Searched hist:"5 b727a3b0158a129827c21ce3bfb0ba997e8ddd0" (Results 1 – 1 of 1) sorted by relevance
/openbmc/linux/arch/x86/mm/ |
H A D | fault.c | diff 5b727a3b0158a129827c21ce3bfb0ba997e8ddd0 Wed Jan 30 06:34:11 CST 2008 Jeremy Fitzhardinge <jeremy@goop.org> x86: ignore spurious faults
When changing a kernel page from RO->RW, it's OK to leave stale TLB entries around, since doing a global flush is expensive and they pose no security problem. They can, however, generate a spurious fault, which we should catch and simply return from (which will have the side-effect of reloading the TLB to the current PTE).
This can occur when running under Xen, because it frequently changes kernel pages from RW->RO->RW to implement Xen's pagetable semantics. It could also occur when using CONFIG_DEBUG_PAGEALLOC, since it avoids doing a global TLB flush after changing page permissions.
Signed-off-by: Jeremy Fitzhardinge <jeremy@xensource.com> Cc: Harvey Harrison <harvey.harrison@gmail.com> Signed-off-by: Ingo Molnar <mingo@elte.hu> Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
|