If anything, a check covering a wider range of invalid M2P entries ought
to be used (e.g. VALID_M2P()). But since everything is fully under Xen's
control at this stage, simply remove the BUG_ON().
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/arch/x86/pv/dom0_build.c
+++ b/xen/arch/x86/pv/dom0_build.c
@@ -815,7 +815,6 @@ int __init dom0_construct_pv(struct doma
page_list_for_each ( page, &d->page_list )
{
mfn = mfn_x(page_to_mfn(page));
- BUG_ON(SHARED_M2P(get_gpfn_from_mfn(mfn)));
if ( get_gpfn_from_mfn(mfn) >= count )
{
BUG_ON(compat);
On 28.06.2021 13:52, Jan Beulich wrote:
> If anything, a check covering a wider range of invalid M2P entries ought
> to be used (e.g. VALID_M2P()). But since everything is fully under Xen's
> control at this stage, simply remove the BUG_ON().
>
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
I didn't expect this to be controversial, so may I please ask for an ack
(or otherwise)?
Thanks, Jan
> --- a/xen/arch/x86/pv/dom0_build.c
> +++ b/xen/arch/x86/pv/dom0_build.c
> @@ -815,7 +815,6 @@ int __init dom0_construct_pv(struct doma
> page_list_for_each ( page, &d->page_list )
> {
> mfn = mfn_x(page_to_mfn(page));
> - BUG_ON(SHARED_M2P(get_gpfn_from_mfn(mfn)));
> if ( get_gpfn_from_mfn(mfn) >= count )
> {
> BUG_ON(compat);
>
On 06.07.2021 09:37, Jan Beulich wrote:
> On 28.06.2021 13:52, Jan Beulich wrote:
>> If anything, a check covering a wider range of invalid M2P entries ought
>> to be used (e.g. VALID_M2P()). But since everything is fully under Xen's
>> control at this stage, simply remove the BUG_ON().
>>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>
> I didn't expect this to be controversial, so may I please ask for an ack
> (or otherwise)?
To be quite honest, I find it very strange that even simple changes like
this one sit un-responded to for months. This isn't the only example ...
Thanks, Jan
>> --- a/xen/arch/x86/pv/dom0_build.c
>> +++ b/xen/arch/x86/pv/dom0_build.c
>> @@ -815,7 +815,6 @@ int __init dom0_construct_pv(struct doma
>> page_list_for_each ( page, &d->page_list )
>> {
>> mfn = mfn_x(page_to_mfn(page));
>> - BUG_ON(SHARED_M2P(get_gpfn_from_mfn(mfn)));
>> if ( get_gpfn_from_mfn(mfn) >= count )
>> {
>> BUG_ON(compat);
>>
>
Could you explicitly mention PV somewhere in the subject? On Mon, Jun 28, 2021 at 01:52:52PM +0200, Jan Beulich wrote: > If anything, a check covering a wider range of invalid M2P entries ought > to be used (e.g. VALID_M2P()). But since everything is fully under Xen's > control at this stage, simply remove the BUG_ON(). AFAICT adding this BUG_ON was a wholesale change to protect against shared frames, but I also cannot ssee an scenario where we can get here with shared frames in the m2p. > Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Roger Pau Monné <roger.pau@citrix.com> Thanks, Roger.
© 2016 - 2026 Red Hat, Inc.