From patchwork Mon Dec 2 07:24:48 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yi Sun X-Patchwork-Id: 11268757 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 1A6B5138C for ; Mon, 2 Dec 2019 07:31:10 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id F3A9720748 for ; Mon, 2 Dec 2019 07:31:09 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org F3A9720748 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.intel.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1ibg9N-00083G-UV; Mon, 02 Dec 2019 07:29:41 +0000 Received: from all-amaz-eas1.inumbo.com ([34.197.232.57] helo=us1-amaz-eas2.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1ibg9M-00083B-8a for xen-devel@lists.xenproject.org; Mon, 02 Dec 2019 07:29:40 +0000 X-Inumbo-ID: 7eeb7428-14d5-11ea-a406-12813bfff9fa Received: from mga04.intel.com (unknown [192.55.52.120]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS id 7eeb7428-14d5-11ea-a406-12813bfff9fa; Mon, 02 Dec 2019 07:29:38 +0000 (UTC) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 01 Dec 2019 23:29:37 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.69,268,1571727600"; d="scan'208";a="218300335" Received: from yisun1-ubuntu2.bj.intel.com ([10.238.144.114]) by fmsmga001.fm.intel.com with ESMTP; 01 Dec 2019 23:29:36 -0800 From: Yi Sun To: xen-devel@lists.xenproject.org Date: Mon, 2 Dec 2019 15:24:48 +0800 Message-Id: <1575271488-12126-1-git-send-email-yi.y.sun@linux.intel.com> X-Mailer: git-send-email 1.9.1 Subject: [Xen-devel] [PATCH v4] psr: fix bug which may cause crash X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: andrew.cooper3@citrix.com, Yi Sun , jbeulich@suse.com MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" During test, we found a crash on Xen with below trace. (XEN) Xen call trace: (XEN) [] R psr.c#l3_cdp_write_msr+0x1e/0x22 (XEN) [] F psr.c#do_write_psr_msrs+0x6d/0x109 (XEN) [] F smp_call_function_interrupt+0x5a/0xac (XEN) [] F call_function_interrupt+0x20/0x34 (XEN) [] F do_IRQ+0x175/0x6ae (XEN) [] F common_interrupt+0x10a/0x120 (XEN) [] F cpu_idle.c#acpi_idle_do_entry+0x9d/0xb1 (XEN) [] F cpu_idle.c#acpi_processor_idle+0x41d/0x626 (XEN) [] F domain.c#idle_loop+0xa5/0xa7 (XEN) (XEN) (XEN) **************************************** (XEN) Panic on CPU 20: (XEN) GENERAL PROTECTION FAULT (XEN) [error_code=0000] (XEN) **************************************** The bug happens when CDP and MBA co-exist and MBA COS_MAX is bigger than CDP COS_MAX. E.g. MBA has 8 COS registers but CDP only have 6. When setting MBA throttling value for the 7th guest, the value array would be: +------------------+------------------+--------------+ | Data default val | Code default val | MBA throttle | +------------------+------------------+--------------+ Then, COS id 7 will be selected for writting the values. We should avoid writting CDP data/code valules to COS id 7 MSR because it exceeds the CDP COS_MAX. Signed-off-by: Yi Sun Acked-by: Andrew Cooper --- xen/arch/x86/psr.c | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c index 5866a26..8bf1c23 100644 --- a/xen/arch/x86/psr.c +++ b/xen/arch/x86/psr.c @@ -1269,6 +1269,17 @@ static void do_write_psr_msrs(void *data) cos_num = props->cos_num; ASSERT(info->array_len >= index + cos_num); + /* + * Multiple RDT features may co-exist and their COS_MAX may be + * different. So we should prevent one feature to write COS + * register which exceeds its COS_MAX. + */ + if ( cos > feat->cos_max ) + { + index += cos_num; + continue; + } + for ( j = 0; j < cos_num; j++, index++ ) { if ( feat->cos_reg_val[cos * cos_num + j] != info->val[index] )