On Fri, Nov 27, 2020 at 8:24 AM Ardelean, Alexandru <alexandru.Ardelean@xxxxxxxxxx> wrote: > > > > > -----Original Message----- > > From: Colin Ian King <colin.king@xxxxxxxxxxxxx> > > Sent: Wednesday, November 25, 2020 4:37 PM > > To: Ardelean, Alexandru <alexandru.Ardelean@xxxxxxxxxx>; Jonathan > > Cameron <Jonathan.Cameron@xxxxxxxxxx> > > Subject: re: iio: adc: ad7298: rework external ref setup & remove platform data > > > > [External] > > > > Hi there, > > > > Static analysis with Coverity on Linux-next today found a potential null pointer > > dereference. I believe it was triggered by the following commit: > > > > commit 28963f2f6b46d75bda8fed15bd5ce9923427a40d > > Author: Alexandru Ardelean <alexandru.ardelean@xxxxxxxxxx> > > Date: Thu Oct 1 17:10:48 2020 +0300 > > > > iio: adc: ad7298: rework external ref setup & remove platform data > > > > ..however the issue may have existed before now and this change triggered the > > bug being found. > > > > The analysis is as follows: > > > > > > 282 static int ad7298_probe(struct spi_device *spi) > > 283 { > > 284 struct ad7298_state *st; > > 285 struct iio_dev *indio_dev; > > 286 int ret; > > 287 > > 288 indio_dev = devm_iio_device_alloc(&spi->dev, sizeof(*st)); > > > > 1. Condition indio_dev == NULL, taking false branch. > > > > 289 if (indio_dev == NULL) > > 290 return -ENOMEM; > > 291 > > 292 st = iio_priv(indio_dev); > > 293 > > 294 st->reg = devm_regulator_get_optional(&spi->dev, "vref"); > > > > 2. Condition !IS_ERR(st->reg), taking false branch. > > > > 295 if (!IS_ERR(st->reg)) { > > 296 st->ext_ref = AD7298_EXTREF; > > 297 } else { > > 298 ret = PTR_ERR(st->reg); > > > > 3. Condition ret != -19, taking false branch. > > > > 299 if (ret != -ENODEV) > > 300 return ret; > > 301 > > 302 st->reg = NULL; > > 303 } > > 304 > > > > 4. Condition st->reg, taking false branch. > > 5. var_compare_op: Comparing st->reg to null implies that st->reg might be > > null. > > > > 305 if (st->reg) { > > 306 ret = regulator_enable(st->reg); > > 307 if (ret) > > 308 return ret; > > 309 } > > 310 > > 311 spi_set_drvdata(spi, indio_dev); > > 312 > > 313 st->spi = spi; > > 314 > > 315 indio_dev->name = spi_get_device_id(spi)->name; > > 316 indio_dev->modes = INDIO_DIRECT_MODE; > > 317 indio_dev->channels = ad7298_channels; > > 318 indio_dev->num_channels = ARRAY_SIZE(ad7298_channels); > > 319 indio_dev->info = &ad7298_info; > > 320 > > 321 /* Setup default message */ > > 322 > > 323 st->scan_single_xfer[0].tx_buf = &st->tx_buf[0]; > > 324 st->scan_single_xfer[0].len = 2; > > 325 st->scan_single_xfer[0].cs_change = 1; > > 326 st->scan_single_xfer[1].tx_buf = &st->tx_buf[1]; > > 327 st->scan_single_xfer[1].len = 2; > > 328 st->scan_single_xfer[1].cs_change = 1; > > 329 st->scan_single_xfer[2].rx_buf = &st->rx_buf[0]; > > 330 st->scan_single_xfer[2].len = 2; > > 331 > > 332 spi_message_init(&st->scan_single_msg); > > 333 spi_message_add_tail(&st->scan_single_xfer[0], > > &st->scan_single_msg); > > 334 spi_message_add_tail(&st->scan_single_xfer[1], > > &st->scan_single_msg); > > 335 spi_message_add_tail(&st->scan_single_xfer[2], > > &st->scan_single_msg); > > 336 > > 337 ret = iio_triggered_buffer_setup(indio_dev, NULL, > > 338 &ad7298_trigger_handler, NULL); > > > > 6. Condition ret, taking true branch. > > > > 339 if (ret) > > > > 7. Jumping to label error_disable_reg. > > > > 340 goto error_disable_reg; > > 341 > > 342 ret = iio_device_register(indio_dev); > > 343 if (ret) > > 344 goto error_cleanup_ring; > > 345 > > 346 return 0; > > 347 > > 348 error_cleanup_ring: > > 349 iio_triggered_buffer_cleanup(indio_dev); > > 350 error_disable_reg: > > > > 8. Condition st->ext_ref, taking true branch. > > > > 351 if (st->ext_ref) > > > > Dereference after null check (FORWARD_NULL) > > 9. var_deref_model: Passing null pointer st->reg to regulator_disable, which > > dereferences it. > > > > 352 regulator_disable(st->reg); > > 353 > > 354 return ret; > > 355 } > > > > > > My initial thought was to just add: > > > > if (st->ext_ref && st->reg) > > regulator_disable(st_reg); > > > > ..however it may be just that the code in line 302 should be aborting earlier > > when the st->reg is set to NULL. I think a slightly better option would be to finalize the conversion to devm_ functions here. That way, we can cleanup/reduce some of the code. I do remember seeing that 'st->ext_ref' is being checked for some regulator_xxx() function calls, and that isn't pretty. But 'st->ext_ref' is zero when 'st->reg' is NULL. So, this is a bit of a false-positive (I think). I'll do the cleanup/conversion and then this should go away of coverity's radar. Thanks Alex > > > > Colin