[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] xen/arm: vtimer: Don't read/use the secure physical timer interrupt for ACPI


  • To: Julien Grall <julien@xxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Michal Orzel <michal.orzel@xxxxxxx>
  • Date: Fri, 6 Oct 2023 11:59:37 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=xen.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=BjHOJ/S9F0A9Mm0EzlyAOAxHFipEJgZevJ31LLlix+4=; b=bTSugFVxiFf+PtnQYprk8qdREdZ932WurlZGf+npGR0xt4mAJ3iFrdSkbkmczq8yMz65ZJ0oIDTqnYHRJGaDCCCpdif15iQMEz1dvhCHoq4FSRddUIAJtV7cw+komUX4T2JyHaCkDgLMVLHIcwlUSgfdXD3uWrrLCGWgQtDFi3MFhhWRjwBkgeghBZvQSeF8zOWMtHfEcZ04MKCw8N+zcEBdoaRLIZkoVFmaqJhEB10mjmX85xSXO7vedNI6bWohnzr3RDV47pMijb3wFtWlNOUoOOS0qPoTO+NWBxsCAabW4b/wEfdDQ8tOwlcxr2f8lMFf4Wg19LNqGsOjic7xZg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=J5K1Ncxc5Z+K/TxOdC4fD4ij7ENoTJqODBjI+0GESybjmtVzClqUsbnc5V/t9H0nzmSrrUiwRALckS83itLNtBFxn8ytcuViManC8CrqIlFGPxp7arMBvrpoYJ/VpAiD7igcJGJEtn01dmw6P+imcj6KwodDPtgRilbzAwrn8PyQ5ESzKBpID5FiK+XEVznYF1nC05cLqqUHGJb7LKxaQtQSXo8iGetIeRxsoJOBNzLhoQW0AXQGi3O28JXT/PZl/nvB7SCnXiePgX9LaNel6YGgVadJAa5MQMOujgBlEvHS22/X0M4Y+vyyv+T3MGf0KTKSBS0/aIIlgrw13Kbl5Q==
  • Cc: <Henry.Wang@xxxxxxx>, <dan.driscoll@xxxxxxxxxxx>, <arvind.raghuraman@xxxxxxxxxxx>, Julien Grall <jgrall@xxxxxxxxxx>, "Stefano Stabellini" <sstabellini@xxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Fri, 06 Oct 2023 09:59:57 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hi Julien,

On 06/10/2023 11:43, Julien Grall wrote:
> 
> 
> On 05/10/2023 21:15, Michal Orzel wrote:
>> Hi Julien,
> 
> Hi Michal,
> 
>> On 05/10/2023 18:54, Julien Grall wrote:
>>>
>>>
>>> From: Julien Grall <jgrall@xxxxxxxxxx>
>>>
>>> Per ACPI 6.5 section 5.2.25 ("Generic Timer Description Table (GTDT)"),
>>> the fields "Secure EL1 Timer GSIV/Flags" are optional and an OS running
>>> in non-secure world is meant to ignore the values.
>>>
>>> However, Xen is trying to reserve the value. When booting on Graviton
>>> 2 metal instances, this would result to crash a boot because the
>>> value is 0 which is already reserved (I haven't checked for which device).
>> Per my understanding it is not reserved by any device.
>> 0 means SGI and for SGIs we pre-reserve the bits in allocated_irqs at the 
>> very start.
> 
> Ah yes good point. Somehow, I had in mind that PPI was starting at 0
> '^^. How about replacing the paragraph with:
> 
> "However, Xen is trying to reserve the value. The ACPI tables for
> Graviton 2 metal instances will provide the value 0 which is not a
> correct PPI (PPIs start at 16) and would have in fact been already
> reserved by Xen as this is an SGI. Xen will hit the BUG() and panic()".
Yes, this sounds better. With that:
Reviewed-by: Michal Orzel <michal.orzel@xxxxxxx>

~Michal



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.