[edk2-devel] [edk2-platforms][PATCH v3 06/11] Ext4Pkg: Corrects integer overflow check logic in DiskUtil

Savva Mitrofanov savvamtr at gmail.com
Fri Jan 27 09:29:40 UTC 2023


Corrects multiplication overflow check code

Cc: Marvin Häuser <mhaeuser at posteo.de>
Cc: Pedro Falcato <pedro.falcato at gmail.com>
Cc: Vitaly Cheptsov <vit9696 at protonmail.com>
Fixes: d9ceedca6c8f ("Ext4Pkg: Add Ext4Dxe driver.")
Signed-off-by: Savva Mitrofanov <savvamtr at gmail.com>
---
 Features/Ext4Pkg/Ext4Pkg.dsc        | 2 +-
 Features/Ext4Pkg/Ext4Dxe/DiskUtil.c | 8 ++++----
 2 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/Features/Ext4Pkg/Ext4Pkg.dsc b/Features/Ext4Pkg/Ext4Pkg.dsc
index 59bc327ebf6e..621c63eaf92d 100644
--- a/Features/Ext4Pkg/Ext4Pkg.dsc
+++ b/Features/Ext4Pkg/Ext4Pkg.dsc
@@ -46,7 +46,7 @@
   DevicePathLib|MdePkg/Library/UefiDevicePathLib/UefiDevicePathLib.inf

   OrderedCollectionLib|MdePkg/Library/BaseOrderedCollectionRedBlackTreeLib/BaseOrderedCollectionRedBlackTreeLib.inf

   BaseUcs2Utf8Lib|RedfishPkg/Library/BaseUcs2Utf8Lib/BaseUcs2Utf8Lib.inf

-  

+

   #

   # Required for stack protector support

   #

diff --git a/Features/Ext4Pkg/Ext4Dxe/DiskUtil.c b/Features/Ext4Pkg/Ext4Dxe/DiskUtil.c
index 32da35f7d9f5..c4af956da926 100644
--- a/Features/Ext4Pkg/Ext4Dxe/DiskUtil.c
+++ b/Features/Ext4Pkg/Ext4Dxe/DiskUtil.c
@@ -60,11 +60,11 @@ Ext4ReadBlocks (
   // Check for overflow on the block -> byte conversions.

   // Partition->BlockSize is never 0, so we don't need to check for that.

 

-  if (Offset > DivU64x32 ((UINT64)-1, Partition->BlockSize)) {

+  if ((NumberBlocks != 0) && (DivU64x64Remainder (Offset, BlockNumber, NULL) != Partition->BlockSize)) {

     return EFI_INVALID_PARAMETER;

   }

 

-  if (Length > (UINTN)-1/Partition->BlockSize) {

+  if ((NumberBlocks != 0) && (Length / NumberBlocks != Partition->BlockSize)) {

     return EFI_INVALID_PARAMETER;

   }

 

@@ -94,12 +94,12 @@ Ext4AllocAndReadBlocks (
 

   Length = NumberBlocks * Partition->BlockSize;

 

-  if (Length > (UINTN)-1/Partition->BlockSize) {

+  // Check for integer overflow

+  if ((NumberBlocks != 0) && (Length / NumberBlocks != Partition->BlockSize)) {

     return NULL;

   }

 

   Buf = AllocatePool (Length);

-

   if (Buf == NULL) {

     return NULL;

   }

-- 
2.39.0



-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#99141): https://edk2.groups.io/g/devel/message/99141
Mute This Topic: https://groups.io/mt/96562694/1813853
Group Owner: devel+owner at edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [edk2-devel-archive at redhat.com]
-=-=-=-=-=-=-=-=-=-=-=-




More information about the edk2-devel-archive mailing list