Re: [PATCH] usb: fix potential integer overflow in usb_sg_init

From: Alan Stern
Date: Mon Jan 18 2016 - 13:32:31 EST


On Mon, 18 Jan 2016, Insu Yun wrote:

> If nents value is sufficient large, e.g 0x40000000,
> then it can overflow size in kmalloc and heap overflow happesns.
> Therefore nents value needs to be checked to prevent overflow.

I don't see why. You seem to be assuming that failure with -EINVAL is
better than failure with a heap overflow. I disagree; a heap overflow
provides more debugging information to help locate the reason for the
underlying problem.

Alan Stern