Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753351AbbBMQ1l (ORCPT ); Fri, 13 Feb 2015 11:27:41 -0500 Received: from pandora.arm.linux.org.uk ([78.32.30.218]:39267 "EHLO pandora.arm.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752872AbbBMQ1k (ORCPT ); Fri, 13 Feb 2015 11:27:40 -0500 Date: Fri, 13 Feb 2015 16:27:25 +0000 From: Russell King - ARM Linux To: Mark Rutland Cc: Stephen Boyd , "Paul E. McKenney" , Krzysztof Kozlowski , "linux-arm-kernel@lists.infradead.org" , "linux-kernel@vger.kernel.org" , Arnd Bergmann , Bartlomiej Zolnierkiewicz , Marek Szyprowski , Catalin Marinas , Will Deacon Subject: Re: [PATCH v2] ARM: Don't use complete() during __cpu_die Message-ID: <20150213162725.GC8656@n2100.arm.linux.org.uk> References: <1423131270-24047-1-git-send-email-k.kozlowski@samsung.com> <20150205105035.GL8656@n2100.arm.linux.org.uk> <20150205142918.GA10634@linux.vnet.ibm.com> <20150205161100.GQ8656@n2100.arm.linux.org.uk> <54D95DB8.9010308@codeaurora.org> <20150210151416.GD9432@leverpostej> <54DA6E92.3090109@codeaurora.org> <54DA725E.6080305@codeaurora.org> <20150213155208.GG10496@leverpostej> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20150213155208.GG10496@leverpostej> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1674 Lines: 37 On Fri, Feb 13, 2015 at 03:52:08PM +0000, Mark Rutland wrote: > > @@ -194,10 +195,6 @@ int __cpu_disable(void) > > unsigned int cpu = smp_processor_id(); > > int ret; > > > > - ret = platform_cpu_disable(cpu); > > - if (ret) > > - return ret; > > For PSCI 0.2+ I was hoping to hook the MIGRATE logic in here. The secure > side may reject hotplugging of a CPU, but it's a dynamic property of the > system and so can't be probed once at boot time. You may have to think about how to deal with the static nature of the sysfs CPU hotplug properties then - or, you may wish to have the existing behaviour where we expose the sysfs hotplug properties on all CPUs and rely on returning -EPERM. One question does come up - if it's a dynamic property of the system, what ensures that it can't change between the point when we test it (in __cpu_disable()) and when we actually come to take the CPU offline? How does the secure side signal its rejection of hotunplugging of a CPU? If it happens after __cpu_disable(), then that's a problem: the system will have gone through all the expensive preparation by that time to shut the CPU down, and it will expect the CPU to go offline. The only way it can come back at that point is by going through a CPU plug-in cycle... which means going back through secondary_start_kernel. -- FTTC broadband for 0.8mile line: currently at 10.5Mbps down 400kbps up according to speedtest.net. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/