From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.6 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id F3A4AC388F7 for ; Thu, 29 Oct 2020 00:37:36 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 79BFB206B6 for ; Thu, 29 Oct 2020 00:37:36 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="jEJxpCMN" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 79BFB206B6 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from list by lists.xenproject.org with outflank-mailman.13945.34795 (Exim 4.92) (envelope-from ) id 1kXvwC-0005b0-SE; Thu, 29 Oct 2020 00:37:08 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 13945.34795; Thu, 29 Oct 2020 00:37:08 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1kXvwC-0005at-PI; Thu, 29 Oct 2020 00:37:08 +0000 Received: by outflank-mailman (input) for mailman id 13945; Thu, 29 Oct 2020 00:37:07 +0000 Received: from all-amaz-eas1.inumbo.com ([34.197.232.57] helo=us1-amaz-eas2.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1kXvwB-0005ao-0v for xen-devel@lists.xenproject.org; Thu, 29 Oct 2020 00:37:07 +0000 Received: from mail.kernel.org (unknown [198.145.29.99]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS id 966e97ca-0bed-4ea2-b6bf-fdae3292d422; Thu, 29 Oct 2020 00:37:05 +0000 (UTC) Received: from sstabellini-ThinkPad-T480s (c-24-130-65-46.hsd1.ca.comcast.net [24.130.65.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 531BE20790; Thu, 29 Oct 2020 00:37:03 +0000 (UTC) Received: from all-amaz-eas1.inumbo.com ([34.197.232.57] helo=us1-amaz-eas2.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1kXvwB-0005ao-0v for xen-devel@lists.xenproject.org; Thu, 29 Oct 2020 00:37:07 +0000 X-Inumbo-ID: 966e97ca-0bed-4ea2-b6bf-fdae3292d422 Received: from mail.kernel.org (unknown [198.145.29.99]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS id 966e97ca-0bed-4ea2-b6bf-fdae3292d422; Thu, 29 Oct 2020 00:37:05 +0000 (UTC) Received: from sstabellini-ThinkPad-T480s (c-24-130-65-46.hsd1.ca.comcast.net [24.130.65.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 531BE20790; Thu, 29 Oct 2020 00:37:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603931824; bh=3bwGDs8HGM41Ct8ot2Jb1S53HzcX5PtZz45jl85Gooo=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=jEJxpCMNa7H3g+F4u32OyRxqoe5FTJ2TdUHrN82DOsa/dsGzZcMB55Jl2TXVuxX8k lzJYHvjtn0jSSZDxt/OheixiQmXpe7fGqXBnari+b3im4NA+oEloO7ZTwGCi6GIxwo qIAfjHEjiPv5AEFI6i2WQVNE965Ikzby2jeDgIYw= Date: Wed, 28 Oct 2020 17:37:02 -0700 (PDT) From: Stefano Stabellini X-X-Sender: sstabellini@sstabellini-ThinkPad-T480s To: Elliott Mitchell cc: Julien Grall , Stefano Stabellini , roman@zededa.com, xen-devel@lists.xenproject.org Subject: Re: Xen on RP4 In-Reply-To: <20201028015423.GA33407@mattapan.m5p.com> Message-ID: References: <20201022021655.GA74011@mattapan.m5p.com> <20201023005629.GA83870@mattapan.m5p.com> <20201023211941.GA90171@mattapan.m5p.com> <20201024053540.GA97417@mattapan.m5p.com> <4fcf4832-9266-443f-54d0-fa1fff4b6e14@xen.org> <20201026160316.GA20589@mattapan.m5p.com> <7a904044-8206-b45d-8ec2-d4e48b07ea83@xen.org> <20201028015423.GA33407@mattapan.m5p.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII On Tue, 27 Oct 2020, Elliott Mitchell wrote: > On Mon, Oct 26, 2020 at 06:44:27PM +0000, Julien Grall wrote: > > On 26/10/2020 16:03, Elliott Mitchell wrote: > > > On Mon, Oct 26, 2020 at 01:31:42PM +0000, Julien Grall wrote: > > >> On 24/10/2020 06:35, Elliott Mitchell wrote: > > >>> ACPI has a distinct > > >>> means of specifying a limited DMA-width; the above fails, because it > > >>> assumes a *device-tree*. > > >> > > >> Do you know if it would be possible to infer from the ACPI static table > > >> the DMA-width? > > > > > > Yes, and it is. Due to not knowing much about ACPI tables I don't know > > > what the C code would look like though (problem is which documentation > > > should I be looking at first?). > > > > What you provided below is an excerpt of the DSDT. AFAIK, DSDT content > > is written in AML. So far the shortest implementation I have seen for > > the AML parser is around 5000 lines (see [1]). It might be possible to > > strip some the code, although I think this will still probably too big > > for a single workaround. > > > > What I meant by "static table" is a table that looks like a structure > > and can be parsed in a few lines. If we can't find on contain the DMA > > window, then the next best solution is to find a way to identity the > > platform. > > > > I don't know enough ACPI to know if this solution is possible. A good > > starter would probably be the ACPI spec [2]. > > Okay, that is worse than I had thought (okay, ACPI is impressively > complex for something nominally firmware-level). > > There are strings in the present Tianocore implementation for Raspberry > PI 4B which could be targeted. Notably included in the output during > boot listing the tables, "RPIFDN", "RPIFDN RPI" and "RPIFDN RPI4" (I'm > unsure how kosher these are as this wsn't implemented nor blessed by the > Raspberry PI Foundation). > > I strongly dislike this approach as you soon turn the Xen project into a > database of hardware. This is already occurring with > xen/arch/arm/platforms and I would love to do something about this. On > that thought, how about utilizing Xen's command-line for this purpose? I don't think that a command line option is a good idea: basically it is punting to users the task of platform detection. Also, it means that users will be necessarily forced to edit the uboot script or grub configuration file to boot. Note that even if we introduced a new command line, we wouldn't take away the need for xen/arch/arm/platforms anyway. It would be far better for Xen to autodetect the platform if we can. > Have a procedure of during installation/updates retrieve DMA limitation > information from the running OS and the following boot Xen will follow > the appropriate setup. By its nature, Domain 0 will have the information > needed, just becomes an issue of how hard that is to retrieve... Historically that is what we used to do for many things related to ACPI, but unfortunately it leads to a pretty bad architecture where Xen depends on Dom0 for booting rather than the other way around. (Dom0 should be the one requiring Xen for booting, given that Xen is higher privilege and boots first.) I think the best compromise is still to use an ACPI string to detect the platform. For instance, would it be possible to use the OEMID fields in RSDT, XSDT, FADT? Possibly even a combination of them? Another option might be to get the platform name from UEFI somehow.