aboutsummaryrefslogtreecommitdiff
path: root/arch/x86/kernel/head64.c
diff options
context:
space:
mode:
authorKevin Hilman <khilman@linaro.org>2015-08-14 09:31:17 -0700
committerKevin Hilman <khilman@linaro.org>2015-08-14 09:31:17 -0700
commitb7be2a1de3f5c0827a4f8ccb6a18342d9d4dc446 (patch)
tree7761d178103d5b37a2784dd13cb402474a573cfe /arch/x86/kernel/head64.c
parent6285098f212ef8d8f05a69f0e3a7d4f421dd0ed7 (diff)
parent352cb8677f83a6cf2139151578c8c79785d2d4bf (diff)
Merge tag 'v4.1.5' into linux-linaro-lsk-v4.1lsk-v4.1-15.08
This is the 4.1.5 stable release * tag 'v4.1.5': (124 commits) Linux 4.1.5 perf symbols: Store if there is a filter in place xfs: remote attributes need to be considered data xfs: remote attribute headers contain an invalid LSN drm/nouveau/drm/nv04-nv40/instmem: protect access to priv->heap by mutex drm/nouveau: hold mutex when calling nouveau_abi16_fini() drm/nouveau/kms/nv50-: guard against enabling cursor on disabled heads drm/nouveau/fbcon/nv11-: correctly account for ring space usage qla2xxx: kill sessions/log out initiator on RSCN and port down events qla2xxx: fix command initialization in target mode. qla2xxx: Remove msleep in qlt_send_term_exchange qla2xxx: release request queue reservation. qla2xxx: Fix hardware lock/unlock issue causing kernel panic. intel_pstate: Add get_scaling cpu_defaults param to Knights Landing iscsi-target: Fix iser explicit logout TX kthread leak iscsi-target: Fix iscsit_start_kthreads failure OOPs iscsi-target: Fix use-after-free during TPG session shutdown IB/ipoib: Fix CONFIG_INFINIBAND_IPOIB_CM NFS: Fix a memory leak in nfs_do_recoalesce NFSv4: We must set NFS_OPEN_STATE flag in nfs_resync_open_stateid_locked ...
Diffstat (limited to 'arch/x86/kernel/head64.c')
-rw-r--r--arch/x86/kernel/head64.c10
1 files changed, 4 insertions, 6 deletions
diff --git a/arch/x86/kernel/head64.c b/arch/x86/kernel/head64.c
index 5a4668136e98..f129a9af6357 100644
--- a/arch/x86/kernel/head64.c
+++ b/arch/x86/kernel/head64.c
@@ -161,11 +161,12 @@ asmlinkage __visible void __init x86_64_start_kernel(char * real_mode_data)
/* Kill off the identity-map trampoline */
reset_early_page_tables();
- kasan_map_early_shadow(early_level4_pgt);
-
- /* clear bss before set_intr_gate with early_idt_handler */
clear_bss();
+ clear_page(init_level4_pgt);
+
+ kasan_early_init();
+
for (i = 0; i < NUM_EXCEPTION_VECTORS; i++)
set_intr_gate(i, early_idt_handler_array[i]);
load_idt((const struct desc_ptr *)&idt_descr);
@@ -177,12 +178,9 @@ asmlinkage __visible void __init x86_64_start_kernel(char * real_mode_data)
*/
load_ucode_bsp();
- clear_page(init_level4_pgt);
/* set init_level4_pgt kernel high mapping*/
init_level4_pgt[511] = early_level4_pgt[511];
- kasan_map_early_shadow(init_level4_pgt);
-
x86_64_start_reservations(real_mode_data);
}