[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH V8] ns16550: Add support for UART present in Broadcom TruManage capable NetXtreme chips



>>> On 06.12.13 at 21:31, Aravind Gopalakrishnan 
>>> <aravind.gopalakrishnan@xxxxxxx> wrote:
> On 12/6/2013 10:00 AM, George Dunlap wrote:
>> Can you take a look at the guidelines linked below, think about the 
>> questions there, and then give a brief summary of the benefits and 
>> potential risks?
>>
>> 
> http://wiki.xen.org/wiki/Xen_Roadmap/4.4#Exception_guidelines_for_after_the_c 
> ode_freeze 
>>
>>
> To answer some of the questions-
> - What functionality is being fixed / enabled by this patch?
> This patch enables the UART present in Broadcom TruManage capable 
> NetXtreme 5725 chip.
> This chip is used in the Open Compute platform offering by AMD and is a 
> feature
> request from the customer who would like to use SoL while using Xen 
> virtualization.
> This platform does not have any other serial ports that can be used.
> 
> - If bug exists, what could be broken?/ Probability of the bug:
> The patch ensures that the existing functionality of the ns16550 code is 
> not affected in
> any manner. The existing code only supports IO-based UARTS and I have 
> verified Xen serial console
> to work fine with IO-based serial devices (after applying patch). The 
> only part of patch that
> touches/changes existing code is the line that does a check of the 
> 'size' of the address space
> exposed by the device-
> 
> /* Not 8 bytes */
> if ( size != 0x8 )
>      continue;
> 
> This too is not changing original behavior, but merely modifying the 
> code to calculate
> the 'size' before we check for it. Previously,it was
> 
> /* Not 8 bytes */
> if ( (len & 0xffff) != 0xfff9 )
>      continue;
> 
> which does same thing, only a little more implicitly.
> 
> Since the UART in this BCM chip is MMIO based, and has 64-bit BAR, 
> additions have been made to
> account for the lack of support in existing serial code in Xen. 
> Moreover, the patch is
> careful to only support this particular MMIO based UART. If we detect 
> anything else,
> the code falls back to default (existing) behavior of ignoring the device.
> 
> Problems will arise if we try to use interrupts. (Undefined behaviour)
> But to avoid those, we will document to the customer to add 
> com1=115200,8n1,pci,0
> on xen cmdline to observe output on console. Googling on 'Serial over 
> Lan on Xen'
> indicates this is an existing restriction for other SoL devices.
> 
> We are also making this PCI device read only to Dom0. We cannot hide it 
> entirely as Dom0
> is supposed to always see the device. For this reason,  we use 
> pci_ro_device and add the
> MMIO region to mmio_ro_ranges to prevent write access by Dom0 (thus 
> protecting any malicious
> Dom0 access to the address space)
> 
> If bugs arise, then I am inclined to think that it would break only this 
> specific BCM chip
> and not existing functionality. (probability is low as I have tested it 
> against the chip and it
> works fine)
> 
> Also, tested cross-compiling to arm32 and arm64 and verified that build 
> does not break.
> 
> - Given the above benefit and risk, is this patch worth it?
> Given the customer desire to use Xen on this platform in the 4.4 
> timeframe, and the low
> probability of regression on other devices, we would request this be 
> applied against 4.4.

Honestly, if I'm asked - I'm not convinced. To me this boils down to
low risk low benefit, with the risk analysis part apparently heavily
biased towards "the patch appears to be bug free", whereas from
a patch history perspective this clearly wasn't the case from the
beginning, and hence there's a fair chance that some aspect was
still overlooked in the latest review round. Furthermore we're not
talking about something that was on the feature list for 4.4.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.