re: spi: Add call to spi_slave_abort() function when spidev driver is released

From: Colin Ian King
Date: Thu Sep 26 2019 - 06:00:24 EST


Hi,

Static analysis with Coverity has detected an potential dereference of a
free'd object with commit:

commit 9f918a728cf86b2757b6a7025e1f46824bfe3155
Author: Lukasz Majewski <lukma@xxxxxxx>
Date: Wed Sep 25 11:11:42 2019 +0200

spi: Add call to spi_slave_abort() function when spidev driver is
released

In spidev_release() in drivers/spi/spidev.c the analysis is as follows:

600static int spidev_release(struct inode *inode, struct file *filp)
601{
602 struct spidev_data *spidev;
603
604 mutex_lock(&device_list_lock);

1. alias: Assigning: spidev = filp->private_data. Now both point to
the same storage.

605 spidev = filp->private_data;
606 filp->private_data = NULL;
607
608 /* last close? */
609 spidev->users--;

2. Condition !spidev->users, taking true branch.

610 if (!spidev->users) {
611 int dofree;
612
613 kfree(spidev->tx_buffer);
614 spidev->tx_buffer = NULL;
615
616 kfree(spidev->rx_buffer);
617 spidev->rx_buffer = NULL;
618
619 spin_lock_irq(&spidev->spi_lock);

3. Condition spidev->spi, taking false branch.

620 if (spidev->spi)
621 spidev->speed_hz = spidev->spi->max_speed_hz;
622
623 /* ... after we unbound from the underlying device? */

4. Condition spidev->spi == NULL, taking true branch.

624 dofree = (spidev->spi == NULL);
625 spin_unlock_irq(&spidev->spi_lock);
626

5. Condition dofree, taking true branch.

627 if (dofree)

6. freed_arg: kfree frees spidev.

628 kfree(spidev);
629 }
630#ifdef CONFIG_SPI_SLAVE

CID 89726 (#1 of 1): Read from pointer after free (USE_AFTER_FREE)
7. deref_after_free: Dereferencing freed pointer spidev.

631 spi_slave_abort(spidev->spi);
632#endif
633 mutex_unlock(&device_list_lock);
634
635 return 0;
636}

The call to spi_slave_abort() on spidev is reading an earlier kfree'd
spidev.

Colin