[PATCH] ALSA: ctxfi: Avoid writing uninitialized variable in uaa_to_xfi()

Takashi Iwai tiwai at suse.de
Tue Apr 20 10:42:15 CEST 2021


On Mon, 19 Apr 2021 18:41:33 +0200,
Yizhuo Zhai wrote:
> 
> Inside the function uaa_to_xfi(), variable "l_timer" could be
> uninitialized if pci_bus_read_config_dword() returns
> PCIBIOS_BAD_REGISTER_NUMBER. However, it is write back to PCI
> config space via pci_write_config_dword(), which is potentially
> unsafe.

Thanks for the patch.  But it cannot be taken as is.

First off, practically seen, reading PCI_LATENCY_TIMER would never
fail.  And, even if it were to fail, it's not safer at all to proceed
with a value -1.

If any, it should return an error instead.  Also, there are a few
other similar PCI config reads and those have to be treated as well.
But it's likely not worth.  If it's a device that is used on VM, you
might have more chance to break something unexpectedly, but on a real
hardware, it's not.  And it's about the init sequence, which won't
bring to anything actually crashing the kernel.


Takashi

> 
> Signed-off-by: Yizhuo <yzhai003 at ucr.edu>
> ---
>  sound/pci/ctxfi/cthw20k1.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/sound/pci/ctxfi/cthw20k1.c b/sound/pci/ctxfi/cthw20k1.c
> index 0cea4982ed7d..7c3436499974 100644
> --- a/sound/pci/ctxfi/cthw20k1.c
> +++ b/sound/pci/ctxfi/cthw20k1.c
> @@ -1789,7 +1789,7 @@ static struct capabilities hw_capabilities(struct hw
> *hw)
>  static int uaa_to_xfi(struct pci_dev *pci)
>  {
>         unsigned int bar0, bar1, bar2, bar3, bar4, bar5;
> -       unsigned int cmd, irq, cl_size, l_timer, pwr;
> +       unsigned int cmd, irq, cl_size, l_timer = ~0, pwr;
>         unsigned int is_uaa;
>         unsigned int data[4] = {0};
>         unsigned int io_base;
> -- 
> 2.31.1
> 
> --
> Kind Regards,
> 
> Yizhuo Zhai
> 
> Computer Science, Graduate Student
> University of California, Riverside 
> 
> 


More information about the Alsa-devel mailing list