From: Manali Shukla <manali.shukla@amd.com>
To: <kvm@vger.kernel.org>, <linux-perf-users@vger.kernel.org>,
<linux-doc@vger.kernel.org>
Cc: <seanjc@google.com>, <pbonzini@redhat.com>, <nikunj@amd.com>,
<manali.shukla@amd.com>, <bp@alien8.de>, <peterz@infradead.org>,
<mingo@redhat.com>, <mizhang@google.com>,
<thomas.lendacky@amd.com>, <ravi.bangoria@amd.com>,
<Sandipan.Das@amd.com>
Subject: [PATCH v1 04/11] KVM: x86: Add emulation support for Extented LVT registers
Date: Fri, 27 Jun 2025 16:25:32 +0000 [thread overview]
Message-ID: <20250627162550.14197-5-manali.shukla@amd.com> (raw)
In-Reply-To: <20250627162550.14197-1-manali.shukla@amd.com>
From: Santosh Shukla <santosh.shukla@amd.com>
The local interrupts are extended to include more LVT registers in
order to allow additional interrupt sources, like Instruction Based
Sampling (IBS) and many more.
Currently there are four additional LVT registers defined and they are
located at APIC offsets 400h-530h.
AMD IBS driver is designed to use EXTLVT (Extended interrupt local
vector table) by default for driver initialization.
Extended LVT registers are required to be emulated to initialize the
guest IBS driver successfully.
Please refer to Section 16.4.5 in AMD Programmer's Manual Volume 2 at
https://bugzilla.kernel.org/attachment.cgi?id=306250 for more details
on Extended LVT.
Signed-off-by: Santosh Shukla <santosh.shukla@amd.com>
Co-developed-by: Manali Shukla <manali.shukla@amd.com>
Signed-off-by: Manali Shukla <manali.shukla@amd.com>
---
arch/x86/include/asm/apicdef.h | 17 +++++++++
arch/x86/kvm/cpuid.c | 6 +++
arch/x86/kvm/lapic.c | 69 +++++++++++++++++++++++++++++++++-
arch/x86/kvm/lapic.h | 1 +
arch/x86/kvm/svm/avic.c | 4 ++
arch/x86/kvm/svm/svm.c | 4 ++
6 files changed, 99 insertions(+), 2 deletions(-)
diff --git a/arch/x86/include/asm/apicdef.h b/arch/x86/include/asm/apicdef.h
index 094106b6a538..4c0f580578aa 100644
--- a/arch/x86/include/asm/apicdef.h
+++ b/arch/x86/include/asm/apicdef.h
@@ -146,6 +146,23 @@
#define APIC_EILVT_MSG_EXT 0x7
#define APIC_EILVT_MASKED (1 << 16)
+/*
+ * Initialize extended APIC registers to the default value when guest
+ * is started and EXTAPIC feature is enabled on the guest.
+ *
+ * APIC_EFEAT is a read only Extended APIC feature register, whose
+ * default value is 0x00040007. However, bits 0, 1, and 2 represent
+ * features that are not currently emulated by KVM. Therefore, these
+ * bits must be cleared during initialization. As a result, the
+ * default value used for APIC_EFEAT in KVM is 0x00040000.
+ *
+ * APIC_ECTRL is a read-write Extended APIC control register, whose
+ * default value is 0x0.
+ */
+
+#define APIC_EFEAT_DEFAULT 0x00040000
+#define APIC_ECTRL_DEFAULT 0x0
+
#define APIC_BASE (fix_to_virt(FIX_APIC_BASE))
#define APIC_BASE_MSR 0x800
#define APIC_X2APIC_ID_MSR 0x802
diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c
index eb7be340138b..7270d22fbf31 100644
--- a/arch/x86/kvm/cpuid.c
+++ b/arch/x86/kvm/cpuid.c
@@ -458,6 +458,12 @@ void kvm_vcpu_after_set_cpuid(struct kvm_vcpu *vcpu)
/* Invoke the vendor callback only after the above state is updated. */
kvm_x86_call(vcpu_after_set_cpuid)(vcpu);
+ /*
+ * Initialize extended LVT registers at guest startup to support delivery
+ * of interrupts via the extended APIC space (offsets 0x400–0x530).
+ */
+ kvm_apic_init_eilvt_regs(vcpu);
+
/*
* Except for the MMU, which needs to do its thing any vendor specific
* adjustments to the reserved GPA bits.
diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c
index 00ca2b0faa45..cffe44eb3f2b 100644
--- a/arch/x86/kvm/lapic.c
+++ b/arch/x86/kvm/lapic.c
@@ -1624,9 +1624,13 @@ static inline struct kvm_lapic *to_lapic(struct kvm_io_device *dev)
}
#define APIC_REG_MASK(reg) (1ull << ((reg) >> 4))
+#define APIC_REG_EXT_MASK(reg) (1ull << (((reg) >> 4) - 0x40))
#define APIC_REGS_MASK(first, count) \
(APIC_REG_MASK(first) * ((1ull << (count)) - 1))
+#define APIC_LAST_REG_OFFSET 0x3f0
+#define APIC_EXT_LAST_REG_OFFSET 0x530
+
u64 kvm_lapic_readable_reg_mask(struct kvm_lapic *apic)
{
/* Leave bits '0' for reserved and write-only registers. */
@@ -1668,6 +1672,8 @@ EXPORT_SYMBOL_GPL(kvm_lapic_readable_reg_mask);
static int kvm_lapic_reg_read(struct kvm_lapic *apic, u32 offset, int len,
void *data)
{
+ u64 valid_reg_ext_mask = 0;
+ unsigned int last_reg = APIC_LAST_REG_OFFSET;
unsigned char alignment = offset & 0xf;
u32 result;
@@ -1677,13 +1683,44 @@ static int kvm_lapic_reg_read(struct kvm_lapic *apic, u32 offset, int len,
*/
WARN_ON_ONCE(apic_x2apic_mode(apic) && offset == APIC_ICR);
+ /*
+ * The local interrupts are extended to include LVT registers to allow
+ * additional interrupt sources when the EXTAPIC feature bit is enabled.
+ * The Extended Interrupt LVT registers are located at APIC offsets 400-530h.
+ */
+ if (guest_cpu_cap_has(apic->vcpu, X86_FEATURE_EXTAPIC)) {
+ valid_reg_ext_mask =
+ APIC_REG_EXT_MASK(APIC_EFEAT) |
+ APIC_REG_EXT_MASK(APIC_ECTRL) |
+ APIC_REG_EXT_MASK(APIC_EILVTn(0)) |
+ APIC_REG_EXT_MASK(APIC_EILVTn(1)) |
+ APIC_REG_EXT_MASK(APIC_EILVTn(2)) |
+ APIC_REG_EXT_MASK(APIC_EILVTn(3));
+ last_reg = APIC_EXT_LAST_REG_OFFSET;
+ }
+
if (alignment + len > 4)
return 1;
- if (offset > 0x3f0 ||
- !(kvm_lapic_readable_reg_mask(apic) & APIC_REG_MASK(offset)))
+ if (offset > last_reg)
return 1;
+ switch (offset) {
+ /*
+ * Section 16.3.2 in the AMD Programmer's Manual Volume 2 states:
+ * "APIC registers are aligned to 16-byte offsets and must be accessed
+ * using naturally-aligned DWORD size read and writes."
+ */
+ case KVM_APIC_REG_SIZE ... KVM_APIC_EXT_REG_SIZE - 16:
+ if (!(valid_reg_ext_mask & APIC_REG_EXT_MASK(offset)))
+ return 1;
+ break;
+ default:
+ if (!(kvm_lapic_readable_reg_mask(apic) & APIC_REG_MASK(offset)))
+ return 1;
+
+ }
+
result = __apic_read(apic, offset & ~0xf);
trace_kvm_apic_read(offset, result);
@@ -2419,6 +2456,14 @@ static int kvm_lapic_reg_write(struct kvm_lapic *apic, u32 reg, u32 val)
else
kvm_apic_send_ipi(apic, APIC_DEST_SELF | val, 0);
break;
+
+ case APIC_ECTRL:
+ case APIC_EILVTn(0):
+ case APIC_EILVTn(1):
+ case APIC_EILVTn(2):
+ case APIC_EILVTn(3):
+ kvm_lapic_set_reg(apic, reg, val);
+ break;
default:
ret = 1;
break;
@@ -2757,6 +2802,24 @@ void kvm_inhibit_apic_access_page(struct kvm_vcpu *vcpu)
kvm_vcpu_srcu_read_lock(vcpu);
}
+/*
+ * Initialize extended APIC registers to the default value when guest is
+ * started. The extended APIC registers should only be initialized when the
+ * EXTAPIC feature is enabled on the guest.
+ */
+void kvm_apic_init_eilvt_regs(struct kvm_vcpu *vcpu)
+{
+ struct kvm_lapic *apic = vcpu->arch.apic;
+ int i;
+
+ if (guest_cpu_cap_has(vcpu, X86_FEATURE_EXTAPIC)) {
+ kvm_lapic_set_reg(apic, APIC_EFEAT, APIC_EFEAT_DEFAULT);
+ kvm_lapic_set_reg(apic, APIC_ECTRL, APIC_ECTRL_DEFAULT);
+ for (i = 0; i < APIC_EILVT_NR_MAX; i++)
+ kvm_lapic_set_reg(apic, APIC_EILVTn(i), APIC_EILVT_MASKED);
+ }
+}
+
void kvm_lapic_reset(struct kvm_vcpu *vcpu, bool init_event)
{
struct kvm_lapic *apic = vcpu->arch.apic;
@@ -2818,6 +2881,8 @@ void kvm_lapic_reset(struct kvm_vcpu *vcpu, bool init_event)
kvm_lapic_set_reg(apic, APIC_ISR + 0x10 * i, 0);
kvm_lapic_set_reg(apic, APIC_TMR + 0x10 * i, 0);
}
+ kvm_apic_init_eilvt_regs(vcpu);
+
kvm_apic_update_apicv(vcpu);
update_divide_count(apic);
atomic_set(&apic->lapic_timer.pending, 0);
diff --git a/arch/x86/kvm/lapic.h b/arch/x86/kvm/lapic.h
index 7ad946b3738d..ff0f9eb3417b 100644
--- a/arch/x86/kvm/lapic.h
+++ b/arch/x86/kvm/lapic.h
@@ -96,6 +96,7 @@ void kvm_apic_ack_interrupt(struct kvm_vcpu *vcpu, int vector);
int kvm_apic_accept_pic_intr(struct kvm_vcpu *vcpu);
int kvm_apic_accept_events(struct kvm_vcpu *vcpu);
void kvm_lapic_reset(struct kvm_vcpu *vcpu, bool init_event);
+void kvm_apic_init_eilvt_regs(struct kvm_vcpu *vcpu);
u64 kvm_lapic_get_cr8(struct kvm_vcpu *vcpu);
void kvm_lapic_set_tpr(struct kvm_vcpu *vcpu, unsigned long cr8);
void kvm_lapic_set_eoi(struct kvm_vcpu *vcpu);
diff --git a/arch/x86/kvm/svm/avic.c b/arch/x86/kvm/svm/avic.c
index 7338879d1c0c..323927fb6f57 100644
--- a/arch/x86/kvm/svm/avic.c
+++ b/arch/x86/kvm/svm/avic.c
@@ -682,6 +682,10 @@ static bool is_avic_unaccelerated_access_trap(u32 offset)
case APIC_LVTERR:
case APIC_TMICT:
case APIC_TDCR:
+ case APIC_EILVTn(0):
+ case APIC_EILVTn(1):
+ case APIC_EILVTn(2):
+ case APIC_EILVTn(3):
ret = true;
break;
default:
diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c
index fffc3320ea00..f9a7ff37ea10 100644
--- a/arch/x86/kvm/svm/svm.c
+++ b/arch/x86/kvm/svm/svm.c
@@ -791,6 +791,10 @@ void svm_set_x2apic_msr_interception(struct vcpu_svm *svm, bool intercept)
X2APIC_MSR(APIC_TMICT),
X2APIC_MSR(APIC_TMCCT),
X2APIC_MSR(APIC_TDCR),
+ X2APIC_MSR(APIC_EILVTn(0)),
+ X2APIC_MSR(APIC_EILVTn(1)),
+ X2APIC_MSR(APIC_EILVTn(2)),
+ X2APIC_MSR(APIC_EILVTn(3)),
};
int i;
--
2.43.0
next prev parent reply other threads:[~2025-06-27 16:26 UTC|newest]
Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-06-27 16:25 [PATCH v1 00/11] Implement support for IBS virtualization Manali Shukla
2025-06-27 16:25 ` [PATCH v1 01/11] perf/amd/ibs: Fix race condition in IBS Manali Shukla
2025-06-27 16:25 ` [PATCH v1 02/11] KVM: Add KVM_GET_LAPIC_W_EXTAPIC and KVM_SET_LAPIC_W_EXTAPIC for extapic Manali Shukla
2025-07-15 2:21 ` Mi, Dapeng
2025-07-16 7:45 ` Manali Shukla
2025-06-27 16:25 ` [PATCH v1 03/11] x86/cpufeatures: Add CPUID feature bit for Extended LVT Manali Shukla
2025-06-27 16:25 ` Manali Shukla [this message]
2025-07-15 2:58 ` [PATCH v1 04/11] KVM: x86: Add emulation support for Extented LVT registers Mi, Dapeng
2025-07-16 10:10 ` Manali Shukla
2025-07-17 2:02 ` Mi, Dapeng
2025-08-01 9:33 ` Manali Shukla
2025-08-05 1:10 ` Mi, Dapeng
2025-06-27 16:25 ` [PATCH v1 05/11] x86/cpufeatures: Add CPUID feature bit for VIBS in SVM/SEV guests Manali Shukla
2025-06-27 16:25 ` [PATCH v1 06/11] KVM: x86/cpuid: Add a KVM-only leaf for IBS capabilities Manali Shukla
2025-06-27 16:25 ` [PATCH v1 07/11] KVM: x86: Extend CPUID range to include new leaf Manali Shukla
2025-06-27 16:25 ` [PATCH v1 08/11] KVM: SVM: Extend VMCB area for virtualized IBS registers Manali Shukla
2025-07-15 3:13 ` Mi, Dapeng
2025-07-16 7:40 ` Manali Shukla
2025-06-27 16:25 ` [PATCH v1 09/11] KVM: SVM: Add support for IBS Virtualization Manali Shukla
2025-06-27 16:25 ` [PATCH v1 10/11] perf/x86/amd: Enable VPMU passthrough capability for IBS PMU Manali Shukla
2025-06-27 16:25 ` [PATCH v1 11/11] perf/x86/amd: Remove exclude_guest check from perf_ibs_init() Manali Shukla
2025-07-14 11:51 ` [PATCH v1 00/11] Implement support for IBS virtualization Manali Shukla
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250627162550.14197-5-manali.shukla@amd.com \
--to=manali.shukla@amd.com \
--cc=Sandipan.Das@amd.com \
--cc=bp@alien8.de \
--cc=kvm@vger.kernel.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-perf-users@vger.kernel.org \
--cc=mingo@redhat.com \
--cc=mizhang@google.com \
--cc=nikunj@amd.com \
--cc=pbonzini@redhat.com \
--cc=peterz@infradead.org \
--cc=ravi.bangoria@amd.com \
--cc=seanjc@google.com \
--cc=thomas.lendacky@amd.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).