From: "Marvin Häuser" <mhaeuser@posteo.de>
To: Savva Mitrofanov <savvamtr@gmail.com>
Cc: devel@edk2.groups.io, Pedro Falcato <pedro.falcato@gmail.com>,
Vitaly Cheptsov <vit9696@protonmail.com>
Subject: Re: [edk2-platforms][PATCH v4 06/12] Ext4Pkg: Corrects integer overflow check logic in DiskUtil
Date: Thu, 2 Feb 2023 10:31:33 +0000 [thread overview]
Message-ID: <FFDC97F4-3F05-43CA-A5A3-D1609EACF932@posteo.de> (raw)
In-Reply-To: <20230202102133.51606-7-savvamtr@gmail.com>
Reviewed-by: Marvin Häuser <mhaeuser@posteo.de>
> On 2. Feb 2023, at 11:21, Savva Mitrofanov <savvamtr@gmail.com> wrote:
>
> Corrects multiplication overflow check code and adds additional check
> for emptiness of number of blocks and block number
>
> Cc: Marvin Häuser <mhaeuser@posteo.de>
> Cc: Pedro Falcato <pedro.falcato@gmail.com>
> Cc: Vitaly Cheptsov <vit9696@protonmail.com>
> Fixes: d9ceedca6c8f ("Ext4Pkg: Add Ext4Dxe driver.")
> Signed-off-by: Savva Mitrofanov <savvamtr@gmail.com>
> ---
> Features/Ext4Pkg/Ext4Pkg.dsc | 2 +-
> Features/Ext4Pkg/Ext4Dxe/DiskUtil.c | 18 ++++++++++++++----
> Features/Ext4Pkg/Ext4Dxe/Extents.c | 15 ++++++++++++---
> 3 files changed, 27 insertions(+), 8 deletions(-)
>
> diff --git a/Features/Ext4Pkg/Ext4Pkg.dsc b/Features/Ext4Pkg/Ext4Pkg.dsc
> index 59bc327ebf6e..621c63eaf92d 100644
> --- a/Features/Ext4Pkg/Ext4Pkg.dsc
> +++ b/Features/Ext4Pkg/Ext4Pkg.dsc
> @@ -46,7 +46,7 @@
> DevicePathLib|MdePkg/Library/UefiDevicePathLib/UefiDevicePathLib.inf
> OrderedCollectionLib|MdePkg/Library/BaseOrderedCollectionRedBlackTreeLib/BaseOrderedCollectionRedBlackTreeLib.inf
> BaseUcs2Utf8Lib|RedfishPkg/Library/BaseUcs2Utf8Lib/BaseUcs2Utf8Lib.inf
> -
> +
> #
> # Required for stack protector support
> #
> diff --git a/Features/Ext4Pkg/Ext4Dxe/DiskUtil.c b/Features/Ext4Pkg/Ext4Dxe/DiskUtil.c
> index 32da35f7d9f5..5df9ce5bafcf 100644
> --- a/Features/Ext4Pkg/Ext4Dxe/DiskUtil.c
> +++ b/Features/Ext4Pkg/Ext4Dxe/DiskUtil.c
> @@ -54,17 +54,20 @@ Ext4ReadBlocks (
> UINT64 Offset;
> UINTN Length;
>
> + ASSERT (NumberBlocks != 0);
> + ASSERT (BlockNumber != EXT4_BLOCK_FILE_HOLE);
> +
> Offset = MultU64x32 (BlockNumber, Partition->BlockSize);
> Length = NumberBlocks * Partition->BlockSize;
>
> // Check for overflow on the block -> byte conversions.
> // Partition->BlockSize is never 0, so we don't need to check for that.
>
> - if (Offset > DivU64x32 ((UINT64)-1, Partition->BlockSize)) {
> + if (DivU64x64Remainder (Offset, BlockNumber, NULL) != Partition->BlockSize) {
> return EFI_INVALID_PARAMETER;
> }
>
> - if (Length > (UINTN)-1/Partition->BlockSize) {
> + if (Length / NumberBlocks != Partition->BlockSize) {
> return EFI_INVALID_PARAMETER;
> }
>
> @@ -92,14 +95,21 @@ Ext4AllocAndReadBlocks (
> VOID *Buf;
> UINTN Length;
>
> + // Check that number of blocks isn't empty, because
> + // this is incorrect condition for opened partition,
> + // so we just early-exit
> + if ((NumberBlocks == 0) || (BlockNumber == EXT4_BLOCK_FILE_HOLE)) {
> + return NULL;
> + }
> +
> Length = NumberBlocks * Partition->BlockSize;
>
> - if (Length > (UINTN)-1/Partition->BlockSize) {
> + // Check for integer overflow
> + if (Length / NumberBlocks != Partition->BlockSize) {
> return NULL;
> }
>
> Buf = AllocatePool (Length);
> -
> if (Buf == NULL) {
> return NULL;
> }
> diff --git a/Features/Ext4Pkg/Ext4Dxe/Extents.c b/Features/Ext4Pkg/Ext4Dxe/Extents.c
> index e1001d0a4292..99cb0f204fc2 100644
> --- a/Features/Ext4Pkg/Ext4Dxe/Extents.c
> +++ b/Features/Ext4Pkg/Ext4Dxe/Extents.c
> @@ -237,6 +237,7 @@ Ext4GetExtent (
> EXT4_EXTENT_HEADER *ExtHeader;
> EXT4_EXTENT_INDEX *Index;
> EFI_STATUS Status;
> + EXT4_BLOCK_NR BlockNumber;
>
> Inode = File->Inode;
> Ext = NULL;
> @@ -288,7 +289,16 @@ Ext4GetExtent (
> // Therefore, we can use binary search, and it's actually the standard for doing so
> // (see FreeBSD).
>
> - Index = Ext4BinsearchExtentIndex (ExtHeader, LogicalBlock);
> + Index = Ext4BinsearchExtentIndex (ExtHeader, LogicalBlock);
> + BlockNumber = Ext4ExtentIdxLeafBlock (Index);
> +
> + // Check that block isn't file hole
> + if (BlockNumber == EXT4_BLOCK_FILE_HOLE) {
> + if (Buffer != NULL) {
> + FreePool (Buffer);
> + }
> + return EFI_NO_MAPPING;
> + }
>
> if (Buffer == NULL) {
> Buffer = AllocatePool (Partition->BlockSize);
> @@ -298,8 +308,7 @@ Ext4GetExtent (
> }
>
> // Read the leaf block onto the previously-allocated buffer.
> -
> - Status = Ext4ReadBlocks (Partition, Buffer, 1, Ext4ExtentIdxLeafBlock (Index));
> + Status = Ext4ReadBlocks (Partition, Buffer, 1, BlockNumber);
> if (EFI_ERROR (Status)) {
> FreePool (Buffer);
> return Status;
> --
> 2.39.1
>
next prev parent reply other threads:[~2023-02-02 10:31 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-02-02 10:21 [edk2-platforms][PATCH v4 00/12] Ext4Pkg: Code correctness and security improvements Savva Mitrofanov
2023-02-02 10:21 ` [edk2-platforms][PATCH v4 01/12] Ext4Pkg: Fix memory leak in Ext4RetrieveDirent Savva Mitrofanov
2023-02-02 10:21 ` [edk2-platforms][PATCH v4 02/12] Ext4Pkg: Fix incorrect checksum metadata feature check Savva Mitrofanov
2023-02-02 10:21 ` [edk2-platforms][PATCH v4 03/12] Ext4Pkg: Fix division by zero by adding check for s_inodes_per_group Savva Mitrofanov
2023-02-02 10:21 ` [edk2-platforms][PATCH v4 04/12] Ext4Pkg: Add inode number validity check Savva Mitrofanov
2023-02-02 10:32 ` Marvin Häuser
2023-02-02 10:21 ` [edk2-platforms][PATCH v4 05/12] Ext4Pkg: Fix shift out of bounds in Ext4OpenSuperblock Savva Mitrofanov
2023-02-02 10:21 ` [edk2-platforms][PATCH v4 06/12] Ext4Pkg: Corrects integer overflow check logic in DiskUtil Savva Mitrofanov
2023-02-02 10:31 ` Marvin Häuser [this message]
2023-02-02 10:21 ` [edk2-platforms][PATCH v4 07/12] Ext4Pkg: Check that source file is directory in Ext4OpenInternal Savva Mitrofanov
2023-02-02 10:21 ` [edk2-platforms][PATCH v4 08/12] Ext4Pkg: Check VolumeName allocation correctness in Ext4GetVolumeName Savva Mitrofanov
2023-02-02 10:21 ` [edk2-platforms][PATCH v4 09/12] Ext4Pkg: Add missing exit Status in Ext4OpenDirent Savva Mitrofanov
2023-02-02 10:21 ` [edk2-platforms][PATCH v4 10/12] Ext4Pkg: Fixes build on MSVC Savva Mitrofanov
2023-02-02 10:21 ` [edk2-platforms][PATCH v4 11/12] Ext4Pkg: Filter out directory entry names containing \0 as invalid Savva Mitrofanov
2023-02-02 10:30 ` Marvin Häuser
2023-02-02 10:21 ` [edk2-platforms][PATCH v4 12/12] Ext4Pkg: Corrects memory leak in Ext4ReadSlowSymlink Savva Mitrofanov
2023-02-02 10:29 ` Marvin Häuser
2023-02-08 16:32 ` [edk2-platforms][PATCH v4 00/12] Ext4Pkg: Code correctness and security improvements Pedro Falcato
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=FFDC97F4-3F05-43CA-A5A3-D1609EACF932@posteo.de \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox