[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCHv2 3/5] evtchn: use a per-event channel lock for sending events
>>> On 16.06.15 at 11:34, <david.vrabel@xxxxxxxxxx> wrote: > On 16/06/15 10:18, Jan Beulich wrote: >>>>> On 15.06.15 at 17:48, <david.vrabel@xxxxxxxxxx> wrote: >>> @@ -609,21 +662,18 @@ int evtchn_send(struct domain *ld, unsigned int lport) >>> struct domain *rd; >>> int rport, ret = 0; >>> >>> - spin_lock(&ld->event_lock); >>> - >>> - if ( unlikely(!port_is_valid(ld, lport)) ) >>> - { >>> - spin_unlock(&ld->event_lock); >>> + if ( unlikely(lport >= read_atomic(&ld->valid_evtchns)) ) >>> return -EINVAL; >>> - } >> >> I don't think you really want to open code part of port_is_valid() >> (and avoid other parts of it) here? Or if really so, I think a comment >> should be added to explain it. > > The ld->valid_evtchns is the only field we can safely check without > ld->event_lock. > > We do check the channel state and the code that set this state uses the > full port_is_valid() call. I'll add a comment. Hmm, port_is_valid() also checks d->max_evtchns and d->evtchn. The latter is involved in evtchn_from_port(), so I can't see how you checking the channel's state _afterwards_ can leverage that whoever set this state did a full check. Another question is whether with the ->valid_evtchns check the ->evtchn check is necessary at all anymore. (The check against ->max_evtchns isn't wrong with the lock not held, i.e. could only end up being too strict, and hence the open coding would then still be questionable.) Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |