Just regarding the use of a system environment variable to turn this
feature / bugfix / hack on and off - this would probably break starting
the VM via the xendomains script.
If the VM definition is in /etc/xen/auto/, then there would be nothing
to set the environment variable before the VM is launched - hence it
would not be applied and a guest crash would occur...
Depending on the VM's settings, this would either continue to start &
crash - or just stop again until it could be started with the ENV
variable.
Steven Haigh
📧 net...@crc.id.au 💻 https://www.crc.id.au
📞 +613 9001 6090 📱 +614 1293 5897
On Fri, Nov 15, 2019 at 10:57, George Dunlap <george.dun...@citrix.com>
wrote:
Changeset ca2eee92df44 ("x86, hvm: Expose host core/HT topology to HVM
guests") attempted to "fake up" a topology which would induce guest
operating systems to not treat vcpus as sibling hyperthreads. This
involved (among other things) actually reporting hyperthreading as
available, but giving vcpus every other APICID. The resulting cpu
featureset is invalid, but most operating systems on most hardware
managed to cope with it.
Unfortunately, Windows running on modern AMD hardware -- including
Ryzen 3xxx series processors, and reportedly EPYC "Rome" cpus -- gets
confused by the resulting contradictory feature bits and crashes
during installation. (Linux guests have so far continued to cope.)
A "proper" fix is complicated and it's too late to fix it either for
4.13, or to backport to supported branches. As a short-term fix,
implement an option to disable this "Fake HT" mode. The resulting
topology reported will not be canonical, but experimentally continues
to work with Windows guests.
However, disabling this "Fake HT" mode has not been widely tested, and
will almost certainly break migration if applied inconsistently.
To minimize impact while allowing administrators to disable "Fake HT"
only on guests which are known not to work without it (i.e., Windows
guests) on affected hardware, add an environment variable which can be
set to disable the "Fake HT" mode on such hardware.
Reported-by: Steven Haigh <net...@crc.id.au>
Reported-by: Andreas Kinzler <h...@posteo.de>
Signed-off-by: George Dunlap <george.dun...@citrix.com>
---
This has been compile-tested only; I'm posting it early to get
feedback on the approach.
TODO: Prevent such guests from being migrated
Open questions:
- Is this the right place to put the `getenv` check?
- Is there any way we can make migration work, at least in some cases?
- Can we check for known-problematic models, and at least report a
more useful error?
CC: Andrew Cooper <andrew.coop...@citrix.com>
CC: Jan Beulich <jbeul...@suse.com>
CC: Ian Jackson <ian.jack...@citrix.com>
CC: Anthony Perard <anthony.per...@citrix.com>
---
tools/libxc/xc_cpuid_x86.c | 74
+++++++++++++++++++++++---------------
1 file changed, 45 insertions(+), 29 deletions(-)
diff --git a/tools/libxc/xc_cpuid_x86.c b/tools/libxc/xc_cpuid_x86.c
index 312c481f1e..70c85e1467 100644
--- a/tools/libxc/xc_cpuid_x86.c
+++ b/tools/libxc/xc_cpuid_x86.c
@@ -579,52 +579,68 @@ int xc_cpuid_apply_policy(xc_interface *xch,
uint32_t domid,
}
else
{
- /*
- * Topology for HVM guests is entirely controlled by Xen.
For now, we
- * hardcode APIC_ID = vcpu_id * 2 to give the illusion of no
SMT.
- */
- p->basic.htt = true;
+ p->basic.htt = false;
p->extd.cmp_legacy = false;
- /*
- * Leaf 1 EBX[23:16] is Maximum Logical Processors Per
Package.
- * Update to reflect vLAPIC_ID = vCPU_ID * 2, but make sure
to avoid
- * overflow.
- */
- if ( !(p->basic.lppp & 0x80) )
- p->basic.lppp *= 2;
-
switch ( p->x86_vendor )
{
case X86_VENDOR_INTEL:
for ( i = 0; (p->cache.subleaf[i].type &&
i < ARRAY_SIZE(p->cache.raw)); ++i )
{
- p->cache.subleaf[i].cores_per_package =
- (p->cache.subleaf[i].cores_per_package << 1) | 1;
+ p->cache.subleaf[i].cores_per_package = 0;
p->cache.subleaf[i].threads_per_cache = 0;
}
break;
+ }
- case X86_VENDOR_AMD:
- case X86_VENDOR_HYGON:
+ if ( !getenv("XEN_LIBXC_DISABLE_FAKEHT") ) {
/*
- * Leaf 0x80000008 ECX[15:12] is ApicIdCoreSize.
- * Leaf 0x80000008 ECX[7:0] is NumberOfCores (minus one).
- * Update to reflect vLAPIC_ID = vCPU_ID * 2. But avoid
- * - overflow,
- * - going out of sync with leaf 1 EBX[23:16],
- * - incrementing ApicIdCoreSize when it's zero (which
changes the
- * meaning of bits 7:0).
+ * Topology for HVM guests is entirely controlled by
Xen. For now, we
+ * hardcode APIC_ID = vcpu_id * 2 to give the illusion
of no SMT.
*/
- if ( p->extd.nc < 0x7f )
+ p->basic.htt = true;
+
+ /*
+ * Leaf 1 EBX[23:16] is Maximum Logical Processors Per
Package.
+ * Update to reflect vLAPIC_ID = vCPU_ID * 2, but make
sure to avoid
+ * overflow.
+ */
+ if ( !(p->basic.lppp & 0x80) )
+ p->basic.lppp *= 2;
+
+ switch ( p->x86_vendor )
{
- if ( p->extd.apic_id_size != 0 &&
p->extd.apic_id_size != 0xf )
- p->extd.apic_id_size++;
+ case X86_VENDOR_INTEL:
+ for ( i = 0; (p->cache.subleaf[i].type &&
+ i < ARRAY_SIZE(p->cache.raw)); ++i )
+ {
+ p->cache.subleaf[i].cores_per_package =
+ (p->cache.subleaf[i].cores_per_package << 1)
| 1;
+ p->cache.subleaf[i].threads_per_cache = 0;
+ }
+
+ case X86_VENDOR_AMD:
+ case X86_VENDOR_HYGON:
+ /*
+ * Leaf 0x80000008 ECX[15:12] is ApicIdCoreSize.
+ * Leaf 0x80000008 ECX[7:0] is NumberOfCores (minus
one).
+ * Update to reflect vLAPIC_ID = vCPU_ID * 2. But
avoid
+ * - overflow,
+ * - going out of sync with leaf 1 EBX[23:16],
+ * - incrementing ApicIdCoreSize when it's zero
(which changes the
+ * meaning of bits 7:0).
+ */
+ if ( p->extd.nc < 0x7f )
+ {
+ if ( p->extd.apic_id_size != 0 &&
p->extd.apic_id_size != 0xf )
+ p->extd.apic_id_size++;
+
+ p->extd.nc = (p->extd.nc << 1) | 1;
+ }
+ break;
- p->extd.nc = (p->extd.nc << 1) | 1;
}
- break;
}
/*
--
2.24.0
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel