[PATCH 1/1] fs/udf: validate length of AED in grub_udf_read_block()

2022-11-16 Thread Jagannathan Raman
Validate the length of Allocation Extent Descriptor in grub_udf_read_block(), based on the details in UDF spec. v2.01 section 2.3.11 Fixes: CID 314037 Signed-off-by: Jagannathan Raman --- grub-core/fs/udf.c | 28 1 file changed, 28 insertions(+) diff --git a/grub

[PATCH 0/1] Fix for CID 314037

2022-11-16 Thread Jagannathan Raman
escriptors, and the limit is the logical block size. Ran Coverity test to confirm the CID was fixed, and ran "make check" to confirm that the UDF test passed. Thank you! Jagannathan Raman (1): fs/udf: validate length of AED in grub_udf_read_block() grub-core/fs/udf.c | 28 +++

[PATCH 1/2] zfs: dnode_get_path(): update dangling dn_new pointer

2022-10-17 Thread Jagannathan Raman
ned-off-by: Jagannathan Raman --- grub-core/fs/zfs/zfs.c | 6 ++ 1 file changed, 6 insertions(+) diff --git a/grub-core/fs/zfs/zfs.c b/grub-core/fs/zfs/zfs.c index 24b6533dd..90156d98b 100644 --- a/grub-core/fs/zfs/zfs.c +++ b/grub-core/fs/zfs/zfs.c @@ -2936,6 +2936,8 @@ dnode_get_path (struct

[PATCH 2/2] kern/buffer: grub_buffer_free: handle NULL input pointer

2022-10-17 Thread Jagannathan Raman
grub_buffer_free() can handle NULL input pointer, similar to grub_free(). If the pointer is not referencing any memory location, grub_buffer_free() need not perform any function. Fixes: CID 396931 Signed-off-by: Jagannathan Raman --- grub-core/kern/buffer.c | 7 +-- 1 file changed, 5

[PATCH 0/2] Fixes for CIDs 86750 and 396931

2022-10-17 Thread Jagannathan Raman
Hi, This series provides fixes for CIDs 86750 and 396931. Kindly share your feedback. Thank you very much! -- Jag Jagannathan Raman (2): zfs: dnode_get_path(): update dangling dn_new pointer kern/buffer: grub_buffer_free: handle NULL input pointer grub-core/fs/zfs/zfs.c | 6 ++ grub

[PATCH] fill_fs_info: pass pointer to dnode_end_t instead of value

2022-08-19 Thread Jagannathan Raman
Coverity reports that dnode_end_t argument of fill_fs_info() is too large to pass-by-value. Therefore, replace the argument with a pointer. Fixes: CID 73631 Signed-off-by: Jagannathan Raman --- grub-core/fs/zfs/zfs.c | 17 + 1 file changed, 13 insertions(+), 4 deletions

[PATCH 1/2] fs/zfs/zfs.c: make_mdn() - avoid pointer downcasting

2022-06-02 Thread Jagannathan Raman
t sure if there are any other reasons why Coverity flags the downcast. However, the fix for alignment issue masks/suppresses any other issues from showing up. Fixes: CID 314020 Signed-off-by: Jagannathan Raman --- grub-core/fs/zfs/zfs.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-

GRUB coverity fixes for CIDs 314020 and 314023

2022-06-02 Thread Jagannathan Raman
ou! -- Jag Jagannathan Raman (2): fs/zfs/zfs.c: make_mdn() - avoid pointer downcasting fs/zfs/zfs.c: zfs_mount() - avoid pointer downcasting grub-core/fs/zfs/zfs.c | 16 +++- 1 file changed, 7 insertions(+), 9 deletions(-) -- 2.31.1 ___

[PATCH 2/2] fs/zfs/zfs.c: zfs_mount() - avoid pointer downcasting

2022-06-02 Thread Jagannathan Raman
if there are any other reasons why Coverity flags the downcast. However, the fix for alignment issue masks/suppresses any other issues from showing up. Fixes: CID 314023 Signed-off-by: Jagannathan Raman --- grub-core/fs/zfs/zfs.c | 10 -- 1 file changed, 4 insertions(+), 6 deletion