Received: by 2002:a05:7412:40d:b0:e2:908c:2ebd with SMTP id 13csp111517rdf; Mon, 20 Nov 2023 18:37:19 -0800 (PST) X-Google-Smtp-Source: AGHT+IE9yx3Y49C3GAYyNPMSC3e0nf+T8dil0iGWLEoYfLtqq1np2I66pis7ITgrEUjiGKedG59K X-Received: by 2002:a17:903:2585:b0:1ce:6453:16ed with SMTP id jb5-20020a170903258500b001ce645316edmr8568519plb.35.1700534239247; Mon, 20 Nov 2023 18:37:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700534239; cv=none; d=google.com; s=arc-20160816; b=ZynweAHTA5JpnkogMCPSJRC4xlIEcreHnJvgaThPjvIiLsAQJnmRXFFChBLi+c8pHP ljQCWl4MAIet+fZiyvj3RvCCSNFiI/1EjfPNdxYwJK7woJqY5z1EklSrMqwx2Wazl2gO vBseKOkGD+9YPq7HjXtuUM6i8NvvbPUm/3+15Q0gpwje9rZNOYpSVwKK84Kc3V5mHFh6 I2/k7BZHFLltvEKUJrozq4mVO8/Xwb9hOkMjJiR4Nwdlaj/m0pwVTe4QRRdA/74JRKmB l+I+oOiNtosuOuEknUvAWzYNVr70UspL3IMLFFnZee18SR5Ctmkqne4bEGcjQfj4bHYt Vtpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=AwW88va/1lqXf7QaB2U31mOeYQwIvL6siXP5eXXhSzc=; fh=JOrDXAv7dX9lqUsWenmIinruxsV5NNS7FV+l4Q4onAY=; b=A8pR3u21b1NDfze4dAV+TPK9+r4JJl8JugXOR1C/+cp9aDI9TLo/yYBXdfprPx4THk uLxDB1L3l8YvxbaALwNfXaoyeeVLkDRgcIl2XgrOZBlfrSDTGLGRcrr6WtRjkc4Qe/lo JP+K215Be+nyHEO9Pd9rdgD++UjReR16RyO4k1WJxxOZKA4yMgVpGK14TtT7K0AdZ6OO S7mDOnx5uUcYP81JydlMl28u0fi/VFiQK6Oh4vCq3UgNlWW4CP8U8WcnuOo/KrBeVRIF tN8QsEH5cqwIqpChlgj4B6xUdEdIC3Uh4pnJxUiLkgYdVNpSV96wwssIND6kHqULSLek JFVw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id c5-20020a170902c1c500b001cc3a66229dsi9125738plc.507.2023.11.20.18.37.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 20 Nov 2023 18:37:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 43E3880A90DE; Mon, 20 Nov 2023 18:37:16 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232876AbjKUChF (ORCPT + 99 others); Mon, 20 Nov 2023 21:37:05 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51484 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229522AbjKUChE (ORCPT ); Mon, 20 Nov 2023 21:37:04 -0500 Received: from mail.loongson.cn (mail.loongson.cn [114.242.206.163]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 661DD9C; Mon, 20 Nov 2023 18:36:59 -0800 (PST) Received: from loongson.cn (unknown [10.2.5.213]) by gateway (Coremail) with SMTP id _____8CxyOjHF1xlQW07AA--.16163S3; Tue, 21 Nov 2023 10:36:56 +0800 (CST) Received: from localhost.localdomain (unknown [10.2.5.213]) by localhost.localdomain (Coremail) with SMTP id AQAAf8BxE+TGF1xlEwtIAA--.29117S2; Tue, 21 Nov 2023 10:36:54 +0800 (CST) From: Bibo Mao To: Tianrui Zhao , Huacai Chen Cc: WANG Xuerui , kvm@vger.kernel.org, loongarch@lists.linux.dev, linux-kernel@vger.kernel.org Subject: [PATCH] LoongArch: KVM: Fix oneshot timer emulation Date: Tue, 21 Nov 2023 10:34:28 +0800 Message-Id: <20231121023428.3400150-1-maobibo@loongson.cn> X-Mailer: git-send-email 2.39.3 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-CM-TRANSID: AQAAf8BxE+TGF1xlEwtIAA--.29117S2 X-CM-SenderInfo: xpdruxter6z05rqj20fqof0/ X-Coremail-Antispam: 1Uk129KBj93XoWxWFWfZr1kCrWfCrWxCr13KFX_yoWruw4DpF WSkF1I9r18Gry7G3W3Xan8ZwnIq395t3WfCrnrWayIkwnxX345XFWxWr97JF45ArZ3JF1S vryrAwn0vF4rX3gCm3ZEXasCq-sJn29KB7ZKAUJUUUU5529EdanIXcx71UUUUU7KY7ZEXa sCq-sGcSsGvfJ3Ic02F40EFcxC0VAKzVAqx4xG6I80ebIjqfuFe4nvWSU5nxnvy29KBjDU 0xBIdaVrnRJUUUk0b4IE77IF4wAFF20E14v26r1j6r4UM7CY07I20VC2zVCF04k26cxKx2 IYs7xG6rWj6s0DM7CIcVAFz4kK6r106r15M28lY4IEw2IIxxk0rwA2F7IY1VAKz4vEj48v e4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_JFI_Gr1l84ACjcxK6xIIjxv20xvEc7CjxVAFwI 0_Jr0_Gr1l84ACjcxK6I8E87Iv67AKxVWxJVW8Jr1l84ACjcxK6I8E87Iv6xkF7I0E14v2 6r4j6r4UJwAS0I0E0xvYzxvE52x082IY62kv0487Mc804VCY07AIYIkI8VC2zVCFFI0UMc 02F40EFcxC0VAKzVAqx4xG6I80ewAv7VC0I7IYx2IY67AKxVWUXVWUAwAv7VC2z280aVAF wI0_Jr0_Gr1lOx8S6xCaFVCjc4AY6r1j6r4UM4x0Y48IcxkI7VAKI48JMxAIw28IcxkI7V AKI48JMxC20s026xCaFVCjc4AY6r1j6r4UMI8I3I0E5I8CrVAFwI0_Jr0_Jr4lx2IqxVCj r7xvwVAFwI0_JrI_JrWlx4CE17CEb7AF67AKxVWUAVWUtwCIc40Y0x0EwIxGrwCI42IY6x IIjxv20xvE14v26r1j6r1xMIIF0xvE2Ix0cI8IcVCY1x0267AKxVWUJVW8JwCI42IY6xAI w20EY4v20xvaj40_Jr0_JF4lIxAIcVC2z280aVAFwI0_Jr0_Gr1lIxAIcVC2z280aVCY1x 0267AKxVWUJVW8JbIYCTnIWIevJa73UjIFyTuYvjxU7XTmDUUUU X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Mon, 20 Nov 2023 18:37:16 -0800 (PST) When oneshot timer is fired, CSR TVAL will be -1 rather than 0. There needs special handing for this situation. There are two scenarios when oneshot timer is fired. One scenario is that time is fired after exiting to host, CSR TVAL is set with 0 in order to inject hw interrupt, and -1 will assigned to CSR TVAL soon. The other situation is that timer is fired in VM and guest kernel is hanlding timer IRQ and is ready to set next expired timer val, timer interrupt should not be injected at this point, else there will be spurious timer interrupt. After VM finished doing timer IRQ and timer IRQ will be triggered again, however the next expired timer val does not reach to 0, it is just spurious timer interrupt. Here hw timer irq status in CSR ESTAT is used to judge these two scenarios. If CSR TVAL is -1, the oneshot timer is fired; and if timer hw irq is on in CSR ESTAT register, it happens after exiting to host; else if timer hw irq is off, we think that it happens in vm and timer IRQ handler has already acked IRQ. With this patch, runltp with version ltp20230516 passes to run in vm. And this patch is based on the patch series. https://lore.kernel.org/lkml/20231116023036.2324371-1-maobibo@loongson.cn/ Signed-off-by: Bibo Mao --- arch/loongarch/kvm/timer.c | 61 ++++++++++++++++++++++++++++++-------- 1 file changed, 49 insertions(+), 12 deletions(-) diff --git a/arch/loongarch/kvm/timer.c b/arch/loongarch/kvm/timer.c index 711982f9eeb5..00487d67f86d 100644 --- a/arch/loongarch/kvm/timer.c +++ b/arch/loongarch/kvm/timer.c @@ -70,6 +70,7 @@ void kvm_init_timer(struct kvm_vcpu *vcpu, unsigned long timer_hz) void kvm_restore_timer(struct kvm_vcpu *vcpu) { unsigned long cfg, delta, period; + unsigned long ticks, estat; ktime_t expire, now; struct loongarch_csrs *csr = vcpu->arch.csr; @@ -90,20 +91,46 @@ void kvm_restore_timer(struct kvm_vcpu *vcpu) */ hrtimer_cancel(&vcpu->arch.swtimer); + /* + * From LoongArch Reference Manual Volume 1 Chapter 7.6.2 + * If oneshot timer is fired, CSR TVAL will be -1, there are two + * conditions: + * 1) timer is fired during exiting to host + * 2) timer is fired and vm is doing timer irq, and then exiting to + * host. Host should not inject timer irq to avoid spurious + * timer interrupt again + */ + ticks = kvm_read_sw_gcsr(csr, LOONGARCH_CSR_TVAL); + estat = kvm_read_sw_gcsr(csr, LOONGARCH_CSR_ESTAT); + if (!(cfg & CSR_TCFG_PERIOD) && (ticks > cfg)) { + /* + * Writing 0 to LOONGARCH_CSR_TVAL will inject timer irq + * and set CSR TVAL with -1 + * + * Writing ticks to LOONGARCH_CSR_TVAL will not inject timer + * irq, HW CSR TVAL will go down from value ticks, it avoids + * spurious timer interrupt + */ + if (estat & INT_TI) + write_gcsr_timertick(0); + else + kvm_restore_hw_gcsr(csr, LOONGARCH_CSR_TVAL); + return; + } + /* * Set remainder tick value if not expired */ now = ktime_get(); expire = vcpu->arch.expire; + delta = 0; if (ktime_before(now, expire)) delta = ktime_to_tick(vcpu, ktime_sub(expire, now)); - else { - if (cfg & CSR_TCFG_PERIOD) { - period = cfg & CSR_TCFG_VAL; - delta = ktime_to_tick(vcpu, ktime_sub(now, expire)); - delta = period - (delta % period); - } else - delta = 0; + else if (cfg & CSR_TCFG_PERIOD) { + period = cfg & CSR_TCFG_VAL; + delta = ktime_to_tick(vcpu, ktime_sub(now, expire)); + delta = period - (delta % period); + /* * Inject timer here though sw timer should inject timer * interrupt async already, since sw timer may be cancelled @@ -122,15 +149,25 @@ void kvm_restore_timer(struct kvm_vcpu *vcpu) */ static void _kvm_save_timer(struct kvm_vcpu *vcpu) { - unsigned long ticks, delta; + unsigned long ticks, delta, cfg; ktime_t expire; struct loongarch_csrs *csr = vcpu->arch.csr; ticks = kvm_read_sw_gcsr(csr, LOONGARCH_CSR_TVAL); - delta = tick_to_ns(vcpu, ticks); - expire = ktime_add_ns(ktime_get(), delta); - vcpu->arch.expire = expire; - if (ticks) { + cfg = kvm_read_sw_gcsr(csr, LOONGARCH_CSR_TCFG); + + /* + * From LoongArch Reference Manual Volume 1 Chapter 7.6.2 + * If period timer is fired, CSR TVAL will be reloaded from CSR TCFG + * If oneshot timer is fired, CSR TVAL will be -1 + * Here judge one shot timer fired by checking whether TVAL is larger + * than TCFG + */ + if (ticks < cfg) { + delta = tick_to_ns(vcpu, ticks); + expire = ktime_add_ns(ktime_get(), delta); + vcpu->arch.expire = expire; + /* * HRTIMER_MODE_PINNED is suggested since vcpu may run in * the same physical cpu in next time base-commit: 98b1cc82c4affc16f5598d4fa14b1858671b2263 -- 2.39.3