Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3649240pxb; Mon, 24 Jan 2022 14:24:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJw2dswNSwkCZHvnSctrFqbK+RCo9Jh38furKR9vBYFPIzLsnYMgC+FGRgwoJbAGMk4MLCLm X-Received: by 2002:a17:902:8ec6:b0:14a:c625:eb2d with SMTP id x6-20020a1709028ec600b0014ac625eb2dmr16231736plo.26.1643063067105; Mon, 24 Jan 2022 14:24:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643063067; cv=none; d=google.com; s=arc-20160816; b=NqRvbEFtuVSLyXuHtY5dnS8b/f1AuP55E1SJU3kfAL1BEbY0TstaWjSZIKNjdF52Xc cJTgstSTKpDeM18rH5AOnZktQiQZydFc9JfOsDQ9d1sHRP9LtTNj89yl7ufFwjxKkIAt A6Emw6Ta6dGjWfJCl+Pdlas2YajfyzqXbz4vMKvBoYR7xgVnUpbIrVMnKpWHP4BXLrTC QM+G5Zp1TtXfMqv7son5B4MsuaOoUk+5YlrAtGN0EkbxhGzFxaNJ60aiUGy9Dc6ZL2PX ykFGomtqxOdbpXBUKaqBAhdI/lU5xYm0JAUVX2SR006vRY/S4AmhnnZAKlndnR9YqrVc 5hnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=22DxtKofNVHhWbauilQFj8CEmHl2oQ46rXxH+jYkg2k=; b=fQts1gJHBkLS4ZAGPc9T7LQot237y9gretSYn00gDPDC9577L3pBqrUDWl4uj3Cpmu N/KaPxSyKBMq+xMmuLXxzUqYBKWZGRPngW2cz0rLDmA8lVpeJmmsPVurPA1B/zlVNq1B 4noVjLNNRY51ik/MrH3EZRc0Y6lrXGVgtyc0KOiAmIVykb0NV34lck1pRHW/48AuMFID TVch7ulSWHMe8IO0Jl1ZylezL1dg6u5y8mgdUs1oPoJH0qy9LYlEdJzp7J/gUMGLPYbI ti92RBaXP53b2JOTPu5DJV0qsD1ZmoQGydT6wcyniUmHdRuBhuTNHVYlooOGktwo1HQa uZRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wrrUq68Z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w13si14503589pgr.362.2022.01.24.14.24.15; Mon, 24 Jan 2022 14:24:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wrrUq68Z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1582977AbiAXWQQ (ORCPT + 99 others); Mon, 24 Jan 2022 17:16:16 -0500 Received: from dfw.source.kernel.org ([139.178.84.217]:46086 "EHLO dfw.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1376842AbiAXVZD (ORCPT ); Mon, 24 Jan 2022 16:25:03 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8B643614D7; Mon, 24 Jan 2022 21:25:01 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 487FEC340E4; Mon, 24 Jan 2022 21:25:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643059501; bh=JjoTPxcrsm13yYDz2X0aCGOrakWj/cvM4DjQzFBa75A=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wrrUq68ZvNYSLXpCyMmmOEPt6S2nnndrN8C+8jeQ/0jNVxNEGP9wwgQz8x9PVL75g RlxhW9AxX2zweNq5xKo5iR40jt7r6lugyiKbvVs0qG+15fkJyCEfBavWUYVyzEgLFJ Iiu7JuxHN2LNUXlyNV0EtRsAJ+o0lfxjORgkRYCY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Zhou Qingyang , Hans Verkuil , Mauro Carvalho Chehab , Sasha Levin Subject: [PATCH 5.16 0619/1039] media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() Date: Mon, 24 Jan 2022 19:40:08 +0100 Message-Id: <20220124184146.146218978@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124184125.121143506@linuxfoundation.org> References: <20220124184125.121143506@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Zhou Qingyang [ Upstream commit 348df8035301dd212e3cc2860efe4c86cb0d3303 ] In hexium_attach(dev, info), saa7146_vv_init() is called to allocate a new memory for dev->vv_data. In hexium_detach(), saa7146_vv_release() will be called and there is a dereference of dev->vv_data in saa7146_vv_release(), which could lead to a NULL pointer dereference on failure of saa7146_vv_init() according to the following logic. Both hexium_attach() and hexium_detach() are callback functions of the variable 'extension', so there exists a possible call chain directly from hexium_attach() to hexium_detach(): hexium_attach(dev, info) -- fail to alloc memory to dev->vv_data | in saa7146_vv_init(). | | hexium_detach() -- a dereference of dev->vv_data in saa7146_vv_release() Fix this bug by adding a check of saa7146_vv_init(). This bug was found by a static analyzer. The analysis employs differential checking to identify inconsistent security operations (e.g., checks or kfrees) between two code paths and confirms that the inconsistent operations are not recovered in the current function or the callers, so they constitute bugs. Note that, as a bug found by static analysis, it can be a false positive or hard to trigger. Multiple researchers have cross-reviewed the bug. Builds with CONFIG_VIDEO_HEXIUM_ORION=m show no new warnings, and our static analyzer no longer warns about this code. Signed-off-by: Zhou Qingyang Signed-off-by: Hans Verkuil Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Sasha Levin --- drivers/media/pci/saa7146/hexium_orion.c | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/drivers/media/pci/saa7146/hexium_orion.c b/drivers/media/pci/saa7146/hexium_orion.c index 39d14c179d229..2eb4bee16b71f 100644 --- a/drivers/media/pci/saa7146/hexium_orion.c +++ b/drivers/media/pci/saa7146/hexium_orion.c @@ -355,10 +355,16 @@ static struct saa7146_ext_vv vv_data; static int hexium_attach(struct saa7146_dev *dev, struct saa7146_pci_extension_data *info) { struct hexium *hexium = (struct hexium *) dev->ext_priv; + int ret; DEB_EE("\n"); - saa7146_vv_init(dev, &vv_data); + ret = saa7146_vv_init(dev, &vv_data); + if (ret) { + pr_err("Error in saa7146_vv_init()\n"); + return ret; + } + vv_data.vid_ops.vidioc_enum_input = vidioc_enum_input; vv_data.vid_ops.vidioc_g_input = vidioc_g_input; vv_data.vid_ops.vidioc_s_input = vidioc_s_input; -- 2.34.1