On Thu, Jan 25, 2018 at 10:58:45AM +0100, Andrzej Hajda wrote: > On 23.01.2018 09:32, Dan Carpenter wrote: > > Hello Andrzej Hajda, > > > > The patch 4d0b0ed63660: "[media] s5p-mfc: use MFC_BUF_FLAG_EOS to > > identify last buffers in decoder capture queue" from Oct 7, 2015, > > leads to the following static checker warning: > > > > drivers/media/platform/s5p-mfc/s5p_mfc_dec.c:658 vidioc_dqbuf() > > error: buffer overflow 'ctx->dst_bufs' 32 user_rl = '0-u32max' > > > > drivers/media/platform/s5p-mfc/s5p_mfc_dec.c > > 635 /* Dequeue a buffer */ > > 636 static int vidioc_dqbuf(struct file *file, void *priv, struct v4l2_buffer *buf) > > 637 { > > 638 const struct v4l2_event ev = { > > 639 .type = V4L2_EVENT_EOS > > 640 }; > > 641 struct s5p_mfc_ctx *ctx = fh_to_ctx(priv); > > 642 int ret; > > 643 > > 644 if (ctx->state == MFCINST_ERROR) { > > 645 mfc_err_limited("Call on DQBUF after unrecoverable error\n"); > > 646 return -EIO; > > 647 } > > 648 > > 649 switch (buf->type) { > > 650 case V4L2_BUF_TYPE_VIDEO_OUTPUT_MPLANE: > > 651 return vb2_dqbuf(&ctx->vq_src, buf, file->f_flags & O_NONBLOCK); > > 652 case V4L2_BUF_TYPE_VIDEO_CAPTURE_MPLANE: > > 653 ret = vb2_dqbuf(&ctx->vq_dst, buf, file->f_flags & O_NONBLOCK); > > 654 if (ret) > > 655 return ret; > > 656 > > 657 if (ctx->state == MFCINST_FINISHED && > > 658 (ctx->dst_bufs[buf->index].flags & MFC_BUF_FLAG_EOS)) > > ^^^^^^^^^^ > > Smatch is complaining that "buf->index" is not capped. So far as I can > > see this is true. I would have expected it to be checked in > > check_array_args() or video_usercopy() but I couldn't find the check. > > I did not work in V4L2 area for long time, so I could be wrong, but I > hope the code is correct, below my explanation. > User provides only type, memory and reserved fields in buf, other fields > are filled by vb2_dqbuf (line 653) core function, ie index field is > copied from buffer which was queued by qbuf. > And vidioc_qbuf calls vb2_qbuf, which calls vb2_queue_or_prepare_buf, > which checks index bounds [1]. > > So I suppose this code is correct. > Btw, I have also looked at other drivers and it looks omap driver > handles it incorrectly, ie it uses index field provided by user - > possible memory leak. CC Hans and Mauro, since there is no driver > maintainer of OMAP. > > Btw2, is it possible to check in smatch which fields of passed struct > given callback can read or fill ? For example here API restrict dqbuf > callback to read only three fields of buf, and fill the others. > > [1]: > http://elixir.free-electrons.com/linux/latest/source/drivers/media/v4l2-core/videobuf2-v4l2.c#L165 > [2]: > http://elixir.free-electrons.com/linux/latest/source/drivers/media/platform/omap/omap_vout.c#L1520 > > Regards > Andrzej Smatch does track the feilds... Smatch sees that buf->index is capped in vidioc_qbuf() but it still complains that buf->index gets set by the user in the ioctl and not checked before we use it vb2_dqbuf(). The call tree looks like this: --> video_usercopy() Copies _IOC_SIZE(cmd) bytes to parg. The _IOC_SIZE() is sizeof(struct v4l2_buffer) so all the feilds are reset. Smatch doesn't track how many bytes the users controls, it just marks everything in *parg as tainted but it doesn't matter in this case since all the feilds are set. video_usercopy() calls err = func(file, cmd, parg); --> __video_do_ioctl() calls info->u.func(ops, file, fh, arg); --> v4l_dqbuf() calls ops->vidioc_dqbuf(file, fh, p); --> vidioc_dqbuf() uses unchecked buf->index Ah... Hm. Is it the call to vb2_core_dqbuf() which limits buf->index? I don't see a path from vb2_core_dqbuf() to vb2_qbuf() but I may have missed it. regards, dan carpenter