Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1829827ybl; Thu, 9 Jan 2020 02:20:43 -0800 (PST) X-Google-Smtp-Source: APXvYqxhltAqs6M4fURae+rXaEUhW6qzOVA+YrT17zeNt/in/EUZxy0U1yKLJ+9GBAFk+pbgcocu X-Received: by 2002:aca:ac0c:: with SMTP id v12mr2356298oie.123.1578565243368; Thu, 09 Jan 2020 02:20:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578565243; cv=none; d=google.com; s=arc-20160816; b=Kf2P0TL40YigYwHp27wqHf+EjPI1vPTNh6lOnUP49lNAsFcieAZ6WjM/MsPA9QMsSk UcidZX3EWvR6Bmn9qR0AzbJU60rddq+N3pS0mekXUU3MLvXS8qTuOzxvZU7xMTdpaWVO 3uP1Sbv76kr5jVVC1yoGDK/hmgYORSSKJsOArqROVgJZHcLtOnC++t8ACMfhMhg56oOE B1gUn9tCfHMDX/mZQc2baiYdD8FlKlRITfyQXpZmZ7YTcxiPlANBmd/I+HNwhinHlZM4 CKjGHvriemKnPsX8qSFnQVXqrJMdezBGh8ISCorhQ/GRILhiD1HJCqkKraNsLNFP/lc3 uaug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:references :in-reply-to:subject:cc:to:from:date:content-transfer-encoding :mime-version:dkim-signature; bh=KFNy5x0il4A0JBUfOed15+3p2mLKBi/PbF6NumUkeKQ=; b=huDHRI5apCSs/ymVvBSLVcbFRfhCowP7CtxvaRLlkxAJ8rGilQ8MhEX0W5oIWvf5S3 ehZxcd5VIP7qWZekSOuFsG9uRx52qdOD0WTaZcFWZTIUwh47HlYSVbjsI26hc97hAFEo 3knHBHn5hQDVEDinLfGTFxEcDN/tEqDZ3YJ/ADKreqnGhuGcDtD21CsBt/qWxghJOEi0 rPX3q1rWbxYVM08TQw78tBaB2w0JycBLQ7qxt5ugaaIQT8E6BcJTYqMoZ0sVTPbkj/wN VR6Ae5IbhFsrWHnzhOplulWTttgcMW33k+VilEPdXSZ/Y7pBxk9k0WmqaK1tMFuGVPBY EwjA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=S+Fbk9kw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x16si3802208otp.184.2020.01.09.02.20.30; Thu, 09 Jan 2020 02:20:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=S+Fbk9kw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729249AbgAIJQF (ORCPT + 99 others); Thu, 9 Jan 2020 04:16:05 -0500 Received: from mail.kernel.org ([198.145.29.99]:37906 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728946AbgAIJQE (ORCPT ); Thu, 9 Jan 2020 04:16:04 -0500 Received: from disco-boy.misterjones.org (disco-boy.misterjones.org [51.254.78.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6DD3B20673; Thu, 9 Jan 2020 09:16:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578561363; bh=MdVSJRM+XiTSM3BMCfg4mQ79vWe50lYbOVZ92kj9+QY=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=S+Fbk9kweZIwO+UapBHl3+6E9spys8FrmIsH9HikCZf5MRbnwZFNwCaxtQ3X8d36C yIsvn60iStl50Z3Kqyw8/a4njJ+zeZYumK1AKbKnXbAyxUNgLBQzU0lbkohVrGs5JH W3QJFOrudOtN15HZgQq9m88tQcYABcMIHDMgnUDo= Received: from disco-boy.misterjones.org ([51.254.78.96] helo=www.loen.fr) by disco-boy.misterjones.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92) (envelope-from ) id 1ipTv7-0002GW-MZ; Thu, 09 Jan 2020 09:16:01 +0000 MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Thu, 09 Jan 2020 09:16:01 +0000 From: Marc Zyngier To: Jianyong Wu Cc: netdev@vger.kernel.org, yangbo.lu@nxp.com, john.stultz@linaro.org, tglx@linutronix.de, pbonzini@redhat.com, sean.j.christopherson@intel.com, richardcochran@gmail.com, Mark Rutland , will@kernel.org, Suzuki Poulose , Steven Price , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, Steve Capper , Kaly Xin , Justin He , nd Subject: Re: [RFC PATCH v9 6/8] psci: Add hvc call service for ptp_kvm. In-Reply-To: References: <20191210034026.45229-1-jianyong.wu@arm.com> <20191210034026.45229-7-jianyong.wu@arm.com> <7383dc06897bba253f174cd21a19b5c0@kernel.org> Message-ID: <099a26ffef5d554b88a5e33d7f2a6e3a@kernel.org> X-Sender: maz@kernel.org User-Agent: Roundcube Webmail/1.3.8 X-SA-Exim-Connect-IP: 51.254.78.96 X-SA-Exim-Rcpt-To: Jianyong.Wu@arm.com, netdev@vger.kernel.org, yangbo.lu@nxp.com, john.stultz@linaro.org, tglx@linutronix.de, pbonzini@redhat.com, sean.j.christopherson@intel.com, richardcochran@gmail.com, Mark.Rutland@arm.com, will@kernel.org, Suzuki.Poulose@arm.com, Steven.Price@arm.com, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, Steve.Capper@arm.com, Kaly.Xin@arm.com, Justin.He@arm.com, nd@arm.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020-01-09 05:45, Jianyong Wu wrote: > Hi Marc, > >> -----Original Message----- >> From: Marc Zyngier >> Sent: Tuesday, January 7, 2020 5:16 PM >> To: Jianyong Wu >> Cc: netdev@vger.kernel.org; yangbo.lu@nxp.com; john.stultz@linaro.org; >> tglx@linutronix.de; pbonzini@redhat.com; >> sean.j.christopherson@intel.com; >> richardcochran@gmail.com; Mark Rutland ; >> will@kernel.org; Suzuki Poulose ; Steven Price >> ; linux-kernel@vger.kernel.org; linux-arm- >> kernel@lists.infradead.org; kvmarm@lists.cs.columbia.edu; >> kvm@vger.kernel.org; Steve Capper ; Kaly Xin >> ; Justin He ; nd >> Subject: Re: [RFC PATCH v9 6/8] psci: Add hvc call service for >> ptp_kvm. >> >> On 2019-12-10 03:40, Jianyong Wu wrote: >> > ptp_kvm modules will call hvc to get this service. >> > The service offers real time and counter cycle of host for guest. >> > >> > Signed-off-by: Jianyong Wu >> > --- >> > include/linux/arm-smccc.h | 12 ++++++++++++ >> > virt/kvm/arm/psci.c | 22 ++++++++++++++++++++++ >> > 2 files changed, 34 insertions(+) >> > >> > diff --git a/include/linux/arm-smccc.h b/include/linux/arm-smccc.h >> > index 6f82c87308ed..aafb6bac167d 100644 >> > --- a/include/linux/arm-smccc.h >> > +++ b/include/linux/arm-smccc.h >> > @@ -94,6 +94,7 @@ >> > >> > /* KVM "vendor specific" services */ >> > #define ARM_SMCCC_KVM_FUNC_FEATURES 0 >> > +#define ARM_SMCCC_KVM_PTP 1 >> > #define ARM_SMCCC_KVM_FUNC_FEATURES_2 127 >> > #define ARM_SMCCC_KVM_NUM_FUNCS 128 >> > >> > @@ -103,6 +104,17 @@ >> > ARM_SMCCC_OWNER_VENDOR_HYP, >> \ >> > ARM_SMCCC_KVM_FUNC_FEATURES) >> > >> > +/* >> > + * This ID used for virtual ptp kvm clock and it will pass second >> > value >> > + * and nanosecond value of host real time and system counter by vcpu >> > + * register to guest. >> > + */ >> > +#define ARM_SMCCC_VENDOR_HYP_KVM_PTP_FUNC_ID >> \ >> > + ARM_SMCCC_CALL_VAL(ARM_SMCCC_FAST_CALL, >> \ >> > + ARM_SMCCC_SMC_32, >> \ >> > + ARM_SMCCC_OWNER_VENDOR_HYP, >> \ >> > + ARM_SMCCC_KVM_PTP) >> > + >> >> All of this depends on patches that have never need posted to any ML, >> and >> just linger in Will's tree. You need to pick them up and post them as >> part of >> this series so that they can at least be reviewed. >> > Ok, I will add them next version. > >> > #ifndef __ASSEMBLY__ >> > >> > #include >> > diff --git a/virt/kvm/arm/psci.c b/virt/kvm/arm/psci.c index >> > 0debf49bf259..682d892d6717 100644 >> > --- a/virt/kvm/arm/psci.c >> > +++ b/virt/kvm/arm/psci.c >> > @@ -9,6 +9,7 @@ >> > #include >> > #include >> > #include >> > +#include >> > >> > #include >> > #include >> > @@ -389,6 +390,8 @@ static int kvm_psci_call(struct kvm_vcpu *vcpu) >> > >> > int kvm_hvc_call_handler(struct kvm_vcpu *vcpu) { >> > + struct system_time_snapshot systime_snapshot; >> > + u64 cycles; >> > u32 func_id = smccc_get_function(vcpu); >> > u32 val[4] = {}; >> > u32 option; >> > @@ -431,6 +434,25 @@ int kvm_hvc_call_handler(struct kvm_vcpu *vcpu) >> > case ARM_SMCCC_VENDOR_HYP_KVM_FEATURES_FUNC_ID: >> > val[0] = BIT(ARM_SMCCC_KVM_FUNC_FEATURES); >> > break; >> > + /* >> > + * This will used for virtual ptp kvm clock. three >> > + * values will be passed back. >> > + * reg0 stores high 32-bit host ktime; >> > + * reg1 stores low 32-bit host ktime; >> > + * reg2 stores high 32-bit difference of host cycles and cntvoff; >> > + * reg3 stores low 32-bit difference of host cycles and cntvoff. >> >> That's either two or four values, and not three as you claim above. >> > Sorry, I'm not sure what do you mean "three", the registers here is 4 > from reg0 to reg3. Please read the comment you have written above... >> Also, I fail to understand the meaning of the host cycle vs cntvoff >> comparison. >> This is something that guest can perform on its own (it has access to >> both >> physical and virtual timers, and can compute cntvoff without >> intervention of >> the hypervisor). >> > To keep consistency and precision, clock time and counter cycle must > captured at the same time. It will perform at ktime_get_snapshot. Fair enough. It would vertainly help if you documented it. It would also help if you explained why it is so much worse to read the counter in the guest before *and* after the call, and assume that the clock time read happened right in the middle? That aside, what you are returning is something that *looks* like the virtual counter. What if the guest is using the physical counter, which is likely to be the case with nested virt? Do you expect the guest to always use the virtual counter? This isn't going to fly. >> Finally, how does it work with nested virt, where cntvoff is for the >> the vEL2 >> guest? >> > For now, I have not considered ptp_kvm in nested virtualization. Also > I'm not sure about if nested virtualization is > ready on arm64 , as I need test ptp_kvm on it. If so, I can consider > it. It is not about testing. It is about taking the architecture into account. And ready or not doesn't come into play here. What you're defining here is an ABI, and it better be totally future proof. But if you want to test, help yourself to [1] and have fun! > >> > + */ >> > + case ARM_SMCCC_VENDOR_HYP_KVM_PTP_FUNC_ID: >> > + ktime_get_snapshot(&systime_snapshot); >> > + if (systime_snapshot.cs_id != CSID_ARM_ARCH_COUNTER) >> > + return kvm_psci_call(vcpu); >> >> What does this mean? Calling PSCI because you've failed to identify >> the clock >> source? What result do you expect from this? Hint: this isn't a PSCI >> call. >> > Sorry, what I want to do here is that return to guest with the error > info. > Maybe I should set val[0] to -1 and break to let the guest know that > error comes, as > the guest will check if val[0] is positive to determine the next step. What you should do is handle it like a normal SMCCC failure. M. [1] https://git.kernel.org/pub/scm/linux/kernel/git/maz/arm-platforms.git/log/?h=kvm-arm64/nv-5.5-rc4-WIP -- Jazz is not dead. It just smells funny...