[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190812152022.27963-4-stillcompiling@gmail.com>
Date: Mon, 12 Aug 2019 09:20:22 -0600
From: stillcompiling@...il.com
To: Jiri Kosina <jikos@...nel.org>,
Benjamin Tissoires <benjamin.tissoires@...hat.com>,
linux-input@...r.kernel.org (open list:HID CORE LAYER),
linux-kernel@...r.kernel.org (open list)
Cc: Joe Perches <joe@...ches.com>,
Joshua Clayton <stillcompiling@...il.com>
Subject: [PATCH v3 3/3] HID: core: fix dmesg flooding if report field larger than 32bit
From: Joshua Clayton <stillcompiling@...il.com>
Only warn once of oversize hid report value field
On HP spectre x360 convertible the message:
hid-sensor-hub 001F:8087:0AC2.0002: hid_field_extract() called with n (192) > 32! (kworker/1:2)
is continually printed many times per second, crowding out all else.
Protect dmesg by printing the warning only one time.
The size of the hid report field data structure should probably be increased.
The data structure is treated as a u32 in Linux, but an unlimited number
of bits in the USB hid spec, so there is some rearchitecture needed now that
devices are sending more than 32 bits.
Signed-off-by: Joshua Clayton <stillcompiling@...il.com>
diff --git a/drivers/hid/hid-core.c b/drivers/hid/hid-core.c
index 210b81a56e1a..3eaee2c37931 100644
--- a/drivers/hid/hid-core.c
+++ b/drivers/hid/hid-core.c
@@ -1311,8 +1311,8 @@ u32 hid_field_extract(const struct hid_device *hid, u8 *report,
unsigned offset, unsigned n)
{
if (n > 32) {
- hid_warn(hid, "hid_field_extract() called with n (%d) > 32! (%s)\n",
- n, current->comm);
+ hid_warn_once(hid, "%s() called with n (%d) > 32! (%s)\n",
+ __func__, n, current->comm);
n = 32;
}
--
2.21.0
Powered by blists - more mailing lists