Received: by 2002:a05:7412:f690:b0:e2:908c:2ebd with SMTP id ej16csp269622rdb; Thu, 19 Oct 2023 04:13:04 -0700 (PDT) X-Google-Smtp-Source: AGHT+IH6656QlEJR+FSur8cm0CR724RRg9TUI2eSB+991nsQPfJmJM7K4yRDEZgAlwiHM9j2nl8U X-Received: by 2002:a17:90a:9747:b0:27c:f8bd:9a98 with SMTP id i7-20020a17090a974700b0027cf8bd9a98mr1613517pjw.40.1697713984102; Thu, 19 Oct 2023 04:13:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697713984; cv=none; d=google.com; s=arc-20160816; b=AwpeYRhp6sqJpgNVxVB18IodgBzIUeLIwNK9UNEwg9hpMzM7ZOMCjQJi7+OZPZw/I5 cZXcohUQMk0eUpSWoWTCoRg4lMVjt3OuVQsuGn5HqAJB9/3hB7vrExWZKxbRBp5dzWGX ZHrD1cFIeMpwrNHLfyB/ZQOHFCeSJTuRseNH4kbSyM7R6qkZWaxCI/68Qla+Agl+WjBL k4IXTSRt7Z1zEZRfDG5SCXQ37s75Q2G2LPQT1YBNYz97n4upHL90JUosMfISkrDONVLh pDA36lrmOGCzvRoE/pHnSMtreatem6goVAc9VQFNg29zmJPPY6UekeiZb33QvBuuyuRF 4RmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date:dkim-signature; bh=FHcIrzi84+OL4FLshEqxXpvf2/ikXdhgtAIIKU6wjK8=; fh=6FtrnhEkCWyBy9HTVtLOvJ34RGyhZOzv0E2yqZm/bMA=; b=o2gf6M5SnoxEINPR6cY+FHpg4/fUSLWhJk2i628LKH5x9zs3ohvhphTkoL1x+bEgI0 epPrlIb1Jmt4jLxgC2ThDKmApSBz2+n27mteE0bur7Ba8/oMfb/n2NDNQ5DYDA2e8glj 4tDb+mORDkNyd6F1GSOpGwJgjdg3LzMfcIwL46/1tTMT50YK+Loz0ByP/oifo4kSKm6p ew7LWgM/XYTpShmeVs3PPQVsO0JHC1N3p50O/AXj2fHiSsFImZluBqCU2943EquJdyYQ ewHLc1G+hRuAx1RsalTk6akYojYXy4lUp16jpCMvvImPNUibquhcY1UJUK8fKRVHZ2/D fR+Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Vut8FnJj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from fry.vger.email (fry.vger.email. [23.128.96.38]) by mx.google.com with ESMTPS id j1-20020a17090aeb0100b0027995cf4342si1841424pjz.55.2023.10.19.04.13.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 19 Oct 2023 04:13:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) client-ip=23.128.96.38; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Vut8FnJj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 105378344A29; Thu, 19 Oct 2023 04:13:01 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345328AbjJSLMx (ORCPT + 99 others); Thu, 19 Oct 2023 07:12:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47180 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345325AbjJSLMw (ORCPT ); Thu, 19 Oct 2023 07:12:52 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2755D126 for ; Thu, 19 Oct 2023 04:12:50 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B454CC433C8; Thu, 19 Oct 2023 11:12:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1697713969; bh=XTqMeSpKqcuasX9eby3qHv7gedznY2jckAT9FxyMVsI=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=Vut8FnJjXNgyZ7kXP3YKB2xGB0cR5yJAnVCUOZ1fOr2tcljAAqeR43RMuY7nLjwi+ MEU+dZyNp4FrqVRRObTJYfDii7w3STJTWj0lDBENOtxgc5tUWFXKSw437RKBtdn+Db dIc5sNGIKpHAL6eN/GCr58GIYa/qsxUVeSs1SzlJ8sKEOv9f428fFmyh2GeoSXoyq2 rj+bTcyst/9KgEgUY9+goPaDOOemGn9te77MCajxs9zJqp2HMnRjnSzsDY0BA79BlU XnPidvZcWLNwbIbA2Njr0M7hdWon5TFyyW3hpxtCSTXgYFsmSoxT/hg2I+xL2VPAtq jMdjhFk2XptxQ== Received: from sofa.misterjones.org ([185.219.108.64] helo=goblin-girl.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1qtQxL-005ilA-7y; Thu, 19 Oct 2023 12:12:47 +0100 Date: Thu, 19 Oct 2023 12:12:45 +0100 Message-ID: <86lebyn9w2.wl-maz@kernel.org> From: Marc Zyngier To: Lorenzo Pieralisi Cc: linux-kernel@vger.kernel.org, Robin Murphy , Mark Rutland , "Rafael J. Wysocki" , linux-arm-kernel@lists.infradead.org, devicetree@vger.kernel.org, linux-acpi@vger.kernel.org, Rob Herring , Fang Xiang Subject: Re: [PATCH v3 5/5] irqchip/gic-v3: Enable non-coherent redistributors/ITSes ACPI probing In-Reply-To: References: <20230905104721.52199-1-lpieralisi@kernel.org> <20231006125929.48591-1-lpieralisi@kernel.org> <20231006125929.48591-6-lpieralisi@kernel.org> <86v8b5mc5v.wl-maz@kernel.org> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/29.1 (aarch64-unknown-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: lpieralisi@kernel.org, linux-kernel@vger.kernel.org, robin.murphy@arm.com, mark.rutland@arm.com, rafael@kernel.org, linux-arm-kernel@lists.infradead.org, devicetree@vger.kernel.org, linux-acpi@vger.kernel.org, robh+dt@kernel.org, fangxiang3@xiaomi.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Thu, 19 Oct 2023 04:13:01 -0700 (PDT) On Wed, 18 Oct 2023 09:42:14 +0100, Lorenzo Pieralisi wrote: > > On Tue, Oct 17, 2023 at 05:44:28PM +0100, Marc Zyngier wrote: > > On Tue, 17 Oct 2023 15:19:46 +0100, > > Lorenzo Pieralisi wrote: > > > > > > On Fri, Oct 06, 2023 at 02:59:29PM +0200, Lorenzo Pieralisi wrote: > > > > The GIC architecture specification defines a set of registers > > > > for redistributors and ITSes that control the sharebility and > > > > cacheability attributes of redistributors/ITSes initiator ports > > > > on the interconnect (GICR_[V]PROPBASER, GICR_[V]PENDBASER, > > > > GITS_BASER). > > > > > > > > Architecturally the GIC provides a means to drive shareability > > > > and cacheability attributes signals and related IWB/OWB/ISH barriers > > > > but it is not mandatory for designs to wire up the corresponding > > > > interconnect signals that control the cacheability/shareability > > > > of transactions. > > > > > > > > Redistributors and ITSes interconnect ports can be connected to > > > > non-coherent interconnects that are not able to manage the > > > > shareability/cacheability attributes; this implicitly makes > > > > the redistributors and ITSes non-coherent observers. > > > > > > > > So far, the GIC driver on probe executes a write to "probe" for > > > > the redistributors and ITSes registers shareability bitfields > > > > by writing a value (ie InnerShareable - the shareability domain the > > > > CPUs are in) and check it back to detect whether the value sticks or > > > > not; this hinges on a GIC programming model behaviour that predates the > > > > current specifications, that just define shareability bits as writeable > > > > but do not guarantee that writing certain shareability values > > > > enable the expected behaviour for the redistributors/ITSes > > > > memory interconnect ports. > > > > > > > > To enable non-coherent GIC designs on ACPI based systems, parse the MADT > > > > GICC/GICR/ITS subtables non-coherent flags to determine whether the > > > > respective components are non-coherent observers and force the shareability > > > > attributes to be programmed into the redistributors and ITSes registers. > > > > > > > > An ACPI global function (acpi_get_madt_revision()) is added to retrieve > > > > the MADT revision, in that it is essential to check the MADT revision > > > > before checking for flags that were added with MADT revision 7 so that > > > > if the kernel is booted with ACPI tables (MADT rev < 7) it skips parsing > > > > the newly added flags (that should be zeroed reserved values for MADT > > > > versions < 7 but they could turn out to be buggy and should be ignored). > > > > > > > > Signed-off-by: Lorenzo Pieralisi > > > > Cc: Robin Murphy > > > > Cc: Mark Rutland > > > > Cc: "Rafael J. Wysocki" > > > > Cc: Marc Zyngier > > > > --- > > > > drivers/acpi/processor_core.c | 21 +++++++++++++++++++++ > > > > drivers/irqchip/irq-gic-common.h | 8 ++++++++ > > > > drivers/irqchip/irq-gic-v3-its.c | 4 ++++ > > > > drivers/irqchip/irq-gic-v3.c | 9 +++++++++ > > > > include/linux/acpi.h | 3 +++ > > > > 5 files changed, 45 insertions(+) > > > > > > Hi Marc, > > > > > > just a quick note to ask if, from an ACPI binding POW > > > > I guess you mean POV. POW has an entirely different meaning... :-/ > > > > > this patch and related approach make sense to you. > > > > > > If so, we can start the process to get the ACPI changes drafted > > > in: > > > > > > https://bugzilla.tianocore.org/show_bug.cgi?id=4557 > > > > > > and deployed in this patch into the ACPI specs, I can log > > > an "ACK" in the tianocoreBZ entry above (we will be able to > > > rework the code as much as we want, this is just for the > > > bindings). > > > > I'm OK with the overall shape of it. However, I wonder what the > > rationale is for spreading the redistributor property all over the map > > (in both GICC and GICR structures), while it could be set once and for > > all in the core MADT flags (32 bits, of which only one is in use). > > > > It is bad enough that there are two ways of getting the GICR regions. > > Why can't the properties that apply to all of the be common? > > I don't think we are allowed to add arch specific flags to the MADT > since those, supposedly, are cross-architecture (and the only one > defined is quite old, though x86 specific). There is nothing that is truly cross-arch in this table. *everything* in MADT is arch-specific. > The reason behind spreading the property is the nature of GICC/GICR > subtables themselves - we wanted to apply flags only in subtables > relevant to the components in question. > > We could try to add a global flag to the MADT but I would not be > surprised if the ECR would be rejected then for the reason I explained > above. I don't think that's much of a reason, but I really don't care enough about this to argue otherwise. M. -- Without deviation from the norm, progress is not possible.