[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Policy: A release acks for the release manager's patches (was Re: [PATCH v5 2/2] xen/arm: p2m: Populate pages for GICv2 mapping in p2m_init())


  • To: George Dunlap <dunlapg@xxxxxxxxx>, Henry Wang <Henry.Wang@xxxxxxx>
  • From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
  • Date: Wed, 19 Oct 2022 20:09:43 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=f/IRuNciZO2iCUAHCt/9LQ3hJ9mpBNMdmcJrw49+R8c=; b=Mx3Tq8ZLv/eq2KZ8G6s9m2AKzYxhWLzkvWhQFidQ0vngeuE+FE2cGCPkzSskoWYgoDpWgSBmPnI6r+AVjAKslQc78MR60auS6CTGESSHxven3R+eVB+zWXZ1ZKMJa7UFs3zQEPYVIEtiRkRz0GeVBrSoZ+oSPXloKEC+hVege3ddM9GfWRZDwsPOyT6ls4/VDtgqt2Kielb9ZtZQ+HqfNoz39Fp85nTOcs9l9+9imAdnOzf2ZUOU1FmHlEyOOZIgS+VpZ467YnUJK4oK84MqGx3YOglEh8ac2xxi7sDpxtyg0fyAtqc7Wa4VByHcnhS7003gAtkkuIfVYJCVfXdlpg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cvXuaKfPFqXGeY1fYYsIteseqMsiECZt609cc5BGLW19lxhBrpkGsCbqr0bagHgt3IERZSLt8SfCTyFD/tz8CaAt6ZT/+ch9Pv74YUI1VLG9IqBYlWrAS8eHM1PrFE833ImI2AXf/0/4vfqnRzWjp7OmV2eoNNd7w88gyTnfxi5k7u3Ykf/mXDffBcf4WicyBcSXQGm7JZrdyCZEyy6zOL8J7ivV4NtvGwMo1nFsswbgyk0JmkVm54Kobzzp7Xi8ZjMlsrk9DFzojFihFqZrbLI5HXF+/BO4zlOCTfRiHj3pVb8P2uLJI0YTusb3tktf01SNLTM026Oz0BOBb36gkQ==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, George Dunlap <George.Dunlap@xxxxxxxxxx>
  • Delivery-date: Wed, 19 Oct 2022 20:10:18 +0000
  • Ironport-data: A9a23:JYshzas6HDKeN2CgfdmC9oQ7mOfnVNlfMUV32f8akzHdYApBsoF/q tZmKT/QP66OZzDze9F1Ydvgp00DupOBxtA1SQA6qXhmRixD+JbJXdiXEBz9bniYRiHhoOCLz O1FM4Wdc5pkJpP4jk3wWlQ0hSAkjclkfpKlVKiefHgZqTZMEE8JkQhkl/MynrlmiN24BxLlk d7pqojUNUTNNwRcawr40Ire7kIy1BjOkGlA5AZnPaka5AS2e0Q9V/rzG4ngdxMUfaEMdgKKb 76r5K20+Grf4yAsBruN+losWhRXKlJ6FVHmZkt+A8BOsDAbzsAB+v9T2M4nQVVWk120c+VZk 72hg3ASpTABZcUgkMxFO/VR/roX0aduoNcrKlDn2SCfItGvn9IBDJyCAWlvVbD09NqbDklXz MYcLQ0GRyu8iv6J5+ydFNFdmsgaeZyD0IM34hmMzBn/JNN/GNXpZfWP4tVVmjAtmspJAPDSI dIDbiZiZwjBZBsJPUoLDJU5n6GjgXyXnz9w8QrJ4/ZopTWDilUvgNABM/KMEjCObexTklyVu STt+GPhDwtBHNee1SCE4jSngeqncSbTCNhNT+bpp6ICbFu7w0MrUzkOcV2C8aOGphWCW99yJ kU79X97xUQ13AnxJjXnZDW0vXiAtwYTc8dVEuY6rgyB18L8wwufHHlCcTdHZ/QvrspwTjsvv neZktWsCTFxvbm9TXOG6qzSvT60ITISL2IJeWkDVwRty8L4vIg5gxbLT9BiOK24lNv4HXf32 T/ihCojg7Qei+Yb2qP9+krI6xqmq4LVVAcz6kPSV3i88wJiTIe/Ysqj7l2zxchHKIGVX1yQp k8uksKV7P0NJZyVnSnLS+IIdIxF/N6AOTzYxFRpT58o8m30/2b5JN4ApjZjOE1uL8AIPyfzZ 1Pesh9Q45kVO2a2aahwYMS6DMFCIbXcKOkJn8v8NrJmCqWdvifep0mCuWb4M7jRrXUR
  • Ironport-hdrordr: A9a23:qUhKIq81r0V20V0Mck5uk+Fudb1zdoMgy1knxilNoENuH/Bwxv rFoB1E73TJYW4qKQodcdDpAtjifZquz+8O3WBxB8bpYOCCggeVxe5ZnOzfKlHbehEWs9QtrZ uIEJIOReEYb2IK6/oSiTPQe7lP/DDEytHQuQ609QYOcegeUdAF0+4PMHf/LqQZfml7LKt8MK DZyttMpjKmd3hSRN+8HGM5U+/KoMCOvI76YDYdbiRXpzWmvHeN0vrXAhKY1hARX3dk2rE561 XIlAT/++GKr+y78BnBzGXehq4m1ucJi+EzRfBkuPJlaQkEuTzYJriJnIfy+QzdldvfqGrCVu O85yvIcf4DrE85NVvF3CcFkzOQrArGrUWShWNwyEGT3/AQDlgBerV8rJMcfR3D50U6utZglK pNwmKCrpJSSQjNhSLn+rHzJlhXf2eP0A0feNQo/gpieJpbbKUUoZ0U/UtTHptFFCXm6Jo/GO 0rCM3H/v5ZfV6Tcnic5wBUsZeRd2V2Gg3DTlkJu8ST3TQTlHdlz1EAzMhamnsb7poyR5RN+u yBOKV1k7NFSNMQcMtGda88aNryDnaITQPHMWqUL1iiHKYbO2jVo5qy+7kx7PHCQu198HLzou W1bLp1jx9AR6u1M7z+4HRiyGG8fEytGTLw18pZ+591/rXhWbuDC1zwdGwT
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHY4893wY6db56RwEawpyEuXhxcpq4WJdMA
  • Thread-topic: Policy: A release acks for the release manager's patches (was Re: [PATCH v5 2/2] xen/arm: p2m: Populate pages for GICv2 mapping in p2m_init())

On 19/10/2022 16:28, George Dunlap wrote:


On Tue, Oct 18, 2022 at 3:24 PM Henry Wang <Henry.Wang@xxxxxxx> wrote:
Hardware using GICv2 needs to create a P2M mapping of 8KB GICv2 area
when the domain is created. Considering the worst case of page tables
which requires 6 P2M pages as the two pages will be consecutive but not
necessarily in the same L3 page table and keep a buffer, populate 16
pages as the default value to the P2M pages pool in p2m_init() at the
domain creation stage to satisfy the GICv2 requirement. For GICv3, the
above-mentioned P2M mapping is not necessary, but since the allocated
16 pages here would not be lost, hence populate these pages
unconditionally.

With the default 16 P2M pages populated, there would be a case that
failures would happen in the domain creation with P2M pages already in
use. To properly free the P2M for this case, firstly support the
optionally preemption of p2m_teardown(), then call p2m_teardown() and
p2m_set_allocation(d, 0, NULL) non-preemptively in p2m_final_teardown().
As non-preemptive p2m_teardown() should only return 0, use a
BUG_ON to confirm that.

Since p2m_final_teardown() is called either after
domain_relinquish_resources() where relinquish_p2m_mapping() has been
called, or from failure path of domain_create()/arch_domain_create()
where mappings that require p2m_put_l3_page() should never be created,
relinquish_p2m_mapping() is not added in p2m_final_teardown(), add
in-code comments to refer this.

Fixes: cbea5a1149ca ("xen/arm: Allocate and free P2M pages from the P2M pool")
Suggested-by: Julien Grall <jgrall@xxxxxxxxxx>
Signed-off-by: Henry Wang <Henry.Wang@xxxxxxx>


Henry brought this patch to my attention because it needs a release ack

Actually this one doesn't.  It's a security patch, and the only reason its on xen-devel is because OSSTest discovered that XSA-409 is DoA after the fact.  And on all security supported branches too.

When the bugs have been fixed, it will cause force a re-issue of XSA-409.

, but it doesn't seem proper for Henry to be the one to release-ack his own patches. :-)

I don't see an issue with an RM R-ack-ing their own patch.  There's past form for self-R-ack, and the patch still needs one other person and/or a maintainer/committer and the usual resolution of outstanding concerns.

There's administrivia which the RM typically does closer to the release, and we've never had cross-R-ack for the docs/process side of things.


I propose that a suitable rule would be:

"If the release manager themselves have submitted a patch which needs a release ack, then the patch needs a release ack from one of the Committers who is not involved in the patch."

Given the time-critical nature of this patch, I propose that we adopt the rule as an expediency now, and we can discuss afterwards whether to make it permanent.

With that in mind, it looks like this patch is critical for fixing a release issue; it's in core code, but has also has a lot of scrutiny.  So with that in mind:

Release-acked-by: George Dunlap <george.dunlap@xxxxxxxxxx>

At the end of the day, R-ack means "I have deemed this important for the release", and the committers are the fallback for all corner cases.  I'd say that's already covered in the existing rules and conventions, given the expectation that committers wouldn't tread on the toes of the RM in the first place.

~Andrew

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.