Potentially invalid memory accesses in file drivers/media/v4l2-core/videobuf-core.c

2017-06-26 Thread Shaobo

Hi there,

My name is Shaobo He and I am a graduate student at University of Utah. 
I am using a static analysis tool to search for null pointer 
dereferences and came across a couple of potentially invalid memory 
accesses in the file drivers/media/v4l2-core/videobuf-core.c. Basically 
the expansion of the macro `CALL_PTR` is never examined although it can 
evaluate to NULL. The following is its definition and two uses:


#define CALLPTR(q, f, arg...)   \
((q->int_ops->f) ? q->int_ops->f(arg) : NULL)

static int __videobuf_copy_to_user(struct videobuf_queue *q,
   struct videobuf_buffer *buf,
   char __user *data, size_t count,
   int nonblocking)
{
void *vaddr = CALLPTR(q, vaddr, buf);

/* copy to userspace */
if (count > buf->size - q->read_off)
count = buf->size - q->read_off;

if (copy_to_user(data, vaddr + q->read_off, count))
return -EFAULT;

return count;
}

static int __videobuf_copy_stream(struct videobuf_queue *q,
  struct videobuf_buffer *buf,
  char __user *data, size_t count, size_t pos,
  int vbihack, int nonblocking)
{
unsigned int *fc = CALLPTR(q, vaddr, buf);

if (vbihack) {
/* dirty, undocumented hack -- pass the frame counter
* within the last four bytes of each vbi data block.
* We need that one to maintain backward compatibility
* to all vbi decoding software out there ... */
fc += (buf->size >> 2) - 1;
*fc = buf->field_count >> 1;
dprintk(1, "vbihack: %d\n", *fc);
}

/* copy stuff using the common method */
count = __videobuf_copy_to_user(q, buf, data, count, nonblocking);

if ((count == -EFAULT) && (pos == 0))
return -EFAULT;

return count;
}

Both of the two functions could contain invalid memory accesses. The 
second function `__videobuf_copy_stream` is more problematic since if 
`buf-?size >> 2` evaluates to 1, which seems not totally impossible to 
me, then a NULL pointer dereference would occur.


Please let me know if it makes sense. Thanks for your time and I am 
looking forward to your reply.


Shaobo


RE: Dead code in v4l2-mem2mem.c?

2017-02-20 Thread Shaobo
Hi Laurent,

I'd like to. It sounds interesting and useful to me. Could you give me some 
pointers about how to audit drivers?

Shaobo
-Original Message-
From: Laurent Pinchart [mailto:laurent.pinch...@ideasonboard.com] 
Sent: 2017年2月18日 3:54
To: Shaobo <sha...@cs.utah.edu>
Cc: linux-media@vger.kernel.org; mche...@kernel.org; hverk...@xs4all.nl; 
sakari.ai...@linux.intel.com; ricardo.riba...@gmail.com
Subject: Re: Dead code in v4l2-mem2mem.c?

Hi Shaobo,

On Friday 17 Feb 2017 11:42:25 Shaobo wrote:
> Hi Laurent,
> 
> Thanks a lot for your reply.
> 
> I would like to also point out the inconsistency of using 
> `v4l2_m2m_get_vq` inside drivers/media/v4l2-core/v4l2-mem2mem.c and 
> inside other files. It appears to me almost all call sites of 
> `v4l2_m2m_get_vq` in drivers/media/v4l2-core/v4l2-mem2mem.c does not 
> have NULL check afterwards while in other files (e.g., 
> drivers/media/platform/mx2_emmaprp.c) they do. I was wondering if there is 
> special assumption on this function in mem2mem.c.

I don't see any case where the function could reasonably be called with a NULL 
context other than a severe driver bug. This being said, we need to audit the 
callers to make sure that's really the case. Would you like to do so and submit 
a patch ? :-)

> -Original Message-
> From: Laurent Pinchart [mailto:laurent.pinch...@ideasonboard.com]
> Sent: 2017年2月17日 3:26
> To: Shaobo <sha...@cs.utah.edu>
> Cc: linux-media@vger.kernel.org; mche...@kernel.org; 
> hverk...@xs4all.nl; sakari.ai...@linux.intel.com; 
> ricardo.riba...@gmail.com
> Subject: Re: Dead code in v4l2-mem2mem.c?
> 
> Hi Shaobo,
> 
> First of all, could you please make sure you send future mails to the 
> linux- media mailing list in plain text only (no HTML) ? The mailing 
> list server rejects HTML e-mails.
> 
> On Thursday 16 Feb 2017 16:08:25 Shaobo wrote:
> > Hi there,
> > 
> > My name is Shaobo He and I am a graduate student at University of 
> > Utah. I am applying a static analysis tool to the Linux device 
> > drivers, looking for NULL pointer dereference and accidentally found 
> > a plausible dead code location in v4l2-mem2mem.c due to undefined behavior.
> > 
> > The following is the problematic code segment,
> > 
> > static struct v4l2_m2m_queue_ctx *get_queue_ctx(struct v4l2_m2m_ctx 
> > *m2m_ctx,
> > 
> >   enum v4l2_buf_type type)
> > 
> > {
> > 
> > if (V4L2_TYPE_IS_OUTPUT(type))
> > 
> > return _ctx->out_q_ctx;
> > 
> > else
> > 
> > return _ctx->cap_q_ctx;
> > 
> > }
> > 
> > struct vb2_queue *v4l2_m2m_get_vq(struct v4l2_m2m_ctx *m2m_ctx,
> > 
> > enum v4l2_buf_type type)
> > 
> > {
> > 
> > struct v4l2_m2m_queue_ctx *q_ctx;
> > 
> > q_ctx = get_queue_ctx(m2m_ctx, type);
> > if (!q_ctx)
> > 
> > return NULL;
> > 
> > return _ctx->q;
> > 
> > }
> > 
> > `get_queue_ctx` returns a pointer value that is an addition of the 
> > base pointer address (`m2m_ctx`) to a non-zero offset. The following 
> > is the definition of struct v4l2_m2m_ctx,
> > 
> > struct v4l2_m2m_ctx {
> > 
> > /* optional cap/out vb2 queues lock */
> > struct mutex*q_lock;
> > 
> > /* internal use only */
> > struct v4l2_m2m_dev *m2m_dev;
> > 
> > struct v4l2_m2m_queue_ctx   cap_q_ctx;
> > 
> > struct v4l2_m2m_queue_ctx   out_q_ctx;
> > 
> > /* For device job queue */
> > struct list_headqueue;
> > unsigned long   job_flags;
> > wait_queue_head_t   finished;
> > 
> > void*priv;
> > 
> > };
> > 
> > There is a NULL test in a caller of `get_queue_ctx` (line 85), which 
> > appears problematic to me. I'm not sure if it is defined or feasible 
> > under the context of Linux kernel. This blog
> > (https://wdtz.org/undefined-behavior-in-binutils-causes-segfault.htm
> > l) suggests that the NULL check can be optimized away because the 
> > only case that the return value can be NULL triggers pointer 
> > overflow, which is undefined.
> > 
> > Please let me know if it makes sense or not. Thanks for your time 
> > and I am looking forward to your reply.
> 
> The NULL check is indeed wrong. I believe that the m2m_ctx argument 
> passed to the v4l2_m2m_get_vq() function should never be NULL. We will 
> however need to audit drivers to make sure that's the case. The NULL 
> check could then be removed. Alternatively we could check m2m_ctx 
> above the get_queue_ctx() call, which wouldn't require auditing 
> drivers. It's a safe option, but would likely result in an unneeded NULL 
> check.
> 
> --
> Regards,
> 
> Laurent Pinchart

--
Regards,

Laurent Pinchart



Dead code or otherwise invalid memory access in drivers/media/v4l2-core/videobuf-core.c

2017-02-17 Thread Shaobo

Hey guys,

I found that the definition and usage of macro `CALLPTR` may be 
problematic. Its definition is,


54 #define CALLPTR(q, f, arg...)
   \

55 ((q->int_ops->f) ? q->int_ops->f(arg) : NULL)


, which means it can evaluate to NULL. It has two occurrences: one in 
line 839 and the other is line 856. It appears to me that it's very 
likely that there will be invalid memory accesses if `CALLPTR` evaluates 
to NULL since there is no NULL test in either location. In other words, 
programmers' assumption suggest the else branch of the conditional 
expression dead. Please let me know if makes sense or not.


Thanks for your time and I am looking forward to your reply.

Best,
Shaobo


RE: Dead code in v4l2-mem2mem.c?

2017-02-17 Thread Shaobo
Hi Laurent,

Thanks a lot for your reply.

I would like to also point out the inconsistency of using `v4l2_m2m_get_vq`
inside drivers/media/v4l2-core/v4l2-mem2mem.c and inside other files. It
appears to me almost all call sites of `v4l2_m2m_get_vq` in
drivers/media/v4l2-core/v4l2-mem2mem.c does not have NULL check afterwards
while in other files (e.g., drivers/media/platform/mx2_emmaprp.c) they do. I
was wondering if there is special assumption on this function in mem2mem.c.

Best,
Shaobo
-Original Message-
From: Laurent Pinchart [mailto:laurent.pinch...@ideasonboard.com] 
Sent: 2017年2月17日 3:26
To: Shaobo <sha...@cs.utah.edu>
Cc: linux-media@vger.kernel.org; mche...@kernel.org; hverk...@xs4all.nl;
sakari.ai...@linux.intel.com; ricardo.riba...@gmail.com
Subject: Re: Dead code in v4l2-mem2mem.c?

Hi Shaobo,

First of all, could you please make sure you send future mails to the linux-
media mailing list in plain text only (no HTML) ? The mailing list server
rejects HTML e-mails.

On Thursday 16 Feb 2017 16:08:25 Shaobo wrote:
> Hi there,
> 
> My name is Shaobo He and I am a graduate student at University of 
> Utah. I am applying a static analysis tool to the Linux device 
> drivers, looking for NULL pointer dereference and accidentally found a 
> plausible dead code location in v4l2-mem2mem.c due to undefined behavior.
> 
> The following is the problematic code segment,
> 
> static struct v4l2_m2m_queue_ctx *get_queue_ctx(struct v4l2_m2m_ctx 
> *m2m_ctx,
> enum v4l2_buf_type type)
> {
>   if (V4L2_TYPE_IS_OUTPUT(type))
>   return _ctx->out_q_ctx;
>   else
>   return _ctx->cap_q_ctx;
> }
> 
> struct vb2_queue *v4l2_m2m_get_vq(struct v4l2_m2m_ctx *m2m_ctx,
>   enum v4l2_buf_type type)
> {
>   struct v4l2_m2m_queue_ctx *q_ctx;
> 
>   q_ctx = get_queue_ctx(m2m_ctx, type);
>   if (!q_ctx)
>   return NULL;
> 
>   return _ctx->q;
> }
> 
> `get_queue_ctx` returns a pointer value that is an addition of the 
> base pointer address (`m2m_ctx`) to a non-zero offset. The following 
> is the definition of struct v4l2_m2m_ctx,
> 
> struct v4l2_m2m_ctx {
>   /* optional cap/out vb2 queues lock */
>   struct mutex*q_lock;
> 
>   /* internal use only */
>   struct v4l2_m2m_dev *m2m_dev;
> 
>   struct v4l2_m2m_queue_ctx   cap_q_ctx;
> 
>   struct v4l2_m2m_queue_ctx   out_q_ctx;
> 
>   /* For device job queue */
>   struct list_headqueue;
>   unsigned long   job_flags;
>   wait_queue_head_t   finished;
> 
>   void*priv;
> };
> 
> There is a NULL test in a caller of `get_queue_ctx` (line 85), which 
> appears problematic to me. I'm not sure if it is defined or feasible 
> under the context of Linux kernel. This blog
> (https://wdtz.org/undefined-behavior-in-binutils-causes-segfault.html)
> suggests that the NULL check can be optimized away because the only 
> case that the return value can be NULL triggers pointer overflow, 
> which is undefined.
> 
> Please let me know if it makes sense or not. Thanks for your time and 
> I am looking forward to your reply.

The NULL check is indeed wrong. I believe that the m2m_ctx argument passed
to the v4l2_m2m_get_vq() function should never be NULL. We will however need
to audit drivers to make sure that's the case. The NULL check could then be
removed. Alternatively we could check m2m_ctx above the get_queue_ctx()
call, which wouldn't require auditing drivers. It's a safe option, but would
likely result in an unneeded NULL check.

--
Regards,

Laurent Pinchart



Dead code in v4l2-mem2mem.c?

2017-02-16 Thread Shaobo

Hi there,

My name is Shaobo He and I am a graduate student at University of Utah. 
I am applying a static analysis tool to the Linux device drivers, 
looking for NULL pointer dereference and accidentally found a plausible 
dead code location in v4l2-mem2mem.c due to undefined behavior.


The following is the problematic code segment 
(drivers/media/v4l2-core/v4l2-mem2mem.c),


70 static struct v4l2_m2m_queue_ctx *get_queue_ctx(struct v4l2_m2m_ctx 
*m2m_ctx,
71 enum v4l2_buf_type 
type)

72 {
73 if (V4L2_TYPE_IS_OUTPUT(type))
74 return _ctx->out_q_ctx;
75 else
76 return _ctx->cap_q_ctx;
77 }
78
79 struct vb2_queue *v4l2_m2m_get_vq(struct v4l2_m2m_ctx *m2m_ctx,
80enum v4l2_buf_type type)
81 {
82 struct v4l2_m2m_queue_ctx *q_ctx;
83
84 q_ctx = get_queue_ctx(m2m_ctx, type);
85 if (!q_ctx)
86 return NULL;
87
88 return _ctx->q;
89 }


`get_queue_ctx` returns a pointer value that is an addition of the base 
pointer address (`m2m_ctx`) to a non-zero offset. The following is the 
definition of struct v4l2_m2m_ctx (include/media/v4l2-mem2mem.h),



94 struct v4l2_m2m_ctx {
95 /* optional cap/out vb2 queues lock */
96 struct mutex*q_lock;
97
98 /* internal use only */
99 struct v4l2_m2m_dev *m2m_dev;
100
101 struct v4l2_m2m_queue_ctx   cap_q_ctx;
102
103 struct v4l2_m2m_queue_ctx   out_q_ctx;
104
105 /* For device job queue */
106 struct list_headqueue;
107 unsigned long   job_flags;
108 wait_queue_head_t   finished;
109
110 void*priv;
111 };


There is a NULL test in a caller of `get_queue_ctx` (line 85), which 
appears problematic to me. I’m not sure if it is defined or feasible 
under the context of Linux kernel. This blog 
(https://wdtz.org/undefined-behavior-in-binutils-causes-segfault.html) 
suggests that the NULL check can be optimized away because the only case 
that the return value can be NULL triggers pointer overflow, which is 
undefined.


Please let me know if it makes sense or not. Thanks for your time and I 
am looking forward to your reply.


Best,
Shaobo