Received: by 2002:ab2:1689:0:b0:1f7:5705:b850 with SMTP id d9csp738846lqa; Sun, 28 Apr 2024 01:51:49 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCV2R+q4M35zVuYGbb+y/EDXlk5d+gD8YoHTroc3fZlIFnnC74Fw+qwJmdAER6WqKV/zk3hIe+DJh1csJ1qnWH/MHNPztvXnMXsse64UzQ== X-Google-Smtp-Source: AGHT+IFm5qbgvGTWB435l6DVn5qbWcE+1ZERC0esR9DyuSagQIKrGK3nPO14s5PK5tY3SB+rTmRi X-Received: by 2002:a17:906:d929:b0:a55:75f6:ce0f with SMTP id rn9-20020a170906d92900b00a5575f6ce0fmr2965199ejb.13.1714294308954; Sun, 28 Apr 2024 01:51:48 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1714294308; cv=pass; d=google.com; s=arc-20160816; b=gIFfiQ19UP3fqxpObXu3+PfGRytVQg0H5RIHXoofqOTIoam8wvD+pfCYxm2voH/q65 D8zmWukxjztc4R5wWFHioiFt7FX0b/8jgb4pZT91jZm8W1yQ+Yh6poLwiBnsQiXxV608 zsmSHB+2PGFkHbQbxaxUQCrStXnEkx6rg7RnUkb9T8EXTp9W4CoGhD8OU0e/LXKn5b3i e5vnKFUg2VxaSZeNCCTHlomgSBP0qg0GFHvbg23kl9jKjitTC7xosC/Mbd2EB8tXn08s Wj/r5m42OqOXpc9uQCkaSbijeVGH3DRCP9cXRwDOWPkiM7AE2COsrTW+5Dsi7eU6YaI9 vVNQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=user-agent:in-reply-to:content-transfer-encoding :content-disposition:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:references:message-id:subject:cc:to:from:date :dkim-signature; bh=Z6WTafMG3UursMQJkolKIJT6w0pKVjgMY04sMPqgOmU=; fh=5Yrd3Bz/GHKVpiunW4KvLDboSGBsZ8gu9G7S89cMG20=; b=D3lkrvxsjzVptcmWgzpJ2IBGHcdJPzWVaBNI+w80U1ixhJk9RnU/r7uzOZQhTPnodU VvZMZDxOfrJboN5k/3Qu50Dv2kmsZo3RmfchZMadJlo5gfhgwZgNNSYMpNJNq0BEc6YY 64iLyU2ljpN2gqKGJeXjxdSNj7OkDLVfjmOB9Yqrp1xHRPn21eRz68E8rpynmM7CyEAH l0rIhV27CIOjaMYSu4oTthOMlbKPlvvb1lpkI9LkJBSLXz0jNJrCyMPucr6y6SO4t8WJ 85YMVnnXEhA9Iw8gkO25agwgQFWpygGQtVJU1ITrL+32zTbsXO59FbprF9nbZEWtusSN WPgw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="J9Nc/yUX"; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-161286-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-161286-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id a24-20020a17090680d800b00a5890bcb1d6si5628071ejx.801.2024.04.28.01.51.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 28 Apr 2024 01:51:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-161286-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="J9Nc/yUX"; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-161286-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-161286-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 901C11F21912 for ; Sun, 28 Apr 2024 06:25:04 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id DE26F4176B; Sun, 28 Apr 2024 06:24:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="J9Nc/yUX" Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6A41CF516; Sun, 28 Apr 2024 06:24:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.175.65.10 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714285493; cv=none; b=YYwH4eIW8C4w0SLkp5xA8gZ3/x/HMTOWzRlVeZIVUo86M4FVXpqWM/O6av3sJfZW90eSH4wLSYQGMve448pGru18Ebbk6TDiNzeymoSe9YDMYwufTMjR0IC/6wTHExgh3ftKOrib7PNS7PEdeP4BoScUk9pKRfdrzs0ei4JgrfM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1714285493; c=relaxed/simple; bh=fvPUeK/aaq7pCNdQfr0pheOhmp7xrBSYBku5xOszskE=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=uxTeKup0rSuzsG2v1/Ecg3wwi+z70nne/j72p+DbxmsEeZd5UTbQ6PZC4L1GGWeLptLsVUJKP1IrH7JxW2Im/0Cx4kdSpLckzTSn0q00cZ4e0VYLjcg/1YKRdnZQuoWnl2Wk4qz41Fg7iyEZBP1jHfZK4jQSzQNAbxoerM9cirM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com; spf=none smtp.mailfrom=linux.intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=J9Nc/yUX; arc=none smtp.client-ip=198.175.65.10 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1714285492; x=1745821492; h=date:from:to:cc:subject:message-id:references: mime-version:content-transfer-encoding:in-reply-to; bh=fvPUeK/aaq7pCNdQfr0pheOhmp7xrBSYBku5xOszskE=; b=J9Nc/yUXZBB34ZqP7uOW/9fAVoS3H8yD3EHItjs+gWYQ8cUgZlcp52nR +pdLWOcDYHnG6/9fP6uWKkZJVlWHTaWD5K9YlWRtU0ZEt4ybKlWY0Ek04 azh2aS36btx637pLUeC7CgZUArdu3GLqs/UDGIaOkONtokEWH77LdWP4Z wir2A54ljVV6VvPClwHwfQjWNfROGX6s7zz1xWehLpXGcyeDSpreIUlco iaH5qQbcKmVkvOoBDifuOrzP5R07uQwGIroUgca8I3CkB7fznLOmHuFUQ LUjywvXUOWXIkj9tz9/ARvtMgsnA+ZXfHy3O2JVXxpcIehs3IAH82/Q3E Q==; X-CSE-ConnectionGUID: LId6VwPpRISYzNREwJ23mw== X-CSE-MsgGUID: NGlxE1w4SUqiOu/M7mCOdw== X-IronPort-AV: E=McAfee;i="6600,9927,11057"; a="27426992" X-IronPort-AV: E=Sophos;i="6.07,236,1708416000"; d="scan'208";a="27426992" Received: from fmviesa005.fm.intel.com ([10.60.135.145]) by orvoesa102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Apr 2024 23:24:51 -0700 X-CSE-ConnectionGUID: hwmNyEMYTZ6LyfOmufmZEA== X-CSE-MsgGUID: XfyzuqxOSVGkt8LRsMv4aQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,236,1708416000"; d="scan'208";a="30272062" Received: from yy-desk-7060.sh.intel.com (HELO localhost) ([10.239.159.76]) by fmviesa005.fm.intel.com with ESMTP; 27 Apr 2024 23:24:47 -0700 Date: Sun, 28 Apr 2024 14:24:46 +0800 From: Yuan Yao To: Reinette Chatre Cc: isaku.yamahata@intel.com, pbonzini@redhat.com, erdemaktas@google.com, vkuznets@redhat.com, seanjc@google.com, vannapurve@google.com, jmattson@google.com, mlevitsk@redhat.com, xiaoyao.li@intel.com, chao.gao@intel.com, rick.p.edgecombe@intel.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH V5 3/4] KVM: x86: Add a capability to configure bus frequency for APIC timer Message-ID: <20240428062446.gfux36w3j2fy2dnj@yy-desk-7060> References: <6748a4c12269e756f0c48680da8ccc5367c31ce7.1714081726.git.reinette.chatre@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <6748a4c12269e756f0c48680da8ccc5367c31ce7.1714081726.git.reinette.chatre@intel.com> User-Agent: NeoMutt/20171215 On Thu, Apr 25, 2024 at 03:07:01PM -0700, Reinette Chatre wrote: > From: Isaku Yamahata > > Add KVM_CAP_X86_APIC_BUS_CYCLES_NS capability to configure the APIC > bus clock frequency for APIC timer emulation. > Allow KVM_ENABLE_CAPABILITY(KVM_CAP_X86_APIC_BUS_CYCLES_NS) to set the > frequency in nanoseconds. When using this capability, the user space > VMM should configure CPUID leaf 0x15 to advertise the frequency. > > Vishal reported that the TDX guest kernel expects a 25MHz APIC bus > frequency but ends up getting interrupts at a significantly higher rate. > > The TDX architecture hard-codes the core crystal clock frequency to > 25MHz and mandates exposing it via CPUID leaf 0x15. The TDX architecture > does not allow the VMM to override the value. > > In addition, per Intel SDM: > "The APIC timer frequency will be the processor’s bus clock or core > crystal clock frequency (when TSC/core crystal clock ratio is > enumerated in CPUID leaf 0x15) divided by the value specified in > the divide configuration register." > > The resulting 25MHz APIC bus frequency conflicts with the KVM hardcoded > APIC bus frequency of 1GHz. > > The KVM doesn't enumerate CPUID leaf 0x15 to the guest unless the user > space VMM sets it using KVM_SET_CPUID. If the CPUID leaf 0x15 is > enumerated, the guest kernel uses it as the APIC bus frequency. If not, > the guest kernel measures the frequency based on other known timers like > the ACPI timer or the legacy PIT. As reported by Vishal the TDX guest > kernel expects a 25MHz timer frequency but gets timer interrupt more > frequently due to the 1GHz frequency used by KVM. > > To ensure that the guest doesn't have a conflicting view of the APIC bus > frequency, allow the userspace to tell KVM to use the same frequency that > TDX mandates instead of the default 1Ghz. > > There are several options to address this: > 1. Make the KVM able to configure APIC bus frequency (this series). > Pro: It resembles the existing hardware. The recent Intel CPUs > adapts 25MHz. > Con: Require the VMM to emulate the APIC timer at 25MHz. > 2. Make the TDX architecture enumerate CPUID leaf 0x15 to configurable > frequency or not enumerate it. > Pro: Any APIC bus frequency is allowed. > Con: Deviates from TDX architecture. > 3. Make the TDX guest kernel use 1GHz when it's running on KVM. > Con: The kernel ignores CPUID leaf 0x15. > 4. Change CPUID leaf 0x15 under TDX to report the crystal clock frequency > as 1 GHz. > Pro: This has been the virtual APIC frequency for KVM guests for 13 > years. > Pro: This requires changing only one hard-coded constant in TDX. > Con: It doesn't work with other VMMs as TDX isn't specific to KVM. > Con: Core crystal clock frequency is also used to calculate TSC > frequency. > Con: If it is configured to value different from hardware, it will > break the correctness of INTEL-PT Mini Time Count (MTC) packets > in TDs. Reviewed-by: Yuan Yao > > Reported-by: Vishal Annapurve > Closes: https://lore.kernel.org/lkml/20231006011255.4163884-1-vannapurve@google.com/ > Signed-off-by: Isaku Yamahata > Reviewed-by: Rick Edgecombe > Co-developed-by: Reinette Chatre > Signed-off-by: Reinette Chatre > --- > Changes v5: > - Rename capability KVM_CAP_X86_APIC_BUS_FREQUENCY -> > KVM_CAP_X86_APIC_BUS_CYCLES_NS. (Xiaoyao Li) > - Add Rick's Reviewed-by tag. > > Changes v4: > - Rework implementation following Sean's guidance in: > https://lore.kernel.org/all/ZdjzIgS6EAeCsUue@google.com/ > - Reword con #2 to acknowledge feedback. (Sean) > - Add the "con" information from Xiaoyao during earlier review of v2. > - Rework changelog to address comments related to "bus clock" vs > "core crystal clock" frequency. (Xiaoyao) > - Drop snippet about impact on TSC deadline timer emulation. (Maxim) > - Drop Maxim Levitsky's "Reviewed-by" tag due to many changes to patch > since tag received. > - Switch "Subject:" to match custom "KVM: X86:" -> "KVM: x86:" > > Changes v3: > - Added reviewed-by Maxim Levitsky. > - Minor update of the commit message. > > Changes v2: > - Add check if vcpu isn't created. > - Add check if lapic chip is in-kernel emulation. > - Fix build error for i386. > - Add document to api.rst. > - Typo in the commit message. > > Documentation/virt/kvm/api.rst | 17 +++++++++++++++++ > arch/x86/kvm/x86.c | 27 +++++++++++++++++++++++++++ > include/uapi/linux/kvm.h | 1 + > 3 files changed, 45 insertions(+) > > diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst > index f0b76ff5030d..f014cd9b2217 100644 > --- a/Documentation/virt/kvm/api.rst > +++ b/Documentation/virt/kvm/api.rst > @@ -8063,6 +8063,23 @@ error/annotated fault. > > See KVM_EXIT_MEMORY_FAULT for more information. > > +7.35 KVM_CAP_X86_APIC_BUS_CYCLES_NS > +----------------------------------- > + > +:Architectures: x86 > +:Target: VM > +:Parameters: args[0] is the desired APIC bus clock rate, in nanoseconds > +:Returns: 0 on success, -EINVAL if args[0] contains an invalid value for the > + frequency or if any vCPUs have been created, -ENXIO if a virtual > + local APIC has not been created using KVM_CREATE_IRQCHIP. > + > +This capability sets VM's APIC bus clock frequency, used by KVM's in-kernel > +virtual APIC when emulating APIC timers. KVM's default value can be retrieved > +by KVM_CHECK_EXTENSION. > + > +Note: Userspace is responsible for correctly configuring CPUID 0x15, a.k.a. the > +core crystal clock frequency, if a non-zero CPUID 0x15 is exposed to the guest. > + > 8. Other capabilities. > ====================== > > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index 10e6315103f4..fa6954c9a9d2 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -4715,6 +4715,9 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) > case KVM_CAP_MEMORY_FAULT_INFO: > r = 1; > break; > + case KVM_CAP_X86_APIC_BUS_CYCLES_NS: > + r = APIC_BUS_CYCLE_NS_DEFAULT; > + break; > case KVM_CAP_EXIT_HYPERCALL: > r = KVM_EXIT_HYPERCALL_VALID_MASK; > break; > @@ -6755,6 +6758,30 @@ int kvm_vm_ioctl_enable_cap(struct kvm *kvm, > } > mutex_unlock(&kvm->lock); > break; > + case KVM_CAP_X86_APIC_BUS_CYCLES_NS: { > + u64 bus_cycle_ns = cap->args[0]; > + u64 unused; > + > + r = -EINVAL; > + /* > + * Guard against overflow in tmict_to_ns(). 128 is the highest > + * divide value that can be programmed in APIC_TDCR. > + */ > + if (!bus_cycle_ns || > + check_mul_overflow((u64)U32_MAX * 128, bus_cycle_ns, &unused)) > + break; > + > + r = 0; > + mutex_lock(&kvm->lock); > + if (!irqchip_in_kernel(kvm)) > + r = -ENXIO; > + else if (kvm->created_vcpus) > + r = -EINVAL; > + else > + kvm->arch.apic_bus_cycle_ns = bus_cycle_ns; > + mutex_unlock(&kvm->lock); > + break; > + } > default: > r = -EINVAL; > break; > diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h > index 2190adbe3002..6a4d9432ab11 100644 > --- a/include/uapi/linux/kvm.h > +++ b/include/uapi/linux/kvm.h > @@ -917,6 +917,7 @@ struct kvm_enable_cap { > #define KVM_CAP_MEMORY_ATTRIBUTES 233 > #define KVM_CAP_GUEST_MEMFD 234 > #define KVM_CAP_VM_TYPES 235 > +#define KVM_CAP_X86_APIC_BUS_CYCLES_NS 236 > > struct kvm_irq_routing_irqchip { > __u32 irqchip; > -- > 2.34.1 > >