|
|
0a122b |
From 339f13dfd338d88192a11231f4a60bec57b3b66b Mon Sep 17 00:00:00 2001
|
|
|
0a122b |
From: Kevin Wolf <kwolf@redhat.com>
|
|
|
0a122b |
Date: Tue, 25 Mar 2014 14:23:38 +0100
|
|
|
0a122b |
Subject: [PATCH 31/49] qcow2: Protect against some integer overflows in bdrv_check
|
|
|
0a122b |
|
|
|
0a122b |
RH-Author: Kevin Wolf <kwolf@redhat.com>
|
|
|
0a122b |
Message-id: <1395753835-7591-32-git-send-email-kwolf@redhat.com>
|
|
|
0a122b |
Patchwork-id: n/a
|
|
|
0a122b |
O-Subject: [virt-devel] [EMBARGOED RHEL-7.0 qemu-kvm PATCH 31/48] qcow2: Protect against some integer overflows in bdrv_check
|
|
|
0a122b |
Bugzilla: 1066691
|
|
|
0a122b |
RH-Acked-by: Jeff Cody <jcody@redhat.com>
|
|
|
0a122b |
RH-Acked-by: Stefan Hajnoczi <stefanha@redhat.com>
|
|
|
0a122b |
RH-Acked-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
|
0a122b |
|
|
|
0a122b |
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1066691
|
|
|
0a122b |
Upstream status: Series embargoed
|
|
|
0a122b |
|
|
|
0a122b |
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
|
|
|
0a122b |
---
|
|
|
0a122b |
block/qcow2-refcount.c | 18 +++++++++---------
|
|
|
0a122b |
1 files changed, 9 insertions(+), 9 deletions(-)
|
|
|
0a122b |
|
|
|
0a122b |
diff --git a/block/qcow2-refcount.c b/block/qcow2-refcount.c
|
|
|
0a122b |
index fb57c10..73ae4e3 100644
|
|
|
0a122b |
--- a/block/qcow2-refcount.c
|
|
|
0a122b |
+++ b/block/qcow2-refcount.c
|
|
|
0a122b |
@@ -1018,8 +1018,7 @@ static void inc_refcounts(BlockDriverState *bs,
|
|
|
0a122b |
int64_t offset, int64_t size)
|
|
|
0a122b |
{
|
|
|
0a122b |
BDRVQcowState *s = bs->opaque;
|
|
|
0a122b |
- int64_t start, last, cluster_offset;
|
|
|
0a122b |
- int k;
|
|
|
0a122b |
+ uint64_t start, last, cluster_offset, k;
|
|
|
0a122b |
|
|
|
0a122b |
if (size <= 0)
|
|
|
0a122b |
return;
|
|
|
0a122b |
@@ -1029,11 +1028,7 @@ static void inc_refcounts(BlockDriverState *bs,
|
|
|
0a122b |
for(cluster_offset = start; cluster_offset <= last;
|
|
|
0a122b |
cluster_offset += s->cluster_size) {
|
|
|
0a122b |
k = cluster_offset >> s->cluster_bits;
|
|
|
0a122b |
- if (k < 0) {
|
|
|
0a122b |
- fprintf(stderr, "ERROR: invalid cluster offset=0x%" PRIx64 "\n",
|
|
|
0a122b |
- cluster_offset);
|
|
|
0a122b |
- res->corruptions++;
|
|
|
0a122b |
- } else if (k >= refcount_table_size) {
|
|
|
0a122b |
+ if (k >= refcount_table_size) {
|
|
|
0a122b |
fprintf(stderr, "Warning: cluster offset=0x%" PRIx64 " is after "
|
|
|
0a122b |
"the end of the image file, can't properly check refcounts.\n",
|
|
|
0a122b |
cluster_offset);
|
|
|
0a122b |
@@ -1474,14 +1469,19 @@ int qcow2_check_refcounts(BlockDriverState *bs, BdrvCheckResult *res,
|
|
|
0a122b |
BdrvCheckMode fix)
|
|
|
0a122b |
{
|
|
|
0a122b |
BDRVQcowState *s = bs->opaque;
|
|
|
0a122b |
- int64_t size, i, highest_cluster;
|
|
|
0a122b |
- int nb_clusters, refcount1, refcount2;
|
|
|
0a122b |
+ int64_t size, i, highest_cluster, nb_clusters;
|
|
|
0a122b |
+ int refcount1, refcount2;
|
|
|
0a122b |
QCowSnapshot *sn;
|
|
|
0a122b |
uint16_t *refcount_table;
|
|
|
0a122b |
int ret;
|
|
|
0a122b |
|
|
|
0a122b |
size = bdrv_getlength(bs->file);
|
|
|
0a122b |
nb_clusters = size_to_clusters(s, size);
|
|
|
0a122b |
+ if (nb_clusters > INT_MAX) {
|
|
|
0a122b |
+ res->check_errors++;
|
|
|
0a122b |
+ return -EFBIG;
|
|
|
0a122b |
+ }
|
|
|
0a122b |
+
|
|
|
0a122b |
refcount_table = g_malloc0(nb_clusters * sizeof(uint16_t));
|
|
|
0a122b |
|
|
|
0a122b |
res->bfi.total_clusters =
|
|
|
0a122b |
--
|
|
|
0a122b |
1.7.1
|
|
|
0a122b |
|