Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:GA
qemu.15027
0263-xhci-guard-xhci_kick_epctx-against-.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 0263-xhci-guard-xhci_kick_epctx-against-.patch of Package qemu.15027
From 2de40e12b35c98577bafd5d3e4e7ef8fa1132b93 Mon Sep 17 00:00:00 2001 From: Gerd Hoffmann <kraxel@redhat.com> Date: Thu, 2 Feb 2017 12:36:12 +0100 Subject: [PATCH] xhci: guard xhci_kick_epctx against recursive calls Track xhci_kick_epctx processing being active in a variable. Check the variable before calling xhci_kick_epctx from xhci_kick_ep. Add an assert to make sure we don't call recursively into xhci_kick_epctx. Cc: 1653384@bugs.launchpad.net Fixes: 94b037f2a451b3dc855f9f2c346e5049a361bd55 Reported-by: Fabian Lesniak <fabian@lesniak-it.de> Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> Message-id: 1486035372-3621-1-git-send-email-kraxel@redhat.com Message-id: 1485790607-31399-5-git-send-email-kraxel@redhat.com (cherry picked from commit 96d87bdda3919bb16f754b3d3fd1227e1f38f13c) [BR: BSC#1042800 CVE-2017-9375] Signed-off-by: Bruce Rogers <brogers@suse.com> --- hw/usb/hcd-xhci.c | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/hw/usb/hcd-xhci.c b/hw/usb/hcd-xhci.c index 7fdad16add..6fb79c9ac7 100644 --- a/hw/usb/hcd-xhci.c +++ b/hw/usb/hcd-xhci.c @@ -393,6 +393,7 @@ struct XHCIEPContext { dma_addr_t pctx; unsigned int max_psize; uint32_t state; + uint32_t kick_active; /* streams */ unsigned int max_pstreams; @@ -2105,7 +2106,6 @@ static void xhci_kick_ep(XHCIState *xhci, unsigned int slotid, int length; int i; - trace_usb_xhci_ep_kick(slotid, epid, streamid); assert(slotid >= 1 && slotid <= xhci->numslots); assert(epid >= 1 && epid <= 31); @@ -2120,6 +2120,12 @@ static void xhci_kick_ep(XHCIState *xhci, unsigned int slotid, return; } + if (epctx->kick_active) { + return; + } + trace_usb_xhci_ep_kick(slotid, epid, streamid); + assert(!epctx->kick_active); + /* If the device has been detached, but the guest has not noticed this yet the 2 above checks will succeed, but we must NOT continue */ if (!xhci->slots[slotid - 1].uport || @@ -2187,6 +2193,7 @@ static void xhci_kick_ep(XHCIState *xhci, unsigned int slotid, } assert(ring->dequeue != 0); + epctx->kick_active++; while (1) { XHCITransfer *xfer = &epctx->transfers[epctx->next_xfer]; if (xfer->running_async || xfer->running_retry) { @@ -2245,6 +2252,7 @@ static void xhci_kick_ep(XHCIState *xhci, unsigned int slotid, break; } } + epctx->kick_active--; ep = xhci_epid_to_usbep(xhci, slotid, epid); if (ep) {
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor