Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757610AbdIIQAy (ORCPT ); Sat, 9 Sep 2017 12:00:54 -0400 Received: from mail-bn3nam01on0097.outbound.protection.outlook.com ([104.47.33.97]:10873 "EHLO NAM01-BN3-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753683AbdIIQAx (ORCPT ); Sat, 9 Sep 2017 12:00:53 -0400 From: KY Srinivasan To: Dan Carpenter CC: "x86@kernel.org" , "gregkh@linuxfoundation.org" , "linux-kernel@vger.kernel.org" , "devel@linuxdriverproject.org" , "olaf@aepfle.de" , "apw@canonical.com" , "jasowang@redhat.com" , "tglx@linutronix.de" , "hpa@zytor.com" , "mingo@kernel.org" Subject: RE: [PATCH 1/1] x86/hyper-V: Allocate the IDT entry early in boot Thread-Topic: [PATCH 1/1] x86/hyper-V: Allocate the IDT entry early in boot Thread-Index: AQHTKPio6J/WpSIIyE2MnS3jK+rNM6KsZL4AgABSZkA= Date: Sat, 9 Sep 2017 16:00:51 +0000 Message-ID: References: <20170908231557.2419-1-kys@exchange.microsoft.com> <20170909105428.osqbcf4gnibobpse@mwanda> In-Reply-To: <20170909105428.osqbcf4gnibobpse@mwanda> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Ref=https://api.informationprotection.azure.com/api/72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=kys@microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2017-09-09T09:00:50.5710572-07:00; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic; Sensitivity=General x-originating-ip: [2601:600:a27f:e5c0:6180:7588:15ee:f77c] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;DM5PR21MB0282;6:cGzDgOb3Wc8u/nTsVB3UNFom7tznn+bZi31z5setr7tjPdZe9w3NKVp42XZ+VxTV9U2HGalAG+DwnPWZLkJ4UByK6CEpzCe/7Fnaf8WUg/df0+W+tc4lC4eKDtaT6bJexnv4Cw29/3PSEfS1Q2kkZSrmZmY+GA3TVfYlH6jOy0SbiPleDhc7Qkyt7UvBUZLIdtjP+nbKp3W6kXkXVmLbQi+JdlDJtsgOSl8utc56cZswp6cRNoIHw90mfI/rl8oYbAkXEIK5KcIFe+c0CviprtWmj7ydIsWix2h9O7cTECeXzsfa28gSi8NcIspknMhSexeXA9XIg516C7xA5V7BGQ==;5:S9++0DV9qgSSy+DFj8pJ74/oRsECxwlhM3SQzwr8MUBCRFrFOY+F0wOa0esKm+8GcQbjH6g7+yG6x4dFfIFpg24kJsEp8x+TsTe29gwx3+Su3dHFK5XI3iRhTerioJ1a7LKdz4v4DVxGkKsUhYjo4g==;24:SOh4QmtPFPEKK45bpmFbY4dpiLBzm9Pmyaegnm7Za/kQU/DFvn/MzaJJGU0PJxyoJjDqzCByIn89Nqq6C+smrnVSclnfYF/4gcb/8RvPas8=;7:16i7FZMK7YadXKsL4ydA3P9dQa+xgOmwCBjGnOaBEdxhRqvpIDAckJ3pAbcVCiPb73HioErVxDdHJynLkASphdQ+0Hp2VKH9EI3AMHHnSueKmsISRY8g6FlGySqf6YpMmCtlCluw4MhetI3ESN8dDQy58jtbgkasM75c4Am2zOE4AfcrqMSr/8pL0x6mVfjP+Izs6peWVkkv8OHUvLn+EFIOxW7JOd0ThbnohRExXik= x-ms-exchange-antispam-srfa-diagnostics: SOS; x-ms-office365-filtering-correlation-id: 6f846494-c8d1-4f77-1fc9-08d4f79bf19c x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(48565401081)(300000503095)(300135400095)(2017052603199)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);SRVR:DM5PR21MB0282; x-ms-traffictypediagnostic: DM5PR21MB0282: authentication-results: spf=none (sender IP is ) smtp.mailfrom=kys@microsoft.com; x-exchange-antispam-report-test: UriScan:(89211679590171)(9452136761055)(140211028294663)(146099531331640)(198206253151910); x-microsoft-antispam-prvs: x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(61425038)(6040450)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(10201501046)(100000703101)(100105400095)(6055026)(61426038)(61427038)(6041248)(20161123564025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123555025)(20161123560025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:DM5PR21MB0282;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:DM5PR21MB0282; x-forefront-prvs: 0425A67DEF x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(6009001)(39860400002)(47760400005)(377454003)(199003)(189002)(54534003)(13464003)(24454002)(8936002)(4326008)(81156014)(54906002)(55016002)(99286003)(81166006)(53546010)(76176999)(54356999)(2900100001)(8990500004)(102836003)(6246003)(10290500003)(305945005)(74316002)(478600001)(53936002)(97736004)(22452003)(9686003)(8676002)(25786009)(101416001)(7696004)(68736007)(6506006)(7416002)(2950100002)(6916009)(189998001)(77096006)(3280700002)(6436002)(10090500001)(229853002)(105586002)(5660300001)(110136004)(50986999)(7736002)(6116002)(86362001)(14454004)(106356001)(2906002)(33656002)(86612001)(3660700001);DIR:OUT;SFP:1102;SCL:1;SRVR:DM5PR21MB0282;H:DM5PR21MB0476.namprd21.prod.outlook.com;FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Sep 2017 16:00:51.0989 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR21MB0282 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by nfs id v89G13Xe031061 Content-Length: 1111 Lines: 31 > -----Original Message----- > From: Dan Carpenter [mailto:dan.carpenter@oracle.com] > Sent: Saturday, September 9, 2017 4:04 AM > To: KY Srinivasan > Cc: x86@kernel.org; gregkh@linuxfoundation.org; linux- > kernel@vger.kernel.org; devel@linuxdriverproject.org; olaf@aepfle.de; > apw@canonical.com; jasowang@redhat.com; tglx@linutronix.de; > hpa@zytor.com; mingo@kernel.org > Subject: Re: [PATCH 1/1] x86/hyper-V: Allocate the IDT entry early in boot > > On Fri, Sep 08, 2017 at 04:15:57PM -0700, kys@exchange.microsoft.com > wrote: > > From: "K. Y. Srinivasan" > > > > Allocate the hypervisor callback IDT entry early in the boot sequence. > > > > I'm guessing this fixes a NULL dereference or something? The changelog > doesn't really say why we are doing this. The changelog does say what we are doing - allocating the IDT entry early in the boot sequence. The current code would allocate the entry as part of registering the handler when vmbus driver loaded and this caused a problem for the cleanup Thomas had implemented. K. Y > > regards, > dan carpenter