[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [XEN PATCH] x86/ACPI: Ignore entries with invalid APIC IDs when parsing MADT


  • To: Simon Gaiser <simon@xxxxxxxxxxxxxxxxxxxxxx>, "committers@xxxxxxxxxxxxxx" <committers@xxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Fri, 1 Sep 2023 09:44:28 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DotymbDAi8cUClpNc9fKcWdmy7p9FUp+OUWHV31d+X0=; b=MMTIPwBBXYIeO+2ilN+cSXeBNQNBIMvP+mToQ6LlJ6Wh1Pch+0fqdLfkshxsHgvq3dcp2u7vuU4m76sWfwQ+y76PMFXVKShE9WUMHyQrv5oFqz658YwTq/j9138fIY2e7VXXLCbcDOtnmMGIp0CBQSEZ+x8+MFVy4dHneri6fw87/XxbnaaSnLycl7By4m4boHfAzxPROEqBSCw2PpMkOMAg2bPdVlKjrQN8NQellvkzl+2Ccgr4jnAo5FMOjETlG4I5dUCjqs3+YT3QgTUEXxdsx5nvvnhxvdaJR/Zc474+CriUhk3nxjRsQWWljWOdSqJZC+Od+U8mpK244fs+nw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bc2R6YtWyGjuxUgBXxHm3qUvaM8/kY3iLm3e57WonI9ixJdSDZwc4RGXH2sBzesk0XqGqzijr2SaRiaBG0//xnfGLOxy+wb/hgCcTzsKMIgMCGe2vJfb9XZzroQ7NyzG5rx4ZlOIWdriKAqFRb7LIk6Spq5bfBO9u9DUt5wa7uB+CGDjOggSyYJzIMA8X6mt1pZ9TJkMKWHaftNOoG89JjrU2r9FxXju3I1C2ibLuqWoo1WAPdV7zo+vvDOcnXIJeNalAZiYAHJ0Dybdoqu2ZDI6/3QhuSqz596iO/9sLGN9UN4g5gkfeqEriFA7bUzEyxedpkIJu6yW7nZ6yHE+pw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Fri, 01 Sep 2023 07:44:44 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 07.08.2023 11:38, Simon Gaiser wrote:
> It seems some firmwares put dummy entries in the ACPI MADT table for non
> existing processors. On my NUC11TNHi5 those have the invalid APIC ID
> 0xff. Linux already has code to handle those cases both in
> acpi_parse_lapic [1] as well as in acpi_parse_x2apic [2]. So add the
> same check to Xen.
> 
> Note that on some older (2nd gen Core i) laptop of mine I also saw dummy
> entries with a valid APIC ID. Linux would still ignore those because
> they have !ACPI_MADT_ENABLED && !ACPI_MADT_ONLINE_CAPABLE. But in Xen
> this check is only active for madt_revision >= 5. But since this version
> check seems to be intentionally I leave that alone.
> 
> Link: 
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f3bf1dbe64b62a2058dd1944c00990df203e8e7a
>  # [1]
> Link: 
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10daf10ab154e31237a8c07242be3063fb6a9bf4
>  # [2]
> Signed-off-by: Simon Gaiser <simon@xxxxxxxxxxxxxxxxxxxxxx>

This patch was committed with unaddressed review comments. The normal action
in such a case would be to revert, expecting a v2 to arrive. One alternative
here would be a timely incremental patch submission. Another alternative,
considering in particular Thomas's most recent reply, would be to properly
downgrade CPU hotplug support in SUPPORT.md (with a corresponding entry in
CHANGELOG.md).

I'll give it until the end of next week for either of the alternatives to be
carried out. If nothing appears by then, I'll assume I may rightfully revert.
(This timeline also allows putting this topic on the Community Call agenda,
should anyone think this is necessary.)

Regards, Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.