Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp3453809imm; Sun, 14 Oct 2018 21:01:57 -0700 (PDT) X-Google-Smtp-Source: ACcGV618TBWBsBtrqLY9Xvv5fQjNjC/txz4c9K3qHCHku5a8aSkTfBupqQuXx184RdqTsMMW6m8D X-Received: by 2002:a17:902:368:: with SMTP id 95-v6mr15628562pld.319.1539576117862; Sun, 14 Oct 2018 21:01:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539576117; cv=none; d=google.com; s=arc-20160816; b=xkbOJbKWdhIUAXexOnvMSEKkOhTrZNhzF8/DQ7ThJZ8Q9zs8g5ZjHfy/bhBQWV78nC Zy18cXtomHIeG0u8N0+0TTFfHyvwhX3p/Xj3qhn5HdbSB22gxHSEVp68TW70oy6PV+xp Q9E9LwE3OsqkYM6hcQlKj2bkV0wzaSkQrL804TN1KYt0CcKu0CrKUzN6b5UQTbJkhb/X ERGwWJSLHYDigy06ERW0iKVK9HMxcvSfNo0kte3jKSx47MTpeJbnuBexzZts1wXJ1U4/ LZ1XtUYnLfSlQWhtixnldVnNOYhXvId2Nt/rz1WRaoeljVm7pQNFb4289qQHm4vZ6BIR 6gaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:message-id:subject:cc:from:to :in-reply-to; bh=BGifb0HitB5vtKL2u+sualGhuzToa8hlrxzz5zWUG7Y=; b=K3RS1RFDU7986Blv3ZHjnKISSJVT1joHoZ6PegIvUdxD9JciGMRX11ub9lfpJdauih 73+mzU6zrHI8xZ9Nzil2b6PTPrHC1Gr4F7wca6HvFBP4wnpg3EZ8LumRd1b+rfdmY0zS WxGypdXNVRToWRzA7YvckWQeNdUAQkd8nGLWPkIokLEtS4blbsRM2laKcPhY4bHO46bO LLIXXU3RNt2E2B2HdS8IFRvtQlHj9JVnDvDrLs5xbzlAjDtESe+8wEzmITapZdn5vHKe 6tC7QbIDmttwBW1ln/tKzQF47jMF1KpvpZtGoTQX9rHgu7ZjpSEJvPzI/Ol35PlKuAqO vSQg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w64-v6si9964650pfb.247.2018.10.14.21.01.43; Sun, 14 Oct 2018 21:01:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726821AbeJOLoj (ORCPT + 99 others); Mon, 15 Oct 2018 07:44:39 -0400 Received: from ozlabs.org ([203.11.71.1]:33917 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726584AbeJOLoi (ORCPT ); Mon, 15 Oct 2018 07:44:38 -0400 Received: by ozlabs.org (Postfix, from userid 1034) id 42YPr96Hhwz9s5c; Mon, 15 Oct 2018 15:01:11 +1100 (AEDT) X-powerpc-patch-notification: thanks X-powerpc-patch-commit: 7241d26e8175e95290a6549a470c330dbfc63442 In-Reply-To: To: Christophe Leroy , Benjamin Herrenschmidt , Paul Mackerras , abdhalee@linux.vnet.ibm.com From: Michael Ellerman Cc: linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org Subject: Re: powerpc/64: properly initialise the stackprotector canary on SMP. Message-Id: <42YPr96Hhwz9s5c@ozlabs.org> Date: Mon, 15 Oct 2018 15:01:11 +1100 (AEDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 2018-10-13 at 09:45:12 UTC, Christophe Leroy wrote: > commit 06ec27aea9fc ("powerpc/64: add stack protector support") > doesn't initialise the stack canary on SMP secondary CPU's paca, > leading to the following false positive report from the > stack protector. > > smp: Bringing up secondary CPUs ... > Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: __schedule+0x978/0xa80 > CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc7-next-20181010-autotest-autotest #1 > Call Trace: > [c000001fed5b3bf0] [c000000000a0ef3c] dump_stack+0xb0/0xf4 (unreliable) > [c000001fed5b3c30] [c0000000000f9d68] panic+0x140/0x308 > [c000001fed5b3cc0] [c0000000000f9844] __stack_chk_fail+0x24/0x30 > [c000001fed5b3d20] [c000000000a2c3a8] __schedule+0x978/0xa80 > [c000001fed5b3e00] [c000000000a2c9b4] schedule_idle+0x34/0x60 > [c000001fed5b3e30] [c00000000013d344] do_idle+0x224/0x3d0 > [c000001fed5b3ec0] [c00000000013d6e0] cpu_startup_entry+0x30/0x50 > [c000001fed5b3ef0] [c000000000047f34] start_secondary+0x4d4/0x520 > [c000001fed5b3f90] [c00000000000b370] start_secondary_prolog+0x10/0x14 > > This patch properly initialises the stack_canary of the secondary > idle tasks. > > Reported-by: Abdul Haleem > Fixes: 06ec27aea9fc ("powerpc/64: add stack protector support") > Signed-off-by: Christophe Leroy Applied to powerpc next, thanks. https://git.kernel.org/powerpc/c/7241d26e8175e95290a6549a470c33 cheers