Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754076AbbG0Vos (ORCPT ); Mon, 27 Jul 2015 17:44:48 -0400 Received: from mail-pd0-f178.google.com ([209.85.192.178]:34631 "EHLO mail-pd0-f178.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750915AbbG0Vor (ORCPT ); Mon, 27 Jul 2015 17:44:47 -0400 Date: Mon, 27 Jul 2015 14:44:42 -0700 From: Dmitry Torokhov To: Heiko =?iso-8859-1?Q?St=FCbner?= Cc: linux-input@vger.kernel.org, Dirk Behme , Oleksij Rempel , linux-kernel@vger.kernel.org Subject: Re: [PATCH] Input: zforce_ts - fix playload length check Message-ID: <20150727214442.GB3613@dtor-ws> References: <20150727210619.GA2825@dtor-ws> <9298777.SjHtUzmdFZ@diego> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <9298777.SjHtUzmdFZ@diego> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2356 Lines: 56 On Mon, Jul 27, 2015 at 11:35:23PM +0200, Heiko St?bner wrote: > Hi Dmitry, > > Am Montag, 27. Juli 2015, 14:06:19 schrieb Dmitry Torokhov: > > Commit 7d01cd261c76f95913c81554a751968a1d282d3a ("Input: zforce - don't > > overwrite the stack") attempted to add a check for payload size being too > > large for the supplied buffer. Unfortunately with the currently selected > > buffer size the comparison is always false as buffer size is larger than > > the value a single byte can hold, and that results in compiler warnings. > > Additionally the check was incorrect as it was not accounting for the > > already read 2 bytes of data stored in the buffer. > > > > Fixes: 7d01cd261c76f95913c81554a751968a1d282d3a > > Reported-by: kbuild test robot > > Signed-off-by: Dmitry Torokhov > > --- > > > > This seems to shut up my GCC, I wonder if it is going to work gfor > > everyone or we better add BUILD_BUG_ON(FRAME_MAXSIZE < 257) and a > > comment and remove check. > > needed a bit to get to know my old zforce driver again ;-) > > > I may be blind, but currently I fail to see what problem the original patch > actually tries to fix. > > buf[PAYLOAD_LENGTH] is an u8, so the max value it can contain is 255. The > i2c_master_recv reads buf[PAYLOAD_LENGTH]-bytes into the buffer starting at > buf[PAYLOAD_BODY] (= buf[2]). So it reads at max 255 bytes into a 257 byte big > buffer starting at index 2. > > zforce_read_packet, also is an internal function used only by the interrupt > handler, which always only calls it with a buffer of FRAME_MAXSIZE size. > > > The original patch said "If we get a corrupted packet with PAYLOAD_LENGTH > > FRAME_MAXSIZE, we will silently overwrite the stack." but payload_length can > never actually be greater than the buffer size? Right, not unless we for some reason decide to adjust FRAME_MAXSIZE to make it smaller than 257 and then fail to add the check to make sure we do not go past the buffer. So everything is fine now, but I guess we'd like to be more safe in the future... Thanks. -- Dmitry -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/