On Fri, Apr 10, 2015 at 17:03:26, Andrew Cooper wrote:
> Are you perhaps looking for something similar to Intel #VE support?
Yes, in that we want a way to notify a guest that it has made an access that 
violated a stage-2 / EPT permission.  However, for our purposes a trap into the 
hypervisor followed by injection of a virtual interrupt into the guest is 
acceptable; we don't require the interrupt to be directly delivered to the 
guest.

> (although I guess you are looking at ARM rather than x86)
Yes, my email address is a giveaway ;)

> It is not safe to always re-inject back into the vcpu, especially if
> the permission changes were around the guest kernel stack, but a
> restricted subset ought to be safe to bounce straight in.
The permission changes will be applied only to DMA buffers, rather than to 
anything the guest kernel itself needs to touch - so should be safe to directly 
re-inject.


-- IMPORTANT NOTICE: The contents of this email and any attachments are 
confidential and may also be privileged. If you are not the intended recipient, 
please notify the sender immediately and do not disclose the contents to any 
other person, use it for any purpose, or store or copy the information in any 
medium.  Thank you.

ARM Limited, Registered office 110 Fulbourn Road, Cambridge CB1 9NJ, Registered 
in England & Wales, Company No:  2557590
ARM Holdings plc, Registered office 110 Fulbourn Road, Cambridge CB1 9NJ, 
Registered in England & Wales, Company No:  2548782


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to