[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 1/3] x86/pv: Avoid locked bit manipulation in register_guest_callback()
Changes to arch.vgc_flags are made to current in syncrhonous context only, and don't need to be locked. (The only other changes are via arch_set_info_guest(), which operates on descheduled vcpus only). Replace the {set,clear}_bit() calls with compiler-visible bitwise operations. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> --- CC: Jan Beulich <JBeulich@xxxxxxxx> CC: Wei Liu <wei.liu2@xxxxxxxxxx> CC: Roger Pau Monné <roger.pau@xxxxxxxxxx> --- xen/arch/x86/pv/callback.c | 18 ++++++------------ 1 file changed, 6 insertions(+), 12 deletions(-) diff --git a/xen/arch/x86/pv/callback.c b/xen/arch/x86/pv/callback.c index 29ae692..e6a17c5 100644 --- a/xen/arch/x86/pv/callback.c +++ b/xen/arch/x86/pv/callback.c @@ -88,21 +88,17 @@ static long register_guest_callback(struct callback_register *reg) case CALLBACKTYPE_failsafe: curr->arch.pv_vcpu.failsafe_callback_eip = reg->address; if ( reg->flags & CALLBACKF_mask_events ) - set_bit(_VGCF_failsafe_disables_events, - &curr->arch.vgc_flags); + curr->arch.vgc_flags |= VGCF_failsafe_disables_events; else - clear_bit(_VGCF_failsafe_disables_events, - &curr->arch.vgc_flags); + curr->arch.vgc_flags &= ~VGCF_failsafe_disables_events; break; case CALLBACKTYPE_syscall: curr->arch.pv_vcpu.syscall_callback_eip = reg->address; if ( reg->flags & CALLBACKF_mask_events ) - set_bit(_VGCF_syscall_disables_events, - &curr->arch.vgc_flags); + curr->arch.vgc_flags |= VGCF_syscall_disables_events; else - clear_bit(_VGCF_syscall_disables_events, - &curr->arch.vgc_flags); + curr->arch.vgc_flags &= ~VGCF_syscall_disables_events; break; case CALLBACKTYPE_syscall32: @@ -236,11 +232,9 @@ static long compat_register_guest_callback(struct compat_callback_register *reg) curr->arch.pv_vcpu.failsafe_callback_cs = reg->address.cs; curr->arch.pv_vcpu.failsafe_callback_eip = reg->address.eip; if ( reg->flags & CALLBACKF_mask_events ) - set_bit(_VGCF_failsafe_disables_events, - &curr->arch.vgc_flags); + curr->arch.vgc_flags |= VGCF_failsafe_disables_events; else - clear_bit(_VGCF_failsafe_disables_events, - &curr->arch.vgc_flags); + curr->arch.vgc_flags &= ~VGCF_failsafe_disables_events; break; case CALLBACKTYPE_syscall32: -- 2.1.4 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |