Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3478070imu; Sun, 11 Nov 2018 16:01:49 -0800 (PST) X-Google-Smtp-Source: AJdET5eEEYLcPWOf5jWFnl9wt04ypuPxyA4wtFDiAWkC4iyzyY4AAUY31JSv/gvRGJWZdJ1ggcve X-Received: by 2002:a17:902:2f84:: with SMTP id t4-v6mr17630026plb.239.1541980909889; Sun, 11 Nov 2018 16:01:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541980909; cv=none; d=google.com; s=arc-20160816; b=pfyRBC/Rt6F045ln8cpfItWuvRGHit3fbMaymryAoBymoQ0jGDR4feeuzUZdiieHRq bm+4O4gpu7PSWE8EcJX/a5z7BP51uxku3s1eF86Nlc0PNYlwNxosAv0J9mWVHz15kLoI PzdsvioPSlisPDlgAQGjiKPfTVpTgTm5th7w0dFWxFQZ/YJu5cTW7i7fqKRD71JnlN8A E4+NdgDRyVg+jjMu/+F2ActJvIPSJ0X/oJqrxuSKNdVz7A0IPrK5OmI5tOkWM+HqHw5X KnMaFU119XrnpeOIOUb8oBmfu0DDx4wtZsZovcArLXlRbuLjhvzxqBMyY1r14La9Fgpn pe5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=z2lNoqd5Qj5qZOLluoh3hQm76xNYK+/HNeYapBnwC4c=; b=YUfrKISizhawCUk4Eh/Lmx5cU9anXQ9Umm2DOQ6vO5CvrP6zVtAvGWJupoRw62/21p G3I61ktkkqUAt6hvkD784CCFRTS5weLnkVGJfVOKZIZ0pgqv7ic4yIx0K4k09QjSMpLj 5f7dMqym1y9pxWxK1I5jMpm4g8zfBy6r1DLnG5JwmEhl+GwL1nLN3r252mcKrL0BwZb5 alM6aFJwGkrcyPIToUD30ViPD7mbQUu8r2wwah+OEIuSp8btOEz3Fq7EydaW6YhjvX9w 0AG1f0aYS3/EwiFYlbMD3eGh0WdGijn4ezIVMazIhLIJ0bhRMf0E/owaOvlUFWK4aBUH 8oOQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qTgH4gPl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 193si14884238pgc.220.2018.11.11.16.01.34; Sun, 11 Nov 2018 16:01:49 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qTgH4gPl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732448AbeKLJvj (ORCPT + 99 others); Mon, 12 Nov 2018 04:51:39 -0500 Received: from mail.kernel.org ([198.145.29.99]:35400 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732069AbeKLIR6 (ORCPT ); Mon, 12 Nov 2018 03:17:58 -0500 Received: from localhost (unknown [206.108.79.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A753921707; Sun, 11 Nov 2018 22:28:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541975282; bh=37ORcaW1kBhL0udDflmXv9MpU3Tm/+EWoyPbHS5r+lA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qTgH4gPlcI49AddUizstcF3hC+sdnbgaJ3+At8/kJSyMWefLReKThmHHvUSfNFFZt WSHES6UO8AWH7YPX9RCGb0krBgSmGe/kXkIQr4nV1W0vKwsZdL6Mk9/4E4SFFR3hdP dOX9Kf6Bkr/1i4X4p5XqVQq1iraOh9U79PyQUoNg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Juergen Gross Subject: [PATCH 4.19 205/361] xen/pvh: increase early stack size Date: Sun, 11 Nov 2018 14:19:12 -0800 Message-Id: <20181111221649.005556483@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181111221619.915519183@linuxfoundation.org> References: <20181111221619.915519183@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Roger Pau Monne commit 7deecbda3026f5e2a8cc095d7ef7261a920efcf2 upstream. While booting on an AMD EPYC box the stack canary would detect stack overflows when using the current PVH early stack size (256). Switch to using the value defined by BOOT_STACK_SIZE, which prevents the stack overflow. Cc: # 4.11 Signed-off-by: Roger Pau Monné Reviewed-by: Juergen Gross Signed-off-by: Juergen Gross Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/xen-pvh.S | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arch/x86/xen/xen-pvh.S +++ b/arch/x86/xen/xen-pvh.S @@ -181,7 +181,7 @@ canary: .fill 48, 1, 0 early_stack: - .fill 256, 1, 0 + .fill BOOT_STACK_SIZE, 1, 0 early_stack_end: ELFNOTE(Xen, XEN_ELFNOTE_PHYS32_ENTRY,