Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751196AbdGYJuU (ORCPT ); Tue, 25 Jul 2017 05:50:20 -0400 Received: from mx2.suse.de ([195.135.220.15]:34218 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1750803AbdGYJuT (ORCPT ); Tue, 25 Jul 2017 05:50:19 -0400 From: Juergen Gross To: linux-kernel@vger.kernel.org, xen-devel@lists.xenproject.org, x86@kernel.org Cc: boris.ostrovsky@oracle.com, hpa@zytor.com, tglx@linutronix.de, mingo@redhat.com, Juergen Gross Subject: [PATCH 0/3] fix xen hvm guest with kaslr enabled Date: Tue, 25 Jul 2017 11:50:10 +0200 Message-Id: <20170725095013.2939-1-jgross@suse.com> X-Mailer: git-send-email 2.12.3 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 583 Lines: 16 This patch series fixes a regression introduced in 4.13-rc1: A Xen HVM guest with KASLR enabled wouldn't boot any longer due to the usage of __va() before kernel_randomize_memory() was called. Juergen Gross (3): x86: provide an init_mem_mapping hypervisor hook xen: split up xen_hvm_init_shared_info() xen: fix hvm guest with kaslr enabled arch/x86/include/asm/hypervisor.h | 10 +++++++ arch/x86/mm/init.c | 3 ++ arch/x86/xen/enlighten_hvm.c | 59 ++++++++++++++++++++++++--------------- 3 files changed, 50 insertions(+), 22 deletions(-) -- 2.12.3