Searched hist:"13 df93244efbd4bb8b4cf4e26104a26033178674" (Results 1 – 3 of 3) sorted by relevance
/qemu/include/hw/ppc/ |
H A D | xive_regs.h | 13df93244efbd4bb8b4cf4e26104a26033178674 Wed May 08 17:19:45 UTC 2019 Cédric Le Goater <clg@kaod.org> spapr/xive: fix EQ page addresses above 64GB
The high order bits of the address of the OS event queue is stored in bits [4-31] of word2 of the XIVE END internal structures and the low order bits in word3. This structure is using Big Endian ordering and computing the value requires some simple arithmetic which happens to be wrong. The mask removing bits [0-3] of word2 is applied to the wrong value and the resulting address is bogus when above 64GB.
Guests with more than 64GB of RAM will allocate pages for the OS event queues which will reside above the 64GB limit. In this case, the XIVE device model will wake up the CPUs in case of a notification, such as IPIs, but the update of the event queue will be written at the wrong place in memory. The result is uncertain as the guest memory is trashed and IPI are not delivered.
Introduce a helper xive_end_qaddr() to compute this value correctly in all places where it is used.
Signed-off-by: Cédric Le Goater <clg@kaod.org> Message-Id: <20190508171946.657-3-clg@kaod.org> Reviewed-by: Greg Kurz <groug@kaod.org> Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
|
/qemu/hw/intc/ |
H A D | spapr_xive.c | 13df93244efbd4bb8b4cf4e26104a26033178674 Wed May 08 17:19:45 UTC 2019 Cédric Le Goater <clg@kaod.org> spapr/xive: fix EQ page addresses above 64GB
The high order bits of the address of the OS event queue is stored in bits [4-31] of word2 of the XIVE END internal structures and the low order bits in word3. This structure is using Big Endian ordering and computing the value requires some simple arithmetic which happens to be wrong. The mask removing bits [0-3] of word2 is applied to the wrong value and the resulting address is bogus when above 64GB.
Guests with more than 64GB of RAM will allocate pages for the OS event queues which will reside above the 64GB limit. In this case, the XIVE device model will wake up the CPUs in case of a notification, such as IPIs, but the update of the event queue will be written at the wrong place in memory. The result is uncertain as the guest memory is trashed and IPI are not delivered.
Introduce a helper xive_end_qaddr() to compute this value correctly in all places where it is used.
Signed-off-by: Cédric Le Goater <clg@kaod.org> Message-Id: <20190508171946.657-3-clg@kaod.org> Reviewed-by: Greg Kurz <groug@kaod.org> Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
|
H A D | xive.c | 13df93244efbd4bb8b4cf4e26104a26033178674 Wed May 08 17:19:45 UTC 2019 Cédric Le Goater <clg@kaod.org> spapr/xive: fix EQ page addresses above 64GB
The high order bits of the address of the OS event queue is stored in bits [4-31] of word2 of the XIVE END internal structures and the low order bits in word3. This structure is using Big Endian ordering and computing the value requires some simple arithmetic which happens to be wrong. The mask removing bits [0-3] of word2 is applied to the wrong value and the resulting address is bogus when above 64GB.
Guests with more than 64GB of RAM will allocate pages for the OS event queues which will reside above the 64GB limit. In this case, the XIVE device model will wake up the CPUs in case of a notification, such as IPIs, but the update of the event queue will be written at the wrong place in memory. The result is uncertain as the guest memory is trashed and IPI are not delivered.
Introduce a helper xive_end_qaddr() to compute this value correctly in all places where it is used.
Signed-off-by: Cédric Le Goater <clg@kaod.org> Message-Id: <20190508171946.657-3-clg@kaod.org> Reviewed-by: Greg Kurz <groug@kaod.org> Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
|