From mboxrd@z Thu Jan 1 00:00:00 1970 From: Wei Liu Subject: Re: [PATCH] x86/p2m: fix mismatched unlock Date: Mon, 14 Sep 2015 09:45:02 +0100 Message-ID: <20150914084502.GA2728@zion.uk.xensource.com> References: <55F68FBB02000078000A268C@prv-mh.provo.novell.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1ZbPNq-0003T4-ND for xen-devel@lists.xenproject.org; Mon, 14 Sep 2015 08:45:06 +0000 Content-Disposition: inline In-Reply-To: <55F68FBB02000078000A268C@prv-mh.provo.novell.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Jan Beulich Cc: George Dunlap , xen-devel , Keir Fraser , Wei Liu , Andrew Cooper List-Id: xen-devel@lists.xenproject.org On Mon, Sep 14, 2015 at 01:13:31AM -0600, Jan Beulich wrote: > Luckily, due to gfn_unlock() currently mapping to p2m_unlock(), this is > only a cosmetic issue right now. > > Signed-off-by: Jan Beulich Reviewed-by: Wei Liu > --- > Despite its cosmetic nature I think it would be better to also fix this > in 4.6. Release-acked-by: Wei Liu > > --- a/xen/arch/x86/mm/p2m.c > +++ b/xen/arch/x86/mm/p2m.c > @@ -912,7 +912,7 @@ static int set_typed_p2m_entry(struct do > omfn = p2m->get_entry(p2m, gfn, &ot, &a, 0, NULL, NULL); > if ( p2m_is_grant(ot) || p2m_is_foreign(ot) ) > { > - p2m_unlock(p2m); > + gfn_unlock(p2m, gfn, 0); > domain_crash(d); > return -ENOENT; > } > > > > x86/p2m: fix mismatched unlock > > Luckily, due to gfn_unlock() currently mapping to p2m_unlock(), this is > only a cosmetic issue right now. > > Signed-off-by: Jan Beulich > --- > Despite its cosmetic nature I think it would be better to also fix this > in 4.6. > > --- a/xen/arch/x86/mm/p2m.c > +++ b/xen/arch/x86/mm/p2m.c > @@ -912,7 +912,7 @@ static int set_typed_p2m_entry(struct do > omfn = p2m->get_entry(p2m, gfn, &ot, &a, 0, NULL, NULL); > if ( p2m_is_grant(ot) || p2m_is_foreign(ot) ) > { > - p2m_unlock(p2m); > + gfn_unlock(p2m, gfn, 0); > domain_crash(d); > return -ENOENT; > }