Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp10416087ybi; Wed, 24 Jul 2019 22:49:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqx4O8jXA6tLVmbH9h9rhFmQbOt+qca4chAzfOCF+aocvS2pvokXvQlNNnE3GEf3ZBGO2oRm X-Received: by 2002:a63:d90f:: with SMTP id r15mr64787605pgg.259.1564033793287; Wed, 24 Jul 2019 22:49:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564033793; cv=none; d=google.com; s=arc-20160816; b=zfh+Z288d0/juM7YD606LEqQywraj4w9rjaS+KlmDPtC9owuCGV9BxfnIAvDOlTYiA Tqo5Wbq70sMDII6C96L6AeHNM9AzHO6Yj5ljbHMuH19p4ebh7UX3/s7E2PaGjJlnvuRw F4YTrebfU1YtV4iRWcVLvSEZvUe06G2p0r45h2yWpuHZpn5RV2FIcxoGv1KBrb3hltLv HTzsIXOCnH5einDL1HK6JB8iuU7AS6g3ci6sRjKCD75wFclVYsTWUl1ds/0CSXEQHQ6t OAEuN+rKwWy6Q7OzM71Xdl1iP50i7PI97zBb7MlVxLbHGO13rYpd6rXGcO4x9XgeU6lR maBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=dRCsuOGDft9dhV5jK1PPDHOTZ8bJiWsCL4k+CBc4n4w=; b=fuYtpfxrJmAapsJbqnHsR7u4OE1hC9d1Z8JkXtXBhG0u/Klo4TYR5C1q3g+TurYDFA FRGUdAAZRm7MVkVJ8KKdQxLYXkBDJcs+Qw/+AR0OjY8/kPUIUQ+GhmFWSWc5EpTliuJm NrSk6Wr8cV9XTXj9KPmSxSZ++y7ncrzDoUJLRush0IYdjjDoKWziraKUfE2OOM+sTqeT dDdrHkZnkto/6gFvsff/DNDc9fBbMecV3Pi/7M35QST3NK3sDYRmQRTfLGwohNHze3SP Oj07HLM1GkhDEU7M2tSaFYvKwt9hfablUgviv0YVZixYZclaDYgCuh3PWg3G6gZFCV7K V+xQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="OkHhn/+P"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g31si16473943pld.8.2019.07.24.22.49.38; Wed, 24 Jul 2019 22:49:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="OkHhn/+P"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388637AbfGXXPd (ORCPT + 99 others); Wed, 24 Jul 2019 19:15:33 -0400 Received: from mail-pl1-f196.google.com ([209.85.214.196]:46542 "EHLO mail-pl1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726388AbfGXXPd (ORCPT ); Wed, 24 Jul 2019 19:15:33 -0400 Received: by mail-pl1-f196.google.com with SMTP id c2so22557071plz.13 for ; Wed, 24 Jul 2019 16:15:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=dRCsuOGDft9dhV5jK1PPDHOTZ8bJiWsCL4k+CBc4n4w=; b=OkHhn/+PLkTKgs4lithBDVvzUNR9asCItEvbeIglX5BzPtApvmClAjdRumC+U/gTw/ 0+8AQ3yt4O+XSdMpJvqxfdciEOQvoGCmit1EWmxy2gC25J5wRy3WasCI6eGQazQlvpaC HzLw3YLjQLDRCssFqOovCVOFf0cwFASA8uElCjuRgcCOwiQS1E43P3vsDWtL1eNiZ+nG Oh2TviGoFkQ5acM1CIMxM9Hx0y1z64/EAQzHzO7tUIgeubCw80HPm7oljPWUeynop7fP KmvkF/DqrjWBDml9AeemKsVZRo+UQN5eXu8Ky+F087bhPnUQzUZKfMP6qk+EiLXGmNjw cCsw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=dRCsuOGDft9dhV5jK1PPDHOTZ8bJiWsCL4k+CBc4n4w=; b=XKJIlHklSFAwtwkpDRdTZSS/eLBi99UfdTvs0wYS1BoYrx+Zieti0rhUEzWuH5xxsD og5q+uf+hJfZFilw0veu4qmXqIA2pwSTA1lIK8kXcZmLoiZj4FE+ebQ83q9hxgXkxwpf lUQnXYtj5hxTSgL6J+jrqD3fB/w0M55ae3fHgFNVXrJUyP35tkmnw92zdrYWMwmT756i f+yuuVHd5Baxt6j0atNGvVxwvIismLw1hJrmT4b2icGp61wu/8s4LhkmT2D7XcGuBp/R WSdZ6BC5VnZGOX+Ox46XcHyRDulxqUAKwSmC+UHsOaXMVmvR5BurwRr5MTbHf+4pOlL9 MRyA== X-Gm-Message-State: APjAAAWhVjEB/ne6KBTJF74d0mvS5mf8kaxprfyjW9wEaY1CSec1EYfc jGfJdIqnXmtxFL4C2n/Z6B4= X-Received: by 2002:a17:902:b688:: with SMTP id c8mr86887309pls.243.1564010132755; Wed, 24 Jul 2019 16:15:32 -0700 (PDT) Received: from blueforge.nvidia.com (searspoint.nvidia.com. [216.228.112.21]) by smtp.gmail.com with ESMTPSA id x67sm50275523pfb.21.2019.07.24.16.15.31 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Wed, 24 Jul 2019 16:15:32 -0700 (PDT) From: john.hubbard@gmail.com X-Google-Original-From: jhubbard@nvidia.com To: "H . Peter Anvin" Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, LKML , John Hubbard Subject: [PATCH 1/1] x86/boot: clear some fields explicitly Date: Wed, 24 Jul 2019 16:15:28 -0700 Message-Id: <20190724231528.32381-2-jhubbard@nvidia.com> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190724231528.32381-1-jhubbard@nvidia.com> References: <20190724231528.32381-1-jhubbard@nvidia.com> MIME-Version: 1.0 X-NVConfidentiality: public Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: John Hubbard Recent gcc compilers (gcc 9.1) generate warnings about an out of bounds memset, if you trying memset across several fields of a struct. This generated a couple of warnings on x86_64 builds. Because struct boot_params is __packed__, normal variable variable assignment will work just as well as a memset here. Change three u32 fields to be cleared to zero that way, and just memset the _pad4 field. This clears up the build warnings for me. Signed-off-by: John Hubbard --- arch/x86/include/asm/bootparam_utils.h | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/arch/x86/include/asm/bootparam_utils.h b/arch/x86/include/asm/bootparam_utils.h index 101eb944f13c..4df87d4a043b 100644 --- a/arch/x86/include/asm/bootparam_utils.h +++ b/arch/x86/include/asm/bootparam_utils.h @@ -37,12 +37,11 @@ static void sanitize_boot_params(struct boot_params *boot_params) if (boot_params->sentinel) { /* fields in boot_params are left uninitialized, clear them */ boot_params->acpi_rsdp_addr = 0; - memset(&boot_params->ext_ramdisk_image, 0, - (char *)&boot_params->efi_info - - (char *)&boot_params->ext_ramdisk_image); - memset(&boot_params->kbd_status, 0, - (char *)&boot_params->hdr - - (char *)&boot_params->kbd_status); + boot_params->ext_ramdisk_image = 0; + boot_params->ext_ramdisk_size = 0; + boot_params->ext_cmd_line_ptr = 0; + + memset(&boot_params->_pad4, 0, sizeof(boot_params->_pad4)); memset(&boot_params->_pad7[0], 0, (char *)&boot_params->edd_mbr_sig_buffer[0] - (char *)&boot_params->_pad7[0]); -- 2.22.0