Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1542056yba; Sun, 5 May 2019 08:31:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqx3tQ2PP5vNQfvrA6swOfHs8QGrdl0X6q3ovUfo1kkHVMtrog/f7Lx90jkf736djM9L1WKD X-Received: by 2002:a62:56d9:: with SMTP id h86mr16942683pfj.195.1557070296372; Sun, 05 May 2019 08:31:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557070296; cv=none; d=google.com; s=arc-20160816; b=K9oRdw5FraCG8ZlntjAfG+rP+P/pI4VWd7rnZY+M+Ks/xk5YxuOhLJLCmXwn+moS+g qFx8KbBYj3yrFGqtBhEmC9Pdro0VqsZheWCy2IhraPJRHV8hunt1LKnKXQUmLilrn6Fj F2KwE8mmPcA7iZlwH6rkmg8OeFle+DQgrqfAwEQGT8cuq/jKr0Eb+CVopPSIXsUyEZBx NyFt2f7g6wnsdyO0FAIP9pTXUqwNVGk3MESTNHy6E+qUSVqaxrb5nirc5zZ/l5xhjjGz FiUVTWmiVw5ckJJaD1xA34ZituwXQezEYgDSs5i+sF2VTsFvItVKJhtOgLv4GeHEXBhM qDzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=wvMxZNMBNN6SEx/Md9pPKKDS4oXBPs/9gJtHElTimXA=; b=Yqz1inDnPorkLKp8Pw3MlM7sIBgg8yr5APTo5a7I8jZpVnjCZyoyKCCL83k0P7ze/d Rx3Qyj4BLWmCUT07TmhdJlhkhB4yNhr97p4Le4pFkyehf6jzNTP1nsvYdjL1yL5QNGNk eAlaHZ0ynwCwlP9HtjBbIF5VwcPS5ljl4evxpWgjmzT+WvUPjSlX3xzKUo4Fr+OQjlys G581rQDDwOqmsAECz4sJcGJ3h6gcIbw+vxeIu9r4J8YtC69fJEI5+xZ8rLOAqUWLQQby CAUUQl48H8kLYxku7WzGwIYXhvjSOf4koJ9/jJV6golmkl/HwF+WjZ4Z8So+kq2GzPLt Lzjw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h8si11410657plb.282.2019.05.05.08.31.21; Sun, 05 May 2019 08:31:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727806AbfEEPEB (ORCPT + 99 others); Sun, 5 May 2019 11:04:01 -0400 Received: from 0.ictbs.com ([203.137.112.168]:51601 "EHLO 0.ictbs.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727657AbfEEPEB (ORCPT ); Sun, 5 May 2019 11:04:01 -0400 Received: by hq.local (Postfix, from userid 1000) id EDFD06641B; Sun, 5 May 2019 17:03:55 +0200 (CEST) Date: Sun, 5 May 2019 17:03:55 +0200 From: Victor Bravo <1905@spmblk.com> To: Arend Van Spriel Cc: Franky Lin , Hante Meuleman , Chi-Hsien Lin , Wright Feng , Kalle Valo , "David S. Miller" , linux-wireless@vger.kernel.org, brcm80211-dev-list.pdl@broadcom.com, brcm80211-dev-list@cypress.com, linux-kernel@vger.kernel.org, Hans de Goede Subject: [PATCH RFC] brcmfmac: sanitize DMI strings v2 Message-ID: <20190505150355.3fbng4ny34x255vk@localhost> References: <20190504162633.ldrz2nqfocg55grb@localhost> <20190504194440.4zcxjrtj2aft3ka4@localhost> <16a87149068.2764.9b12b7fc0a3841636cfb5e919b41b954@broadcom.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <16a87149068.2764.9b12b7fc0a3841636cfb5e919b41b954@broadcom.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Sanitize DMI strings in brcmfmac driver to make resulting filenames contain only safe characters. This version replaces all non-printable characters incl. delete (0-31, 127-255), spaces and slashes with underscores. This change breaks backward compatibility, but adds control over strings passed to firmware loader and compatibility with CONFIG_EXTRA_FIRMWARE which doesn't support spaces in filenames. Changes from v1: don't revert fresh commit by someone else Signed-off-by: Victor Bravo <1905@spmblk.com> diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/dmi.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/dmi.c index 7535cb0d4ac0..84571e09b465 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/dmi.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/dmi.c @@ -23,6 +23,14 @@ /* The DMI data never changes so we can use a static buf for this */ static char dmi_board_type[128]; +/* Array of 128 bits representing 7-bit characters allowed in DMI strings. */ +static unsigned char brcmf_dmi_allowed_chars[] = { + 0x00, 0x00, 0x00, 0x00, 0xfe, 0x7f, 0xff, 0xff, + 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x7f +}; + +#define BRCMF_DMI_SAFE_CHAR '_' + struct brcmf_dmi_data { u32 chip; u32 chiprev; @@ -99,6 +107,15 @@ static const struct dmi_system_id dmi_platform_data[] = { {} }; +void brcmf_dmi_sanitize(char *dst, const unsigned char *allowed, char safe) +{ + while (*dst) { + if ((*dst < 0) || !(allowed[*dst / 8] & (1 << (*dst % 8)))) + *dst = safe; + dst++; + } +} + void brcmf_dmi_probe(struct brcmf_mp_device *settings, u32 chip, u32 chiprev) { const struct dmi_system_id *match; @@ -126,6 +143,9 @@ void brcmf_dmi_probe(struct brcmf_mp_device *settings, u32 chip, u32 chiprev) if (sys_vendor && product_name) { snprintf(dmi_board_type, sizeof(dmi_board_type), "%s-%s", sys_vendor, product_name); + brcmf_dmi_sanitize(dmi_board_type, + brcmf_dmi_allowed_chars, + BRCMF_DMI_SAFE_CHAR); settings->board_type = dmi_board_type; } }