xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: Daniel De Graaf <dgdegra@tycho.nsa.gov>, Tim Deegan <tim@xen.org>,
	Ian Campbell <Ian.Campbell@citrix.com>,
	Xen-devel <xen-devel@lists.xen.org>
Subject: Re: [PATCH] xen: Fix XSM build following c/s 92942fd
Date: Wed, 10 Feb 2016 10:39:22 +0000	[thread overview]
Message-ID: <56BB135A.8040909@citrix.com> (raw)
In-Reply-To: <56BA2A5802000078000D03AE@prv-mh.provo.novell.com>

On 09/02/16 17:05, Jan Beulich wrote:
>>>> On 09.02.16 at 17:21, <andrew.cooper3@citrix.com> wrote:
>> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
> I'm sorry for the breakage / not noticing.
>
>> ---
>> CC: Jan Beulich <JBeulich@suse.com>
>> CC: Tim Deegan <tim@xen.org>
>> CC: Ian Campbell <Ian.Campbell@citrix.com>
>> CC: Daniel De Graaf <dgdegra@tycho.nsa.gov>
>>
>> Is this actually an appropraite fix?  Software relying on -ENOSYS for Xen
>> feature detection is going to break when running under an XSM hypervisor.
> That's a valid concern, and it's certainly not nice for XSM to need
> tweaking here at all. Perhaps ...
>
>> --- a/xen/xsm/flask/hooks.c
>> +++ b/xen/xsm/flask/hooks.c
>> @@ -1421,7 +1421,6 @@ static int flask_shadow_control(struct domain *d, uint32_t op)
>>          break;
>>      case XEN_DOMCTL_SHADOW_OP_ENABLE:
>>      case XEN_DOMCTL_SHADOW_OP_ENABLE_TEST:
>> -    case XEN_DOMCTL_SHADOW_OP_ENABLE_TRANSLATE:
>>      case XEN_DOMCTL_SHADOW_OP_GET_ALLOCATION:
>>      case XEN_DOMCTL_SHADOW_OP_SET_ALLOCATION:
>>          perm = SHADOW__ENABLE;
> ... rather than just removing the case it should be moved to a
> separate case yielding -ENOSYS or -EOPNOTSUPP (right now
> shadow_domctl() returns -EINVAL anyway afaics)? (This of
> course would mean that we can't completely suppress the
> XEN_DOMCTL_SHADOW_OP_ENABLE_TRANSLATE #define in
> public/domctl.h. We could limit it to __XEN__ though.)

The problem this creates is that we gain two locations prescribing the
authoritative set of supported actions, which is one too many.

The first question is whether blanket -EPERMs are ok.  This is the
current behaviour, and as such, this patch should probably be taken in
this form.  (i.e. fix the build and maintain the status quo).

If blanket -EPERMs are not ok, we are going to need some longer work to
make the XSM checks finer grained, and after the primary -ENOSYS checks.

~Andrew

  reply	other threads:[~2016-02-10 10:39 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-02-09 16:21 [PATCH] xen: Fix XSM build following c/s 92942fd Andrew Cooper
2016-02-09 17:05 ` Jan Beulich
2016-02-10 10:39   ` Andrew Cooper [this message]
2016-02-10 10:47     ` Jan Beulich
2016-02-11  0:15       ` Daniel De Graaf
2016-02-17 14:21         ` Andrew Cooper

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=56BB135A.8040909@citrix.com \
    --to=andrew.cooper3@citrix.com \
    --cc=Ian.Campbell@citrix.com \
    --cc=JBeulich@suse.com \
    --cc=dgdegra@tycho.nsa.gov \
    --cc=tim@xen.org \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).