[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3 10/15] xen/arm: Data abort exception (R/W) mem_events.
On Mon, Sep 1, 2014 at 11:07 PM, Julien Grall <julien.grall@xxxxxxxxxx> wrote: Hello Tamas, Ack.
Ack. [..] Ack.
Ack. [..] Yes, we need to track if a violation happened as a result of mem-access restricting the pte permission or otherwise. From that perspective there is no difference if the violation happened on a large or 4k page. From a tracing perspective it makes more sense to have more granularity (4k pages only) so I do shatter the large pages when setting mem-access permissions.
You are right, I confused it with p2m_set_mem_access.
We can certainly adjust it here if required, this is mainly just copy-paste from x86.
Ack.
Ack.
That would make sense, abstract it out into common mem_access code.
Honestly, I tried to wrap my head around apply_p2m_changes and it is already quite complex. While I see I could apply the type/access permissions with it over a range, I'm not entirely sure how I would make it force-shatter all large pages. It was just easier (for now) to do it manually.
This is the same approach as in x86. [..] Right, I missed page additions with default_access. With so few software programmable bits available in the PTE, we have no other choice but to store the permission settings separately. I just need to make sure that the radix tree is updated when a pte is added/removed.
Ack.
The radix tree returns an int but I guess could do that.
I figured for the sake of completeness it would make sense. I really only use the PERMISSION values so the rest could be removed. Thanks, Tamas Regards,
_______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |