public inbox for linux-usb@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH AUTOSEL 6.19-6.18] HID: pidff: Do not set out of range trigger button
       [not found] <20260214010245.3671907-1-sashal@kernel.org>
@ 2026-02-14  0:58 ` Sasha Levin
  0 siblings, 0 replies; only message in thread
From: Sasha Levin @ 2026-02-14  0:58 UTC (permalink / raw)
  To: patches, stable
  Cc: Tomasz Pakuła, Jiri Kosina, Sasha Levin, jikos, bentiss,
	linux-usb

From: Tomasz Pakuła <tomasz.pakula.oficjalny@gmail.com>

[ Upstream commit e01a029654f7fb67d7151365410aa22be4e63dbe ]

Some games (mainly observed with Kylotonn's WRC Serises) set trigger
button to a random value, or always the same one, out of range.
I observed 307 and other values but, for example, my Moza R9 only
exposes 128 buttons AND it's trigger button field is 8-bit. This causes
errors to appear in dmesg.

Only set the trigger button and trigger interval in the trigger button
is in range of the field.

Signed-off-by: Tomasz Pakuła <tomasz.pakula.oficjalny@gmail.com>
Signed-off-by: Jiri Kosina <jkosina@suse.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---

LLM Generated explanations, may be completely bogus:

Now I have a complete picture. Let me provide my analysis.

## Detailed Analysis

### 1. Commit Message Analysis

The commit clearly describes a **real-world bug**: games (specifically
Kylotonn's WRC Series) set the trigger button to random out-of-range
values (e.g., 307) when the hardware only supports 128 buttons with an
8-bit field. This causes errors in dmesg. The author is the driver's
2025 co-maintainer (Tomasz Pakula, noted at line 6 of the file).

### 2. Code Change Analysis

**The bug mechanism:** In `pidff_set_effect_report()`, the trigger
button value from userspace (`effect->trigger.button`) is written
directly to the HID field value without any bounds checking:

```526:526:drivers/hid/usbhid/hid-pidff.c
        pidff->set_effect[PID_TRIGGER_BUTTON].value[0] =
effect->trigger.button;
```

When this value exceeds what the HID field can hold (e.g., 307 in an
8-bit field with max 128), the `implement()` function in `hid-core.c`
catches it and emits a **non-rate-limited** warning:

```1472:1477:drivers/hid/hid-core.c
                if (unlikely(value > m)) {
                        hid_warn(hid,
                                 "%s() called with too large value %d
(n: %d)! (%s)\n",
                                 __func__, value, n, current->comm);
                        value &= m;
                }
```

`hid_warn` maps to `dev_warn()` which is **not rate-limited** (unlike
`hid_warn_ratelimited`). Since force feedback effects can be updated at
frame rate (60-144+ Hz), this can produce hundreds of kernel warnings
per second during gameplay.

**The fix adds a simple bounds check:** If `trigger.button` exceeds
`field->logical_maximum`, both trigger button and trigger repeat
interval are set to 0 (disabled), which is the correct semantic - an
invalid trigger button should mean "no trigger." Otherwise, the values
pass through normally. The fix is +10 lines of straightforward
validation logic.

### 3. Impact Assessment

- **Who is affected:** Users of HID PID force feedback devices (racing
  wheels like Moza R9, Thrustmaster, etc.) playing games that set out-
  of-range trigger button values (WRC Series and likely others).
- **What happens without the fix:**
  1. **Kernel log flooding** - unrestricted `hid_warn()` called per-
     frame can fill system logs
  2. **Silent value corruption** - `implement()` masks the value with `&
     m`, mapping to a random valid button rather than disabling the
     trigger
  3. **Performance degradation** from excessive logging
- **Severity:** Moderate - causes persistent dmesg spam and incorrect
  device behavior, but no crash/corruption/security issue.

### 4. Scope and Risk

- **Size:** Very small - 10 lines added in one function in one file
- **Risk:** Near-zero regression risk. Only adds an `if/else` bounds
  check with a sensible default
- **Subsystem:** HID force feedback - well-contained, affects only FF-
  capable USB HID devices

### 5. Backport Applicability

- **v6.18.y:** Patch applies cleanly (function matches HEAD context)
- **v6.15-v6.17:** Function has same structure with `pidff_set_time()` -
  minor context adjustment needed
- **v6.14 and earlier (LTS: v6.12.y, v6.6.y, v6.1.y, v5.15.y):**
  Function uses old code pattern (direct `.value[0]` assignment instead
  of `pidff_set_time()`). The fix concept is trivially portable but the
  patch won't apply as-is. The old code at v6.14 is:
  ```c
  pidff->set_effect[PID_TRIGGER_BUTTON].value[0] =
  effect->trigger.button;
  pidff->set_effect[PID_TRIGGER_REPEAT_INT].value[0] =
  effect->trigger.interval;
  ```
  The bug has existed since the driver was created (~2007).

### 6. Stable Criteria Assessment

| Criteria | Assessment |
|---|---|
| Obviously correct and tested | Yes - simple bounds check, tested with
Moza R9 + WRC games |
| Fixes a real bug | Yes - out-of-range values cause log spam and wrong
behavior |
| Important issue | Moderate - dmesg flooding + incorrect FF behavior |
| Small and contained | Yes - 10 lines in one function |
| No new features | Correct - pure input validation |

### 7. Concerns

- The patch uses C99 mixed declarations (`s32 trigger_button_max = ...`
  in the middle of the function body). While this is accepted in modern
  kernel coding, some older stable trees may have stricter compilation
  settings. For LTS backports, this should be declared at function
  scope.
- For LTS trees (6.12.y and earlier), a hand-adapted backport is needed
  since the 2025 refactoring isn't present.

### Conclusion

This is a valid input validation fix that prevents kernel log flooding
and incorrect force feedback behavior caused by userspace (games)
sending out-of-range trigger button values. The fix is small, obviously
correct, zero-risk, and addresses a real-world problem reported by force
feedback device users. Despite needing adaptation for older LTS trees,
the concept is trivially portable.

**YES**

 drivers/hid/usbhid/hid-pidff.c | 16 +++++++++++++---
 1 file changed, 13 insertions(+), 3 deletions(-)

diff --git a/drivers/hid/usbhid/hid-pidff.c b/drivers/hid/usbhid/hid-pidff.c
index 95377c5f63356..a4e700b40ba9b 100644
--- a/drivers/hid/usbhid/hid-pidff.c
+++ b/drivers/hid/usbhid/hid-pidff.c
@@ -523,9 +523,19 @@ static void pidff_set_effect_report(struct pidff_device *pidff,
 	pidff_set_duration(&pidff->set_effect[PID_DURATION],
 			   effect->replay.length);
 
-	pidff->set_effect[PID_TRIGGER_BUTTON].value[0] = effect->trigger.button;
-	pidff_set_time(&pidff->set_effect[PID_TRIGGER_REPEAT_INT],
-		       effect->trigger.interval);
+	/* Some games set this to random values that can be out of range */
+	s32 trigger_button_max =
+		pidff->set_effect[PID_TRIGGER_BUTTON].field->logical_maximum;
+	if (effect->trigger.button <= trigger_button_max) {
+		pidff->set_effect[PID_TRIGGER_BUTTON].value[0] =
+			effect->trigger.button;
+		pidff_set_time(&pidff->set_effect[PID_TRIGGER_REPEAT_INT],
+			       effect->trigger.interval);
+	} else {
+		pidff->set_effect[PID_TRIGGER_BUTTON].value[0] = 0;
+		pidff->set_effect[PID_TRIGGER_REPEAT_INT].value[0] = 0;
+	}
+
 	pidff->set_effect[PID_GAIN].value[0] =
 		pidff->set_effect[PID_GAIN].field->logical_maximum;
 
-- 
2.51.0


^ permalink raw reply related	[flat|nested] only message in thread

only message in thread, other threads:[~2026-02-14  1:03 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <20260214010245.3671907-1-sashal@kernel.org>
2026-02-14  0:58 ` [PATCH AUTOSEL 6.19-6.18] HID: pidff: Do not set out of range trigger button Sasha Levin

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox