x86, boot: Sanitize boot_params if not zeroed on creation
authorH. Peter Anvin <hpa@linux.intel.com>
Tue, 29 Jan 2013 09:05:24 +0000 (01:05 -0800)
committerH. Peter Anvin <hpa@linux.intel.com>
Tue, 29 Jan 2013 09:22:17 +0000 (01:22 -0800)
commit5dcd14ecd41ea2b3ae3295a9b30d98769d52165f
tree0bdf705c1fd6d6e5832f392e9b445a1aa5d265e3
parent09c205afde70c15f20ca76ba0a57409dad175fd0
x86, boot: Sanitize boot_params if not zeroed on creation

Use the new sentinel field to detect bootloaders which fail to follow
protocol and don't initialize fields in struct boot_params that they
do not explicitly initialize to zero.

Based on an original patch and research by Yinghai Lu.
Changed by hpa to be invoked both in the decompression path and in the
kernel proper; the latter for the case where a bootloader takes over
decompression.

Originally-by: Yinghai Lu <yinghai@kernel.org>
Link: http://lkml.kernel.org/r/1359058816-7615-26-git-send-email-yinghai@kernel.org
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
arch/x86/boot/compressed/misc.c
arch/x86/boot/compressed/misc.h
arch/x86/include/asm/bootparam_utils.h [new file with mode: 0644]
arch/x86/kernel/head32.c
arch/x86/kernel/head64.c