[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v2] xen/netfront: Fix TX response spurious interrupts
On Thu, Jul 17, 2025 at 07:29:51AM -0700, Jakub Kicinski wrote: > On Tue, 15 Jul 2025 16:11:29 +0000 Anthoine Bourgeois wrote: > > Fixes: b27d47950e48 ("xen/netfront: harden netfront against event channel > > storms") > > Not entirely sure who you expect to apply this patch, but if networking > then I wouldn't classify this is a fix. The "regression" happened 4 > years ago. And this patch doesn't seem to be tuning the logic added by > the cited commit. I think this is an optimization, -next material, and > therefore there should be no Fixes tag here. You can refer to the commit > without the tag. Sometimes the line between bugfix and optimization can be unclear. To me this qualifies as a bugfix since it results in non-zero values in /sys/devices/vif-*/xenbus/spurious_events. Spurious interrupts should never occur, as such I would classify this as bug. I do though think "Fixes: 0d160211965b" is more appropriate since that is where the bug originates. Commit b27d47950e48 merely caused the bug to result in performance loss and trigger bug/attack detection flags. -- (\___(\___(\______ --=> 8-) EHM <=-- ______/)___/)___/) \BS ( | ehem+sigmsg@xxxxxxx PGP 87145445 | ) / \_CS\ | _____ -O #include <stddisclaimer.h> O- _____ | / _/ 8A19\___\_|_/58D2 7E3D DDF4 7BA6 <-PGP-> 41D1 B375 37D0 8714\_|_/___/5445
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |