Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp536678ybj; Thu, 7 May 2020 01:33:13 -0700 (PDT) X-Google-Smtp-Source: APiQypIE3IbKQ8koD4s28Jm6WTv5S+WvBpbWXb5ykcwkrdxnqsXByOSl7AP/nT+iKxb7N4OZzE0s X-Received: by 2002:a05:6402:b4e:: with SMTP id bx14mr10836722edb.1.1588840393019; Thu, 07 May 2020 01:33:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588840393; cv=none; d=google.com; s=arc-20160816; b=gWS3POpGXYLEFB7saXgKD1w/HFUwupwC6bRkrTEYAinZdJLw4A7ufB3wxkaMJ+UeAD kht1Lh/B5a13qteWS6XavQzmX3j47FRdBep/LEfV5r4QZa6nf0h/Daz1IApEHsTRB3ez AwFUz3gpGbvNI70LpIVpindHKnCykh7SsiYr470YwYFnRMiiUcdyFnVrNhaC8e+HXipq ueEd1LYzlMvOcdUSsTUtBvteU1kHoV2jQ2JdyWrcV2aPPmrBXzJH1dbGiOrMDRI6M7yV EgDbGMyEtHizricRNzKaQ0w2N6kLYzh59hseocolCipuzlVCG82epPpLUBIbQ3NturoE V1xA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from; bh=oKkr/TfOeZHdCC8goS4+ITfgJmCKEn0zq0oyN+v27Sc=; b=ZtpSX1VzwCMFroGAuawroiyOVZuwwTpMfmQyYQRmMwM6cMmB0t0NsqoA4llDXJXxj/ /xAmwD4ed8vQPRsAUXC/odVDBssPC3e4RczsexcqPdn9nhlGhbnCTUwUh5dl9HDkQTsE qkXm1CU0OR1zNxohqFPIL2ZZ2xQQOxSkWYfWzssetXYWZgs+ZI3lC4KA9q++vqANRxQ9 wGQIMCNHKn4/k9YAm6TfluMI9QWCOJ0aTL1F9JOHRkmGKdv819A9piASbYO5Fm4d12nJ 6rrPRfaHTXKSgeToxxQiztznfqokG3nc3XskWdVAmQZnbWR5dERhqqWDac95WWt/elIB jQWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r21si2909178eju.300.2020.05.07.01.32.49; Thu, 07 May 2020 01:33:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726533AbgEGIar (ORCPT + 99 others); Thu, 7 May 2020 04:30:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49474 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1725809AbgEGIaq (ORCPT ); Thu, 7 May 2020 04:30:46 -0400 Received: from Galois.linutronix.de (Galois.linutronix.de [IPv6:2a0a:51c0:0:12e:550::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E6ED8C061A10 for ; Thu, 7 May 2020 01:30:45 -0700 (PDT) Received: from p5de0bf0b.dip0.t-ipconnect.de ([93.224.191.11] helo=nanos.tec.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1jWbuw-0004Df-NG; Thu, 07 May 2020 10:30:06 +0200 Received: by nanos.tec.linutronix.de (Postfix, from userid 1000) id 91F24102652; Thu, 7 May 2020 10:30:05 +0200 (CEST) From: Thomas Gleixner To: Boris Ostrovsky , LKML Cc: x86@kernel.org, "Paul E. McKenney" , Andy Lutomirski , Alexandre Chartre , Frederic Weisbecker , Paolo Bonzini , Sean Christopherson , Masami Hiramatsu , Petr Mladek , Steven Rostedt , Joel Fernandes , Juergen Gross , Brian Gerst , Mathieu Desnoyers , Josh Poimboeuf , Will Deacon Subject: Re: [patch V4 part 5 05/31] x86/entry: Switch XEN/PV hypercall entry to IDTENTRY In-Reply-To: <5418e98e-b293-bff3-2c74-c7f932c09c55@oracle.com> References: <20200505135341.730586321@linutronix.de> <20200505135828.592598658@linutronix.de> <5418e98e-b293-bff3-2c74-c7f932c09c55@oracle.com> Date: Thu, 07 May 2020 10:30:05 +0200 Message-ID: <874kssjgfm.fsf@nanos.tec.linutronix.de> MIME-Version: 1.0 Content-Type: text/plain X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Boris Ostrovsky writes: >> - if (register_callback(CALLBACKTYPE_event, xen_hypervisor_callback) || >> + if (register_callback(CALLBACKTYPE_event, >> + asm_exc_xen_hypervisor_callback) || > > > This ... > > >> register_callback(CALLBACKTYPE_failsafe, xen_failsafe_callback)) >> BUG(); ... >> @@ -347,7 +348,7 @@ cpu_initialize_context(unsigned int cpu, >> ctxt->gs_base_kernel = per_cpu_offset(cpu); >> #endif >> ctxt->event_callback_eip = >> - (unsigned long)xen_hypervisor_callback; >> + (unsigned long)asm_exc_xen_hypervisor_callback; > > > ... and this should be xen_asm_exc_xen_hypervisor_callback (we need to > pop %rcx and %r11). > > > And then Xen PV guest boots. Ooops. Thanks for tracking this down!