[xen staging-4.10] x86: work around HLE host lockup erratum

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

[xen staging-4.10] x86: work around HLE host lockup erratum

patchbot
commit ba6ac89d1dd383a9d01e11b88b429da3599971a1
Author:     Jan Beulich <[hidden email]>
AuthorDate: Wed Nov 7 09:45:17 2018 +0100
Commit:     Jan Beulich <[hidden email]>
CommitDate: Wed Nov 7 09:45:17 2018 +0100

    x86: work around HLE host lockup erratum
   
    XACQUIRE prefixed accesses to the 4Mb range of memory starting at 1Gb
    are liable to lock up the processor. Disallow use of this memory range.
   
    Unfortunately the available Core Gen7 and Gen8 spec updates are pretty
    old, so I can only guess that they're similarly affected when Core Gen6
    is and the Xeon counterparts are, too.
   
    This is part of XSA-282.
   
    Signed-off-by: Jan Beulich <[hidden email]>
    Reviewed-by: Andrew Cooper <[hidden email]>
    master commit: cc76410d20aff2cc07b268b0713dc1d2740c6e12
    master date: 2018-11-07 09:33:24 +0100
---
 xen/arch/x86/mm.c | 16 ++++++++++++++++
 1 file changed, 16 insertions(+)

diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 4d3753d42a..57f4982509 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -5690,6 +5690,22 @@ const struct platform_bad_page *__init get_platform_badpages(unsigned int *array
         { .mfn = 0x20138000 >> PAGE_SHIFT },
         { .mfn = 0x40004000 >> PAGE_SHIFT },
     };
+    static const struct platform_bad_page __initconst hle_bad_page = {
+        .mfn = 0x40000000 >> PAGE_SHIFT, .order = 10
+    };
+
+    switch ( cpuid_eax(1) & 0x000f3ff0 )
+    {
+    case 0x000406e0: /* erratum SKL167 */
+    case 0x00050650: /* erratum SKZ63 */
+    case 0x000506e0: /* errata SKL167 / SKW159 */
+    case 0x000806e0: /* erratum KBL??? */
+    case 0x000906e0: /* errata KBL??? / KBW114 / CFW103 */
+        *array_size = (cpuid_eax(0) >= 7 &&
+                       !(cpuid_ecx(1) & cpufeat_mask(X86_FEATURE_HYPERVISOR)) &&
+                       (cpuid_count_ebx(7, 0) & cpufeat_mask(X86_FEATURE_HLE)));
+        return &hle_bad_page;
+    }
 
     *array_size = ARRAY_SIZE(snb_bad_pages);
     igd_id = pci_conf_read32(0, 0, 2, 0, 0);
--
generated by git-patchbot for /home/xen/git/xen.git#staging-4.10

_______________________________________________
Xen-changelog mailing list
[hidden email]
https://lists.xenproject.org/xen-changelog