exynos-linux-stable/drivers/usb/usbip
Suwan Kim 9640bcac23 usbip: Fix error path of vhci_recv_ret_submit()
commit aabb5b833872524eaf28f52187e5987984982264 upstream.

If a transaction error happens in vhci_recv_ret_submit(), event
handler closes connection and changes port status to kick hub_event.
Then hub tries to flush the endpoint URBs, but that causes infinite
loop between usb_hub_flush_endpoint() and vhci_urb_dequeue() because
"vhci_priv" in vhci_urb_dequeue() was already released by
vhci_recv_ret_submit() before a transmission error occurred. Thus,
vhci_urb_dequeue() terminates early and usb_hub_flush_endpoint()
continuously calls vhci_urb_dequeue().

The root cause of this issue is that vhci_recv_ret_submit()
terminates early without giving back URB when transaction error
occurs in vhci_recv_ret_submit(). That causes the error URB to still
be linked at endpoint list without “vhci_priv".

So, in the case of transaction error in vhci_recv_ret_submit(),
unlink URB from the endpoint, insert proper error code in
urb->status and give back URB.

Reported-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Tested-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Signed-off-by: Suwan Kim <suwan.kim027@gmail.com>
Cc: stable <stable@vger.kernel.org>
Acked-by: Shuah Khan <skhan@linuxfoundation.org>
Link: https://lore.kernel.org/r/20191213023055.19933-3-suwan.kim027@gmail.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2020-01-04 13:40:20 +01:00
..
Kconfig
Makefile
README
stub.h usbip: usbip_host: fix NULL-ptr deref and use-after-free errors 2018-05-22 16:57:56 +02:00
stub_dev.c usbip: usbip_host: fix stub_dev lock context imbalance regression 2019-06-11 12:22:37 +02:00
stub_main.c usbip: usbip_host: fix bad unlock balance during stub_probe() 2018-05-22 16:57:56 +02:00
stub_rx.c usbip: stub_rx: fix static checker warning on unnecessary checks 2019-11-12 19:15:52 +01:00
stub_tx.c usbip: stub: stop printing kernel pointer addresses in messages 2018-01-02 20:35:15 +01:00
usbip_common.c usbip: remove kernel addresses from usb device and urb debug msgs 2018-01-17 09:38:55 +01:00
usbip_common.h usb: usbip: fix isoc packet num validation in get_pipe 2019-05-08 07:19:08 +02:00
usbip_event.c usbip: usbip_event: fix to not print kernel pointer address 2018-05-01 15:13:04 -07:00
vhci.h
vhci_hcd.c drivers: usb: usbip: Add missing break statement to switch 2019-11-12 19:15:53 +01:00
vhci_rx.c usbip: Fix error path of vhci_recv_ret_submit() 2020-01-04 13:40:20 +01:00
vhci_sysfs.c usbip: vhci_sysfs: fix potential Spectre v1 2018-06-16 09:52:33 +02:00
vhci_tx.c usbip: vhci: stop printing kernel pointer addresses in messages 2018-01-02 20:35:15 +01:00
vudc.h
vudc_dev.c
vudc_main.c usbip:vudc: BUG kmalloc-2048 (Not tainted): Poison overwritten 2018-11-13 11:16:55 -08:00
vudc_rx.c usbip: fix vudc_rx: harden CMD_SUBMIT path to handle malicious input 2018-01-17 09:38:56 +01:00
vudc_sysfs.c usbip: vudc: fix null pointer dereference on udc->lock 2018-03-18 11:18:55 +01:00
vudc_transfer.c
vudc_tx.c usbip: vudc_tx: fix v_send_ret_submit() vulnerability to null xfer buffer 2018-01-17 09:38:56 +01:00

TODO:
	- more discussion about the protocol
	- testing
	- review of the userspace interface
	- document the protocol

Please send patches for this code to Greg Kroah-Hartman <greg@kroah.com>