[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] x86/ioapic: sanitize IO-APIC pins before enabling the local APIC


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Mon, 17 Jul 2023 14:04:41 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XMI8lmCXzA0GS2WCI1Jd+uwIR0Mxm5ObKw2ug0sl1z8=; b=ZN2KLGl638k5hKpw99ai2VNW3gSe85Tr1s86q+C6FkWVPcN/+3RO2l/MrcN2mjb2QPqBtQuKUxg4uXjGqSEzJvp1npI0rjpjJXuapb4xeXRAY4BHxy8u+csDoGbxC62SO54TDN4rAj1/NIMfP6QKijqAX+cEL6F+jgZJRLGTwpMimiIPL2LfNnUgD93nY5Q/V+UgNZt/TxB795ljtak5xrsntGvYtf2+/OBGKtDb1hBahYDK5s9yyhGzA0NthGOxqZxxlzNBStYlmCYwxrwHTGUWSZJgpsnBfRGOn1da2hV9HVZ3xljwTuRcRA5gSt4u6AC98mBfrR1x14CM2EiFZg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fyBPczmtAVrK2GlXmwnk04h46A5TOppFKhTP5PBiINW3LZYTmfn3f30xp40jCQb4XZHi7vo8N1wANKPwFZRauY/lS76T7AsOqip1eumpby3jIAMillnchKQjYygCa8asi3EjV+pK6RYCololSBRDVnw1j6HTBzb0SN1ZaJbqE3PpQWLyPcBEQsP5bkx4Om5t/oviNJEbMWe+3rGO/MNgUFnkKoLXRjQ25u2P0j2QExKAfNpQ2HE/1MOTt6N5gBMr9cB7MI4ytnfBgqmffVOyckHnGUPlsJ0rtqA3gt6qBgjKWzxkWcchCGRn/7P4Mw2JJ2q87CRH5Q8ytYoS/Lg14g==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Mon, 17 Jul 2023 12:05:23 +0000
  • Ironport-data: A9a23:YMNQpqImzQFe3HZ5FE+R95QlxSXFcZb7ZxGr2PjKsXjdYENShjQGz mUcUGiDa63eNmamfNFwatu28x9V6JHRyddqTAplqX01Q3x08seUXt7xwmUcnc+xBpaaEB84t ZV2hv3odp1coqr0/0/1WlTZhSAgk/rOHvykU7Ss1hlZHWdMUD0mhQ9oh9k3i4tphcnRKw6Ws Jb5rta31GWNglaYCUpKrfrawP9TlK6q4mhA4QVhPakjUGL2zBH5MrpOfcldEFOgKmVkNrbSb /rOyri/4lTY838FYj9yuu+mGqGiaue60Tmm0hK6aYD76vRxjnVaPpIAHOgdcS9qZwChxLid/ jnvWauYEm/FNoWU8AgUvoIx/ytWZcWq85efSZSzXFD6I+QrvBIAzt03ZHzaM7H09c5OD2Bv+ sQJEQkNdwyAuPK2xeu8RvFz05FLwMnDZOvzu1lG5BSAVLMKZM6GRK/Ho9hFwD03m8ZCW+7EY NYUYiZuaxKGZABTPlAQC9Q1m+LAanvXKmUE7g7K4/dopTGMl2Sd05C0WDbRUsaNSshP2F6Ru 0rN/njjAwFcP9uaodaA2iv117eUwn2rAOr+EpWg069m3kCUxVApIx9IdXG24vm320mXDoc3x 0s8v3BGQbIJ3E6hQ8T5Xha4iGWZpRNaUN1Ve8Ul7Cmdx6yS5ByWbkAUQzgEZNE4ucseQT0xy kTPj97vHSZosrCeVTSa7Lj8kN+pES0cLGtHaSpaSwIAuoDnuNtq0UmJSct/GqmoiNGzASv33 z2BsCk5gfMUkNIP0KK4u1vAhlpAu6T0c+L83S2PNkrN0++zTNXNi1CAgbQD0ct9EQ==
  • Ironport-hdrordr: A9a23:vDZ29ayjNYMEy3tE8SSrKrPwKL1zdoMgy1knxilNoH1uHvBw8v rEoB1173DJYVoqNk3I++rhBEDwexLhHPdOiOF6UItKNzOW21dAQrsSibfK8nnNHDD/6/4Y9Y oISdkYNDQoNykZsS8t2njcL+od
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Mon, Jul 17, 2023 at 08:40:05AM +0200, Jan Beulich wrote:
> On 14.07.2023 18:05, Roger Pau Monné wrote:
> > On Thu, Jul 13, 2023 at 02:18:29PM +0200, Jan Beulich wrote:
> >> On 13.07.2023 13:29, Roger Pau Monné wrote:
> >>> So to recap, I think we are in agreement that calling enable_IO_APIC()
> >>> just ahead of the call to setup_local_APIC() is the preferred
> >>> solution?
> >>
> >> Well, yes and no. My preferred course of action for the issue at hand
> >> would be to convert RTE 0 to ExtInt (under the mentioned set of
> >> conditions). I agree though that we also want to move the masking of
> >> RTEs, and for that I further agree with the placement mentioned above.
> > 
> > So I hacked up a change to set pin 0 to ExtINT mode (and avoid doing
> > the masking early), and I got:
> > 
> > (XEN) spurious 8259A interrupt: IRQ7.
> > 
> > This was a single interrupt, but still I think the masking is the
> > critical part to get backported.
> 
> One way to look at it, yes. My perspective is different though: If
> there truly is a (spurious or not) IRQ at the 8259, then it needs
> dealing with sooner or later (in the process of booting). Aiui if
> we masked pin 0 initially and then later unmasked it (after
> switching to ExtInt, if not set so by firmware), we'd still see a
> spurious IRQ7.

Hm, I see.  I'm not very familiar with 8259, I was expecting that
maybe we would mask the IRQ before getting such spurious injection,
but I'm not even sure that's possible or whether it would work.

Thanks, Roger.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.