Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3441392imu; Sun, 11 Nov 2018 15:10:20 -0800 (PST) X-Google-Smtp-Source: AJdET5eOLXTUktOom9G9gxdBBT9k4hjoTs42A+Esyyq/CRO9dDRWw54T01/30ndRtrBdon/1CIet X-Received: by 2002:a17:902:9004:: with SMTP id a4-v6mr17595438plp.334.1541977820277; Sun, 11 Nov 2018 15:10:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541977820; cv=none; d=google.com; s=arc-20160816; b=HGq2bL559cNWDzCnvj1dPE7isE5eAhyUXxKIUFCMUdWiZg2qzybe+orBl5b7BoDuPf LnIyCMRV3Q5AWBiAKM3GB4IYM39qKs/TewlqXcslypw9gYZuUaD7T/SvUYZ9UFkscmkx gIIIv8XIRfqA08B9eTxPymblVSGmkVT6eSiaczJEfDG+54N6hL/U9TIyy6b+COjKk5AI 5UWt7dQk6cE//CLHqY8xXfeFCUxY4Yj4an7Yy/UUkfXa21CkqFhEAqYPECVvy/xfZYmh kV+XcTedWcohpKInLEZDRV3KV0ib+Li0zib86SHJPdClWi9ubNt5Ef28allaoGzjKLId 8B6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pcBbO0L0PZ/4trSTC3+Qx8GtHSVV/e6US7hZjZbQ0xU=; b=H1RP/Eu1SQGg+LusjBQp0PggxPHVaEui/iM4vkV4b87rjRs8cLCVejAffgPfAlvIVN ky2+z3HKoi2+yMj0bvKlTsCQZE91nHI8r6TyPI7gAqCQ2kgDjwl2vo56gqHWewkUxxCZ LVhC3ZJmBdK+hPrhIXT2elnAj4HGUxEXt9VvBzRyU5Fg8nVAVQ+7e76KyWm6hLpaO5J3 fYJTKoLR9u+ZbdnvJ+0F0CVj/p+0eAcEJD0hFr27wsC1l87YlG98SJmxLK3P4oGmVLsJ COcuOAmEiEKT1B/4txYJ3n3sBGOUuLqA89XF0cpvukBe21bn+oobCloHA0Yq4SUUZ6nb rhVg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=r7sMZuMU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w1-v6si17273416plk.317.2018.11.11.15.10.05; Sun, 11 Nov 2018 15:10:20 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=r7sMZuMU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390269AbeKLI7y (ORCPT + 99 others); Mon, 12 Nov 2018 03:59:54 -0500 Received: from mail.kernel.org ([198.145.29.99]:50044 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390204AbeKLIWB (ORCPT ); Mon, 12 Nov 2018 03:22:01 -0500 Received: from localhost (unknown [206.108.79.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 60EC421582; Sun, 11 Nov 2018 22:32:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541975524; bh=wHu3QUMFPhCr7Zd7P/4p7jWOwhcvkMOjXCZ+sngCSI4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=r7sMZuMUlZZ/hsNQMYoTVF1gKl+mS3BwEH905e8SUzYYuf7KSBbcixTV+mryclVZ/ 29V0Cx6gH58EL0KEWUi+DXz8vZmD8AbnU1g4pJ++siw77MvYkLMbwpzUGL+2h4AKgV Q3TTIjAtZoMvg7tInykzG7/dJe2wecsO9sTTg0iI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Juergen Gross , Linus Torvalds , Peter Zijlstra , Thomas Gleixner , boris.ostrovsky@oracle.com, bp@alien8.de, corbet@lwn.net, linux-doc@vger.kernel.org, xen-devel@lists.xenproject.org, Ingo Molnar Subject: [PATCH 4.14 020/222] x86/xen: Fix boot loader version reported for PVH guests Date: Sun, 11 Nov 2018 14:21:57 -0800 Message-Id: <20181111221649.947741388@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181111221647.665769131@linuxfoundation.org> References: <20181111221647.665769131@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Juergen Gross commit 357d291ce035d1b757568058f3c9898c60d125b1 upstream. The boot loader version reported via sysfs is wrong in case of the kernel being booted via the Xen PVH boot entry. it should be 2.12 (0x020c), but it is reported to be 2.18 (0x0212). As the current way to set the version is error prone use the more readable variant (2 << 8) | 12. Signed-off-by: Juergen Gross Cc: # 4.12 Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: boris.ostrovsky@oracle.com Cc: bp@alien8.de Cc: corbet@lwn.net Cc: linux-doc@vger.kernel.org Cc: xen-devel@lists.xenproject.org Link: http://lkml.kernel.org/r/20181010061456.22238-2-jgross@suse.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/enlighten_pvh.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arch/x86/xen/enlighten_pvh.c +++ b/arch/x86/xen/enlighten_pvh.c @@ -76,7 +76,7 @@ static void __init init_pvh_bootparams(v * Version 2.12 supports Xen entry point but we will use default x86/PC * environment (i.e. hardware_subarch 0). */ - pvh_bootparams.hdr.version = 0x212; + pvh_bootparams.hdr.version = (2 << 8) | 12; pvh_bootparams.hdr.type_of_loader = (9 << 4) | 0; /* Xen loader */ }