]> xenbits.xensource.com Git - people/larsk/xen.git/commitdiff
xen/arm: optee: check for preemption while freeing shared buffers
authorVolodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Wed, 18 Sep 2019 18:50:56 +0000 (18:50 +0000)
committerJulien Grall <julien.grall@arm.com>
Mon, 23 Sep 2019 10:23:41 +0000 (11:23 +0100)
We can check for hypercall_preempt_check() in the loop inside
optee_relinquish_resources() to increase hypervisor responsiveness in
case if preemption is required.

Signed-off-by: Volodymyr Babchuk <volodymyr_babchuk@epam.com>
Acked-by: Julien Grall <julien.grall@arm.com>
xen/arch/arm/tee/optee.c

index d30ea2d1acc940d881259b5416baa65a347ea105..4a31ab6088dd833ccf469a826ed9c724fef7e4b5 100644 (file)
@@ -633,17 +633,14 @@ static int optee_relinquish_resources(struct domain *d)
     list_for_each_entry_safe( shm_rpc, shm_rpc_tmp, &ctx->shm_rpc_list, list )
         free_shm_rpc(ctx, shm_rpc->cookie);
 
-    if ( hypercall_preempt_check() )
-        return -ERESTART;
-
-    /*
-     * TODO: Guest can pin up to MAX_TOTAL_SMH_BUF_PG pages and all of
-     * them will be put in this loop. It is worth considering to
-     * check for preemption inside the loop.
-     */
     list_for_each_entry_safe( optee_shm_buf, optee_shm_buf_tmp,
                               &ctx->optee_shm_buf_list, list )
+    {
+        if ( hypercall_preempt_check() )
+            return -ERESTART;
+
         free_optee_shm_buf(ctx, optee_shm_buf->cookie);
+    }
 
     if ( hypercall_preempt_check() )
         return -ERESTART;