From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 88983C433EF for ; Fri, 15 Apr 2022 08:45:48 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1351455AbiDOIsO (ORCPT ); Fri, 15 Apr 2022 04:48:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58632 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1351533AbiDOIrf (ORCPT ); Fri, 15 Apr 2022 04:47:35 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 803F917E0B for ; Fri, 15 Apr 2022 01:45:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1650012306; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=UbLS45MxOVAnr1j0DEMaqGL/RKjN2qTV3wn5wivIOzo=; b=CI5pICF/TbWjtLgGwnXpW+TnNjBaJSfJw6DNHeu1RY5h7RZGM942rggQ1wkMuYrg+hkRA8 MUNjq6TBi5onrHA4v6enlfCY//orAUP79d1BXp+I51pUboEJ8Iuh610cIilYZUX9N9xwJ+ /Nx0bLUSqU5N823m8O1rQrJztt22ICQ= Received: from mail-wm1-f69.google.com (mail-wm1-f69.google.com [209.85.128.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-571-ncjfo2W3Ob6oRpM3uj8-BQ-1; Fri, 15 Apr 2022 04:45:05 -0400 X-MC-Unique: ncjfo2W3Ob6oRpM3uj8-BQ-1 Received: by mail-wm1-f69.google.com with SMTP id i184-20020a1c3bc1000000b0038e4c5968b5so5816957wma.0 for ; Fri, 15 Apr 2022 01:45:05 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=UbLS45MxOVAnr1j0DEMaqGL/RKjN2qTV3wn5wivIOzo=; b=Qqggi41n124e3aD404HRKipoglPRfG/i/09QQm7WLIX1ne+pQTw0zX+Vj34ytl1kBl tPiyeFpL78X5nfgRGV0d5NVJW9qah2eT/GK+S/dx4Q0+xOM2m7qyiiIZmP29/FuIS3Ml n+7UgOi/e1DyXUbEDOPbVH1AoJ8Ot8iJMPSpjGEo/LRn5qoPwF1AGHGyw74dbodlqOgj jayQcH63RrIpro6cMt8jw9BQwulNUNS+psXKikGZ5IDFYTxkmetm+1/e3FaQAQiAg0s4 ARdRfsCBd5k1K3+pyV5EFDjJtxjZu5OZuyCSD38HZzbwKqjOo/Rdbh85Vck26YZjP9JB 8aCw== X-Gm-Message-State: AOAM5318PNA7/o0kc5pOD8EQga7UPWzve++pbssmhZiehcBVNl0Jh41E Zy4Vq99GKWpl9UzQLUNcZB4Lw5MSGg/ZkrVbXJ8M1tf9mbG+S7KZFU6nvf50wTjMuOiZ9zVfTVm UA4xdhhaoj5zJlj+5wYv2KNhq X-Received: by 2002:a05:600c:4f88:b0:391:e34e:ca66 with SMTP id n8-20020a05600c4f8800b00391e34eca66mr768126wmq.16.1650012303795; Fri, 15 Apr 2022 01:45:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxtZ3CsHMRHFsioNGpLaugIquRbj8GlmtB0g6ZbYpJjZi2MjwNik9eBG9L3OBpQkHXDtDgk7g== X-Received: by 2002:a05:600c:4f88:b0:391:e34e:ca66 with SMTP id n8-20020a05600c4f8800b00391e34eca66mr768102wmq.16.1650012303495; Fri, 15 Apr 2022 01:45:03 -0700 (PDT) Received: from redhat.com ([2.53.138.98]) by smtp.gmail.com with ESMTPSA id f8-20020a5d64c8000000b0020784359295sm5084468wri.54.2022.04.15.01.45.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Apr 2022 01:45:02 -0700 (PDT) Date: Fri, 15 Apr 2022 04:44:58 -0400 From: "Michael S. Tsirkin" To: Oleksandr Tyshchenko Cc: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, virtualization@lists.linux-foundation.org, Oleksandr Tyshchenko , Stefano Stabellini , Boris Ostrovsky , Juergen Gross , Julien Grall , Bertrand Marquis , Wei Chen , Henry Wang , Kaly Xin , Jiamei Xie , Alex =?iso-8859-1?Q?Benn=E9e?= Subject: Re: [RFC PATCH 0/6] virtio: Solution to restrict memory access under Xen using xen-virtio DMA ops layer Message-ID: <20220415044225-mutt-send-email-mst@kernel.org> References: <1649963973-22879-1-git-send-email-olekstysh@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1649963973-22879-1-git-send-email-olekstysh@gmail.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 14, 2022 at 10:19:27PM +0300, Oleksandr Tyshchenko wrote: > From: Oleksandr Tyshchenko > > Hello all. > > The purpose of this RFC patch series is to add support for restricting memory access under Xen using specific > grant table based DMA ops layer. Patch series is based on Juergen Gross’ initial work [1] which implies using > grant references instead of raw guest physical addresses (GPA) for the virtio communications (some kind of > the software IOMMU). > > The high level idea is to create new Xen’s grant table based DMA ops layer for the guest Linux whose main > purpose is to provide a special 64-bit DMA address which is formed by using the grant reference (for a page > to be shared with the backend) with offset and setting the highest address bit (this is for the backend to > be able to distinguish grant ref based DMA address from normal GPA). For this to work we need the ability > to allocate contiguous (consecutive) grant references for multi-page allocations. And the backend then needs > to offer VIRTIO_F_ACCESS_PLATFORM and VIRTIO_F_VERSION_1 feature bits (it must support virtio-mmio modern > transport for 64-bit addresses in the virtqueue). I'm not enough of a xen expert to review this, and I didn't get all patches, but I'm very happy to see that approach being taken. VIRTIO_F_ACCESS_PLATFORM and VIRTIO_F_VERSION_1 are exactly the way to declare not all of memory is accessible. Thanks! > Xen's grant mapping mechanism is the secure and safe solution to share pages between domains which proven > to work and works for years (in the context of traditional Xen PV drivers for example). So far, the foreign > mapping is used for the virtio backend to map and access guest memory. With the foreign mapping, the backend > is able to map arbitrary pages from the guest memory (or even from Dom0 memory). And as the result, the malicious > backend which runs in a non-trusted domain can take advantage of this. Instead, with the grant mapping > the backend is only allowed to map pages which were explicitly granted by the guest before and nothing else. > According to the discussions in various mainline threads this solution would likely be welcome because it > perfectly fits in the security model Xen provides. > > What is more, the grant table based solution requires zero changes to the Xen hypervisor itself at least > with virtio-mmio and DT (in comparison, for example, with "foreign mapping + virtio-iommu" solution which would > require the whole new complex emulator in hypervisor in addition to new functionality/hypercall to pass IOVA > from the virtio backend running elsewhere to the hypervisor and translate it to the GPA before mapping into > P2M or denying the foreign mapping request if no corresponding IOVA-GPA mapping present in the IOMMU page table > for that particular device). We only need to update toolstack to insert a new "xen,dev-domid" property to > the virtio-mmio device node when creating a guest device-tree (this is an indicator for the guest to use grants > and the ID of Xen domain where the corresponding backend resides, it is used as an argument to the grant mapping > APIs). It worth mentioning that toolstack patch is based on non upstreamed yet “Virtio support for toolstack > on Arm” series which is on review now [2]. > > Please note the following: > - Patch series only covers Arm and virtio-mmio (device-tree) for now. To enable the restricted memory access > feature on Arm the following options should be set: > CONFIG_XEN_VIRTIO = y > CONFIG_XEN_HVM_VIRTIO_GRANT = y > - Some callbacks in xen-virtio DMA ops layer (map_sg/unmap_sg, etc) are not implemented yet as they are not > needed/used in the first prototype > > Patch series is rebased on Linux 5.18-rc2 tag and tested on Renesas Salvator-X board + H3 ES3.0 SoC (Arm64) > with standalone userspace (non-Qemu) virtio-mmio based virtio-disk backend running in Driver domain and Linux > guest running on existing virtio-blk driver (frontend). No issues were observed. Guest domain 'reboot/destroy' > use-cases work properly. I have also tested other use-cases such as assigning several virtio block devices > or a mix of virtio and Xen PV block devices to the guest. > > 1. Xen changes located at (last patch): > https://github.com/otyshchenko1/xen/commits/libxl_virtio_next > 2. Linux changes located at: > https://github.com/otyshchenko1/linux/commits/virtio_grant5 > 3. virtio-disk changes located at: > https://github.com/otyshchenko1/virtio-disk/commits/virtio_grant > > Any feedback/help would be highly appreciated. > > [1] https://www.youtube.com/watch?v=IrlEdaIUDPk > [2] https://lore.kernel.org/xen-devel/1649442065-8332-1-git-send-email-olekstysh@gmail.com/ > > Juergen Gross (2): > xen/grants: support allocating consecutive grants > virtio: add option to restrict memory access under Xen > > Oleksandr Tyshchenko (4): > dt-bindings: xen: Add xen,dev-domid property description for > xen-virtio layer > virtio: Various updates to xen-virtio DMA ops layer > arm/xen: Introduce xen_setup_dma_ops() > arm/xen: Assign xen-virtio DMA ops for virtio devices in Xen guests > > .../devicetree/bindings/virtio/xen,dev-domid.yaml | 39 +++ > arch/arm/include/asm/xen/xen-ops.h | 1 + > arch/arm/mm/dma-mapping.c | 5 +- > arch/arm/xen/enlighten.c | 11 + > arch/arm64/include/asm/xen/xen-ops.h | 1 + > arch/arm64/mm/dma-mapping.c | 5 +- > arch/x86/mm/init.c | 15 + > arch/x86/mm/mem_encrypt.c | 5 - > arch/x86/xen/Kconfig | 9 + > drivers/xen/Kconfig | 20 ++ > drivers/xen/Makefile | 1 + > drivers/xen/grant-table.c | 238 +++++++++++++-- > drivers/xen/xen-virtio.c | 335 +++++++++++++++++++++ > include/xen/arm/xen-ops.h | 20 ++ > include/xen/grant_table.h | 4 + > include/xen/xen-ops.h | 13 + > 16 files changed, 679 insertions(+), 43 deletions(-) > create mode 100644 Documentation/devicetree/bindings/virtio/xen,dev-domid.yaml > create mode 100644 arch/arm/include/asm/xen/xen-ops.h > create mode 100644 arch/arm64/include/asm/xen/xen-ops.h > create mode 100644 drivers/xen/xen-virtio.c > create mode 100644 include/xen/arm/xen-ops.h > > -- > 2.7.4 From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from smtp3.osuosl.org (smtp3.osuosl.org [140.211.166.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id C6284C433FE for ; Fri, 15 Apr 2022 08:45:14 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 5AD2761096; Fri, 15 Apr 2022 08:45:14 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id omY7XH7h9C83; Fri, 15 Apr 2022 08:45:13 +0000 (UTC) Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56]) by smtp3.osuosl.org (Postfix) with ESMTPS id 9496260B10; Fri, 15 Apr 2022 08:45:12 +0000 (UTC) Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id 5FCCAC002F; Fri, 15 Apr 2022 08:45:12 +0000 (UTC) Received: from smtp2.osuosl.org (smtp2.osuosl.org [IPv6:2605:bc80:3010::133]) by lists.linuxfoundation.org (Postfix) with ESMTP id 2B3F6C002C for ; Fri, 15 Apr 2022 08:45:11 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp2.osuosl.org (Postfix) with ESMTP id 0910F40B3C for ; Fri, 15 Apr 2022 08:45:11 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Authentication-Results: smtp2.osuosl.org (amavisd-new); dkim=pass (1024-bit key) header.d=redhat.com Received: from smtp2.osuosl.org ([127.0.0.1]) by localhost (smtp2.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gdRlR4QeDeyd for ; Fri, 15 Apr 2022 08:45:10 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.8.0 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by smtp2.osuosl.org (Postfix) with ESMTPS id E4B6B40952 for ; Fri, 15 Apr 2022 08:45:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1650012308; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=UbLS45MxOVAnr1j0DEMaqGL/RKjN2qTV3wn5wivIOzo=; b=FZBrj0zYqXHCSeoH7Sqz7CZB8t5yctvl51GwCdg2yHU/lVBymjlk2+QOH+P2bi37Jg30/z EzHznJXA/KS7DYg7Wyidtd3xEt8DUTyZYF3wE5W2J3hwAJtkUui6FttJdEFWHVJIY8Xyh9 n39YoLXesr8Y2DoS48o48NednVTs9VM= Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-28-C0SFGSSLPe65rTlAaU44ZQ-1; Fri, 15 Apr 2022 04:45:07 -0400 X-MC-Unique: C0SFGSSLPe65rTlAaU44ZQ-1 Received: by mail-wm1-f72.google.com with SMTP id v62-20020a1cac41000000b0038cfe6edf3fso5801005wme.5 for ; Fri, 15 Apr 2022 01:45:07 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=UbLS45MxOVAnr1j0DEMaqGL/RKjN2qTV3wn5wivIOzo=; b=hxf8KomtDTpKJ/8D9mzpUwAGgWctcjxUDx4EwuIxbZUx8tGkFyCjrrUKb5p53MCKij NlwHjApc1RdZUc21k6U7dPkDALPF0OBNW418OIRf5qz9cl3xI092iR4CW3PslGtIT/1S JsLwpYe6BXuIaeWbxkFbkCAVOkFF5aX/A4HedYQ+1gGmRjUILf3bDPeGxKa35vAl6tki Inz0ES6nzyi5FovZEnylOHWHqI42HkXCufl/KurHx+F5ojGVTEAFbhnADJvo+L7VU+UV IdlnfFUmXEidgpdzZhFPdtOQAiCLEUjn5ctL5rVxiH+sTZLXTgBrBsEgV2iNzGGSSHfL uubw== X-Gm-Message-State: AOAM5338lNPEcJQ+2/Oz5r2A3ymSF8brtqfeWxXmVNhqzDiLRWHRhKQE 21Sdl+Vug9x99h5O5pMifRcsD0BMfiSZyl/oApPBoFmpYGs9iXzxLRFmSF2fSGF6DlavYn4Q2c7 Knkzmz3z1KPUZj1FRfCxS91uYtbOTutsy6huxuwji9w== X-Received: by 2002:a05:600c:4f88:b0:391:e34e:ca66 with SMTP id n8-20020a05600c4f8800b00391e34eca66mr768130wmq.16.1650012303796; Fri, 15 Apr 2022 01:45:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxtZ3CsHMRHFsioNGpLaugIquRbj8GlmtB0g6ZbYpJjZi2MjwNik9eBG9L3OBpQkHXDtDgk7g== X-Received: by 2002:a05:600c:4f88:b0:391:e34e:ca66 with SMTP id n8-20020a05600c4f8800b00391e34eca66mr768102wmq.16.1650012303495; Fri, 15 Apr 2022 01:45:03 -0700 (PDT) Received: from redhat.com ([2.53.138.98]) by smtp.gmail.com with ESMTPSA id f8-20020a5d64c8000000b0020784359295sm5084468wri.54.2022.04.15.01.45.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Apr 2022 01:45:02 -0700 (PDT) Date: Fri, 15 Apr 2022 04:44:58 -0400 From: "Michael S. Tsirkin" To: Oleksandr Tyshchenko Subject: Re: [RFC PATCH 0/6] virtio: Solution to restrict memory access under Xen using xen-virtio DMA ops layer Message-ID: <20220415044225-mutt-send-email-mst@kernel.org> References: <1649963973-22879-1-git-send-email-olekstysh@gmail.com> MIME-Version: 1.0 In-Reply-To: <1649963973-22879-1-git-send-email-olekstysh@gmail.com> Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=mst@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Disposition: inline Cc: Juergen Gross , Stefano Stabellini , Julien Grall , Wei Chen , Kaly Xin , linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org, Henry Wang , Oleksandr Tyshchenko , Jiamei Xie , xen-devel@lists.xenproject.org, Boris Ostrovsky , Bertrand Marquis , linux-arm-kernel@lists.infradead.org X-BeenThere: virtualization@lists.linux-foundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Linux virtualization List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: virtualization-bounces@lists.linux-foundation.org Sender: "Virtualization" T24gVGh1LCBBcHIgMTQsIDIwMjIgYXQgMTA6MTk6MjdQTSArMDMwMCwgT2xla3NhbmRyIFR5c2hj aGVua28gd3JvdGU6Cj4gRnJvbTogT2xla3NhbmRyIFR5c2hjaGVua28gPG9sZWtzYW5kcl90eXNo Y2hlbmtvQGVwYW0uY29tPgo+IAo+IEhlbGxvIGFsbC4KPiAKPiBUaGUgcHVycG9zZSBvZiB0aGlz IFJGQyBwYXRjaCBzZXJpZXMgaXMgdG8gYWRkIHN1cHBvcnQgZm9yIHJlc3RyaWN0aW5nIG1lbW9y eSBhY2Nlc3MgdW5kZXIgWGVuIHVzaW5nIHNwZWNpZmljCj4gZ3JhbnQgdGFibGUgYmFzZWQgRE1B IG9wcyBsYXllci4gUGF0Y2ggc2VyaWVzIGlzIGJhc2VkIG9uIEp1ZXJnZW4gR3Jvc3PigJkgaW5p dGlhbCB3b3JrIFsxXSB3aGljaCBpbXBsaWVzIHVzaW5nCj4gZ3JhbnQgcmVmZXJlbmNlcyBpbnN0 ZWFkIG9mIHJhdyBndWVzdCBwaHlzaWNhbCBhZGRyZXNzZXMgKEdQQSkgZm9yIHRoZSB2aXJ0aW8g Y29tbXVuaWNhdGlvbnMgKHNvbWUga2luZCBvZgo+IHRoZSBzb2Z0d2FyZSBJT01NVSkuCj4gCj4g VGhlIGhpZ2ggbGV2ZWwgaWRlYSBpcyB0byBjcmVhdGUgbmV3IFhlbuKAmXMgZ3JhbnQgdGFibGUg YmFzZWQgRE1BIG9wcyBsYXllciBmb3IgdGhlIGd1ZXN0IExpbnV4IHdob3NlIG1haW4KPiBwdXJw b3NlIGlzIHRvIHByb3ZpZGUgYSBzcGVjaWFsIDY0LWJpdCBETUEgYWRkcmVzcyB3aGljaCBpcyBm b3JtZWQgYnkgdXNpbmcgdGhlIGdyYW50IHJlZmVyZW5jZSAoZm9yIGEgcGFnZQo+IHRvIGJlIHNo YXJlZCB3aXRoIHRoZSBiYWNrZW5kKSB3aXRoIG9mZnNldCBhbmQgc2V0dGluZyB0aGUgaGlnaGVz dCBhZGRyZXNzIGJpdCAodGhpcyBpcyBmb3IgdGhlIGJhY2tlbmQgdG8KPiBiZSBhYmxlIHRvIGRp c3Rpbmd1aXNoIGdyYW50IHJlZiBiYXNlZCBETUEgYWRkcmVzcyBmcm9tIG5vcm1hbCBHUEEpLiBG b3IgdGhpcyB0byB3b3JrIHdlIG5lZWQgdGhlIGFiaWxpdHkKPiB0byBhbGxvY2F0ZSBjb250aWd1 b3VzIChjb25zZWN1dGl2ZSkgZ3JhbnQgcmVmZXJlbmNlcyBmb3IgbXVsdGktcGFnZSBhbGxvY2F0 aW9ucy4gQW5kIHRoZSBiYWNrZW5kIHRoZW4gbmVlZHMKPiB0byBvZmZlciBWSVJUSU9fRl9BQ0NF U1NfUExBVEZPUk0gYW5kIFZJUlRJT19GX1ZFUlNJT05fMSBmZWF0dXJlIGJpdHMgKGl0IG11c3Qg c3VwcG9ydCB2aXJ0aW8tbW1pbyBtb2Rlcm4KPiB0cmFuc3BvcnQgZm9yIDY0LWJpdCBhZGRyZXNz ZXMgaW4gdGhlIHZpcnRxdWV1ZSkuCgpJJ20gbm90IGVub3VnaCBvZiBhIHhlbiBleHBlcnQgdG8g cmV2aWV3IHRoaXMsIGFuZCBJIGRpZG4ndCBnZXQKYWxsIHBhdGNoZXMsIGJ1dCBJJ20gdmVyeSBo YXBweSB0byBzZWUgdGhhdCBhcHByb2FjaCBiZWluZwp0YWtlbi4gVklSVElPX0ZfQUNDRVNTX1BM QVRGT1JNIGFuZCBWSVJUSU9fRl9WRVJTSU9OXzEgYXJlCmV4YWN0bHkgdGhlIHdheSB0byBkZWNs YXJlIG5vdCBhbGwgb2YgbWVtb3J5IGlzIGFjY2Vzc2libGUuClRoYW5rcyEKCj4gWGVuJ3MgZ3Jh bnQgbWFwcGluZyBtZWNoYW5pc20gaXMgdGhlIHNlY3VyZSBhbmQgc2FmZSBzb2x1dGlvbiB0byBz aGFyZSBwYWdlcyBiZXR3ZWVuIGRvbWFpbnMgd2hpY2ggcHJvdmVuCj4gdG8gd29yayBhbmQgd29y a3MgZm9yIHllYXJzIChpbiB0aGUgY29udGV4dCBvZiB0cmFkaXRpb25hbCBYZW4gUFYgZHJpdmVy cyBmb3IgZXhhbXBsZSkuIFNvIGZhciwgdGhlIGZvcmVpZ24KPiBtYXBwaW5nIGlzIHVzZWQgZm9y IHRoZSB2aXJ0aW8gYmFja2VuZCB0byBtYXAgYW5kIGFjY2VzcyBndWVzdCBtZW1vcnkuIFdpdGgg dGhlIGZvcmVpZ24gbWFwcGluZywgdGhlIGJhY2tlbmQKPiBpcyBhYmxlIHRvIG1hcCBhcmJpdHJh cnkgcGFnZXMgZnJvbSB0aGUgZ3Vlc3QgbWVtb3J5IChvciBldmVuIGZyb20gRG9tMCBtZW1vcnkp LiBBbmQgYXMgdGhlIHJlc3VsdCwgdGhlIG1hbGljaW91cwo+IGJhY2tlbmQgd2hpY2ggcnVucyBp biBhIG5vbi10cnVzdGVkIGRvbWFpbiBjYW4gdGFrZSBhZHZhbnRhZ2Ugb2YgdGhpcy4gSW5zdGVh ZCwgd2l0aCB0aGUgZ3JhbnQgbWFwcGluZwo+IHRoZSBiYWNrZW5kIGlzIG9ubHkgYWxsb3dlZCB0 byBtYXAgcGFnZXMgd2hpY2ggd2VyZSBleHBsaWNpdGx5IGdyYW50ZWQgYnkgdGhlIGd1ZXN0IGJl Zm9yZSBhbmQgbm90aGluZyBlbHNlLiAKPiBBY2NvcmRpbmcgdG8gdGhlIGRpc2N1c3Npb25zIGlu IHZhcmlvdXMgbWFpbmxpbmUgdGhyZWFkcyB0aGlzIHNvbHV0aW9uIHdvdWxkIGxpa2VseSBiZSB3 ZWxjb21lIGJlY2F1c2UgaXQKPiBwZXJmZWN0bHkgZml0cyBpbiB0aGUgc2VjdXJpdHkgbW9kZWwg WGVuIHByb3ZpZGVzLiAKPiAKPiBXaGF0IGlzIG1vcmUsIHRoZSBncmFudCB0YWJsZSBiYXNlZCBz b2x1dGlvbiByZXF1aXJlcyB6ZXJvIGNoYW5nZXMgdG8gdGhlIFhlbiBoeXBlcnZpc29yIGl0c2Vs ZiBhdCBsZWFzdAo+IHdpdGggdmlydGlvLW1taW8gYW5kIERUIChpbiBjb21wYXJpc29uLCBmb3Ig ZXhhbXBsZSwgd2l0aCAiZm9yZWlnbiBtYXBwaW5nICsgdmlydGlvLWlvbW11IiBzb2x1dGlvbiB3 aGljaCB3b3VsZAo+IHJlcXVpcmUgdGhlIHdob2xlIG5ldyBjb21wbGV4IGVtdWxhdG9yIGluIGh5 cGVydmlzb3IgaW4gYWRkaXRpb24gdG8gbmV3IGZ1bmN0aW9uYWxpdHkvaHlwZXJjYWxsIHRvIHBh c3MgSU9WQQo+IGZyb20gdGhlIHZpcnRpbyBiYWNrZW5kIHJ1bm5pbmcgZWxzZXdoZXJlIHRvIHRo ZSBoeXBlcnZpc29yIGFuZCB0cmFuc2xhdGUgaXQgdG8gdGhlIEdQQSBiZWZvcmUgbWFwcGluZyBp bnRvCj4gUDJNIG9yIGRlbnlpbmcgdGhlIGZvcmVpZ24gbWFwcGluZyByZXF1ZXN0IGlmIG5vIGNv cnJlc3BvbmRpbmcgSU9WQS1HUEEgbWFwcGluZyBwcmVzZW50IGluIHRoZSBJT01NVSBwYWdlIHRh YmxlCj4gZm9yIHRoYXQgcGFydGljdWxhciBkZXZpY2UpLiBXZSBvbmx5IG5lZWQgdG8gdXBkYXRl IHRvb2xzdGFjayB0byBpbnNlcnQgYSBuZXcgInhlbixkZXYtZG9taWQiIHByb3BlcnR5IHRvCj4g dGhlIHZpcnRpby1tbWlvIGRldmljZSBub2RlIHdoZW4gY3JlYXRpbmcgYSBndWVzdCBkZXZpY2Ut dHJlZSAodGhpcyBpcyBhbiBpbmRpY2F0b3IgZm9yIHRoZSBndWVzdCB0byB1c2UgZ3JhbnRzCj4g YW5kIHRoZSBJRCBvZiBYZW4gZG9tYWluIHdoZXJlIHRoZSBjb3JyZXNwb25kaW5nIGJhY2tlbmQg cmVzaWRlcywgaXQgaXMgdXNlZCBhcyBhbiBhcmd1bWVudCB0byB0aGUgZ3JhbnQgbWFwcGluZwo+ IEFQSXMpLiBJdCB3b3J0aCBtZW50aW9uaW5nIHRoYXQgdG9vbHN0YWNrIHBhdGNoIGlzIGJhc2Vk IG9uIG5vbiAgdXBzdHJlYW1lZCB5ZXQg4oCcVmlydGlvIHN1cHBvcnQgZm9yIHRvb2xzdGFjawo+ IG9uIEFybeKAnSBzZXJpZXMgd2hpY2ggaXMgb24gcmV2aWV3IG5vdyBbMl0uCj4gCj4gUGxlYXNl IG5vdGUgdGhlIGZvbGxvd2luZzoKPiAtIFBhdGNoIHNlcmllcyBvbmx5IGNvdmVycyBBcm0gYW5k IHZpcnRpby1tbWlvIChkZXZpY2UtdHJlZSkgZm9yIG5vdy4gVG8gZW5hYmxlIHRoZSByZXN0cmlj dGVkIG1lbW9yeSBhY2Nlc3MKPiAgIGZlYXR1cmUgb24gQXJtIHRoZSBmb2xsb3dpbmcgb3B0aW9u cyBzaG91bGQgYmUgc2V0Ogo+ICAgQ09ORklHX1hFTl9WSVJUSU8gPSB5Cj4gICBDT05GSUdfWEVO X0hWTV9WSVJUSU9fR1JBTlQgPSB5Cj4gLSBTb21lIGNhbGxiYWNrcyBpbiB4ZW4tdmlydGlvIERN QSBvcHMgbGF5ZXIgKG1hcF9zZy91bm1hcF9zZywgZXRjKSBhcmUgbm90IGltcGxlbWVudGVkIHll dCBhcyB0aGV5IGFyZSBub3QKPiAgIG5lZWRlZC91c2VkIGluIHRoZSBmaXJzdCBwcm90b3R5cGUK PiAKPiBQYXRjaCBzZXJpZXMgaXMgcmViYXNlZCBvbiBMaW51eCA1LjE4LXJjMiB0YWcgYW5kIHRl c3RlZCBvbiBSZW5lc2FzIFNhbHZhdG9yLVggYm9hcmQgKyBIMyBFUzMuMCBTb0MgKEFybTY0KQo+ IHdpdGggc3RhbmRhbG9uZSB1c2Vyc3BhY2UgKG5vbi1RZW11KSB2aXJ0aW8tbW1pbyBiYXNlZCB2 aXJ0aW8tZGlzayBiYWNrZW5kIHJ1bm5pbmcgaW4gRHJpdmVyIGRvbWFpbiBhbmQgTGludXgKPiBn dWVzdCBydW5uaW5nIG9uIGV4aXN0aW5nIHZpcnRpby1ibGsgZHJpdmVyIChmcm9udGVuZCkuIE5v IGlzc3VlcyB3ZXJlIG9ic2VydmVkLiBHdWVzdCBkb21haW4gJ3JlYm9vdC9kZXN0cm95Jwo+IHVz ZS1jYXNlcyB3b3JrIHByb3Blcmx5LiBJIGhhdmUgYWxzbyB0ZXN0ZWQgb3RoZXIgdXNlLWNhc2Vz IHN1Y2ggYXMgYXNzaWduaW5nIHNldmVyYWwgdmlydGlvIGJsb2NrIGRldmljZXMKPiBvciBhIG1p eCBvZiB2aXJ0aW8gYW5kIFhlbiBQViBibG9jayBkZXZpY2VzIHRvIHRoZSBndWVzdC4gCj4gCj4g MS4gWGVuIGNoYW5nZXMgbG9jYXRlZCBhdCAobGFzdCBwYXRjaCk6Cj4gaHR0cHM6Ly9naXRodWIu Y29tL290eXNoY2hlbmtvMS94ZW4vY29tbWl0cy9saWJ4bF92aXJ0aW9fbmV4dAo+IDIuIExpbnV4 IGNoYW5nZXMgbG9jYXRlZCBhdDoKPiBodHRwczovL2dpdGh1Yi5jb20vb3R5c2hjaGVua28xL2xp bnV4L2NvbW1pdHMvdmlydGlvX2dyYW50NQo+IDMuIHZpcnRpby1kaXNrIGNoYW5nZXMgbG9jYXRl ZCBhdDoKPiBodHRwczovL2dpdGh1Yi5jb20vb3R5c2hjaGVua28xL3ZpcnRpby1kaXNrL2NvbW1p dHMvdmlydGlvX2dyYW50Cj4gCj4gQW55IGZlZWRiYWNrL2hlbHAgd291bGQgYmUgaGlnaGx5IGFw cHJlY2lhdGVkLgo+IAo+IFsxXSBodHRwczovL3d3dy55b3V0dWJlLmNvbS93YXRjaD92PUlybEVk YUlVRFBrCj4gWzJdIGh0dHBzOi8vbG9yZS5rZXJuZWwub3JnL3hlbi1kZXZlbC8xNjQ5NDQyMDY1 LTgzMzItMS1naXQtc2VuZC1lbWFpbC1vbGVrc3R5c2hAZ21haWwuY29tLwo+IAo+IEp1ZXJnZW4g R3Jvc3MgKDIpOgo+ICAgeGVuL2dyYW50czogc3VwcG9ydCBhbGxvY2F0aW5nIGNvbnNlY3V0aXZl IGdyYW50cwo+ICAgdmlydGlvOiBhZGQgb3B0aW9uIHRvIHJlc3RyaWN0IG1lbW9yeSBhY2Nlc3Mg dW5kZXIgWGVuCj4gCj4gT2xla3NhbmRyIFR5c2hjaGVua28gKDQpOgo+ICAgZHQtYmluZGluZ3M6 IHhlbjogQWRkIHhlbixkZXYtZG9taWQgcHJvcGVydHkgZGVzY3JpcHRpb24gZm9yCj4gICAgIHhl bi12aXJ0aW8gbGF5ZXIKPiAgIHZpcnRpbzogVmFyaW91cyB1cGRhdGVzIHRvIHhlbi12aXJ0aW8g RE1BIG9wcyBsYXllcgo+ICAgYXJtL3hlbjogSW50cm9kdWNlIHhlbl9zZXR1cF9kbWFfb3BzKCkK PiAgIGFybS94ZW46IEFzc2lnbiB4ZW4tdmlydGlvIERNQSBvcHMgZm9yIHZpcnRpbyBkZXZpY2Vz IGluIFhlbiBndWVzdHMKPiAKPiAgLi4uL2RldmljZXRyZWUvYmluZGluZ3MvdmlydGlvL3hlbixk ZXYtZG9taWQueWFtbCAgfCAgMzkgKysrCj4gIGFyY2gvYXJtL2luY2x1ZGUvYXNtL3hlbi94ZW4t b3BzLmggICAgICAgICAgICAgICAgIHwgICAxICsKPiAgYXJjaC9hcm0vbW0vZG1hLW1hcHBpbmcu YyAgICAgICAgICAgICAgICAgICAgICAgICAgfCAgIDUgKy0KPiAgYXJjaC9hcm0veGVuL2VubGln aHRlbi5jICAgICAgICAgICAgICAgICAgICAgICAgICAgfCAgMTEgKwo+ICBhcmNoL2FybTY0L2lu Y2x1ZGUvYXNtL3hlbi94ZW4tb3BzLmggICAgICAgICAgICAgICB8ICAgMSArCj4gIGFyY2gvYXJt NjQvbW0vZG1hLW1hcHBpbmcuYyAgICAgICAgICAgICAgICAgICAgICAgIHwgICA1ICstCj4gIGFy Y2gveDg2L21tL2luaXQuYyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHwgIDE1ICsK PiAgYXJjaC94ODYvbW0vbWVtX2VuY3J5cHQuYyAgICAgICAgICAgICAgICAgICAgICAgICAgfCAg IDUgLQo+ICBhcmNoL3g4Ni94ZW4vS2NvbmZpZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICB8ICAgOSArCj4gIGRyaXZlcnMveGVuL0tjb25maWcgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgIHwgIDIwICsrCj4gIGRyaXZlcnMveGVuL01ha2VmaWxlICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgIHwgICAxICsKPiAgZHJpdmVycy94ZW4vZ3JhbnQtdGFibGUuYyAgICAgICAg ICAgICAgICAgICAgICAgICAgfCAyMzggKysrKysrKysrKysrKy0tCj4gIGRyaXZlcnMveGVuL3hl bi12aXJ0aW8uYyAgICAgICAgICAgICAgICAgICAgICAgICAgIHwgMzM1ICsrKysrKysrKysrKysr KysrKysrKwo+ICBpbmNsdWRlL3hlbi9hcm0veGVuLW9wcy5oICAgICAgICAgICAgICAgICAgICAg ICAgICB8ICAyMCArKwo+ICBpbmNsdWRlL3hlbi9ncmFudF90YWJsZS5oICAgICAgICAgICAgICAg ICAgICAgICAgICB8ICAgNCArCj4gIGluY2x1ZGUveGVuL3hlbi1vcHMuaCAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgIHwgIDEzICsKPiAgMTYgZmlsZXMgY2hhbmdlZCwgNjc5IGluc2VydGlv bnMoKyksIDQzIGRlbGV0aW9ucygtKQo+ICBjcmVhdGUgbW9kZSAxMDA2NDQgRG9jdW1lbnRhdGlv bi9kZXZpY2V0cmVlL2JpbmRpbmdzL3ZpcnRpby94ZW4sZGV2LWRvbWlkLnlhbWwKPiAgY3JlYXRl IG1vZGUgMTAwNjQ0IGFyY2gvYXJtL2luY2x1ZGUvYXNtL3hlbi94ZW4tb3BzLmgKPiAgY3JlYXRl IG1vZGUgMTAwNjQ0IGFyY2gvYXJtNjQvaW5jbHVkZS9hc20veGVuL3hlbi1vcHMuaAo+ICBjcmVh dGUgbW9kZSAxMDA2NDQgZHJpdmVycy94ZW4veGVuLXZpcnRpby5jCj4gIGNyZWF0ZSBtb2RlIDEw MDY0NCBpbmNsdWRlL3hlbi9hcm0veGVuLW9wcy5oCj4gCj4gLS0gCj4gMi43LjQKCl9fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fClZpcnR1YWxpemF0aW9uIG1h aWxpbmcgbGlzdApWaXJ0dWFsaXphdGlvbkBsaXN0cy5saW51eC1mb3VuZGF0aW9uLm9yZwpodHRw czovL2xpc3RzLmxpbnV4Zm91bmRhdGlvbi5vcmcvbWFpbG1hbi9saXN0aW5mby92aXJ0dWFsaXph dGlvbg== From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 31BCBC433EF for ; Fri, 15 Apr 2022 08:46:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References: Message-ID:Subject:Cc:To:From:Date:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=8f+aAqipi8DIAz/OqB7KmAFkRsZwjTioeyxKKpqMjjc=; b=CbntiFypkNYxZ3 xzeUNxPQH0y7saVH8JQwvoaJ+8zQW8LwWLtLGo8I/E4WK9g3bHDhBjAZa7n8OLkaiVmcA6OowwWjr r8I5GBovnmVRuYy35WSORUtIripIDr/EuR2lhRYdtl1ReRi5diOCLtYW3G3DOZarKNcUpaBHBO/P7 40F07+6S2PNlaAaDLujKOOkXSv2xF7gXHLUINrXoQcfUT89zvHA4/99gtRY12xFr6lZ/O3qX9L4mb UiJca3LcA7nmXKL8rfH387uQPTFGxdOqgCwFrRcF/Y+EvPrzzQuiaLCSAzFFJHdq7W1itGMUNDHqc HK0iwFoEieCpIIYnFYpg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1nfHZr-009NLL-Me; Fri, 15 Apr 2022 08:45:16 +0000 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1nfHZn-009NIG-Lu for linux-arm-kernel@lists.infradead.org; Fri, 15 Apr 2022 08:45:13 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1650012308; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=UbLS45MxOVAnr1j0DEMaqGL/RKjN2qTV3wn5wivIOzo=; b=FZBrj0zYqXHCSeoH7Sqz7CZB8t5yctvl51GwCdg2yHU/lVBymjlk2+QOH+P2bi37Jg30/z EzHznJXA/KS7DYg7Wyidtd3xEt8DUTyZYF3wE5W2J3hwAJtkUui6FttJdEFWHVJIY8Xyh9 n39YoLXesr8Y2DoS48o48NednVTs9VM= Received: from mail-wm1-f70.google.com (mail-wm1-f70.google.com [209.85.128.70]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-164-ZMeE8cdgMj2zGNat71qwUg-1; Fri, 15 Apr 2022 04:45:07 -0400 X-MC-Unique: ZMeE8cdgMj2zGNat71qwUg-1 Received: by mail-wm1-f70.google.com with SMTP id az27-20020a05600c601b00b0038ff021c8a4so3172473wmb.1 for ; Fri, 15 Apr 2022 01:45:07 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=UbLS45MxOVAnr1j0DEMaqGL/RKjN2qTV3wn5wivIOzo=; b=pfdpqJHKMwtmeXVS4L2mABKv7E3HrmHgxByzID+2nUxBM787MWAvC297okRr5GcloJ 45WniIpfvmPlYhHj8Sr1mh8XOdkz4CIYdRUdrVgnVzGv/6VntV2veBlrStpZ/p/dao03 Ejas54vVgTeYm6ziVonC4pU5AhP/eX2N5bQlMdJv8S0qLcl052+T8pPyGjGezoM5OWws wRcUzZ1jO8c/ZPomt0296/pg3NW0LwGdQUcvKGqAuog+DpsbZT5lcFPqlzNGsyIDAIQs U1RpCbYhVgtcsCTKooCodGKbNYsCkmgQhbTKUdydvf2RquySft80fbEV9vxy5LZroCW+ KWlg== X-Gm-Message-State: AOAM530r3EGuKQCEwiw+PrSknFz39o9NFO7LT0n2wuhqGgBbozj21zMv DLrszPtXKS2mQp3Lx2ZT/i/kN38ZorzkERVECZr4lgvJceQu6+s+Z/+bfDBam5cnL2uYeIZVfxV FvWvC2MULeMCQrWAPSDtqg2ZzAwqokkzq+po= X-Received: by 2002:a05:600c:4f88:b0:391:e34e:ca66 with SMTP id n8-20020a05600c4f8800b00391e34eca66mr768131wmq.16.1650012303797; Fri, 15 Apr 2022 01:45:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxtZ3CsHMRHFsioNGpLaugIquRbj8GlmtB0g6ZbYpJjZi2MjwNik9eBG9L3OBpQkHXDtDgk7g== X-Received: by 2002:a05:600c:4f88:b0:391:e34e:ca66 with SMTP id n8-20020a05600c4f8800b00391e34eca66mr768102wmq.16.1650012303495; Fri, 15 Apr 2022 01:45:03 -0700 (PDT) Received: from redhat.com ([2.53.138.98]) by smtp.gmail.com with ESMTPSA id f8-20020a5d64c8000000b0020784359295sm5084468wri.54.2022.04.15.01.45.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Apr 2022 01:45:02 -0700 (PDT) Date: Fri, 15 Apr 2022 04:44:58 -0400 From: "Michael S. Tsirkin" To: Oleksandr Tyshchenko Cc: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, virtualization@lists.linux-foundation.org, Oleksandr Tyshchenko , Stefano Stabellini , Boris Ostrovsky , Juergen Gross , Julien Grall , Bertrand Marquis , Wei Chen , Henry Wang , Kaly Xin , Jiamei Xie , Alex =?iso-8859-1?Q?Benn=E9e?= Subject: Re: [RFC PATCH 0/6] virtio: Solution to restrict memory access under Xen using xen-virtio DMA ops layer Message-ID: <20220415044225-mutt-send-email-mst@kernel.org> References: <1649963973-22879-1-git-send-email-olekstysh@gmail.com> MIME-Version: 1.0 In-Reply-To: <1649963973-22879-1-git-send-email-olekstysh@gmail.com> Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=mst@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Disposition: inline X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220415_014511_855441_323431E6 X-CRM114-Status: GOOD ( 35.22 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org T24gVGh1LCBBcHIgMTQsIDIwMjIgYXQgMTA6MTk6MjdQTSArMDMwMCwgT2xla3NhbmRyIFR5c2hj aGVua28gd3JvdGU6Cj4gRnJvbTogT2xla3NhbmRyIFR5c2hjaGVua28gPG9sZWtzYW5kcl90eXNo Y2hlbmtvQGVwYW0uY29tPgo+IAo+IEhlbGxvIGFsbC4KPiAKPiBUaGUgcHVycG9zZSBvZiB0aGlz IFJGQyBwYXRjaCBzZXJpZXMgaXMgdG8gYWRkIHN1cHBvcnQgZm9yIHJlc3RyaWN0aW5nIG1lbW9y eSBhY2Nlc3MgdW5kZXIgWGVuIHVzaW5nIHNwZWNpZmljCj4gZ3JhbnQgdGFibGUgYmFzZWQgRE1B IG9wcyBsYXllci4gUGF0Y2ggc2VyaWVzIGlzIGJhc2VkIG9uIEp1ZXJnZW4gR3Jvc3PigJkgaW5p dGlhbCB3b3JrIFsxXSB3aGljaCBpbXBsaWVzIHVzaW5nCj4gZ3JhbnQgcmVmZXJlbmNlcyBpbnN0 ZWFkIG9mIHJhdyBndWVzdCBwaHlzaWNhbCBhZGRyZXNzZXMgKEdQQSkgZm9yIHRoZSB2aXJ0aW8g Y29tbXVuaWNhdGlvbnMgKHNvbWUga2luZCBvZgo+IHRoZSBzb2Z0d2FyZSBJT01NVSkuCj4gCj4g VGhlIGhpZ2ggbGV2ZWwgaWRlYSBpcyB0byBjcmVhdGUgbmV3IFhlbuKAmXMgZ3JhbnQgdGFibGUg YmFzZWQgRE1BIG9wcyBsYXllciBmb3IgdGhlIGd1ZXN0IExpbnV4IHdob3NlIG1haW4KPiBwdXJw b3NlIGlzIHRvIHByb3ZpZGUgYSBzcGVjaWFsIDY0LWJpdCBETUEgYWRkcmVzcyB3aGljaCBpcyBm b3JtZWQgYnkgdXNpbmcgdGhlIGdyYW50IHJlZmVyZW5jZSAoZm9yIGEgcGFnZQo+IHRvIGJlIHNo YXJlZCB3aXRoIHRoZSBiYWNrZW5kKSB3aXRoIG9mZnNldCBhbmQgc2V0dGluZyB0aGUgaGlnaGVz dCBhZGRyZXNzIGJpdCAodGhpcyBpcyBmb3IgdGhlIGJhY2tlbmQgdG8KPiBiZSBhYmxlIHRvIGRp c3Rpbmd1aXNoIGdyYW50IHJlZiBiYXNlZCBETUEgYWRkcmVzcyBmcm9tIG5vcm1hbCBHUEEpLiBG b3IgdGhpcyB0byB3b3JrIHdlIG5lZWQgdGhlIGFiaWxpdHkKPiB0byBhbGxvY2F0ZSBjb250aWd1 b3VzIChjb25zZWN1dGl2ZSkgZ3JhbnQgcmVmZXJlbmNlcyBmb3IgbXVsdGktcGFnZSBhbGxvY2F0 aW9ucy4gQW5kIHRoZSBiYWNrZW5kIHRoZW4gbmVlZHMKPiB0byBvZmZlciBWSVJUSU9fRl9BQ0NF U1NfUExBVEZPUk0gYW5kIFZJUlRJT19GX1ZFUlNJT05fMSBmZWF0dXJlIGJpdHMgKGl0IG11c3Qg c3VwcG9ydCB2aXJ0aW8tbW1pbyBtb2Rlcm4KPiB0cmFuc3BvcnQgZm9yIDY0LWJpdCBhZGRyZXNz ZXMgaW4gdGhlIHZpcnRxdWV1ZSkuCgpJJ20gbm90IGVub3VnaCBvZiBhIHhlbiBleHBlcnQgdG8g cmV2aWV3IHRoaXMsIGFuZCBJIGRpZG4ndCBnZXQKYWxsIHBhdGNoZXMsIGJ1dCBJJ20gdmVyeSBo YXBweSB0byBzZWUgdGhhdCBhcHByb2FjaCBiZWluZwp0YWtlbi4gVklSVElPX0ZfQUNDRVNTX1BM QVRGT1JNIGFuZCBWSVJUSU9fRl9WRVJTSU9OXzEgYXJlCmV4YWN0bHkgdGhlIHdheSB0byBkZWNs YXJlIG5vdCBhbGwgb2YgbWVtb3J5IGlzIGFjY2Vzc2libGUuClRoYW5rcyEKCj4gWGVuJ3MgZ3Jh bnQgbWFwcGluZyBtZWNoYW5pc20gaXMgdGhlIHNlY3VyZSBhbmQgc2FmZSBzb2x1dGlvbiB0byBz aGFyZSBwYWdlcyBiZXR3ZWVuIGRvbWFpbnMgd2hpY2ggcHJvdmVuCj4gdG8gd29yayBhbmQgd29y a3MgZm9yIHllYXJzIChpbiB0aGUgY29udGV4dCBvZiB0cmFkaXRpb25hbCBYZW4gUFYgZHJpdmVy cyBmb3IgZXhhbXBsZSkuIFNvIGZhciwgdGhlIGZvcmVpZ24KPiBtYXBwaW5nIGlzIHVzZWQgZm9y IHRoZSB2aXJ0aW8gYmFja2VuZCB0byBtYXAgYW5kIGFjY2VzcyBndWVzdCBtZW1vcnkuIFdpdGgg dGhlIGZvcmVpZ24gbWFwcGluZywgdGhlIGJhY2tlbmQKPiBpcyBhYmxlIHRvIG1hcCBhcmJpdHJh cnkgcGFnZXMgZnJvbSB0aGUgZ3Vlc3QgbWVtb3J5IChvciBldmVuIGZyb20gRG9tMCBtZW1vcnkp LiBBbmQgYXMgdGhlIHJlc3VsdCwgdGhlIG1hbGljaW91cwo+IGJhY2tlbmQgd2hpY2ggcnVucyBp biBhIG5vbi10cnVzdGVkIGRvbWFpbiBjYW4gdGFrZSBhZHZhbnRhZ2Ugb2YgdGhpcy4gSW5zdGVh ZCwgd2l0aCB0aGUgZ3JhbnQgbWFwcGluZwo+IHRoZSBiYWNrZW5kIGlzIG9ubHkgYWxsb3dlZCB0 byBtYXAgcGFnZXMgd2hpY2ggd2VyZSBleHBsaWNpdGx5IGdyYW50ZWQgYnkgdGhlIGd1ZXN0IGJl Zm9yZSBhbmQgbm90aGluZyBlbHNlLiAKPiBBY2NvcmRpbmcgdG8gdGhlIGRpc2N1c3Npb25zIGlu IHZhcmlvdXMgbWFpbmxpbmUgdGhyZWFkcyB0aGlzIHNvbHV0aW9uIHdvdWxkIGxpa2VseSBiZSB3 ZWxjb21lIGJlY2F1c2UgaXQKPiBwZXJmZWN0bHkgZml0cyBpbiB0aGUgc2VjdXJpdHkgbW9kZWwg WGVuIHByb3ZpZGVzLiAKPiAKPiBXaGF0IGlzIG1vcmUsIHRoZSBncmFudCB0YWJsZSBiYXNlZCBz b2x1dGlvbiByZXF1aXJlcyB6ZXJvIGNoYW5nZXMgdG8gdGhlIFhlbiBoeXBlcnZpc29yIGl0c2Vs ZiBhdCBsZWFzdAo+IHdpdGggdmlydGlvLW1taW8gYW5kIERUIChpbiBjb21wYXJpc29uLCBmb3Ig ZXhhbXBsZSwgd2l0aCAiZm9yZWlnbiBtYXBwaW5nICsgdmlydGlvLWlvbW11IiBzb2x1dGlvbiB3 aGljaCB3b3VsZAo+IHJlcXVpcmUgdGhlIHdob2xlIG5ldyBjb21wbGV4IGVtdWxhdG9yIGluIGh5 cGVydmlzb3IgaW4gYWRkaXRpb24gdG8gbmV3IGZ1bmN0aW9uYWxpdHkvaHlwZXJjYWxsIHRvIHBh c3MgSU9WQQo+IGZyb20gdGhlIHZpcnRpbyBiYWNrZW5kIHJ1bm5pbmcgZWxzZXdoZXJlIHRvIHRo ZSBoeXBlcnZpc29yIGFuZCB0cmFuc2xhdGUgaXQgdG8gdGhlIEdQQSBiZWZvcmUgbWFwcGluZyBp bnRvCj4gUDJNIG9yIGRlbnlpbmcgdGhlIGZvcmVpZ24gbWFwcGluZyByZXF1ZXN0IGlmIG5vIGNv cnJlc3BvbmRpbmcgSU9WQS1HUEEgbWFwcGluZyBwcmVzZW50IGluIHRoZSBJT01NVSBwYWdlIHRh YmxlCj4gZm9yIHRoYXQgcGFydGljdWxhciBkZXZpY2UpLiBXZSBvbmx5IG5lZWQgdG8gdXBkYXRl IHRvb2xzdGFjayB0byBpbnNlcnQgYSBuZXcgInhlbixkZXYtZG9taWQiIHByb3BlcnR5IHRvCj4g dGhlIHZpcnRpby1tbWlvIGRldmljZSBub2RlIHdoZW4gY3JlYXRpbmcgYSBndWVzdCBkZXZpY2Ut dHJlZSAodGhpcyBpcyBhbiBpbmRpY2F0b3IgZm9yIHRoZSBndWVzdCB0byB1c2UgZ3JhbnRzCj4g YW5kIHRoZSBJRCBvZiBYZW4gZG9tYWluIHdoZXJlIHRoZSBjb3JyZXNwb25kaW5nIGJhY2tlbmQg cmVzaWRlcywgaXQgaXMgdXNlZCBhcyBhbiBhcmd1bWVudCB0byB0aGUgZ3JhbnQgbWFwcGluZwo+ IEFQSXMpLiBJdCB3b3J0aCBtZW50aW9uaW5nIHRoYXQgdG9vbHN0YWNrIHBhdGNoIGlzIGJhc2Vk IG9uIG5vbiAgdXBzdHJlYW1lZCB5ZXQg4oCcVmlydGlvIHN1cHBvcnQgZm9yIHRvb2xzdGFjawo+ IG9uIEFybeKAnSBzZXJpZXMgd2hpY2ggaXMgb24gcmV2aWV3IG5vdyBbMl0uCj4gCj4gUGxlYXNl IG5vdGUgdGhlIGZvbGxvd2luZzoKPiAtIFBhdGNoIHNlcmllcyBvbmx5IGNvdmVycyBBcm0gYW5k IHZpcnRpby1tbWlvIChkZXZpY2UtdHJlZSkgZm9yIG5vdy4gVG8gZW5hYmxlIHRoZSByZXN0cmlj dGVkIG1lbW9yeSBhY2Nlc3MKPiAgIGZlYXR1cmUgb24gQXJtIHRoZSBmb2xsb3dpbmcgb3B0aW9u cyBzaG91bGQgYmUgc2V0Ogo+ICAgQ09ORklHX1hFTl9WSVJUSU8gPSB5Cj4gICBDT05GSUdfWEVO X0hWTV9WSVJUSU9fR1JBTlQgPSB5Cj4gLSBTb21lIGNhbGxiYWNrcyBpbiB4ZW4tdmlydGlvIERN QSBvcHMgbGF5ZXIgKG1hcF9zZy91bm1hcF9zZywgZXRjKSBhcmUgbm90IGltcGxlbWVudGVkIHll dCBhcyB0aGV5IGFyZSBub3QKPiAgIG5lZWRlZC91c2VkIGluIHRoZSBmaXJzdCBwcm90b3R5cGUK PiAKPiBQYXRjaCBzZXJpZXMgaXMgcmViYXNlZCBvbiBMaW51eCA1LjE4LXJjMiB0YWcgYW5kIHRl c3RlZCBvbiBSZW5lc2FzIFNhbHZhdG9yLVggYm9hcmQgKyBIMyBFUzMuMCBTb0MgKEFybTY0KQo+ IHdpdGggc3RhbmRhbG9uZSB1c2Vyc3BhY2UgKG5vbi1RZW11KSB2aXJ0aW8tbW1pbyBiYXNlZCB2 aXJ0aW8tZGlzayBiYWNrZW5kIHJ1bm5pbmcgaW4gRHJpdmVyIGRvbWFpbiBhbmQgTGludXgKPiBn dWVzdCBydW5uaW5nIG9uIGV4aXN0aW5nIHZpcnRpby1ibGsgZHJpdmVyIChmcm9udGVuZCkuIE5v IGlzc3VlcyB3ZXJlIG9ic2VydmVkLiBHdWVzdCBkb21haW4gJ3JlYm9vdC9kZXN0cm95Jwo+IHVz ZS1jYXNlcyB3b3JrIHByb3Blcmx5LiBJIGhhdmUgYWxzbyB0ZXN0ZWQgb3RoZXIgdXNlLWNhc2Vz IHN1Y2ggYXMgYXNzaWduaW5nIHNldmVyYWwgdmlydGlvIGJsb2NrIGRldmljZXMKPiBvciBhIG1p eCBvZiB2aXJ0aW8gYW5kIFhlbiBQViBibG9jayBkZXZpY2VzIHRvIHRoZSBndWVzdC4gCj4gCj4g MS4gWGVuIGNoYW5nZXMgbG9jYXRlZCBhdCAobGFzdCBwYXRjaCk6Cj4gaHR0cHM6Ly9naXRodWIu Y29tL290eXNoY2hlbmtvMS94ZW4vY29tbWl0cy9saWJ4bF92aXJ0aW9fbmV4dAo+IDIuIExpbnV4 IGNoYW5nZXMgbG9jYXRlZCBhdDoKPiBodHRwczovL2dpdGh1Yi5jb20vb3R5c2hjaGVua28xL2xp bnV4L2NvbW1pdHMvdmlydGlvX2dyYW50NQo+IDMuIHZpcnRpby1kaXNrIGNoYW5nZXMgbG9jYXRl ZCBhdDoKPiBodHRwczovL2dpdGh1Yi5jb20vb3R5c2hjaGVua28xL3ZpcnRpby1kaXNrL2NvbW1p dHMvdmlydGlvX2dyYW50Cj4gCj4gQW55IGZlZWRiYWNrL2hlbHAgd291bGQgYmUgaGlnaGx5IGFw cHJlY2lhdGVkLgo+IAo+IFsxXSBodHRwczovL3d3dy55b3V0dWJlLmNvbS93YXRjaD92PUlybEVk YUlVRFBrCj4gWzJdIGh0dHBzOi8vbG9yZS5rZXJuZWwub3JnL3hlbi1kZXZlbC8xNjQ5NDQyMDY1 LTgzMzItMS1naXQtc2VuZC1lbWFpbC1vbGVrc3R5c2hAZ21haWwuY29tLwo+IAo+IEp1ZXJnZW4g R3Jvc3MgKDIpOgo+ICAgeGVuL2dyYW50czogc3VwcG9ydCBhbGxvY2F0aW5nIGNvbnNlY3V0aXZl IGdyYW50cwo+ICAgdmlydGlvOiBhZGQgb3B0aW9uIHRvIHJlc3RyaWN0IG1lbW9yeSBhY2Nlc3Mg dW5kZXIgWGVuCj4gCj4gT2xla3NhbmRyIFR5c2hjaGVua28gKDQpOgo+ICAgZHQtYmluZGluZ3M6 IHhlbjogQWRkIHhlbixkZXYtZG9taWQgcHJvcGVydHkgZGVzY3JpcHRpb24gZm9yCj4gICAgIHhl bi12aXJ0aW8gbGF5ZXIKPiAgIHZpcnRpbzogVmFyaW91cyB1cGRhdGVzIHRvIHhlbi12aXJ0aW8g RE1BIG9wcyBsYXllcgo+ICAgYXJtL3hlbjogSW50cm9kdWNlIHhlbl9zZXR1cF9kbWFfb3BzKCkK PiAgIGFybS94ZW46IEFzc2lnbiB4ZW4tdmlydGlvIERNQSBvcHMgZm9yIHZpcnRpbyBkZXZpY2Vz IGluIFhlbiBndWVzdHMKPiAKPiAgLi4uL2RldmljZXRyZWUvYmluZGluZ3MvdmlydGlvL3hlbixk ZXYtZG9taWQueWFtbCAgfCAgMzkgKysrCj4gIGFyY2gvYXJtL2luY2x1ZGUvYXNtL3hlbi94ZW4t b3BzLmggICAgICAgICAgICAgICAgIHwgICAxICsKPiAgYXJjaC9hcm0vbW0vZG1hLW1hcHBpbmcu YyAgICAgICAgICAgICAgICAgICAgICAgICAgfCAgIDUgKy0KPiAgYXJjaC9hcm0veGVuL2VubGln aHRlbi5jICAgICAgICAgICAgICAgICAgICAgICAgICAgfCAgMTEgKwo+ICBhcmNoL2FybTY0L2lu Y2x1ZGUvYXNtL3hlbi94ZW4tb3BzLmggICAgICAgICAgICAgICB8ICAgMSArCj4gIGFyY2gvYXJt NjQvbW0vZG1hLW1hcHBpbmcuYyAgICAgICAgICAgICAgICAgICAgICAgIHwgICA1ICstCj4gIGFy Y2gveDg2L21tL2luaXQuYyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHwgIDE1ICsK PiAgYXJjaC94ODYvbW0vbWVtX2VuY3J5cHQuYyAgICAgICAgICAgICAgICAgICAgICAgICAgfCAg IDUgLQo+ICBhcmNoL3g4Ni94ZW4vS2NvbmZpZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICB8ICAgOSArCj4gIGRyaXZlcnMveGVuL0tjb25maWcgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgIHwgIDIwICsrCj4gIGRyaXZlcnMveGVuL01ha2VmaWxlICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgIHwgICAxICsKPiAgZHJpdmVycy94ZW4vZ3JhbnQtdGFibGUuYyAgICAgICAg ICAgICAgICAgICAgICAgICAgfCAyMzggKysrKysrKysrKysrKy0tCj4gIGRyaXZlcnMveGVuL3hl bi12aXJ0aW8uYyAgICAgICAgICAgICAgICAgICAgICAgICAgIHwgMzM1ICsrKysrKysrKysrKysr KysrKysrKwo+ICBpbmNsdWRlL3hlbi9hcm0veGVuLW9wcy5oICAgICAgICAgICAgICAgICAgICAg ICAgICB8ICAyMCArKwo+ICBpbmNsdWRlL3hlbi9ncmFudF90YWJsZS5oICAgICAgICAgICAgICAg ICAgICAgICAgICB8ICAgNCArCj4gIGluY2x1ZGUveGVuL3hlbi1vcHMuaCAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgIHwgIDEzICsKPiAgMTYgZmlsZXMgY2hhbmdlZCwgNjc5IGluc2VydGlv bnMoKyksIDQzIGRlbGV0aW9ucygtKQo+ICBjcmVhdGUgbW9kZSAxMDA2NDQgRG9jdW1lbnRhdGlv bi9kZXZpY2V0cmVlL2JpbmRpbmdzL3ZpcnRpby94ZW4sZGV2LWRvbWlkLnlhbWwKPiAgY3JlYXRl IG1vZGUgMTAwNjQ0IGFyY2gvYXJtL2luY2x1ZGUvYXNtL3hlbi94ZW4tb3BzLmgKPiAgY3JlYXRl IG1vZGUgMTAwNjQ0IGFyY2gvYXJtNjQvaW5jbHVkZS9hc20veGVuL3hlbi1vcHMuaAo+ICBjcmVh dGUgbW9kZSAxMDA2NDQgZHJpdmVycy94ZW4veGVuLXZpcnRpby5jCj4gIGNyZWF0ZSBtb2RlIDEw MDY0NCBpbmNsdWRlL3hlbi9hcm0veGVuLW9wcy5oCj4gCj4gLS0gCj4gMi43LjQKCgpfX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwpsaW51eC1hcm0ta2VybmVs IG1haWxpbmcgbGlzdApsaW51eC1hcm0ta2VybmVsQGxpc3RzLmluZnJhZGVhZC5vcmcKaHR0cDov L2xpc3RzLmluZnJhZGVhZC5vcmcvbWFpbG1hbi9saXN0aW5mby9saW51eC1hcm0ta2VybmVsCg==