WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Re: [Xen-staging] [xen-unstable] linux: User-space grant tab

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] Re: [Xen-staging] [xen-unstable] linux: User-space grant table device.
From: Alex Williamson <alex.williamson@xxxxxx>
Date: Sat, 31 Mar 2007 09:33:56 -0600
Delivery-date: Sat, 31 Mar 2007 16:35:11 +0100
Envelope-to: Keir.Fraser@xxxxxxxxxxxx
In-reply-to: <200703311252.l2VCqLaT019711@xxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Organization: HP OSLO R&D
References: <200703311252.l2VCqLaT019711@xxxxxxxxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
On Sat, 2007-03-31 at 13:52 +0100, Xen staging patchbot-unstable wrote:
> # HG changeset patch
> # User Keir Fraser <keir@xxxxxxxxxxxxx>
> # Date 1175345604 -3600
> # Node ID 5e65a86c8982b9159223b542cc7b7e3af61a06e4
> # Parent  7180d2e61f926023e24750c53fd4203a71f2a3ae
> linux: User-space grant table device.
> 
> A character device for accessing (in user-space) pages that have been
> granted by other domains.
...
> +     /* This flag ensures that the page tables are not unpinned before the
> +      * VM area is unmapped. Therefore Xen still recognises the PTE as
> +      * belonging to an L1 pagetable, and the grant unmap operation will
> +      * succeed, even if the process does not exit cleanly.
> +      */
> +     vma->vm_mm->context.has_foreign_mappings = 1;

   mm_context_t is arch specific, common code shouldn't be poking at it
like this.

        Alex

-- 
Alex Williamson                             HP Open Source & Linux Org.


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel