WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

RE: [Xen-devel] [PATCH] Do not set page's count_info directly

To: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>, Gianluca Guida <glguida@xxxxxxxxx>
Subject: RE: [Xen-devel] [PATCH] Do not set page's count_info directly
From: "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx>
Date: Thu, 5 Mar 2009 23:07:44 +0800
Accept-language: en-US
Acceptlanguage: en-US
Cc: Tim Deegan <Tim.Deegan@xxxxxxxxxxxxx>, Gianluca Guida <Gianluca.Guida@xxxxxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Delivery-date: Thu, 05 Mar 2009 07:08:20 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <C5D59749.3D4B%keir.fraser@xxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <E2263E4A5B2284449EEBD0AAB751098401C7CE8F00@xxxxxxxxxxxxxxxxxxxxxxxxxxxx> <C5D59749.3D4B%keir.fraser@xxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcmdjnijQ+a4CfH7TNCGDr9FnixRZQAAdwneAAOW7FAAAMVTbAAAkuEg
Thread-topic: [Xen-devel] [PATCH] Do not set page's count_info directly
xen-devel-bounces@xxxxxxxxxxxxxxxxxxx <> wrote:
> On 05/03/2009 14:33, "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx> wrote:
> 
>>> This would be a shadow-code-specific macro. In general count_mask==0 can
>>> also mean the page is free, for example.
>> 
>> Maybe I'm wrong, but anonymous page will have count_mask==0 while they are
>> allocated. 
>> 
>> Currently the only way that we can make sure the guest is free is through
>> the boot allocator bitmap. When the bit is clear, the page is free.
>> When the bit is set, and the count_mask!=0, then it is owned by someone
>> like guest ram, p2m table etc. if the count_mask==0, then it is either a
>> shadow page or a anoynymous page. 
>> 
>> Or do I missed anything?
> 
> You are correct. I only gave one obvious example where count_info==0.

Thanks for your clarification.

-- Yunhong Jiang

> 
> -- Keir
> 
> 
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel