On 8/9/2023 9:47 PM, Igor Mammedov wrote:
> On Wed, 9 Aug 2023 21:20:48 +0800
> "Wen, Qian" <qian....@intel.com> wrote:
>
>> On 8/9/2023 7:14 PM, Igor Mammedov wrote:
>>> On Wed,  9 Aug 2023 18:27:32 +0800
>>> Qian Wen <qian....@intel.com> wrote:
>>>  
>>>> The legacy topology enumerated by CPUID.1.EBX[23:16] is defined in SDM
>>>> Vol2:
>>>>
>>>> Bits 23-16: Maximum number of addressable IDs for logical processors in
>>>> this physical package.
>>>>
>>>> When launching the VM with -smp 256, the value written to EBX[23:16] is
>>>> 0 because of data overflow. If the guest only supports legacy topology,
>>>> without V2 Extended Topology enumerated by CPUID.0x1f or Extended
>>>> Topology enumerated by CPUID.0x0b to support over 255 CPUs, the return
>>>> of the kernel invoking cpu_smt_allowed() is false and AP's bring-up will
>>>> fail. Then only CPU 0 is online, and others are offline.
>>>>
>>>> To avoid this issue caused by overflow, limit the max value written to
>>>> EBX[23:16] to 255.  
>>> what happens on real hw or in lack of thereof what SDM says about this
>>> value when there is more than 255 threads?.
>>>  
>> Current SDM doesn't specify what the value should be when APIC IDs per 
>> package exceeds 255. So we asked the internal HW architect, the response is 
>> that EBX[23:16] will report 255 instead of being truncated to a smaller 
>> value.
> then mention it in commit log so one wouldn't wonder where the value came 
> from.

Ok, thanks for your suggestion!

>> Thanks,
>> Qian
>>
>>>> Signed-off-by: Qian Wen <qian....@intel.com>
>>>> ---
>>>> Changes v1 -> v2:
>>>>  - Revise the commit message and comment to more clearer.
>>>>  - Rebased to v8.1.0-rc2.
>>>> ---
>>>>  target/i386/cpu.c | 16 ++++++++++++++--
>>>>  1 file changed, 14 insertions(+), 2 deletions(-)
>>>>
>>>> diff --git a/target/i386/cpu.c b/target/i386/cpu.c
>>>> index 97ad229d8b..6e1d88fbd7 100644
>>>> --- a/target/i386/cpu.c
>>>> +++ b/target/i386/cpu.c
>>>> @@ -6008,6 +6008,7 @@ void cpu_x86_cpuid(CPUX86State *env, uint32_t index, 
>>>> uint32_t count,
>>>>      uint32_t die_offset;
>>>>      uint32_t limit;
>>>>      uint32_t signature[3];
>>>> +    uint32_t threads_per_socket;
>>>>      X86CPUTopoInfo topo_info;
>>>>  
>>>>      topo_info.dies_per_pkg = env->nr_dies;
>>>> @@ -6049,8 +6050,19 @@ void cpu_x86_cpuid(CPUX86State *env, uint32_t 
>>>> index, uint32_t count,
>>>>              *ecx |= CPUID_EXT_OSXSAVE;
>>>>          }
>>>>          *edx = env->features[FEAT_1_EDX];
>>>> -        if (cs->nr_cores * cs->nr_threads > 1) {
>>>> -            *ebx |= (cs->nr_cores * cs->nr_threads) << 16;
>>>> +        /*
>>>> +         * Only bits [23:16] represent the maximum number of addressable
>>>> +         * IDs for logical processors in this physical package.
>>>> +         * When thread_per_socket > 255, it will 1) overwrite bits[31:24]
>>>> +         * which is apic_id, 2) bits [23:16] get truncated.
>>>> +         */
>>>> +        threads_per_socket = cs->nr_cores * cs->nr_threads;
>>>> +        if (threads_per_socket > 255) {
>>>> +            threads_per_socket = 255;
>>>> +        }
>>>> +
>>>> +        if (threads_per_socket > 1) {
>>>> +            *ebx |= threads_per_socket << 16;
>                           ^^^^^^^^^^^^^^^^^^^^^^^^^
> more robust would be mask out non-relevant fields at rhs 

I think a mask for this case is a bit redundant, since the limitation of 255 
already filtered non-relevant fields.
I prefer not to add the mask here and keep code style consistency with others 
place.

> also perhaps double check if we could do induce similar overflow
> tweaking other -smp properties (todo for another patch[es] if there are such 
> places).

I have a check, the CPUID.0x4:EAX[31:26] indicates the Maximum number of 
addressable IDs for processor cores in the physical package.
If we launch over 64 cores VM, the 6-bits field will also overflow. I will add 
the following fix to patch2 in v2.

diff --git a/target/i386/cpu.c b/target/i386/cpu.c
index 52a2a1a1c7..9c1ae3d83d 100644
--- a/target/i386/cpu.c
+++ b/target/i386/cpu.c
@@ -243,6 +243,7 @@ static void encode_cache_cpuid4(CPUCacheInfo *cache,
                           cache->partitions * cache->sets);

     assert(num_apic_ids > 0);
+    num_cores = num_cores > 64 ? 64 : num_cores;
     *eax = CACHE_TYPE(cache->type) |
            CACHE_LEVEL(cache->level) |
            (cache->self_init ? CACHE_SELF_INIT_LEVEL : 0) |


Thanks,
Qian
>>>>              *edx |= CPUID_HT;
>>>>          }
>>>>          if (!cpu->enable_pmu) {  

Reply via email to