Re: [PATCH] Updates to Xen hypercall preemption

From: Per Bilse
Date: Wed Jun 21 2023 - 15:05:58 EST


On 6/21/2023 5:27 PM, Andy Lutomirski wrote:
> This code is a horrible mess, with and without your patches. I think that, if this were new, there's no way it would make it in to the kernel.

Hi Andy, and many thanks for your frank assessments. Generally, this
is indeed somewhat old code, first introduced in 2015 by way of commit
fdfd811ddde3. There's more information in the notes to that, and it's
maybe worth noting that we're not trying to introduce anything new,
merely fix what various commits since then have broken.

> I propose one of two rather radical changes:
>
> 1. (preferred) Just delete all of it and make support for dom0 require either full or dynamic preempt, and make a dynamic preempt kernel booting as dom0 run as full preempt.

Personally I think that's a good idea; a machine so limited in resources
that a fully preemptible dom0 kernel would be a problem wouldn't work as
a Xen server anyway. Having said that, what to do about this isn't
really in my hands; the issues came to light because the kernel for
Citrix's XenServer product is being upgraded, and it was considered in
everybody's interest to upstream the fixes. I'll see what I can do.

Best,

-- Per