From: Chris Morgan <[email protected]>

It looks like under certain circumstances when reading the vendor_boot
partition it causes my device to write outside the range of memory
available. Near as I can tell this occurs because
scan_vendor_boot_part() calls android_image_get_vendor_bootimg_size()
which calls android_vendor_boot_image_v3_v4_parse_hdr() which calls
add_trailer() which attempts to copy information to a buffer allocated
with malloc in the scan_vendor_boot_part() function. On my board the
memory set aside for malloc is at the top of the system RAM, and given
a large enough vendor boot image size this causes the write from
add_trailer() to occur outside of the system RAM (nevermind outside
of what was allocated with the malloc().

While I don't know the absolute best way to handle this, I would assume
that if we simply map the memory we want to use to where we will
eventually load the vendor_boot image that would be the most logical.

Fixes: abadcda24b10 ("bootstd: android: don't read whole partition sizes")
Signed-off-by: Chris Morgan <[email protected]>
---
 boot/bootmeth_android.c | 20 ++++++--------------
 1 file changed, 6 insertions(+), 14 deletions(-)

diff --git a/boot/bootmeth_android.c b/boot/bootmeth_android.c
index 1374551dbeb..c2c25d53ef3 100644
--- a/boot/bootmeth_android.c
+++ b/boot/bootmeth_android.c
@@ -118,9 +118,10 @@ static int scan_vendor_boot_part(struct udevice *blk, 
struct android_priv *priv)
        struct blk_desc *desc = dev_get_uclass_plat(blk);
        struct disk_partition partition;
        char partname[PART_NAME_LEN];
-       ulong num_blks, bufsz;
+       ulong num_blks;
        char *buf;
        int ret;
+       ulong vloadaddr = env_get_hex("vendor_boot_comp_addr_r", 0);
 
        if (priv->slot)
                sprintf(partname, VENDOR_BOOT_PART_NAME "_%s", priv->slot);
@@ -132,28 +133,19 @@ static int scan_vendor_boot_part(struct udevice *blk, 
struct android_priv *priv)
                return log_msg_ret("part info", ret);
 
        num_blks = DIV_ROUND_UP(sizeof(struct andr_vnd_boot_img_hdr), 
desc->blksz);
-       bufsz = num_blks * desc->blksz;
-       buf = malloc(bufsz);
+       buf = map_sysmem(vloadaddr, 0);
        if (!buf)
                return log_msg_ret("buf", -ENOMEM);
 
        ret = blk_read(blk, partition.start, num_blks, buf);
-       if (ret != num_blks) {
-               free(buf);
+       if (ret != num_blks)
                return log_msg_ret("part read", -EIO);
-       }
 
-       if (!is_android_vendor_boot_image_header(buf)) {
-               free(buf);
+       if (!is_android_vendor_boot_image_header(buf))
                return log_msg_ret("header", -ENOENT);
-       }
 
-       if (!android_image_get_vendor_bootimg_size(buf, 
&priv->vendor_boot_img_size)) {
-               free(buf);
+       if (!android_image_get_vendor_bootimg_size(buf, 
&priv->vendor_boot_img_size))
                return log_msg_ret("get vendor bootimg size", -EINVAL);
-       }
-
-       free(buf);
 
        return 0;
 }
-- 
2.43.0

Reply via email to