]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
drm/amdgpu: validate doorbell_offset in user queue creation
authorJunrui Luo <moonafterrain@outlook.com>
Tue, 24 Mar 2026 09:39:02 +0000 (17:39 +0800)
committerAlex Deucher <alexander.deucher@amd.com>
Mon, 30 Mar 2026 18:30:55 +0000 (14:30 -0400)
amdgpu_userq_get_doorbell_index() passes the user-provided
doorbell_offset to amdgpu_doorbell_index_on_bar() without bounds
checking. An arbitrarily large doorbell_offset can cause the
calculated doorbell index to fall outside the allocated doorbell BO,
potentially corrupting kernel doorbell space.

Validate that doorbell_offset falls within the doorbell BO before
computing the BAR index, using u64 arithmetic to prevent overflow.

Fixes: f09c1e6077ab ("drm/amdgpu: generate doorbell index for userqueue")
Reported-by: Yuhao Jiang <danisjiang@gmail.com>
Signed-off-by: Junrui Luo <moonafterrain@outlook.com>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
drivers/gpu/drm/amd/amdgpu/amdgpu_userq.c

index 7f64b783954ae37c7037a1b265e723c7bab29278..0d8f6bfc8d1db3b73d00fc8f5378d959b1cd3533 100644 (file)
@@ -600,6 +600,13 @@ amdgpu_userq_get_doorbell_index(struct amdgpu_userq_mgr *uq_mgr,
                goto unpin_bo;
        }
 
+       /* Validate doorbell_offset is within the doorbell BO */
+       if ((u64)db_info->doorbell_offset * db_size + db_size >
+           amdgpu_bo_size(db_obj->obj)) {
+               r = -EINVAL;
+               goto unpin_bo;
+       }
+
        index = amdgpu_doorbell_index_on_bar(uq_mgr->adev, db_obj->obj,
                                             db_info->doorbell_offset, db_size);
        drm_dbg_driver(adev_to_drm(uq_mgr->adev),