--- /dev/null
+From 43a6684519ab0a6c52024b5e25322476cabad893 Mon Sep 17 00:00:00 2001
+From: Eric Dumazet <edumazet@google.com>
+Date: Fri, 24 Mar 2017 19:36:13 -0700
+Subject: ping: implement proper locking
+
+From: Eric Dumazet <edumazet@google.com>
+
+commit 43a6684519ab0a6c52024b5e25322476cabad893 upstream.
+
+We got a report of yet another bug in ping
+
+http://www.openwall.com/lists/oss-security/2017/03/24/6
+
+->disconnect() is not called with socket lock held.
+
+Fix this by acquiring ping rwlock earlier.
+
+Thanks to Daniel, Alexander and Andrey for letting us know this problem.
+
+Fixes: c319b4d76b9e ("net: ipv4: add IPPROTO_ICMP socket kind")
+Signed-off-by: Eric Dumazet <edumazet@google.com>
+Reported-by: Daniel Jiang <danieljiang0415@gmail.com>
+Reported-by: Solar Designer <solar@openwall.com>
+Reported-by: Andrey Konovalov <andreyknvl@google.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Cc: Ben Hutchings <ben.hutchings@codethink.co.uk>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ net/ipv4/ping.c | 5 +++--
+ 1 file changed, 3 insertions(+), 2 deletions(-)
+
+--- a/net/ipv4/ping.c
++++ b/net/ipv4/ping.c
+@@ -154,17 +154,18 @@ void ping_hash(struct sock *sk)
+ void ping_unhash(struct sock *sk)
+ {
+ struct inet_sock *isk = inet_sk(sk);
++
+ pr_debug("ping_unhash(isk=%p,isk->num=%u)\n", isk, isk->inet_num);
++ write_lock_bh(&ping_table.lock);
+ if (sk_hashed(sk)) {
+- write_lock_bh(&ping_table.lock);
+ hlist_nulls_del(&sk->sk_nulls_node);
+ sk_nulls_node_init(&sk->sk_nulls_node);
+ sock_put(sk);
+ isk->inet_num = 0;
+ isk->inet_sport = 0;
+ sock_prot_inuse_add(sock_net(sk), sk->sk_prot, -1);
+- write_unlock_bh(&ping_table.lock);
+ }
++ write_unlock_bh(&ping_table.lock);
+ }
+ EXPORT_SYMBOL_GPL(ping_unhash);
+
mips-ralink-cosmetic-change-to-prom_init.patch
kconfig-tinyconfig-provide-whole-choice-blocks-to-avoid-warnings.patch
arm-8383-1-nommu-avoid-deprecated-source-register-on-mov.patch
+xc2028-avoid-use-after-free.patch
+vfio-pci-fix-integer-overflows-bitmask-check.patch
+staging-android-ion-fix-a-race-condition-in-the-ion-driver.patch
+ping-implement-proper-locking.patch
--- /dev/null
+From 9590232bb4f4cc824f3425a6e1349afbe6d6d2b7 Mon Sep 17 00:00:00 2001
+From: EunTaik Lee <eun.taik.lee@samsung.com>
+Date: Wed, 24 Feb 2016 04:38:06 +0000
+Subject: staging/android/ion : fix a race condition in the ion driver
+
+From: EunTaik Lee <eun.taik.lee@samsung.com>
+
+commit 9590232bb4f4cc824f3425a6e1349afbe6d6d2b7 upstream.
+
+There is a use-after-free problem in the ion driver.
+This is caused by a race condition in the ion_ioctl()
+function.
+
+A handle has ref count of 1 and two tasks on different
+cpus calls ION_IOC_FREE simultaneously.
+
+cpu 0 cpu 1
+-------------------------------------------------------
+ion_handle_get_by_id()
+(ref == 2)
+ ion_handle_get_by_id()
+ (ref == 3)
+
+ion_free()
+(ref == 2)
+
+ion_handle_put()
+(ref == 1)
+
+ ion_free()
+ (ref == 0 so ion_handle_destroy() is
+ called
+ and the handle is freed.)
+
+ ion_handle_put() is called and it
+ decreases the slub's next free pointer
+
+The problem is detected as an unaligned access in the
+spin lock functions since it uses load exclusive
+ instruction. In some cases it corrupts the slub's
+free pointer which causes a mis-aligned access to the
+next free pointer.(kmalloc returns a pointer like
+ffffc0745b4580aa). And it causes lots of other
+hard-to-debug problems.
+
+This symptom is caused since the first member in the
+ion_handle structure is the reference count and the
+ion driver decrements the reference after it has been
+freed.
+
+To fix this problem client->lock mutex is extended
+to protect all the codes that uses the handle.
+
+Signed-off-by: Eun Taik Lee <eun.taik.lee@samsung.com>
+Reviewed-by: Laura Abbott <labbott@redhat.com>
+Cc: Ben Hutchings <ben.hutchings@codethink.co.uk>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+index 7ff2a7ec871f..33b390e7ea31
+---
+ drivers/staging/android/ion/ion.c | 55 +++++++++++++++++++++++++++++---------
+ 1 file changed, 42 insertions(+), 13 deletions(-)
+
+--- a/drivers/staging/android/ion/ion.c
++++ b/drivers/staging/android/ion/ion.c
+@@ -389,13 +389,22 @@ static void ion_handle_get(struct ion_ha
+ kref_get(&handle->ref);
+ }
+
+-static int ion_handle_put(struct ion_handle *handle)
++static int ion_handle_put_nolock(struct ion_handle *handle)
++{
++ int ret;
++
++ ret = kref_put(&handle->ref, ion_handle_destroy);
++
++ return ret;
++}
++
++int ion_handle_put(struct ion_handle *handle)
+ {
+ struct ion_client *client = handle->client;
+ int ret;
+
+ mutex_lock(&client->lock);
+- ret = kref_put(&handle->ref, ion_handle_destroy);
++ ret = ion_handle_put_nolock(handle);
+ mutex_unlock(&client->lock);
+
+ return ret;
+@@ -419,20 +428,30 @@ static struct ion_handle *ion_handle_loo
+ return ERR_PTR(-EINVAL);
+ }
+
+-static struct ion_handle *ion_handle_get_by_id(struct ion_client *client,
++static struct ion_handle *ion_handle_get_by_id_nolock(struct ion_client *client,
+ int id)
+ {
+ struct ion_handle *handle;
+
+- mutex_lock(&client->lock);
+ handle = idr_find(&client->idr, id);
+ if (handle)
+ ion_handle_get(handle);
+- mutex_unlock(&client->lock);
+
+ return handle ? handle : ERR_PTR(-EINVAL);
+ }
+
++struct ion_handle *ion_handle_get_by_id(struct ion_client *client,
++ int id)
++{
++ struct ion_handle *handle;
++
++ mutex_lock(&client->lock);
++ handle = ion_handle_get_by_id_nolock(client, id);
++ mutex_unlock(&client->lock);
++
++ return handle;
++}
++
+ static bool ion_handle_validate(struct ion_client *client,
+ struct ion_handle *handle)
+ {
+@@ -534,22 +553,28 @@ struct ion_handle *ion_alloc(struct ion_
+ }
+ EXPORT_SYMBOL(ion_alloc);
+
+-void ion_free(struct ion_client *client, struct ion_handle *handle)
++static void ion_free_nolock(struct ion_client *client, struct ion_handle *handle)
+ {
+ bool valid_handle;
+
+ BUG_ON(client != handle->client);
+
+- mutex_lock(&client->lock);
+ valid_handle = ion_handle_validate(client, handle);
+
+ if (!valid_handle) {
+ WARN(1, "%s: invalid handle passed to free.\n", __func__);
+- mutex_unlock(&client->lock);
+ return;
+ }
++ ion_handle_put_nolock(handle);
++}
++
++void ion_free(struct ion_client *client, struct ion_handle *handle)
++{
++ BUG_ON(client != handle->client);
++
++ mutex_lock(&client->lock);
++ ion_free_nolock(client, handle);
+ mutex_unlock(&client->lock);
+- ion_handle_put(handle);
+ }
+ EXPORT_SYMBOL(ion_free);
+
+@@ -1278,11 +1303,15 @@ static long ion_ioctl(struct file *filp,
+ {
+ struct ion_handle *handle;
+
+- handle = ion_handle_get_by_id(client, data.handle.handle);
+- if (IS_ERR(handle))
++ mutex_lock(&client->lock);
++ handle = ion_handle_get_by_id_nolock(client, data.handle.handle);
++ if (IS_ERR(handle)) {
++ mutex_unlock(&client->lock);
+ return PTR_ERR(handle);
+- ion_free(client, handle);
+- ion_handle_put(handle);
++ }
++ ion_free_nolock(client, handle);
++ ion_handle_put_nolock(handle);
++ mutex_unlock(&client->lock);
+ break;
+ }
+ case ION_IOC_SHARE:
--- /dev/null
+From 05692d7005a364add85c6e25a6c4447ce08f913a Mon Sep 17 00:00:00 2001
+From: Vlad Tsyrklevich <vlad@tsyrklevich.net>
+Date: Wed, 12 Oct 2016 18:51:24 +0200
+Subject: vfio/pci: Fix integer overflows, bitmask check
+
+From: Vlad Tsyrklevich <vlad@tsyrklevich.net>
+
+commit 05692d7005a364add85c6e25a6c4447ce08f913a upstream.
+
+The VFIO_DEVICE_SET_IRQS ioctl did not sufficiently sanitize
+user-supplied integers, potentially allowing memory corruption. This
+patch adds appropriate integer overflow checks, checks the range bounds
+for VFIO_IRQ_SET_DATA_NONE, and also verifies that only single element
+in the VFIO_IRQ_SET_DATA_TYPE_MASK bitmask is set.
+VFIO_IRQ_SET_ACTION_TYPE_MASK is already correctly checked later in
+vfio_pci_set_irqs_ioctl().
+
+Furthermore, a kzalloc is changed to a kcalloc because the use of a
+kzalloc with an integer multiplication allowed an integer overflow
+condition to be reached without this patch. kcalloc checks for overflow
+and should prevent a similar occurrence.
+
+Signed-off-by: Vlad Tsyrklevich <vlad@tsyrklevich.net>
+Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
+Cc: Ben Hutchings <ben.hutchings@codethink.co.uk>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/vfio/pci/vfio_pci.c | 35 ++++++++++++++++++++++-------------
+ drivers/vfio/pci/vfio_pci_intrs.c | 2 +-
+ 2 files changed, 23 insertions(+), 14 deletions(-)
+
+--- a/drivers/vfio/pci/vfio_pci.c
++++ b/drivers/vfio/pci/vfio_pci.c
+@@ -489,8 +489,9 @@ static long vfio_pci_ioctl(void *device_
+
+ } else if (cmd == VFIO_DEVICE_SET_IRQS) {
+ struct vfio_irq_set hdr;
++ size_t size;
+ u8 *data = NULL;
+- int ret = 0;
++ int max, ret = 0;
+
+ minsz = offsetofend(struct vfio_irq_set, count);
+
+@@ -498,23 +499,31 @@ static long vfio_pci_ioctl(void *device_
+ return -EFAULT;
+
+ if (hdr.argsz < minsz || hdr.index >= VFIO_PCI_NUM_IRQS ||
++ hdr.count >= (U32_MAX - hdr.start) ||
+ hdr.flags & ~(VFIO_IRQ_SET_DATA_TYPE_MASK |
+ VFIO_IRQ_SET_ACTION_TYPE_MASK))
+ return -EINVAL;
+
+- if (!(hdr.flags & VFIO_IRQ_SET_DATA_NONE)) {
+- size_t size;
+- int max = vfio_pci_get_irq_count(vdev, hdr.index);
+-
+- if (hdr.flags & VFIO_IRQ_SET_DATA_BOOL)
+- size = sizeof(uint8_t);
+- else if (hdr.flags & VFIO_IRQ_SET_DATA_EVENTFD)
+- size = sizeof(int32_t);
+- else
+- return -EINVAL;
++ max = vfio_pci_get_irq_count(vdev, hdr.index);
++ if (hdr.start >= max || hdr.start + hdr.count > max)
++ return -EINVAL;
++
++ switch (hdr.flags & VFIO_IRQ_SET_DATA_TYPE_MASK) {
++ case VFIO_IRQ_SET_DATA_NONE:
++ size = 0;
++ break;
++ case VFIO_IRQ_SET_DATA_BOOL:
++ size = sizeof(uint8_t);
++ break;
++ case VFIO_IRQ_SET_DATA_EVENTFD:
++ size = sizeof(int32_t);
++ break;
++ default:
++ return -EINVAL;
++ }
+
+- if (hdr.argsz - minsz < hdr.count * size ||
+- hdr.start >= max || hdr.start + hdr.count > max)
++ if (size) {
++ if (hdr.argsz - minsz < hdr.count * size)
+ return -EINVAL;
+
+ data = memdup_user((void __user *)(arg + minsz),
+--- a/drivers/vfio/pci/vfio_pci_intrs.c
++++ b/drivers/vfio/pci/vfio_pci_intrs.c
+@@ -466,7 +466,7 @@ static int vfio_msi_enable(struct vfio_p
+ if (!is_irq_none(vdev))
+ return -EINVAL;
+
+- vdev->ctx = kzalloc(nvec * sizeof(struct vfio_pci_irq_ctx), GFP_KERNEL);
++ vdev->ctx = kcalloc(nvec, sizeof(struct vfio_pci_irq_ctx), GFP_KERNEL);
+ if (!vdev->ctx)
+ return -ENOMEM;
+
--- /dev/null
+From 8dfbcc4351a0b6d2f2d77f367552f48ffefafe18 Mon Sep 17 00:00:00 2001
+From: Mauro Carvalho Chehab <mchehab@osg.samsung.com>
+Date: Thu, 28 Jan 2016 09:22:44 -0200
+Subject: [media] xc2028: avoid use after free
+
+From: Mauro Carvalho Chehab <mchehab@osg.samsung.com>
+
+commit 8dfbcc4351a0b6d2f2d77f367552f48ffefafe18 upstream.
+
+If struct xc2028_config is passed without a firmware name,
+the following trouble may happen:
+
+[11009.907205] xc2028 5-0061: type set to XCeive xc2028/xc3028 tuner
+[11009.907491] ==================================================================
+[11009.907750] BUG: KASAN: use-after-free in strcmp+0x96/0xb0 at addr ffff8803bd78ab40
+[11009.907992] Read of size 1 by task modprobe/28992
+[11009.907994] =============================================================================
+[11009.907997] BUG kmalloc-16 (Tainted: G W ): kasan: bad access detected
+[11009.907999] -----------------------------------------------------------------------------
+
+[11009.908008] INFO: Allocated in xhci_urb_enqueue+0x214/0x14c0 [xhci_hcd] age=0 cpu=3 pid=28992
+[11009.908012] ___slab_alloc+0x581/0x5b0
+[11009.908014] __slab_alloc+0x51/0x90
+[11009.908017] __kmalloc+0x27b/0x350
+[11009.908022] xhci_urb_enqueue+0x214/0x14c0 [xhci_hcd]
+[11009.908026] usb_hcd_submit_urb+0x1e8/0x1c60
+[11009.908029] usb_submit_urb+0xb0e/0x1200
+[11009.908032] usb_serial_generic_write_start+0xb6/0x4c0
+[11009.908035] usb_serial_generic_write+0x92/0xc0
+[11009.908039] usb_console_write+0x38a/0x560
+[11009.908045] call_console_drivers.constprop.14+0x1ee/0x2c0
+[11009.908051] console_unlock+0x40d/0x900
+[11009.908056] vprintk_emit+0x4b4/0x830
+[11009.908061] vprintk_default+0x1f/0x30
+[11009.908064] printk+0x99/0xb5
+[11009.908067] kasan_report_error+0x10a/0x550
+[11009.908070] __asan_report_load1_noabort+0x43/0x50
+[11009.908074] INFO: Freed in xc2028_set_config+0x90/0x630 [tuner_xc2028] age=1 cpu=3 pid=28992
+[11009.908077] __slab_free+0x2ec/0x460
+[11009.908080] kfree+0x266/0x280
+[11009.908083] xc2028_set_config+0x90/0x630 [tuner_xc2028]
+[11009.908086] xc2028_attach+0x310/0x8a0 [tuner_xc2028]
+[11009.908090] em28xx_attach_xc3028.constprop.7+0x1f9/0x30d [em28xx_dvb]
+[11009.908094] em28xx_dvb_init.part.3+0x8e4/0x5cf4 [em28xx_dvb]
+[11009.908098] em28xx_dvb_init+0x81/0x8a [em28xx_dvb]
+[11009.908101] em28xx_register_extension+0xd9/0x190 [em28xx]
+[11009.908105] em28xx_dvb_register+0x10/0x1000 [em28xx_dvb]
+[11009.908108] do_one_initcall+0x141/0x300
+[11009.908111] do_init_module+0x1d0/0x5ad
+[11009.908114] load_module+0x6666/0x9ba0
+[11009.908117] SyS_finit_module+0x108/0x130
+[11009.908120] entry_SYSCALL_64_fastpath+0x16/0x76
+[11009.908123] INFO: Slab 0xffffea000ef5e280 objects=25 used=25 fp=0x (null) flags=0x2ffff8000004080
+[11009.908126] INFO: Object 0xffff8803bd78ab40 @offset=2880 fp=0x0000000000000001
+
+[11009.908130] Bytes b4 ffff8803bd78ab30: 01 00 00 00 2a 07 00 00 9d 28 00 00 01 00 00 00 ....*....(......
+[11009.908133] Object ffff8803bd78ab40: 01 00 00 00 00 00 00 00 b0 1d c3 6a 00 88 ff ff ...........j....
+[11009.908137] CPU: 3 PID: 28992 Comm: modprobe Tainted: G B W 4.5.0-rc1+ #43
+[11009.908140] Hardware name: /NUC5i7RYB, BIOS RYBDWi35.86A.0350.2015.0812.1722 08/12/2015
+[11009.908142] ffff8803bd78a000 ffff8802c273f1b8 ffffffff81932007 ffff8803c6407a80
+[11009.908148] ffff8802c273f1e8 ffffffff81556759 ffff8803c6407a80 ffffea000ef5e280
+[11009.908153] ffff8803bd78ab40 dffffc0000000000 ffff8802c273f210 ffffffff8155ccb4
+[11009.908158] Call Trace:
+[11009.908162] [<ffffffff81932007>] dump_stack+0x4b/0x64
+[11009.908165] [<ffffffff81556759>] print_trailer+0xf9/0x150
+[11009.908168] [<ffffffff8155ccb4>] object_err+0x34/0x40
+[11009.908171] [<ffffffff8155f260>] kasan_report_error+0x230/0x550
+[11009.908175] [<ffffffff81237d71>] ? trace_hardirqs_off_caller+0x21/0x290
+[11009.908179] [<ffffffff8155e926>] ? kasan_unpoison_shadow+0x36/0x50
+[11009.908182] [<ffffffff8155f5c3>] __asan_report_load1_noabort+0x43/0x50
+[11009.908185] [<ffffffff8155ea00>] ? __asan_register_globals+0x50/0xa0
+[11009.908189] [<ffffffff8194cea6>] ? strcmp+0x96/0xb0
+[11009.908192] [<ffffffff8194cea6>] strcmp+0x96/0xb0
+[11009.908196] [<ffffffffa13ba4ac>] xc2028_set_config+0x15c/0x630 [tuner_xc2028]
+[11009.908200] [<ffffffffa13bac90>] xc2028_attach+0x310/0x8a0 [tuner_xc2028]
+[11009.908203] [<ffffffff8155ea78>] ? memset+0x28/0x30
+[11009.908206] [<ffffffffa13ba980>] ? xc2028_set_config+0x630/0x630 [tuner_xc2028]
+[11009.908211] [<ffffffffa157a59a>] em28xx_attach_xc3028.constprop.7+0x1f9/0x30d [em28xx_dvb]
+[11009.908215] [<ffffffffa157aa2a>] ? em28xx_dvb_init.part.3+0x37c/0x5cf4 [em28xx_dvb]
+[11009.908219] [<ffffffffa157a3a1>] ? hauppauge_hvr930c_init+0x487/0x487 [em28xx_dvb]
+[11009.908222] [<ffffffffa01795ac>] ? lgdt330x_attach+0x1cc/0x370 [lgdt330x]
+[11009.908226] [<ffffffffa01793e0>] ? i2c_read_demod_bytes.isra.2+0x210/0x210 [lgdt330x]
+[11009.908230] [<ffffffff812e87d0>] ? ref_module.part.15+0x10/0x10
+[11009.908233] [<ffffffff812e56e0>] ? module_assert_mutex_or_preempt+0x80/0x80
+[11009.908238] [<ffffffffa157af92>] em28xx_dvb_init.part.3+0x8e4/0x5cf4 [em28xx_dvb]
+[11009.908242] [<ffffffffa157a6ae>] ? em28xx_attach_xc3028.constprop.7+0x30d/0x30d [em28xx_dvb]
+[11009.908245] [<ffffffff8195222d>] ? string+0x14d/0x1f0
+[11009.908249] [<ffffffff8195381f>] ? symbol_string+0xff/0x1a0
+[11009.908253] [<ffffffff81953720>] ? uuid_string+0x6f0/0x6f0
+[11009.908257] [<ffffffff811a775e>] ? __kernel_text_address+0x7e/0xa0
+[11009.908260] [<ffffffff8104b02f>] ? print_context_stack+0x7f/0xf0
+[11009.908264] [<ffffffff812e9846>] ? __module_address+0xb6/0x360
+[11009.908268] [<ffffffff8137fdc9>] ? is_ftrace_trampoline+0x99/0xe0
+[11009.908271] [<ffffffff811a775e>] ? __kernel_text_address+0x7e/0xa0
+[11009.908275] [<ffffffff81240a70>] ? debug_check_no_locks_freed+0x290/0x290
+[11009.908278] [<ffffffff8104a24b>] ? dump_trace+0x11b/0x300
+[11009.908282] [<ffffffffa13e8143>] ? em28xx_register_extension+0x23/0x190 [em28xx]
+[11009.908285] [<ffffffff81237d71>] ? trace_hardirqs_off_caller+0x21/0x290
+[11009.908289] [<ffffffff8123ff56>] ? trace_hardirqs_on_caller+0x16/0x590
+[11009.908292] [<ffffffff812404dd>] ? trace_hardirqs_on+0xd/0x10
+[11009.908296] [<ffffffffa13e8143>] ? em28xx_register_extension+0x23/0x190 [em28xx]
+[11009.908299] [<ffffffff822dcbb0>] ? mutex_trylock+0x400/0x400
+[11009.908302] [<ffffffff810021a1>] ? do_one_initcall+0x131/0x300
+[11009.908306] [<ffffffff81296dc7>] ? call_rcu_sched+0x17/0x20
+[11009.908309] [<ffffffff8159e708>] ? put_object+0x48/0x70
+[11009.908314] [<ffffffffa1579f11>] em28xx_dvb_init+0x81/0x8a [em28xx_dvb]
+[11009.908317] [<ffffffffa13e81f9>] em28xx_register_extension+0xd9/0x190 [em28xx]
+[11009.908320] [<ffffffffa0150000>] ? 0xffffffffa0150000
+[11009.908324] [<ffffffffa0150010>] em28xx_dvb_register+0x10/0x1000 [em28xx_dvb]
+[11009.908327] [<ffffffff810021b1>] do_one_initcall+0x141/0x300
+[11009.908330] [<ffffffff81002070>] ? try_to_run_init_process+0x40/0x40
+[11009.908333] [<ffffffff8123ff56>] ? trace_hardirqs_on_caller+0x16/0x590
+[11009.908337] [<ffffffff8155e926>] ? kasan_unpoison_shadow+0x36/0x50
+[11009.908340] [<ffffffff8155e926>] ? kasan_unpoison_shadow+0x36/0x50
+[11009.908343] [<ffffffff8155e926>] ? kasan_unpoison_shadow+0x36/0x50
+[11009.908346] [<ffffffff8155ea37>] ? __asan_register_globals+0x87/0xa0
+[11009.908350] [<ffffffff8144da7b>] do_init_module+0x1d0/0x5ad
+[11009.908353] [<ffffffff812f2626>] load_module+0x6666/0x9ba0
+[11009.908356] [<ffffffff812e9c90>] ? symbol_put_addr+0x50/0x50
+[11009.908361] [<ffffffffa1580037>] ? em28xx_dvb_init.part.3+0x5989/0x5cf4 [em28xx_dvb]
+[11009.908366] [<ffffffff812ebfc0>] ? module_frob_arch_sections+0x20/0x20
+[11009.908369] [<ffffffff815bc940>] ? open_exec+0x50/0x50
+[11009.908374] [<ffffffff811671bb>] ? ns_capable+0x5b/0xd0
+[11009.908377] [<ffffffff812f5e58>] SyS_finit_module+0x108/0x130
+[11009.908379] [<ffffffff812f5d50>] ? SyS_init_module+0x1f0/0x1f0
+[11009.908383] [<ffffffff81004044>] ? lockdep_sys_exit_thunk+0x12/0x14
+[11009.908394] [<ffffffff822e6936>] entry_SYSCALL_64_fastpath+0x16/0x76
+[11009.908396] Memory state around the buggy address:
+[11009.908398] ffff8803bd78aa00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
+[11009.908401] ffff8803bd78aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
+[11009.908403] >ffff8803bd78ab00: fc fc fc fc fc fc fc fc 00 00 fc fc fc fc fc fc
+[11009.908405] ^
+[11009.908407] ffff8803bd78ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
+[11009.908409] ffff8803bd78ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
+[11009.908411] ==================================================================
+
+In order to avoid it, let's set the cached value of the firmware
+name to NULL after freeing it. While here, return an error if
+the memory allocation fails.
+
+Signed-off-by: Mauro Carvalho Chehab <mchehab@osg.samsung.com>
+Cc: Ben Hutchings <ben.hutchings@codethink.co.uk>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ drivers/media/tuners/tuner-xc2028.c | 3 ++-
+ 1 file changed, 2 insertions(+), 1 deletion(-)
+
+--- a/drivers/media/tuners/tuner-xc2028.c
++++ b/drivers/media/tuners/tuner-xc2028.c
+@@ -1403,11 +1403,12 @@ static int xc2028_set_config(struct dvb_
+ * in order to avoid troubles during device release.
+ */
+ kfree(priv->ctrl.fname);
++ priv->ctrl.fname = NULL;
+ memcpy(&priv->ctrl, p, sizeof(priv->ctrl));
+ if (p->fname) {
+ priv->ctrl.fname = kstrdup(p->fname, GFP_KERNEL);
+ if (priv->ctrl.fname == NULL)
+- rc = -ENOMEM;
++ return -ENOMEM;
+ }
+
+ /*