aboutsummaryrefslogtreecommitdiffstats
path: root/drivers/firmware/efi/libstub/randomalloc.c
diff options
context:
space:
mode:
authorArd Biesheuvel <[email protected]>2025-03-14 11:03:33 +0000
committerArd Biesheuvel <[email protected]>2025-03-14 11:21:29 +0000
commitcb16dfed0093217a68c0faa9394fa5823927e04c (patch)
tree86cd78550580a20fa8c3f67e4ebb5ac752216ac4 /drivers/firmware/efi/libstub/randomalloc.c
parentefi/mokvar-table: Avoid repeated map/unmap of the same page (diff)
downloadkernel-cb16dfed0093217a68c0faa9394fa5823927e04c.tar.gz
kernel-cb16dfed0093217a68c0faa9394fa5823927e04c.zip
efi/libstub: Avoid physical address 0x0 when doing random allocation
Ben reports spurious EFI zboot failures on a system where physical RAM starts at 0x0. When doing random memory allocation from the EFI stub on such a platform, a random seed of 0x0 (which means no entropy source is available) will result in the allocation to be placed at address 0x0 if sufficient space is available. When this allocation is subsequently passed on to the decompression code, the 0x0 address is mistaken for NULL and the code complains and gives up. So avoid address 0x0 when doing random allocation, and set the minimum address to the minimum alignment. Cc: <[email protected]> Reported-by: Ben Schneider <[email protected]> Tested-by: Ben Schneider <[email protected]> Reviewed-by: Ilias Apalodimas <[email protected]> Signed-off-by: Ard Biesheuvel <[email protected]>
Diffstat (limited to 'drivers/firmware/efi/libstub/randomalloc.c')
-rw-r--r--drivers/firmware/efi/libstub/randomalloc.c4
1 files changed, 4 insertions, 0 deletions
diff --git a/drivers/firmware/efi/libstub/randomalloc.c b/drivers/firmware/efi/libstub/randomalloc.c
index 5a732018be36..fd80b2f3233a 100644
--- a/drivers/firmware/efi/libstub/randomalloc.c
+++ b/drivers/firmware/efi/libstub/randomalloc.c
@@ -75,6 +75,10 @@ efi_status_t efi_random_alloc(unsigned long size,
if (align < EFI_ALLOC_ALIGN)
align = EFI_ALLOC_ALIGN;
+ /* Avoid address 0x0, as it can be mistaken for NULL */
+ if (alloc_min == 0)
+ alloc_min = align;
+
size = round_up(size, EFI_ALLOC_ALIGN);
/* count the suitable slots in each memory map entry */