[alsa-devel] [smatch stuff] reading beyond the end of the array in build_feature_ctl()

Takashi Iwai tiwai at suse.de
Thu Oct 13 08:14:11 CEST 2011


At Thu, 6 Oct 2011 16:39:48 +0300,
Dan Carpenter wrote:
> 
> Hi Daniel,
> 
> Smatch complains about a potential read past the end of the array in
> build_feature_ctl().
> 
> sound/usb/mixer.c +1035 build_feature_ctl(34)
> 	error: buffer overflow 'audio_feature_info' 13 <= 14
> 
> This is in the init code so probably it's correct, and I've just
> missed how it works.  Can you take a look?
> 
> The problem is that audio_feature_info[] has 13 elements, but Smatch
> thinks control - 1 can go up to 14 so we're two elements past the end.
> 
>   1035          cval->val_type = audio_feature_info[control-1].type;
> 
> Smatch get the value for "control" from "i" in parse_audio_feature_unit().

It looks like a flaw, indeed.
audio_feature_info[] should contain all data for UAC2_FU_*.

An easy fix is a patch like below.
(It's anyway better to replace the digits there.)
Later we can add the missing entries to audio_feature_info[].


thanks,

Takashi

---
diff --git a/sound/usb/mixer.c b/sound/usb/mixer.c
index b13b7ac..60f65ac 100644
--- a/sound/usb/mixer.c
+++ b/sound/usb/mixer.c
@@ -1259,7 +1259,7 @@ static int parse_audio_feature_unit(struct mixer_build *state, int unitid, void
 				build_feature_ctl(state, _ftr, 0, i, &iterm, unitid, 0);
 		}
 	} else { /* UAC_VERSION_2 */
-		for (i = 0; i < 30/2; i++) {
+		for (i = 0; i < ARRAY_SIZE(audio_feature_info); i++) {
 			unsigned int ch_bits = 0;
 			unsigned int ch_read_only = 0;
 


More information about the Alsa-devel mailing list