]> xenbits.xensource.com Git - people/andrewcoop/xen.git/commitdiff
x86/shadow: "monitor table" is a HVM-only concept
authorJan Beulich <jbeulich@suse.com>
Tue, 25 Apr 2023 10:37:25 +0000 (12:37 +0200)
committerJan Beulich <jbeulich@suse.com>
Tue, 25 Apr 2023 10:37:25 +0000 (12:37 +0200)
It looks like in the combination of aff8bf94ce65 ('x86/shadow: only
4-level guest code needs building when !HVM') and 0b841314dace
('x86/shadow: sh_{make,destroy}_monitor_table() are "even more" HVM-
only') I didn't go quite far enough: SH_type_monitor_table is also
effectively unused when !HVM.

The assertion early in sh_destroy_shadow() can have the type dropped
altogether: it shouldn't make it here in the first place. Pages of
this type are freed directly from sh_destroy_monitor_table() only.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
xen/arch/x86/mm/shadow/common.c
xen/arch/x86/mm/shadow/private.h

index 0f3a369d89c34d98d0f45082b3e5d41517b93bb8..6d84ff3d99c2731c5f27849cabf88293fc1945b6 100644 (file)
@@ -1748,7 +1748,6 @@ void sh_destroy_shadow(struct domain *d, mfn_t smfn)
     ASSERT(t == SH_type_fl1_32_shadow  ||
            t == SH_type_fl1_pae_shadow ||
            t == SH_type_fl1_64_shadow  ||
-           t == SH_type_monitor_table  ||
            (is_pv_32bit_domain(d) && t == SH_type_l4_64_shadow) ||
            (page_get_owner(mfn_to_page(backpointer(sp))) == d));
 
index 93a443ee5974acb029a823c45bf51a4ec4430d7d..d02d70ab070c2d401f1d28b57c63c8000a8a9b0e 100644 (file)
@@ -193,8 +193,7 @@ extern void shadow_audit_tables(struct vcpu *v);
 #define SH_type_l4_64_shadow   6U /* shadowing a 64-bit L4 page */
 #define SH_type_max_shadow     6U
 #define SH_type_p2m_table      7U /* in use as the p2m table */
-#define SH_type_monitor_table  8U /* in use as a monitor table */
-#define SH_type_unused         9U
+#define SH_type_unused         8U
 #endif
 
 #ifndef CONFIG_PV32 /* Unused (but uglier to #ifdef above): */