Received: by 2002:ab2:6857:0:b0:1ef:ffd0:ce49 with SMTP id l23csp596191lqp; Thu, 21 Mar 2024 09:47:22 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCU/LL5VRK2J05gmYBug2efeCGIh3tD9YATHzRwMRHeus8UFHlx8nm1itDm6SqHMFF8FdaFbK/19iDbrg9YYeBRzHumtRpoPccb8H0w1lA== X-Google-Smtp-Source: AGHT+IHlcPW2BXpqLHzp/9Cl4YNXoLbvaeQ3yCAAOUXZZaPQSNkmelsqShqoQgPqpZgB4nTySpCY X-Received: by 2002:ae9:e648:0:b0:789:e2c1:40ac with SMTP id x8-20020ae9e648000000b00789e2c140acmr2819473qkl.11.1711039642440; Thu, 21 Mar 2024 09:47:22 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711039642; cv=pass; d=google.com; s=arc-20160816; b=OCx5tN+7LofQyGG5WwcUS98+YwW0+oRcwSTpV3059E+ZKd55sULniyTQVl+nwYwEQY VBlJ6eiqORLxzd8ONCY+nIkAf1V9o5GSqYb8cQ/grwswP5XcF+DWGMv0vgx0srAhWH+g nyQtTHRN5T824I8w1LzZBVjO5wW/sgILa7R0ZufJPYf1W0//A6lq2M+3r7Fs3jzXou+U xkE9p3x16KvBEDQsITsCh+6NUJ2hsj95OuP8VME4pogPbaSZey5AoDHg8LthxYUJAhcC DyvHjorxzOAfQ+qvUWi7OG3O2M+f19ExMratxs0gBocRKh6dCQmFd1ISGrMdGx+IErKH Jp4Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=1HxtjWtBtu0+QIz2iYpgB+CMaFsLkRyMA1Pjvh7cbB8=; fh=RRkWXDrutj1Lx3gPsKtVf+Be2JiZ2wU9Kn2QA5PRRrs=; b=jF9W3ME2osDISRj5qNpwROcJ6Z91KTR037TyBDGKRz/kYCHeiZ5/PaYKTlYXUXuve/ KMXn863017gkgKl6DCmy/JjWn68SYFtC1dJqn5LJ03fmEGmigaTFLBwLg6jhqh9Cj1B4 pUIPfhZTZm7dTD807NRBvYGYCVqyWLw91jsVO7zo7p/Tm3pjD/GFDOaBgMzd53am588H zDpodTXhiEpOZQSdBN9MG9sBjCE6aH2l5m8g+kMLNm2op+9qQOSvKQ7zg8/XcC17i7w6 yg2fHka01gkL+up14RLQfr46kKjkWe9LI8ZOajBflcc/6nwyb6xSkdygdqnIKElxya1X qG3w==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=Hot843HW; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-kernel+bounces-110380-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-110380-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id w21-20020a05620a445500b0078a363d6d55si95014qkp.371.2024.03.21.09.47.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Mar 2024 09:47:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-110380-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=Hot843HW; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-kernel+bounces-110380-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-110380-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 13DFE1C21CA9 for ; Thu, 21 Mar 2024 16:47:22 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 50E9313BAEE; Thu, 21 Mar 2024 16:38:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="Hot843HW" Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.7]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D5F7613AA49; Thu, 21 Mar 2024 16:38:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.7 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711039084; cv=none; b=DsEgRSraJ3i95KTZnbpsyiOMOpGbu1g8YRP6hT1xuDJ/rJiyVppqvAMgVZa5S4iSrSbbkgw0bXG33jDS8b8CUzGHsFAqW2q9ZrD7RsZGrUVl5cfKxUkTP/s+peyBvPLumawPArBYKI68gVTmAnnGbBJ3kj3j+BZlWMvDLCyrvVk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711039084; c=relaxed/simple; bh=8AdmA6WLGzVJeXFetHajr1m1fAWE+3O39+dkqh6tYOg=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version:Content-Type; b=dj9LVtPUuLQnCAZvbzKH+qYHgWWsHh17Q3UYXWTLlbSkIPF5sNaox1w1EyfulWerIgBQrC5c2OD0gl+IMDby3TTQTuqb9q5eLgWcJhX2e/FjS5XXq7na1m4gAWiCBPsPZ4a2WnfMurppI7ZrsJ8ekCAi6xbxiEqb/jkxE+fuRVo= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=Hot843HW; arc=none smtp.client-ip=192.198.163.7 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1711039082; x=1742575082; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=8AdmA6WLGzVJeXFetHajr1m1fAWE+3O39+dkqh6tYOg=; b=Hot843HW+2fx9jIsxzIiXkQU6rIa/TGYwm/oqIiTtr+oDT/xBtaBgF/p HId33TBTN6BrokYjMaFa9u3k9S3axIpkXWcZuu5c737cXZvjlp4ICvOD3 BlPz6gf4RfPjnGyQPRiIwTKCi5Ct+68EZ8T1Q686gJdmx54w+e+hp0GX4 XkxlkLV6ijGZ6uUtO6MO9birFCRu+wXWaRbMzpRIA3a59acljIdQgXKW2 7Z+EM2fW7mzyFeAxR0MRiNHFKMmtmBytxZtBIa2sPNOXhxWVUmJGjfLkq hQGIJv5XSnMJhj0+STAY5+DHSayQ7z4OOyKByaU9zk9LarQm4T6L+WPrI A==; X-IronPort-AV: E=McAfee;i="6600,9927,11020"; a="31477558" X-IronPort-AV: E=Sophos;i="6.07,143,1708416000"; d="scan'208";a="31477558" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by fmvoesa101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Mar 2024 09:37:58 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,143,1708416000"; d="scan'208";a="19280016" Received: from rchatre-ws.ostc.intel.com ([10.54.69.144]) by ORVIESA003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Mar 2024 09:37:58 -0700 From: Reinette Chatre To: isaku.yamahata@intel.com, pbonzini@redhat.com, erdemaktas@google.com, vkuznets@redhat.com, seanjc@google.com, vannapurve@google.com, jmattson@google.com, mlevitsk@redhat.com, xiaoyao.li@intel.com, chao.gao@intel.com, rick.p.edgecombe@intel.com Cc: reinette.chatre@intel.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V4 3/4] KVM: x86: Add a capability to configure bus frequency for APIC timer Date: Thu, 21 Mar 2024 09:37:43 -0700 Message-Id: <6146ef9f9e5a17a1940b0efb571c5143b0e9ef8f.1711035400.git.reinette.chatre@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit From: Isaku Yamahata Add KVM_CAP_X86_APIC_BUS_FREQUENCY capability to configure the APIC bus clock frequency for APIC timer emulation. Allow KVM_ENABLE_CAPABILITY(KVM_CAP_X86_APIC_BUS_FREQUENCY) to set the frequency in nanoseconds. When using this capability, the user space VMM should configure CPUID leaf 0x15 to advertise the frequency. Vishal reported that the TDX guest kernel expects a 25MHz APIC bus frequency but ends up getting interrupts at a significantly higher rate. The TDX architecture hard-codes the core crystal clock frequency to 25MHz and mandates exposing it via CPUID leaf 0x15. The TDX architecture does not allow the VMM to override the value. In addition, per Intel SDM: "The APIC timer frequency will be the processor’s bus clock or core crystal clock frequency (when TSC/core crystal clock ratio is enumerated in CPUID leaf 0x15) divided by the value specified in the divide configuration register." The resulting 25MHz APIC bus frequency conflicts with the KVM hardcoded APIC bus frequency of 1GHz. The KVM doesn't enumerate CPUID leaf 0x15 to the guest unless the user space VMM sets it using KVM_SET_CPUID. If the CPUID leaf 0x15 is enumerated, the guest kernel uses it as the APIC bus frequency. If not, the guest kernel measures the frequency based on other known timers like the ACPI timer or the legacy PIT. As reported by Vishal the TDX guest kernel expects a 25MHz timer frequency but gets timer interrupt more frequently due to the 1GHz frequency used by KVM. To ensure that the guest doesn't have a conflicting view of the APIC bus frequency, allow the userspace to tell KVM to use the same frequency that TDX mandates instead of the default 1Ghz. There are several options to address this: 1. Make the KVM able to configure APIC bus frequency (this series). Pro: It resembles the existing hardware. The recent Intel CPUs adapts 25MHz. Con: Require the VMM to emulate the APIC timer at 25MHz. 2. Make the TDX architecture enumerate CPUID leaf 0x15 to configurable frequency or not enumerate it. Pro: Any APIC bus frequency is allowed. Con: Deviates from TDX architecture. 3. Make the TDX guest kernel use 1GHz when it's running on KVM. Con: The kernel ignores CPUID leaf 0x15. 4. Change CPUID leaf 0x15 under TDX to report the crystal clock frequency as 1 GHz. Pro: This has been the virtual APIC frequency for KVM guests for 13 years. Pro: This requires changing only one hard-coded constant in TDX. Con: It doesn't work with other VMMs as TDX isn't specific to KVM. Con: Core crystal clock frequency is also used to calculate TSC frequency. Con: If it is configured to value different from hardware, it will break the correctness of INTEL-PT Mini Time Count (MTC) packets in TDs. Reported-by: Vishal Annapurve Closes: https://lore.kernel.org/lkml/20231006011255.4163884-1-vannapurve@google.com/ Signed-off-by: Isaku Yamahata Co-developed-by: Reinette Chatre Signed-off-by: Reinette Chatre --- Changes v4: - Rework implementation following Sean's guidance in: https://lore.kernel.org/all/ZdjzIgS6EAeCsUue@google.com/ - Reword con #2 to acknowledge feedback. (Sean) - Add the "con" information from Xiaoyao during earlier review of v2. - Rework changelog to address comments related to "bus clock" vs "core crystal clock" frequency. (Xiaoyao) - Drop snippet about impact on TSC deadline timer emulation. (Maxim) - Drop Maxim Levitsky's "Reviewed-by" tag due to many changes to patch since tag received. - Switch "Subject:" to match custom "KVM: X86:" -> "KVM: x86:" Changes v3: - Added reviewed-by Maxim Levitsky. - Minor update of the commit message. Changes v2: - Add check if vcpu isn't created. - Add check if lapic chip is in-kernel emulation. - Fix build error for i386. - Add document to api.rst. - Typo in the commit message. Documentation/virt/kvm/api.rst | 17 +++++++++++++++++ arch/x86/kvm/x86.c | 27 +++++++++++++++++++++++++++ include/uapi/linux/kvm.h | 1 + 3 files changed, 45 insertions(+) diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst index 0b5a33ee71ee..20080fe4b8ee 100644 --- a/Documentation/virt/kvm/api.rst +++ b/Documentation/virt/kvm/api.rst @@ -8063,6 +8063,23 @@ error/annotated fault. See KVM_EXIT_MEMORY_FAULT for more information. +7.35 KVM_CAP_X86_APIC_BUS_FREQUENCY +----------------------------------- + +:Architectures: x86 +:Target: VM +:Parameters: args[0] is the desired APIC bus clock rate, in nanoseconds +:Returns: 0 on success, -EINVAL if args[0] contains an invalid value for the + frequency or if any vCPUs have been created, -ENXIO if a virtual + local APIC has not been created using KVM_CREATE_IRQCHIP. + +This capability sets VM's APIC bus clock frequency, used by KVM's in-kernel +virtual APIC when emulating APIC timers. KVM's default value can be retrieved +by KVM_CHECK_EXTENSION. + +Note: Userspace is responsible for correctly configuring CPUID 0x15, a.k.a. the +core crystal clock frequency, if a non-zero CPUID 0x15 is exposed to the guest. + 8. Other capabilities. ====================== diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 23f25799c760..bf52c0ca7a56 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -4713,6 +4713,9 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) case KVM_CAP_MEMORY_FAULT_INFO: r = 1; break; + case KVM_CAP_X86_APIC_BUS_FREQUENCY: + r = APIC_BUS_CYCLE_NS_DEFAULT; + break; case KVM_CAP_EXIT_HYPERCALL: r = KVM_EXIT_HYPERCALL_VALID_MASK; break; @@ -6726,6 +6729,30 @@ int kvm_vm_ioctl_enable_cap(struct kvm *kvm, } mutex_unlock(&kvm->lock); break; + case KVM_CAP_X86_APIC_BUS_FREQUENCY: { + u64 bus_cycle_ns = cap->args[0]; + u64 unused; + + r = -EINVAL; + /* + * Guard against overflow in tmict_to_ns(). 128 is the highest + * divide value that can be programmed in APIC_TDCR. + */ + if (!bus_cycle_ns || + check_mul_overflow((u64)U32_MAX * 128, bus_cycle_ns, &unused)) + break; + + r = 0; + mutex_lock(&kvm->lock); + if (!irqchip_in_kernel(kvm)) + r = -ENXIO; + else if (kvm->created_vcpus) + r = -EINVAL; + else + kvm->arch.apic_bus_cycle_ns = bus_cycle_ns; + mutex_unlock(&kvm->lock); + break; + } default: r = -EINVAL; break; diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index 2190adbe3002..49da7ec97bd5 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -917,6 +917,7 @@ struct kvm_enable_cap { #define KVM_CAP_MEMORY_ATTRIBUTES 233 #define KVM_CAP_GUEST_MEMFD 234 #define KVM_CAP_VM_TYPES 235 +#define KVM_CAP_X86_APIC_BUS_FREQUENCY 236 struct kvm_irq_routing_irqchip { __u32 irqchip; -- 2.34.1