]> www.infradead.org Git - users/jedix/linux-maple.git/commitdiff
HID: bpf: fix dispatch_hid_bpf_device_event uninitialized ret value
authorBenjamin Tissoires <bentiss@kernel.org>
Wed, 26 Jun 2024 13:46:22 +0000 (15:46 +0200)
committerBenjamin Tissoires <bentiss@kernel.org>
Thu, 27 Jun 2024 08:58:00 +0000 (10:58 +0200)
Looks like if a bpf program gets inserted and then removed,
hdev->bpf.device_data is then allocated, but the loop iterating
over the bpf program is never assigning ret.

This is a problem and also revealed another bug in which only the last
value of ret was checked. This effectively meant than only the last
program in the chain could change the size of the incoming buffer.

Reported-by: Dan Carpenter <dan.carpenter@linaro.org>
Link: https://lore.kernel.org/all/00f7b624-219f-4a05-a7ad-5335f15a41c7@moroto.mountain
Fixes: 4a86220e046d ("HID: bpf: remove tracing HID-BPF capability")
Link: https://patch.msgid.link/20240626-hid_hw_req_bpf-v2-1-cfd60fb6c79f@kernel.org
Acked-by: Jiri Kosina <jkosina@suse.com>
Signed-off-by: Benjamin Tissoires <bentiss@kernel.org>
drivers/hid/bpf/hid_bpf_dispatch.c

index 06cc628e7bb45b2a962a37245ffd7651055c4e6b..b7b11a7c69db2e6cb62d4b35b4c792cfd0c0781a 100644 (file)
@@ -57,11 +57,12 @@ dispatch_hid_bpf_device_event(struct hid_device *hdev, enum hid_report_type type
                        }
 
                        if (ret)
-                               ctx_kern.ctx.retval = ret;
+                               ctx_kern.ctx.size = ret;
                }
        }
        rcu_read_unlock();
 
+       ret = ctx_kern.ctx.size;
        if (ret) {
                if (ret > ctx_kern.ctx.allocated_size)
                        return ERR_PTR(-EINVAL);