[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] In the shadow mode, thanks to recent patches, the shadow



# HG changeset patch
# User kaf24@xxxxxxxxxxxxxxxxxxxx
# Node ID cd2a4d6da0a1128bafcd209807e9d8a3da13ff87
# Parent  2b95dde7285337e782db44aa28dfc0edddc70f6d
In the shadow mode, thanks to recent patches, the shadow
reference counts (both general counts and type counts)
are now correct in all of my testing so far.  As a result,
we should remove the shadow_tainted_refcnt flag from
the domain structure.  Leaving this flag in place would
create confusion for programmers and would also prevent
future debugging of problems in handling general and type
reference counts in the shadow mode.  In addition, the
patch also (1) drops the requirement that shadow_mode_disable()
should only be called in the domain destruction sequence
(even though it is only used that way so far), and
(2) strictly assert that the type reference count must
be 0 when we free a page from the dom heap.

Signed-off-by: Khoa Huynh <khoa@xxxxxxxxxx>

diff -r 2b95dde72853 -r cd2a4d6da0a1 xen/arch/x86/shadow32.c
--- a/xen/arch/x86/shadow32.c   Tue Oct 18 01:08:26 2005
+++ b/xen/arch/x86/shadow32.c   Tue Oct 18 09:45:29 2005
@@ -1187,14 +1187,6 @@
     if ( unlikely(!shadow_mode_enabled(d)) )
         return;
 
-    /*
-     * Currently this does not fix up page ref counts, so it is valid to call
-     * only when a domain is being destroyed.
-     */
-    BUG_ON(!test_bit(_DOMF_dying, &d->domain_flags) &&
-           shadow_mode_refcounts(d));
-    d->arch.shadow_tainted_refcnts = shadow_mode_refcounts(d);
-
     free_shadow_pages(d);
     free_writable_pte_predictions(d);
 
diff -r 2b95dde72853 -r cd2a4d6da0a1 xen/arch/x86/shadow_public.c
--- a/xen/arch/x86/shadow_public.c      Tue Oct 18 01:08:26 2005
+++ b/xen/arch/x86/shadow_public.c      Tue Oct 18 09:45:29 2005
@@ -879,14 +879,6 @@
     if ( unlikely(!shadow_mode_enabled(d)) )
         return;
 
-    /*
-     * Currently this does not fix up page ref counts, so it is valid to call
-     * only when a domain is being destroyed.
-     */
-    BUG_ON(!test_bit(_DOMF_dying, &d->domain_flags) &&
-           shadow_mode_refcounts(d));
-    d->arch.shadow_tainted_refcnts = shadow_mode_refcounts(d);
-
     free_shadow_pages(d);
     free_writable_pte_predictions(d);
 
diff -r 2b95dde72853 -r cd2a4d6da0a1 xen/common/page_alloc.c
--- a/xen/common/page_alloc.c   Tue Oct 18 01:08:26 2005
+++ b/xen/common/page_alloc.c   Tue Oct 18 09:45:29 2005
@@ -610,8 +610,7 @@
         for ( i = 0; i < (1 << order); i++ )
         {
             shadow_drop_references(d, &pg[i]);
-            ASSERT(((pg[i].u.inuse.type_info & PGT_count_mask) == 0) ||
-                   shadow_tainted_refcnts(d));
+            ASSERT((pg[i].u.inuse.type_info & PGT_count_mask) == 0);
             pg[i].tlbflush_timestamp  = tlbflush_current_time();
             pg[i].u.free.cpumask      = d->cpumask;
             list_del(&pg[i].list);
diff -r 2b95dde72853 -r cd2a4d6da0a1 xen/include/asm-x86/domain.h
--- a/xen/include/asm-x86/domain.h      Tue Oct 18 01:08:26 2005
+++ b/xen/include/asm-x86/domain.h      Tue Oct 18 09:45:29 2005
@@ -32,8 +32,6 @@
     struct shadow_ops *ops;
     unsigned int shadow_mode;  /* flags to control shadow table operation */
     unsigned int shadow_nest;  /* Recursive depth of shadow_lock() nesting */
-    /* Shadow mode has tainted page reference counts? */
-    unsigned int shadow_tainted_refcnts;
 
     /* shadow hashtable */
     struct shadow_status *shadow_ht;
diff -r 2b95dde72853 -r cd2a4d6da0a1 xen/include/asm-x86/shadow.h
--- a/xen/include/asm-x86/shadow.h      Tue Oct 18 01:08:26 2005
+++ b/xen/include/asm-x86/shadow.h      Tue Oct 18 09:45:29 2005
@@ -54,8 +54,6 @@
 #define shadow_mode_log_dirty(_d) ((_d)->arch.shadow_mode & SHM_log_dirty)
 #define shadow_mode_translate(_d) ((_d)->arch.shadow_mode & SHM_translate)
 #define shadow_mode_external(_d)  ((_d)->arch.shadow_mode & SHM_external)
-
-#define shadow_tainted_refcnts(_d) ((_d)->arch.shadow_tainted_refcnts)
 
 #define shadow_linear_pg_table ((l1_pgentry_t *)SH_LINEAR_PT_VIRT_START)
 #define __shadow_linear_l2_table ((l2_pgentry_t *)(SH_LINEAR_PT_VIRT_START + \
diff -r 2b95dde72853 -r cd2a4d6da0a1 xen/include/xen/shadow.h
--- a/xen/include/xen/shadow.h  Tue Oct 18 01:08:26 2005
+++ b/xen/include/xen/shadow.h  Tue Oct 18 09:45:29 2005
@@ -12,7 +12,6 @@
 
 #define shadow_drop_references(_d, _p)          ((void)0)
 #define shadow_sync_and_drop_references(_d, _p) ((void)0)
-#define shadow_tainted_refcnts(_d)              (0)
 
 #endif
 

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.