Re: [PATCH 05/12] usb: usbtmc: Add ioctl for generic requests on control pipe

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Zitat von Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>:

On Fri, May 18, 2018 at 01:32:51PM +0000, guido@xxxxxxxxxxxxxxxxxx wrote:

Zitat von Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>:

> On Thu, May 17, 2018 at 07:03:29PM +0200, Guido Kiener wrote:
> > Add USBTMC_IOCTL_CTRL_REQUEST to send arbitrary requests on the
> > control pipe.  Used by specific applications of IVI Foundation,
> > Inc. to implement VISA API functions: viUsbControlIn/Out.
> >
> > Signed-off-by: Guido Kiener <guido.kiener@xxxxxxxxxxxxxxxxx>
> > Reviewed-by: Steve Bayless <steve_bayless@xxxxxxxxxxxx>
> > ---
> >  drivers/usb/class/usbtmc.c   | 61 ++++++++++++++++++++++++++++++++++++
> >  include/uapi/linux/usb/tmc.h | 15 +++++++++
> >  2 files changed, 76 insertions(+)
> >
> > diff --git a/drivers/usb/class/usbtmc.c b/drivers/usb/class/usbtmc.c
> > index 152e2daa9644..00c2e51a23a7 100644
> > --- a/drivers/usb/class/usbtmc.c
> > +++ b/drivers/usb/class/usbtmc.c
> > @@ -5,6 +5,7 @@
> >   * Copyright (C) 2007 Stefan Kopp, Gechingen, Germany
> >   * Copyright (C) 2008 Novell, Inc.
> >   * Copyright (C) 2008 Greg Kroah-Hartman <gregkh@xxxxxxx>
> > + * Copyright (C) 2018, IVI Foundation, Inc.
> >   */
> >
> >  #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
> > @@ -1263,6 +1264,62 @@ static int
> > usbtmc_ioctl_indicator_pulse(struct usbtmc_device_data *data)
> >  	return rv;
> >  }
> >
> > +static int usbtmc_ioctl_request(struct usbtmc_device_data *data,
> > +				void __user *arg)
> > +{
> > +	struct device *dev = &data->intf->dev;
> > +	struct usbtmc_ctrlrequest request;
> > +	u8 *buffer = NULL;
> > +	int rv;
> > +	unsigned long res;
> > +
> > + res = copy_from_user(&request, arg, sizeof(struct usbtmc_ctrlrequest));
> > +	if (res)
> > +		return -EFAULT;
> > +
> > +	buffer = kmalloc(min_t(u16, 256, request.req.wLength), GFP_KERNEL);
>
> No validation that wLength is a sane number?

Ooops. It should be buffer = kmalloc(max_t(u16, 256, request.req.wLength),
GFP_KERNEL);
Then all values of request.req.wLength (0..65535) are ok.

Yes, that would make more sense.  But you should still reject
known-invalid values, and not just "silently fix them up".

When I start here to refuse (current) unknown settings or flags, then I fear
that people always want us to change or allow new flags. A device
should always be able to deal with all possible values. We cannot prevent a
user from sending crazy messages to the device and I do not want to develop
something like a firewall here.


> Go to the whiteboard nearby and write a the top of it:
> 	ALL INPUT IS EVIL
>
> > +	if (!buffer)
> > +		return -ENOMEM;
> > +
> > +	if ((request.req.bRequestType & USB_DIR_IN) == 0
> > +	    && request.req.wLength) {
> > +		res = copy_from_user(buffer, request.data,
> > +				     request.req.wLength);
> > +		if (res) {
> > +			rv = -EFAULT;
> > +			goto exit;
> > +		}
> > +	}
> > +
> > +	rv = usb_control_msg(data->usb_dev,
> > +			usb_rcvctrlpipe(data->usb_dev, 0),
> > +			request.req.bRequest,
> > +			request.req.bRequestType,
> > +			request.req.wValue,
> > +			request.req.wIndex,
> > +			buffer, request.req.wLength, USB_CTRL_GET_TIMEOUT);
>
> request.req.wLength might not be the actual size of buffer here due to
> your above min_t() check.

Still wrong given the check above.

I'm missing something. I do not see the error. The size of buffer is just
at least 256 bytes. It doesn't matter when request.req.wLength < 256.
I thought this helps the memory management, since we need not to deal with
different and odd memory sizes. Maybe we should just alloc always a size of
request.req.wLength.


> Then there is the generic question of "why are you allowing arbitrary
> USB control messages to be sent to devices" here.  That feels like a
> very odd way for a device that is supposed to be following a standard to
> be working.  You are circumventing the standard here by allowing any
> message to be sent to the device.  While nice for that one type of
> device, you are breaking interoperability in horrible ways (now apps
> only work with one type of device.)
>
> Why did you all agree to allow this to happen?

I did not define the USBTMC and VISA standard. However the API requires
to send this generic control request. Otherwise we have to use the libusb
again.

http://zone.ni.com/reference/en-XX/help/370131S-01/ni-visa/viusbcontrolin/

Ugh, that's horrid.  And a sign of "who knows what our devices will want
to support!" design by committee (note, I've worked on lots of spec
groups before, I know how they work...)

Ok, so that needs to be supported, fair enough, so let's get the
implementation correct :)

thanks,

greg k-h



--
To unsubscribe from this list: send the line "unsubscribe linux-usb" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Media]     [Linux Input]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [Old Linux USB Devel Archive]

  Powered by Linux