diff options
author | Raul E Rangel <rrangel@chromium.org> | 2018-06-12 10:43:09 -0600 |
---|---|---|
committer | Patrick Georgi <pgeorgi@google.com> | 2018-06-14 09:29:04 +0000 |
commit | 846b4941fee842bc359fa2b611cf0c3fc4f158b2 (patch) | |
tree | f347974561d31ee8f6e1573e072a778621ab84ba /src/security | |
parent | d3b839331058bfecab84abdb5836d2d3ef9654fc (diff) |
stoneyridge: Increase SMM stack size to 2K
GSMI Set Event Log is taking more than 1K in stack. This causes the
stack to overflow into the adjacent stack. This has the side effect of
causing any CPU waiting for the SMI handler to complete to crash when
the lock is unlocked because the return pointer has been smashed.
BUG=b:80539294
TEST=built on grunt and tested by running `halt` from the OS.
Change-Id: Ib170c7d03909ef3d20831726b285178a75007b06
Signed-off-by: Raul E Rangel <rrangel@chromium.org>
Reviewed-on: https://review.coreboot.org/27033
Reviewed-by: Martin Roth <martinroth@google.com>
Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Diffstat (limited to 'src/security')
0 files changed, 0 insertions, 0 deletions