[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 1/6] xen-gntdev: Change page limit to be global instead of per-open
On Fri, Jan 14, 2011 at 10:46:11AM -0500, Daniel De Graaf wrote: > Because there is no limitation on how many times a user can open a > given device file, an per-file-description limit on the number of > pages granted offers little to no benefit. Change to a global limit > and remove the ioctl() as the parameter can now be changed via sysfs. Can you add here the comment which c/s in the Xen hypervisor changed the tools so this won't cause them to fail. Just respond to this e-mail with the improved patch. > > Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> > --- > drivers/xen/gntdev.c | 52 +++++++++++++++---------------------------------- > 1 files changed, 16 insertions(+), 36 deletions(-) > > diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c > index 1e31cdc..59e6a51 100644 > --- a/drivers/xen/gntdev.c > +++ b/drivers/xen/gntdev.c > @@ -45,15 +45,15 @@ MODULE_AUTHOR("Derek G. Murray > <Derek.Murray@xxxxxxxxxxxx>, " > "Gerd Hoffmann <kraxel@xxxxxxxxxx>"); > MODULE_DESCRIPTION("User-space granted page access driver"); > > -static int limit = 1024; > +static int limit = 1024*1024; > module_param(limit, int, 0644); > -MODULE_PARM_DESC(limit, "Maximum number of grants that may be mapped at " > - "once by a gntdev instance"); > +MODULE_PARM_DESC(limit, "Maximum number of grants that may be mapped by " > + "the gntdev device"); > + > +static atomic_t pages_mapped = ATOMIC_INIT(0); > > struct gntdev_priv { > struct list_head maps; > - uint32_t used; > - uint32_t limit; > /* lock protects maps from concurrent changes */ > spinlock_t lock; > struct mm_struct *mm; > @@ -82,9 +82,8 @@ static void gntdev_print_maps(struct gntdev_priv *priv, > #ifdef DEBUG > struct grant_map *map; > > - pr_debug("maps list (priv %p, usage %d/%d)\n", > - priv, priv->used, priv->limit); > - > + pr_debug("%s: maps list (priv %p)\n", > + __FUNCTION__, priv); > list_for_each_entry(map, &priv->maps, next) > pr_debug(" index %2d, count %2d %s\n", > map->index, map->count, > @@ -121,9 +120,6 @@ static struct grant_map *gntdev_alloc_map(struct > gntdev_priv *priv, int count) > add->count = count; > add->priv = priv; > > - if (add->count + priv->used > priv->limit) > - goto err; > - > return add; > > err: > @@ -154,7 +150,6 @@ static void gntdev_add_map(struct gntdev_priv *priv, > struct grant_map *add) > list_add_tail(&add->next, &priv->maps); > > done: > - priv->used += add->count; > gntdev_print_maps(priv, "[new]", add->index); > } > > @@ -200,7 +195,7 @@ static int gntdev_del_map(struct grant_map *map) > if (map->unmap_ops[i].handle) > return -EBUSY; > > - map->priv->used -= map->count; > + atomic_sub(map->count, &pages_mapped); > list_del(&map->next); > return 0; > } > @@ -386,7 +381,6 @@ static int gntdev_open(struct inode *inode, struct file > *flip) > > INIT_LIST_HEAD(&priv->maps); > spin_lock_init(&priv->lock); > - priv->limit = limit; > > priv->mm = get_task_mm(current); > if (!priv->mm) { > @@ -443,19 +437,25 @@ static long gntdev_ioctl_map_grant_ref(struct > gntdev_priv *priv, > pr_debug("priv %p, add %d\n", priv, op.count); > if (unlikely(op.count <= 0)) > return -EINVAL; > - if (unlikely(op.count > priv->limit)) > - return -EINVAL; > > err = -ENOMEM; > map = gntdev_alloc_map(priv, op.count); > if (!map) > return err; > + No need. > if (copy_from_user(map->grants, &u->refs, > sizeof(map->grants[0]) * op.count) != 0) { > gntdev_free_map(map); > return err; > } > > + if (unlikely(atomic_add_return(op.count, &pages_mapped) > limit)) > + { > + pr_debug("%s: can't map: over limit\n", __FUNCTION__); > + gntdev_free_map(map); > + return err; > + } > + > spin_lock(&priv->lock); > gntdev_add_map(priv, map); > op.index = map->index << PAGE_SHIFT; > @@ -518,23 +518,6 @@ static long gntdev_ioctl_get_offset_for_vaddr(struct > gntdev_priv *priv, > return 0; > } > > -static long gntdev_ioctl_set_max_grants(struct gntdev_priv *priv, > - struct ioctl_gntdev_set_max_grants > __user *u) > -{ > - struct ioctl_gntdev_set_max_grants op; > - > - if (copy_from_user(&op, u, sizeof(op)) != 0) > - return -EFAULT; > - pr_debug("priv %p, limit %d\n", priv, op.count); > - if (op.count > limit) > - return -E2BIG; > - > - spin_lock(&priv->lock); > - priv->limit = op.count; > - spin_unlock(&priv->lock); > - return 0; > -} > - > static long gntdev_ioctl(struct file *flip, > unsigned int cmd, unsigned long arg) > { > @@ -551,9 +534,6 @@ static long gntdev_ioctl(struct file *flip, > case IOCTL_GNTDEV_GET_OFFSET_FOR_VADDR: > return gntdev_ioctl_get_offset_for_vaddr(priv, ptr); > > - case IOCTL_GNTDEV_SET_MAX_GRANTS: > - return gntdev_ioctl_set_max_grants(priv, ptr); > - > default: > pr_debug("priv %p, unknown cmd %x\n", priv, cmd); > return -ENOIOCTLCMD; > -- > 1.7.3.4 > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxxxxxxxx > http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |