[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Xen Summit 2023 Design Session: FF-A Challanges


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Henry Wang <Henry.Wang@xxxxxxx>
  • Date: Mon, 26 Jun 2023 20:38:27 +0000
  • Accept-language: zh-CN, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=QuoYncLmyqqqfjY93ASrwaN9MkGxY9nGUal9WLlsMJk=; b=ebCvp2u5D5rKveNX6MrLwjmoTGfM27zgk9AGiiALdh6jbKgTqX+ZsM36ABTINRQRAbZ/sS2tgleMqeehSktYV74svmgbj7GrH2oAiN7U0yGMYw1qd+9hEwT+HqcxBmJGwmippxxTtecByfw5CFqokpyB9YmzNyZByo9RIJAYFOzv+sL772s85hP2j9hOFnwUR8jp1quxNa+YWy+uSeJ7wahfAGhPPfvujxteBshaQGgkkBpf72NJi2OGdom/Ye1GVs9w/hPP3Ho+6MXXQ0a5PkxUzZTEKPH+M0G01zoOrareQMm03KkJzf62Ng6rxuvZ+0mUXaRKlRGUdUKlYOZyHA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DSVdqDgBKXH6U48qGiQ0INUindfRa7khgyxFkvheQlpXKFWHP7hFEGgfWX/imMm5VZHfowoaVnTUCEoCl7F3X7DdBFCTZrZ67f8HKjC8GMckfo+2Norcbd+AvSSDywuxvg7Hi5SLy38Jcf3geOfcNlU/HfEURgI2gisd1JfR/QxLpNrS0MQorc6WRwbYh+aeMpQDmaH/Ogl6N3lY8EuOBHvtlaE0xsHuVYgM54MqmvVqaZ3tesyAHf+oIUKyzRKki/pZBDUCYHdr37iwlkZP9yZMscwuuDIoSYKsikd2OPKxYMuUwkxJ31h95Wnh4BzCAat1t8ankiAFP99iEMlTtA==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>, Julien Grall <julien@xxxxxxx>, "sstabellini@xxxxxxxxxx" <sstabellini@xxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Delivery-date: Mon, 26 Jun 2023 20:39:19 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AdmobVENtwj0rqU7RBOhAApc4UEreQ==
  • Thread-topic: Xen Summit 2023 Design Session: FF-A Challanges

Hi all,

Below is the summary for the FF-A Challenges design session. I apologize
for being unable to completely follow of the design session...

- Scatter gather list and the critical section issue:
  Summary: we need to have a continuation system on the memory call in
  the FFA spec

- The guest OS sharing memory with the secure world may be "killed" issue:
  Summary: For the domain destroy, we need to investigate a potential
  notification system. We need to keep the guest virtually alive till we
  manage to reclaim the memory.

Kind regards,
Henry




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.