Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1098758pxf; Fri, 2 Apr 2021 00:49:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyJ2bngabi+ddN1TKahoMDXGacJSWJpSB2wY+0jTQuzCVm+Vj3DFrMnFpbdNT0LskOTe3FC X-Received: by 2002:a02:cb4b:: with SMTP id k11mr11768909jap.144.1617349747625; Fri, 02 Apr 2021 00:49:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617349747; cv=none; d=google.com; s=arc-20160816; b=h5p5E8QZepCGhTAModT5UW0jpH9zMSUN5t0sZxkVQls3n49C5/VgYAwsVc28AdS/sl BpIoorUpDXcQBq2FQbqr9wA6vjRNHlkrFITUz9oN7z/j8CYK22yrhR0W19aH3fhhsx0L YrGSOH93t30W3jNgEJW741NIXDloo76a+Sa8jz5ojaW0TEqUvzerJWUqmpl6rC/UdbMS M2sCIRIAbWV9s+S4giS+aQBvr5Qz5ykC+wkaUMfO3kbiXPttZIO8Fs4ryzipCEyXeaGw SbeJlsWMYY5LqIGV+Ns4jUNUb7gpAl7+nZjCj80d7G3sTCf0qZU28fXYLm5UZSEUlr6R CvVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=Xf6tD5EYLZpoc53TQIg1lusr8HkHkYp2u5iVeXY75JU=; b=kMNaCnGgk+MX8RvCa5KiiypcbglvAXXJqFqXhRGV5308BX7XGiymLBSUq4UY2ZENgD ipYhxHgxa/KDCfeZ7dJrOYziQXcmC7+4+BH2feKAxrAWG7x0jFla/7K++mwkypkKfscJ vkIuNlH1OIFeOHSJ3VM3/DXp1OE1wYtnIJdzvFOoFMkW06GOTmOcrLFUscMQwcTMIOZV rABYnS0bp/0vspACRSv47rW43UC/MYqvXJVIlv67Zk4vg1vmBW5KG/0qa/m3w5/qqS5N +DAngHUueeqNtqEZc7NWqb/2q/uKTm/QNsMSjcaekw/jhR5eAqXg8X0O5W4U6PEj64QF ot2w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f32si7419392jav.9.2021.04.02.00.48.53; Fri, 02 Apr 2021 00:49:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234397AbhDBHr6 (ORCPT + 99 others); Fri, 2 Apr 2021 03:47:58 -0400 Received: from mx2.suse.de ([195.135.220.15]:59642 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233901AbhDBHr5 (ORCPT ); Fri, 2 Apr 2021 03:47:57 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id D78DDABED; Fri, 2 Apr 2021 07:47:55 +0000 (UTC) From: Takashi Iwai To: Jani Nikula , Joonas Lahtinen , Rodrigo Vivi Cc: intel-gfx@lists.freedesktop.org, linux-kernel@vger.kernel.org Subject: [PATCH] drm/i915: Fix invalid access to ACPI _DSM objects Date: Fri, 2 Apr 2021 09:47:49 +0200 Message-Id: <20210402074749.25957-1-tiwai@suse.de> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org intel_dsm_platform_mux_info() tries to parse the ACPI package data from _DSM for the debug information, but it assumes the fixed format without checking what values are stored in the elements actually. When an unexpected value is returned from BIOS, it may lead to GPF or NULL dereference, as reported recently. Add the checks of the contents in the returned values and skip the values for invalid cases. BugLink: http://bugzilla.opensuse.org/show_bug.cgi?id=1184074 Cc: Signed-off-by: Takashi Iwai --- drivers/gpu/drm/i915/display/intel_acpi.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/drivers/gpu/drm/i915/display/intel_acpi.c b/drivers/gpu/drm/i915/display/intel_acpi.c index e21fb14d5e07..492ebc0a8257 100644 --- a/drivers/gpu/drm/i915/display/intel_acpi.c +++ b/drivers/gpu/drm/i915/display/intel_acpi.c @@ -84,6 +84,11 @@ static void intel_dsm_platform_mux_info(acpi_handle dhandle) return; } + if (!pkg->package.count) { + DRM_DEBUG_DRIVER("no connection in _DSM\n"); + return; + } + connector_count = &pkg->package.elements[0]; DRM_DEBUG_DRIVER("MUX info connectors: %lld\n", (unsigned long long)connector_count->integer.value); @@ -91,6 +96,13 @@ static void intel_dsm_platform_mux_info(acpi_handle dhandle) union acpi_object *obj = &pkg->package.elements[i]; union acpi_object *connector_id = &obj->package.elements[0]; union acpi_object *info = &obj->package.elements[1]; + + if (obj->type != ACPI_TYPE_PACKAGE || obj->package.count < 2 || + info->type != ACPI_TYPE_BUFFER || info->buffer.length < 4) { + DRM_DEBUG_DRIVER("Invalid object for MUX #%d\n", i); + continue; + } + DRM_DEBUG_DRIVER("Connector id: 0x%016llx\n", (unsigned long long)connector_id->integer.value); DRM_DEBUG_DRIVER(" port id: %s\n", -- 2.26.2