> Then my second question was about the USB stack integrity (no specific
> to a linux platform) Do you think that devices could create an overflow
> in order to take control/install a software in the computer ?

In terms of DMAing to buffers, the only device you have to trust to play nice 
is your host controller.  The host controller does the DMA on behalf on an 
actual USB device attached to it, so (unless the host controller is buggy) 
attempts to transfer too much data should just result in an error.

Obviously, you do have to trust your host controller to behave well (as is 
really true for anything that can DMA to memory without restriction).

It's not inconceivable in principle that there'd be a software bug at a higher 
layer (in the client driver or possibly the USB core) that a device could 
exploit.  How often these actually occur (if at all) is another matter ;-)

> (what hapen when the devices are not respecting the protocol ? )

A device that misbehaves can cause some disruption but they are reasonably (as 
hardware goes) well fenced off.  Under some circumstances, a misbehaving 
device may have its port disabled entirely.

HTH,
Mark


-------------------------------------------------------
This SF.Net email is sponsored by: IntelliVIEW -- Interactive Reporting
Tool for open source databases. Create drag-&-drop reports. Save time
by over 75%! Publish reports on the web. Export to DOC, XLS, RTF, etc.
Download a FREE copy at http://www.intelliview.com/go/osdn_nl
_______________________________________________
linux-usb-devel@lists.sourceforge.net
To unsubscribe, use the last form field at:
https://lists.sourceforge.net/lists/listinfo/linux-usb-devel

Reply via email to