From: Igor Druzhinin <igor.druzhinin@citrix.com>
To: Jan Beulich <jbeulich@suse.com>,
"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: "Andrew Cooper" <andrew.cooper3@citrix.com>,
"Wei Liu" <wl@xen.org>, "Roger Pau Monné" <roger.pau@citrix.com>
Subject: Re: [PATCH] x86/AMD: make HT range dynamic for Fam17 and up
Date: Fri, 18 Jun 2021 18:25:13 +0100 [thread overview]
Message-ID: <d057818f-4542-7305-ad95-61996385968e@citrix.com> (raw)
In-Reply-To: <1eb16baa-6b1b-3b18-c712-4459bd83e1aa@citrix.com>
On 18/06/2021 18:15, Igor Druzhinin wrote:
> On 18/06/2021 17:00, Jan Beulich wrote:
>> At the time of d838ac2539cf ("x86: don't allow Dom0 access to the HT
>> address range") documentation correctly stated that the range was
>> completely fixed. For Fam17 and newer, it lives at the top of physical
>> address space, though.
>
> From "Open-Source Register Reference for AMD Family 17h Processors (PUB)":
> https://developer.amd.com/wp-content/resources/56255_3_03.PDF
>
> "The processor defines a reserved memory address region starting at
> FFFD_0000_0000h and extending up to FFFF_FFFF_FFFFh."
>
> It's still doesn't say that it's at the top of physical address space
> although I understand that's how it's now implemented. The official
> document doesn't confirm it will move along with physical address space
> extension.
>
>> To correctly determine the top of physical address space, we need to
>> account for their physical address reduction, hence the calculation of
>> paddr_bits also gets adjusted.
>>
>> While for paddr_bits < 40 the HT range is completely hidden, there's no
>> need to suppress the range insertion in that case: It'll just have no
>> real meaning.
>>
>> Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>
>> --- a/xen/arch/x86/cpu/common.c
>> +++ b/xen/arch/x86/cpu/common.c
>> @@ -349,13 +349,17 @@ void __init early_cpu_init(void)
>> eax = cpuid_eax(0x80000000);
>> if ((eax >> 16) == 0x8000 && eax >= 0x80000008) {
>> + ebx = eax >= 0x8000001f ? cpuid_ebx(0x8000001f) : 0;
>> eax = cpuid_eax(0x80000008);
>> - paddr_bits = eax & 0xff;
>> +
>
> I understand Andrew has some concerns regarding changing paddr_bits but
> some comment explaining what's located at 0x8000001f:ebx[11:6] and why
> we're doing this might be useful.
>
>> + paddr_bits = (eax & 0xff) - ((ebx >> 6) & 0x3f);
>> if (paddr_bits > PADDR_BITS)
>> paddr_bits = PADDR_BITS;
>> +
>> vaddr_bits = (eax >> 8) & 0xff;
>> if (vaddr_bits > VADDR_BITS)
>> vaddr_bits = VADDR_BITS;
>> +
>> hap_paddr_bits = ((eax >> 16) & 0xff) ?: paddr_bits;
>> if (hap_paddr_bits > PADDR_BITS)
>> hap_paddr_bits = PADDR_BITS;
>> --- a/xen/arch/x86/dom0_build.c
>> +++ b/xen/arch/x86/dom0_build.c
>> @@ -524,8 +524,11 @@ int __init dom0_setup_permissions(struct
>> MSI_ADDR_DEST_ID_MASK));
>> /* HyperTransport range. */
>> if ( boot_cpu_data.x86_vendor & (X86_VENDOR_AMD | X86_VENDOR_HYGON) )
>> - rc |= iomem_deny_access(d, paddr_to_pfn(0xfdULL << 32),
>> - paddr_to_pfn((1ULL << 40) - 1));
>> + {
>> + mfn = paddr_to_pfn(1UL <<
>> + (boot_cpu_data.x86 < 0x17 ? 40 : paddr_bits));
>
> That doesn't really follow what Andrew gave us, namely:
>
> 1) On parts with <40 bits, its fully hidden from software
> 2) Before Fam17h, it was always 12G just below 1T, even if there was more RAM above this location
> 3) On Fam17h and later, it is variable based on SME, and is either just below 2^48 (no encryption) or 2^43 (encryption)
>
> Do we need (1) to be coded here as well?
Ignore this last paragraph - I lost your statement in comment description.
Igor
prev parent reply other threads:[~2021-06-18 17:25 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-06-18 16:00 [PATCH] x86/AMD: make HT range dynamic for Fam17 and up Jan Beulich
2021-06-18 16:32 ` Andrew Cooper
2021-06-21 6:18 ` Jan Beulich
2021-06-21 6:20 ` Jan Beulich
2021-06-21 6:29 ` Jan Beulich
2021-06-18 17:15 ` Igor Druzhinin
2021-06-18 17:25 ` Igor Druzhinin [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=d057818f-4542-7305-ad95-61996385968e@citrix.com \
--to=igor.druzhinin@citrix.com \
--cc=andrew.cooper3@citrix.com \
--cc=jbeulich@suse.com \
--cc=roger.pau@citrix.com \
--cc=wl@xen.org \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).