* [PATCH v2] efi_loader: Fix memory corruption on 32bit systems
@ 2023-07-27 7:11 Dan Carpenter
2023-07-27 8:22 ` Ilias Apalodimas
0 siblings, 1 reply; 5+ messages in thread
From: Dan Carpenter @ 2023-07-27 7:11 UTC (permalink / raw)
To: Heinrich Schuchardt; +Cc: Ilias Apalodimas, u-boot
The issue is this line:
new_efi = efi_prepare_aligned_image(efi, (u64 *)&efi_size);
The efi_size variable is type size_t and on a 32 bit system that's 32
bits. The u64 type is obviously 64 bits. So we write 8 bytes to a 4
byte buffer which corrupts memory.
Fix this by changing the type of efi_prepare_aligned_image() to a
size_t pointer.
Signed-off-by: Dan Carpenter <dan.carpenter@linaro.org>
---
v2: Change efi_prepare_aligned_image() instead of changing
efi_image_authenticate(). This is a cleaner way to fix the problem.
include/efi_loader.h | 2 +-
lib/efi_loader/efi_image_loader.c | 4 ++--
lib/efi_loader/efi_tcg2.c | 2 +-
3 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/include/efi_loader.h b/include/efi_loader.h
index b5fa0fe01ded..9c1a9ed16af6 100644
--- a/include/efi_loader.h
+++ b/include/efi_loader.h
@@ -1022,7 +1022,7 @@ bool efi_secure_boot_enabled(void);
bool efi_capsule_auth_enabled(void);
-void *efi_prepare_aligned_image(void *efi, u64 *efi_size);
+void *efi_prepare_aligned_image(void *efi, size_t *efi_size);
bool efi_image_parse(void *efi, size_t len, struct efi_image_regions **regp,
WIN_CERTIFICATE **auth, size_t *auth_len);
diff --git a/lib/efi_loader/efi_image_loader.c b/lib/efi_loader/efi_image_loader.c
index 26df0da16c93..64980008403b 100644
--- a/lib/efi_loader/efi_image_loader.c
+++ b/lib/efi_loader/efi_image_loader.c
@@ -313,7 +313,7 @@ static int cmp_pe_section(const void *arg1, const void *arg2)
*
* Return: valid pointer to a image, return NULL if allocation fails.
*/
-void *efi_prepare_aligned_image(void *efi, u64 *efi_size)
+void *efi_prepare_aligned_image(void *efi, size_t *efi_size)
{
size_t new_efi_size;
void *new_efi;
@@ -600,7 +600,7 @@ static bool efi_image_authenticate(void *efi, size_t efi_size)
if (!efi_secure_boot_enabled())
return true;
- new_efi = efi_prepare_aligned_image(efi, (u64 *)&efi_size);
+ new_efi = efi_prepare_aligned_image(efi, &efi_size);
if (!new_efi)
return false;
diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_loader/efi_tcg2.c
index 49f8a5e77cbf..d57afd0c498b 100644
--- a/lib/efi_loader/efi_tcg2.c
+++ b/lib/efi_loader/efi_tcg2.c
@@ -882,7 +882,7 @@ out:
*
* Return: status code
*/
-static efi_status_t tcg2_hash_pe_image(void *efi, u64 efi_size,
+static efi_status_t tcg2_hash_pe_image(void *efi, size_t efi_size,
struct tpml_digest_values *digest_list)
{
WIN_CERTIFICATE *wincerts = NULL;
--
2.39.2
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH v2] efi_loader: Fix memory corruption on 32bit systems
2023-07-27 7:11 [PATCH v2] efi_loader: Fix memory corruption on 32bit systems Dan Carpenter
@ 2023-07-27 8:22 ` Ilias Apalodimas
2023-07-27 9:49 ` Dan Carpenter
0 siblings, 1 reply; 5+ messages in thread
From: Ilias Apalodimas @ 2023-07-27 8:22 UTC (permalink / raw)
To: Dan Carpenter; +Cc: Heinrich Schuchardt, u-boot
Hi Dan,
[...]
> @@ -313,7 +313,7 @@ static int cmp_pe_section(const void *arg1, const void *arg2)
> *
> * Return: valid pointer to a image, return NULL if allocation fails.
> */
> -void *efi_prepare_aligned_image(void *efi, u64 *efi_size)
> +void *efi_prepare_aligned_image(void *efi, size_t *efi_size)
> {
> size_t new_efi_size;
> void *new_efi;
> @@ -600,7 +600,7 @@ static bool efi_image_authenticate(void *efi, size_t efi_size)
> if (!efi_secure_boot_enabled())
> return true;
>
> - new_efi = efi_prepare_aligned_image(efi, (u64 *)&efi_size);
> + new_efi = efi_prepare_aligned_image(efi, &efi_size);
> if (!new_efi)
> return false;
>
> diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_loader/efi_tcg2.c
> index 49f8a5e77cbf..d57afd0c498b 100644
> --- a/lib/efi_loader/efi_tcg2.c
> +++ b/lib/efi_loader/efi_tcg2.c
> @@ -882,7 +882,7 @@ out:
> *
> * Return: status code
> */
> -static efi_status_t tcg2_hash_pe_image(void *efi, u64 efi_size,
> +static efi_status_t tcg2_hash_pe_image(void *efi, size_t efi_size,
> struct tpml_digest_values *digest_list)
Unfortunately the rabbit hole is a bit deeper with this one.
tcg2_hash_pe_image() is called in
- tcg2_measure_pe_image(). This one is called in efi_load_pe() and the type
is indeed a size_t there, so that's fine
- efi_tcg2_hash_log_extend_event(), this one is different...
The function is described by the EFI spec [0] which mandates a u64... I
think that was the reason efi_prepare_aligned_image() is using a u64 to
begin with. This one uses the size only though not the pointer, but in a
32bit platform it would truncate s size > UINT_MAX.
[0] https://trustedcomputinggroup.org/wp-content/uploads/EFI-Protocol-Specification-rev13-160330final.pdf
Regards
/Ilias
> {
> WIN_CERTIFICATE *wincerts = NULL;
> --
> 2.39.2
>
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH v2] efi_loader: Fix memory corruption on 32bit systems
2023-07-27 8:22 ` Ilias Apalodimas
@ 2023-07-27 9:49 ` Dan Carpenter
2023-07-28 1:51 ` Simon Glass
0 siblings, 1 reply; 5+ messages in thread
From: Dan Carpenter @ 2023-07-27 9:49 UTC (permalink / raw)
To: Ilias Apalodimas; +Cc: Heinrich Schuchardt, u-boot
On Thu, Jul 27, 2023 at 11:22:15AM +0300, Ilias Apalodimas wrote:
> Hi Dan,
>
> [...]
>
> > @@ -313,7 +313,7 @@ static int cmp_pe_section(const void *arg1, const void *arg2)
> > *
> > * Return: valid pointer to a image, return NULL if allocation fails.
> > */
> > -void *efi_prepare_aligned_image(void *efi, u64 *efi_size)
> > +void *efi_prepare_aligned_image(void *efi, size_t *efi_size)
> > {
> > size_t new_efi_size;
> > void *new_efi;
> > @@ -600,7 +600,7 @@ static bool efi_image_authenticate(void *efi, size_t efi_size)
> > if (!efi_secure_boot_enabled())
> > return true;
> >
> > - new_efi = efi_prepare_aligned_image(efi, (u64 *)&efi_size);
> > + new_efi = efi_prepare_aligned_image(efi, &efi_size);
> > if (!new_efi)
> > return false;
> >
> > diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_loader/efi_tcg2.c
> > index 49f8a5e77cbf..d57afd0c498b 100644
> > --- a/lib/efi_loader/efi_tcg2.c
> > +++ b/lib/efi_loader/efi_tcg2.c
> > @@ -882,7 +882,7 @@ out:
> > *
> > * Return: status code
> > */
> > -static efi_status_t tcg2_hash_pe_image(void *efi, u64 efi_size,
> > +static efi_status_t tcg2_hash_pe_image(void *efi, size_t efi_size,
> > struct tpml_digest_values *digest_list)
>
> Unfortunately the rabbit hole is a bit deeper with this one.
> tcg2_hash_pe_image() is called in
> - tcg2_measure_pe_image(). This one is called in efi_load_pe() and the type
> is indeed a size_t there, so that's fine
> - efi_tcg2_hash_log_extend_event(), this one is different...
> The function is described by the EFI spec [0] which mandates a u64... I
> think that was the reason efi_prepare_aligned_image() is using a u64 to
> begin with. This one uses the size only though not the pointer, but in a
> 32bit platform it would truncate s size > UINT_MAX.
>
> [0] https://trustedcomputinggroup.org/wp-content/uploads/EFI-Protocol-Specification-rev13-160330final.pdf
I have maybe misread something... I don't think this is a real issue.
32bit systems aren't going to be able to allocate that much memory
anyway. Also there are a lot of size_t parameters already so it's not
a new issue.
regards,
dan carpenter
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH v2] efi_loader: Fix memory corruption on 32bit systems
2023-07-27 9:49 ` Dan Carpenter
@ 2023-07-28 1:51 ` Simon Glass
2023-07-28 4:52 ` Heinrich Schuchardt
0 siblings, 1 reply; 5+ messages in thread
From: Simon Glass @ 2023-07-28 1:51 UTC (permalink / raw)
To: Dan Carpenter; +Cc: Ilias Apalodimas, Heinrich Schuchardt, u-boot
Hi,
On Thu, 27 Jul 2023 at 08:36, Dan Carpenter <dan.carpenter@linaro.org> wrote:
>
> On Thu, Jul 27, 2023 at 11:22:15AM +0300, Ilias Apalodimas wrote:
> > Hi Dan,
> >
> > [...]
> >
> > > @@ -313,7 +313,7 @@ static int cmp_pe_section(const void *arg1, const void *arg2)
> > > *
> > > * Return: valid pointer to a image, return NULL if allocation fails.
> > > */
> > > -void *efi_prepare_aligned_image(void *efi, u64 *efi_size)
> > > +void *efi_prepare_aligned_image(void *efi, size_t *efi_size)
> > > {
> > > size_t new_efi_size;
> > > void *new_efi;
> > > @@ -600,7 +600,7 @@ static bool efi_image_authenticate(void *efi, size_t efi_size)
> > > if (!efi_secure_boot_enabled())
> > > return true;
> > >
> > > - new_efi = efi_prepare_aligned_image(efi, (u64 *)&efi_size);
> > > + new_efi = efi_prepare_aligned_image(efi, &efi_size);
> > > if (!new_efi)
> > > return false;
> > >
> > > diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_loader/efi_tcg2.c
> > > index 49f8a5e77cbf..d57afd0c498b 100644
> > > --- a/lib/efi_loader/efi_tcg2.c
> > > +++ b/lib/efi_loader/efi_tcg2.c
> > > @@ -882,7 +882,7 @@ out:
> > > *
> > > * Return: status code
> > > */
> > > -static efi_status_t tcg2_hash_pe_image(void *efi, u64 efi_size,
> > > +static efi_status_t tcg2_hash_pe_image(void *efi, size_t efi_size,
> > > struct tpml_digest_values *digest_list)
> >
> > Unfortunately the rabbit hole is a bit deeper with this one.
> > tcg2_hash_pe_image() is called in
> > - tcg2_measure_pe_image(). This one is called in efi_load_pe() and the type
> > is indeed a size_t there, so that's fine
> > - efi_tcg2_hash_log_extend_event(), this one is different...
> > The function is described by the EFI spec [0] which mandates a u64... I
> > think that was the reason efi_prepare_aligned_image() is using a u64 to
> > begin with. This one uses the size only though not the pointer, but in a
> > 32bit platform it would truncate s size > UINT_MAX.
> >
> > [0] https://trustedcomputinggroup.org/wp-content/uploads/EFI-Protocol-Specification-rev13-160330final.pdf
>
> I have maybe misread something... I don't think this is a real issue.
> 32bit systems aren't going to be able to allocate that much memory
> anyway. Also there are a lot of size_t parameters already so it's not
> a new issue.
We should really use ulong for addresses and malloc() sizes.
Regards,
Simon
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH v2] efi_loader: Fix memory corruption on 32bit systems
2023-07-28 1:51 ` Simon Glass
@ 2023-07-28 4:52 ` Heinrich Schuchardt
0 siblings, 0 replies; 5+ messages in thread
From: Heinrich Schuchardt @ 2023-07-28 4:52 UTC (permalink / raw)
To: Simon Glass, Dan Carpenter; +Cc: Ilias Apalodimas, u-boot
Am 28. Juli 2023 03:51:55 MESZ schrieb Simon Glass <sjg@google.com>:
>Hi,
>
>On Thu, 27 Jul 2023 at 08:36, Dan Carpenter <dan.carpenter@linaro.org> wrote:
>>
>> On Thu, Jul 27, 2023 at 11:22:15AM +0300, Ilias Apalodimas wrote:
>> > Hi Dan,
>> >
>> > [...]
>> >
>> > > @@ -313,7 +313,7 @@ static int cmp_pe_section(const void *arg1, const void *arg2)
>> > > *
>> > > * Return: valid pointer to a image, return NULL if allocation fails.
>> > > */
>> > > -void *efi_prepare_aligned_image(void *efi, u64 *efi_size)
>> > > +void *efi_prepare_aligned_image(void *efi, size_t *efi_size)
>> > > {
>> > > size_t new_efi_size;
>> > > void *new_efi;
>> > > @@ -600,7 +600,7 @@ static bool efi_image_authenticate(void *efi, size_t efi_size)
>> > > if (!efi_secure_boot_enabled())
>> > > return true;
>> > >
>> > > - new_efi = efi_prepare_aligned_image(efi, (u64 *)&efi_size);
>> > > + new_efi = efi_prepare_aligned_image(efi, &efi_size);
>> > > if (!new_efi)
>> > > return false;
>> > >
>> > > diff --git a/lib/efi_loader/efi_tcg2.c b/lib/efi_loader/efi_tcg2.c
>> > > index 49f8a5e77cbf..d57afd0c498b 100644
>> > > --- a/lib/efi_loader/efi_tcg2.c
>> > > +++ b/lib/efi_loader/efi_tcg2.c
>> > > @@ -882,7 +882,7 @@ out:
>> > > *
>> > > * Return: status code
>> > > */
>> > > -static efi_status_t tcg2_hash_pe_image(void *efi, u64 efi_size,
>> > > +static efi_status_t tcg2_hash_pe_image(void *efi, size_t efi_size,
>> > > struct tpml_digest_values *digest_list)
>> >
>> > Unfortunately the rabbit hole is a bit deeper with this one.
>> > tcg2_hash_pe_image() is called in
>> > - tcg2_measure_pe_image(). This one is called in efi_load_pe() and the type
>> > is indeed a size_t there, so that's fine
>> > - efi_tcg2_hash_log_extend_event(), this one is different...
>> > The function is described by the EFI spec [0] which mandates a u64... I
>> > think that was the reason efi_prepare_aligned_image() is using a u64 to
>> > begin with. This one uses the size only though not the pointer, but in a
>> > 32bit platform it would truncate s size > UINT_MAX.
>> >
>> > [0] https://trustedcomputinggroup.org/wp-content/uploads/EFI-Protocol-Specification-rev13-160330final.pdf
>>
>> I have maybe misread something... I don't think this is a real issue.
>> 32bit systems aren't going to be able to allocate that much memory
>> anyway. Also there are a lot of size_t parameters already so it's not
>> a new issue.
>
>We should really use ulong for addresses and malloc() sizes.
Please, do not abuse long.
According to the C specification the size of long is independent of the size of pointers.
Addresses should be pointers and sizes should be size_t.
Best regards
Heinrich
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2023-07-28 4:52 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-07-27 7:11 [PATCH v2] efi_loader: Fix memory corruption on 32bit systems Dan Carpenter
2023-07-27 8:22 ` Ilias Apalodimas
2023-07-27 9:49 ` Dan Carpenter
2023-07-28 1:51 ` Simon Glass
2023-07-28 4:52 ` Heinrich Schuchardt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox