drm/i915: Validate VBT header before trusting it

Be we read and chase pointers from the VBT, it is prudent to make sure
that those accesses are wholly contained within the MMIO region, or else
we may cause a kernel panic during boot.

Signed-off-by: Chris Wilson <chris@chris-wilson.co.uk>
Signed-off-by: Rodrigo Vivi <rodrigo.vivi@gmail.com>
Reviewed-by: Shobhit Kumar <shobhit.kumar@intel.com>
Signed-off-by: Daniel Vetter <daniel.vetter@ffwll.ch>
This commit is contained in:
Chris Wilson 2014-04-18 18:04:22 -03:00 committed by Daniel Vetter
parent d1f13fd261
commit 3dd4e84604
1 changed files with 50 additions and 18 deletions

View File

@ -1105,6 +1105,46 @@ static const struct dmi_system_id intel_no_opregion_vbt[] = {
{ } { }
}; };
static struct bdb_header *validate_vbt(char *base, size_t size,
struct vbt_header *vbt,
const char *source)
{
size_t offset;
struct bdb_header *bdb;
if (vbt == NULL) {
DRM_DEBUG_DRIVER("VBT signature missing\n");
return NULL;
}
offset = (char *)vbt - base;
if (offset + sizeof(struct vbt_header) > size) {
DRM_DEBUG_DRIVER("VBT header incomplete\n");
return NULL;
}
if (memcmp(vbt->signature, "$VBT", 4)) {
DRM_DEBUG_DRIVER("VBT invalid signature\n");
return NULL;
}
offset += vbt->bdb_offset;
if (offset + sizeof(struct bdb_header) > size) {
DRM_DEBUG_DRIVER("BDB header incomplete\n");
return NULL;
}
bdb = (struct bdb_header *)(base + offset);
if (offset + bdb->bdb_size > size) {
DRM_DEBUG_DRIVER("BDB incomplete\n");
return NULL;
}
DRM_DEBUG_KMS("Using VBT from %s: %20s\n",
source, vbt->signature);
return bdb;
}
/** /**
* intel_parse_bios - find VBT and initialize settings from the BIOS * intel_parse_bios - find VBT and initialize settings from the BIOS
* @dev: DRM device * @dev: DRM device
@ -1128,20 +1168,13 @@ intel_parse_bios(struct drm_device *dev)
init_vbt_defaults(dev_priv); init_vbt_defaults(dev_priv);
/* XXX Should this validation be moved to intel_opregion.c? */ /* XXX Should this validation be moved to intel_opregion.c? */
if (!dmi_check_system(intel_no_opregion_vbt) && dev_priv->opregion.vbt) { if (!dmi_check_system(intel_no_opregion_vbt) && dev_priv->opregion.vbt)
struct vbt_header *vbt = dev_priv->opregion.vbt; bdb = validate_vbt((char *)dev_priv->opregion.header, OPREGION_SIZE,
if (memcmp(vbt->signature, "$VBT", 4) == 0) { (struct vbt_header *)dev_priv->opregion.vbt,
DRM_DEBUG_KMS("Using VBT from OpRegion: %20s\n", "OpRegion");
vbt->signature);
bdb = (struct bdb_header *)((char *)vbt + vbt->bdb_offset);
} else
dev_priv->opregion.vbt = NULL;
}
if (bdb == NULL) { if (bdb == NULL) {
struct vbt_header *vbt = NULL; size_t i, size;
size_t size;
int i;
bios = pci_map_rom(pdev, &size); bios = pci_map_rom(pdev, &size);
if (!bios) if (!bios)
@ -1149,19 +1182,18 @@ intel_parse_bios(struct drm_device *dev)
/* Scour memory looking for the VBT signature */ /* Scour memory looking for the VBT signature */
for (i = 0; i + 4 < size; i++) { for (i = 0; i + 4 < size; i++) {
if (!memcmp(bios + i, "$VBT", 4)) { if (memcmp(bios + i, "$VBT", 4) == 0) {
vbt = (struct vbt_header *)(bios + i); bdb = validate_vbt(bios, size,
(struct vbt_header *)(bios + i),
"PCI ROM");
break; break;
} }
} }
if (!vbt) { if (!bdb) {
DRM_DEBUG_DRIVER("VBT signature missing\n");
pci_unmap_rom(pdev, bios); pci_unmap_rom(pdev, bios);
return -1; return -1;
} }
bdb = (struct bdb_header *)(bios + i + vbt->bdb_offset);
} }
/* Grab useful general definitions */ /* Grab useful general definitions */