public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH] usb: host: ehci-sched: Fix potential out-of-bounds access of bandwidth[]
@ 2026-05-04 11:43 gerben
  2026-05-04 14:44 ` Alan Stern
  0 siblings, 1 reply; 2+ messages in thread
From: gerben @ 2026-05-04 11:43 UTC (permalink / raw)
  To: stern; +Cc: gregkh, linux-usb, linux-kernel, lvc-project

From: Denis Rastyogin <gerben@altlinux.org>

The microframe index used to access the bandwidth array is not
properly bounded. Although it is masked to a limited range, subsequent
loop iterations can advance it beyond the end of the array, leading to
an out-of-bounds access.

This can happen when sitd_slot_ok() is called from iso_stream_schedule()
with period = stream->uperiod = 1024. In that case, the loop may reach
sitd_slot_ok() with start = 1981, resulting in uframe = 61. After three
iterations, the index exceeds the array bounds.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Fixes: d0ce5c6b9208 ("USB: EHCI: use a bandwidth-allocation table")
Signed-off-by: Denis Rastyogin <gerben@altlinux.org>
---
 drivers/usb/host/ehci-sched.c | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/drivers/usb/host/ehci-sched.c b/drivers/usb/host/ehci-sched.c
index a241337c9af8..d2bace03b8c9 100644
--- a/drivers/usb/host/ehci-sched.c
+++ b/drivers/usb/host/ehci-sched.c
@@ -1429,6 +1429,8 @@ sitd_slot_ok(
 		uf = uframe;
 		max_used = ehci->uframe_periodic_max - stream->ps.usecs;
 		for (tmp = stream->ps.cs_mask & 0xff; tmp; tmp >>= 1, uf++) {
+			if (uf >= EHCI_BANDWIDTH_SIZE)
+				return 0;
 			if (ehci->bandwidth[uf] > max_used)
 				return 0;
 		}
-- 
2.42.2


^ permalink raw reply related	[flat|nested] 2+ messages in thread

* Re: [PATCH] usb: host: ehci-sched: Fix potential out-of-bounds access of bandwidth[]
  2026-05-04 11:43 [PATCH] usb: host: ehci-sched: Fix potential out-of-bounds access of bandwidth[] gerben
@ 2026-05-04 14:44 ` Alan Stern
  0 siblings, 0 replies; 2+ messages in thread
From: Alan Stern @ 2026-05-04 14:44 UTC (permalink / raw)
  To: gerben; +Cc: gregkh, linux-usb, linux-kernel, lvc-project

On Mon, May 04, 2026 at 02:43:40PM +0300, gerben@altlinux.org wrote:
> From: Denis Rastyogin <gerben@altlinux.org>
> 
> The microframe index used to access the bandwidth array is not
> properly bounded. Although it is masked to a limited range, subsequent
> loop iterations can advance it beyond the end of the array, leading to
> an out-of-bounds access.

I don't think so.

> This can happen when sitd_slot_ok() is called from iso_stream_schedule()
> with period = stream->uperiod = 1024. In that case, the loop may reach
> sitd_slot_ok() with start = 1981, resulting in uframe = 61. After three
> iterations, the index exceeds the array bounds.
> 
> Found by Linux Verification Center (linuxtesting.org) with SVACE.
> 
> Fixes: d0ce5c6b9208 ("USB: EHCI: use a bandwidth-allocation table")
> Signed-off-by: Denis Rastyogin <gerben@altlinux.org>
> ---
>  drivers/usb/host/ehci-sched.c | 2 ++
>  1 file changed, 2 insertions(+)
> 
> diff --git a/drivers/usb/host/ehci-sched.c b/drivers/usb/host/ehci-sched.c
> index a241337c9af8..d2bace03b8c9 100644
> --- a/drivers/usb/host/ehci-sched.c
> +++ b/drivers/usb/host/ehci-sched.c
> @@ -1429,6 +1429,8 @@ sitd_slot_ok(
>  		uf = uframe;
>  		max_used = ehci->uframe_periodic_max - stream->ps.usecs;
>  		for (tmp = stream->ps.cs_mask & 0xff; tmp; tmp >>= 1, uf++) {

You (and SVACE) missed the fact that the loop will end when tmp becomes 
0.  And thanks to this test earlier in the function:

	/* for OUT, don't wrap SSPLIT into H-microframe 7 */
	if (((stream->ps.cs_mask & 0xff) << (uframe & 7)) >= (1 << 7))
		return 0;

tmp will become 0 at or before the fourth iteration.

Alan Stern

> +			if (uf >= EHCI_BANDWIDTH_SIZE)
> +				return 0;
>  			if (ehci->bandwidth[uf] > max_used)
>  				return 0;
>  		}
> -- 
> 2.42.2

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2026-05-04 14:44 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-05-04 11:43 [PATCH] usb: host: ehci-sched: Fix potential out-of-bounds access of bandwidth[] gerben
2026-05-04 14:44 ` Alan Stern

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox