[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2] xen/arm: gic-v2: disable interrupt bypass on CPU shutdown


  • To: Mykola Kvach <xakep.amatop@xxxxxxxxx>
  • From: Luca Fancellu <Luca.Fancellu@xxxxxxx>
  • Date: Wed, 29 Apr 2026 08:16:56 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 4.158.2.129) smtp.rcpttodomain=gmail.com smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=8HZBB6EnPd5pc4XeW/Q3vmNk1mQZ25Qm7DUmW0DhGBQ=; b=dkzulG+6k5VddVlI0adCtVdGZspVBTSq/cxhFOSVYCzEr3A8X4VxWmPWUcRHJv0v1jzk6YJUSahKJKznn3eWgdDqsK1SnAkkz4xjchNdriJYgU5HOVrKJY085hzu3w3zlvp9FaYfRH9xRRnMAf2+FaPxMzBdEaVicIoHPTiscPqjAt1ssrDgy9avfwYe+nI4l8CuG3qvQsvv+e3TilQblayF9yf/06ZVoi5cmeXhmyGFinkFxy/9lAyfA1jg9gOjBp4nK94D0nmIpGvhpIG6RstzjLINPnz1UwXk166eQDk6b2mJ5A+RhR7z+n/Ih140CM0D2uhnEWTVP79kBWlC3Q==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=8HZBB6EnPd5pc4XeW/Q3vmNk1mQZ25Qm7DUmW0DhGBQ=; b=LxRgOeoxtQAPL/AgRu1lv+0/pa573qO1XEF9cMaQjf0tp6x7c8QMUwaCuR+po7T3g7YsktqR0IxC7dOOS7X6khWmB81aq6qsCmAbdeJOXpm7kSS/PV5dEStJSn91EgnqIfz/3LbK16eyJtY/Q4DKbzu/gKJJINQ3ipsjQnjTXM4uEV887OiIcnnkxrZ6eXnIEFFR8DLcGtcf3nk+PfELz9Osflr/Rz1ZY2Qa1Rtaz8IAGNBGqCwGdIMb8SkfV2DEo08kkf87jZRNnbIxaWBuH7CbQ7sMLGFh5k6L7ZJ9BruywrnxmhxNW3TK9SGYnMODDq60w0gpigRfJj9AYn3WcQ==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=W4FzV6CZfQ6W0AwnQmb0UFWlFy5He4JTWIwjtLx+e2ZmTuPZxKq/Sh+ZktzOyqYR094QNj5M0G5vmHgLd2e1ld8ZG3jrl2SwEW1//wY20ByHi/+cJxM8IKPXr3Cfo3Ok5T1+5oObBPIpNcJvgAsy9jFnqjT2uGAOdGOJ+9Ww18LAa129PyJVvkw8PAEhEGU4LcCnJMuZTvubi1a2CQH5mj0xnvRW92EbzyhvmwAKISrSzb28LRhPIPkWOBDN4OrDkMXM/gka7POCDfw3IESHpV5hHJfDvYh6+t0OBoXJWdXUG+1xYzQUFiNYpI3Dq9Gl/O5yQxq6Coh/Q6jlZy9vWw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ej4KRtJlkvbHAxDfUpVFrIvX0eJC8lcMQDsf6uildSkNe79ttgFaiXiHzntrjLm0CsUGKY50Bjfl5ZPyQtAdXEo73W8Z0SJtk4m7VpRC7eSJugitvOZ1HbPFmZQo3YgwsPYlm8IPIKKB3wcowBgFkU8bY3qfMSVv9mj2EigiON71Rqi6DBZSM3oxsYnxsPXqcUzcelEd/DJqdzfD36ubicO4DQOTf9y3KXaV66IBnW9CLLX1JL+HiUEtA52+rkhGEBAfGJ724GbeLafg3dSZZO/9TwkydY4NDhYwq/el80C1ibrgxOtylc0AKQJngYOG9wcf3NVggFezj44NuIdunw==
  • Authentication-results: eu.smtp.expurgate.cloud; dkim=pass header.s=selector1 header.d=arm.com header.i="@arm.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck"; dkim=pass header.s=selector1 header.d=arm.com header.i="@arm.com" header.h="From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck"
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Mykola Kvach <mykola_kvach@xxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <Bertrand.Marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Wed, 29 Apr 2026 08:18:28 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Thread-index: AQHc1waiSgYhXcA/H0GAotA2SwKRHbX1suQA
  • Thread-topic: [PATCH v2] xen/arm: gic-v2: disable interrupt bypass on CPU shutdown

Hi Mykola,

> On 28 Apr 2026, at 12:57, Mykola Kvach <xakep.amatop@xxxxxxxxx> wrote:
> 
> From: Mykola Kvach <mykola_kvach@xxxxxxxx>
> 
> The GICv2 CPU shutdown path currently writes 0 to GICC_CTLR.
> 
> Per IHI0048B.b section 2.3.1, clearing the architected bypass-disable
> bits selects bypass rather than deasserted interrupt outputs when the
> CPU interface stops driving them. Tables 2-2 and 2-3 show that a zeroed
> GICC_CTLR can fall back to the legacy IRQ/FIQ inputs instead of fully
> disabling the interface.
> 
> Fix this by reading GICC_CTLR, then setting the bypass-disable bits and
> clearing the group-enable bits that are architecturally defined for the
> current GICC_CTLR view before writing the value back. When Security
> Extensions are implemented Xen accesses the Non-secure copy of
> GICC_CTLR, where IRQBypDisGrp1 and FIQBypDisGrp1 are at bits [6:5] and
> bits [8:7] are reserved.
> 
> Without Security Extensions there is no separate Secure/Non-secure CPU
> interface view, so disabling both group-enable bits affects the shared
> interface state. This is still appropriate for the CPU shutdown path,
> which is expected to stop normal interrupt delivery through the interface
> and rely only on the architecturally separate wakeup event signaling.
> 
> Section 2.3.2 also states that wakeup event signals remain available
> even when both GIC interrupt signaling and interrupt bypass are
> disabled, so disabling bypass does not break the power-management use
> case, i.e. suspend modes.
> 
> Fixes: 5e40a1b4351e ("arm: SMP CPU shutdown")
> Signed-off-by: Mykola Kvach <mykola_kvach@xxxxxxxx>

Looks good to me

Reviewed-by: Luca Fancellu <luca.fancellu@xxxxxxx>

Cheers,
Luca




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.