Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4023586ybx; Mon, 4 Nov 2019 06:37:59 -0800 (PST) X-Google-Smtp-Source: APXvYqy5ciu2lPYNVpephDMeKasNGVJzG6Nnofb+ICqm3HYIxXtbCqd2JQatdh3sWfE1SX6RL4oY X-Received: by 2002:a17:906:6d8a:: with SMTP id h10mr6396962ejt.224.1572878278989; Mon, 04 Nov 2019 06:37:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572878278; cv=none; d=google.com; s=arc-20160816; b=XoO//+EognU4slav9rE1KMf+WhSQ5iwJGAZjA9rpiytp/amAZ0iKbaSVb98BDqTNLH d3H47l5wEKfm54xEQeiBL1qBJ1d2oqTqd1FxtDFsjW8XiE1KHiIxsl/CY50eqGcIcfnO MKkYzIcHuOvESbIS7nypZW4l0aiRpowH0VaVNtwGLcH+/QcHTFsLclO4JEzI9JcIYrec LjtCWCPZr6LROCSjdlO7/wsHZm/tq1D5uev4f9c93OmkdZ5GpVh4I9kGWCjexJr8oO0h R9h4JfxKshf+KZ4t/+jik4qGIketSoLaooD0u/C7viBEoAs+nMgrdFQdXNnWIplsUnHB I2Ng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=yOe9XdX8wHoElSiWkraAdC+ylLO5OhsI8xqQt5iaW8M=; b=Cx6EBnM+sN986sL/h04eBXxKtWDpH3zzVr2jm/Z+f8rTRiIszyfy9faELaFFzB0Dkl WmHNgaRN312ceDKNjmI/80g/IAOf/8HHPBz0ZKoq2HNZ/06R1qFrQPPjuH05tey5LM+a BFrufmd3fTPz//E9XlawfNtRxPRwlDLr0hwyi1cKdKyMMQCiuBGgBLVtqpJ1bPQxSaNi YHwLqFXagwDn0Df4l/hQLLyujEfvm84h3Rzmud9whja17pUnXdw/EuvKdVcZlu8lMeSq QWxHcLA9LH+KgrV8BSGh4vDsQAua2tCsnXOa525KH4KgF0tMIczHAo48avV9DsUtzBPu XvLg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u12si8455685eda.319.2019.11.04.06.37.36; Mon, 04 Nov 2019 06:37:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728781AbfKDOfG (ORCPT + 99 others); Mon, 4 Nov 2019 09:35:06 -0500 Received: from mx2.suse.de ([195.135.220.15]:51992 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728416AbfKDOfG (ORCPT ); Mon, 4 Nov 2019 09:35:06 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 8DE98AD17; Mon, 4 Nov 2019 14:35:04 +0000 (UTC) Subject: Re: [Xen-devel] [PATCH] xen/events: remove event handling recursion detection To: Juergen Gross Cc: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, Stefano Stabellini , Boris Ostrovsky References: <20191104135812.2314-1-jgross@suse.com> From: Jan Beulich Message-ID: <40cba9d9-24b0-3141-4ba8-02e03049f1bf@suse.com> Date: Mon, 4 Nov 2019 15:35:09 +0100 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: <20191104135812.2314-1-jgross@suse.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04.11.2019 14:58, Juergen Gross wrote: > __xen_evtchn_do_upcall() contains guards against being called > recursively. This mechanism was introduced in the early pvops times > (kernel 2.6.26) when there were still Xen versions around not honoring > disabled interrupts for sending events to pv guests. > > This was changed in Xen 3.0, which is much older than any Xen version > supported by the kernel, so the recursion detection can be removed. Would you mind pointing out which exact change(s) this was(were)? It had always been my understanding that the recursion detection was mainly to guard against drivers re-enabling interrupts transiently in their handlers (which in turn may no longer be an issue in modern Linux kernels). Jan