Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp2209361ybl; Thu, 29 Aug 2019 05:15:21 -0700 (PDT) X-Google-Smtp-Source: APXvYqyenPtHky3cg9Fq37tp9+8VckbbLneSBt/kLLURw+PkylYMIXM5hgU1RnALCliQwGMOLj4Z X-Received: by 2002:a63:e44b:: with SMTP id i11mr7787559pgk.297.1567080921685; Thu, 29 Aug 2019 05:15:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567080921; cv=none; d=google.com; s=arc-20160816; b=kCz9Mxn0ii1GUuzb+3v5+c1pyMJ/ntN3f5tF3I9McFy0uJcZpBsl8hc4hoBNjZtX1f rbJyFJ5cACxaV5jBrLKZPTUbuAJ+Mc1jEPfEmNqpl2qaRRZ1s2xG23jxGuKeowUTDO5S jPsZOqQEMqpaX8XJ7IK20cef7o8cXcwCKyCKYLZZD2vNfQb569MJWETpntMe9cf+OqHr ZW1DEUSASwDE6SNKFImIstskpjakn5fcDeg46S9X925vQY4JlQQQwDgKLjfkFUmYODIe CcqfWnC5R7DbjFJHpT1/VRE7qNnqcgY/g7KNcUHHNEJXrf+DgbMKGyaXoGNdiLsBI/dY xpWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=jhWJmY9ceTwUAI+BB/0E9czTGgJSKJsRhhLsYd0+b6c=; b=SggyJ4MD+vWQeBrvVa4V/0WbTZdwLr6Fx8mDrk4q0d/Fy/FiIHLE/HfIN1UJ8DEySl FH/BJSNYbydXJ5NCfyD/zeyxIzIr7FGcO6KEUQqmQEp6PxegnHnSOUdHUnwxHU93maf9 gopBQrbAL/0coMS3ue2Wjc+uZzOtnnVTNMehzCVFybzLh0LUG+eFQq8644JWH9YU0GaX kgvua7ic+nJF4wMys14MNgjkSCFMn+GdrwUJFyPLOZWI9VbKyq77vDuJrhNmluXhlg4Y 9yf6KmSVI7Iz3bLmeEsaQQkLhhbbCfcHQQtFW8jbUEU2GHkwZdPkL2nofAtGxVAYGm3X Q1IA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r5si1848896plb.126.2019.08.29.05.15.03; Thu, 29 Aug 2019 05:15:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727345AbfH2MOF (ORCPT + 99 others); Thu, 29 Aug 2019 08:14:05 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:49957 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726416AbfH2MOF (ORCPT ); Thu, 29 Aug 2019 08:14:05 -0400 Received: from p5de0b6c5.dip0.t-ipconnect.de ([93.224.182.197] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1i3JJK-0002TT-9D; Thu, 29 Aug 2019 14:13:54 +0200 Date: Thu, 29 Aug 2019 14:13:53 +0200 (CEST) From: Thomas Gleixner To: Kai-Heng Feng cc: Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , harry.pan@intel.com, x86@kernel.org, LKML , Dave Hansen Subject: Re: [PATCH] x86/hpet: Disable HPET on Intel Coffe Lake In-Reply-To: <20190829091232.15065-1-kai.heng.feng@canonical.com> Message-ID: References: <20190829091232.15065-1-kai.heng.feng@canonical.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 29 Aug 2019, Kai-Heng Feng wrote: > Some Coffee Lake platforms have skewed HPET timer once the SoCs entered > PC10, and marked TSC as unstable clocksource as result. So here you talk about Coffee Lake and in the patch you use KABYLAKE. > Harry Pan identified it's a firmware bug [1]. > > To prevent creating a circular dependency between HPET and TSC, let's > disable HPET on affected platforms. > > [1]: https://lore.kernel.org/lkml/20190516090651.1396-1-harry.pan@intel.com/ > Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=203183 Please use Link:// for reference not [1] and not Bugzilla: > +static const struct x86_cpu_id hpet_blacklist[] __initconst = { > + { X86_VENDOR_INTEL, 6, INTEL_FAM6_KABYLAKE_MOBILE }, > + { X86_VENDOR_INTEL, 6, INTEL_FAM6_KABYLAKE_DESKTOP }, So this disables HPET on all Kaby Lake variants not just on the affected Coffee Lakes. I know that I rejected the initial patch with the random stepping cutoff... https://lore.kernel.org/lkml/alpine.DEB.2.21.1904081403220.1748@nanos.tec.linutronix.de In the other attempt to 'fix' this I asked for clarification, but silence from Intel after this: https://lore.kernel.org/lkml/alpine.DEB.2.21.1905182015320.3019@nanos.tec.linutronix.de Can Intel please provide some useful information about this finally? Thanks, tglx