|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2] arm/mem_access: don't reinject stage 2 access exceptions
Hello Andrew, On 27/09/2016 17:07, Andrew Cooper wrote: On 28/09/2016 01:01, Julien Grall wrote:Hi Tamas, On 03/08/2016 11:13, Tamas K Lengyel wrote:The only way a guest may trip with stage 2 access violation is if mem_access is or was in-use, so reinjecting these exceptions to the guest is never required. Requested-by: Julien Grall <julien.grall@xxxxxxx> Signed-off-by: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx>Reviewed-by: Julien Grall <julien.grall@xxxxxxx> Regards, p2m_mem_access_check returns a boolean to indicate whether a fault is coming from memaccess or not. You may receive a spurious permission fault if the page table have been modified between the time you receive the data abort and the time you try to handle the fault in memaccess. So the ASSERT would be wrong here. The best solution is to return to the guest vCPU and retry the instruction. Regards, -- Julien Grall _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |