linux_dsm_epyc7002/arch/x86/xen
Juergen Gross 4ca83dcf4e xen: fix hvm guest with kaslr enabled
A Xen HVM guest running with KASLR enabled will die rather soon today
because the shared info page mapping is using va() too early. This was
introduced by commit a5d5f328b0 ("xen:
allocate page for shared info page from low memory").

In order to fix this use early_memremap() to get a temporary virtual
address for shared info until va() can be used safely.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Acked-by: Ingo Molnar <mingo@kernel.org>
Signed-off-by: Juergen Gross <jgross@suse.com>
2017-08-11 15:50:26 +02:00
..
apic.c
debugfs.c
debugfs.h
efi.c
enlighten_hvm.c xen: fix hvm guest with kaslr enabled 2017-08-11 15:50:26 +02:00
enlighten_pv.c
enlighten_pvh.c
enlighten.c
grant-table.c
irq.c
Kconfig
Makefile
mmu_hvm.c
mmu_pv.c kexec: move vmcoreinfo out of the kernel's .bss section 2017-07-12 16:25:59 -07:00
mmu.c
mmu.h
multicalls.c
multicalls.h
p2m.c
pci-swiotlb-xen.c
platform-pci-unplug.c
pmu.c
pmu.h
setup.c
smp_hvm.c
smp_pv.c xen/x86: fix cpu hotplug 2017-07-23 08:13:11 +02:00
smp.c
smp.h
spinlock.c
suspend_hvm.c
suspend_pv.c
suspend.c
time.c xen/x86: Don't BUG on CPU0 offlining 2017-07-23 08:09:24 +02:00
trace.c
vdso.h
vga.c
xen-asm_32.S
xen-asm_64.S
xen-asm.h
xen-asm.S
xen-head.S
xen-ops.h
xen-pvh.S