[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] x86/mm: Don't lose track of the log dirty bitmap
# HG changeset patch # User Tim Deegan <tim@xxxxxxx> # Date 1322749036 0 # Node ID a06cda9fb25f2d7b7b5c7da170813e4a8bb0cd67 # Parent 75f4e4d9f039ea656051e6dfd73e40d4cb32896b x86/mm: Don't lose track of the log dirty bitmap hap_log_dirty_init unconditionally sets the top of the log dirty bitmap to INVALID_MFN. If there had been a bitmap allocated, it is then leaked, and the host crashes on an ASSERT when the domain is cleaned up. Signed-off-by: Tim Deegan <tim@xxxxxxx> Acked-by: Andres Lagar-Cavilla <andres@xxxxxxxxxxxxxxxx> Committed-by: Tim Deegan <tim@xxxxxxx> --- diff -r 75f4e4d9f039 -r a06cda9fb25f xen/arch/x86/mm/paging.c --- a/xen/arch/x86/mm/paging.c Thu Dec 01 14:17:15 2011 +0000 +++ b/xen/arch/x86/mm/paging.c Thu Dec 01 14:17:16 2011 +0000 @@ -595,7 +595,6 @@ d->arch.paging.log_dirty.enable_log_dirty = enable_log_dirty; d->arch.paging.log_dirty.disable_log_dirty = disable_log_dirty; d->arch.paging.log_dirty.clean_dirty_bitmap = clean_dirty_bitmap; - d->arch.paging.log_dirty.top = _mfn(INVALID_MFN); } /* This function fress log dirty bitmap resources. */ @@ -617,6 +616,11 @@ mm_lock_init(&d->arch.paging.lock); + /* This must be initialized separately from the rest of the + * log-dirty init code as that can be called more than once and we + * don't want to leak any active log-dirty bitmaps */ + d->arch.paging.log_dirty.top = _mfn(INVALID_MFN); + /* The order of the *_init calls below is important, as the later * ones may rewrite some common fields. Shadow pagetables are the * default... */ _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |