Re: USB: gadget: add USB Audio Gadget driver

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Alan Stern wrote:
> On Fri, 29 Jan 2016, Dan Carpenter wrote:
>> The patch c6994e6f067c: "USB: gadget: add USB Audio Gadget driver"
>> from Jun 3, 2009, leads to the following static checker warning:
>>
>> 	drivers/usb/gadget/function/f_uac1.c:371 f_audio_complete()
>> 	error: __memcpy() '&data' too small (4 vs u32max)
>>
>> drivers/usb/gadget/function/f_uac1.c
>>    370                  else if (audio->set_con) {
>>    371                          memcpy(&data, req->buf, req->length);
>>                                                         ^^^^^^^^^^^
>> Back in 2014 Kees ran a USB fuzzer on the kernel.  My take on that was
>> that req->length could not be trusted and had to be capped so I changed
>> Smatch to complain about these.  But after a while I decided I was not
>> sure enough of the rules so I just ignore those bugs these days...  What
>> are the rules?
>
> req->length is set by the driver and not changed anywhere else in the
> kernel.  (Or rather, changing it would be a bug.)  Of course, it's
> possible that the driver could be fooled into setting req->length to
> something larger than 4 -- I haven't looked through the code.

That value comes from the control setup packet's wLength field.  Neither
audio_set_intf_req() nor f_audio_setup() check it.


Regards,
Clemens
--
To unsubscribe from this list: send the line "unsubscribe linux-usb" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Media]     [Linux Input]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [Old Linux USB Devel Archive]

  Powered by Linux