[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v8 7/9] xen/arm: create shared memory nodes in guest device tree


  • To: Julien Grall <julien@xxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Fri, 9 Sep 2022 09:40:06 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6+GUpoA+0IYWwf1mxytoEU/YggCxr4iM9t5BXeRjwvs=; b=SZTPg9WAgIlC2VXU1HrAfwovmTwfRzr4L3r6nV7zseOFyMoR40RQzOtTkWDlX+HztyX9cPJE2UK7fuNLE9/IWKw9ulzHsQppZ7OAd8tFTMNk4R0Dbf6AA9H2jIfVF3sDMi7MNW1yHsTzpEFDUFDiTUqccanKEpQBZn3UHEjRze5O4bxdyfDUPDODmxggYdfROYmP6FGzhWTmHsoL7sl776UX+BWst+uyynKGDdMEuaxcFRrSl+m4YY11gAW2FRqbaN1S5U0HqgSpQqr2fs54z/1J3TIaqgFyRL8efBIj++vAqEm4/2mZqU3V6qPyw+bgS5QACP204jDvJWFR8T2Q7w==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6+GUpoA+0IYWwf1mxytoEU/YggCxr4iM9t5BXeRjwvs=; b=jFV0qN42ZH6Xg7/vZgeOvoBidhEj1w79UmqhzbT73r7evwsxDVqWBRQ+Lmf+BrH0OGcukGlYWy8+9hwbmi/jSu89jwFMpLbl5gsoxfShwu6egh0QGl4tK7YA2xXbEMXWvHgQ2OtSJ/xNhU1Ey7SFj7FpdlRo/aOFmAOz1ZIcTAiPphjjKhUR5ggs7IyBT72e+g++aJzV2pYw1EbSE6eZ3Psydm1kpMppKrbjTlJsR27AgiUNvmOy1vIuVzmPfc+jKVME6Y4hNqkjArXQlNq78e1j4gndMTX7bXsMOUOE0ndgsbF/g5g+t4suCwKxaos/1535w1wiv/gw/L1f/f3VBQ==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=iPxL6SOvSm2/gU6IU6jNFvS9uBZypQ3sEpL/mZQBhFO7CXNrCVWcWpiQCl1dbSI1X6KnjUi7eIxIu1TdN/nN+g7mgxhEGUxAlm4Hb6eq4huEhRMK2p7stFB+Qf53jqFpU4PLDDAnUN8oWoL5m5WbL967ItiK9jd0hPGbbIELn7DAFpVhrhK/OLC+S4BnHMz3XDv/7m8f50Gn7v1y5pG6VWp5a5xv6Z+oJ3C9JFXBUeArGf2LbwNKs5x83zDop83Jg4Fj0cR5JNNWprV8kts0KkigdmUQU+IF0W8AUbS5lRUHBOUkrLPYxoe1hkaAraYckCQXAW74HboUDWtUL2D1aQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NYigJ89/ELgbP54cu5LVq3V0kOVUNMs2fQMgbvC3O4S8ZGdzixo2k+e+kMq1U7x/EhNMIAW5hiyVmFgtRN6wOiN/sng8F5XCypUNKVnLaYRvI533ERNVPjAxD9ThXrP/smr0XdxOeaUj+4XlGA/46gyjsF+9X5sdudYwiAgapBJVaLOcSNFYlm4PV9wD12B0pYukLhq3htbvAPmOFb/IvulGxFqwmKmBQVFofqjLcoxCPJnI1kiWIbAzStqzd4hC/fbiN13nrwujajL13CnS0CbIbJujK01cOIeYhkfMPR0z7Vcz9TEWr2KKXhPFOhlAqG6mMIeeMuhiriiQTSb/3w==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Penny Zheng <Penny.Zheng@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Wei Chen <Wei.Chen@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Fri, 09 Sep 2022 09:40:23 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHYw4q6erckyWfXI0qMZ5bjaFqTVq3WBmMAgACy1QCAABxvAIAAA4uA
  • Thread-topic: [PATCH v8 7/9] xen/arm: create shared memory nodes in guest device tree

Hi Julien,

> On 9 Sep 2022, at 10:27, Julien Grall <julien@xxxxxxx> wrote:
> 
> Hi,
> 
> On 09/09/2022 08:45, Bertrand Marquis wrote:
>>> 
>>> It should be:
>>> 
>>> /*
>>> * TODO:
>>> *
>>> 
>>> I think this is good to go. The two minor style issues could be fixed on
>>> commit. I haven't committed to give Julien & Bertrand another chance to
>>> have a look.
>> I think that it is ok to fix those on commit and I am ok with the rest so:
>> Reviewed-by: Bertrand Marquis <bertrand.marquis@xxxxxxx>
> 
> This series doesn't build without !CONFIG_STATIC_SHM:
> 
>  UPD     include/xen/compile.h
> Xen 4.17-unstable
> make[1]: Nothing to be done for `include'.
> make[1]: `arch/arm/include/asm/asm-offsets.h' is up to date.
>  CC      common/version.o
>  LD      common/built_in.o
>  CC      arch/arm/domain_build.o
> arch/arm/domain_build.c: In function ‘make_shm_memory_node’:
> arch/arm/domain_build.c:1445:1: error: no return statement in function 
> returning non-void [-Werror=return-type]
> }
> ^
> cc1: all warnings being treated as errors
> make[2]: *** [arch/arm/domain_build.o] Error 1
> make[1]: *** [arch/arm] Error 2
> make: *** [xen] Error 2
> 
> This is because...
> 
>>>> +         * - xen,offset: (borrower VMs only)
>>>> +         *   64 bit integer offset within the owner virtual machine's 
>>>> shared
>>>> +         *   memory region used for the mapping in the borrower VM
>>>> +         */
>>>> +        res = fdt_property_u64(fdt, "xen,offset", 0);
>>>> +        if ( res )
>>>> +            return res;
>>>> +
>>>> +        res = fdt_end_node(fdt);
>>>> +        if ( res )
>>>> +            return res;
>>>> +    }
>>>> +
>>>> +    return res;
>>>> +}
>>>> +#else
>>>> +static int __init make_shm_memory_node(const struct domain *d,
>>>> +                                       void *fdt,
>>>> +                                       int addrcells, int sizecells,
>>>> +                                       const struct meminfo *mem)
>>>> +{
>>>> +    ASSERT_UNREACHABLE();
> 
> ... there is a missing 'return -ENOTSUPP' here. While this is simple enough 
> to fix, this indicates to me that this version was not tested with 
> !CONFIG_STATIC_SHM.
> 
> As this is the default option, I will not commit until I get confirmation 
> that some smoke was done.

This is a case our internal CI should have gone through.
Let me check and come back to you.

Regards
Bertrand

> 
> Cheers,
> 
> -- 
> Julien Grall


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.