From nobody Fri Apr 19 23:17:17 2024 Delivered-To: importer@patchew.org Received-SPF: none (zohomail.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; spf=none (zohomail.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=linux.intel.com ARC-Seal: i=1; a=rsa-sha256; t=1574936632; cv=none; d=zohomail.com; s=zohoarc; b=K7g35T4Hu0DLBzK0y6e/BUBP9hE4381V+WFvWXObEi5Ug05/1uyxHCHqvTRZvi+BWIChQ8dpPepWABbNKWOCufzREMsfrlEOg8uvuK7y0a6LSKx0lo7FB3d5i0T3vXBEod8J+hcdLOs981gliYHOh1hpzYIqplPFkFjOzTotrSo= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1574936632; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To; bh=bLogi7xnVOt0xZ0fhxJSlq0m7DK6rVg9717Rd5FgDn8=; b=INIPzO2aoRbwO2en/7a1vaq9ugYHgM5YeUCOoLKE/UiG5exuTxXXIma8cxxGmI4nmcHT3SFZRl2dRuDtl7iTElLbs4e78KE9tBF7zxws3ps0eq2Qzkr26IFr0gepouVTmyO1/KdT3QaVN2nYave9eMiZmRB8nGZcX0UUFRMBKUg= ARC-Authentication-Results: i=1; mx.zohomail.com; spf=none (zohomail.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1574936632651750.5558195790655; Thu, 28 Nov 2019 02:23:52 -0800 (PST) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1iaGwn-0007Uc-43; Thu, 28 Nov 2019 10:22:53 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1iaGwm-0007UT-Dn for xen-devel@lists.xenproject.org; Thu, 28 Nov 2019 10:22:52 +0000 Received: from mga12.intel.com (unknown [192.55.52.136]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id 07c6ff48-11c9-11ea-b155-bc764e2007e4; Thu, 28 Nov 2019 10:22:51 +0000 (UTC) Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 28 Nov 2019 02:22:50 -0800 Received: from yisun1-ubuntu2.bj.intel.com ([10.238.144.121]) by orsmga001.jf.intel.com with ESMTP; 28 Nov 2019 02:22:48 -0800 X-Inumbo-ID: 07c6ff48-11c9-11ea-b155-bc764e2007e4 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.69,253,1571727600"; d="scan'208";a="292341524" From: Yi Sun To: xen-devel@lists.xenproject.org Date: Thu, 28 Nov 2019 18:18:04 +0800 Message-Id: <1574936284-5139-1-git-send-email-yi.y.sun@linux.intel.com> X-Mailer: git-send-email 1.9.1 Subject: [Xen-devel] [PATCH v2] psr: fix bug which may cause crash X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: andrew.cooper3@citrix.com, Yi Sun , jbeulich@suse.com MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" During test, we found a crash on Xen with below trace. (XEN) Xen call trace: (XEN) [] R psr.c#l3_cdp_write_msr+0x1e/0x22 (XEN) [] F psr.c#do_write_psr_msrs+0x6d/0x109 (XEN) [] F smp_call_function_interrupt+0x5a/0xac (XEN) [] F call_function_interrupt+0x20/0x34 (XEN) [] F do_IRQ+0x175/0x6ae (XEN) [] F common_interrupt+0x10a/0x120 (XEN) [] F cpu_idle.c#acpi_idle_do_entry+0x9d/0xb1 (XEN) [] F cpu_idle.c#acpi_processor_idle+0x41d/0x626 (XEN) [] F domain.c#idle_loop+0xa5/0xa7 (XEN) (XEN) (XEN) **************************************** (XEN) Panic on CPU 20: (XEN) GENERAL PROTECTION FAULT (XEN) [error_code=3D0000] (XEN) **************************************** The bug happens when CDP and MBA co-exist and MBA COS_MAX is bigger than CDP COS_MAX. E.g. MBA has 8 COS registers but CDP only have 6. When setting MBA throttling value for the 7th guest, the value array would be: +------------------+------------------+--------------+ | Data default val | Code default val | MBA throttle | +------------------+------------------+--------------+ Then, COS id 7 will be selected for writting the values. We should avoid writting CDP data/code valules to COS id 7 MSR because it exceeds the CDP COS_MAX. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c index 5866a26..ecca5b4 100644 --- a/xen/arch/x86/psr.c +++ b/xen/arch/x86/psr.c @@ -1271,7 +1271,8 @@ static void do_write_psr_msrs(void *data) =20 for ( j =3D 0; j < cos_num; j++, index++ ) { - if ( feat->cos_reg_val[cos * cos_num + j] !=3D info->val[index= ] ) + if ( cos <=3D feat->cos_max && + feat->cos_reg_val[cos * cos_num + j] !=3D info->val[index= ] ) { feat->cos_reg_val[cos * cos_num + j] =3D info->val[index]; props->write_msr(cos, info->val[index], props->type[j]); --=20 1.9.1 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel