[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v4] vm_event: Implement ARM SMC events
Hi Tamas, On 16/09/2016 10:43, Tamas K Lengyel wrote: The ARM SMC instructions are already configured to trap to Xen by default. In this patch we allow a user-space process in a privileged domain to receive notification of when such event happens through the vm_event subsystem by introducing the PRIVILEGED_CALL type. The intended use-case for this feature is for a monitor application to be able insert tap-points into the domU kernel-code. For this task only unconditional SMC instruction should be used. Signed-off-by: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx> Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx> Acked-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> --- Cc: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx> Cc: Julien Grall <julien.grall@xxxxxxx> v4: Style fixes Note: previous discussion around this patch proposed filtering SMCs with failed condition checks. As that patch is yet-to-be implemented and the 4.8 code-freeze rapidly approaching I would like this patch to get included. In this patch a proper warning is placed in the public header for potential users not to rely on SMCs with failed condition checks being trapped. As the intended use-case for this feature doesn't use conditional SMCs this warning should be sufficient. Hardware that does issue events for SMCs with failed condition checks doesn't pose a problem for a monitor application in any way. The xen-access test tool illustrates how SMCs issued by the guest can be safely handled for all cases. I will let Stefano decides whether we should include this patch as it in Xen 4.8. Regards, -- Julien Grall _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |