]> xenbits.xensource.com Git - xen.git/commit
x86/paging: restrict physical address width reported to guests
authorJan Beulich <jbeulich@suse.com>
Fri, 19 Nov 2021 08:38:42 +0000 (09:38 +0100)
committerJan Beulich <jbeulich@suse.com>
Fri, 19 Nov 2021 08:38:42 +0000 (09:38 +0100)
commit81e3fd1f3cacda220e4d46bb01f9c1b554ed8401
treeb99cbaa4915b2eef00833f820f4f1eb82b73b5f5
parent0c3fde7b7e920fb5c20747567c249714fab57282
x86/paging: restrict physical address width reported to guests

Modern hardware may report more than 48 bits of physical address width.
For paging-external guests our P2M implementation does not cope with
larger values. Telling the guest of more available bits means misleading
it into perhaps trying to actually put some page there (like was e.g.
intermediately done in OVMF for the shared info page).

While there also convert the PV check to a paging-external one (which in
our current code base are synonyms of one another anyway).

Fixes: 5dbd60e16a1f ("x86/shadow: Correct guest behaviour when creating PTEs above maxphysaddr")
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>
master commit: b7635526acffbe4ad8ad16fd92812c57742e54c2
master date: 2021-10-19 10:08:30 +0200
xen/include/asm-x86/paging.h