Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3433616imu; Sun, 11 Nov 2018 15:01:20 -0800 (PST) X-Google-Smtp-Source: AJdET5c5JFU76GgrUIo/aDI4IyM6v0BEPY+ppprrBy/JZJEsYj2o+flGEkmoRtQgWdSletAQansh X-Received: by 2002:a17:902:124:: with SMTP id 33-v6mr17793714plb.287.1541977279959; Sun, 11 Nov 2018 15:01:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541977279; cv=none; d=google.com; s=arc-20160816; b=PDPyfMfHfU/MCKH1B/+x2dInizOAuPNQi6/jbgPxeqSPLq3FJ1Z99wtnv60gak1we6 6Hoxh07TxmiKqYPccbn/oVhqf6X7oxQIepF93BoGchGzUu7ik1o5tPRflIkSxjjIiaFF PU2Yx6HSUG3QBaocA+yOCq2CgdzhZ7SkoNF31tHO9KJEarKeGxtb6N/a5XWm5spH0Rr2 UeHjrzDp2LFGNIEjKUtXaMmO5GBADSIMffgv9sFveZ7j0HGzVSYultgdP/ts7vCGeOgN BolJ3wCcxnyPLogAAlXz3h/1jXMs/RBuxNo4O0znJbvMHph/+56mV9rb1c68pTO988X8 WqcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=nXLVL0Zfwr5b2cSNSBGqIjRDTu/dQz2Uw+zczZKjO90=; b=IdkUGNtw1lgQkgA/SsN1EpIBtFvmbUjQ+0D6UKo+TZ9FjlLiY6xeVifly+kWl+fHQq a2HlKbUdLeL7Wtqa9hkxa3WFJRMuC+BCEAeMhMKb9RZ/wKttlRMAn4oM0X1Cwg0J7CBc +721AvcxloN6ifbqqreWxBh0ldwk1vNcL+oLmDUL1U/oO03wEato+eMQ0jbz+jv9IDxL KqVGTop15IeB/SpH2kAsGrOWd8RMIhJeeJMjk7yKJllqrOMAxoYaIYHDqoKBPCGkfeUh nAAXCNNXv+tHSqvulqPBojoN2U6UblXk3FGBW7mZwyFOeQPgC52GwU6MNy6uK2M2BRF0 vbRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yGPhOnjl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id go18si1706802plb.130.2018.11.11.15.01.04; Sun, 11 Nov 2018 15:01:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yGPhOnjl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389362AbeKLItf (ORCPT + 99 others); Mon, 12 Nov 2018 03:49:35 -0500 Received: from mail.kernel.org ([198.145.29.99]:51248 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390779AbeKLIWh (ORCPT ); Mon, 12 Nov 2018 03:22:37 -0500 Received: from localhost (unknown [206.108.79.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DAEBA21707; Sun, 11 Nov 2018 22:32:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541975560; bh=fA9EofwxM0ydHbs8UthIZJNJAk5Ec/C/SsniGLG76IY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yGPhOnjlRGS3BYKo4dc1QT0NSg0930P7P6YNtnbub0N1tzXw1fVdPr4U2tZrf8c8e pAu9qAGSdCJM2oAxPrszmGVF/KSfIOmasQKvW4dP/dBGvGkvarrgemQgwiCepMGSSF eK9r02aj/HwZh6PRc1VWO/0ENM9ZQBQolQLRBPxM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Juergen Gross Subject: [PATCH 4.14 122/222] xen/pvh: increase early stack size Date: Sun, 11 Nov 2018 14:23:39 -0800 Message-Id: <20181111221658.629803333@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181111221647.665769131@linuxfoundation.org> References: <20181111221647.665769131@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Roger Pau Monne commit 7deecbda3026f5e2a8cc095d7ef7261a920efcf2 upstream. While booting on an AMD EPYC box the stack canary would detect stack overflows when using the current PVH early stack size (256). Switch to using the value defined by BOOT_STACK_SIZE, which prevents the stack overflow. Cc: # 4.11 Signed-off-by: Roger Pau Monné Reviewed-by: Juergen Gross Signed-off-by: Juergen Gross Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/xen-pvh.S | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arch/x86/xen/xen-pvh.S +++ b/arch/x86/xen/xen-pvh.S @@ -178,7 +178,7 @@ canary: .fill 48, 1, 0 early_stack: - .fill 256, 1, 0 + .fill BOOT_STACK_SIZE, 1, 0 early_stack_end: ELFNOTE(Xen, XEN_ELFNOTE_PHYS32_ENTRY,