Received: by 2002:a05:7412:7c14:b0:fa:6e18:a558 with SMTP id ii20csp265022rdb; Mon, 22 Jan 2024 03:37:32 -0800 (PST) X-Google-Smtp-Source: AGHT+IGN9LbQdu9APIrzrDPjFR/R/WkvetycrAuiSj0EVkIZ2SWVK1O8Q683ltN0NvUlUPD9hT8K X-Received: by 2002:ac8:5c8e:0:b0:42a:30c6:cf1e with SMTP id r14-20020ac85c8e000000b0042a30c6cf1emr5567480qta.77.1705923452509; Mon, 22 Jan 2024 03:37:32 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1705923452; cv=pass; d=google.com; s=arc-20160816; b=kcKzCRGFcZ96a9Fa5F2aHVJgzn4sdVIhA28rXo+18IBufoBlkqEpqfthEvNcXwFoZq a11P4UKMoKsDZpTGDR/09myFN5xePRI8znIAc6uX9Kzq4iJDUNOm4H1eGjLFeV5XrIbs rbCspmNmCAC9Hk5dlaoYBUtPiP0HPWv2T4sWettPPSiuuzpgl+hG3mQGGAjUTs9fwbge QPxnojksf24OJZFMpx033JoQ80rw0JGrsXRuSJNVqY8bReUu/FlEFo1omY0ol0n0RUtb iOtvdj/Laa8MLAdLNPF4JjG+ixQMX3FdUHHvH60n2toH2nqD7Yzhuq9PI9OEeW5/HU3a p0GA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from; bh=AZnwudqvvrY0kz+zqW65Hnl+mR8pdm4OmBtLiPNKs0g=; fh=Fy8CyAm968wbHRYfaUeF3f4KwGE2alsUOzzx6Mm/cTQ=; b=QXOV3iJO7fdL/g6gqg+L0qYdou1scWdOOavcL7yHAA5dWz/kntOSf0ewNCShoxZhfi fe1gqTJHcbW/HfcJv6Yh9ns60qSjQMhYCUpLg/v+8Pi6vOrGKI+yPRllMNAJtCR3a3B1 E/5leWZxpOpzpJanOvpHfREpdfl+d146X5seIFUKsI09TKFy9SHFpVev+E1CIxbCSwho 2PV23G/sgse3Y/AHSoeoA7UhqY6eFiBNUmfn0Qb7ymFppFVqUyTBpZS7QznBWZuWYTXi yIS/fGT20JFIji5+ZFghKfKr/8Xdz2VlTMZcV7m/yx79Og2SQ5SWOXlmjQEPVUn6NVOK 3GUA== ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=hust.edu.cn); spf=pass (google.com: domain of linux-kernel+bounces-32918-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-32918-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id c17-20020a37e111000000b007834885d561si5143401qkm.595.2024.01.22.03.37.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 22 Jan 2024 03:37:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-32918-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=hust.edu.cn); spf=pass (google.com: domain of linux-kernel+bounces-32918-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-32918-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 4E2D41C263C8 for ; Mon, 22 Jan 2024 11:36:56 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 3F4B547A5F; Mon, 22 Jan 2024 11:26:45 +0000 (UTC) Received: from zg8tmty3ljk5ljewns4xndka.icoremail.net (zg8tmty3ljk5ljewns4xndka.icoremail.net [167.99.105.149]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9D8D13FB0F; Mon, 22 Jan 2024 11:26:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=167.99.105.149 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705922804; cv=none; b=fNga8OoNwkuTr58zKl3AKbt114wHPjrKxDTvxu27nrdIESTsSa8Hw9OjTXf1mqWhVMr3k9EUW34ZA4DDUan5FPDwKnCNhXo1EQGXcka04dqVy+nEz3W914CagtkqgTTuc9W4ymgM3AeSNnc+lhV9gGw5rEJVd6P7pisEAZ8t1v0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705922804; c=relaxed/simple; bh=4MTzk8hRpsL1+wfg2XAn8qvaYkdX9cgM4ufqwTPlx6U=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=SpF/ucddlPVrf16O3OSdiI74hFRIY6QsapA6jtAhbUgHdY9YuGZjz9X3JgKvUA9msMPsJoUD2XfboOcqqjpw0IkYKdeAkF+X6+4x6mOIzwQlL8L9ZDM+09BHMFvzSfU79exRssQWHMtcdWPjUQmuksH1/XQelSdwJGryQGNKYU0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=hust.edu.cn; spf=pass smtp.mailfrom=hust.edu.cn; arc=none smtp.client-ip=167.99.105.149 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=hust.edu.cn Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=hust.edu.cn Received: from hust.edu.cn (unknown [172.16.0.50]) by app1 (Coremail) with SMTP id HgEQrACXmim7UK5lq3KtAQ--.37301S2; Mon, 22 Jan 2024 19:25:47 +0800 (CST) Received: from localhost.localdomain (unknown [10.12.190.56]) by gateway (Coremail) with SMTP id _____wCHJbasUK5lBlwmAA--.60615S2; Mon, 22 Jan 2024 19:25:47 +0800 (CST) From: Mingxuan Xiang To: Mauro Carvalho Chehab Cc: Dongliang Mu , Mingxuan Xiang , linux-media@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] media: usb: hackrf: add null ptr check in hackrf_ctrl_msg Date: Mon, 22 Jan 2024 19:22:10 +0800 Message-ID: <20240122112210.424698-1-mx_xiang@hust.edu.cn> X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-CM-TRANSID:HgEQrACXmim7UK5lq3KtAQ--.37301S2 Authentication-Results: app1; spf=neutral smtp.mail=mx_xiang@hust.edu. cn; X-Coremail-Antispam: 1UD129KBjvJXoWxAFyfCFWxXFW5Kr1kKF18uFg_yoW5Xw45pF yFyrZFkryrXry29wn7Jr1UWFyrZan3AFy5Wryfu395urs8Jw4xXF1jqayqgr4qkrZ2yF90 yF9YqrW3tF4UZaUanT9S1TB71UUUUU7qnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUU9Yb7Iv0xC_tr1lb4IE77IF4wAFc2x0x2IEx4CE42xK8VAvwI8I cIk0rVWrJVCq3wA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK021l84ACjcxK6xIIjx v20xvE14v26F1j6w1UM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26r4UJVWxJr1l84ACjcxK 6I8E87Iv67AKxVW0oVCq3wA2z4x0Y4vEx4A2jsIEc7CjxVAFwI0_GcCE3s1le2I262IYc4 CY6c8Ij28IcVAaY2xG8wAqjxCEc2xF0cIa020Ex4CE44I27wAqx4xG64xvF2IEw4CE5I8C rVC2j2WlYx0EF7xvrVAajcxG14v26r4UJVWxJr1lYx0E74AGY7Cv6cx26r4fZr1UJr1lYx 0Ec7CjxVAajcxG14v26F4j6r4UJwAm72CE4IkC6x0Yz7v_Jr0_Gr1lF7xvr2IYc2Ij64vI r41l42xK82IYc2Ij64vIr41l42xK82IY6x8ErcxFaVAv8VW8uFyUJr1UMxC20s026xCaFV Cjc4AY6r1j6r4UMI8I3I0E5I8CrVAFwI0_Jr0_Jr4lx2IqxVCjr7xvwVAFwI0_JrI_JrWl x4CE17CEb7AF67AKxVWUAVWUtwCIc40Y0x0EwIxGrwCI42IY6xIIjxv20xvE14v26r1j6r 1xMIIF0xvE2Ix0cI8IcVCY1x0267AKxVWUJVW8JwCI42IY6xAIw20EY4v20xvaj40_Jr0_ JF4lIxAIcVC2z280aVAFwI0_Jr0_Gr1lIxAIcVC2z280aVCY1x0267AKxVWUJVW8JbIYCT nIWIevJa73UjIFyTuYvjxUV1xRUUUUU X-CM-SenderInfo: jxsqimaruylmo6kx23oohg3hdfq/1tbiAQkEE2WtIjAvbQAAsH If the user yanks out the cable before closing the file, dev->udev would be set to NULL therefore causing a null-ptr-deref in hackrf_ctrl_msg issued by hackrf_stop_streaming. This patch adds a check in hackrf_ctrl_msg before using dev->udev. Found by modified syzkaller. BUG: KASAN: null-ptr-deref in hackrf_ctrl_msg+0x6d/0x180 drivers/media/usb/hackrf/hackrf.c:195 Read of size 4 at addr 0000000000000000 by task syz-executor/579 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x5e/0x7c lib/dump_stack.c:106 print_report.cold+0x49a/0x6bb mm/kasan/report.c:436 kasan_report+0xa8/0x130 mm/kasan/report.c:495 hackrf_ctrl_msg+0x6d/0x180 drivers/media/usb/hackrf/hackrf.c:195 hackrf_stop_streaming+0x45/0x140 drivers/media/usb/hackrf/hackrf.c:869 __vb2_queue_cancel+0x5c/0x550 drivers/media/common/videobuf2/videobuf2-core.c:1992 vb2_core_streamoff+0x2f/0xb0 drivers/media/common/videobuf2/videobuf2-core.c:2149 __vb2_cleanup_fileio+0x3e/0xa0 drivers/media/common/videobuf2/videobuf2-core.c:2710 vb2_core_queue_release+0x1a/0x50 drivers/media/common/videobuf2/videobuf2-core.c:2430 vb2_queue_release drivers/media/common/videobuf2/videobuf2-v4l2.c:947 [inline] _vb2_fop_release+0x110/0x140 drivers/media/common/videobuf2/videobuf2-v4l2.c:1132 v4l2_release+0x1b9/0x1e0 drivers/media/v4l2-core/v4l2-dev.c:459 __fput+0x12d/0x4b0 fs/file_table.c:320 task_work_run+0xa8/0xf0 kernel/task_work.c:177 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop kernel/entry/common.c:169 [inline] exit_to_user_mode_prepare+0x123/0x130 kernel/entry/common.c:201 __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline] syscall_exit_to_user_mode+0x22/0x50 kernel/entry/common.c:294 do_syscall_64+0x48/0x90 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd Signed-off-by: Mingxuan Xiang --- drivers/media/usb/hackrf/hackrf.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/media/usb/hackrf/hackrf.c b/drivers/media/usb/hackrf/hackrf.c index 9c0ecd5f056c..9588b8aa6e98 100644 --- a/drivers/media/usb/hackrf/hackrf.c +++ b/drivers/media/usb/hackrf/hackrf.c @@ -186,6 +186,11 @@ static int hackrf_ctrl_msg(struct hackrf_dev *dev, u8 request, u16 value, unsigned int pipe; u8 requesttype; + if (!dev->udev) { + pr_err("udev is null in %s\n", __func__); + ret = -EINVAL; + goto err; + } switch (request) { case CMD_SET_TRANSCEIVER_MODE: case CMD_SET_FREQ: -- 2.43.0