[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Keystone Issue


  • To: Stefano Stabellini <sstabellini@xxxxxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Tue, 16 Jun 2020 07:56:23 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=X0Q5tkCE0pj0ucWbcV/dZjTLWhRBR8Y1d9il8nUHDoA=; b=nl5G+xa473vxW/iCarKs0yzglRmZM0FdF+zjjR3S7Kd8an0/VL/zApvPRVH/JdHMuv0E3FSpC0OnuG10LC3P64yyyazcdhjQPKOguI+3T7mJmhIqYGEXQYzp1nQg2FDaQQSbiiaJIqLbpA+gfC8zY2DIOiZhuvH+JaxQ3DK9YN4d/SJo5nxIhrZkEt/RN9a13jvK+Kx3217F8Ncfg+X/ZdLTmW5wuUY+BUh00IriYiUtQQE4n4v053oLE2rt2an3b1sQf3XDttYv+QFNhYxkQzmvF5bQ6qCZVlrD/OH76ggJJ2ky1v7hZBKa8kFgLb0HaB5g4RBTnVvF+JQKFvnWAQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=No708oeQx5aVJdK2VoGxlQ5TuTAF9BFsSwZTGQKdLENIZh5a9tAeXBvhMqIsjYsV3QggpJOVi6CrJPIj5KSqqkkMQ/BQnvA2mlpiRVBWp2RIA+jdhuSGW4qs8q43J8EZTh3xSfP8+H9ZhYN2wOB12cAvV7HvuSvh7s8KMM0jk63bFm04ZSEaarock+jkHni9VmgT6xMrkXWWOkSpTzUys4On/UVdcq7Ih1LJpvsXYTpvEjo5fdbTEssTk2hVTNco/3aVnS4IRVqu3SOC4IvWhjV4uWYm/P6y44Pmi5HGU6cJspdgUveMVcV9bbcVUrnUe/YVAMmfhfyFkVxfbOcxWw==
  • Authentication-results-original: kernel.org; dkim=none (message not signed) header.d=none;kernel.org; dmarc=none action=none header.from=arm.com;
  • Cc: Marc Zyngier <maz@xxxxxxxxxx>, nd <nd@xxxxxxx>, xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, CodeWiz2280 <codewiz2280@xxxxxxxxx>, Julien Grall <julien.grall.oss@xxxxxxxxx>
  • Delivery-date: Tue, 16 Jun 2020 07:56:49 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: kernel.org; dkim=none (message not signed) header.d=none;kernel.org; dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHWOBaIAfEL/lLkK0WiNSn4kZcZc6jDwRQAgAAfVYCAACZwgIACvmKAgABfPYCAAA+JgIAA6NEAgAAP9wCAAAJxgIAAEuGAgAAfEwCAAGmFAIAAh2UAgABV34CAAFCtAIAAAUSAgAADZQCAAAGKgIAAJpOAgABE7QCABAZcAIAAQRIAgAA9oACAAXYtAIAAD3sAgAAFaoCAABUzgIAAB/uAgAAD1ICAAdWTgIAHsRIAgAAmsACAAK5FAA==
  • Thread-topic: Keystone Issue


> On 15 Jun 2020, at 22:32, Stefano Stabellini <sstabellini@xxxxxxxxxx> wrote:
> 
> On Mon, 15 Jun 2020, CodeWiz2280 wrote:
>> On Wed, Jun 10, 2020 at 5:46 PM Julien Grall <julien.grall.oss@xxxxxxxxx> 
>> wrote:
>>> 
>>> Hi Marc,
>>> 
>>> On Tue, 9 Jun 2020 at 18:45, Marc Zyngier <maz@xxxxxxxxxx> wrote:
>>>>> I was wondering if you heard about any potential issue with guest EOI
>>>>> not forwarded to the host. This is on TI Keystone (Cortex A-15).
>>>> 
>>>> Not that I know of. A-15 definitely works (TC2, Tegra-K1, Calxeda Midway
>>>> all run just fine with guest EOI), and GIC-400 is a pretty solid piece
>>>> of kit (it is just sloooooow...).
>>>> 
>>>> Thinking of it, you would see something like that if the GIC was seeing
>>>> the writes coming from the guest as secure instead of NS (cue the early
>>>> firmware on XGene that exposed the wrong side of GIC-400).
>>> 
>>> Ah, I remember that one.  We used to carry an hack in Xen [1] for
>>> X-Gene. Thankfully they fixed the firmware!
>>> 
>>> If it is a similar issue, then the firmware path would definitely be
>>> my preference.
>>> 
>>> Thank you for the input!
>> 
>> Thank you all for the information.  If I pull the changes to use the
>> maintenance interrupt for the X-Gene back into the latest build of Xen
>> then my issue with the Edge and Level interrupts is resolved.  My
>> ethernet and other devices work fine again for the Keystone in dom0.
>> Are there any concerns over operating this way, meaning with the
>> maintenance interrupt workaround rather than the EOI?  Is this safe?
> 
> It should be fine, a small impact on performance, that's all.

Agree, this is safe but you will have an overhead (one context switch back to 
Xen on interrupt ack in Dom0 in your case).

> 
> 
>> Also, the latest linux kernel still has the X-Gene storm distributor
>> address as "0x78010000" in the device tree, which is what the Xen code
>> considers a match with the old firmware.  What were the addresses for
>> the device tree supposed to be changed to?  Is my understanding
>> correct that there is a different base address required to access the
>> "non-secure" region instead of the "secure" 0x78010000 region?  I'm
>> trying to see if there are corresponding different addresses for the
>> keystone K2E, but haven't found them yet in the manuals.
> 
> I went through the old emails archive but couldn't find a mention of the
> other address, sorry.

I think there is no other address as even though there would be one the Secure 
status reported by the core would still say that you are running in secure mode.
I would really suggest to try to contact directly TI on that part to get an 
official answer from them as they might have a workaround.

Cheers
Bertrand






 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.