|
|
a4d572 |
From 7de922a99acd0521b99cd0dd81fe62643ce734a5 Mon Sep 17 00:00:00 2001
|
|
|
a4d572 |
From: Alexey Makhalov <amakhalov@vmware.com>
|
|
|
a4d572 |
Date: Fri, 17 Jul 2020 05:17:26 +0000
|
|
|
a4d572 |
Subject: [PATCH 299/314] relocator: Fix grub_relocator_alloc_chunk_align() top
|
|
|
a4d572 |
memory allocation
|
|
|
a4d572 |
|
|
|
a4d572 |
Current implementation of grub_relocator_alloc_chunk_align()
|
|
|
a4d572 |
does not allow allocation of the top byte.
|
|
|
a4d572 |
|
|
|
a4d572 |
Assuming input args are:
|
|
|
a4d572 |
max_addr = 0xfffff000;
|
|
|
a4d572 |
size = 0x1000;
|
|
|
a4d572 |
|
|
|
a4d572 |
And this is valid. But following overflow protection will
|
|
|
a4d572 |
unnecessarily move max_addr one byte down (to 0xffffefff):
|
|
|
a4d572 |
if (max_addr > ~size)
|
|
|
a4d572 |
max_addr = ~size;
|
|
|
a4d572 |
|
|
|
a4d572 |
~size + 1 will fix the situation. In addition, check size
|
|
|
a4d572 |
for non zero to do not zero max_addr.
|
|
|
a4d572 |
|
|
|
a4d572 |
Signed-off-by: Alexey Makhalov <amakhalov@vmware.com>
|
|
|
a4d572 |
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
|
|
|
a4d572 |
Upstream-commit-id: ab80a97eb1f
|
|
|
a4d572 |
---
|
|
|
a4d572 |
grub-core/lib/relocator.c | 4 ++--
|
|
|
a4d572 |
1 file changed, 2 insertions(+), 2 deletions(-)
|
|
|
a4d572 |
|
|
|
a4d572 |
diff --git a/grub-core/lib/relocator.c b/grub-core/lib/relocator.c
|
|
|
a4d572 |
index 5847aac3643..f2c1944c28d 100644
|
|
|
a4d572 |
--- a/grub-core/lib/relocator.c
|
|
|
a4d572 |
+++ b/grub-core/lib/relocator.c
|
|
|
a4d572 |
@@ -1386,8 +1386,8 @@ grub_relocator_alloc_chunk_align (struct grub_relocator *rel,
|
|
|
a4d572 |
};
|
|
|
a4d572 |
grub_addr_t min_addr2 = 0, max_addr2;
|
|
|
a4d572 |
|
|
|
a4d572 |
- if (max_addr > ~size)
|
|
|
a4d572 |
- max_addr = ~size;
|
|
|
a4d572 |
+ if (size && (max_addr > ~size))
|
|
|
a4d572 |
+ max_addr = ~size + 1;
|
|
|
a4d572 |
|
|
|
a4d572 |
#ifdef GRUB_MACHINE_PCBIOS
|
|
|
a4d572 |
if (min_addr < 0x1000)
|
|
|
a4d572 |
--
|
|
|
a4d572 |
2.26.2
|
|
|
a4d572 |
|