From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.9 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 40974C4338F for ; Fri, 6 Aug 2021 22:35:58 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 1FFBF60525 for ; Fri, 6 Aug 2021 22:35:58 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242953AbhHFWgN (ORCPT ); Fri, 6 Aug 2021 18:36:13 -0400 Received: from mail.xenproject.org ([104.130.215.37]:41784 "EHLO mail.xenproject.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243147AbhHFWgM (ORCPT ); Fri, 6 Aug 2021 18:36:12 -0400 X-Greylist: delayed 2101 seconds by postgrey-1.27 at vger.kernel.org; Fri, 06 Aug 2021 18:36:12 EDT DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org; s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To: MIME-Version:Date:Message-ID:From:References:Cc:To:Subject; bh=c/e+IcgRK/L73v7mZ6Tl0S05geQTSuXr/rwHkh4/XsQ=; b=I+AnboxEWUe6Sz+9WVT2dEMvO+ pBJF6Ivvu2t9nUqwPLTMiFUHzFNFgHqprfH/grJllSaECIAdIDLwL/yTFe4IIBIcNomkTLhfxw5gP PcgiCD233A/IksKGQpPmlSnMwr7d2iCRFt9aWrFiyWcxsZ2/TUV3G4nKmsaVEMF721Ko=; Received: from xenbits.xenproject.org ([104.239.192.120]) by mail.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1mC7tf-00016g-CS; Fri, 06 Aug 2021 22:00:55 +0000 Received: from gw1.octic.net ([81.187.162.82] helo=a483e7b01a66.ant.amazon.com) by xenbits.xenproject.org with esmtpsa (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92) (envelope-from ) id 1mC7tf-0001kq-6y; Fri, 06 Aug 2021 22:00:55 +0000 Subject: Re: Clarification regarding updating "Xen hypervisor device tree bindings on Arm" To: Stefano Stabellini , Oleksandr Tyshchenko Cc: robh+dt@kernel.org, Mark Rutland , devicetree@vger.kernel.org References: From: Julien Grall Message-ID: Date: Fri, 6 Aug 2021 23:00:52 +0100 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: devicetree@vger.kernel.org Hi Stefano, On 06/08/2021 21:15, Stefano Stabellini wrote: > On Fri, 6 Aug 2021, Oleksandr Tyshchenko wrote: >> Hello, all. >> >> I would like to clarify some bits regarding a possible update for "Xen device tree bindings for the guest" [1]. >> >> A bit of context: >> We are considering extending "reg" property under the hypervisor node and we would like to avoid breaking backward compatibility. >> So far, the "reg" was used to carry a single region for the grant table mapping only and it's size is quite small for the new improvement >> we are currently working on. >> >> What we want to do is to extend the current region [reg: 0] and add an extra regions [reg: 1-N] to be used as a safe address space for any >> Xen specific mappings. But, we need to be careful about running "new" guests (with the improvement being built-in already) on "old" Xen >> which is not aware of the extended regions, so we need the binding to be extended in a backward compatible way. In order to detect whether >> we are running on top of the "new" Xen (and it provides us enough space to be used for improvement), we definitely need some sign to >> indicate that. >> >> Could you please clarify, how do you expect the binding to be changed in the backward compatible way? >> - by adding an extra compatible (as it is a change of the binding technically) >> - by just adding new property (xen,***) to indicate that "reg" contains enough space >> - other option > > > The current description is: > > - reg: specifies the base physical address and size of a region in > memory where the grant table should be mapped to, using an > HYPERVISOR_memory_op hypercall [...] > > > Although it says "a region" I think that adding multiple ranges would be > fine and shouldn't break backward compatibility. > > In addition, the purpose of the region was described as "where the grant > table should be mapped". In other words, it is a safe address range > where the OS can map Xen special pages. > > Your proposal is to extend the region to be bigger to allow the OS to > map more Xen special pages. I think it is a natural extension to the > binding, which should be backward compatible. I agree that extending the reg (or even adding a second region) should be fine for older OS. > > Rob, I am not sure what is commonly done in these cases. Maybe we just > need an update to the description of the binding? I am also fine with > adding a new compatible string if needed. So the trouble is how a newer Linux version knows that the region is big enough to deal with all the foreign/grant mapping? If you run on older Xen, then the region will only be 16MB. This means the Linux will have to fallback on stealing RAM as it is today. IOW, XSA-300 will still be a thing. On newer Xen (or toolstack), we ideally want the OS to not fallback on stealing RAM (and close XSA-300). This is where we need a way to advertise it. The question here is whether we want to use a property or a compatible for this. I am leaning towards the latter because this is an extension of the bindings. However, I wasn't entirely whether this was a normal way to do it. Cheers, -- Julien Grall