public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: Leif Lindholm <leif.lindholm@linaro.org>
To: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Cc: edk2-devel@lists.01.org, lersek@redhat.com, star.zeng@intel.com,
	feng.tian@intel.com
Subject: Re: [RFC PATCH] MdeModulePkg/AcpiTableDxe: inhibit table publication until we have a FADT
Date: Mon, 20 Mar 2017 12:13:52 +0000	[thread overview]
Message-ID: <20170320121352.GO16034@bivouac.eciton.net> (raw)
In-Reply-To: <20170318205824.13326-1-ard.biesheuvel@linaro.org>

On Sat, Mar 18, 2017 at 08:58:24PM +0000, Ard Biesheuvel wrote:
> Since commit 78c41ff519b1 ("ArmVirtPkg/FdtClientDxe: make DT table
> installation !ACPI dependent"), we inhibit the installation of the core
> ACPI tables when booting in DT mode, to relieve the OS from having to
> decide which hardware description to use. However, as it turns out,
> in presence of the RamdiskDxe or BGRT drivers, some ACPI tables are
> still registered with the protocol, and published under the ACPI entry
> point configuration tables, ignoring the fact that there is no way the
> OS can boot with only NFIT and BGRT tables present.
> 
> So let's only publish the ACPI tables if we can reasonably assume that
> the tables that the OS requires have been registered with the protocol,
> by checking that we have either FADT1 or FADT3 table (or both) before
> installing the configuration tables.
> 
> Contributed-under: TianoCore Contribution Agreement 1.0
> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
> ---
> 
> This is a counterproposal for Laszlo's series [0], which is technically
> sound, but a bit unwieldy. Instead of making ARM the odd one out, and
> tweaking universal modules via NULL library class resolution, we can
> prevent AcpiTableDxe from publishing the entry points when only NFIT
> or BGRT tables are present (which sounds like a strange thing to do
> in any case)
> 
> I am aware that this still leaves some loose ends when it comes to ordering
> and the ReadyToBoot callback, which I agree we should solve regardless, but
> I hope we can do so without putting the burden on the ARM platforms to
> always carry a set of NULL class libraries to keep sane behavior.
> 
> [0] https://lists.01.org/pipermail/edk2-devel/2017-March/008684.html
> 
>  MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableProtocol.c | 15 +++++++++++++++
>  1 file changed, 15 insertions(+)
> 
> diff --git a/MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableProtocol.c b/MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableProtocol.c
> index 4bb848df5203..4c9921f69a8a 100644
> --- a/MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableProtocol.c
> +++ b/MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableProtocol.c
> @@ -130,6 +130,21 @@ PublishTables (
>    UINT64                    Buffer64;
>  
>    //
> +  // Don't publish anything yet if we don't have a FADT table. This table is
> +  // mandatory for all ACPI compatible OSes, and installing the ACPI entry
> +  // point configuration table without a full set of ACPI tables may confuse
> +  // some OSes (Linux/arm64). (This may happen when the BGRT or ramdisk drivers
> +  // publish their respective ACPI tables without regard for whether ACPI boot
> +  // is currently enabled.)
> +  //
> +  if (AcpiTableInstance->Fadt1 == NULL && AcpiTableInstance->Fadt3 == NULL) {

While I realise that this argument is the weakest it can possibly be
in this source file and function ... this type of late-stage content
inspection feels to me like it breaks the modular design intended.

I guess more importantly, permitting modules to successfully install
tables and then not publish them obstructs useful/helpful handling of
known-to-be-fatal errors.

Or, in short, I would much rather see a solution that makes
AcpiTableDxe unavailable. If there was a way to prevent installation
of alternative implementations with gEfiAcpiTableProtocolGuid, that
would be even better.

Regards,

Leif

> +    DEBUG ((DEBUG_INFO,
> +      "%a: not publishing ACPI tables [yet], no FADT table installed\n",
> +      __FUNCTION__));
> +    return EFI_SUCCESS;
> +  }
> +
> +  //
>    // Reorder tables as some operating systems don't seem to find the
>    // FADT correctly if it is not in the first few entries
>    //
> -- 
> 2.9.3
> 


      parent reply	other threads:[~2017-03-20 12:13 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-03-18 20:58 [RFC PATCH] MdeModulePkg/AcpiTableDxe: inhibit table publication until we have a FADT Ard Biesheuvel
2017-03-20  2:15 ` Zeng, Star
2017-03-20 12:13 ` Leif Lindholm [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170320121352.GO16034@bivouac.eciton.net \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox