Olaf Hering
e2d8bf077a
Merge paging related fixes from xen-unstable: 23506-x86_Disable_set_gpfn_from_mfn_until_m2p_table_is_allocated..patch 23507-xenpaging_update_machine_to_phys_mapping_during_page_deallocation.patch 23509-x86_32_Fix_build_Define_machine_to_phys_mapping_valid.patch 23562-xenpaging_remove_unused_spinlock_in_pager.patch 23576-x86_show_page_walk_also_for_early_page_faults.patch 23577-tools_merge_several_bitop_functions_into_xc_bitops.h.patch 23578-xenpaging_add_xs_handle_to_struct_xenpaging.patch 23579-xenpaging_drop_xc.c_remove_ASSERT.patch 23580-xenpaging_drop_xc.c_remove_xc_platform_info_t.patch 23581-xenpaging_drop_xc.c_remove_xc_wait_for_event.patch 23582-xenpaging_drop_xc.c_move_xc_mem_paging_flush_ioemu_cache.patch 23583-xenpaging_drop_xc.c_move_xc_wait_for_event_or_timeout.patch 23584-xenpaging_drop_xc.c_remove_xc_files.patch 23585-xenpaging_correct_dropping_of_pages_to_avoid_full_ring_buffer.patch 23586-xenpaging_do_not_bounce_p2mt_back_to_the_hypervisor.patch 23587-xenpaging_remove_srand_call.patch 23588-xenpaging_remove_return_values_from_functions_that_can_not_fail.patch 23589-xenpaging_catch_xc_mem_paging_resume_errors.patch 23590-xenpaging_remove_local_domain_id_variable.patch 23591-xenpaging_move_num_pages_into_xenpaging_struct.patch 23592-xenpaging_start_paging_in_the_middle_of_gfn_range.patch 23593-xenpaging_pass_integer_to_xenpaging_populate_page.patch 23594-xenpaging_add_helper_function_for_unlinking_pagefile.patch 23595-xenpaging_add_watch_thread_to_catch_guest_shutdown.patch 23596-xenpaging_implement_stopping_of_pager_by_sending_SIGTERM-SIGINT.patch 23597-xenpaging_remove_private_mem_event.h.patch 23599-tools_fix_build_after_recent_xenpaging_changes.patch 23817-mem_event_add_ref_counting_for_free_requestslots.patch 23818-mem_event_use_mem_event_mark_and_pause_in_mem_event_check_ring.patch 23827-xenpaging_use_batch_of_pages_during_final_page-in.patch 23841-mem_event_pass_mem_event_domain_pointer_to_mem_event_functions.patch 23842-mem_event_use_different_ringbuffers_for_share_paging_and_access.patch 23874-xenpaging_track_number_of_paged_pages_in_struct_domain.patch 23904-xenpaging_use_p2m-get_entry_in_p2m_mem_paging_functions.patch 23905-xenpaging_fix_locking_in_p2m_mem_paging_functions.patch 23906-xenpaging_remove_confusing_comment_from_p2m_mem_paging_populate.patch 23908-p2m_query-modify_p2mt_with_p2m_lock_held.patch 23943-xenpaging_clear_page_content_after_evict.patch 23953-xenpaging_handle_evict_failures.patch 23978-xenpaging_check_p2mt_in_p2m_mem_paging_functions.patch 23979-xenpaging_document_p2m_mem_paging_functions.patch 23980-xenpaging_disallow_paging_in_a_PoD_guest.patch Remove obsolete patches: x86-show-page-walk-early.patch xenpaging.23817-mem_event_check_ring.patch xenpaging.catch-xc_mem_paging_resume-error.patch xenpaging.guest_remove_page.slow_path.patch xenpaging.mem_event-no-p2mt.patch xenpaging.no-srand.patch xenpaging.return-void.patch xenpaging.xenpaging_populate_page-gfn.patch - xen.spec: use changeset number as patch number for upstream patches OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=151
145 lines
5.4 KiB
Diff
145 lines
5.4 KiB
Diff
changeset: 23817:083f10851dd8
|
|
user: Olaf Hering <olaf@aepfle.de>
|
|
date: Mon Sep 05 15:10:09 2011 +0100
|
|
files: xen/arch/x86/mm/mem_event.c xen/arch/x86/mm/mem_sharing.c xen/arch/x86/mm/p2m.c xen/include/asm-x86/mem_event.h xen/include/xen/sched.h
|
|
description:
|
|
mem_event: add ref counting for free requestslots
|
|
|
|
If mem_event_check_ring() is called by many vcpus at the same time
|
|
before any of them called also mem_event_put_request(), all of the
|
|
callers must assume there are enough free slots available in the ring.
|
|
|
|
Record the number of request producers in mem_event_check_ring() to
|
|
keep track of available free slots.
|
|
|
|
Add a new mem_event_put_req_producers() function to release a request
|
|
attempt made in mem_event_check_ring(). Its required for
|
|
p2m_mem_paging_populate() because that function can only modify the
|
|
p2m type if there are free request slots. But in some cases
|
|
p2m_mem_paging_populate() does not actually have to produce another
|
|
request when it is known that the same request was already made
|
|
earlier by a different vcpu.
|
|
|
|
|
|
mem_event_check_ring() can not return a reference to a free request
|
|
slot because there could be multiple references for different vcpus
|
|
and the order of mem_event_put_request() calls is not known. As a
|
|
result, incomplete requests could be consumed by the ring user.
|
|
|
|
Signed-off-by: Olaf Hering <olaf@aepfle.de>
|
|
|
|
|
|
---
|
|
xen/arch/x86/mm/mem_event.c | 19 ++++++++++++-------
|
|
xen/arch/x86/mm/mem_sharing.c | 1 -
|
|
xen/arch/x86/mm/p2m.c | 1 +
|
|
xen/include/asm-x86/mem_event.h | 1 +
|
|
xen/include/xen/sched.h | 1 +
|
|
5 files changed, 15 insertions(+), 8 deletions(-)
|
|
|
|
Index: xen-4.1.2-testing/xen/arch/x86/mm/mem_event.c
|
|
===================================================================
|
|
--- xen-4.1.2-testing.orig/xen/arch/x86/mm/mem_event.c
|
|
+++ xen-4.1.2-testing/xen/arch/x86/mm/mem_event.c
|
|
@@ -37,8 +37,6 @@
|
|
#define mem_event_ring_lock(_d) spin_lock(&(_d)->mem_event.ring_lock)
|
|
#define mem_event_ring_unlock(_d) spin_unlock(&(_d)->mem_event.ring_lock)
|
|
|
|
-#define MEM_EVENT_RING_THRESHOLD 4
|
|
-
|
|
static int mem_event_enable(struct domain *d, mfn_t ring_mfn, mfn_t shared_mfn)
|
|
{
|
|
int rc;
|
|
@@ -109,6 +107,7 @@ void mem_event_put_request(struct domain
|
|
req_prod++;
|
|
|
|
/* Update ring */
|
|
+ d->mem_event.req_producers--;
|
|
front_ring->req_prod_pvt = req_prod;
|
|
RING_PUSH_REQUESTS(front_ring);
|
|
|
|
@@ -153,11 +152,18 @@ void mem_event_mark_and_pause(struct vcp
|
|
vcpu_sleep_nosync(v);
|
|
}
|
|
|
|
+void mem_event_put_req_producers(struct domain *d)
|
|
+{
|
|
+ mem_event_ring_lock(d);
|
|
+ d->mem_event.req_producers--;
|
|
+ mem_event_ring_unlock(d);
|
|
+}
|
|
+
|
|
int mem_event_check_ring(struct domain *d)
|
|
{
|
|
struct vcpu *curr = current;
|
|
int free_requests;
|
|
- int ring_full;
|
|
+ int ring_full = 1;
|
|
|
|
if ( !d->mem_event.ring_page )
|
|
return -1;
|
|
@@ -165,12 +171,11 @@ int mem_event_check_ring(struct domain *
|
|
mem_event_ring_lock(d);
|
|
|
|
free_requests = RING_FREE_REQUESTS(&d->mem_event.front_ring);
|
|
- if ( unlikely(free_requests < 2) )
|
|
+ if ( d->mem_event.req_producers < free_requests )
|
|
{
|
|
- gdprintk(XENLOG_INFO, "free request slots: %d\n", free_requests);
|
|
- WARN_ON(free_requests == 0);
|
|
+ d->mem_event.req_producers++;
|
|
+ ring_full = 0;
|
|
}
|
|
- ring_full = free_requests < MEM_EVENT_RING_THRESHOLD ? 1 : 0;
|
|
|
|
if ( (curr->domain->domain_id == d->domain_id) && ring_full )
|
|
{
|
|
Index: xen-4.1.2-testing/xen/arch/x86/mm/mem_sharing.c
|
|
===================================================================
|
|
--- xen-4.1.2-testing.orig/xen/arch/x86/mm/mem_sharing.c
|
|
+++ xen-4.1.2-testing/xen/arch/x86/mm/mem_sharing.c
|
|
@@ -322,7 +322,6 @@ static struct page_info* mem_sharing_all
|
|
req.flags |= MEM_EVENT_FLAG_VCPU_PAUSED;
|
|
}
|
|
|
|
- /* XXX: Need to reserve a request, not just check the ring! */
|
|
if(mem_event_check_ring(d)) return page;
|
|
|
|
req.gfn = gfn;
|
|
Index: xen-4.1.2-testing/xen/arch/x86/mm/p2m.c
|
|
===================================================================
|
|
--- xen-4.1.2-testing.orig/xen/arch/x86/mm/p2m.c
|
|
+++ xen-4.1.2-testing/xen/arch/x86/mm/p2m.c
|
|
@@ -2970,6 +2970,7 @@ void p2m_mem_paging_populate(struct p2m_
|
|
else if ( p2mt != p2m_ram_paging_out && p2mt != p2m_ram_paged )
|
|
{
|
|
/* gfn is already on its way back and vcpu is not paused */
|
|
+ mem_event_put_req_producers(d);
|
|
return;
|
|
}
|
|
|
|
Index: xen-4.1.2-testing/xen/include/asm-x86/mem_event.h
|
|
===================================================================
|
|
--- xen-4.1.2-testing.orig/xen/include/asm-x86/mem_event.h
|
|
+++ xen-4.1.2-testing/xen/include/asm-x86/mem_event.h
|
|
@@ -27,6 +27,7 @@
|
|
/* Pauses VCPU while marking pause flag for mem event */
|
|
void mem_event_mark_and_pause(struct vcpu *v);
|
|
int mem_event_check_ring(struct domain *d);
|
|
+void mem_event_put_req_producers(struct domain *d);
|
|
void mem_event_put_request(struct domain *d, mem_event_request_t *req);
|
|
void mem_event_get_response(struct domain *d, mem_event_response_t *rsp);
|
|
void mem_event_unpause_vcpus(struct domain *d);
|
|
Index: xen-4.1.2-testing/xen/include/xen/sched.h
|
|
===================================================================
|
|
--- xen-4.1.2-testing.orig/xen/include/xen/sched.h
|
|
+++ xen-4.1.2-testing/xen/include/xen/sched.h
|
|
@@ -190,6 +190,7 @@ struct mem_event_domain
|
|
{
|
|
/* ring lock */
|
|
spinlock_t ring_lock;
|
|
+ unsigned int req_producers;
|
|
/* shared page */
|
|
mem_event_shared_page_t *shared_page;
|
|
/* shared ring page */
|