The Linux Kernel Mailing List
 help / color / mirror / Atom feed
  • [parent not found: <20260504-wip-fix-core-v3-4-ce1f11f4968f@kernel.org>]
  • * Re: [PATCH v3 0/4] HID: Proper fix for OOM in hid-core
           [not found] <20260504-wip-fix-core-v3-0-ce1f11f4968f@kernel.org>
           [not found] ` <20260504-wip-fix-core-v3-1-ce1f11f4968f@kernel.org>
           [not found] ` <20260504-wip-fix-core-v3-4-ce1f11f4968f@kernel.org>
    @ 2026-05-06  9:16 ` Lee Jones
      2026-05-12 10:17   ` Lee Jones
      2026-05-12 16:04 ` Jiri Kosina
      3 siblings, 1 reply; 5+ messages in thread
    From: Lee Jones @ 2026-05-06  9:16 UTC (permalink / raw)
      To: Benjamin Tissoires
      Cc: Jiri Kosina, Filipe Laíns, Bastien Nocera, Ping Cheng,
    	Jason Gerecke, Viresh Kumar, Johan Hovold, Alex Elder,
    	Greg Kroah-Hartman, Icenowy Zheng, linux-input, linux-kernel,
    	greybus-dev, linux-staging, linux-usb, stable
    
    On Mon, 04 May 2026, Benjamin Tissoires wrote:
    
    > Commit 0a3fe972a7cb ("HID: core: Mitigate potential OOB by removing
    > bogus memset()") enforced the provided data to be at least the size of
    > the declared buffer in the report descriptor to prevent a buffer
    > overflow.
    > 
    > We only had corner cases of malicious devices exposing the OOM because
    > in most cases, the buffer provided by the transport layer needs to be
    > allocated at probe time and is large enough to handle all the possible
    > reports.
    > 
    > However, the patch from above, which enforces the spec a little bit more
    > introduced both regressions for devices not following the spec (not
    > necesserally malicious), but also a stream of errors for those devices.
    > 
    > Let's revert to the old behavior by giving more information to HID core
    > to be able to decide whether it can or not memset the rest of the buffer
    > to 0 and continue the processing.
    > 
    > Note that the first commit makes an API change, but the callers are
    > relatively limited, so it should be fine on its own. The second patch
    > can't really make the same kind of API change because we have too many
    > callers in various subsystems. We can switch them one by one to the safe
    > approach when needed.
    > 
    > The last 2 patches are small cleanups I initially put together with the
    > 2 first patches, but they can be applied on their own and don't need to
    > be pulled in stable like the first 2.
    > 
    > Cheers,
    > Benjamin
    > 
    > Signed-off-by: Benjamin Tissoires <bentiss@kernel.org>
    > ---
    > Changes in v3:
    > - fixed ghib -> ghid in greybus
    > - fixed i386 size_t debug size reported by kernel-bot
    > - Link to v2: https://lore.kernel.org/r/20260416-wip-fix-core-v2-0-be92570e5627@kernel.org
    > 
    > Changes in v2:
    > - added a small blurb explaining the difference between the safe and the
    >   non safe version of hid_safe_input_report
    > - Link to v1: https://lore.kernel.org/r/20260415-wip-fix-core-v1-0-ed3c4c823175@kernel.org
    > 
    > ---
    > Benjamin Tissoires (4):
    >       HID: pass the buffer size to hid_report_raw_event
    >       HID: core: introduce hid_safe_input_report()
    >       HID: multitouch: use __free(kfree) to clean up temporary buffers
    >       HID: wacom: use __free(kfree) to clean up temporary buffers
    > 
    >  drivers/hid/bpf/hid_bpf_dispatch.c |  6 ++--
    >  drivers/hid/hid-core.c             | 67 ++++++++++++++++++++++++++++++--------
    >  drivers/hid/hid-gfrm.c             |  4 +--
    >  drivers/hid/hid-logitech-hidpp.c   |  2 +-
    >  drivers/hid/hid-multitouch.c       | 18 ++++------
    >  drivers/hid/hid-primax.c           |  2 +-
    >  drivers/hid/hid-vivaldi-common.c   |  2 +-
    >  drivers/hid/i2c-hid/i2c-hid-core.c |  7 ++--
    >  drivers/hid/usbhid/hid-core.c      | 11 ++++---
    >  drivers/hid/wacom_sys.c            | 46 +++++++++-----------------
    >  drivers/staging/greybus/hid.c      |  2 +-
    >  include/linux/hid.h                |  6 ++--
    >  include/linux/hid_bpf.h            | 14 +++++---
    >  13 files changed, 109 insertions(+), 78 deletions(-)
    
    What's the plan for this set Benjamin? -rcs or -next?
    
    -- 
    Lee Jones
    
    ^ permalink raw reply	[flat|nested] 5+ messages in thread
  • * Re: [PATCH v3 0/4] HID: Proper fix for OOM in hid-core
           [not found] <20260504-wip-fix-core-v3-0-ce1f11f4968f@kernel.org>
                       ` (2 preceding siblings ...)
      2026-05-06  9:16 ` [PATCH v3 0/4] HID: Proper fix for OOM in hid-core Lee Jones
    @ 2026-05-12 16:04 ` Jiri Kosina
      3 siblings, 0 replies; 5+ messages in thread
    From: Jiri Kosina @ 2026-05-12 16:04 UTC (permalink / raw)
      To: Benjamin Tissoires
      Cc: Filipe Laíns, Bastien Nocera, Ping Cheng, Jason Gerecke,
    	Viresh Kumar, Johan Hovold, Alex Elder, Greg Kroah-Hartman,
    	Lee Jones, Icenowy Zheng, linux-input, linux-kernel, greybus-dev,
    	linux-staging, linux-usb, stable
    
    On Mon, 4 May 2026, Benjamin Tissoires wrote:
    
    > Commit 0a3fe972a7cb ("HID: core: Mitigate potential OOB by removing
    > bogus memset()") enforced the provided data to be at least the size of
    > the declared buffer in the report descriptor to prevent a buffer
    > overflow.
    > 
    > We only had corner cases of malicious devices exposing the OOM because
    > in most cases, the buffer provided by the transport layer needs to be
    > allocated at probe time and is large enough to handle all the possible
    > reports.
    > 
    > However, the patch from above, which enforces the spec a little bit more
    > introduced both regressions for devices not following the spec (not
    > necesserally malicious), but also a stream of errors for those devices.
    > 
    > Let's revert to the old behavior by giving more information to HID core
    > to be able to decide whether it can or not memset the rest of the buffer
    > to 0 and continue the processing.
    > 
    > Note that the first commit makes an API change, but the callers are
    > relatively limited, so it should be fine on its own. The second patch
    > can't really make the same kind of API change because we have too many
    > callers in various subsystems. We can switch them one by one to the safe
    > approach when needed.
    > 
    > The last 2 patches are small cleanups I initially put together with the
    > 2 first patches, but they can be applied on their own and don't need to
    > be pulled in stable like the first 2.
    > 
    > Cheers,
    > Benjamin
    > 
    > Signed-off-by: Benjamin Tissoires <bentiss@kernel.org>
    
    I have now queued the first two in hid.git#for-7.1/upstream-fixes.
    
    I expect the remaining two will be applied once respun with Dmitry's 
    suggestion on proper guarding.
    
    Thanks,
    
    -- 
    Jiri Kosina
    SUSE Labs
    
    
    ^ permalink raw reply	[flat|nested] 5+ messages in thread

  • end of thread, other threads:[~2026-05-12 16:04 UTC | newest]
    
    Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
    -- links below jump to the message on this page --
         [not found] <20260504-wip-fix-core-v3-0-ce1f11f4968f@kernel.org>
         [not found] ` <20260504-wip-fix-core-v3-1-ce1f11f4968f@kernel.org>
    2026-05-04 12:21   ` [PATCH v3 1/4] HID: pass the buffer size to hid_report_raw_event Greg Kroah-Hartman
         [not found] ` <20260504-wip-fix-core-v3-4-ce1f11f4968f@kernel.org>
    2026-05-04 23:15   ` [PATCH v3 4/4] HID: wacom: use __free(kfree) to clean up temporary buffers Dmitry Torokhov
    2026-05-06  9:16 ` [PATCH v3 0/4] HID: Proper fix for OOM in hid-core Lee Jones
    2026-05-12 10:17   ` Lee Jones
    2026-05-12 16:04 ` Jiri Kosina
    

    This is a public inbox, see mirroring instructions
    for how to clone and mirror all data and code used for this inbox