From mboxrd@z Thu Jan 1 00:00:00 1970 From: Julien Grall Subject: Re: RT Xen on ARM - R-Car series Date: Thu, 7 Feb 2019 11:59:07 +0100 Message-ID: References: <2a651c5d-3f94-378d-baf9-f52cab0cdc62@arm.com> <20190201165314.ofuvpddlfpzbc247@mac> <56b433e0-645e-997d-1bff-de3c4f7fe250@arm.com> <20190204125307.aft4tzkjjrxdd34o@mac> <6457d3e5-1897-d124-ba49-c6325076b393@gmail.com> <20190207103513.ky7xnftn3pj7r2lf@mac> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="===============3632201834137251872==" Return-path: In-Reply-To: <20190207103513.ky7xnftn3pj7r2lf@mac> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" To: Roger Pau Monne Cc: Julien Grall , Stefano Stabellini , xen-devel@lists.xen.org, "LOPEZ, FUENTES NACARINO Jairo Eduardo" , Andrii Anisov List-Id: xen-devel@lists.xenproject.org --===============3632201834137251872== Content-Type: multipart/alternative; boundary="0000000000000aebe205814bbcb4" --0000000000000aebe205814bbcb4 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable (sorry for the formatting) On Thu, 7 Feb 2019, 11:37 Roger Pau Monn=C3=A9, wrot= e: > On Thu, Feb 07, 2019 at 11:42:16AM +0200, Andrii Anisov wrote: > > Hello All, > > > > On 06.02.19 23:03, Stefano Stabellini wrote: > > > That's great. Could you or Roger take care of cleaning up the patch a= nd > > > properly submitting it to the list? > > > > I can take it for cleaning up. > > > > > And also double check that it won't > > > break any guests (at least the ones we know about: Linux and Windows = on > > > x86). > > > > I'm not sure I could properly check it for x86. For sure can't do that > for windows guest. > > I've been thinking about this with other Citrix folks, and I'm not > sure the proposed patch is a good solution. It's not possible for us > to know whether there's a kernel somewhere relying on changing the > virtual address of the runtime state area without issuing a new > hypercall. > > If such kernel existed by making this change we would introduce random > memory corruption to that kernel, which would be very hard to track > and considered a regression. > > I think the best way to move forward is to pick my patch and introduce > a new hypercall that instead of a virtual address takes a guest > physical address. Will you be OK with this Andrii > In that case I would prefer if we don't keep the runstate mapped. Cheers, --0000000000000aebe205814bbcb4 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable (sorry for the formatting)

On Thu, 7 Feb 2019, 11:37 Roger Pau Monn=C3=A9, <roger.pau@citrix.com> wrote:
On Thu, Feb 07, 2019 at 11:42:16AM +0200, Andrii Aniso= v wrote:
> Hello All,
>
> On 06.02.19 23:03, Stefano Stabellini wrote:
> > That's great. Could you or Roger take care of cleaning up the= patch and
> > properly submitting it to the list?
>
> I can take it for cleaning up.
>
> > And also double check that it won't
> > break any guests (at least the ones we know about: Linux and Wind= ows on
> > x86).
>
> I'm not sure I could properly check it for x86. For sure can't= do that for windows guest.

I've been thinking about this with other Citrix folks, and I'm not<= br> sure the proposed patch is a good solution. It's not possible for us to know whether there's a kernel somewhere relying on changing the
virtual address of the runtime state area without issuing a new
hypercall.

If such kernel existed by making this change we would introduce random
memory corruption to that kernel, which would be very hard to track
and considered a regression.

I think the best way to move forward is to pick my patch and introduce
a new hypercall that instead of a virtual address takes a guest
physical address. Will you be OK with this Andrii

In that case I would prefer if we don't keep the runst= ate mapped.

Cheers,
--0000000000000aebe205814bbcb4-- --===============3632201834137251872== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18KWGVuLWRldmVs IG1haWxpbmcgbGlzdApYZW4tZGV2ZWxAbGlzdHMueGVucHJvamVjdC5vcmcKaHR0cHM6Ly9saXN0 cy54ZW5wcm9qZWN0Lm9yZy9tYWlsbWFuL2xpc3RpbmZvL3hlbi1kZXZlbA== --===============3632201834137251872==--