfBGaOCRJqMu/tIqcGqPvVCHpOOFs0JSIg+JTFNgX2826+/OXyJYfDjUO5i0 TQrrlmpNHWdbAlSHM6GDHsTF10AVNlsfmw2sKSEOObFeUAzJIlG7RjBn2VFsGi5N+EUF Px0YHT9sYYFDMD60ONdt8OnBPCJoRUNnRs9dbvmlztFRB4PCtVG7sYTBjEstgc+C7XOK EbA666UCScJO9tJwzxlNtbtPoC0CaQsz4ERKnI4X71RdQua7w9iF0ZeCsIplrWIjXXuw j8qw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=BrfHvhwvq5x/yZ7XaOg/ChMYJSmpb1aBnRHH0gyHoEE=; b=JCNv8H7fM6j0KhwaT5BB+PCCZdEybgzACap0NI7NQL5yaDmRU00Uto37JDc+UaS0lO 2aTwsysk7PyuGxmgSnr3ONPGcpyEklgQ3RBONgYL30SUbVicrDiFuCVcUGM+rh7xP+rY jv0dJFzYg5EfSQEvsv4q2WyzelG3KYVD/RP7i3EuJgMLNydThDlupJlWH/a3dXPH6jIz FLyd9qDvEJkt25I+S/s1fCSd/Gpqpk/5w3yU8B+/XuaS+p6Zxsk8lHqj8UvGwK+MMBOW yOI+V1h9E4oujrCk84bhBt59JOffkpP2PgWY7TU29R3tPrHOZzt8+aeyFFiY4i4OwNWX TLGg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=cPB5HLfH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id nv2si461730pjb.20.2022.01.24.13.13.32; Mon, 24 Jan 2022 13:13:47 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=cPB5HLfH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1387695AbiAXUhF (ORCPT + 99 others); Mon, 24 Jan 2022 15:37:05 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34046 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1379738AbiAXUMU (ORCPT ); Mon, 24 Jan 2022 15:12:20 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1BE89C0604CE; Mon, 24 Jan 2022 11:34:03 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 9B0D561504; Mon, 24 Jan 2022 19:34:02 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7662AC340E5; Mon, 24 Jan 2022 19:34:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643052842; bh=PwjgCXsxBBNDaqdajnAiUXq66v/vFynQ/z8Ps+IVHK4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cPB5HLfHwC4Fv1bZyMybjC+uk4o1gJfA9dUZ0vHHqKVDaP+s1a2MoY1DAz8VHocxo KlTn15WCFxhi8q76vU22CIs+5rAj0TxgjMFhqnJvbnfbcTUrmEhx/sXxAxLC0EDBJx 7ce/V0yeR8q4xfGtS/iCctXSGV2U3+L3u6IqsB7c= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Zhou Qingyang , Mauro Carvalho Chehab , Sasha Levin Subject: [PATCH 5.4 191/320] media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() Date: Mon, 24 Jan 2022 19:42:55 +0100 Message-Id: <20220124184000.143564158@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124183953.750177707@linuxfoundation.org> References: <20220124183953.750177707@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Zhou Qingyang [ Upstream commit 3af86b046933ba513d08399dba0d4d8b50d607d0 ] In hexium_attach(dev, info), saa7146_vv_init() is called to allocate a new memory for dev->vv_data. saa7146_vv_release() will be called on failure of saa7146_register_device(). There is a dereference of dev->vv_data in saa7146_vv_release(), which could lead to a NULL pointer dereference on failure of saa7146_vv_init(). Fix this bug by adding a check of saa7146_vv_init(). This bug was found by a static analyzer. The analysis employs differential checking to identify inconsistent security operations (e.g., checks or kfrees) between two code paths and confirms that the inconsistent operations are not recovered in the current function or the callers, so they constitute bugs. Note that, as a bug found by static analysis, it can be a false positive or hard to trigger. Multiple researchers have cross-reviewed the bug. Builds with CONFIG_VIDEO_HEXIUM_GEMINI=m show no new warnings, and our static analyzer no longer warns about this code. Link: https://lore.kernel.org/linux-media/20211203154030.111210-1-zhou1615@umn.edu Signed-off-by: Zhou Qingyang Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Sasha Levin --- drivers/media/common/saa7146/saa7146_fops.c | 2 +- drivers/media/pci/saa7146/hexium_gemini.c | 7 ++++++- 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/drivers/media/common/saa7146/saa7146_fops.c b/drivers/media/common/saa7146/saa7146_fops.c index aabb830e74689..4b332ea986168 100644 --- a/drivers/media/common/saa7146/saa7146_fops.c +++ b/drivers/media/common/saa7146/saa7146_fops.c @@ -525,7 +525,7 @@ int saa7146_vv_init(struct saa7146_dev* dev, struct saa7146_ext_vv *ext_vv) ERR("out of memory. aborting.\n"); kfree(vv); v4l2_ctrl_handler_free(hdl); - return -1; + return -ENOMEM; } saa7146_video_uops.init(dev,vv); diff --git a/drivers/media/pci/saa7146/hexium_gemini.c b/drivers/media/pci/saa7146/hexium_gemini.c index f962269306707..86d4e2abed82a 100644 --- a/drivers/media/pci/saa7146/hexium_gemini.c +++ b/drivers/media/pci/saa7146/hexium_gemini.c @@ -284,7 +284,12 @@ static int hexium_attach(struct saa7146_dev *dev, struct saa7146_pci_extension_d hexium_set_input(hexium, 0); hexium->cur_input = 0; - saa7146_vv_init(dev, &vv_data); + ret = saa7146_vv_init(dev, &vv_data); + if (ret) { + i2c_del_adapter(&hexium->i2c_adapter); + kfree(hexium); + return ret; + } vv_data.vid_ops.vidioc_enum_input = vidioc_enum_input; vv_data.vid_ops.vidioc_g_input = vidioc_g_input; -- 2.34.1