]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
Input: ff-core - prefer struct_size over open coded arithmetic
authorErick Archer <erick.archer@outlook.com>
Sat, 27 Apr 2024 15:05:56 +0000 (17:05 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 18 Jul 2024 09:40:48 +0000 (11:40 +0200)
[ Upstream commit a08b8f8557ad88ffdff8905e5da972afe52e3307 ]

This is an effort to get rid of all multiplications from allocation
functions in order to prevent integer overflows [1][2].

As the "ff" variable is a pointer to "struct ff_device" and this
structure ends in a flexible array:

struct ff_device {
[...]
struct file *effect_owners[] __counted_by(max_effects);
};

the preferred way in the kernel is to use the struct_size() helper to
do the arithmetic instead of the calculation "size + count * size" in
the kzalloc() function.

The struct_size() helper returns SIZE_MAX on overflow. So, refactor
the comparison to take advantage of this.

This way, the code is more readable and safer.

This code was detected with the help of Coccinelle, and audited and
modified manually.

Link: https://www.kernel.org/doc/html/latest/process/deprecated.html#open-coded-arithmetic-in-allocator-arguments
Link: https://github.com/KSPP/linux/issues/160
Signed-off-by: Erick Archer <erick.archer@outlook.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Link: https://lore.kernel.org/r/AS8PR02MB72371E646714BAE2E51A6A378B152@AS8PR02MB7237.eurprd02.prod.outlook.com
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/input/ff-core.c

index 1cf5deda06e19a7f6c467dafd948d7f8a31564d4..a765e185c7a122dc2434a36a6af62f4f9bbed389 100644 (file)
 /* #define DEBUG */
 
 #include <linux/input.h>
+#include <linux/limits.h>
 #include <linux/module.h>
 #include <linux/mutex.h>
+#include <linux/overflow.h>
 #include <linux/sched.h>
 #include <linux/slab.h>
 
@@ -318,9 +320,8 @@ int input_ff_create(struct input_dev *dev, unsigned int max_effects)
                return -EINVAL;
        }
 
-       ff_dev_size = sizeof(struct ff_device) +
-                               max_effects * sizeof(struct file *);
-       if (ff_dev_size < max_effects) /* overflow */
+       ff_dev_size = struct_size(ff, effect_owners, max_effects);
+       if (ff_dev_size == SIZE_MAX) /* overflow */
                return -EINVAL;
 
        ff = kzalloc(ff_dev_size, GFP_KERNEL);