Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1355588pxk; Fri, 4 Sep 2020 07:28:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyR+TH51UJgxLMaesHAt+4bMHMMaL/lI4Ir2jWLlcaA98w2hZHD01g1e+EnB4UUJx1pbNjr X-Received: by 2002:a17:906:1ec6:: with SMTP id m6mr7923397ejj.225.1599229711961; Fri, 04 Sep 2020 07:28:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599229711; cv=none; d=google.com; s=arc-20160816; b=U5AJFbrJIgSPDU29pLt74V5HbITxXAasdLy2qybMBBfUSRCS18HJ7me8hlJSrdTp+W zepARvVSLojF9+vZ22XdZ9/sl4IOGnuh80qma8KsPlEf8rvjL6UR1Qwhty2b5m6Pyyfa JN1W4/m+BKOiGLLxfOCc39N5l0cSpDm0f2XHYF0Xz3qGD1IofEk4swBiATsAGlrKR0zL csbb+9thnDFzmciKArphnn7iWMqkhmhQ5ifl/NxN7fZ0yncEFYwFNsSyQjT5vY+lLKTk r8qaC0oGy6iVbw59OdJCusyyH2KremID2ubIKYyhhr0sifmODMBQFddDxqosn0DzJWVI wwhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fg9ihOs+ZD65v8Fx2JpCepoyTtoHhzZYsV4y2eaLYmM=; b=BakKLfiiXpnVrqbmCY6ECeTYgEzqPNPHZPtRSAPfjnX23Zls3lUdCJGUbgK0CHu9sT wZ8yGpoNXQJDj+ZLZR68pb8DENMv87Hcy17R75wO8CuHOMDaYzvTdgz2cOd2hLPm9CIz RWtGEyFOkrSAlCRrPnuI7SRmafL9rtVHS768ddCIVEcxArtb6Iwsn8T1nBbh8ADCFUEW 2A3O747zLAgo63fKRtQEfKoK09P+R/QKtjAIkFHeOwtsnAQZw4C/hWY5RJ3rDYLD+Ahz ATKtdDFmvKK0arh5phMhrG/QBJNWCV4lP+IgVgQ+sTTALZy5iFBWTQQykbOhvXOJrML/ JvmA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=pJ9221QY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c5si3175750edv.513.2020.09.04.07.28.09; Fri, 04 Sep 2020 07:28:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=pJ9221QY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730801AbgIDO10 (ORCPT + 99 others); Fri, 4 Sep 2020 10:27:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:37294 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730434AbgIDNeX (ORCPT ); Fri, 4 Sep 2020 09:34:23 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0DFEE20C56; Fri, 4 Sep 2020 13:30:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1599226234; bh=/VULTuInfm03Lezg/PEGNksKVEUO/TpaINRmGbUsIR0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pJ9221QYFhsChfROEIGutZGsECk4Iqenk79hlAoALaOhFy/EiANaYVbEZPxyKutlE Efowl2jUO27T/VmOUlUgWIb02J5cOh6Ycl2e3CYw4pFejzdCVK8481wwFzLC/+xFSd ulE3eUcsHtR8VMBt+LfixfL2i++Jn5lYyghwW8oI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Marc Zyngier , Benjamin Tissoires Subject: [PATCH 5.8 01/17] HID: core: Correctly handle ReportSize being zero Date: Fri, 4 Sep 2020 15:30:00 +0200 Message-Id: <20200904120258.050629588@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200904120257.983551609@linuxfoundation.org> References: <20200904120257.983551609@linuxfoundation.org> User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Marc Zyngier commit bce1305c0ece3dc549663605e567655dd701752c upstream. It appears that a ReportSize value of zero is legal, even if a bit non-sensical. Most of the HID code seems to handle that gracefully, except when computing the total size in bytes. When fed as input to memset, this leads to some funky outcomes. Detect the corner case and correctly compute the size. Cc: stable@vger.kernel.org Signed-off-by: Marc Zyngier Signed-off-by: Benjamin Tissoires Signed-off-by: Greg Kroah-Hartman --- drivers/hid/hid-core.c | 15 +++++++++++++-- 1 file changed, 13 insertions(+), 2 deletions(-) --- a/drivers/hid/hid-core.c +++ b/drivers/hid/hid-core.c @@ -1598,6 +1598,17 @@ static void hid_output_field(const struc } /* + * Compute the size of a report. + */ +static size_t hid_compute_report_size(struct hid_report *report) +{ + if (report->size) + return ((report->size - 1) >> 3) + 1; + + return 0; +} + +/* * Create a report. 'data' has to be allocated using * hid_alloc_report_buf() so that it has proper size. */ @@ -1609,7 +1620,7 @@ void hid_output_report(struct hid_report if (report->id > 0) *data++ = report->id; - memset(data, 0, ((report->size - 1) >> 3) + 1); + memset(data, 0, hid_compute_report_size(report)); for (n = 0; n < report->maxfield; n++) hid_output_field(report->device, report->field[n], data); } @@ -1739,7 +1750,7 @@ int hid_report_raw_event(struct hid_devi csize--; } - rsize = ((report->size - 1) >> 3) + 1; + rsize = hid_compute_report_size(report); if (report_enum->numbered && rsize >= HID_MAX_BUFFER_SIZE) rsize = HID_MAX_BUFFER_SIZE - 1;