[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH V2] arch: arm: vgic-v3: fix GICD_ISACTIVER range



On 27.11.19 10:31, Peng Fan wrote:
Subject: Re: [Xen-devel] [PATCH V2] arch: arm: vgic-v3: fix GICD_ISACTIVER
range

On 27.11.19 01:01, Julien Grall wrote:
Hi,

On 26/11/2019 23:17, Stefano Stabellini wrote:
On Tue, 26 Nov 2019, Julien Grall wrote:
Hi,

On 26/11/2019 20:43, Stefano Stabellini wrote:
+ Juergen

I missed that you weren't in CC to the original patch, sorry.
I think this patch should go in, as otherwise Linux 5.4 could run
into problems. It is also a pretty straightforward 4 lines patch.

5.5 (or 5.6) is not going to run on Xen for other reasons (still in
the vGIC)... So I would not view this as critical.

5.5 is not out yet, in fact, the dev window has just opened. Isn't
your statement a bit premature?

The GICv4.1 work [1] is going to prevent Linux booting on all current
versions of Xen. While I can't confirm this is going to be merged in
5.5, I can tell you this will break.


In any case, even if potential future Linux releases could have other
additional issues, I don't think it should change our current view on
this specific issue which affects 5.4, just released.

The patch is definitely not as straightforward as you may think.
Please refer to the discussion we had on the first version. I voiced
concern about this approach and gave point what could go wrong with
happen.

This patch may be better than the current state (i.e crashing), but
this wasn't tested enough to confirm this is the correct things to do
and no other bug will appear (I don't believe reading I*ACTIVER was
ever tested before).

It is an annoying bug, but this is only affecting 5.4 which has just
been released. It feels to me this is a fairly risky choice to merge
it qutie late in the release without a good graps of the problem (see above).

So I would definitly, prefer if this patch is getting through backport
once we get more testing.

We can still document the bug in the release note and point people to
the patch.

Anyway, this is Juergen choice here. But at least now he has the full
picture...

Cheers,

[1]
https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Flwn.

net%2FArticles%2F800494%2F&data=02%7C01%7Cpeng.fan%40nxp.co
m%7Cdca

dfb39240749ee675e08d772fcd3ba%7C686ea1d3bc2b4c6fa92cd99c5c30163
5%7C0%7

C0%7C637104302519996592&sdata=7Jv2IhI8HZgBTSuYzkEplFyhX1lzmv
d73xb5
2d6ERVQ%3D&reserved=0


Thanks, Julien, for sharing your opinion.

With that statement I'd like to defer this patch to 4.14.

But without this patch, 5.4 kernel will crash. So you prefer
we develop the solution as Julien suggested for 4.13?

I certainly won't take a patch for 4.13 when a maintainer of the
related code has reservations against it.

I think the best thing to do is to develop a proper patch the
maintainers are happy with and don't try to force it into 4.13 now.
Such a patch can still be backported to 4.13 later.


Juergen

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.