[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH 2/2] xen/flask: Wire up XEN_DOMCTL_{get,set}_paging_mempool_size
- To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Date: Mon, 21 Nov 2022 11:07:01 -0500
- Arc-authentication-results: i=1; mx.zohomail.com; dkim=pass header.i=apertussolutions.com; spf=pass smtp.mailfrom=dpsmith@xxxxxxxxxxxxxxxxxxxx; dmarc=pass header.from=<dpsmith@xxxxxxxxxxxxxxxxxxxx>
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1669046824; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; bh=tZyRZ/fk8LIzCTdf9SXGL+KC5e8X2bBuohDXP+YgN18=; b=bWH8E4vdpfPDKKmzu+w4UgpMHjfjfyhFQTuk0gga7i6ZkGKrWD8zu6UgHdlediyebzSmFuHcz/FI64Nhhe2huFouqILUIxueeQfMUlo8RNNWQFtKuq2LtTJ6TVpYiWnBNL+mVbIm7cAXGOPZZAfy+3+js0zUIXu3wUIsK2v1SlM=
- Arc-seal: i=1; a=rsa-sha256; t=1669046824; cv=none; d=zohomail.com; s=zohoarc; b=XsxlZuBDXKq5xx8vLfdfl6bkLpNqINiuxC6ig7fHm8Bd5MkobXYpivv0CIGtsud89sMFTZRX2VOqz2H3DCN0mG8Tfi4Ed4TYQfmvJcfJrtX0FIvymUjWTDo0TzLv/n2PFOfK3800H/S5DjXbtQPq0LBB/jdcn8a9MMpC9jlORaE=
- Cc: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>, Jason Andryuk <jandryuk@xxxxxxxxx>, Henry Wang <Henry.Wang@xxxxxxx>
- Delivery-date: Mon, 21 Nov 2022 16:07:36 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 11/21/22 09:37, Andrew Cooper wrote:
These were overlooked in the original patch, and noticed by OSSTest which does
run some Flask tests.
Fixes: 22b20bd98c02 ("xen: Introduce non-broken hypercalls for the paging mempool
size")
Suggested-by: Daniel Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
---
CC: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
CC: Daniel Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>
CC: Jason Andryuk <jandryuk@xxxxxxxxx>
CC: Henry Wang <Henry.Wang@xxxxxxx>
It should be noted that the original XSA-409 fix broke Flask on ARM but no
testing noticed. c/s 7c3bbd940dd8 ("xen/arm, libxl: Revert
XEN_DOMCTL_shadow_op; use p2m mempool hypercalls") "fixes" the original
breakage and introduced this breakage instead.
For 4.17. It's a fix for an issue that OSSTest is currently blocking as a
regression.
Acked-by: Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>
|