[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH RFC for-4.13 03/10] xen/arm: traps: Rework entry/exit from the guest path



Hi,

On 03/10/2019 18:48, Stefano Stabellini wrote:
On Thu, 3 Oct 2019, Julien Grall wrote:
Hi Stefano,

On 02/10/2019 23:26, Stefano Stabellini wrote:
On Wed, 2 Oct 2019, Julien Grall wrote:
That was my reflection on whether it would be a good idea or a bad idea
to have a SERROR check on the fiq hypervisor entries. Not necessarely in
this patch. Probably not in this patch.

If you receive a FIQ exception on Arm64, then you are already doomed because
the hypervisor will crash (see do_bad_mode()). So receiving the SError is
going to be your last concern here.

I realize that Xen is doomed anyway, but if I was the user, I would
still want to know about the SError: it is not going to save the
platform in any way but it might make me realize there is something
wrong with the guest configuration (in addition to the FIQ problem.)

This is not something I am going to look at in the near future. There are more concerning problem in arch/arm*/entry.S. Although, patches are welcomed.

Cheers,

--
Julien Grall

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.