[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 2/2] xen/flask: Wire up XEN_DOMCTL_{get,set}_paging_mempool_size


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
  • Date: Mon, 21 Nov 2022 11:07:01 -0500
  • Arc-authentication-results: i=1; mx.zohomail.com; dkim=pass header.i=apertussolutions.com; spf=pass smtp.mailfrom=dpsmith@xxxxxxxxxxxxxxxxxxxx; dmarc=pass header.from=<dpsmith@xxxxxxxxxxxxxxxxxxxx>
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1669046824; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; bh=tZyRZ/fk8LIzCTdf9SXGL+KC5e8X2bBuohDXP+YgN18=; b=bWH8E4vdpfPDKKmzu+w4UgpMHjfjfyhFQTuk0gga7i6ZkGKrWD8zu6UgHdlediyebzSmFuHcz/FI64Nhhe2huFouqILUIxueeQfMUlo8RNNWQFtKuq2LtTJ6TVpYiWnBNL+mVbIm7cAXGOPZZAfy+3+js0zUIXu3wUIsK2v1SlM=
  • Arc-seal: i=1; a=rsa-sha256; t=1669046824; cv=none; d=zohomail.com; s=zohoarc; b=XsxlZuBDXKq5xx8vLfdfl6bkLpNqINiuxC6ig7fHm8Bd5MkobXYpivv0CIGtsud89sMFTZRX2VOqz2H3DCN0mG8Tfi4Ed4TYQfmvJcfJrtX0FIvymUjWTDo0TzLv/n2PFOfK3800H/S5DjXbtQPq0LBB/jdcn8a9MMpC9jlORaE=
  • Cc: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>, Jason Andryuk <jandryuk@xxxxxxxxx>, Henry Wang <Henry.Wang@xxxxxxx>
  • Delivery-date: Mon, 21 Nov 2022 16:07:36 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>


On 11/21/22 09:37, Andrew Cooper wrote:
These were overlooked in the original patch, and noticed by OSSTest which does
run some Flask tests.

Fixes: 22b20bd98c02 ("xen: Introduce non-broken hypercalls for the paging mempool 
size")
Suggested-by: Daniel Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
---
CC: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
CC: Daniel Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>
CC: Jason Andryuk <jandryuk@xxxxxxxxx>
CC: Henry Wang <Henry.Wang@xxxxxxx>

It should be noted that the original XSA-409 fix broke Flask on ARM but no
testing noticed.  c/s 7c3bbd940dd8 ("xen/arm, libxl: Revert
XEN_DOMCTL_shadow_op; use p2m mempool hypercalls") "fixes" the original
breakage and introduced this breakage instead.

For 4.17.  It's a fix for an issue that OSSTest is currently blocking as a
regression.

Acked-by: Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.