x86 setup: guard the heap against invalid stack setups
authorH. Peter Anvin <hpa@zytor.com>
Wed, 30 Jan 2008 12:33:04 +0000 (13:33 +0100)
committerIngo Molnar <mingo@elte.hu>
Wed, 30 Jan 2008 12:33:04 +0000 (13:33 +0100)
commitacd644bb4abb4d9f0ba6b9ec2b356263971ef9d0
tree9fcea88cca70b60efa8d49b9e3a11a43408a7449
parent1a8514e04e3f0249a75f66225e99cdf48d305be7
x86 setup: guard the heap against invalid stack setups

If we use the bootloader-provided stack pointer, we might end up in a
situation where the bootloader (incorrectly) pointed the stack in the
middle of our heap.  Catch this by simply comparing the computed heap
end value to the stack pointer minus the defined stack size.

Signed-off-by: H. Peter Anvin <hpa@zytor.com>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
arch/x86/boot/main.c