2021-03-02 18:56:20 +00:00
|
|
|
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
2020-07-29 17:15:26 +00:00
|
|
|
From: Peter Jones <pjones@redhat.com>
|
|
|
|
Date: Mon, 15 Jun 2020 12:26:01 -0400
|
2021-03-02 18:56:20 +00:00
|
|
|
Subject: [PATCH] calloc: Use calloc() at most places
|
2020-07-29 17:15:26 +00:00
|
|
|
|
|
|
|
This modifies most of the places we do some form of:
|
|
|
|
|
|
|
|
X = malloc(Y * Z);
|
|
|
|
|
|
|
|
to use calloc(Y, Z) instead.
|
|
|
|
|
|
|
|
Among other issues, this fixes:
|
|
|
|
- allocation of integer overflow in grub_png_decode_image_header()
|
|
|
|
reported by Chris Coulson,
|
|
|
|
- allocation of integer overflow in luks_recover_key()
|
|
|
|
reported by Chris Coulson,
|
|
|
|
- allocation of integer overflow in grub_lvm_detect()
|
|
|
|
reported by Chris Coulson.
|
|
|
|
|
|
|
|
Fixes: CVE-2020-14308
|
|
|
|
|
|
|
|
Signed-off-by: Peter Jones <pjones@redhat.com>
|
|
|
|
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
|
|
|
|
Upstream-commit-id: 48eeedf1e4b
|
|
|
|
---
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/bus/usb/usbhub.c | 8 +++---
|
|
|
|
grub-core/commands/efi/lsefisystab.c | 3 ++-
|
|
|
|
grub-core/commands/legacycfg.c | 6 ++---
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/commands/menuentry.c | 2 +-
|
|
|
|
grub-core/commands/nativedisk.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/commands/parttool.c | 12 ++++++---
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/commands/regexp.c | 2 +-
|
|
|
|
grub-core/commands/search_wrap.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/disk/diskfilter.c | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/disk/ieee1275/ofdisk.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/disk/ldm.c | 14 +++++-----
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/disk/luks.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/disk/lvm.c | 8 +++---
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/disk/xen/xendisk.c | 2 +-
|
|
|
|
grub-core/efiemu/loadcore.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/efiemu/mm.c | 6 ++---
|
|
|
|
grub-core/font/font.c | 3 +--
|
|
|
|
grub-core/fs/affs.c | 6 ++---
|
|
|
|
grub-core/fs/btrfs.c | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/fs/hfs.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/fs/hfsplus.c | 45 ++++++++++++++++++++-----------
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/fs/iso9660.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/fs/ntfs.c | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/fs/sfs.c | 2 +-
|
|
|
|
grub-core/fs/tar.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/fs/udf.c | 4 +--
|
|
|
|
grub-core/fs/zfs/zfs.c | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/gfxmenu/gui_string_util.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/gfxmenu/widget-box.c | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/io/gzio.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/kern/efi/efi.c | 33 ++++++++++++++++++-----
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/kern/emu/hostdisk.c | 2 +-
|
|
|
|
grub-core/kern/fs.c | 2 +-
|
|
|
|
grub-core/kern/misc.c | 2 +-
|
|
|
|
grub-core/kern/parser.c | 2 +-
|
|
|
|
grub-core/kern/uboot/uboot.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/lib/libgcrypt/cipher/ac.c | 8 +++---
|
|
|
|
grub-core/lib/libgcrypt/cipher/primegen.c | 4 +--
|
|
|
|
grub-core/lib/libgcrypt/cipher/pubkey.c | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/lib/priority_queue.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/lib/reed_solomon.c | 7 +++--
|
|
|
|
grub-core/lib/relocator.c | 10 +++----
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/loader/arm/linux.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/loader/efi/chainloader.c | 11 +++++---
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/loader/i386/bsdXX.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/loader/i386/xnu.c | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/loader/macho.c | 2 +-
|
|
|
|
grub-core/loader/multiboot_elfxx.c | 2 +-
|
|
|
|
grub-core/loader/xnu.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/mmap/mmap.c | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/net/bootp.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/net/dns.c | 10 +++----
|
|
|
|
grub-core/net/net.c | 4 +--
|
|
|
|
grub-core/normal/charset.c | 10 +++----
|
|
|
|
grub-core/normal/cmdline.c | 14 +++++-----
|
|
|
|
grub-core/normal/menu_entry.c | 14 +++++-----
|
|
|
|
grub-core/normal/menu_text.c | 4 +--
|
|
|
|
grub-core/normal/term.c | 4 +--
|
|
|
|
grub-core/osdep/linux/getroot.c | 6 ++---
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/osdep/unix/config.c | 2 +-
|
|
|
|
grub-core/osdep/windows/getroot.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/osdep/windows/hostdisk.c | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/osdep/windows/init.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/osdep/windows/platform.c | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/osdep/windows/relpath.c | 2 +-
|
|
|
|
grub-core/partmap/gpt.c | 2 +-
|
|
|
|
grub-core/partmap/msdos.c | 2 +-
|
|
|
|
grub-core/script/execute.c | 2 +-
|
|
|
|
grub-core/tests/fake_input.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
grub-core/tests/video_checksum.c | 6 ++---
|
2020-07-29 17:15:26 +00:00
|
|
|
grub-core/video/capture.c | 2 +-
|
|
|
|
grub-core/video/emu/sdl.c | 2 +-
|
|
|
|
grub-core/video/i386/pc/vga.c | 2 +-
|
|
|
|
grub-core/video/readers/png.c | 2 +-
|
|
|
|
util/getroot.c | 2 +-
|
|
|
|
util/grub-file.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
util/grub-fstest.c | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
util/grub-install-common.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
util/grub-install.c | 4 +--
|
|
|
|
util/grub-mkimagexx.c | 6 ++---
|
|
|
|
util/grub-mkrescue.c | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
util/grub-mkstandalone.c | 2 +-
|
2021-03-02 18:56:20 +00:00
|
|
|
util/grub-pe2elf.c | 12 ++++-----
|
|
|
|
util/grub-probe.c | 4 +--
|
|
|
|
include/grub/unicode.h | 4 +--
|
2020-07-29 17:15:26 +00:00
|
|
|
85 files changed, 231 insertions(+), 191 deletions(-)
|
|
|
|
|
|
|
|
diff --git a/grub-core/bus/usb/usbhub.c b/grub-core/bus/usb/usbhub.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 34a7ff1b5..a06cce302 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/bus/usb/usbhub.c
|
|
|
|
+++ b/grub-core/bus/usb/usbhub.c
|
|
|
|
@@ -149,8 +149,8 @@ grub_usb_add_hub (grub_usb_device_t dev)
|
|
|
|
grub_usb_set_configuration (dev, 1);
|
|
|
|
|
|
|
|
dev->nports = hubdesc.portcnt;
|
|
|
|
- dev->children = grub_zalloc (hubdesc.portcnt * sizeof (dev->children[0]));
|
|
|
|
- dev->ports = grub_zalloc (dev->nports * sizeof (dev->ports[0]));
|
|
|
|
+ dev->children = grub_calloc (hubdesc.portcnt, sizeof (dev->children[0]));
|
|
|
|
+ dev->ports = grub_calloc (dev->nports, sizeof (dev->ports[0]));
|
|
|
|
if (!dev->children || !dev->ports)
|
|
|
|
{
|
|
|
|
grub_free (dev->children);
|
|
|
|
@@ -268,8 +268,8 @@ grub_usb_controller_dev_register_iter (grub_usb_controller_t controller, void *d
|
|
|
|
|
|
|
|
/* Query the number of ports the root Hub has. */
|
|
|
|
hub->nports = controller->dev->hubports (controller);
|
|
|
|
- hub->devices = grub_zalloc (sizeof (hub->devices[0]) * hub->nports);
|
|
|
|
- hub->ports = grub_zalloc (sizeof (hub->ports[0]) * hub->nports);
|
|
|
|
+ hub->devices = grub_calloc (hub->nports, sizeof (hub->devices[0]));
|
|
|
|
+ hub->ports = grub_calloc (hub->nports, sizeof (hub->ports[0]));
|
|
|
|
if (!hub->devices || !hub->ports)
|
|
|
|
{
|
|
|
|
grub_free (hub->devices);
|
|
|
|
diff --git a/grub-core/commands/efi/lsefisystab.c b/grub-core/commands/efi/lsefisystab.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index df1030221..cd81507f5 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/commands/efi/lsefisystab.c
|
|
|
|
+++ b/grub-core/commands/efi/lsefisystab.c
|
|
|
|
@@ -71,7 +71,8 @@ grub_cmd_lsefisystab (struct grub_command *cmd __attribute__ ((unused)),
|
|
|
|
grub_printf ("Vendor: ");
|
|
|
|
|
|
|
|
for (vendor_utf16 = st->firmware_vendor; *vendor_utf16; vendor_utf16++);
|
|
|
|
- vendor = grub_malloc (4 * (vendor_utf16 - st->firmware_vendor) + 1);
|
|
|
|
+ /* Allocate extra 3 bytes to simplify math. */
|
|
|
|
+ vendor = grub_calloc (4, vendor_utf16 - st->firmware_vendor + 1);
|
|
|
|
if (!vendor)
|
|
|
|
return grub_errno;
|
|
|
|
*grub_utf16_to_utf8 ((grub_uint8_t *) vendor, st->firmware_vendor,
|
|
|
|
diff --git a/grub-core/commands/legacycfg.c b/grub-core/commands/legacycfg.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index f9d7627bd..da66a8927 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/commands/legacycfg.c
|
|
|
|
+++ b/grub-core/commands/legacycfg.c
|
|
|
|
@@ -314,7 +314,7 @@ grub_cmd_legacy_kernel (struct grub_command *mycmd __attribute__ ((unused)),
|
|
|
|
if (argc < 2)
|
|
|
|
return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("filename expected"));
|
|
|
|
|
|
|
|
- cutargs = grub_malloc (sizeof (cutargs[0]) * (argc - 1));
|
|
|
|
+ cutargs = grub_calloc (argc - 1, sizeof (cutargs[0]));
|
|
|
|
if (!cutargs)
|
|
|
|
return grub_errno;
|
|
|
|
cutargc = argc - 1;
|
|
|
|
@@ -436,7 +436,7 @@ grub_cmd_legacy_kernel (struct grub_command *mycmd __attribute__ ((unused)),
|
|
|
|
{
|
|
|
|
char rbuf[3] = "-r";
|
|
|
|
bsdargc = cutargc + 2;
|
|
|
|
- bsdargs = grub_malloc (sizeof (bsdargs[0]) * bsdargc);
|
|
|
|
+ bsdargs = grub_calloc (bsdargc, sizeof (bsdargs[0]));
|
|
|
|
if (!bsdargs)
|
|
|
|
{
|
|
|
|
err = grub_errno;
|
|
|
|
@@ -559,7 +559,7 @@ grub_cmd_legacy_initrdnounzip (struct grub_command *mycmd __attribute__ ((unused
|
|
|
|
return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("can't find command `%s'"),
|
|
|
|
"module");
|
|
|
|
|
|
|
|
- newargs = grub_malloc ((argc + 1) * sizeof (newargs[0]));
|
|
|
|
+ newargs = grub_calloc (argc + 1, sizeof (newargs[0]));
|
|
|
|
if (!newargs)
|
|
|
|
return grub_errno;
|
|
|
|
grub_memcpy (newargs + 1, args, argc * sizeof (newargs[0]));
|
|
|
|
diff --git a/grub-core/commands/menuentry.c b/grub-core/commands/menuentry.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 7004e08ce..4b5fcf2ce 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/commands/menuentry.c
|
|
|
|
+++ b/grub-core/commands/menuentry.c
|
|
|
|
@@ -157,7 +157,7 @@ grub_normal_add_menu_entry (int argc, const char **args,
|
|
|
|
grub_dprintf ("menu", "menu_id:\"%s\"\n", menu_id);
|
|
|
|
|
|
|
|
/* Save argc, args to pass as parameters to block arg later. */
|
|
|
|
- menu_args = grub_malloc (sizeof (char*) * (argc + 1));
|
|
|
|
+ menu_args = grub_calloc (argc + 1, sizeof (char *));
|
|
|
|
if (! menu_args)
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
diff --git a/grub-core/commands/nativedisk.c b/grub-core/commands/nativedisk.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 2f56a870e..d69214f6d 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/commands/nativedisk.c
|
|
|
|
+++ b/grub-core/commands/nativedisk.c
|
|
|
|
@@ -194,7 +194,7 @@ grub_cmd_nativedisk (grub_command_t cmd __attribute__ ((unused)),
|
|
|
|
else
|
|
|
|
path_prefix = prefix;
|
|
|
|
|
|
|
|
- mods = grub_malloc (argc * sizeof (mods[0]));
|
|
|
|
+ mods = grub_calloc (argc, sizeof (mods[0]));
|
|
|
|
if (!mods)
|
|
|
|
return grub_errno;
|
|
|
|
|
|
|
|
diff --git a/grub-core/commands/parttool.c b/grub-core/commands/parttool.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 693e2cb42..36dadc0b1 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/commands/parttool.c
|
|
|
|
+++ b/grub-core/commands/parttool.c
|
|
|
|
@@ -59,7 +59,13 @@ grub_parttool_register(const char *part_name,
|
|
|
|
for (nargs = 0; args[nargs].name != 0; nargs++);
|
|
|
|
cur->nargs = nargs;
|
|
|
|
cur->args = (struct grub_parttool_argdesc *)
|
|
|
|
- grub_malloc ((nargs + 1) * sizeof (struct grub_parttool_argdesc));
|
|
|
|
+ grub_calloc (nargs + 1, sizeof (struct grub_parttool_argdesc));
|
|
|
|
+ if (!cur->args)
|
|
|
|
+ {
|
|
|
|
+ grub_free (cur);
|
|
|
|
+ curhandle--;
|
|
|
|
+ return -1;
|
|
|
|
+ }
|
|
|
|
grub_memcpy (cur->args, args,
|
|
|
|
(nargs + 1) * sizeof (struct grub_parttool_argdesc));
|
|
|
|
|
|
|
|
@@ -257,7 +263,7 @@ grub_cmd_parttool (grub_command_t cmd __attribute__ ((unused)),
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
- parsed = (int *) grub_zalloc (argc * sizeof (int));
|
|
|
|
+ parsed = (int *) grub_calloc (argc, sizeof (int));
|
|
|
|
|
|
|
|
for (i = 1; i < argc; i++)
|
|
|
|
if (! parsed[i])
|
|
|
|
@@ -290,7 +296,7 @@ grub_cmd_parttool (grub_command_t cmd __attribute__ ((unused)),
|
|
|
|
}
|
|
|
|
ptool = cur;
|
|
|
|
pargs = (struct grub_parttool_args *)
|
|
|
|
- grub_zalloc (ptool->nargs * sizeof (struct grub_parttool_args));
|
|
|
|
+ grub_calloc (ptool->nargs, sizeof (struct grub_parttool_args));
|
|
|
|
for (j = i; j < argc; j++)
|
|
|
|
if (! parsed[j])
|
|
|
|
{
|
|
|
|
diff --git a/grub-core/commands/regexp.c b/grub-core/commands/regexp.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index f00b184c8..4019164f3 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/commands/regexp.c
|
|
|
|
+++ b/grub-core/commands/regexp.c
|
|
|
|
@@ -116,7 +116,7 @@ grub_cmd_regexp (grub_extcmd_context_t ctxt, int argc, char **args)
|
|
|
|
if (ret)
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
- matches = grub_zalloc (sizeof (*matches) * (regex.re_nsub + 1));
|
|
|
|
+ matches = grub_calloc (regex.re_nsub + 1, sizeof (*matches));
|
|
|
|
if (! matches)
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
diff --git a/grub-core/commands/search_wrap.c b/grub-core/commands/search_wrap.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index d7fd26b94..47fc8eb99 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/commands/search_wrap.c
|
|
|
|
+++ b/grub-core/commands/search_wrap.c
|
|
|
|
@@ -122,7 +122,7 @@ grub_cmd_search (grub_extcmd_context_t ctxt, int argc, char **args)
|
|
|
|
for (i = 0; state[SEARCH_HINT_BAREMETAL].args[i]; i++)
|
|
|
|
nhints++;
|
|
|
|
|
|
|
|
- hints = grub_malloc (sizeof (hints[0]) * nhints);
|
|
|
|
+ hints = grub_calloc (nhints, sizeof (hints[0]));
|
|
|
|
if (!hints)
|
|
|
|
return grub_errno;
|
|
|
|
j = 0;
|
|
|
|
diff --git a/grub-core/disk/diskfilter.c b/grub-core/disk/diskfilter.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 6f901c0ad..2be019269 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/disk/diskfilter.c
|
|
|
|
+++ b/grub-core/disk/diskfilter.c
|
|
|
|
@@ -1134,7 +1134,7 @@ grub_diskfilter_make_raid (grub_size_t uuidlen, char *uuid, int nmemb,
|
|
|
|
array->lvs->segments->node_count = nmemb;
|
|
|
|
array->lvs->segments->raid_member_size = disk_size;
|
|
|
|
array->lvs->segments->nodes
|
|
|
|
- = grub_zalloc (nmemb * sizeof (array->lvs->segments->nodes[0]));
|
|
|
|
+ = grub_calloc (nmemb, sizeof (array->lvs->segments->nodes[0]));
|
|
|
|
array->lvs->segments->stripe_size = stripe_size;
|
|
|
|
for (i = 0; i < nmemb; i++)
|
|
|
|
{
|
|
|
|
@@ -1226,7 +1226,7 @@ insert_array (grub_disk_t disk, const struct grub_diskfilter_pv_id *id,
|
|
|
|
grub_partition_t p;
|
|
|
|
for (p = disk->partition; p; p = p->parent)
|
|
|
|
s++;
|
|
|
|
- pv->partmaps = xmalloc (s * sizeof (pv->partmaps[0]));
|
|
|
|
+ pv->partmaps = xcalloc (s, sizeof (pv->partmaps[0]));
|
|
|
|
s = 0;
|
|
|
|
for (p = disk->partition; p; p = p->parent)
|
|
|
|
pv->partmaps[s++] = xstrdup (p->partmap->name);
|
|
|
|
diff --git a/grub-core/disk/ieee1275/ofdisk.c b/grub-core/disk/ieee1275/ofdisk.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 235c0fe2c..d887d4b6e 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/disk/ieee1275/ofdisk.c
|
|
|
|
+++ b/grub-core/disk/ieee1275/ofdisk.c
|
|
|
|
@@ -297,7 +297,7 @@ dev_iterate (const struct grub_ieee1275_devalias *alias)
|
|
|
|
/* Power machines documentation specify 672 as maximum SAS disks in
|
|
|
|
one system. Using a slightly larger value to be safe. */
|
|
|
|
table_size = 768;
|
|
|
|
- table = grub_malloc (table_size * sizeof (grub_uint64_t));
|
|
|
|
+ table = grub_calloc (table_size, sizeof (grub_uint64_t));
|
|
|
|
|
|
|
|
if (!table)
|
|
|
|
{
|
|
|
|
diff --git a/grub-core/disk/ldm.c b/grub-core/disk/ldm.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 2a22d2d6c..e6323701a 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/disk/ldm.c
|
|
|
|
+++ b/grub-core/disk/ldm.c
|
|
|
|
@@ -323,8 +323,8 @@ make_vg (grub_disk_t disk,
|
|
|
|
lv->segments->type = GRUB_DISKFILTER_MIRROR;
|
|
|
|
lv->segments->node_count = 0;
|
|
|
|
lv->segments->node_alloc = 8;
|
|
|
|
- lv->segments->nodes = grub_zalloc (sizeof (*lv->segments->nodes)
|
|
|
|
- * lv->segments->node_alloc);
|
|
|
|
+ lv->segments->nodes = grub_calloc (lv->segments->node_alloc,
|
|
|
|
+ sizeof (*lv->segments->nodes));
|
|
|
|
if (!lv->segments->nodes)
|
|
|
|
goto fail2;
|
|
|
|
ptr = vblk[i].dynamic;
|
|
|
|
@@ -543,8 +543,8 @@ make_vg (grub_disk_t disk,
|
|
|
|
{
|
|
|
|
comp->segment_alloc = 8;
|
|
|
|
comp->segment_count = 0;
|
|
|
|
- comp->segments = grub_malloc (sizeof (*comp->segments)
|
|
|
|
- * comp->segment_alloc);
|
|
|
|
+ comp->segments = grub_calloc (comp->segment_alloc,
|
|
|
|
+ sizeof (*comp->segments));
|
|
|
|
if (!comp->segments)
|
|
|
|
goto fail2;
|
|
|
|
}
|
|
|
|
@@ -590,8 +590,8 @@ make_vg (grub_disk_t disk,
|
|
|
|
}
|
|
|
|
comp->segments->node_count = read_int (ptr + 1, *ptr);
|
|
|
|
comp->segments->node_alloc = comp->segments->node_count;
|
|
|
|
- comp->segments->nodes = grub_zalloc (sizeof (*comp->segments->nodes)
|
|
|
|
- * comp->segments->node_alloc);
|
|
|
|
+ comp->segments->nodes = grub_calloc (comp->segments->node_alloc,
|
|
|
|
+ sizeof (*comp->segments->nodes));
|
|
|
|
if (!lv->segments->nodes)
|
|
|
|
goto fail2;
|
|
|
|
}
|
|
|
|
@@ -1017,7 +1017,7 @@ grub_util_ldm_embed (struct grub_disk *disk, unsigned int *nsectors,
|
|
|
|
*nsectors = lv->size;
|
|
|
|
if (*nsectors > max_nsectors)
|
|
|
|
*nsectors = max_nsectors;
|
|
|
|
- *sectors = grub_malloc (*nsectors * sizeof (**sectors));
|
|
|
|
+ *sectors = grub_calloc (*nsectors, sizeof (**sectors));
|
|
|
|
if (!*sectors)
|
|
|
|
return grub_errno;
|
|
|
|
for (i = 0; i < *nsectors; i++)
|
|
|
|
diff --git a/grub-core/disk/luks.c b/grub-core/disk/luks.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 86c50c612..18b3a8bb1 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/disk/luks.c
|
|
|
|
+++ b/grub-core/disk/luks.c
|
|
|
|
@@ -336,7 +336,7 @@ luks_recover_key (grub_disk_t source,
|
|
|
|
&& grub_be_to_cpu32 (header.keyblock[i].stripes) > max_stripes)
|
|
|
|
max_stripes = grub_be_to_cpu32 (header.keyblock[i].stripes);
|
|
|
|
|
|
|
|
- split_key = grub_malloc (keysize * max_stripes);
|
|
|
|
+ split_key = grub_calloc (keysize, max_stripes);
|
|
|
|
if (!split_key)
|
|
|
|
return grub_errno;
|
|
|
|
|
|
|
|
diff --git a/grub-core/disk/lvm.c b/grub-core/disk/lvm.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 7b265c780..d1df640b3 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/disk/lvm.c
|
|
|
|
+++ b/grub-core/disk/lvm.c
|
|
|
|
@@ -173,7 +173,7 @@ grub_lvm_detect (grub_disk_t disk,
|
|
|
|
first one. */
|
|
|
|
|
|
|
|
/* Allocate buffer space for the circular worst-case scenario. */
|
|
|
|
- metadatabuf = grub_malloc (2 * mda_size);
|
|
|
|
+ metadatabuf = grub_calloc (2, mda_size);
|
|
|
|
if (! metadatabuf)
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
@@ -426,7 +426,7 @@ grub_lvm_detect (grub_disk_t disk,
|
|
|
|
#endif
|
|
|
|
goto lvs_fail;
|
|
|
|
}
|
|
|
|
- lv->segments = grub_zalloc (sizeof (*seg) * lv->segment_count);
|
|
|
|
+ lv->segments = grub_calloc (lv->segment_count, sizeof (*seg));
|
|
|
|
seg = lv->segments;
|
|
|
|
|
|
|
|
for (i = 0; i < lv->segment_count; i++)
|
|
|
|
@@ -483,8 +483,8 @@ grub_lvm_detect (grub_disk_t disk,
|
|
|
|
if (seg->node_count != 1)
|
|
|
|
seg->stripe_size = grub_lvm_getvalue (&p, "stripe_size = ");
|
|
|
|
|
|
|
|
- seg->nodes = grub_zalloc (sizeof (*stripe)
|
|
|
|
- * seg->node_count);
|
|
|
|
+ seg->nodes = grub_calloc (seg->node_count,
|
|
|
|
+ sizeof (*stripe));
|
|
|
|
stripe = seg->nodes;
|
|
|
|
|
|
|
|
p = grub_strstr (p, "stripes = [");
|
|
|
|
diff --git a/grub-core/disk/xen/xendisk.c b/grub-core/disk/xen/xendisk.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index b18a9238d..c1b331edb 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/disk/xen/xendisk.c
|
|
|
|
+++ b/grub-core/disk/xen/xendisk.c
|
|
|
|
@@ -426,7 +426,7 @@ grub_xendisk_init (void)
|
|
|
|
if (!ctr)
|
|
|
|
return;
|
|
|
|
|
|
|
|
- virtdisks = grub_malloc (ctr * sizeof (virtdisks[0]));
|
|
|
|
+ virtdisks = grub_calloc (ctr, sizeof (virtdisks[0]));
|
|
|
|
if (!virtdisks)
|
|
|
|
return;
|
|
|
|
if (grub_xenstore_dir ("device/vbd", fill, &ctr))
|
|
|
|
diff --git a/grub-core/efiemu/loadcore.c b/grub-core/efiemu/loadcore.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 44085ef81..2b924623f 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/efiemu/loadcore.c
|
|
|
|
+++ b/grub-core/efiemu/loadcore.c
|
|
|
|
@@ -201,7 +201,7 @@ grub_efiemu_count_symbols (const Elf_Ehdr *e)
|
|
|
|
|
|
|
|
grub_efiemu_nelfsyms = (unsigned) s->sh_size / (unsigned) s->sh_entsize;
|
|
|
|
grub_efiemu_elfsyms = (struct grub_efiemu_elf_sym *)
|
|
|
|
- grub_malloc (sizeof (struct grub_efiemu_elf_sym) * grub_efiemu_nelfsyms);
|
|
|
|
+ grub_calloc (grub_efiemu_nelfsyms, sizeof (struct grub_efiemu_elf_sym));
|
|
|
|
|
|
|
|
/* Relocators */
|
|
|
|
for (i = 0, s = (Elf_Shdr *) ((char *) e + e->e_shoff);
|
|
|
|
diff --git a/grub-core/efiemu/mm.c b/grub-core/efiemu/mm.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 52a032f7b..9b8e0d0ad 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/efiemu/mm.c
|
|
|
|
+++ b/grub-core/efiemu/mm.c
|
|
|
|
@@ -554,11 +554,11 @@ grub_efiemu_mmap_sort_and_uniq (void)
|
|
|
|
/* Initialize variables*/
|
|
|
|
grub_memset (present, 0, sizeof (int) * GRUB_EFI_MAX_MEMORY_TYPE);
|
|
|
|
scanline_events = (struct grub_efiemu_mmap_scan *)
|
|
|
|
- grub_malloc (sizeof (struct grub_efiemu_mmap_scan) * 2 * mmap_num);
|
|
|
|
+ grub_calloc (mmap_num, sizeof (struct grub_efiemu_mmap_scan) * 2);
|
|
|
|
|
|
|
|
/* Number of chunks can't increase more than by factor of 2 */
|
|
|
|
result = (grub_efi_memory_descriptor_t *)
|
|
|
|
- grub_malloc (sizeof (grub_efi_memory_descriptor_t) * 2 * mmap_num);
|
|
|
|
+ grub_calloc (mmap_num, sizeof (grub_efi_memory_descriptor_t) * 2);
|
|
|
|
if (!result || !scanline_events)
|
|
|
|
{
|
|
|
|
grub_free (result);
|
|
|
|
@@ -660,7 +660,7 @@ grub_efiemu_mm_do_alloc (void)
|
|
|
|
|
|
|
|
/* Preallocate mmap */
|
|
|
|
efiemu_mmap = (grub_efi_memory_descriptor_t *)
|
|
|
|
- grub_malloc (mmap_reserved_size * sizeof (grub_efi_memory_descriptor_t));
|
|
|
|
+ grub_calloc (mmap_reserved_size, sizeof (grub_efi_memory_descriptor_t));
|
|
|
|
if (!efiemu_mmap)
|
|
|
|
{
|
|
|
|
grub_efiemu_unload ();
|
|
|
|
diff --git a/grub-core/font/font.c b/grub-core/font/font.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 53d76a64d..68967dc1c 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/font/font.c
|
|
|
|
+++ b/grub-core/font/font.c
|
|
|
|
@@ -293,8 +293,7 @@ load_font_index (grub_file_t file, grub_uint32_t sect_length, struct
|
|
|
|
font->num_chars = sect_length / FONT_CHAR_INDEX_ENTRY_SIZE;
|
|
|
|
|
|
|
|
/* Allocate the character index array. */
|
|
|
|
- font->char_index = grub_malloc (font->num_chars
|
|
|
|
- * sizeof (struct char_index_entry));
|
|
|
|
+ font->char_index = grub_calloc (font->num_chars, sizeof (struct char_index_entry));
|
|
|
|
if (!font->char_index)
|
|
|
|
return 1;
|
|
|
|
font->bmp_idx = grub_malloc (0x10000 * sizeof (grub_uint16_t));
|
|
|
|
diff --git a/grub-core/fs/affs.c b/grub-core/fs/affs.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index f673897e0..91073795f 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/fs/affs.c
|
|
|
|
+++ b/grub-core/fs/affs.c
|
|
|
|
@@ -301,7 +301,7 @@ grub_affs_read_symlink (grub_fshelp_node_t node)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
latin1[symlink_size] = 0;
|
|
|
|
- utf8 = grub_malloc (symlink_size * GRUB_MAX_UTF8_PER_LATIN1 + 1);
|
|
|
|
+ utf8 = grub_calloc (GRUB_MAX_UTF8_PER_LATIN1 + 1, symlink_size);
|
|
|
|
if (!utf8)
|
|
|
|
{
|
|
|
|
grub_free (latin1);
|
|
|
|
@@ -422,7 +422,7 @@ grub_affs_iterate_dir (grub_fshelp_node_t dir,
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
- hashtable = grub_zalloc (data->htsize * sizeof (*hashtable));
|
|
|
|
+ hashtable = grub_calloc (data->htsize, sizeof (*hashtable));
|
|
|
|
if (!hashtable)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
@@ -628,7 +628,7 @@ grub_affs_label (grub_device_t device, char **label)
|
|
|
|
len = file.namelen;
|
|
|
|
if (len > sizeof (file.name))
|
|
|
|
len = sizeof (file.name);
|
|
|
|
- *label = grub_malloc (len * GRUB_MAX_UTF8_PER_LATIN1 + 1);
|
|
|
|
+ *label = grub_calloc (GRUB_MAX_UTF8_PER_LATIN1 + 1, len);
|
|
|
|
if (*label)
|
|
|
|
*grub_latin1_to_utf8 ((grub_uint8_t *) *label, file.name, len) = '\0';
|
|
|
|
}
|
|
|
|
diff --git a/grub-core/fs/btrfs.c b/grub-core/fs/btrfs.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index dac73b2fa..8c8aa9c31 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/fs/btrfs.c
|
|
|
|
+++ b/grub-core/fs/btrfs.c
|
|
|
|
@@ -404,7 +404,7 @@ lower_bound (struct grub_btrfs_data *data,
|
|
|
|
{
|
|
|
|
desc->allocated = 16;
|
|
|
|
desc->depth = 0;
|
|
|
|
- desc->data = grub_malloc (sizeof (desc->data[0]) * desc->allocated);
|
|
|
|
+ desc->data = grub_calloc (desc->allocated, sizeof (desc->data[0]));
|
|
|
|
if (!desc->data)
|
|
|
|
return grub_errno;
|
|
|
|
}
|
|
|
|
@@ -2056,7 +2056,7 @@ grub_btrfs_embed (grub_device_t device __attribute__ ((unused)),
|
|
|
|
*nsectors = 64 * 2 - 1;
|
|
|
|
if (*nsectors > max_nsectors)
|
|
|
|
*nsectors = max_nsectors;
|
|
|
|
- *sectors = grub_malloc (*nsectors * sizeof (**sectors));
|
|
|
|
+ *sectors = grub_calloc (*nsectors, sizeof (**sectors));
|
|
|
|
if (!*sectors)
|
|
|
|
return grub_errno;
|
|
|
|
for (i = 0; i < *nsectors; i++)
|
|
|
|
diff --git a/grub-core/fs/hfs.c b/grub-core/fs/hfs.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index fc3683178..3fd4eec20 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/fs/hfs.c
|
|
|
|
+++ b/grub-core/fs/hfs.c
|
|
|
|
@@ -1360,7 +1360,7 @@ grub_hfs_label (grub_device_t device, char **label)
|
|
|
|
grub_size_t len = data->sblock.volname[0];
|
|
|
|
if (len > sizeof (data->sblock.volname) - 1)
|
|
|
|
len = sizeof (data->sblock.volname) - 1;
|
|
|
|
- *label = grub_malloc (len * MAX_UTF8_PER_MAC_ROMAN + 1);
|
|
|
|
+ *label = grub_calloc (MAX_UTF8_PER_MAC_ROMAN + 1, len);
|
|
|
|
if (*label)
|
|
|
|
macroman_to_utf8 (*label, data->sblock.volname + 1,
|
|
|
|
len + 1, 0);
|
|
|
|
diff --git a/grub-core/fs/hfsplus.c b/grub-core/fs/hfsplus.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 21159e858..f1cd72398 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/fs/hfsplus.c
|
|
|
|
+++ b/grub-core/fs/hfsplus.c
|
|
|
|
@@ -661,6 +661,7 @@ list_nodes (void *record, void *hook_arg)
|
|
|
|
char *filename;
|
|
|
|
int i;
|
|
|
|
struct grub_fshelp_node *node;
|
|
|
|
+ grub_uint16_t *keyname;
|
|
|
|
struct grub_hfsplus_catfile *fileinfo;
|
|
|
|
enum grub_fshelp_filetype type = GRUB_FSHELP_UNKNOWN;
|
|
|
|
struct list_nodes_ctx *ctx = hook_arg;
|
|
|
|
@@ -719,32 +720,34 @@ list_nodes (void *record, void *hook_arg)
|
|
|
|
if (! filename)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
+ keyname = grub_calloc (grub_be_to_cpu16 (catkey->namelen), sizeof (*keyname));
|
|
|
|
+ if (!keyname)
|
|
|
|
+ {
|
|
|
|
+ grub_free (filename);
|
|
|
|
+ return 0;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
/* Make sure the byte order of the UTF16 string is correct. */
|
|
|
|
for (i = 0; i < grub_be_to_cpu16 (catkey->namelen); i++)
|
|
|
|
{
|
|
|
|
- catkey->name[i] = grub_be_to_cpu16 (catkey->name[i]);
|
|
|
|
+ keyname[i] = grub_be_to_cpu16 (catkey->name[i]);
|
|
|
|
|
|
|
|
- if (catkey->name[i] == '/')
|
|
|
|
- catkey->name[i] = ':';
|
|
|
|
+ if (keyname[i] == '/')
|
|
|
|
+ keyname[i] = ':';
|
|
|
|
|
|
|
|
/* If the name is obviously invalid, skip this node. */
|
|
|
|
- if (catkey->name[i] == 0)
|
|
|
|
+ if (keyname[i] == 0)
|
|
|
|
{
|
|
|
|
grub_free (filename);
|
|
|
|
+ grub_free (keyname);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
- *grub_utf16_to_utf8 ((grub_uint8_t *) filename, catkey->name,
|
|
|
|
+ *grub_utf16_to_utf8 ((grub_uint8_t *) filename, keyname,
|
|
|
|
grub_be_to_cpu16 (catkey->namelen)) = '\0';
|
|
|
|
|
|
|
|
- /* Restore the byte order to what it was previously. */
|
|
|
|
- for (i = 0; i < grub_be_to_cpu16 (catkey->namelen); i++)
|
|
|
|
- {
|
|
|
|
- if (catkey->name[i] == ':')
|
|
|
|
- catkey->name[i] = '/';
|
|
|
|
- catkey->name[i] = grub_be_to_cpu16 (catkey->name[i]);
|
|
|
|
- }
|
|
|
|
+ grub_free (keyname);
|
|
|
|
|
|
|
|
/* hfs+ is case insensitive. */
|
|
|
|
if (! ctx->dir->data->case_sensitive)
|
|
|
|
@@ -975,6 +978,7 @@ grub_hfsplus_label (grub_device_t device, char **label)
|
|
|
|
grub_disk_t disk = device->disk;
|
|
|
|
struct grub_hfsplus_catkey *catkey;
|
|
|
|
int i, label_len;
|
|
|
|
+ grub_uint16_t *label_name;
|
|
|
|
struct grub_hfsplus_key_internal intern;
|
|
|
|
struct grub_hfsplus_btnode *node = NULL;
|
|
|
|
grub_disk_addr_t ptr = 0;
|
|
|
|
@@ -1003,22 +1007,31 @@ grub_hfsplus_label (grub_device_t device, char **label)
|
|
|
|
grub_hfsplus_btree_recptr (&data->catalog_tree, node, ptr);
|
|
|
|
|
|
|
|
label_len = grub_be_to_cpu16 (catkey->namelen);
|
|
|
|
+ label_name = grub_calloc (label_len, sizeof (*label_name));
|
|
|
|
+ if (!label_name)
|
|
|
|
+ {
|
|
|
|
+ grub_free (node);
|
|
|
|
+ grub_free (data);
|
|
|
|
+ return grub_errno;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
for (i = 0; i < label_len; i++)
|
|
|
|
{
|
|
|
|
- catkey->name[i] = grub_be_to_cpu16 (catkey->name[i]);
|
|
|
|
+ label_name[i] = grub_be_to_cpu16 (catkey->name[i]);
|
|
|
|
|
|
|
|
/* If the name is obviously invalid, skip this node. */
|
|
|
|
- if (catkey->name[i] == 0)
|
|
|
|
+ if (label_name[i] == 0)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
- *label = grub_malloc (label_len * GRUB_MAX_UTF8_PER_UTF16 + 1);
|
|
|
|
+ *label = grub_calloc (label_len, GRUB_MAX_UTF8_PER_UTF16 + 1);
|
|
|
|
if (! *label)
|
|
|
|
return grub_errno;
|
|
|
|
|
|
|
|
- *grub_utf16_to_utf8 ((grub_uint8_t *) (*label), catkey->name,
|
|
|
|
+ *grub_utf16_to_utf8 ((grub_uint8_t *) (*label), label_name,
|
|
|
|
label_len) = '\0';
|
|
|
|
|
|
|
|
+ grub_free (label_name);
|
|
|
|
grub_free (node);
|
|
|
|
grub_free (data);
|
|
|
|
|
|
|
|
diff --git a/grub-core/fs/iso9660.c b/grub-core/fs/iso9660.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index c9c8374bf..092b8f409 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/fs/iso9660.c
|
|
|
|
+++ b/grub-core/fs/iso9660.c
|
|
|
|
@@ -331,7 +331,7 @@ grub_iso9660_convert_string (grub_uint8_t *us, int len)
|
|
|
|
int i;
|
|
|
|
grub_uint16_t t[MAX_NAMELEN / 2 + 1];
|
|
|
|
|
|
|
|
- p = grub_malloc (len * GRUB_MAX_UTF8_PER_UTF16 + 1);
|
|
|
|
+ p = grub_calloc (len, GRUB_MAX_UTF8_PER_UTF16 + 1);
|
|
|
|
if (! p)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
diff --git a/grub-core/fs/ntfs.c b/grub-core/fs/ntfs.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 6f8468862..9827f9bb8 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/fs/ntfs.c
|
|
|
|
+++ b/grub-core/fs/ntfs.c
|
|
|
|
@@ -556,8 +556,8 @@ get_utf8 (grub_uint8_t *in, grub_size_t len)
|
|
|
|
grub_uint16_t *tmp;
|
|
|
|
grub_size_t i;
|
|
|
|
|
|
|
|
- buf = grub_malloc (len * GRUB_MAX_UTF8_PER_UTF16 + 1);
|
|
|
|
- tmp = grub_malloc (len * sizeof (tmp[0]));
|
|
|
|
+ buf = grub_calloc (len, GRUB_MAX_UTF8_PER_UTF16 + 1);
|
|
|
|
+ tmp = grub_calloc (len, sizeof (tmp[0]));
|
|
|
|
if (!buf || !tmp)
|
|
|
|
{
|
|
|
|
grub_free (buf);
|
|
|
|
diff --git a/grub-core/fs/sfs.c b/grub-core/fs/sfs.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 57b8d8da6..663931717 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/fs/sfs.c
|
|
|
|
+++ b/grub-core/fs/sfs.c
|
|
|
|
@@ -266,7 +266,7 @@ grub_sfs_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock)
|
|
|
|
node->next_extent = node->block;
|
|
|
|
node->cache_size = 0;
|
|
|
|
|
|
|
|
- node->cache = grub_malloc (sizeof (node->cache[0]) * cache_size);
|
|
|
|
+ node->cache = grub_calloc (cache_size, sizeof (node->cache[0]));
|
|
|
|
if (!node->cache)
|
|
|
|
{
|
|
|
|
grub_errno = 0;
|
|
|
|
diff --git a/grub-core/fs/tar.c b/grub-core/fs/tar.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 39bf197aa..4864451e1 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/fs/tar.c
|
|
|
|
+++ b/grub-core/fs/tar.c
|
|
|
|
@@ -120,7 +120,7 @@ grub_cpio_find_file (struct grub_archelp_data *data, char **name,
|
|
|
|
if (data->linkname_alloc < linksize + 1)
|
|
|
|
{
|
|
|
|
char *n;
|
|
|
|
- n = grub_malloc (2 * (linksize + 1));
|
|
|
|
+ n = grub_calloc (2, linksize + 1);
|
|
|
|
if (!n)
|
|
|
|
return grub_errno;
|
|
|
|
grub_free (data->linkname);
|
|
|
|
diff --git a/grub-core/fs/udf.c b/grub-core/fs/udf.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 00a16098b..44481da7c 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/fs/udf.c
|
|
|
|
+++ b/grub-core/fs/udf.c
|
|
|
|
@@ -873,7 +873,7 @@ read_string (const grub_uint8_t *raw, grub_size_t sz, char *outbuf)
|
|
|
|
{
|
|
|
|
unsigned i;
|
|
|
|
utf16len = sz - 1;
|
|
|
|
- utf16 = grub_malloc (utf16len * sizeof (utf16[0]));
|
|
|
|
+ utf16 = grub_calloc (utf16len, sizeof (utf16[0]));
|
|
|
|
if (!utf16)
|
|
|
|
return NULL;
|
|
|
|
for (i = 0; i < utf16len; i++)
|
|
|
|
@@ -883,7 +883,7 @@ read_string (const grub_uint8_t *raw, grub_size_t sz, char *outbuf)
|
|
|
|
{
|
|
|
|
unsigned i;
|
|
|
|
utf16len = (sz - 1) / 2;
|
|
|
|
- utf16 = grub_malloc (utf16len * sizeof (utf16[0]));
|
|
|
|
+ utf16 = grub_calloc (utf16len, sizeof (utf16[0]));
|
|
|
|
if (!utf16)
|
|
|
|
return NULL;
|
|
|
|
for (i = 0; i < utf16len; i++)
|
|
|
|
diff --git a/grub-core/fs/zfs/zfs.c b/grub-core/fs/zfs/zfs.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 6e1fff9e9..f6b95d4fb 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/fs/zfs/zfs.c
|
|
|
|
+++ b/grub-core/fs/zfs/zfs.c
|
|
|
|
@@ -3325,7 +3325,7 @@ dnode_get_fullpath (const char *fullpath, struct subvolume *subvol,
|
|
|
|
}
|
|
|
|
subvol->nkeys = 0;
|
|
|
|
zap_iterate (&keychain_dn, 8, count_zap_keys, &ctx, data);
|
|
|
|
- subvol->keyring = grub_zalloc (subvol->nkeys * sizeof (subvol->keyring[0]));
|
|
|
|
+ subvol->keyring = grub_calloc (subvol->nkeys, sizeof (subvol->keyring[0]));
|
|
|
|
if (!subvol->keyring)
|
|
|
|
{
|
|
|
|
grub_free (fsname);
|
|
|
|
@@ -4336,7 +4336,7 @@ grub_zfs_embed (grub_device_t device __attribute__ ((unused)),
|
|
|
|
*nsectors = (VDEV_BOOT_SIZE >> GRUB_DISK_SECTOR_BITS);
|
|
|
|
if (*nsectors > max_nsectors)
|
|
|
|
*nsectors = max_nsectors;
|
|
|
|
- *sectors = grub_malloc (*nsectors * sizeof (**sectors));
|
|
|
|
+ *sectors = grub_calloc (*nsectors, sizeof (**sectors));
|
|
|
|
if (!*sectors)
|
|
|
|
return grub_errno;
|
|
|
|
for (i = 0; i < *nsectors; i++)
|
|
|
|
diff --git a/grub-core/gfxmenu/gui_string_util.c b/grub-core/gfxmenu/gui_string_util.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index a9a415e31..ba1e1eab3 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/gfxmenu/gui_string_util.c
|
|
|
|
+++ b/grub-core/gfxmenu/gui_string_util.c
|
|
|
|
@@ -55,7 +55,7 @@ canonicalize_path (const char *path)
|
|
|
|
if (*p == '/')
|
|
|
|
components++;
|
|
|
|
|
|
|
|
- char **path_array = grub_malloc (components * sizeof (*path_array));
|
|
|
|
+ char **path_array = grub_calloc (components, sizeof (*path_array));
|
|
|
|
if (! path_array)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
diff --git a/grub-core/gfxmenu/widget-box.c b/grub-core/gfxmenu/widget-box.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index b60602889..470597ded 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/gfxmenu/widget-box.c
|
|
|
|
+++ b/grub-core/gfxmenu/widget-box.c
|
|
|
|
@@ -303,10 +303,10 @@ grub_gfxmenu_create_box (const char *pixmaps_prefix,
|
|
|
|
box->content_height = 0;
|
|
|
|
box->raw_pixmaps =
|
|
|
|
(struct grub_video_bitmap **)
|
|
|
|
- grub_malloc (BOX_NUM_PIXMAPS * sizeof (struct grub_video_bitmap *));
|
|
|
|
+ grub_calloc (BOX_NUM_PIXMAPS, sizeof (struct grub_video_bitmap *));
|
|
|
|
box->scaled_pixmaps =
|
|
|
|
(struct grub_video_bitmap **)
|
|
|
|
- grub_malloc (BOX_NUM_PIXMAPS * sizeof (struct grub_video_bitmap *));
|
|
|
|
+ grub_calloc (BOX_NUM_PIXMAPS, sizeof (struct grub_video_bitmap *));
|
|
|
|
|
|
|
|
/* Initialize all pixmap pointers to NULL so that proper destruction can
|
|
|
|
be performed if an error is encountered partway through construction. */
|
|
|
|
diff --git a/grub-core/io/gzio.c b/grub-core/io/gzio.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 86ea8cfde..7024cda84 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/io/gzio.c
|
|
|
|
+++ b/grub-core/io/gzio.c
|
|
|
|
@@ -554,7 +554,7 @@ huft_build (unsigned *b, /* code lengths in bits (all assumed <= BMAX) */
|
|
|
|
z = 1 << j; /* table entries for j-bit table */
|
|
|
|
|
|
|
|
/* allocate and link in new table */
|
|
|
|
- q = (struct huft *) grub_zalloc ((z + 1) * sizeof (struct huft));
|
|
|
|
+ q = (struct huft *) grub_calloc (z + 1, sizeof (struct huft));
|
|
|
|
if (! q)
|
|
|
|
{
|
|
|
|
if (h)
|
|
|
|
diff --git a/grub-core/kern/efi/efi.c b/grub-core/kern/efi/efi.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 4d36fe311..b1379b92f 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/kern/efi/efi.c
|
|
|
|
+++ b/grub-core/kern/efi/efi.c
|
|
|
|
@@ -207,7 +207,7 @@ grub_efi_set_variable(const char *var, const grub_efi_guid_t *guid,
|
|
|
|
|
|
|
|
len = grub_strlen (var);
|
|
|
|
len16 = len * GRUB_MAX_UTF16_PER_UTF8;
|
|
|
|
- var16 = grub_malloc ((len16 + 1) * sizeof (var16[0]));
|
|
|
|
+ var16 = grub_calloc (len16 + 1, sizeof (var16[0]));
|
|
|
|
if (!var16)
|
|
|
|
return grub_errno;
|
|
|
|
len16 = grub_utf8_to_utf16 (var16, len16, (grub_uint8_t *) var, len, NULL);
|
|
|
|
@@ -242,7 +242,7 @@ grub_efi_get_variable (const char *var, const grub_efi_guid_t *guid,
|
|
|
|
|
|
|
|
len = grub_strlen (var);
|
|
|
|
len16 = len * GRUB_MAX_UTF16_PER_UTF8;
|
|
|
|
- var16 = grub_malloc ((len16 + 1) * sizeof (var16[0]));
|
|
|
|
+ var16 = grub_calloc (len16 + 1, sizeof (var16[0]));
|
|
|
|
if (!var16)
|
|
|
|
return NULL;
|
|
|
|
len16 = grub_utf8_to_utf16 (var16, len16, (grub_uint8_t *) var, len, NULL);
|
|
|
|
@@ -384,6 +384,7 @@ grub_efi_get_filename (grub_efi_device_path_t *dp0)
|
|
|
|
{
|
|
|
|
grub_efi_file_path_device_path_t *fp;
|
|
|
|
grub_efi_uint16_t len;
|
|
|
|
+ grub_efi_char16_t *dup_name;
|
|
|
|
|
|
|
|
*p++ = '/';
|
|
|
|
|
|
|
|
@@ -394,7 +395,16 @@ grub_efi_get_filename (grub_efi_device_path_t *dp0)
|
|
|
|
while (len > 0 && fp->path_name[len - 1] == 0)
|
|
|
|
len--;
|
|
|
|
|
|
|
|
- p = (char *) grub_utf16_to_utf8 ((unsigned char *) p, fp->path_name, len);
|
|
|
|
+ dup_name = grub_calloc (len, sizeof (*dup_name));
|
|
|
|
+ if (!dup_name)
|
|
|
|
+ {
|
|
|
|
+ grub_free (name);
|
|
|
|
+ return NULL;
|
|
|
|
+ }
|
|
|
|
+ p = (char *) grub_utf16_to_utf8 ((unsigned char *) p,
|
|
|
|
+ grub_memcpy (dup_name, fp->path_name, len * sizeof (*dup_name)),
|
|
|
|
+ len);
|
|
|
|
+ grub_free (dup_name);
|
|
|
|
}
|
|
|
|
|
|
|
|
dp = GRUB_EFI_NEXT_DEVICE_PATH (dp);
|
|
|
|
@@ -884,9 +894,20 @@ grub_efi_print_device_path (grub_efi_device_path_t *dp)
|
|
|
|
fp = (grub_efi_file_path_device_path_t *) dp;
|
|
|
|
buf = grub_malloc ((len - 4) * 2 + 1);
|
|
|
|
if (buf)
|
|
|
|
- *grub_utf16_to_utf8 (buf, fp->path_name,
|
|
|
|
- (len - 4) / sizeof (grub_efi_char16_t))
|
|
|
|
- = '\0';
|
|
|
|
+ {
|
|
|
|
+ grub_efi_char16_t *dup_name = grub_malloc (len - 4);
|
|
|
|
+ if (!dup_name)
|
|
|
|
+ {
|
|
|
|
+ grub_errno = GRUB_ERR_NONE;
|
|
|
|
+ grub_printf ("/File((null))");
|
|
|
|
+ grub_free (buf);
|
|
|
|
+ break;
|
|
|
|
+ }
|
|
|
|
+ *grub_utf16_to_utf8 (buf, grub_memcpy (dup_name, fp->path_name, len - 4),
|
|
|
|
+ (len - 4) / sizeof (grub_efi_char16_t))
|
|
|
|
+ = '\0';
|
|
|
|
+ grub_free (dup_name);
|
|
|
|
+ }
|
|
|
|
else
|
|
|
|
grub_errno = GRUB_ERR_NONE;
|
|
|
|
grub_printf ("/File(%s)", buf);
|
|
|
|
diff --git a/grub-core/kern/emu/hostdisk.c b/grub-core/kern/emu/hostdisk.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 87e3e2512..f57bd334c 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/kern/emu/hostdisk.c
|
|
|
|
+++ b/grub-core/kern/emu/hostdisk.c
|
|
|
|
@@ -615,7 +615,7 @@ static char *
|
|
|
|
grub_util_path_concat_real (size_t n, int ext, va_list ap)
|
|
|
|
{
|
|
|
|
size_t totlen = 0;
|
|
|
|
- char **l = xmalloc ((n + ext) * sizeof (l[0]));
|
|
|
|
+ char **l = xcalloc (n + ext, sizeof (l[0]));
|
|
|
|
char *r, *p, *pi;
|
|
|
|
size_t i;
|
|
|
|
int first = 1;
|
|
|
|
diff --git a/grub-core/kern/fs.c b/grub-core/kern/fs.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 1bd748be8..730d21770 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/kern/fs.c
|
|
|
|
+++ b/grub-core/kern/fs.c
|
|
|
|
@@ -151,7 +151,7 @@ grub_fs_blocklist_open (grub_file_t file, const char *name)
|
|
|
|
while (p);
|
|
|
|
|
|
|
|
/* Allocate a block list. */
|
|
|
|
- blocks = grub_zalloc (sizeof (struct grub_fs_block) * (num + 1));
|
|
|
|
+ blocks = grub_calloc (num + 1, sizeof (struct grub_fs_block));
|
|
|
|
if (! blocks)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
diff --git a/grub-core/kern/misc.c b/grub-core/kern/misc.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index aaae9aa0a..c034f49f9 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/kern/misc.c
|
|
|
|
+++ b/grub-core/kern/misc.c
|
|
|
|
@@ -737,7 +737,7 @@ parse_printf_args (const char *fmt0, struct printf_args *args,
|
|
|
|
args->ptr = args->prealloc;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
- args->ptr = grub_malloc (args->count * sizeof (args->ptr[0]));
|
|
|
|
+ args->ptr = grub_calloc (args->count, sizeof (args->ptr[0]));
|
|
|
|
if (!args->ptr)
|
|
|
|
{
|
|
|
|
grub_errno = GRUB_ERR_NONE;
|
|
|
|
diff --git a/grub-core/kern/parser.c b/grub-core/kern/parser.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 78175aac2..619db3122 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/kern/parser.c
|
|
|
|
+++ b/grub-core/kern/parser.c
|
|
|
|
@@ -213,7 +213,7 @@ grub_parser_split_cmdline (const char *cmdline,
|
|
|
|
return grub_errno;
|
|
|
|
grub_memcpy (args, buffer, bp - buffer);
|
|
|
|
|
|
|
|
- *argv = grub_malloc (sizeof (char *) * (*argc + 1));
|
|
|
|
+ *argv = grub_calloc (*argc + 1, sizeof (char *));
|
|
|
|
if (!*argv)
|
|
|
|
{
|
|
|
|
grub_free (args);
|
|
|
|
diff --git a/grub-core/kern/uboot/uboot.c b/grub-core/kern/uboot/uboot.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index cf0168e62..efa10f284 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/kern/uboot/uboot.c
|
|
|
|
+++ b/grub-core/kern/uboot/uboot.c
|
|
|
|
@@ -133,7 +133,7 @@ grub_uboot_dev_enum (void)
|
|
|
|
return num_devices;
|
|
|
|
|
|
|
|
max_devices = 2;
|
|
|
|
- enum_devices = grub_malloc (sizeof(struct device_info) * max_devices);
|
|
|
|
+ enum_devices = grub_calloc (max_devices, sizeof(struct device_info));
|
|
|
|
if (!enum_devices)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
diff --git a/grub-core/lib/libgcrypt/cipher/ac.c b/grub-core/lib/libgcrypt/cipher/ac.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index f5e946a2d..63f6fcd11 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/lib/libgcrypt/cipher/ac.c
|
|
|
|
+++ b/grub-core/lib/libgcrypt/cipher/ac.c
|
|
|
|
@@ -185,7 +185,7 @@ ac_data_mpi_copy (gcry_ac_mpi_t *data_mpis, unsigned int data_mpis_n,
|
|
|
|
gcry_mpi_t mpi;
|
|
|
|
char *label;
|
|
|
|
|
|
|
|
- data_mpis_new = gcry_malloc (sizeof (*data_mpis_new) * data_mpis_n);
|
|
|
|
+ data_mpis_new = gcry_calloc (data_mpis_n, sizeof (*data_mpis_new));
|
|
|
|
if (! data_mpis_new)
|
|
|
|
{
|
|
|
|
err = gcry_error_from_errno (errno);
|
|
|
|
@@ -572,7 +572,7 @@ _gcry_ac_data_to_sexp (gcry_ac_data_t data, gcry_sexp_t *sexp,
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Add MPI list. */
|
|
|
|
- arg_list = gcry_malloc (sizeof (*arg_list) * (data_n + 1));
|
|
|
|
+ arg_list = gcry_calloc (data_n + 1, sizeof (*arg_list));
|
|
|
|
if (! arg_list)
|
|
|
|
{
|
|
|
|
err = gcry_error_from_errno (errno);
|
|
|
|
@@ -1283,7 +1283,7 @@ ac_data_construct (const char *identifier, int include_flags,
|
|
|
|
/* We build a list of arguments to pass to
|
|
|
|
gcry_sexp_build_array(). */
|
|
|
|
data_length = _gcry_ac_data_length (data);
|
|
|
|
- arg_list = gcry_malloc (sizeof (*arg_list) * (data_length * 2));
|
|
|
|
+ arg_list = gcry_calloc (data_length, sizeof (*arg_list) * 2);
|
|
|
|
if (! arg_list)
|
|
|
|
{
|
|
|
|
err = gcry_error_from_errno (errno);
|
|
|
|
@@ -1593,7 +1593,7 @@ _gcry_ac_key_pair_generate (gcry_ac_handle_t handle, unsigned int nbits,
|
|
|
|
arg_list_n += 2;
|
|
|
|
|
|
|
|
/* Allocate list. */
|
|
|
|
- arg_list = gcry_malloc (sizeof (*arg_list) * arg_list_n);
|
|
|
|
+ arg_list = gcry_calloc (arg_list_n, sizeof (*arg_list));
|
|
|
|
if (! arg_list)
|
|
|
|
{
|
|
|
|
err = gcry_error_from_errno (errno);
|
|
|
|
diff --git a/grub-core/lib/libgcrypt/cipher/primegen.c b/grub-core/lib/libgcrypt/cipher/primegen.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 2788e349f..b12e79b19 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/lib/libgcrypt/cipher/primegen.c
|
|
|
|
+++ b/grub-core/lib/libgcrypt/cipher/primegen.c
|
|
|
|
@@ -383,7 +383,7 @@ prime_generate_internal (int need_q_factor,
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Allocate an array to track pool usage. */
|
|
|
|
- pool_in_use = gcry_malloc (n * sizeof *pool_in_use);
|
|
|
|
+ pool_in_use = gcry_calloc (n, sizeof *pool_in_use);
|
|
|
|
if (!pool_in_use)
|
|
|
|
{
|
|
|
|
err = gpg_err_code_from_errno (errno);
|
|
|
|
@@ -765,7 +765,7 @@ gen_prime (unsigned int nbits, int secret, int randomlevel,
|
|
|
|
if (nbits < 16)
|
|
|
|
log_fatal ("can't generate a prime with less than %d bits\n", 16);
|
|
|
|
|
|
|
|
- mods = gcry_xmalloc( no_of_small_prime_numbers * sizeof *mods );
|
|
|
|
+ mods = gcry_xcalloc( no_of_small_prime_numbers, sizeof *mods);
|
|
|
|
/* Make nbits fit into gcry_mpi_t implementation. */
|
|
|
|
val_2 = mpi_alloc_set_ui( 2 );
|
|
|
|
val_3 = mpi_alloc_set_ui( 3);
|
|
|
|
diff --git a/grub-core/lib/libgcrypt/cipher/pubkey.c b/grub-core/lib/libgcrypt/cipher/pubkey.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 910982141..ca087ad75 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/lib/libgcrypt/cipher/pubkey.c
|
|
|
|
+++ b/grub-core/lib/libgcrypt/cipher/pubkey.c
|
|
|
|
@@ -2941,7 +2941,7 @@ gcry_pk_encrypt (gcry_sexp_t *r_ciph, gcry_sexp_t s_data, gcry_sexp_t s_pkey)
|
|
|
|
* array to a format string, so we have to do it this way :-(. */
|
|
|
|
/* FIXME: There is now such a format specifier, so we can
|
|
|
|
change the code to be more clear. */
|
|
|
|
- arg_list = malloc (nelem * sizeof *arg_list);
|
|
|
|
+ arg_list = calloc (nelem, sizeof *arg_list);
|
|
|
|
if (!arg_list)
|
|
|
|
{
|
|
|
|
rc = gpg_err_code_from_syserror ();
|
|
|
|
@@ -3233,7 +3233,7 @@ gcry_pk_sign (gcry_sexp_t *r_sig, gcry_sexp_t s_hash, gcry_sexp_t s_skey)
|
|
|
|
}
|
|
|
|
strcpy (p, "))");
|
|
|
|
|
|
|
|
- arg_list = malloc (nelem * sizeof *arg_list);
|
|
|
|
+ arg_list = calloc (nelem, sizeof *arg_list);
|
|
|
|
if (!arg_list)
|
|
|
|
{
|
|
|
|
rc = gpg_err_code_from_syserror ();
|
|
|
|
diff --git a/grub-core/lib/priority_queue.c b/grub-core/lib/priority_queue.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 659be0b7f..7d5e7c05a 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/lib/priority_queue.c
|
|
|
|
+++ b/grub-core/lib/priority_queue.c
|
|
|
|
@@ -92,7 +92,7 @@ grub_priority_queue_new (grub_size_t elsize,
|
|
|
|
{
|
|
|
|
struct grub_priority_queue *ret;
|
|
|
|
void *els;
|
|
|
|
- els = grub_malloc (elsize * 8);
|
|
|
|
+ els = grub_calloc (8, elsize);
|
|
|
|
if (!els)
|
|
|
|
return 0;
|
|
|
|
ret = (struct grub_priority_queue *) grub_malloc (sizeof (*ret));
|
|
|
|
diff --git a/grub-core/lib/reed_solomon.c b/grub-core/lib/reed_solomon.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index ee9fa7b4f..467305b46 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/lib/reed_solomon.c
|
|
|
|
+++ b/grub-core/lib/reed_solomon.c
|
|
|
|
@@ -20,6 +20,7 @@
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
+#define xcalloc calloc
|
|
|
|
#define xmalloc malloc
|
|
|
|
#define grub_memset memset
|
|
|
|
#define grub_memcpy memcpy
|
|
|
|
@@ -158,11 +159,9 @@ rs_encode (gf_single_t *data, grub_size_t s, grub_size_t rs)
|
|
|
|
gf_single_t *rs_polynomial;
|
|
|
|
int i, j;
|
|
|
|
gf_single_t *m;
|
|
|
|
- m = xmalloc ((s + rs) * sizeof (gf_single_t));
|
|
|
|
+ m = xcalloc (s + rs, sizeof (gf_single_t));
|
|
|
|
grub_memcpy (m, data, s * sizeof (gf_single_t));
|
|
|
|
- grub_memset (m + s, 0, rs * sizeof (gf_single_t));
|
|
|
|
- rs_polynomial = xmalloc ((rs + 1) * sizeof (gf_single_t));
|
|
|
|
- grub_memset (rs_polynomial, 0, (rs + 1) * sizeof (gf_single_t));
|
|
|
|
+ rs_polynomial = xcalloc (rs + 1, sizeof (gf_single_t));
|
|
|
|
rs_polynomial[rs] = 1;
|
|
|
|
/* Multiply with X - a^r */
|
|
|
|
for (j = 0; j < rs; j++)
|
|
|
|
diff --git a/grub-core/lib/relocator.c b/grub-core/lib/relocator.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index ea3ebc719..5847aac36 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/lib/relocator.c
|
|
|
|
+++ b/grub-core/lib/relocator.c
|
|
|
|
@@ -495,9 +495,9 @@ malloc_in_range (struct grub_relocator *rel,
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
- eventt = grub_malloc (maxevents * sizeof (events[0]));
|
|
|
|
+ eventt = grub_calloc (maxevents, sizeof (events[0]));
|
|
|
|
counter = grub_malloc ((DIGITSORT_MASK + 2) * sizeof (counter[0]));
|
|
|
|
- events = grub_malloc (maxevents * sizeof (events[0]));
|
|
|
|
+ events = grub_calloc (maxevents, sizeof (events[0]));
|
|
|
|
if (!events || !eventt || !counter)
|
|
|
|
{
|
|
|
|
grub_dprintf ("relocator", "events or counter allocation failed %d\n",
|
|
|
|
@@ -963,7 +963,7 @@ malloc_in_range (struct grub_relocator *rel,
|
|
|
|
#endif
|
|
|
|
unsigned cural = 0;
|
|
|
|
int oom = 0;
|
|
|
|
- res->subchunks = grub_malloc (sizeof (res->subchunks[0]) * nallocs);
|
|
|
|
+ res->subchunks = grub_calloc (nallocs, sizeof (res->subchunks[0]));
|
|
|
|
if (!res->subchunks)
|
|
|
|
oom = 1;
|
|
|
|
res->nsubchunks = nallocs;
|
|
|
|
@@ -1562,8 +1562,8 @@ grub_relocator_prepare_relocs (struct grub_relocator *rel, grub_addr_t addr,
|
|
|
|
count[(chunk->src & 0xff) + 1]++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
- from = grub_malloc (nchunks * sizeof (sorted[0]));
|
|
|
|
- to = grub_malloc (nchunks * sizeof (sorted[0]));
|
|
|
|
+ from = grub_calloc (nchunks, sizeof (sorted[0]));
|
|
|
|
+ to = grub_calloc (nchunks, sizeof (sorted[0]));
|
|
|
|
if (!from || !to)
|
|
|
|
{
|
|
|
|
grub_free (from);
|
|
|
|
diff --git a/grub-core/loader/arm/linux.c b/grub-core/loader/arm/linux.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index b4f609d2d..ea29d7a72 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/loader/arm/linux.c
|
|
|
|
+++ b/grub-core/loader/arm/linux.c
|
|
|
|
@@ -77,7 +77,7 @@ linux_prepare_atag (void *target_atag)
|
|
|
|
|
|
|
|
/* some place for cmdline, initrd and terminator. */
|
|
|
|
tmp_size = get_atag_size (atag_orig) + 20 + (arg_size) / 4;
|
|
|
|
- tmp_atag = grub_malloc (tmp_size * sizeof (grub_uint32_t));
|
|
|
|
+ tmp_atag = grub_calloc (tmp_size, sizeof (grub_uint32_t));
|
|
|
|
if (!tmp_atag)
|
|
|
|
return grub_errno;
|
|
|
|
|
|
|
|
diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 3630b0cbf..2da119ad5 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/loader/efi/chainloader.c
|
|
|
|
+++ b/grub-core/loader/efi/chainloader.c
|
|
|
|
@@ -119,18 +119,23 @@ static void
|
|
|
|
copy_file_path (grub_efi_file_path_device_path_t *fp,
|
|
|
|
const char *str, grub_efi_uint16_t len)
|
|
|
|
{
|
|
|
|
- grub_efi_char16_t *p;
|
|
|
|
+ grub_efi_char16_t *p, *path_name;
|
|
|
|
grub_efi_uint16_t size;
|
|
|
|
|
|
|
|
fp->header.type = GRUB_EFI_MEDIA_DEVICE_PATH_TYPE;
|
|
|
|
fp->header.subtype = GRUB_EFI_FILE_PATH_DEVICE_PATH_SUBTYPE;
|
|
|
|
|
|
|
|
- size = grub_utf8_to_utf16 (fp->path_name, len * GRUB_MAX_UTF16_PER_UTF8,
|
|
|
|
+ path_name = grub_calloc (len, GRUB_MAX_UTF16_PER_UTF8 * sizeof (*path_name));
|
|
|
|
+ if (!path_name)
|
|
|
|
+ return;
|
|
|
|
+
|
|
|
|
+ size = grub_utf8_to_utf16 (path_name, len * GRUB_MAX_UTF16_PER_UTF8,
|
|
|
|
(const grub_uint8_t *) str, len, 0);
|
|
|
|
- for (p = fp->path_name; p < fp->path_name + size; p++)
|
|
|
|
+ for (p = path_name; p < path_name + size; p++)
|
|
|
|
if (*p == '/')
|
|
|
|
*p = '\\';
|
|
|
|
|
|
|
|
+ grub_memcpy (fp->path_name, path_name, size * sizeof (*fp->path_name));
|
|
|
|
/* File Path is NULL terminated */
|
|
|
|
fp->path_name[size++] = '\0';
|
|
|
|
fp->header.length = size * sizeof (grub_efi_char16_t) + sizeof (*fp);
|
|
|
|
diff --git a/grub-core/loader/i386/bsdXX.c b/grub-core/loader/i386/bsdXX.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index af6741d15..a8d8bf7da 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/loader/i386/bsdXX.c
|
|
|
|
+++ b/grub-core/loader/i386/bsdXX.c
|
|
|
|
@@ -48,7 +48,7 @@ read_headers (grub_file_t file, const char *filename, Elf_Ehdr *e, char **shdr)
|
|
|
|
if (e->e_ident[EI_CLASS] != SUFFIX (ELFCLASS))
|
|
|
|
return grub_error (GRUB_ERR_BAD_OS, N_("invalid arch-dependent ELF magic"));
|
|
|
|
|
|
|
|
- *shdr = grub_malloc ((grub_uint32_t) e->e_shnum * e->e_shentsize);
|
|
|
|
+ *shdr = grub_calloc (e->e_shnum, e->e_shentsize);
|
|
|
|
if (! *shdr)
|
|
|
|
return grub_errno;
|
|
|
|
|
|
|
|
diff --git a/grub-core/loader/i386/xnu.c b/grub-core/loader/i386/xnu.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 59ef73a73..ee0eaadc4 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/loader/i386/xnu.c
|
|
|
|
+++ b/grub-core/loader/i386/xnu.c
|
|
|
|
@@ -295,7 +295,7 @@ grub_xnu_devprop_add_property_utf8 (struct grub_xnu_devprop_device_descriptor *d
|
|
|
|
return grub_errno;
|
|
|
|
|
|
|
|
len = grub_strlen (name);
|
|
|
|
- utf16 = grub_malloc (sizeof (grub_uint16_t) * len);
|
|
|
|
+ utf16 = grub_calloc (len, sizeof (grub_uint16_t));
|
|
|
|
if (!utf16)
|
|
|
|
{
|
|
|
|
grub_free (utf8);
|
|
|
|
@@ -331,7 +331,7 @@ grub_xnu_devprop_add_property_utf16 (struct grub_xnu_devprop_device_descriptor *
|
|
|
|
grub_uint16_t *utf16;
|
|
|
|
grub_err_t err;
|
|
|
|
|
|
|
|
- utf16 = grub_malloc (sizeof (grub_uint16_t) * namelen);
|
|
|
|
+ utf16 = grub_calloc (namelen, sizeof (grub_uint16_t));
|
|
|
|
if (!utf16)
|
|
|
|
return grub_errno;
|
|
|
|
grub_memcpy (utf16, name, sizeof (grub_uint16_t) * namelen);
|
|
|
|
diff --git a/grub-core/loader/macho.c b/grub-core/loader/macho.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 59b195e27..f61341af5 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/loader/macho.c
|
|
|
|
+++ b/grub-core/loader/macho.c
|
|
|
|
@@ -97,7 +97,7 @@ grub_macho_file (grub_file_t file, const char *filename, int is_64bit)
|
|
|
|
if (grub_file_seek (macho->file, sizeof (struct grub_macho_fat_header))
|
|
|
|
== (grub_off_t) -1)
|
|
|
|
goto fail;
|
|
|
|
- archs = grub_malloc (sizeof (struct grub_macho_fat_arch) * narchs);
|
|
|
|
+ archs = grub_calloc (narchs, sizeof (struct grub_macho_fat_arch));
|
|
|
|
if (!archs)
|
|
|
|
goto fail;
|
|
|
|
if (grub_file_read (macho->file, archs,
|
|
|
|
diff --git a/grub-core/loader/multiboot_elfxx.c b/grub-core/loader/multiboot_elfxx.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 70cd1db51..cc6853692 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/loader/multiboot_elfxx.c
|
|
|
|
+++ b/grub-core/loader/multiboot_elfxx.c
|
|
|
|
@@ -217,7 +217,7 @@ CONCAT(grub_multiboot_load_elf, XX) (mbi_load_data_t *mld)
|
|
|
|
{
|
|
|
|
grub_uint8_t *shdr, *shdrptr;
|
|
|
|
|
|
|
|
- shdr = grub_malloc ((grub_uint32_t) ehdr->e_shnum * ehdr->e_shentsize);
|
|
|
|
+ shdr = grub_calloc (ehdr->e_shnum, ehdr->e_shentsize);
|
|
|
|
if (!shdr)
|
|
|
|
return grub_errno;
|
|
|
|
|
|
|
|
diff --git a/grub-core/loader/xnu.c b/grub-core/loader/xnu.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index df8dfdb4b..dc7d5409e 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/loader/xnu.c
|
|
|
|
+++ b/grub-core/loader/xnu.c
|
|
|
|
@@ -792,7 +792,7 @@ grub_cmd_xnu_mkext (grub_command_t cmd __attribute__ ((unused)),
|
|
|
|
if (grub_be_to_cpu32 (head.magic) == GRUB_MACHO_FAT_MAGIC)
|
|
|
|
{
|
|
|
|
narchs = grub_be_to_cpu32 (head.nfat_arch);
|
|
|
|
- archs = grub_malloc (sizeof (struct grub_macho_fat_arch) * narchs);
|
|
|
|
+ archs = grub_calloc (narchs, sizeof (struct grub_macho_fat_arch));
|
|
|
|
if (! archs)
|
|
|
|
{
|
|
|
|
grub_file_close (file);
|
|
|
|
diff --git a/grub-core/mmap/mmap.c b/grub-core/mmap/mmap.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 6a31cbae3..57b4e9a72 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/mmap/mmap.c
|
|
|
|
+++ b/grub-core/mmap/mmap.c
|
|
|
|
@@ -143,9 +143,9 @@ grub_mmap_iterate (grub_memory_hook_t hook, void *hook_data)
|
|
|
|
|
|
|
|
/* Initialize variables. */
|
|
|
|
ctx.scanline_events = (struct grub_mmap_scan *)
|
|
|
|
- grub_malloc (sizeof (struct grub_mmap_scan) * 2 * mmap_num);
|
|
|
|
+ grub_calloc (mmap_num, sizeof (struct grub_mmap_scan) * 2);
|
|
|
|
|
|
|
|
- present = grub_zalloc (sizeof (present[0]) * current_priority);
|
|
|
|
+ present = grub_calloc (current_priority, sizeof (present[0]));
|
|
|
|
|
|
|
|
if (! ctx.scanline_events || !present)
|
|
|
|
{
|
|
|
|
diff --git a/grub-core/net/bootp.c b/grub-core/net/bootp.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 8b6fc9f24..adf36fa4a 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/net/bootp.c
|
|
|
|
+++ b/grub-core/net/bootp.c
|
|
|
|
@@ -1326,7 +1326,7 @@ grub_cmd_bootp (struct grub_command *cmd __attribute__ ((unused)),
|
|
|
|
if (ncards == 0)
|
|
|
|
return grub_error (GRUB_ERR_NET_NO_CARD, N_("no network card found"));
|
|
|
|
|
|
|
|
- ifaces = grub_zalloc (ncards * sizeof (ifaces[0]));
|
|
|
|
+ ifaces = grub_calloc (ncards, sizeof (ifaces[0]));
|
|
|
|
if (!ifaces)
|
|
|
|
return grub_errno;
|
|
|
|
|
|
|
|
diff --git a/grub-core/net/dns.c b/grub-core/net/dns.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 5d9afe093..e332d5eb4 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/net/dns.c
|
|
|
|
+++ b/grub-core/net/dns.c
|
|
|
|
@@ -285,8 +285,8 @@ recv_hook (grub_net_udp_socket_t sock __attribute__ ((unused)),
|
|
|
|
ptr++;
|
|
|
|
ptr += 4;
|
|
|
|
}
|
|
|
|
- *data->addresses = grub_malloc (sizeof ((*data->addresses)[0])
|
|
|
|
- * grub_be_to_cpu16 (head->ancount));
|
|
|
|
+ *data->addresses = grub_calloc (grub_be_to_cpu16 (head->ancount),
|
|
|
|
+ sizeof ((*data->addresses)[0]));
|
|
|
|
if (!*data->addresses)
|
|
|
|
{
|
|
|
|
grub_errno = GRUB_ERR_NONE;
|
|
|
|
@@ -406,8 +406,8 @@ recv_hook (grub_net_udp_socket_t sock __attribute__ ((unused)),
|
|
|
|
dns_cache[h].addresses = 0;
|
|
|
|
dns_cache[h].name = grub_strdup (data->oname);
|
|
|
|
dns_cache[h].naddresses = *data->naddresses;
|
|
|
|
- dns_cache[h].addresses = grub_malloc (*data->naddresses
|
|
|
|
- * sizeof (dns_cache[h].addresses[0]));
|
|
|
|
+ dns_cache[h].addresses = grub_calloc (*data->naddresses,
|
|
|
|
+ sizeof (dns_cache[h].addresses[0]));
|
|
|
|
dns_cache[h].limit_time = grub_get_time_ms () + 1000 * ttl_all;
|
|
|
|
if (!dns_cache[h].addresses || !dns_cache[h].name)
|
|
|
|
{
|
|
|
|
@@ -479,7 +479,7 @@ grub_net_dns_lookup (const char *name,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
- sockets = grub_malloc (sizeof (sockets[0]) * n_servers);
|
|
|
|
+ sockets = grub_calloc (n_servers, sizeof (sockets[0]));
|
|
|
|
if (!sockets)
|
|
|
|
return grub_errno;
|
|
|
|
|
|
|
|
diff --git a/grub-core/net/net.c b/grub-core/net/net.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 19ff2d486..0e72bbb9b 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/net/net.c
|
|
|
|
+++ b/grub-core/net/net.c
|
|
|
|
@@ -338,8 +338,8 @@ grub_cmd_ipv6_autoconf (struct grub_command *cmd __attribute__ ((unused)),
|
|
|
|
ncards++;
|
|
|
|
}
|
|
|
|
|
|
|
|
- ifaces = grub_zalloc (ncards * sizeof (ifaces[0]));
|
|
|
|
- slaacs = grub_zalloc (ncards * sizeof (slaacs[0]));
|
|
|
|
+ ifaces = grub_calloc (ncards, sizeof (ifaces[0]));
|
|
|
|
+ slaacs = grub_calloc (ncards, sizeof (slaacs[0]));
|
|
|
|
if (!ifaces || !slaacs)
|
|
|
|
{
|
|
|
|
grub_free (ifaces);
|
|
|
|
diff --git a/grub-core/normal/charset.c b/grub-core/normal/charset.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index b0ab47d73..d57fb72fa 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/normal/charset.c
|
|
|
|
+++ b/grub-core/normal/charset.c
|
|
|
|
@@ -203,7 +203,7 @@ grub_utf8_to_ucs4_alloc (const char *msg, grub_uint32_t **unicode_msg,
|
|
|
|
{
|
|
|
|
grub_size_t msg_len = grub_strlen (msg);
|
|
|
|
|
|
|
|
- *unicode_msg = grub_malloc (msg_len * sizeof (grub_uint32_t));
|
|
|
|
+ *unicode_msg = grub_calloc (msg_len, sizeof (grub_uint32_t));
|
|
|
|
|
|
|
|
if (!*unicode_msg)
|
|
|
|
return -1;
|
|
|
|
@@ -488,7 +488,7 @@ grub_unicode_aglomerate_comb (const grub_uint32_t *in, grub_size_t inlen,
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
- n = grub_malloc (sizeof (n[0]) * (out->ncomb + 1));
|
|
|
|
+ n = grub_calloc (out->ncomb + 1, sizeof (n[0]));
|
|
|
|
if (!n)
|
|
|
|
{
|
|
|
|
grub_errno = GRUB_ERR_NONE;
|
|
|
|
@@ -842,7 +842,7 @@ grub_bidi_line_logical_to_visual (const grub_uint32_t *logical,
|
|
|
|
} \
|
|
|
|
}
|
|
|
|
|
|
|
|
- visual = grub_malloc (sizeof (visual[0]) * logical_len);
|
|
|
|
+ visual = grub_calloc (logical_len, sizeof (visual[0]));
|
|
|
|
if (!visual)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
@@ -1165,8 +1165,8 @@ grub_bidi_logical_to_visual (const grub_uint32_t *logical,
|
|
|
|
{
|
|
|
|
const grub_uint32_t *line_start = logical, *ptr;
|
|
|
|
struct grub_unicode_glyph *visual_ptr;
|
|
|
|
- *visual_out = visual_ptr = grub_malloc (3 * sizeof (visual_ptr[0])
|
|
|
|
- * (logical_len + 2));
|
|
|
|
+ *visual_out = visual_ptr = grub_calloc (logical_len + 2,
|
|
|
|
+ 3 * sizeof (visual_ptr[0]));
|
|
|
|
if (!visual_ptr)
|
|
|
|
return -1;
|
|
|
|
for (ptr = logical; ptr <= logical + logical_len; ptr++)
|
|
|
|
diff --git a/grub-core/normal/cmdline.c b/grub-core/normal/cmdline.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index c037d5050..c57242e2e 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/normal/cmdline.c
|
|
|
|
+++ b/grub-core/normal/cmdline.c
|
|
|
|
@@ -41,7 +41,7 @@ grub_err_t
|
|
|
|
grub_set_history (int newsize)
|
|
|
|
{
|
|
|
|
grub_uint32_t **old_hist_lines = hist_lines;
|
|
|
|
- hist_lines = grub_malloc (sizeof (grub_uint32_t *) * newsize);
|
|
|
|
+ hist_lines = grub_calloc (newsize, sizeof (grub_uint32_t *));
|
|
|
|
|
|
|
|
/* Copy the old lines into the new buffer. */
|
|
|
|
if (old_hist_lines)
|
|
|
|
@@ -114,7 +114,7 @@ static void
|
|
|
|
grub_history_set (int pos, grub_uint32_t *s, grub_size_t len)
|
|
|
|
{
|
|
|
|
grub_free (hist_lines[pos]);
|
|
|
|
- hist_lines[pos] = grub_malloc ((len + 1) * sizeof (grub_uint32_t));
|
|
|
|
+ hist_lines[pos] = grub_calloc (len + 1, sizeof (grub_uint32_t));
|
|
|
|
if (!hist_lines[pos])
|
|
|
|
{
|
|
|
|
grub_print_error ();
|
|
|
|
@@ -349,7 +349,7 @@ grub_cmdline_get (const char *prompt_translated)
|
|
|
|
char *ret;
|
|
|
|
unsigned nterms;
|
|
|
|
|
|
|
|
- buf = grub_malloc (max_len * sizeof (grub_uint32_t));
|
|
|
|
+ buf = grub_calloc (max_len, sizeof (grub_uint32_t));
|
|
|
|
if (!buf)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
@@ -377,7 +377,7 @@ grub_cmdline_get (const char *prompt_translated)
|
|
|
|
FOR_ACTIVE_TERM_OUTPUTS(cur)
|
|
|
|
nterms++;
|
|
|
|
|
|
|
|
- cl_terms = grub_malloc (sizeof (cl_terms[0]) * nterms);
|
|
|
|
+ cl_terms = grub_calloc (nterms, sizeof (cl_terms[0]));
|
|
|
|
if (!cl_terms)
|
|
|
|
{
|
|
|
|
grub_free (buf);
|
|
|
|
@@ -385,7 +385,7 @@ grub_cmdline_get (const char *prompt_translated)
|
|
|
|
}
|
|
|
|
cl_term_cur = cl_terms;
|
|
|
|
|
|
|
|
- unicode_msg = grub_malloc (msg_len * sizeof (grub_uint32_t));
|
|
|
|
+ unicode_msg = grub_calloc (msg_len, sizeof (grub_uint32_t));
|
|
|
|
if (!unicode_msg)
|
|
|
|
{
|
|
|
|
grub_free (buf);
|
|
|
|
@@ -495,7 +495,7 @@ grub_cmdline_get (const char *prompt_translated)
|
|
|
|
grub_uint32_t *insert;
|
|
|
|
|
|
|
|
insertlen = grub_strlen (insertu8);
|
|
|
|
- insert = grub_malloc ((insertlen + 1) * sizeof (grub_uint32_t));
|
|
|
|
+ insert = grub_calloc (insertlen + 1, sizeof (grub_uint32_t));
|
|
|
|
if (!insert)
|
|
|
|
{
|
|
|
|
grub_free (insertu8);
|
|
|
|
@@ -602,7 +602,7 @@ grub_cmdline_get (const char *prompt_translated)
|
|
|
|
|
|
|
|
grub_free (kill_buf);
|
|
|
|
|
|
|
|
- kill_buf = grub_malloc ((n + 1) * sizeof(grub_uint32_t));
|
|
|
|
+ kill_buf = grub_calloc (n + 1, sizeof (grub_uint32_t));
|
|
|
|
if (grub_errno)
|
|
|
|
{
|
|
|
|
grub_print_error ();
|
|
|
|
diff --git a/grub-core/normal/menu_entry.c b/grub-core/normal/menu_entry.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 5785f67ee..f31487c1f 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/normal/menu_entry.c
|
|
|
|
+++ b/grub-core/normal/menu_entry.c
|
|
|
|
@@ -95,8 +95,8 @@ init_line (struct screen *screen, struct line *linep)
|
|
|
|
{
|
|
|
|
linep->len = 0;
|
|
|
|
linep->max_len = 80;
|
|
|
|
- linep->buf = grub_malloc ((linep->max_len + 1) * sizeof (linep->buf[0]));
|
|
|
|
- linep->pos = grub_zalloc (screen->nterms * sizeof (linep->pos[0]));
|
|
|
|
+ linep->buf = grub_calloc (linep->max_len + 1, sizeof (linep->buf[0]));
|
|
|
|
+ linep->pos = grub_calloc (screen->nterms, sizeof (linep->pos[0]));
|
|
|
|
if (! linep->buf || !linep->pos)
|
|
|
|
{
|
|
|
|
grub_free (linep->buf);
|
|
|
|
@@ -287,7 +287,7 @@ update_screen (struct screen *screen, struct per_term_screen *term_screen,
|
|
|
|
pos = linep->pos + (term_screen - screen->terms);
|
|
|
|
|
|
|
|
if (!*pos)
|
|
|
|
- *pos = grub_zalloc ((linep->len + 1) * sizeof (**pos));
|
|
|
|
+ *pos = grub_calloc (linep->len + 1, sizeof (**pos));
|
|
|
|
|
|
|
|
if (i == region_start || linep == screen->lines + screen->line
|
|
|
|
|| (i > region_start && mode == ALL_LINES))
|
|
|
|
@@ -471,7 +471,7 @@ insert_string (struct screen *screen, const char *s, int update)
|
|
|
|
|
|
|
|
/* Insert the string. */
|
|
|
|
current_linep = screen->lines + screen->line;
|
|
|
|
- unicode_msg = grub_malloc ((p - s) * sizeof (grub_uint32_t));
|
|
|
|
+ unicode_msg = grub_calloc (p - s, sizeof (grub_uint32_t));
|
|
|
|
|
|
|
|
if (!unicode_msg)
|
|
|
|
return 0;
|
|
|
|
@@ -1023,7 +1023,7 @@ complete (struct screen *screen, int continuous, int update)
|
|
|
|
if (completion_buffer.buf)
|
|
|
|
{
|
|
|
|
buflen = grub_strlen (completion_buffer.buf);
|
|
|
|
- ucs4 = grub_malloc (sizeof (grub_uint32_t) * (buflen + 1));
|
|
|
|
+ ucs4 = grub_calloc (buflen + 1, sizeof (grub_uint32_t));
|
|
|
|
|
|
|
|
if (!ucs4)
|
|
|
|
{
|
|
|
|
@@ -1265,7 +1265,7 @@ grub_menu_entry_run (grub_menu_entry_t entry)
|
|
|
|
for (i = 0; i < (unsigned) screen->num_lines; i++)
|
|
|
|
{
|
|
|
|
grub_free (screen->lines[i].pos);
|
|
|
|
- screen->lines[i].pos = grub_zalloc (screen->nterms * sizeof (screen->lines[i].pos[0]));
|
|
|
|
+ screen->lines[i].pos = grub_calloc (screen->nterms, sizeof (screen->lines[i].pos[0]));
|
|
|
|
if (! screen->lines[i].pos)
|
|
|
|
{
|
|
|
|
grub_print_error ();
|
|
|
|
@@ -1275,7 +1275,7 @@ grub_menu_entry_run (grub_menu_entry_t entry)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
- screen->terms = grub_zalloc (screen->nterms * sizeof (screen->terms[0]));
|
|
|
|
+ screen->terms = grub_calloc (screen->nterms, sizeof (screen->terms[0]));
|
|
|
|
if (!screen->terms)
|
|
|
|
{
|
|
|
|
grub_print_error ();
|
|
|
|
diff --git a/grub-core/normal/menu_text.c b/grub-core/normal/menu_text.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 7681f7d28..ca1356243 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/normal/menu_text.c
|
|
|
|
+++ b/grub-core/normal/menu_text.c
|
|
|
|
@@ -78,7 +78,7 @@ grub_print_message_indented_real (const char *msg, int margin_left,
|
|
|
|
grub_size_t msg_len = grub_strlen (msg) + 2;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
- unicode_msg = grub_malloc (msg_len * sizeof (grub_uint32_t));
|
|
|
|
+ unicode_msg = grub_calloc (msg_len, sizeof (grub_uint32_t));
|
|
|
|
|
|
|
|
if (!unicode_msg)
|
|
|
|
return 0;
|
|
|
|
@@ -167,7 +167,7 @@ print_entry (int y, int highlight, grub_menu_entry_t entry,
|
|
|
|
|
|
|
|
title = entry ? entry->title : "";
|
|
|
|
title_len = grub_strlen (title);
|
|
|
|
- unicode_title = grub_malloc (title_len * sizeof (*unicode_title));
|
|
|
|
+ unicode_title = grub_calloc (title_len, sizeof (*unicode_title));
|
|
|
|
if (! unicode_title)
|
|
|
|
/* XXX How to show this error? */
|
|
|
|
return;
|
|
|
|
diff --git a/grub-core/normal/term.c b/grub-core/normal/term.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index ac5d69f0f..93a3a0d91 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/normal/term.c
|
|
|
|
+++ b/grub-core/normal/term.c
|
|
|
|
@@ -264,7 +264,7 @@ grub_term_save_pos (void)
|
|
|
|
FOR_ACTIVE_TERM_OUTPUTS(cur)
|
|
|
|
cnt++;
|
|
|
|
|
|
|
|
- ret = grub_malloc (cnt * sizeof (ret[0]));
|
|
|
|
+ ret = grub_calloc (cnt, sizeof (ret[0]));
|
|
|
|
if (!ret)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
@@ -1013,7 +1013,7 @@ grub_xnputs (const char *str, grub_size_t msg_len)
|
|
|
|
|
|
|
|
grub_error_push ();
|
|
|
|
|
|
|
|
- unicode_str = grub_malloc (msg_len * sizeof (grub_uint32_t));
|
|
|
|
+ unicode_str = grub_calloc (msg_len, sizeof (grub_uint32_t));
|
|
|
|
|
|
|
|
grub_error_pop ();
|
|
|
|
|
|
|
|
diff --git a/grub-core/osdep/linux/getroot.c b/grub-core/osdep/linux/getroot.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 388a0f706..e450f5f0a 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/osdep/linux/getroot.c
|
|
|
|
+++ b/grub-core/osdep/linux/getroot.c
|
|
|
|
@@ -176,7 +176,7 @@ grub_util_raid_getmembers (const char *name, int bootable)
|
|
|
|
if (ret != 0)
|
|
|
|
grub_util_error (_("ioctl GET_ARRAY_INFO error: %s"), strerror (errno));
|
|
|
|
|
|
|
|
- devicelist = xmalloc ((info.nr_disks + 1) * sizeof (char *));
|
|
|
|
+ devicelist = xcalloc (info.nr_disks + 1, sizeof (char *));
|
|
|
|
|
|
|
|
for (i = 0, j = 0; j < info.nr_disks; i++)
|
|
|
|
{
|
|
|
|
@@ -249,7 +249,7 @@ grub_find_root_devices_from_btrfs (const char *dir)
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
- ret = xmalloc ((fsi.num_devices + 1) * sizeof (ret[0]));
|
|
|
|
+ ret = xcalloc (fsi.num_devices + 1, sizeof (ret[0]));
|
|
|
|
|
|
|
|
for (i = 1; i <= fsi.max_id && j < fsi.num_devices; i++)
|
|
|
|
{
|
|
|
|
@@ -508,7 +508,7 @@ grub_find_root_devices_from_mountinfo (const char *dir, char **relroot)
|
|
|
|
if (relroot)
|
|
|
|
*relroot = NULL;
|
|
|
|
|
|
|
|
- entries = xmalloc (entry_max * sizeof (*entries));
|
|
|
|
+ entries = xcalloc (entry_max, sizeof (*entries));
|
|
|
|
|
|
|
|
again:
|
|
|
|
fp = grub_util_fopen ("/proc/self/mountinfo", "r");
|
|
|
|
diff --git a/grub-core/osdep/unix/config.c b/grub-core/osdep/unix/config.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index b637c58ef..46a881530 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/osdep/unix/config.c
|
|
|
|
+++ b/grub-core/osdep/unix/config.c
|
|
|
|
@@ -102,7 +102,7 @@ grub_util_load_config (struct grub_util_config *cfg)
|
|
|
|
argv[0] = "sh";
|
|
|
|
argv[1] = "-c";
|
|
|
|
|
|
|
|
- script = xmalloc (4 * strlen (cfgfile) + 300);
|
|
|
|
+ script = xcalloc (4, strlen (cfgfile) + 300);
|
|
|
|
|
|
|
|
ptr = script;
|
|
|
|
memcpy (ptr, ". '", 3);
|
|
|
|
diff --git a/grub-core/osdep/windows/getroot.c b/grub-core/osdep/windows/getroot.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 661d95461..eada663b2 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/osdep/windows/getroot.c
|
|
|
|
+++ b/grub-core/osdep/windows/getroot.c
|
|
|
|
@@ -59,7 +59,7 @@ grub_get_mount_point (const TCHAR *path)
|
|
|
|
|
|
|
|
for (ptr = path; *ptr; ptr++);
|
|
|
|
allocsize = (ptr - path + 10) * 2;
|
|
|
|
- out = xmalloc (allocsize * sizeof (out[0]));
|
|
|
|
+ out = xcalloc (allocsize, sizeof (out[0]));
|
|
|
|
|
|
|
|
/* When pointing to EFI system partition GetVolumePathName fails
|
|
|
|
for ESP root and returns abberant information for everything
|
|
|
|
diff --git a/grub-core/osdep/windows/hostdisk.c b/grub-core/osdep/windows/hostdisk.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 6f49df465..580b3f2da 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/osdep/windows/hostdisk.c
|
|
|
|
+++ b/grub-core/osdep/windows/hostdisk.c
|
|
|
|
@@ -111,7 +111,7 @@ grub_util_get_windows_path_real (const char *path)
|
|
|
|
|
|
|
|
while (1)
|
|
|
|
{
|
|
|
|
- fpa = xmalloc (alloc * sizeof (fpa[0]));
|
|
|
|
+ fpa = xcalloc (alloc, sizeof (fpa[0]));
|
|
|
|
|
|
|
|
len = GetFullPathName (tpath, alloc, fpa, NULL);
|
|
|
|
if (len >= alloc)
|
|
|
|
@@ -393,7 +393,7 @@ grub_util_fd_opendir (const char *name)
|
|
|
|
for (l = 0; name_windows[l]; l++);
|
|
|
|
for (l--; l >= 0 && (name_windows[l] == '\\' || name_windows[l] == '/'); l--);
|
|
|
|
l++;
|
|
|
|
- pattern = xmalloc ((l + 3) * sizeof (pattern[0]));
|
|
|
|
+ pattern = xcalloc (l + 3, sizeof (pattern[0]));
|
|
|
|
memcpy (pattern, name_windows, l * sizeof (pattern[0]));
|
|
|
|
pattern[l] = '\\';
|
|
|
|
pattern[l + 1] = '*';
|
|
|
|
diff --git a/grub-core/osdep/windows/init.c b/grub-core/osdep/windows/init.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index e8ffd62c6..6297de632 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/osdep/windows/init.c
|
|
|
|
+++ b/grub-core/osdep/windows/init.c
|
|
|
|
@@ -161,7 +161,7 @@ grub_util_host_init (int *argc __attribute__ ((unused)),
|
|
|
|
LPWSTR *targv;
|
|
|
|
|
|
|
|
targv = CommandLineToArgvW (tcmdline, argc);
|
|
|
|
- *argv = xmalloc ((*argc + 1) * sizeof (argv[0]));
|
|
|
|
+ *argv = xcalloc (*argc + 1, sizeof (argv[0]));
|
|
|
|
|
|
|
|
for (i = 0; i < *argc; i++)
|
|
|
|
(*argv)[i] = grub_util_tchar_to_utf8 (targv[i]);
|
|
|
|
diff --git a/grub-core/osdep/windows/platform.c b/grub-core/osdep/windows/platform.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 912269191..04e0eda9a 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/osdep/windows/platform.c
|
|
|
|
+++ b/grub-core/osdep/windows/platform.c
|
|
|
|
@@ -225,8 +225,8 @@ grub_install_register_efi (grub_device_t efidir_grub_dev,
|
|
|
|
grub_util_error ("%s", _("no EFI routines are available when running in BIOS mode"));
|
|
|
|
|
|
|
|
distrib8_len = grub_strlen (efi_distributor);
|
|
|
|
- distributor16 = xmalloc ((distrib8_len + 1) * GRUB_MAX_UTF16_PER_UTF8
|
|
|
|
- * sizeof (grub_uint16_t));
|
|
|
|
+ distributor16 = xcalloc (distrib8_len + 1,
|
|
|
|
+ GRUB_MAX_UTF16_PER_UTF8 * sizeof (grub_uint16_t));
|
|
|
|
distrib16_len = grub_utf8_to_utf16 (distributor16, distrib8_len * GRUB_MAX_UTF16_PER_UTF8,
|
|
|
|
(const grub_uint8_t *) efi_distributor,
|
|
|
|
distrib8_len, 0);
|
|
|
|
diff --git a/grub-core/osdep/windows/relpath.c b/grub-core/osdep/windows/relpath.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index cb0861744..478e8ef14 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/osdep/windows/relpath.c
|
|
|
|
+++ b/grub-core/osdep/windows/relpath.c
|
|
|
|
@@ -72,7 +72,7 @@ grub_make_system_path_relative_to_its_root (const char *path)
|
|
|
|
if (dirwindows[0] && dirwindows[1] == ':')
|
|
|
|
offset = 2;
|
|
|
|
}
|
|
|
|
- ret = xmalloc (sizeof (ret[0]) * (flen - offset + 2));
|
|
|
|
+ ret = xcalloc (flen - offset + 2, sizeof (ret[0]));
|
|
|
|
if (dirwindows[offset] != '\\'
|
|
|
|
&& dirwindows[offset] != '/'
|
|
|
|
&& dirwindows[offset])
|
|
|
|
diff --git a/grub-core/partmap/gpt.c b/grub-core/partmap/gpt.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 103f6796f..72a2e37cd 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/partmap/gpt.c
|
|
|
|
+++ b/grub-core/partmap/gpt.c
|
|
|
|
@@ -199,7 +199,7 @@ gpt_partition_map_embed (struct grub_disk *disk, unsigned int *nsectors,
|
|
|
|
*nsectors = ctx.len;
|
|
|
|
if (*nsectors > max_nsectors)
|
|
|
|
*nsectors = max_nsectors;
|
|
|
|
- *sectors = grub_malloc (*nsectors * sizeof (**sectors));
|
|
|
|
+ *sectors = grub_calloc (*nsectors, sizeof (**sectors));
|
|
|
|
if (!*sectors)
|
|
|
|
return grub_errno;
|
|
|
|
for (i = 0; i < *nsectors; i++)
|
|
|
|
diff --git a/grub-core/partmap/msdos.c b/grub-core/partmap/msdos.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 6d4b455a1..81ca6b90e 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/partmap/msdos.c
|
|
|
|
+++ b/grub-core/partmap/msdos.c
|
|
|
|
@@ -337,7 +337,7 @@ pc_partition_map_embed (struct grub_disk *disk, unsigned int *nsectors,
|
|
|
|
avail_nsectors = *nsectors;
|
|
|
|
if (*nsectors > max_nsectors)
|
|
|
|
*nsectors = max_nsectors;
|
|
|
|
- *sectors = grub_malloc (*nsectors * sizeof (**sectors));
|
|
|
|
+ *sectors = grub_calloc (*nsectors, sizeof (**sectors));
|
|
|
|
if (!*sectors)
|
|
|
|
return grub_errno;
|
|
|
|
for (i = 0; i < *nsectors; i++)
|
|
|
|
diff --git a/grub-core/script/execute.c b/grub-core/script/execute.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 7d327f59d..528ddfd36 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/script/execute.c
|
|
|
|
+++ b/grub-core/script/execute.c
|
|
|
|
@@ -587,7 +587,7 @@ gettext_append (struct grub_script_argv *result, const char *orig_str)
|
|
|
|
for (iptr = orig_str; *iptr; iptr++)
|
|
|
|
if (*iptr == '$')
|
|
|
|
dollar_cnt++;
|
|
|
|
- ctx.allowed_strings = grub_malloc (sizeof (ctx.allowed_strings[0]) * dollar_cnt);
|
|
|
|
+ ctx.allowed_strings = grub_calloc (dollar_cnt, sizeof (ctx.allowed_strings[0]));
|
|
|
|
|
|
|
|
if (parse_string (orig_str, gettext_save_allow, &ctx, 0))
|
|
|
|
goto fail;
|
|
|
|
diff --git a/grub-core/tests/fake_input.c b/grub-core/tests/fake_input.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 2d6085298..b5eb516be 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/tests/fake_input.c
|
|
|
|
+++ b/grub-core/tests/fake_input.c
|
|
|
|
@@ -49,7 +49,7 @@ grub_terminal_input_fake_sequence (int *seq_in, int nseq_in)
|
|
|
|
saved = grub_term_inputs;
|
|
|
|
if (seq)
|
|
|
|
grub_free (seq);
|
|
|
|
- seq = grub_malloc (nseq_in * sizeof (seq[0]));
|
|
|
|
+ seq = grub_calloc (nseq_in, sizeof (seq[0]));
|
|
|
|
if (!seq)
|
|
|
|
return;
|
|
|
|
|
|
|
|
diff --git a/grub-core/tests/video_checksum.c b/grub-core/tests/video_checksum.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 74d5b65e5..44d081069 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/tests/video_checksum.c
|
|
|
|
+++ b/grub-core/tests/video_checksum.c
|
|
|
|
@@ -336,7 +336,7 @@ grub_video_capture_write_bmp (const char *fname,
|
|
|
|
{
|
|
|
|
case 4:
|
|
|
|
{
|
|
|
|
- grub_uint8_t *buffer = xmalloc (mode_info->width * 3);
|
|
|
|
+ grub_uint8_t *buffer = xcalloc (3, mode_info->width);
|
|
|
|
grub_uint32_t rmask = ((1 << mode_info->red_mask_size) - 1);
|
|
|
|
grub_uint32_t gmask = ((1 << mode_info->green_mask_size) - 1);
|
|
|
|
grub_uint32_t bmask = ((1 << mode_info->blue_mask_size) - 1);
|
|
|
|
@@ -367,7 +367,7 @@ grub_video_capture_write_bmp (const char *fname,
|
|
|
|
}
|
|
|
|
case 3:
|
|
|
|
{
|
|
|
|
- grub_uint8_t *buffer = xmalloc (mode_info->width * 3);
|
|
|
|
+ grub_uint8_t *buffer = xcalloc (3, mode_info->width);
|
|
|
|
grub_uint32_t rmask = ((1 << mode_info->red_mask_size) - 1);
|
|
|
|
grub_uint32_t gmask = ((1 << mode_info->green_mask_size) - 1);
|
|
|
|
grub_uint32_t bmask = ((1 << mode_info->blue_mask_size) - 1);
|
|
|
|
@@ -407,7 +407,7 @@ grub_video_capture_write_bmp (const char *fname,
|
|
|
|
}
|
|
|
|
case 2:
|
|
|
|
{
|
|
|
|
- grub_uint8_t *buffer = xmalloc (mode_info->width * 3);
|
|
|
|
+ grub_uint8_t *buffer = xcalloc (3, mode_info->width);
|
|
|
|
grub_uint16_t rmask = ((1 << mode_info->red_mask_size) - 1);
|
|
|
|
grub_uint16_t gmask = ((1 << mode_info->green_mask_size) - 1);
|
|
|
|
grub_uint16_t bmask = ((1 << mode_info->blue_mask_size) - 1);
|
|
|
|
diff --git a/grub-core/video/capture.c b/grub-core/video/capture.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 4f83c7441..4d3195e01 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/video/capture.c
|
|
|
|
+++ b/grub-core/video/capture.c
|
|
|
|
@@ -89,7 +89,7 @@ grub_video_capture_start (const struct grub_video_mode_info *mode_info,
|
|
|
|
framebuffer.mode_info = *mode_info;
|
|
|
|
framebuffer.mode_info.blit_format = grub_video_get_blit_format (&framebuffer.mode_info);
|
|
|
|
|
|
|
|
- framebuffer.ptr = grub_malloc (framebuffer.mode_info.height * framebuffer.mode_info.pitch);
|
|
|
|
+ framebuffer.ptr = grub_calloc (framebuffer.mode_info.height, framebuffer.mode_info.pitch);
|
|
|
|
if (!framebuffer.ptr)
|
|
|
|
return grub_errno;
|
|
|
|
|
|
|
|
diff --git a/grub-core/video/emu/sdl.c b/grub-core/video/emu/sdl.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index a2f639f66..0ebab6f57 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/video/emu/sdl.c
|
|
|
|
+++ b/grub-core/video/emu/sdl.c
|
|
|
|
@@ -172,7 +172,7 @@ grub_video_sdl_set_palette (unsigned int start, unsigned int count,
|
|
|
|
if (start + count > mode_info.number_of_colors)
|
|
|
|
count = mode_info.number_of_colors - start;
|
|
|
|
|
|
|
|
- tmp = grub_malloc (count * sizeof (tmp[0]));
|
|
|
|
+ tmp = grub_calloc (count, sizeof (tmp[0]));
|
|
|
|
for (i = 0; i < count; i++)
|
|
|
|
{
|
|
|
|
tmp[i].r = palette_data[i].r;
|
|
|
|
diff --git a/grub-core/video/i386/pc/vga.c b/grub-core/video/i386/pc/vga.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 01f47112d..b2f776c99 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/video/i386/pc/vga.c
|
|
|
|
+++ b/grub-core/video/i386/pc/vga.c
|
|
|
|
@@ -127,7 +127,7 @@ grub_video_vga_setup (unsigned int width, unsigned int height,
|
|
|
|
|
|
|
|
vga_height = height ? : 480;
|
|
|
|
|
|
|
|
- framebuffer.temporary_buffer = grub_malloc (vga_height * VGA_WIDTH);
|
|
|
|
+ framebuffer.temporary_buffer = grub_calloc (vga_height, VGA_WIDTH);
|
|
|
|
framebuffer.front_page = 0;
|
|
|
|
framebuffer.back_page = 0;
|
|
|
|
if (!framebuffer.temporary_buffer)
|
|
|
|
diff --git a/grub-core/video/readers/png.c b/grub-core/video/readers/png.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index e1a01e99f..e85df3c1b 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/grub-core/video/readers/png.c
|
|
|
|
+++ b/grub-core/video/readers/png.c
|
|
|
|
@@ -309,7 +309,7 @@ grub_png_decode_image_header (struct grub_png_data *data)
|
|
|
|
if (data->is_16bit || data->is_gray || data->is_palette)
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
- data->image_data = grub_malloc (data->image_height * data->row_bytes);
|
|
|
|
+ data->image_data = grub_calloc (data->image_height, data->row_bytes);
|
|
|
|
if (grub_errno)
|
|
|
|
return grub_errno;
|
|
|
|
|
|
|
|
diff --git a/util/getroot.c b/util/getroot.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index fa3460d6c..6feb2a4de 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/util/getroot.c
|
|
|
|
+++ b/util/getroot.c
|
|
|
|
@@ -219,7 +219,7 @@ make_device_name (const char *drive)
|
|
|
|
char *ret, *ptr;
|
|
|
|
const char *iptr;
|
|
|
|
|
|
|
|
- ret = xmalloc (strlen (drive) * 2);
|
|
|
|
+ ret = xcalloc (2, strlen (drive));
|
|
|
|
ptr = ret;
|
|
|
|
for (iptr = drive; *iptr; iptr++)
|
|
|
|
{
|
|
|
|
diff --git a/util/grub-file.c b/util/grub-file.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 50c18b683..b2e7dd69f 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/util/grub-file.c
|
|
|
|
+++ b/util/grub-file.c
|
|
|
|
@@ -54,7 +54,7 @@ main (int argc, char *argv[])
|
|
|
|
|
|
|
|
grub_util_host_init (&argc, &argv);
|
|
|
|
|
|
|
|
- argv2 = xmalloc (argc * sizeof (argv2[0]));
|
|
|
|
+ argv2 = xcalloc (argc, sizeof (argv2[0]));
|
|
|
|
|
|
|
|
if (argc == 2 && strcmp (argv[1], "--version") == 0)
|
|
|
|
{
|
|
|
|
diff --git a/util/grub-fstest.c b/util/grub-fstest.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index a358ae471..793aefa02 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/util/grub-fstest.c
|
|
|
|
+++ b/util/grub-fstest.c
|
|
|
|
@@ -650,7 +650,7 @@ argp_parser (int key, char *arg, struct argp_state *state)
|
|
|
|
if (args_count < num_disks)
|
|
|
|
{
|
|
|
|
if (args_count == 0)
|
|
|
|
- images = xmalloc (num_disks * sizeof (images[0]));
|
|
|
|
+ images = xcalloc (num_disks, sizeof (images[0]));
|
|
|
|
images[args_count] = grub_canonicalize_file_name (arg);
|
|
|
|
args_count++;
|
|
|
|
return 0;
|
|
|
|
@@ -734,7 +734,7 @@ main (int argc, char *argv[])
|
|
|
|
|
|
|
|
grub_util_host_init (&argc, &argv);
|
|
|
|
|
|
|
|
- args = xmalloc (argc * sizeof (args[0]));
|
|
|
|
+ args = xcalloc (argc, sizeof (args[0]));
|
|
|
|
|
|
|
|
argp_parse (&argp, argc, argv, 0, 0, 0);
|
|
|
|
|
|
|
|
diff --git a/util/grub-install-common.c b/util/grub-install-common.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 0a2e24a79..cf993c059 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/util/grub-install-common.c
|
|
|
|
+++ b/util/grub-install-common.c
|
|
|
|
@@ -281,7 +281,7 @@ handle_install_list (struct install_list *il, const char *val,
|
|
|
|
il->n_entries++;
|
|
|
|
}
|
|
|
|
il->n_alloc = il->n_entries + 1;
|
|
|
|
- il->entries = xmalloc (il->n_alloc * sizeof (il->entries[0]));
|
|
|
|
+ il->entries = xcalloc (il->n_alloc, sizeof (il->entries[0]));
|
|
|
|
ptr = val;
|
|
|
|
for (ce = il->entries; ; ce++)
|
|
|
|
{
|
|
|
|
diff --git a/util/grub-install.c b/util/grub-install.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 16f137ca8..3bf0e063a 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/util/grub-install.c
|
|
|
|
+++ b/util/grub-install.c
|
|
|
|
@@ -623,7 +623,7 @@ device_map_check_duplicates (const char *dev_map)
|
|
|
|
if (! fp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
- d = xmalloc (alloced * sizeof (d[0]));
|
|
|
|
+ d = xcalloc (alloced, sizeof (d[0]));
|
|
|
|
|
|
|
|
while (fgets (buf, sizeof (buf), fp))
|
|
|
|
{
|
|
|
|
@@ -1232,7 +1232,7 @@ main (int argc, char *argv[])
|
|
|
|
ndev++;
|
|
|
|
}
|
|
|
|
|
|
|
|
- grub_drives = xmalloc (sizeof (grub_drives[0]) * (ndev + 1));
|
|
|
|
+ grub_drives = xcalloc (ndev + 1, sizeof (grub_drives[0]));
|
|
|
|
|
|
|
|
for (curdev = grub_devices, curdrive = grub_drives; *curdev; curdev++,
|
|
|
|
curdrive++)
|
|
|
|
diff --git a/util/grub-mkimagexx.c b/util/grub-mkimagexx.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index a483c674c..f9aa1a033 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/util/grub-mkimagexx.c
|
|
|
|
+++ b/util/grub-mkimagexx.c
|
|
|
|
@@ -1999,10 +1999,8 @@ SUFFIX (grub_mkimage_load_image) (const char *kernel_path,
|
|
|
|
+ grub_host_to_target16 (e->e_shstrndx) * smd.section_entsize);
|
|
|
|
smd.strtab = (char *) e + grub_host_to_target_addr (s->sh_offset);
|
|
|
|
|
|
|
|
- smd.addrs = xmalloc (sizeof (*smd.addrs) * smd.num_sections);
|
|
|
|
- memset (smd.addrs, 0, sizeof (*smd.addrs) * smd.num_sections);
|
|
|
|
- smd.vaddrs = xmalloc (sizeof (*smd.vaddrs) * smd.num_sections);
|
|
|
|
- memset (smd.vaddrs, 0, sizeof (*smd.vaddrs) * smd.num_sections);
|
|
|
|
+ smd.addrs = xcalloc (smd.num_sections, sizeof (*smd.addrs));
|
|
|
|
+ smd.vaddrs = xcalloc (smd.num_sections, sizeof (*smd.vaddrs));
|
|
|
|
|
|
|
|
SUFFIX (locate_sections) (e, kernel_path, &smd, layout, image_target);
|
|
|
|
|
|
|
|
diff --git a/util/grub-mkrescue.c b/util/grub-mkrescue.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 9545945d8..21e72bde4 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/util/grub-mkrescue.c
|
|
|
|
+++ b/util/grub-mkrescue.c
|
|
|
|
@@ -441,8 +441,8 @@ main (int argc, char *argv[])
|
|
|
|
xorriso = xstrdup ("xorriso");
|
|
|
|
label_font = grub_util_path_concat (2, pkgdatadir, "unicode.pf2");
|
|
|
|
|
|
|
|
- argp_argv = xmalloc (sizeof (argp_argv[0]) * argc);
|
|
|
|
- xorriso_tail_argv = xmalloc (sizeof (argp_argv[0]) * argc);
|
|
|
|
+ argp_argv = xcalloc (argc, sizeof (argp_argv[0]));
|
|
|
|
+ xorriso_tail_argv = xcalloc (argc, sizeof (argp_argv[0]));
|
|
|
|
|
|
|
|
xorriso_tail_argc = 0;
|
|
|
|
/* Program name */
|
|
|
|
diff --git a/util/grub-mkstandalone.c b/util/grub-mkstandalone.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 4907d44c0..edf309717 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/util/grub-mkstandalone.c
|
|
|
|
+++ b/util/grub-mkstandalone.c
|
|
|
|
@@ -296,7 +296,7 @@ main (int argc, char *argv[])
|
|
|
|
grub_util_host_init (&argc, &argv);
|
|
|
|
grub_util_disable_fd_syncs ();
|
|
|
|
|
|
|
|
- files = xmalloc ((argc + 1) * sizeof (files[0]));
|
|
|
|
+ files = xcalloc (argc + 1, sizeof (files[0]));
|
|
|
|
|
|
|
|
argp_parse (&argp, argc, argv, 0, 0, 0);
|
|
|
|
|
|
|
|
diff --git a/util/grub-pe2elf.c b/util/grub-pe2elf.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index 0d4084a10..11331294f 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/util/grub-pe2elf.c
|
|
|
|
+++ b/util/grub-pe2elf.c
|
|
|
|
@@ -100,9 +100,9 @@ write_section_data (FILE* fp, const char *name, char *image,
|
|
|
|
char *pe_strtab = (image + pe_chdr->symtab_offset
|
|
|
|
+ pe_chdr->num_symbols * sizeof (struct grub_pe32_symbol));
|
|
|
|
|
|
|
|
- section_map = xmalloc ((2 * pe_chdr->num_sections + 5) * sizeof (int));
|
|
|
|
+ section_map = xcalloc (2 * pe_chdr->num_sections + 5, sizeof (int));
|
|
|
|
section_map[0] = 0;
|
|
|
|
- shdr = xmalloc ((2 * pe_chdr->num_sections + 5) * sizeof (shdr[0]));
|
|
|
|
+ shdr = xcalloc (2 * pe_chdr->num_sections + 5, sizeof (shdr[0]));
|
|
|
|
idx = 1;
|
|
|
|
idx_reloc = pe_chdr->num_sections + 1;
|
|
|
|
|
|
|
|
@@ -233,7 +233,7 @@ write_reloc_section (FILE* fp, const char *name, char *image,
|
|
|
|
|
|
|
|
pe_sec = pe_shdr + shdr[i].sh_link;
|
|
|
|
pe_rel = (struct grub_pe32_reloc *) (image + pe_sec->relocations_offset);
|
|
|
|
- rel = (elf_reloc_t *) xmalloc (pe_sec->num_relocations * sizeof (elf_reloc_t));
|
|
|
|
+ rel = (elf_reloc_t *) xcalloc (pe_sec->num_relocations, sizeof (elf_reloc_t));
|
|
|
|
num_rels = 0;
|
|
|
|
modified = 0;
|
|
|
|
|
|
|
|
@@ -365,12 +365,10 @@ write_symbol_table (FILE* fp, const char *name, char *image,
|
|
|
|
pe_symtab = (struct grub_pe32_symbol *) (image + pe_chdr->symtab_offset);
|
|
|
|
pe_strtab = (char *) (pe_symtab + pe_chdr->num_symbols);
|
|
|
|
|
|
|
|
- symtab = (Elf_Sym *) xmalloc ((pe_chdr->num_symbols + 1) *
|
|
|
|
- sizeof (Elf_Sym));
|
|
|
|
- memset (symtab, 0, (pe_chdr->num_symbols + 1) * sizeof (Elf_Sym));
|
|
|
|
+ symtab = (Elf_Sym *) xcalloc (pe_chdr->num_symbols + 1, sizeof (Elf_Sym));
|
|
|
|
num_syms = 1;
|
|
|
|
|
|
|
|
- symtab_map = (int *) xmalloc (pe_chdr->num_symbols * sizeof (int));
|
|
|
|
+ symtab_map = (int *) xcalloc (pe_chdr->num_symbols, sizeof (int));
|
|
|
|
|
|
|
|
for (i = 0; i < (int) pe_chdr->num_symbols;
|
|
|
|
i += pe_symtab->num_aux + 1, pe_symtab += pe_symtab->num_aux + 1)
|
|
|
|
diff --git a/util/grub-probe.c b/util/grub-probe.c
|
2022-05-10 07:20:45 +00:00
|
|
|
index e45dbf9e0..2a8c2cdff 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/util/grub-probe.c
|
|
|
|
+++ b/util/grub-probe.c
|
|
|
|
@@ -361,8 +361,8 @@ probe (const char *path, char **device_names, char delim)
|
|
|
|
grub_util_pull_device (*curdev);
|
|
|
|
ndev++;
|
|
|
|
}
|
|
|
|
-
|
|
|
|
- drives_names = xmalloc (sizeof (drives_names[0]) * (ndev + 1));
|
|
|
|
+
|
|
|
|
+ drives_names = xcalloc (ndev + 1, sizeof (drives_names[0]));
|
|
|
|
|
|
|
|
for (curdev = device_names, curdrive = drives_names; *curdev; curdev++,
|
|
|
|
curdrive++)
|
|
|
|
diff --git a/include/grub/unicode.h b/include/grub/unicode.h
|
2022-05-10 07:20:45 +00:00
|
|
|
index a0403e91f..4de986a85 100644
|
2020-07-29 17:15:26 +00:00
|
|
|
--- a/include/grub/unicode.h
|
|
|
|
+++ b/include/grub/unicode.h
|
|
|
|
@@ -293,7 +293,7 @@ grub_unicode_glyph_dup (const struct grub_unicode_glyph *in)
|
|
|
|
grub_memcpy (out, in, sizeof (*in));
|
|
|
|
if (in->ncomb > ARRAY_SIZE (out->combining_inline))
|
|
|
|
{
|
|
|
|
- out->combining_ptr = grub_malloc (in->ncomb * sizeof (out->combining_ptr[0]));
|
|
|
|
+ out->combining_ptr = grub_calloc (in->ncomb, sizeof (out->combining_ptr[0]));
|
|
|
|
if (!out->combining_ptr)
|
|
|
|
{
|
|
|
|
grub_free (out);
|
|
|
|
@@ -315,7 +315,7 @@ grub_unicode_set_glyph (struct grub_unicode_glyph *out,
|
|
|
|
grub_memcpy (out, in, sizeof (*in));
|
|
|
|
if (in->ncomb > ARRAY_SIZE (out->combining_inline))
|
|
|
|
{
|
|
|
|
- out->combining_ptr = grub_malloc (in->ncomb * sizeof (out->combining_ptr[0]));
|
|
|
|
+ out->combining_ptr = grub_calloc (in->ncomb, sizeof (out->combining_ptr[0]));
|
|
|
|
if (!out->combining_ptr)
|
|
|
|
return;
|
|
|
|
grub_memcpy (out->combining_ptr, in->combining_ptr,
|