Hi,
On 03/10/2019 18:48, Stefano Stabellini wrote:
On Thu, 3 Oct 2019, Julien Grall wrote:
Hi Stefano,
On 02/10/2019 23:26, Stefano Stabellini wrote:
On Wed, 2 Oct 2019, Julien Grall wrote:
That was my reflection on whether it would be a good idea or a bad idea
to have a SERROR check on the fiq hypervisor entries. Not necessarely in
this patch. Probably not in this patch.
If you receive a FIQ exception on Arm64, then you are already doomed because
the hypervisor will crash (see do_bad_mode()). So receiving the SError is
going to be your last concern here.
I realize that Xen is doomed anyway, but if I was the user, I would
still want to know about the SError: it is not going to save the
platform in any way but it might make me realize there is something
wrong with the guest configuration (in addition to the FIQ problem.)
This is not something I am going to look at in the near future. There are more
concerning problem in arch/arm*/entry.S. Although, patches are welcomed.
Cheers,
--
Julien Grall
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel