From: Julien Grall <julien.grall@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, andre.przywara@arm.com
Subject: Re: [PATCH 03/13] xen/arm: setup: Check errata for boot CPU later on
Date: Fri, 25 May 2018 20:51:31 +0100 [thread overview]
Message-ID: <903bccf0-ceb7-d184-2b6c-c44afbf223a0@arm.com> (raw)
In-Reply-To: <alpine.DEB.2.10.1805231434360.15101@sstabellini-ThinkPad-X260>
Hi Stefano,
On 05/23/2018 10:34 PM, Stefano Stabellini wrote:
> On Tue, 22 May 2018, Julien Grall wrote:
>> Some errata will rely on the SMCCC version which is detected by
>> psci_init().
>>
>> This is part of XSA-263.
>>
>> Signed-off-by: Julien Grall <julien.grall@arm.com>
>
> Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>
Thank you for the review. On an internal review Andre's suggested to
move psci_init() outside smp_init_cpus(). Something like:
processor_id();
/* Need PSCI version for firmware based errata workarounds */
psci_init();
check_local_cpu_errata();
smp_init_cpus();
I am wondering whether it would be clearer to have. What do you think?
Cheers,
>
>> ---
>> xen/arch/arm/setup.c | 8 ++++++--
>> 1 file changed, 6 insertions(+), 2 deletions(-)
>>
>> diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
>> index 1d6f6bf37e..ac93de4786 100644
>> --- a/xen/arch/arm/setup.c
>> +++ b/xen/arch/arm/setup.c
>> @@ -171,8 +171,6 @@ static void __init processor_id(void)
>> }
>>
>> processor_setup();
>> -
>> - check_local_cpu_errata();
>> }
>>
>> void dt_unreserved_regions(paddr_t s, paddr_t e,
>> @@ -779,6 +777,12 @@ void __init start_xen(unsigned long boot_phys_offset,
>> printk(XENLOG_INFO "SMP: Allowing %u CPUs\n", cpus);
>> nr_cpu_ids = cpus;
>>
>> + /*
>> + * Some errata relies on SMCCC version which is detected by psci_init()
>> + * (called from smp_init_cpus()).
>> + */
>> + check_local_cpu_errata();
>> +
>> init_xen_time();
>>
>> gic_init();
>> --
>> 2.11.0
>>
--
Julien Grall
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
next prev parent reply other threads:[~2018-05-29 10:57 UTC|newest]
Thread overview: 62+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-05-22 17:42 [PATCH 00/13] xen/arm: SSBD (aka Spectre-v4) mitigation (XSA-263) Julien Grall
2018-05-22 17:42 ` [PATCH 01/13] xen/arm: domain: Zeroed the vCPU stack Julien Grall
2018-05-25 20:52 ` Stefano Stabellini
2018-05-29 10:27 ` Julien Grall
2018-05-29 21:41 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 02/13] xen/arm64: entry: Use named label in guest_sync Julien Grall
2018-05-23 21:27 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 03/13] xen/arm: setup: Check errata for boot CPU later on Julien Grall
2018-05-23 21:34 ` Stefano Stabellini
2018-05-25 19:51 ` Julien Grall [this message]
2018-05-29 21:30 ` Stefano Stabellini
2018-05-30 9:17 ` Julien Grall
2018-05-22 17:42 ` [PATCH 04/13] xen/arm: Add ARCH_WORKAROUND_2 probing Julien Grall
2018-05-23 21:57 ` Stefano Stabellini
2018-05-23 22:31 ` Julien Grall
2018-05-25 20:51 ` Stefano Stabellini
2018-05-25 23:54 ` Andrew Cooper
2018-05-29 21:35 ` Stefano Stabellini
2018-05-30 9:35 ` Julien Grall
2018-05-22 17:42 ` [PATCH 05/13] xen/arm: Add command line option to control SSBD mitigation Julien Grall
2018-05-23 22:34 ` Stefano Stabellini
2018-05-24 0:48 ` Stefano Stabellini
2018-05-25 19:56 ` Julien Grall
2018-05-24 9:52 ` Julien Grall
2018-05-25 20:51 ` Stefano Stabellini
2018-05-29 11:31 ` Julien Grall
2018-05-29 22:34 ` Stefano Stabellini
2018-05-30 10:39 ` Julien Grall
2018-05-30 20:10 ` Stefano Stabellini
2018-05-31 10:34 ` Julien Grall
2018-05-31 20:58 ` Stefano Stabellini
2018-05-31 21:29 ` Julien Grall
2018-05-23 23:23 ` Stefano Stabellini
2018-05-24 9:53 ` Julien Grall
2018-05-22 17:42 ` [PATCH 06/13] xen/arm: Add ARCH_WORKAROUND_2 support for guests Julien Grall
2018-05-23 23:24 ` Stefano Stabellini
2018-05-24 0:40 ` Stefano Stabellini
2018-05-24 10:00 ` Julien Grall
2018-05-25 20:51 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 07/13] xen/arm: Simplify alternative patching Julien Grall
2018-05-25 20:52 ` Stefano Stabellini
2018-05-25 21:34 ` Julien Grall
2018-05-25 23:24 ` Stefano Stabellini
2018-05-29 11:34 ` Julien Grall
2018-05-22 17:42 ` [PATCH 08/13] xen/arm: alternatives: Add dynamic patching feature Julien Grall
2018-05-25 20:52 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 09/13] xen/arm64: Add generic assembly macros Julien Grall
2018-05-23 23:37 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 10/13] xen/arm64: Implement a fast path for handling SMCCC_ARCH_WORKAROUND_2 Julien Grall
2018-05-25 19:18 ` Stefano Stabellini
2018-05-29 12:16 ` Julien Grall
2018-05-29 21:39 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 11/13] xen/arm: Kconfig: Move HARDEN_BRANCH_PREDICTOR under "Architecture features" Julien Grall
2018-05-23 23:45 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 12/13] xen/arm: smccc: Fix indentation in ARM_SMCCC_ARCH_WORKAROUND_1_FID Julien Grall
2018-05-23 23:44 ` Stefano Stabellini
2018-05-22 17:42 ` [PATCH 13/13] xen/arm: Avoid to use current everywhere in enter_hypervisor_head Julien Grall
2018-05-23 23:47 ` Stefano Stabellini
2018-05-24 10:29 ` Julien Grall
2018-05-24 18:46 ` Stefano Stabellini
2018-05-22 17:46 ` [for-4.11] Re: [PATCH 00/13] xen/arm: SSBD (aka Spectre-v4) mitigation (XSA-263) Julien Grall
2018-05-23 4:07 ` Juergen Gross
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=903bccf0-ceb7-d184-2b6c-c44afbf223a0@arm.com \
--to=julien.grall@arm.com \
--cc=andre.przywara@arm.com \
--cc=sstabellini@kernel.org \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).