[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [XEN PATCH] x86/ACPI: Ignore entries with invalid APIC IDs when parsing MADT
- To: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Date: Mon, 11 Sep 2023 19:24:04 +0100
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EkMyWrDKQ7Ucj4+TT2XkwLPwIWkV9G6AU7PoQlAAdA8=; b=DQ/CKldEEFFFeEmdnRe002fuJqIQa04OB2phAKNMNuwen0ohv7m0b4fgdUx0cwdyglOgrgM2L16sGzXtd3RpTQ2/KapktsHWl5YWqeegFaNjYrbDi4hC878rUxy1WnFA0tc9gwMw2fd3l9RHpQNPXS8WF40hA04cHJKe1wNZ0axGXJ6nj0qEnNgnKm85ZAPOr4Yrj/k25fCe4rxW1eAHrTmUjbuX6Z9RTVxnkcTAXNLr2Ei3SlA2z9po2y3G6rtoGd4Ciy+hITtBmL9FaUiyIz48tbWl3mQfyGwC3HIqysZhP5gRjvgbIKJmnGxXQxLWxE7b3CgWh19XlPyt1QIOMQ==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XRT2+A02ayKE+ChELhr70ge80CK497cr+QiXDxoR/1iAuxXneJCCgClFdyOEnIlaVwYL2N6m0ibdmt+LMGYhI0rkSALsHuumHZErOmahk9Xcj0XYvIqjfHqY3nUHIeT/0bKgZ/bCUZK6QNyRkXGcoTo8Pseio4MMfRbhkBF/hR6HO7NeJDLupZ09VwPl+qND/VOIhyXB6QoDom9EGTOO7NzpRsXw47NFs4DBmMMmVnWaPjfIm44ZfG33hxfdlU5xAQRYaxL18sflaTWml+4aG9vzqeEo2SB362Y49Q+RTC4DiBBlrnE8UTtPKnKhDFJd/PEoW2LamIdJq0TScqP5Cg==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
- Cc: Simon Gaiser <simon@xxxxxxxxxxxxxxxxxxxxxx>, "committers@xxxxxxxxxxxxxx" <committers@xxxxxxxxxxxxxx>, Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx, Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Delivery-date: Mon, 11 Sep 2023 18:24:58 +0000
- Ironport-data: A9a23:cDkzxKhrhQ1BEAK1rwiGPPPBX161xxEKZh0ujC45NGQN5FlHY01je htvDTyGbquJMDehL9snO4/loENS6JTTmtRjSVdv/3xhFS8b9cadCdqndUqhZCn6wu8v7q5Ex 55HNoSfdpBcolv0/ErF3m3J9CEkvU2wbuOhTraCYmYoHVMMpB4J0XpLg/Q+jpNjne+3CgaMv cKai8DEMRqu1iUc3lg8sspvkzsx+qyo0N8klgZmP6sT7QaHzyB94K83fsldEVOpGuG4IcbiL wrz5OnR1n/U+R4rFuSknt7TGqHdauePVeQmoiM+t5mK2nCulARrukoIHKN0hXNsoyeIh7hMJ OBl7vRcf+uL0prkw4zxWzEAe8130DYvFLXveRBTuuTLp6HKnueFL1yDwyjaMKVBktubD12i+ tQGNAhQTTGDwN6S5+2kSLVquvsffez0adZ3VnFIlVk1DN4AaLWaGeDmwIEd2z09wMdTAfzZe swVLyJ1awjNaAFOPVFRD48imOCvhT/0dDgwRFC9/PJrpTSMilEgluGyarI5efTTLSlRtm+eq njL4CLSBRYCOcbE4TGE7mitlqnEmiaTtIc6Tefhq6Az3gzDroAVIENJbkaB/b6UsWv9RchUc XROuTAIsJFnoSRHSfG4BXVUukWspQUAUtBdF+k77gClyafO5QudQG8eQVZpatYrqcs3TjwCz UKSkpXiAjkHmKaUTHWb3raSszKpOCIRIHMCZCkLVg8M6Z/op4RbphnIS9NiDLK4lMbdCTz22 yqNriU1m/MUl8Fj/6Cy51XOmT+vjpnPUA8u5w/TU36l7wV2f4qsbcqj7l2zxeZNKsOVQ0eMu FAAmtOC96YeAJeVjiuPTe4RWraz6J6tLDLYkXZrHp886y6q/X+zO4xdiAySP29sO8cAPDPsP knavFoL4IcJZSTwK6hqf4i2FsImi7D6EsjoXezVadwIZYVtcAiA/2dlYkv4M33RrXXAWJoXY f+zGftAx15BYUi75FJan9sg7II=
- Ironport-hdrordr: A9a23:m4Po/Kq/Ce6chS2GYin90HwaV5tNLNV00zEX/kB9WHVpm5Oj+v xGzc5w6farsl0ssREb9uxo9pPwJ080hqQFhbX5Wo3SITUO2VHYVr2KiLGP/9SOIVycygcw79 YZT0E6MqyKMbEYt7eF3ODbKbYdKbC8mcjH5Ns2jU0dND2CA5sQkDuRYTzrd3GeKjM2YqbRWK DshPau8FGbCAgqh4mAdzA4dtmGg+eOuIPtYBYACRJiwA6SjQmw4Lq/PwmE0gwYWzZvx65n1W TeiQT26oiqrvn+k3bnpiLuxqUTvOGk5spIBcSKhMRQAjLwijywbIAkd6yesCszqOSP7k9vtN XXuR8vM+l69nuUVGCophnG3RXmzV8VmjXf4G7dpUGmjd3yRTo8BcYErYVFciHB405lmN1nyq pE00+QqpISVHr77W/AzumNcysvulu/oHIkn+JWp3tDUbEGYLsUiYAE5ktaHLoJASq/woE6F+ tFCt3a+Z9tABunRkGcmlMq7M2nX3w1EBvDak8euvaN2zwTp3x9x1tw/r1qol4wsLYGD7VU7e XNNapl0JtUSNUNUK57DOAdBeOqF23kW3v3QSOvCGWiMJtCF2PGqpbx7rlwzvqtYoY0wJw7n4 mEeE9EtFQ1Z1nlBaS1rdN2Gyj2MSaAtAnWu4NjD8ATgMy4eFOrC1zNdLkWqbrhnx1FaferH8 paO/ptcorexCXVaMF0NjbFKupvwEklIbwoU+kAKiKzS+LwW/rXX7/gAYDuDYuoNwoYcUXCJV ZGdATPBax7nzKWsznD8VTsZ08=
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 06/09/2023 9:49 pm, Stefano Stabellini wrote:
> On Fri, 1 Sep 2023, Jan Beulich wrote:
>> On 07.08.2023 11:38, Simon Gaiser wrote:
>>> It seems some firmwares put dummy entries in the ACPI MADT table for non
>>> existing processors. On my NUC11TNHi5 those have the invalid APIC ID
>>> 0xff. Linux already has code to handle those cases both in
>>> acpi_parse_lapic [1] as well as in acpi_parse_x2apic [2]. So add the
>>> same check to Xen.
>>>
>>> Note that on some older (2nd gen Core i) laptop of mine I also saw dummy
>>> entries with a valid APIC ID. Linux would still ignore those because
>>> they have !ACPI_MADT_ENABLED && !ACPI_MADT_ONLINE_CAPABLE. But in Xen
>>> this check is only active for madt_revision >= 5. But since this version
>>> check seems to be intentionally I leave that alone.
>>>
>>> Link:
>>> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f3bf1dbe64b62a2058dd1944c00990df203e8e7a
>>> # [1]
>>> Link:
>>> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10daf10ab154e31237a8c07242be3063fb6a9bf4
>>> # [2]
>>> Signed-off-by: Simon Gaiser <simon@xxxxxxxxxxxxxxxxxxxxxx>
>> This patch was committed with unaddressed review comments.
Count the number of x86 maintainer tags on the patch, and see that they
were given after discussion, not before.
You're outvoted 2:1 by Xen x86 maintainers alone, and more than 2:1 if
you include the x86 maintainers from other projects who participated in
the discussion.
I'm not willing to let Xen keep on malfunctioning on millions of systems
just because you think an unfinished spec is more correct that practical
reality which invalidates it.
>> The normal action
>> in such a case would be to revert, expecting a v2 to arrive. One alternative
>> here would be a timely incremental patch submission. Another alternative,
>> considering in particular Thomas's most recent reply, would be to properly
>> downgrade CPU hotplug support in SUPPORT.md (with a corresponding entry in
>> CHANGELOG.md).
> I am in favor of downgrading physical CPU hotplug support in
> SUPPORT.md.
SUPPORT.md does look bogus and wants correcting, but it is laughable to
claim that this ever worked, let alone that it's supported.
Intel got half way through specifying ACPI CPU Hotplug, and abandoned it
as a technology because they couldn't get it to work. Hence the feature
has never been tested.
Furthermore, cursory testing that Thomas did for the Linux topology work
demonstrates that it is broken anyway for reasons unrelated to ACPI parsing.
Even furthermore, it's an area of the Xen / dom0 boundary which is
fundamentally broken for non-PV cases, and undocumented for the PV case,
hence why it's broken in Linux.
Physical CPU Hotplug does not pass the bar for being anything more than
experimental. It's absolutely not tech-preview level because the only
demo it has had in an environment (admittedly virtual) which does
implement the spec in a usable way demonstrates that it doesn't function.
The fact no-one has noticed until now shows that the feature isn't used,
which comes back around full circle to the fact that Intel never made it
work and never shipped it.
~Andrew
|