[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] xen/public: partially revert commit 7c7f7e8fba01


  • To: Juergen Gross <jgross@xxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Mon, 7 Feb 2022 13:46:38 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JwlBKYbv/zKdEzC/6AL8tV37IW1fDoFnfkUJOLWzqDM=; b=lE3Cfe9LhqOxw/c5FONPmR0fOUwqmFaU7ENoe+2+OEBT/+TkZpEaujaLC6JUBNw9ONFwvTeY8DP6yC4qJz0pW3ueSziTiSAvaiAs9qty3V3dVgaKbPLEPuhWiZl/Hbxy2aBDRJHN7skCopLtPInn0TNzYtpGtdtk4d7an4SeopSD75PiZqGMS/Rd2ETvVb9JxWZBtKxTrCyzCClpzKQU+ox/iotD0pf0/cnek2xK3oPmPQdhGa36L01dBXNcPTmM1tEloJcS0URKnPeeGgPOHtxsCoT7sLJ+GSDHrOmV6x+eRnaPYa9zRE0qa6FeJbhA1FcM1TE2t/RRauN8AjFQOA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kZnDc2br8dl6DIP7ZlRdHT7vVlvnZfrMaaEq+COyxWBIltDmyf3cvP/BhpVRzedzqDN6I3aQ/nVFgOGKHuyOSgSL5xDdlSb0yV4J7bGPBdQmfVVd9kCXA3SXOrQFwM3vjuyu6L2qLqS5WKL9NzwuU2VJYuVkkPoGuN7CvPDAmgytewXSju9bMKvuxqtNubxAdsTe5ljjL6/3K6R0UfsTKybi2ye8QzRdtu4wcBziGWsiKTHI8NtCw7x4wGwHS3rBSL3PTw9i0nq+KhKiab+7s5ULzWxUKObD5Ec9rhXB1Rln8vIH7/vFTnYSWswDzhgYks8kpRtOr7W2k+OREH0G1A==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Mon, 07 Feb 2022 12:46:48 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 07.02.2022 12:00, Juergen Gross wrote:
> On 07.02.22 11:46, Jan Beulich wrote:
>> On 07.02.2022 11:36, Juergen Gross wrote:
>>> --- a/xen/include/public/memory.h
>>> +++ b/xen/include/public/memory.h
>>> @@ -662,7 +662,17 @@ struct xen_mem_acquire_resource {
>>>        * two calls.
>>>        */
>>>       uint32_t nr_frames;
>>> -    uint32_t pad;
>>> +
>>> +    /*
>>> +     * OUT - Must be zero on entry. On return this may contain a bitwise
>>> +     *       OR of the following values.
>>> +     */
>>> +    uint32_t flags;
>>> +
>>> +    /* No longer supported - will be never set */
>>> +#define _XENMEM_rsrc_acq_caller_owned 0
>>> +#define XENMEM_rsrc_acq_caller_owned (1u << _XENMEM_rsrc_acq_caller_owned)
>>
>> I think this goes too far: Neither do we want to re-introduce the
>> #define-s, nor should we re-fix the purpose of the padding field
>> to be OUT (only). All we need to make sure is that the field
>> coming in as zero won't get responded to by setting bit 0 of it.
>> Imo this can only reasonably be done by way of adding a comment.
>> This comment may, in turn, mention XENMEM_rsrc_acq_caller_owned
>> of course.
> 
> The kernel could be changed to no longer use that #define before
> updating the header from Xen, but are we really sure there are no
> other users, too?

Pretty sure. And I think in this case it's better to break the build
of consumers (so we're sure they'd notice, assuming they import the
header directly in the first place). It's rather an exceptional case
after all.

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.