| On Wed, 2007-01-10 at 12:59 -0600, Jerone Young wrote:
> 
> > > @@ -286,7 +286,7 @@ int HYPERVISOR_grant_table_op(unsigned i
> > >                 return -ENOSYS;
> > >         }
> > >
> > > -       desc = xencomm_create_inline(op);
> > > +       desc = xencomm_create_inline(op, 0);
> > >
> > >         ret =
> plpar_hcall_norets(XEN_MARK(__HYPERVISOR_grant_table_op), cmd,
> > >                                  desc, count);
> >
> > Throughout your entire patch you're using a size of 0. That can't be
> > right.
> 
> Glad you pointed this out. Actually, in these cases I use 0 (why the
> patch isn't perfect) to ensure that we are not returned a NULL pointer.
> Since this is code that has just been added. Since the check is not
> needed in theses cases, but perhaps it will always pass and this is not
> going to be a worry.
As we discussed in person, it certainly is a worry. The check should not
always pass, and we do need to test for failure.
-- 
Hollis Blanchard
IBM Linux Technology Center
_______________________________________________
Xen-ppc-devel mailing list
Xen-ppc-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ppc-devel
 |