- 21 Jan, 2015 20 commits
-
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
validity.
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
* grub-core/fs/nilfs2.c (grub_nilfs2_valid_sb): Check that block size is <= 1GiB.
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
Vladimir Serbinenko authored
-
- 19 Jan, 2015 1 commit
-
-
Kris Moore authored
-
- 09 Dec, 2014 1 commit
-
-
Andrei Borzenkov authored
-
- 07 Dec, 2014 4 commits
-
-
David Kozub authored
The unaligned local in __aeabi_uidivmod leads to a store to a 64bit value at an address that is not divisible by 8 (in grub_divmod64). The compiler most likely generates a STRD instruction to store it and this causes an exception. Fixes Savannah bug #43632. This includes improvements done by Leif Lindholm.
-
Peter Nelson authored
-
Andrei Borzenkov authored
util/grub-mkconfig_lib.in(version_test_gt): "echo -n" is not really needed, final newline is stripped by command substitution. util/grub.d/10_kfreebsd.in, util/grub.d/10_linux.in, util/grub.d/20_linux_xen.in: change how list is built, to avoid echo -n completely. util/grub.d/30_os-prober.in: add spaces to printed line directly Closes 43668.
-
Curtis Larsen authored
Using the http module to download config files, produces memory errors, after the config file is downloaded. The error was traced to the tcp stack in grub-core/net/tcp.c. The wrong netbuff pointer was being freed in the clean up loop. Changing the code to free the correct netbuff pointer removes the runtime error. Closes 42765.
-
- 05 Dec, 2014 3 commits
-
-
Andrei Borzenkov authored
grub_pubkey_open closed original file after it was read; it set io->device to NULL to prevent grub_file_close from trying to close device. But network device itself is stacked (net -> bufio); and bufio preserved original netfs file which hold reference to device. grub_file_close(io) called grub_bufio_close which called grub_file_close for original file. grub_file_close(netfs-file) now also called grub_device_close which freed file->device->net. So file structure returned by grub_pubkey_open now had device->net pointed to freed memory. When later file was closed, it was attempted to be freed again. Change grub_pubkey_open to behave like other filters - preserve original parent file and pass grub_file_close down to parent. In this way only the original file will close device. We really need to move this logic into core instead. Also plug memory leaks in error paths on the way. Reported-By:
Robert Kliewer <robert.kliewer@gmail.com> Closes: bug #43601
-
Andrei Borzenkov authored
Tests file access with all filters enabled. It does it both for local and network access, due to regression in signature checking over network. This includes all files in distribution to not depend on existence of compression tools and gpg. Test preloads all required modules to avoid having to provide signatures for them. Still not implemented is file offset filter (is not available in grub script, needs extra module)
-
Andrei Borzenkov authored
This allows running tests that require extra files using netboot as well.
-
- 01 Dec, 2014 2 commits
-
-
Andrei Borzenkov authored
CID: 73645, 73782
-
Andrei Borzenkov authored
CID: 73635
-
- 30 Nov, 2014 1 commit
-
-
Andrei Borzenkov authored
say->msg is inline array in a structure and should not be freed. CID: 73610
-
- 28 Nov, 2014 8 commits
-
-
Andrei Borzenkov authored
CID: 73665
-
Andrei Borzenkov authored
-
Andrei Borzenkov authored
CID: 73813, 73710
-
Andrei Borzenkov authored
Fixes commit 0415dbe2.
-
Andrei Borzenkov authored
configure_ciphers: - several memory leaks where allocated ciphers were not freed. CID: 73813, 73710 - use after free. It is probably quite innocent as grub is single threaded, but could potentially be a problem with memory allocator debugger turned on. CID: 73730 luks_recover_key: - memory leak. CID: 73854
-
Andrei Borzenkov authored
Check that modinfo.sh could be read successfully; abort on error. Avoids potential out-of-bound array access. CID: 73819
-
Andrei Borzenkov authored
Magic size is 6 bytes and we copied 7 bytes in it. CID: 73587, 73888 Closes bug 43690
-
Michael Chang authored
Many routers have long router advertisment interval configured by default. The Neighbor Discovery protocol (RFC4861) has defined default MaxRtrAdvInterval value as 600 seconds and MinRtrAdvInterval as 0.33*MaxRtrAdvInterval. This makes net_ipv6_autoconf fails more often than not as currently it passively listens the RA message to perfom address autoconfiguration. This patch tries to send router solicitation to overcome the problem of long RA interval. v2: use cpu_to_be macro for network byte order conversion add missing error handling
-