|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH] xen/efi: Fix crash with initial empty EFI options
On Mon, Jul 7, 2025 at 5:04 PM Jan Beulich <jbeulich@xxxxxxxx> wrote:
>
> On 07.07.2025 17:51, Frediano Ziglio wrote:
> > On Mon, Jul 7, 2025 at 4:42 PM Jan Beulich <jbeulich@xxxxxxxx> wrote:
> >>
> >> On 07.07.2025 17:11, Frediano Ziglio wrote:
> >>> EFI code path split options from EFI LoadOptions fields in 2
> >>> pieces, first EFI options, second Xen options.
> >>> "get_argv" function is called first to get the number of arguments
> >>> in the LoadOptions, second, after allocating enough space, to
> >>> fill some "argc"/"argv" variable. However the first parsing could
> >>> be different from second as second is able to detect "--" argument
> >>> separator. So it was possible that "argc" was bigger that the "argv"
> >>> array leading to potential buffer overflows, in particular
> >>> a string like "-- a b c" would lead to buffer overflow in "argv"
> >>> resulting in crashes.
> >>> Using EFI shell is possible to pass any kind of string in
> >>> LoadOptions.
> >>>
> >>> Fixes: 201f261e859e ("EFI: move x86 boot/runtime code to common/efi")
> >>
> >> This only moves the function, but doesn't really introduce any issue
> >> afaics.
> >>
> >
> > Okay, I'll follow the rename
> >
> >>> --- a/xen/common/efi/boot.c
> >>> +++ b/xen/common/efi/boot.c
> >>> @@ -345,6 +345,7 @@ static unsigned int __init get_argv(unsigned int
> >>> argc, CHAR16 **argv,
> >>> VOID *data, UINTN size, UINTN
> >>> *offset,
> >>> CHAR16 **options)
> >>> {
> >>> + CHAR16 **const orig_argv = argv;
> >>> CHAR16 *ptr = (CHAR16 *)(argv + argc + 1), *prev = NULL, *cmdline =
> >>> NULL;
> >>> bool prev_sep = true;
> >>>
> >>> @@ -384,7 +385,7 @@ static unsigned int __init get_argv(unsigned int
> >>> argc, CHAR16 **argv,
> >>> {
> >>> cmdline = data + *offset;
> >>> /* Cater for the image name as first component. */
> >>> - ++argc;
> >>> + ++argv;
> >>
> >> We're on the argc == 0 and argv == NULL path here. Incrementing NULL is UB,
> >> if I'm not mistaken.
> >
> > Not as far as I know. Why?
>
> Increment and decrement operators are like additions. For additions the
> standard
> says: "For addition, either both operands shall have arithmetic type, or one
> operand shall be a pointer to an object type and the other shall have integer
> type." Neither of the alternatives is true for NULL.
>
Yes and no. The expression here is not NULL + 1, but (CHAR16**)NULL +
1, hence the pointer has a type and so the expression is valid.
> > Some systems even can use NULL pointers as valid, like mmap.
>
> Right, but that doesn't make the use of NULL C-compliant.
>
> >>> @@ -402,7 +403,7 @@ static unsigned int __init get_argv(unsigned int
> >>> argc, CHAR16 **argv,
> >>> {
> >>> if ( cur_sep )
> >>> ++ptr;
> >>> - else if ( argv )
> >>> + else if ( orig_argv )
> >>> {
> >>> *ptr = *cmdline;
> >>> *++ptr = 0;
> >>> @@ -410,8 +411,8 @@ static unsigned int __init get_argv(unsigned int
> >>> argc, CHAR16 **argv,
> >>> }
> >>> else if ( !cur_sep )
> >>> {
> >>> - if ( !argv )
> >>> - ++argc;
> >>> + if ( !orig_argv )
> >>> + ++argv;
> >>> else if ( prev && wstrcmp(prev, L"--") == 0 )
> >>> {
> >>> --argv;
> >>
> >> As per this, it looks like that on the 1st pass we may indeed overcount
> >> arguments. But ...
> >>
> >
> > I can use again argc if you prefer, not strong about it.
> >
> >>> @@ -428,9 +429,9 @@ static unsigned int __init get_argv(unsigned int
> >>> argc, CHAR16 **argv,
> >>> }
> >>> prev_sep = cur_sep;
> >>> }
> >>> - if ( argv )
> >>> + if ( orig_argv )
> >>> *argv = NULL;
> >>> - return argc;
> >>> + return argv - orig_argv;
> >>> }
> >>>
> >>> static EFI_FILE_HANDLE __init get_parent_handle(const EFI_LOADED_IMAGE
> >>> *loaded_image,
> >>> @@ -1348,8 +1349,8 @@ void EFIAPI __init noreturn efi_start(EFI_HANDLE
> >>> ImageHandle,
> >>> (argc + 1) * sizeof(*argv) +
> >>> loaded_image->LoadOptionsSize,
> >>> (void **)&argv) == EFI_SUCCESS )
> >>> - get_argv(argc, argv, loaded_image->LoadOptions,
> >>> - loaded_image->LoadOptionsSize, &offset, &options);
> >>> + argc = get_argv(argc, argv, loaded_image->LoadOptions,
> >>> + loaded_image->LoadOptionsSize, &offset,
> >>> &options);
> >>
> >> ... wouldn't this change alone cure that problem? And even that I don't
> >> follow. Below here we have
> >>
> >> for ( i = 1; i < argc; ++i )
> >> {
> >> CHAR16 *ptr = argv[i];
> >>
> >> if ( !ptr )
> >> break;
> >>
> >> and the 2nd pass of get_argv() properly terminates the (possibly too large)
> >> array with a NULL sentinel. So I wonder what it is that I'm overlooking and
> >> that is broken.
> >
> > I realized that because I got a crash, not just by looking at the code.
> >
> > The string was something like "-- a b c d":
>
> That's in the "plain command line" case or the LOAD_OPTIONS one? In the
> former case the image name should come first, aiui. And in the latter case
> the 2nd pass sets argv[0] to NULL very early, increments the pointer, and
> hence at the bottom of the function argv[1] would also be set to NULL.
> Aiui at least, i.e. ...
>
> > - the first get_argv call produces a 5 argc;
> > - you allocate space for 6 pointers and length of the entire string to copy;
> > - the parser writes a single pointer in argv and returns still 5 as argc;
> > - returned argc is ignored;
> > - code "for (i = 1; i < argc; ++i)" starts accessing argv[1] which is
> > not initialized, in case of garbage you dereference garbage.
>
> ... I don't see how argv[1] can hold garbage.
>
As I said, this happened as a crash during testing, not looking at the
code. It's a plain string in LoadOptions, *offset is set to 0 so
there's no initial set of argv[0]. argv[0] is set with the beginning
of "--" but then when "--" is detected" argv is moved back to initial
value and the terminator is written still in argv[0], so argv[1] is
never written.
> Jan
Frediano
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |