[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH][4.15] x86/HPET: don't enable legacy replacement mode unconditionally


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Fri, 26 Mar 2021 18:00:05 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VRmK3fvpBpmXjBaVeNBv5m1IhjGrK7YKyDWY5lkGwbk=; b=jbS02a/R/RtBRI9bEVvL8pFzKjen/gxJKnZfsXqXUt7m+ex1wi7tgr0RoybJ3p6zvJ3utQVa4i4Z2jrCrTlfKuyvDd3rNrCTyhljH7HuWdnNyrvbWXk4DV/sp0K1IGWdyxU/Qtp/iJgQdPrKw2BhTHx0+qtBJw5yymc5bP6LIJJlU5pAhNJvHaOFwvArophwUGPoXxvxtzwh22uQdwEcjyZhunEJbNKEzSErFmtcTK3+479yXELNpUqr2AoSKtLEsz3xbC0oOFZzhJ0gD/219ZLb+fNnaBj1kd+cBbuF5x9k6d6oVap/zMusVraB/d7LKBjR3DHnc/+gK9aB6XMqiQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jK+OE2+H/0PP1nRE1lAjp4H2OXkYZLjLdXXpDQlGiKpl0QTKjGiSR9+OpILvU4yFP0Xopilrmx7Il0TGUiWFDm1MhaT80m2NJBechwl9R8byoNfmKvwsuX3F0dwIm+tE40gDlOQpiZxANyprBIRPkfSYpS/Px8BmOizc57e7TctxWwbuSPEEN3/8fKRpF120quFXV/tooDcI4K9PGm7PXw04CDBvMHYQnlYG2O+wKtU1UG5IOp7t+IOraJYT/eOfF/bqb4npkhYQxONtjadGp2+zm8j9iufBgjovbzu/W6iD/upiisYqOkIKCLIcciLg0azZ0PtbfvbkUNbkgOst1A==
  • Authentication-results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Ian Jackson <iwj@xxxxxxxxxxxxxx>
  • Delivery-date: Fri, 26 Mar 2021 17:00:23 +0000
  • Ironport-hdrordr: A9a23:W2y4bawSNgayzs/uyfDJKrPx3+skLtp033Aq2lEZdDV8btGYm8 eynP4SyB/zj3IrVGs9nM2bUZPsfVr3//dOgbU5F7GkQQXgpS+UPJhvhLGSpQHINg/f0qpm1a lme7VjE9GYNzJHpOvz/QXQKbkd6fad9qTAv4nj5ldrCTpncqRxqzp+YzzrcHFeYCljKd4HGI GH5sxBzgDQHkg/SsigHHEKU6ziirTw5fHbSCULDRIm9wWC5AnAgNLHOiOV0RsEXzREza1Kyx mhryXD6ri+qPb+8xfA1gbohKh+osfryddIGaW3+6woAwjr4zzIWK1RH4eskRpwi+Gp5VYsnr D30mgdFvU20Vz9VCWYpRPs3iPpzToh7WTzoGXo/0fLkIjCax8RT+ZHmIJFYjvVgnBQze1U4e Zw8E+y87pREB/akyz267HzJmFXv3vxm1UOu6o3rRVkIPIjQY4Ul6Mz1gdpNa1FOyTA5IUuAI BVfbzhzccTS3y2RTTkpGV1qebcJkgbL1O9bWUpnNea6DRSlGAR9Tpl+OUv2k0N858wUPB/lp /5G5UtkLlPS/kfZr5mCNEARtOqCnfMTQikChPpHWja
  • Ironport-sdr: 4LRYDLqQ//qE0GI79ZuUGU18YRmV70hadh+FsIzQsGZPSLMENlDm/4yVnLc73ZXwazY3JUUMog zScwnEnrVSH8Y9N9jYhsZ0dm1MiykwkIqStQbKZL9bYJTOcm1g/pwwsi8O9SLrnF0SKS/eCZOZ We11Bu/WYQpYmQYSQKTvYanUdxUAkYs4yuoOxZ33uWc5eh2t8G4O3hX9TRPPe9GspY1fiCNdZW irzkHJp95/PF22rAbbQaWGx92gi8/XYzzjC0sVSj8BCDQKa4NrXiqmTJTq8XlKgG4por1f6box cEw=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Wed, Mar 24, 2021 at 11:34:32AM +0100, Jan Beulich wrote:
> Commit e1de4c196a2e ("x86/timer: Fix boot on Intel systems using ITSSPRC
> static PIT clock gating") was reported to cause boot failures on certain
> AMD Ryzen systems. Until we can figure out what the actual issue there
> is, skip this new part of HPET setup by default. Introduce a "hpet"
> command line option to allow enabling this on hardware where it's really
> needed for Xen to boot successfully (i.e. where the PIT doesn't drive
> the timer interrupt).
> 
> Since it makes little sense to introduce just "hpet=legacy-replacement",
> also allow for a boolean argument as well as "broadcast" to replace the
> separate "hpetbroadcast" option.
> 
> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>

I think the commit does what it saying on the commit message, hence:

Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>

I would like to avoid such RB being seen as me deciding on which
option is best release wise.

Haven't followed the other discussion closely as I'm on PTO today, but
maybe it's an issue worth thinking over during the weekend?

> 
> --- a/docs/misc/xen-command-line.pandoc
> +++ b/docs/misc/xen-command-line.pandoc
> @@ -1274,9 +1274,26 @@ supported. See docs/misc/arm/big.LITTLE.
>  When the hmp-unsafe option is disabled (default), CPUs that are not
>  identical to the boot CPU will be parked and not used by Xen.
>  
> +### hpet (x86)
> +> `= List of [ <boolean> | broadcast | legacy-replacement ]`
> +
> +> Default : `true`, `no-broadcast`, 'no-legacy-replacement`
> +
> +Controls Xen's use of the system's High Precision Event Timer.  The boolean
> +allows to turn off use altogether.
> +
> +`broadcast` forces Xen to keep using the broadcast for CPUs in deep C-states
> +even when an RTC interrupt got enabled.
> +
> +`legacy-replacement` is intended to be used on platforms where the timer
> +interrupt doesn't get raised by the legacy PIT.  This then also affects
> +raising of the RTC interrupt.

I think Andrew rework of the change moved the x86 tag to a field on
the description instead of being in the title of the option and
arranged the options to be in list format, we might want to use that
instead, but can be adjusted later I guess since that would be a
documentation change.

Thanks, Roger.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.