|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] arm/mem_access: properly handle traps caused by no-longer current settings
Hello Tamas, Thank you for taking care of this bug. On 02/08/2016 19:53, Tamas K Lengyel wrote: When mem_access settings change, the active vCPUs may still cause a violation until the TLB gets flushed. Instead of just reinjecting the violation to the guest, in this patch we direct the vCPU to retry the access where appropriate or we crash the domain where the mem_access settings are corrupted. With this patch p2m_mem_access_check will always return false. So I am not sure why you want to return in p2m_mem_access_check. It would be easier to do: rc = p2m_mem_access_check(gpa, gva, npfec); if (!rc) return; by p2m_mem_access_check(gpa, gva, npfec); return; in both do_trap_instr_abort_guest and do_trap_data_abort_guest.This would also helps to fallback on another permission check if in the future we decide to use permission for other reasons. Or is there any reason you may want to inject a data abort to the guest if memaccess has failed (i.e return true)? Regards, -- Julien Grall _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |