diff options
author | Daniel De Graaf <dgdegra@tycho.nsa.gov> | 2011-03-07 15:18:57 -0500 |
---|---|---|
committer | Konrad Rzeszutek Wilk <konrad.wilk@oracle.com> | 2011-03-09 22:15:28 -0500 |
commit | d79647aea22732f39c81bbdc80931f96b46023f0 (patch) | |
tree | 5e2309aaa6b8998789beb5a6cb40b59aff211e02 /drivers/xen/gntdev.c | |
parent | 38eaeb0fd8819dce424a61579500bd9987d5c930 (diff) |
xen/gntdev,gntalloc: Remove unneeded VM flags
The only time when granted pages need to be treated specially is when
using Xen's PTE modification for grant mappings owned by another domain
(that is, only gntdev on PV guests). Otherwise, the area does not
require VM_DONTCOPY and VM_PFNMAP, since it can be accessed just like
any other page of RAM.
Since the vm_operations_struct close operations decrement reference
counts, a corresponding open function that increments them is required
now that it is possible to have multiple references to a single area.
We are careful in the gntdev to check if we can remove those flags. The
reason that we need to be careful in gntdev on PV guests is because we are
not changing the PFN/MFN mapping on PV; instead, we change the application's
page tables to point to the other domain's memory. This means that the vma
cannot be copied without using another grant mapping hypercall; it also
requires special handling on unmap, which is the reason for gntdev's
dependency on the MMU notifier.
For gntalloc, this is not a concern - the pages are owned by the domain
using the gntalloc device, and can be mapped and unmapped in the same manner
as any other page of memory.
Acked-by: Ian Campbell <ian.campbell@citrix.com>
Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
[v2: Added in git commit "We are.." from email correspondence]
Diffstat (limited to 'drivers/xen/gntdev.c')
-rw-r--r-- | drivers/xen/gntdev.c | 16 |
1 files changed, 14 insertions, 2 deletions
diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index d96d311b858e..687761f65e5c 100644 --- a/drivers/xen/gntdev.c +++ b/drivers/xen/gntdev.c | |||
@@ -358,17 +358,26 @@ static int unmap_grant_pages(struct grant_map *map, int offset, int pages) | |||
358 | 358 | ||
359 | /* ------------------------------------------------------------------ */ | 359 | /* ------------------------------------------------------------------ */ |
360 | 360 | ||
361 | static void gntdev_vma_open(struct vm_area_struct *vma) | ||
362 | { | ||
363 | struct grant_map *map = vma->vm_private_data; | ||
364 | |||
365 | pr_debug("gntdev_vma_open %p\n", vma); | ||
366 | atomic_inc(&map->users); | ||
367 | } | ||
368 | |||
361 | static void gntdev_vma_close(struct vm_area_struct *vma) | 369 | static void gntdev_vma_close(struct vm_area_struct *vma) |
362 | { | 370 | { |
363 | struct grant_map *map = vma->vm_private_data; | 371 | struct grant_map *map = vma->vm_private_data; |
364 | 372 | ||
365 | pr_debug("close %p\n", vma); | 373 | pr_debug("gntdev_vma_close %p\n", vma); |
366 | map->vma = NULL; | 374 | map->vma = NULL; |
367 | vma->vm_private_data = NULL; | 375 | vma->vm_private_data = NULL; |
368 | gntdev_put_map(map); | 376 | gntdev_put_map(map); |
369 | } | 377 | } |
370 | 378 | ||
371 | static struct vm_operations_struct gntdev_vmops = { | 379 | static struct vm_operations_struct gntdev_vmops = { |
380 | .open = gntdev_vma_open, | ||
372 | .close = gntdev_vma_close, | 381 | .close = gntdev_vma_close, |
373 | }; | 382 | }; |
374 | 383 | ||
@@ -680,7 +689,10 @@ static int gntdev_mmap(struct file *flip, struct vm_area_struct *vma) | |||
680 | 689 | ||
681 | vma->vm_ops = &gntdev_vmops; | 690 | vma->vm_ops = &gntdev_vmops; |
682 | 691 | ||
683 | vma->vm_flags |= VM_RESERVED|VM_DONTCOPY|VM_DONTEXPAND|VM_PFNMAP; | 692 | vma->vm_flags |= VM_RESERVED|VM_DONTEXPAND; |
693 | |||
694 | if (use_ptemod) | ||
695 | vma->vm_flags |= VM_DONTCOPY|VM_PFNMAP; | ||
684 | 696 | ||
685 | vma->vm_private_data = map; | 697 | vma->vm_private_data = map; |
686 | 698 | ||