[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v4 5/8] hvm/mtrr: use the hardware number of variable ranges for Dom0
Expand the size of the variable ranges array to match the size of the underlying hardware, this is a preparatory change for copying the hardware MTRR state for Dom0. Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> --- Cc: Jan Beulich <jbeulich@xxxxxxxx> Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> --- Changes since v3: - Move the index check to hvm_msr_write_intercept. Changes since v2: - Use Dom%u in hvm_vcpu_cacheattr_init error message. - Print debug error messages in hvm_save_mtrr_msr. - Use ARRAY_SIZE in hvm_save_mtrr_msr to calculate the number of MTRR ranges in the save record. - Calculate MTRR_VCNT_MAX based on current MSR indexes. Changes since v1: - Fix hvm_msr_{read,write}_intercept(). - Relax the checks in hvm_{save/load}_mtrr_msr. --- xen/arch/x86/hvm/hvm.c | 12 +++++++++--- xen/arch/x86/hvm/mtrr.c | 31 +++++++++++++++++++++++++++++-- xen/include/asm-x86/mtrr.h | 3 +++ 3 files changed, 41 insertions(+), 5 deletions(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index 247b3eb1bd..93092d2bb8 100644 --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -3491,10 +3491,13 @@ int hvm_msr_read_intercept(unsigned int msr, uint64_t *msr_content) index = msr - MSR_MTRRfix4K_C0000; *msr_content = fixed_range_base[index + 3]; break; - case MSR_IA32_MTRR_PHYSBASE(0)...MSR_IA32_MTRR_PHYSMASK(MTRR_VCNT-1): + case MSR_IA32_MTRR_PHYSBASE(0)...MSR_IA32_MTRR_PHYSMASK(MTRR_VCNT_MAX - 1): if ( !d->arch.cpuid->basic.mtrr ) goto gp_fault; index = msr - MSR_IA32_MTRR_PHYSBASE(0); + if ( (index / 2) >= + MASK_EXTR(v->arch.hvm_vcpu.mtrr.mtrr_cap, MTRRcap_VCNT) ) + goto gp_fault; *msr_content = var_range_base[index]; break; @@ -3652,10 +3655,13 @@ int hvm_msr_write_intercept(unsigned int msr, uint64_t msr_content, index, msr_content) ) goto gp_fault; break; - case MSR_IA32_MTRR_PHYSBASE(0)...MSR_IA32_MTRR_PHYSMASK(MTRR_VCNT-1): + case MSR_IA32_MTRR_PHYSBASE(0)...MSR_IA32_MTRR_PHYSMASK(MTRR_VCNT_MAX - 1): if ( !d->arch.cpuid->basic.mtrr ) goto gp_fault; - if ( !mtrr_var_range_msr_set(v->domain, &v->arch.hvm_vcpu.mtrr, + index = msr - MSR_IA32_MTRR_PHYSBASE(0); + if ( ((index / 2) >= MASK_EXTR(v->arch.hvm_vcpu.mtrr.mtrr_cap, + MTRRcap_VCNT)) || + !mtrr_var_range_msr_set(v->domain, &v->arch.hvm_vcpu.mtrr, msr, msr_content) ) goto gp_fault; break; diff --git a/xen/arch/x86/hvm/mtrr.c b/xen/arch/x86/hvm/mtrr.c index 2f8f8ddd8f..54dede0ea6 100644 --- a/xen/arch/x86/hvm/mtrr.c +++ b/xen/arch/x86/hvm/mtrr.c @@ -154,14 +154,26 @@ uint8_t pat_type_2_pte_flags(uint8_t pat_type) int hvm_vcpu_cacheattr_init(struct vcpu *v) { struct mtrr_state *m = &v->arch.hvm_vcpu.mtrr; + unsigned int num_var_ranges = + is_hardware_domain(v->domain) ? MASK_EXTR(mtrr_state.mtrr_cap, + MTRRcap_VCNT) + : MTRR_VCNT; + + if ( num_var_ranges > MTRR_VCNT_MAX ) + { + ASSERT(is_hardware_domain(v->domain)); + printk("WARNING: limited Dom%u variable range MTRRs from %u to %u\n", + v->domain->domain_id, num_var_ranges, MTRR_VCNT_MAX); + num_var_ranges = MTRR_VCNT_MAX; + } memset(m, 0, sizeof(*m)); - m->var_ranges = xzalloc_array(struct mtrr_var_range, MTRR_VCNT); + m->var_ranges = xzalloc_array(struct mtrr_var_range, num_var_ranges); if ( m->var_ranges == NULL ) return -ENOMEM; - m->mtrr_cap = (1u << 10) | (1u << 8) | MTRR_VCNT; + m->mtrr_cap = (1u << 10) | (1u << 8) | num_var_ranges; v->arch.hvm_vcpu.pat_cr = ((uint64_t)PAT_TYPE_WRBACK) | /* PAT0: WB */ @@ -448,6 +460,12 @@ bool_t mtrr_var_range_msr_set( uint64_t *var_range_base = (uint64_t*)m->var_ranges; index = msr - MSR_IA32_MTRR_PHYSBASE(0); + if ( (index / 2) >= MASK_EXTR(m->mtrr_cap, MTRRcap_VCNT) ) + { + ASSERT_UNREACHABLE(); + return 0; + } + if ( var_range_base[index] == msr_content ) return 1; @@ -691,6 +709,15 @@ static int hvm_save_mtrr_msr(struct domain *d, hvm_domain_context_t *h) }; unsigned int i; + if ( MASK_EXTR(hw_mtrr.msr_mtrr_cap, MTRRcap_VCNT) > + (ARRAY_SIZE(hw_mtrr.msr_mtrr_var) / 2) ) + { + dprintk(XENLOG_G_ERR, + "HVM save: %pv: too many (%lu) variable range MTRRs\n", + v, MASK_EXTR(hw_mtrr.msr_mtrr_cap, MTRRcap_VCNT)); + return -EINVAL; + } + hvm_get_guest_pat(v, &hw_mtrr.msr_pat_cr); for ( i = 0; i < MASK_EXTR(hw_mtrr.msr_mtrr_cap, MTRRcap_VCNT); i++ ) diff --git a/xen/include/asm-x86/mtrr.h b/xen/include/asm-x86/mtrr.h index b1f7af6396..72d0690e28 100644 --- a/xen/include/asm-x86/mtrr.h +++ b/xen/include/asm-x86/mtrr.h @@ -39,6 +39,9 @@ typedef u8 mtrr_type; #define MTRR_PHYSBASE_SHIFT 12 /* Number of variable range MSR pairs we emulate for HVM guests: */ #define MTRR_VCNT 8 +/* Maximum number of variable range MSR pairs if FE is supported. */ +#define MTRR_VCNT_MAX ((MSR_MTRRfix64K_00000 - \ + MSR_IA32_MTRR_PHYSBASE(0)) / 2) struct mtrr_var_range { uint64_t base; -- 2.17.1 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |