From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Vrabel Subject: [PATCHv1 0/3]: xen: voluntary preemption for privcmd hypercalls Date: Tue, 11 Feb 2014 19:19:09 +0000 Message-ID: <1392146352-16381-1-git-send-email-david.vrabel@citrix.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: xen-devel@lists.xen.org Cc: Andrew Cooper , Boris Ostrovsky , Stefano Stabellini , David Vrabel List-Id: xen-devel@lists.xenproject.org This series adds a voluntary preemption point into hypercalls issued by privcmd. Without this, long running hypercalls will prevent the task from being scheduled (potentially for several seconds) which may trigger the kernel's soft lockup detector. I've added a stub is_preemptible_hypercall() for ARM but would appreciate a working implementation. Checking whether the PC is within the privcmd_hypercall function would probably do. David