[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [RFC PATCH] PVH: cleanup of p2m upon p2m destroy



At 18:01 -0800 on 18 Dec (1387386115), Mukesh Rathor wrote:
> On Wed, 18 Dec 2013 17:51:52 +0100
> Tim Deegan <tim@xxxxxxx> wrote:
> 
> > At 11:09 +0100 on 18 Dec (1387361398), Tim Deegan wrote:
> > > > An alternative might be to just create a link list then and walk
> > > > it. In general, foreign mappings should be very small, so the
> > > > overhead of 16 bytes per page for the link list might not be too
> > > > bad. I will code it if there is no disagreement from any
> > > > maintainer... everyone has different ideas :)...
> > > 
> > > I think it would be best to walk the p2m trie (i.e. bounded by
> > > amount of RAM, rather than max GFN) and do it preemptably.  I'll
> > > look into something like that for the mem_sharing loop today, and
> > > foreign mapping code can reuse it.
> > 
> > What I've ended up with is making p2m_change_entry_type_global()
> > preemptible (which is a bigger task but will be needed as domains get
> > bigger).  Do you think that using that function to switch all mappings
> > from p2m_foreign to p2m_invalid, appropriately late in the teardown,
> > will be good enough for what you need?
> 
> No, not quite, because I need to know which mfns are foreign and
> do put_page on them. 

Oh right, but you need to do that anyway -- once you've got refcounts
held by ept entries, you need to do _all_ entry writes through the
function that preserves the refcount invariant.  So
p2m_change_entry_type_global() has to use that function too, in case
either of the types it's called with is p2m_foreign.  And once that's
fixed, a call to s/foreign/invalid/ DTRT.

Also, this:

> +static int ept_put_foreign_mfn(ept_entry_t *entry, unsigned long data)
> +{
> +    put_page(mfn_to_page(entry->mfn));
> +    return 0;
> +}

gives me the heebie-jeebies, because it explcitly _breaks_ the
invariant, leaving the foreign mapping in place without its refcount.

Tim.

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.