-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
x86, boot: Sanitize boot_params if not zeroed on creation
Use the new sentinel field to detect bootloaders which fail to follow protocol and don't initialize fields in struct boot_params that they do not explicitly initialize to zero. Based on an original patch and research by Yinghai Lu. Changed by hpa to be invoked both in the decompression path and in the kernel proper; the latter for the case where a bootloader takes over decompression. Originally-by: Yinghai Lu <yinghai@kernel.org> Link: http://lkml.kernel.org/r/1359058816-7615-26-git-send-email-yinghai@kernel.org Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
- Loading branch information
H. Peter Anvin
committed
Jan 29, 2013
1 parent
09c205a
commit 5dcd14e
Showing
5 changed files
with
46 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
#ifndef _ASM_X86_BOOTPARAM_UTILS_H | ||
#define _ASM_X86_BOOTPARAM_UTILS_H | ||
|
||
#include <asm/bootparam.h> | ||
|
||
/* | ||
* This file is included from multiple environments. Do not | ||
* add completing #includes to make it standalone. | ||
*/ | ||
|
||
/* | ||
* Deal with bootloaders which fail to initialize unknown fields in | ||
* boot_params to zero. The list fields in this list are taken from | ||
* analysis of kexec-tools; if other broken bootloaders initialize a | ||
* different set of fields we will need to figure out how to disambiguate. | ||
* | ||
*/ | ||
static void sanitize_boot_params(struct boot_params *boot_params) | ||
{ | ||
if (boot_params->sentinel) { | ||
/*fields in boot_params are not valid, clear them */ | ||
memset(&boot_params->olpc_ofw_header, 0, | ||
(char *)&boot_params->alt_mem_k - | ||
(char *)&boot_params->olpc_ofw_header); | ||
memset(&boot_params->kbd_status, 0, | ||
(char *)&boot_params->hdr - | ||
(char *)&boot_params->kbd_status); | ||
memset(&boot_params->_pad7[0], 0, | ||
(char *)&boot_params->edd_mbr_sig_buffer[0] - | ||
(char *)&boot_params->_pad7[0]); | ||
memset(&boot_params->_pad8[0], 0, | ||
(char *)&boot_params->eddbuf[0] - | ||
(char *)&boot_params->_pad8[0]); | ||
memset(&boot_params->_pad9[0], 0, sizeof(boot_params->_pad9)); | ||
} | ||
} | ||
|
||
#endif /* _ASM_X86_BOOTPARAM_UTILS_H */ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters