On 01/25/2018 01:25 PM, Dan Carpenter wrote:
> On Thu, Jan 25, 2018 at 10:58:45AM +0100, Andrzej Hajda wrote:
>> On 23.01.2018 09:32, Dan Carpenter wrote:
>>> Hello Andrzej Hajda,
>>>
>>> The patch 4d0b0ed63660: "[media] s5p-mfc: use MFC_BUF_FLAG_EOS to
>>> identify last buffers in decoder capture queue" from Oct 7, 2015,
>>> leads to the following static checker warning:
>>>
>>> drivers/media/platform/s5p-mfc/s5p_mfc_dec.c:658 vidioc_dqbuf()
>>> error: buffer overflow 'ctx->dst_bufs' 32 user_rl = '0-u32max'
>>>
>>> drivers/media/platform/s5p-mfc/s5p_mfc_dec.c
>>> 635 /* Dequeue a buffer */
>>> 636 static int vidioc_dqbuf(struct file *file, void *priv, struct
>>> v4l2_buffer *buf)
>>> 637 {
>>> 638 const struct v4l2_event ev = {
>>> 639 .type = V4L2_EVENT_EOS
>>> 640 };
>>> 641 struct s5p_mfc_ctx *ctx = fh_to_ctx(priv);
>>> 642 int ret;
>>> 643
>>> 644 if (ctx->state == MFCINST_ERROR) {
>>> 645 mfc_err_limited("Call on DQBUF after unrecoverable
>>> error\n");
>>> 646 return -EIO;
>>> 647 }
>>> 648
>>> 649 switch (buf->type) {
>>> 650 case V4L2_BUF_TYPE_VIDEO_OUTPUT_MPLANE:
>>> 651 return vb2_dqbuf(&ctx->vq_src, buf, file->f_flags &
>>> O_NONBLOCK);
>>> 652 case V4L2_BUF_TYPE_VIDEO_CAPTURE_MPLANE:
>>> 653 ret = vb2_dqbuf(&ctx->vq_dst, buf, file->f_flags &
>>> O_NONBLOCK);
>>> 654 if (ret)
>>> 655 return ret;
>>> 656
>>> 657 if (ctx->state == MFCINST_FINISHED &&
>>> 658 (ctx->dst_bufs[buf->index].flags &
>>> MFC_BUF_FLAG_EOS))
>>> ^^^^^^^^^^
>>> Smatch is complaining that "buf->index" is not capped. So far as I can
>>> see this is true. I would have expected it to be checked in
>>> check_array_args() or video_usercopy() but I couldn't find the check.
>>
>> I did not work in V4L2 area for long time, so I could be wrong, but I
>> hope the code is correct, below my explanation.
>> User provides only type, memory and reserved fields in buf, other fields
>> are filled by vb2_dqbuf (line 653) core function, ie index field is
>> copied from buffer which was queued by qbuf.
>> And vidioc_qbuf calls vb2_qbuf, which calls vb2_queue_or_prepare_buf,
>> which checks index bounds [1].
>>
>> So I suppose this code is correct.
>> Btw, I have also looked at other drivers and it looks omap driver
>> handles it incorrectly, ie it uses index field provided by user -
>> possible memory leak. CC Hans and Mauro, since there is no driver
>> maintainer of OMAP.
>>
>> Btw2, is it possible to check in smatch which fields of passed struct
>> given callback can read or fill ? For example here API restrict dqbuf
>> callback to read only three fields of buf, and fill the others.
>>
>> [1]:
>> http://elixir.free-electrons.com/linux/latest/source/drivers/media/v4l2-core/videobuf2-v4l2.c#L165
>> [2]:
>> http://elixir.free-electrons.com/linux/latest/source/drivers/media/platform/omap/omap_vout.c#L1520
>>
>> Regards
>> Andrzej
>
> Smatch does track the feilds... Smatch sees that buf->index is capped
> in vidioc_qbuf() but it still complains that buf->index gets set by the
> user in the ioctl and not checked before we use it vb2_dqbuf(). The
> call tree looks like this:
>
> --> video_usercopy()
> Copies _IOC_SIZE(cmd) bytes to parg. The _IOC_SIZE() is
> sizeof(struct v4l2_buffer) so all the feilds are reset. Smatch
> doesn't track how many bytes the users controls, it just marks
> everything in *parg as tainted but it doesn't matter in this case
> since all the feilds are set.
> video_usercopy() calls err = func(file, cmd, parg);
>
> --> __video_do_ioctl()
> calls info->u.func(ops, file, fh, arg);
>
> --> v4l_dqbuf()
> calls ops->vidioc_dqbuf(file, fh, p);
>
> --> vidioc_dqbuf()
> uses unchecked buf->index
>
> Ah... Hm. Is it the call to vb2_core_dqbuf() which limits buf->index?
> I don't see a path from vb2_core_dqbuf() to vb2_qbuf() but I may have
> missed it.
The __fill_v4l2_buffer() function in videobuf2-v4l2.c is called by
vb2_core_dqbuf().
And that __fill_v4l2_buffer() overwrited the index field: b->index = vb->index;
So after the vb2_dqbuf call the buf->index field is correct and bounded.
Regards,
Hans