Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp542980pxy; Wed, 5 May 2021 08:10:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyw2tT+VcApkB8GspwqH5ObSn8OUPvfPzgIgoY8+yiUChwtU12UY9ageysdG0Pk40gjlYuL X-Received: by 2002:aa7:db90:: with SMTP id u16mr15744863edt.106.1620227412965; Wed, 05 May 2021 08:10:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620227412; cv=none; d=google.com; s=arc-20160816; b=LxFkbUz29liuGNxoyZff0DOGJCH/TqE9OZP7+xagdgB0rauvMFglzw3UW2SQFR+Z81 DPilgYJzaAh1pruRGW4+/+4NWpwirgM2DPzHGl3uDRbim1itgeP7SUATexA1mUDEc883 TJz+K+Ch1Ex6W/Tw6uOD67Eh0jzhbesCBUjxABRG547z8+RDGJiPeHWMvvNpa11Alyut PuAL5vjJc35o4kfp5B/oQW224ziurPNyA0NeM4aaZtiJ2BciqyUQAysf4mQWqw2B7gX/ 95vWjXgw5RGx7rLMYYbOh5LiB0PL3r4HCYHpDgxtUMriu7IHqibqMcvpQ1vOFurVeNAh 37kg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:message-id :in-reply-to:subject:cc:to:from:date:dkim-signature; bh=UxRn46BOP5pqxYdAq98lLDzErHreu60FT+ldeB7Q0DQ=; b=xAH6PX31TWEgwhu8+Z+HNV4NAPi+GX6pY3fonQgf7Z9qftrZAGSLG6/ukfD6Hp2Mct uI6Gn9/6F1ZgiCWL8OoJVNE03bA1dRyDrbnIC0BAcHkWz0i8HXc86ggQsngWHyfrHcIl VPDrRkUQHm+FLlJ2lnm/WHIR4cpCpVczEb5F7tK4GG1Ebey5Y7F585319c/GvQvAyh6c Z3/aockTCWePFqeoohj++iNdy9UNLkSi5OWpZ5irnATWY9UXSIupPOzE3Qc8MkdGLH5T Pff9TGRFRQbBuOJ8wtJ60xu8COqnpXX04DGH3Bmz+cr7DPEblawmEnNJrVzIRGxb135/ f8OQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="V/I1Jznn"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y4si5360748edo.477.2021.05.05.08.09.48; Wed, 05 May 2021 08:10:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="V/I1Jznn"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232884AbhEENxy (ORCPT + 99 others); Wed, 5 May 2021 09:53:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:41890 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229559AbhEENxv (ORCPT ); Wed, 5 May 2021 09:53:51 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 2FB5D61182; Wed, 5 May 2021 13:52:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1620222774; bh=Gj7r3JoBNNH/NvO1A6+1ai/VnVaPCAy9xJgwL9pQeKA=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=V/I1JznnMXeCxJxcF4ehf7pq9OyPqj5camxPcOBX8nf8ZzqUMACaIcAniixPy7fX3 Rg1+ohRLK0K4bEaeRPUUEP+Tx1OGF8gg0Ibynh2HeyhYLE/+YafXvfqWVvZwbats30 U9ppPPijlASZ70Ftqh/PShUkdKSvo1N+UiUJFbvM4fOTzLHj0z8UGE8WsHZh74at34 EZfkd2PW9/mBOii0GFBaBBGPeFLu/XNUB+ehNUjB6muur8s+JCEourzMoWzsjyUGyn g6g7W4I2UlLfffwzXYdWpsB1EQmMPTA388gNcrdltbAb3huTUJszxvkS3/3DzXqooK WS+E/6mBenLEw== Date: Wed, 5 May 2021 15:52:50 +0200 (CEST) From: Jiri Kosina To: Benjamin Tissoires cc: Anirudh Rayabharam , Greg Kroah-Hartman , linux-kernel-mentees@lists.linuxfoundation.org, syzbot+7c2bb71996f95a82524c@syzkaller.appspotmail.com, Linux USB Mailing List , "open list:HID CORE LAYER" , lkml Subject: Re: [PATCH] usbhid: fix info leak in hid_submit_ctrl In-Reply-To: Message-ID: References: <20210425173353.10231-1-mail@anirudhrb.com> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 5 May 2021, Benjamin Tissoires wrote: > > > I don't have a reproducer like syzbot has for the exact bug here, as I > > > am relying on one real USB device to check if usbhid is not too broken. > > > However, the test suite should catch if there is an error implied by the > > > hid_report_len() change. > > > > Yes, that was exactly what I wanted to check, sorry for not being verbose > > enough :) > > > > > Anyway, I manually started the job and will report when it is done. > > > > Heh, no problems. > > "Job succeeded" \o/ > > Given that you are on a spree: :-) > Acked-by: Benjamin Tissoires Applied to for-5.13/upstream-fixes. Thanks, -- Jiri Kosina SUSE Labs