From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.3 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 491B1C0650F for ; Thu, 8 Aug 2019 09:34:48 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 1BB642173C for ; Thu, 8 Aug 2019 09:34:48 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="SGkKuAaC" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 1BB642173C Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:Date: Message-ID:From:References:To:Subject:Reply-To:Content-ID:Content-Description :Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=K7rWtGhQsANZyhZxbJxX3J9rX7iK/aGLbkBIRuZuJsY=; b=SGkKuAaCvooluh 3/ZNkRuwcxm+JpkR9wSnB4dloI8qLCYs+znf8zEaCCl3IwsKiaT6ysWSNo1khiZL3/kwDrUsMF5pZ lKfbK/JT/jcsxXloukAzfXpBwRPGSyb3Xp20Awit2k1zTSmy2WViHNe4WQsHoFvNF3GN7FwoAYD7B Rld3smYHddf921zjGC69GVS6bpDQ0YhfmXNVQt3HeJUPRWhmIzDwrnvE4lXOLIh3+vK/bTtZqfC6y mRcfOnixnTVM2IRlYt9pjzYMi7hks9bGJvCN1NJI9zFHbYdGtC/w0/MXAsqvQ2kxxy0ylQcdE1F+P pp+CG0cr2W7ubX7i4bfQ==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92 #3 (Red Hat Linux)) id 1hveoj-0005dR-WD; Thu, 08 Aug 2019 09:34:42 +0000 Received: from foss.arm.com ([217.140.110.172]) by bombadil.infradead.org with esmtp (Exim 4.92 #3 (Red Hat Linux)) id 1hveog-0005cn-5r for linux-arm-kernel@lists.infradead.org; Thu, 08 Aug 2019 09:34:39 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 1F5F11576; Thu, 8 Aug 2019 02:34:37 -0700 (PDT) Received: from [10.1.196.217] (e121566-lin.cambridge.arm.com [10.1.196.217]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 50FAA3F706; Thu, 8 Aug 2019 02:34:36 -0700 (PDT) Subject: Re: [PATCH 47/59] KVM: arm64: nv: Propagate CNTVOFF_EL2 to the virtual EL1 timer To: Marc Zyngier , linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org References: <20190621093843.220980-1-marc.zyngier@arm.com> <20190621093843.220980-48-marc.zyngier@arm.com> From: Alexandru Elisei Message-ID: <95edbe3a-bd6c-11b5-cfa9-6d5252dbb50c@arm.com> Date: Thu, 8 Aug 2019 10:34:35 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <20190621093843.220980-48-marc.zyngier@arm.com> Content-Language: en-US X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20190808_023438_309026_EE44F2F2 X-CRM114-Status: GOOD ( 19.35 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Andre Przywara , Dave Martin Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org On 6/21/19 10:38 AM, Marc Zyngier wrote: > We need to allow a guest hypervisor to virtualize the virtual timer. > FOr that, let's propagate CNTVOFF_EL2 to the guest's view of that > timer. > > Signed-off-by: Marc Zyngier > --- > arch/arm64/include/asm/kvm_host.h | 1 - > arch/arm64/kvm/sys_regs.c | 8 ++++++-- > include/kvm/arm_arch_timer.h | 1 + > virt/kvm/arm/arch_timer.c | 12 ++++++++++++ > 4 files changed, 19 insertions(+), 3 deletions(-) > > diff --git a/arch/arm64/include/asm/kvm_host.h b/arch/arm64/include/asm/kvm_host.h > index b7c44adcdbf3..e0fe9acb46bf 100644 > --- a/arch/arm64/include/asm/kvm_host.h > +++ b/arch/arm64/include/asm/kvm_host.h > @@ -252,7 +252,6 @@ enum vcpu_sysreg { > RMR_EL2, /* Reset Management Register */ > CONTEXTIDR_EL2, /* Context ID Register (EL2) */ > TPIDR_EL2, /* EL2 Software Thread ID Register */ > - CNTVOFF_EL2, /* Counter-timer Virtual Offset register */ > CNTHCTL_EL2, /* Counter-timer Hypervisor Control register */ > SP_EL2, /* EL2 Stack Pointer */ > > diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c > index 1b8016330a19..2031a59fcf49 100644 > --- a/arch/arm64/kvm/sys_regs.c > +++ b/arch/arm64/kvm/sys_regs.c > @@ -150,7 +150,6 @@ struct el2_sysreg_map { > PURE_EL2_SYSREG( RVBAR_EL2 ), > PURE_EL2_SYSREG( RMR_EL2 ), > PURE_EL2_SYSREG( TPIDR_EL2 ), > - PURE_EL2_SYSREG( CNTVOFF_EL2 ), > PURE_EL2_SYSREG( CNTHCTL_EL2 ), > PURE_EL2_SYSREG( HPFAR_EL2 ), > EL2_SYSREG( SCTLR_EL2, SCTLR_EL1, translate_sctlr ), > @@ -1351,6 +1350,11 @@ static bool access_arch_timer(struct kvm_vcpu *vcpu, > tmr = TIMER_PTIMER; > treg = TIMER_REG_CVAL; > break; > + case SYS_CNTVOFF_EL2: > + tmr = TIMER_VTIMER; > + treg = TIMER_REG_VOFF; > + break; > + > default: > BUG(); > } > @@ -2122,7 +2126,7 @@ static const struct sys_reg_desc sys_reg_descs[] = { > { SYS_DESC(SYS_CONTEXTIDR_EL2), access_rw, reset_val, CONTEXTIDR_EL2, 0 }, > { SYS_DESC(SYS_TPIDR_EL2), access_rw, reset_val, TPIDR_EL2, 0 }, > > - { SYS_DESC(SYS_CNTVOFF_EL2), access_rw, reset_val, CNTVOFF_EL2, 0 }, > + { SYS_DESC(SYS_CNTVOFF_EL2), access_arch_timer }, > { SYS_DESC(SYS_CNTHCTL_EL2), access_rw, reset_val, CNTHCTL_EL2, 0 }, > > { SYS_DESC(SYS_CNTHP_TVAL_EL2), access_arch_timer }, > diff --git a/include/kvm/arm_arch_timer.h b/include/kvm/arm_arch_timer.h > index 3a5d9255120e..3389606f3029 100644 > --- a/include/kvm/arm_arch_timer.h > +++ b/include/kvm/arm_arch_timer.h > @@ -23,6 +23,7 @@ enum kvm_arch_timer_regs { > TIMER_REG_CVAL, > TIMER_REG_TVAL, > TIMER_REG_CTL, > + TIMER_REG_VOFF, > }; > > struct arch_timer_context { > diff --git a/virt/kvm/arm/arch_timer.c b/virt/kvm/arm/arch_timer.c > index 3d84c240071d..1d53352c7d97 100644 > --- a/virt/kvm/arm/arch_timer.c > +++ b/virt/kvm/arm/arch_timer.c > @@ -913,6 +913,10 @@ static u64 kvm_arm_timer_read(struct kvm_vcpu *vcpu, > val = kvm_phys_timer_read() - timer->cntvoff; > break; > > + case TIMER_REG_VOFF: > + val = timer->cntvoff; > + break; > + > default: > BUG(); > } > @@ -955,6 +959,10 @@ static void kvm_arm_timer_write(struct kvm_vcpu *vcpu, > timer->cnt_cval = val; > break; > > + case TIMER_REG_VOFF: > + timer->cntvoff = val; > + break; > + > default: > BUG(); > } > @@ -1166,6 +1174,10 @@ int kvm_timer_enable(struct kvm_vcpu *vcpu) > return -EINVAL; > } > > + /* Nested virtualization requires zero offset for virtual EL2 */ > + if (nested_virt_in_use(vcpu)) > + vcpu_vtimer(vcpu)->cntvoff = 0; I think this is related to the fact that the virtual offset is treated as 0 when reading CNTVCT_EL0 from EL2, or from from EL2 and EL0 if E2H, TGE are set (please correct me if I'm wrong). However, when the guest runs in virtual EL2, the direct_vtimer is the hvtimer, so the value that ends up in CNTVOFF_EL2 is vcpu_hvtimer(vcpu)->cntvoff. Thanks, Alex > + > get_timer_map(vcpu, &map); > > ret = kvm_vgic_map_phys_irq(vcpu, _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel