Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1777113ybl; Sat, 11 Jan 2020 02:36:55 -0800 (PST) X-Google-Smtp-Source: APXvYqzJ+jNAtMRAxv/elGI8LODvGUd5epAcD1IXopQCVPkE+kQwbiTxi8YsayEyDgkjZ5EdsGVA X-Received: by 2002:a9d:518b:: with SMTP id y11mr5999819otg.349.1578739015178; Sat, 11 Jan 2020 02:36:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578739015; cv=none; d=google.com; s=arc-20160816; b=iJz6yl5tLmKS5LuIxPOIsz+3OOb7z4WSpqHRVZaTXKS7IstTlC3DyEnO+HCbQ96jWj 6K/+nLueRDYqsPn+/276e1+lJQ4ETpQjPAbgDrMI49vcV2Iq2NTCoWzDNWlunDFsbopl T0ZUSLjLhSZt3LSUwabXQxbGu2aoZWLzSdbofgR3yUbEYhNi3pwlm3fxHDACGIgGMtBj jpO8iQrXPym/vRfcQjeJS8gkgXu2wOL72rH1nTa4nDNFT7asIigwzYNwC7vpawQJGIhF NJRGdenEuhSkR/ZLQPFYoo5bZtD5sMsB+xIrZNI11sg44zmRAysSRWwunVMRFAKD+YbT yozw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=r8hoDRhiKNCbnBQQTSKuzL6tn24iuvBH1HfLjKrQ2wo=; b=V3GQq5iK2GUPGMkR6n3Yg8tsjsIdayu8g3fnISDmmmQMHx8IXEpnYJYXyyiHpn2wva XNHTc7Tx8pAUYx96ZwWM94w5UR3TbyvkT80eFO6VpEySLNMgz4+XiPwU7kzcGrAf2Z9l ZdXVXG/6XtpCm6pYz4cp47hIFR2U038enVDOdJpnZAaF2Ri8zwrKc3MtsNyrlvmiOt6b kzdgGkQP1NpPDvI0DWrVDhhgy4vKzgNhC47QsLZUy5B+sZaqzShSkfX4vvm/eCqRZk1W zkKUXlBJS5DI5AkPN1jjhDoptelH/UIZNvYIXtB1EywWbmk0hDauV4CaxClffpRG0qqC KbfQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CZtCAiBN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g8si2916416oia.262.2020.01.11.02.36.44; Sat, 11 Jan 2020 02:36:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CZtCAiBN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731603AbgAKKef (ORCPT + 99 others); Sat, 11 Jan 2020 05:34:35 -0500 Received: from mail.kernel.org ([198.145.29.99]:50818 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731485AbgAKKec (ORCPT ); Sat, 11 Jan 2020 05:34:32 -0500 Received: from localhost (unknown [62.119.166.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1367020842; Sat, 11 Jan 2020 10:34:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578738871; bh=Szw6ys8LnCVnsTt06jMBo0T+8Yvamx5Z4vLGAz8NCt4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CZtCAiBNtTq0biFi3QhYGyGca4mmPyOZdCDUWi0T7DRXO0eCuLT38pRGF9qQSv5os I+kMXfL6hSIdiEKsrHgoe7OriDzgEBd1aS6LfCJ//CggdcGeSQMnMBV58W4vTthReg VKVUrb4SBww1uPthpywye1VPCsXoAP97hg6RTmMk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Alan Stern Subject: [PATCH 5.4 163/165] USB: core: fix check for duplicate endpoints Date: Sat, 11 Jan 2020 10:51:22 +0100 Message-Id: <20200111094943.527875029@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200111094921.347491861@linuxfoundation.org> References: <20200111094921.347491861@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 3e4f8e21c4f27bcf30a48486b9dcc269512b79ff upstream. Amend the endpoint-descriptor sanity checks to detect all duplicate endpoint addresses in a configuration. Commit 0a8fd1346254 ("USB: fix problems with duplicate endpoint addresses") added a check for duplicate endpoint addresses within a single alternate setting, but did not look for duplicate addresses in other interfaces. The current check would also not detect all duplicate addresses when one endpoint is as a (bi-directional) control endpoint. This specifically avoids overwriting the endpoint entries in struct usb_device when enabling a duplicate endpoint, something which could potentially lead to crashes or leaks, for example, when endpoints are later disabled. Cc: stable Signed-off-by: Johan Hovold Acked-by: Alan Stern Link: https://lore.kernel.org/r/20191219161016.6695-1-johan@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/core/config.c | 70 ++++++++++++++++++++++++++++++++++++++-------- 1 file changed, 58 insertions(+), 12 deletions(-) --- a/drivers/usb/core/config.c +++ b/drivers/usb/core/config.c @@ -203,9 +203,58 @@ static const unsigned short super_speed_ [USB_ENDPOINT_XFER_INT] = 1024, }; -static int usb_parse_endpoint(struct device *ddev, int cfgno, int inum, - int asnum, struct usb_host_interface *ifp, int num_ep, - unsigned char *buffer, int size) +static bool endpoint_is_duplicate(struct usb_endpoint_descriptor *e1, + struct usb_endpoint_descriptor *e2) +{ + if (e1->bEndpointAddress == e2->bEndpointAddress) + return true; + + if (usb_endpoint_xfer_control(e1) || usb_endpoint_xfer_control(e2)) { + if (usb_endpoint_num(e1) == usb_endpoint_num(e2)) + return true; + } + + return false; +} + +/* + * Check for duplicate endpoint addresses in other interfaces and in the + * altsetting currently being parsed. + */ +static bool config_endpoint_is_duplicate(struct usb_host_config *config, + int inum, int asnum, struct usb_endpoint_descriptor *d) +{ + struct usb_endpoint_descriptor *epd; + struct usb_interface_cache *intfc; + struct usb_host_interface *alt; + int i, j, k; + + for (i = 0; i < config->desc.bNumInterfaces; ++i) { + intfc = config->intf_cache[i]; + + for (j = 0; j < intfc->num_altsetting; ++j) { + alt = &intfc->altsetting[j]; + + if (alt->desc.bInterfaceNumber == inum && + alt->desc.bAlternateSetting != asnum) + continue; + + for (k = 0; k < alt->desc.bNumEndpoints; ++k) { + epd = &alt->endpoint[k].desc; + + if (endpoint_is_duplicate(epd, d)) + return true; + } + } + } + + return false; +} + +static int usb_parse_endpoint(struct device *ddev, int cfgno, + struct usb_host_config *config, int inum, int asnum, + struct usb_host_interface *ifp, int num_ep, + unsigned char *buffer, int size) { unsigned char *buffer0 = buffer; struct usb_endpoint_descriptor *d; @@ -242,13 +291,10 @@ static int usb_parse_endpoint(struct dev goto skip_to_next_endpoint_or_interface_descriptor; /* Check for duplicate endpoint addresses */ - for (i = 0; i < ifp->desc.bNumEndpoints; ++i) { - if (ifp->endpoint[i].desc.bEndpointAddress == - d->bEndpointAddress) { - dev_warn(ddev, "config %d interface %d altsetting %d has a duplicate endpoint with address 0x%X, skipping\n", - cfgno, inum, asnum, d->bEndpointAddress); - goto skip_to_next_endpoint_or_interface_descriptor; - } + if (config_endpoint_is_duplicate(config, inum, asnum, d)) { + dev_warn(ddev, "config %d interface %d altsetting %d has a duplicate endpoint with address 0x%X, skipping\n", + cfgno, inum, asnum, d->bEndpointAddress); + goto skip_to_next_endpoint_or_interface_descriptor; } endpoint = &ifp->endpoint[ifp->desc.bNumEndpoints]; @@ -522,8 +568,8 @@ static int usb_parse_interface(struct de if (((struct usb_descriptor_header *) buffer)->bDescriptorType == USB_DT_INTERFACE) break; - retval = usb_parse_endpoint(ddev, cfgno, inum, asnum, alt, - num_ep, buffer, size); + retval = usb_parse_endpoint(ddev, cfgno, config, inum, asnum, + alt, num_ep, buffer, size); if (retval < 0) return retval; ++n;