Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp375370rdb; Mon, 29 Jan 2024 05:11:53 -0800 (PST) X-Google-Smtp-Source: AGHT+IGmKeLf4Uujjk8BqBOOTN326I0ZLbfJrOfxGfrpyuq6DWU3M37LOxJKHRtEQuIMnjmDTETB X-Received: by 2002:a17:906:2687:b0:a35:f9b6:fd95 with SMTP id t7-20020a170906268700b00a35f9b6fd95mr246575ejc.2.1706533912878; Mon, 29 Jan 2024 05:11:52 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706533912; cv=pass; d=google.com; s=arc-20160816; b=El2U3EJAdY6bwf4oR8tkbGN4j0In2poL6yfN2i/6c/Mr2IJqVoEYslX80nglHjtX5j /ocYul7bKaN53g/kAt7hWWSSEphra+RA+XRNdWyIDY1U/h1Py6hC9HnvKJeTIeQIda9Q HAy5+8JxaFlawrpKKfvVr0L025ySzIgM8xblObpwo8H1VNEJV+BBd/Uh2JuMGuTNdAZh wuGaqOGLIKnE5wQgkZKdcJCtLlNK3wR57GARjTuybyiI0amoLikV0SlhaSBTunE4OQDt eDb6cHgXz7BfDctNCr5oY2ky4ylUvPXEBhB1IbeeTD5Td8FEf32Q3nFdIOJsZybNIZL4 OoOA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:dkim-signature; bh=/QUPa1vQLXOqpd0pTOA+4YFg4Krc8DXsZ8w6YLssszM=; fh=0Hy+iFKZJlV6aFrfL8eojTSvs+esSIKPJFEk/ZBMh48=; b=LEQCj1xxQ+T5cdqvY0g4P+unlgQgPTc+ZHEZ5eImtJFs4guCFgGuf01lUiTWMGP0wh lojeHyQ7MFAcJuQVqd81AmlAy1VbwSBTUm/iTXZIpkHM72KakfF9mZJvDOKu6nGvmSOn YaJUSkBaQBd8b5DwTVlHIhxGPkVUulNltW622CiWvpNPBHvxTka/RkU0v3rA5RCfcTX5 vzzsnU57gY0y1/SxNC8JTG2Fol44s22KrwQJwX/t/0fFe43JKsEzoz7HPjzFK8KcIuqE 3HmhtujOSuWjAzR3J5crew/jhKbaInQkVT1wVTl29DXmGAlgYzgdbXJS3h2gZAZbNZSb S/uA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=JfruIRfa; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-42763-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-42763-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id m24-20020a170906235800b00a35cd442d8esi702187eja.1014.2024.01.29.05.11.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 29 Jan 2024 05:11:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-42763-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=JfruIRfa; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-42763-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-42763-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id B64931F266C7 for ; Mon, 29 Jan 2024 13:11:38 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5D1CA612C1; Mon, 29 Jan 2024 13:10:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="JfruIRfa" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9C0656026C; Mon, 29 Jan 2024 13:10:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706533846; cv=none; b=Lo611IcX2WQa9n9AeWnTP+Fm8rlTE73bUXS/efSAlWya9xOvENsducFJFdi/6w3SpZ2AVI2fFwaI1EPnO/Mbi8XZtgchU0N7bXsF25oXYv6c8LCIfyR9+gw4XNjXWY8bRwvOpWLtHzkcWUAzbtr8l8RsOI9QGYZPHDRJ4+9smEc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706533846; c=relaxed/simple; bh=KijQTF6uUSPA/RCKlRjU5eXe7G8J/ZwC3ZtV9qUq5CE=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=oPlac/hU3jS+CpOflOYf7/grq7zdaWTboJJjrWJB6UdhiKH2fLcdAR1/icbKiaStjwdLXs4erKpIK6PA29vSzPGwGqefxlqXuz3lFMZv/5I8e/lrQpXRA/nnRX+z93pqqkBP50iD7i0i998clr/IZ+tFSLkWw3PkXAJWWRxci2M= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=JfruIRfa; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 15399C433F1; Mon, 29 Jan 2024 13:10:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1706533846; bh=KijQTF6uUSPA/RCKlRjU5eXe7G8J/ZwC3ZtV9qUq5CE=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=JfruIRfalDv2CSHIS4inlGW8qJqs8WQvlfVg3kdMfQ7nN1/Fn1uTTh/I8LkvyTr1F cC64UJ6XvcuV0rxmjC9FbUZUgT2vTZAQyoTbBjklo/Tn4aeldb8kTOPl+hAGZ0KkD+ 6hb+dOL1bDSV1c5ZEx86PJUKx0nUZs7VDZzomDaSMHIbZ/7jBiyqNEKZsM9pcioAl3 8hX8rmsxXl85kJgW8q3MJPW5i2ZKIvYvRCu6ENCdQILKbWtUGSAX+D/uJpfc9J0qV8 MnYb0mP92UdYpbgR5gkJrN9UoRc0Xu+er/LO+XQfW3FE+/QZwc5z5VSLguObeYXrlP zOITcavAbVDEA== Received: by mail-ed1-f41.google.com with SMTP id 4fb4d7f45d1cf-55a035669d5so3287725a12.2; Mon, 29 Jan 2024 05:10:46 -0800 (PST) X-Gm-Message-State: AOJu0YxwiTLqDUmlBO/Vy6XKKPtGae9/Cc19Nu+Q5pjEAk5DPlq8akNu tOkSVZ5JCILyiFTJZ5BbAE5Uhg995+4RVbExbiHed0+KYvGSUK3vsnJdvXqIbzJeVM6+06JkUuO e8t0bIPRB9TJRbZD+qQcMi2ffeP8= X-Received: by 2002:aa7:c394:0:b0:55f:335:8b77 with SMTP id k20-20020aa7c394000000b0055f03358b77mr1580406edq.39.1706533844382; Mon, 29 Jan 2024 05:10:44 -0800 (PST) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <20240122100313.1589372-1-maobibo@loongson.cn> <20240122100313.1589372-7-maobibo@loongson.cn> In-Reply-To: <20240122100313.1589372-7-maobibo@loongson.cn> From: Huacai Chen Date: Mon, 29 Jan 2024 21:10:07 +0800 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v3 6/6] LoongArch: Add pv ipi support on LoongArch system To: Bibo Mao Cc: Tianrui Zhao , Juergen Gross , Paolo Bonzini , loongarch@lists.linux.dev, linux-kernel@vger.kernel.org, virtualization@lists.linux.dev, kvm@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hi, Bibo, On Mon, Jan 22, 2024 at 6:03=E2=80=AFPM Bibo Mao wrot= e: > > On LoongArch system, ipi hw uses iocsr registers, there is one iocsr > register access on ipi sender and two iocsr access on ipi receiver > which is ipi interrupt handler. On VM mode all iocsr registers > accessing will trap into hypervisor. So with one ipi hw notification > there will be three times of trap. > > This patch adds pv ipi support for VM, hypercall instruction is used > to ipi sender, and hypervisor will inject SWI on the VM. During SWI > interrupt handler, only estat CSR register is written to clear irq. > Estat CSR register access will not trap into hypervisor. So with pv ipi > supported, pv ipi sender will trap into hypervsor one time, pv ipi > revicer will not trap, there is only one time of trap. > > Also this patch adds ipi multicast support, the method is similar with > x86. With ipi multicast support, ipi notification can be sent to at most > 128 vcpus at one time. It reduces trap into hypervisor greatly. > > Signed-off-by: Bibo Mao > --- > arch/loongarch/include/asm/hardirq.h | 1 + > arch/loongarch/include/asm/kvm_host.h | 1 + > arch/loongarch/include/asm/kvm_para.h | 124 +++++++++++++++++++++++++ > arch/loongarch/include/asm/loongarch.h | 1 + > arch/loongarch/kernel/irq.c | 2 +- > arch/loongarch/kernel/paravirt.c | 113 ++++++++++++++++++++++ > arch/loongarch/kernel/smp.c | 2 +- > arch/loongarch/kvm/exit.c | 73 ++++++++++++++- > arch/loongarch/kvm/vcpu.c | 1 + > 9 files changed, 314 insertions(+), 4 deletions(-) > > diff --git a/arch/loongarch/include/asm/hardirq.h b/arch/loongarch/includ= e/asm/hardirq.h > index 9f0038e19c7f..8a611843c1f0 100644 > --- a/arch/loongarch/include/asm/hardirq.h > +++ b/arch/loongarch/include/asm/hardirq.h > @@ -21,6 +21,7 @@ enum ipi_msg_type { > typedef struct { > unsigned int ipi_irqs[NR_IPI]; > unsigned int __softirq_pending; > + atomic_t messages ____cacheline_aligned_in_smp; > } ____cacheline_aligned irq_cpustat_t; > > DECLARE_PER_CPU_SHARED_ALIGNED(irq_cpustat_t, irq_stat); > diff --git a/arch/loongarch/include/asm/kvm_host.h b/arch/loongarch/inclu= de/asm/kvm_host.h > index 57399d7cf8b7..1bf927e2bfac 100644 > --- a/arch/loongarch/include/asm/kvm_host.h > +++ b/arch/loongarch/include/asm/kvm_host.h > @@ -43,6 +43,7 @@ struct kvm_vcpu_stat { > u64 idle_exits; > u64 cpucfg_exits; > u64 signal_exits; > + u64 hvcl_exits; > }; > > #define KVM_MEM_HUGEPAGE_CAPABLE (1UL << 0) > diff --git a/arch/loongarch/include/asm/kvm_para.h b/arch/loongarch/inclu= de/asm/kvm_para.h > index 41200e922a82..a25a84e372b9 100644 > --- a/arch/loongarch/include/asm/kvm_para.h > +++ b/arch/loongarch/include/asm/kvm_para.h > @@ -9,6 +9,10 @@ > #define HYPERVISOR_VENDOR_SHIFT 8 > #define HYPERCALL_CODE(vendor, code) ((vendor << HYPERVISOR_VENDOR_SHI= FT) + code) > > +#define KVM_HC_CODE_SERVICE 0 > +#define KVM_HC_SERVICE HYPERCALL_CODE(HYPERVISOR_KVM, KV= M_HC_CODE_SERVICE) > +#define KVM_HC_FUNC_IPI 1 > + > /* > * LoongArch hypcall return code > */ > @@ -16,6 +20,126 @@ > #define KVM_HC_INVALID_CODE -1UL > #define KVM_HC_INVALID_PARAMETER -2UL > > +/* > + * Hypercalls interface for KVM hypervisor > + * > + * a0: function identifier > + * a1-a6: args > + * Return value will be placed in v0. > + * Up to 6 arguments are passed in a1, a2, a3, a4, a5, a6. > + */ > +static __always_inline long kvm_hypercall(u64 fid) > +{ > + register long ret asm("v0"); > + register unsigned long fun asm("a0") =3D fid; > + > + __asm__ __volatile__( > + "hvcl "__stringify(KVM_HC_SERVICE) > + : "=3Dr" (ret) > + : "r" (fun) > + : "memory" > + ); > + > + return ret; > +} > + > +static __always_inline long kvm_hypercall1(u64 fid, unsigned long arg0) > +{ > + register long ret asm("v0"); > + register unsigned long fun asm("a0") =3D fid; > + register unsigned long a1 asm("a1") =3D arg0; > + > + __asm__ __volatile__( > + "hvcl "__stringify(KVM_HC_SERVICE) > + : "=3Dr" (ret) > + : "r" (fun), "r" (a1) > + : "memory" > + ); > + > + return ret; > +} > + > +static __always_inline long kvm_hypercall2(u64 fid, > + unsigned long arg0, unsigned long arg1) > +{ > + register long ret asm("v0"); > + register unsigned long fun asm("a0") =3D fid; > + register unsigned long a1 asm("a1") =3D arg0; > + register unsigned long a2 asm("a2") =3D arg1; > + > + __asm__ __volatile__( > + "hvcl "__stringify(KVM_HC_SERVICE) > + : "=3Dr" (ret) > + : "r" (fun), "r" (a1), "r" (a2) > + : "memory" > + ); > + > + return ret; > +} > + > +static __always_inline long kvm_hypercall3(u64 fid, > + unsigned long arg0, unsigned long arg1, unsigned long arg2) > +{ > + register long ret asm("v0"); > + register unsigned long fun asm("a0") =3D fid; > + register unsigned long a1 asm("a1") =3D arg0; > + register unsigned long a2 asm("a2") =3D arg1; > + register unsigned long a3 asm("a3") =3D arg2; > + > + __asm__ __volatile__( > + "hvcl "__stringify(KVM_HC_SERVICE) > + : "=3Dr" (ret) > + : "r" (fun), "r" (a1), "r" (a2), "r" (a3) > + : "memory" > + ); > + > + return ret; > +} > + > +static __always_inline long kvm_hypercall4(u64 fid, > + unsigned long arg0, unsigned long arg1, unsigned long arg= 2, > + unsigned long arg3) > +{ > + register long ret asm("v0"); > + register unsigned long fun asm("a0") =3D fid; > + register unsigned long a1 asm("a1") =3D arg0; > + register unsigned long a2 asm("a2") =3D arg1; > + register unsigned long a3 asm("a3") =3D arg2; > + register unsigned long a4 asm("a4") =3D arg3; > + > + __asm__ __volatile__( > + "hvcl "__stringify(KVM_HC_SERVICE) > + : "=3Dr" (ret) > + : "r"(fun), "r" (a1), "r" (a2), "r" (a3), "r" (a4) > + : "memory" > + ); > + > + return ret; > +} > + > +static __always_inline long kvm_hypercall5(u64 fid, > + unsigned long arg0, unsigned long arg1, unsigned long arg= 2, > + unsigned long arg3, unsigned long arg4) > +{ > + register long ret asm("v0"); > + register unsigned long fun asm("a0") =3D fid; > + register unsigned long a1 asm("a1") =3D arg0; > + register unsigned long a2 asm("a2") =3D arg1; > + register unsigned long a3 asm("a3") =3D arg2; > + register unsigned long a4 asm("a4") =3D arg3; > + register unsigned long a5 asm("a5") =3D arg4; > + > + __asm__ __volatile__( > + "hvcl "__stringify(KVM_HC_SERVICE) > + : "=3Dr" (ret) > + : "r"(fun), "r" (a1), "r" (a2), "r" (a3), "r" (a4), "r" (= a5) > + : "memory" > + ); > + > + return ret; > +} > + > + > static inline unsigned int kvm_arch_para_features(void) > { > return 0; > diff --git a/arch/loongarch/include/asm/loongarch.h b/arch/loongarch/incl= ude/asm/loongarch.h > index a1d22e8b6f94..0ad36704cb4b 100644 > --- a/arch/loongarch/include/asm/loongarch.h > +++ b/arch/loongarch/include/asm/loongarch.h > @@ -167,6 +167,7 @@ > #define CPUCFG_KVM_SIG CPUCFG_KVM_BASE > #define KVM_SIGNATURE "KVM\0" > #define CPUCFG_KVM_FEATURE (CPUCFG_KVM_BASE + 4) > +#define KVM_FEATURE_PV_IPI BIT(1) > > #ifndef __ASSEMBLY__ > > diff --git a/arch/loongarch/kernel/irq.c b/arch/loongarch/kernel/irq.c > index 1b58f7c3eed9..b5bd298c981f 100644 > --- a/arch/loongarch/kernel/irq.c > +++ b/arch/loongarch/kernel/irq.c > @@ -113,5 +113,5 @@ void __init init_IRQ(void) > per_cpu(irq_stack, i), per_cpu(irq_stack, i) + IR= Q_STACK_SIZE); > } > > - set_csr_ecfg(ECFGF_IP0 | ECFGF_IP1 | ECFGF_IP2 | ECFGF_IPI | ECFG= F_PMC); > + set_csr_ecfg(ECFGF_SIP0 | ECFGF_IP0 | ECFGF_IP1 | ECFGF_IP2 | ECF= GF_IPI | ECFGF_PMC); > } > diff --git a/arch/loongarch/kernel/paravirt.c b/arch/loongarch/kernel/par= avirt.c > index 21d01d05791a..b840a004995a 100644 > --- a/arch/loongarch/kernel/paravirt.c > +++ b/arch/loongarch/kernel/paravirt.c > @@ -1,6 +1,7 @@ > // SPDX-License-Identifier: GPL-2.0 > #include > #include > +#include > #include > #include > #include > @@ -16,6 +17,104 @@ static u64 native_steal_clock(int cpu) > > DEFINE_STATIC_CALL(pv_steal_clock, native_steal_clock); > > +#ifdef CONFIG_SMP > +static void pv_send_ipi_single(int cpu, unsigned int action) > +{ > + unsigned int min, old; > + unsigned long bitmap =3D 0; > + irq_cpustat_t *info =3D &per_cpu(irq_stat, cpu); > + > + action =3D BIT(action); > + old =3D atomic_fetch_or(action, &info->messages); > + if (old =3D=3D 0) { > + min =3D cpu_logical_map(cpu); > + bitmap =3D 1; > + kvm_hypercall3(KVM_HC_FUNC_IPI, bitmap, 0, min); > + } > +} > + > +#define KVM_IPI_CLUSTER_SIZE (2 * BITS_PER_LONG) > +static void pv_send_ipi_mask(const struct cpumask *mask, unsigned int ac= tion) > +{ > + unsigned int cpu, i, min =3D 0, max =3D 0, old; > + __uint128_t bitmap =3D 0; > + irq_cpustat_t *info; > + > + if (cpumask_empty(mask)) > + return; > + > + action =3D BIT(action); > + for_each_cpu(i, mask) { > + info =3D &per_cpu(irq_stat, i); > + old =3D atomic_fetch_or(action, &info->messages); > + if (old) > + continue; > + > + cpu =3D cpu_logical_map(i); > + if (!bitmap) { > + min =3D max =3D cpu; > + } else if (cpu > min && cpu < min + KVM_IPI_CLUSTER_SIZE)= { > + max =3D cpu > max ? cpu : max; > + } else if (cpu < min && (max - cpu) < KVM_IPI_CLUSTER_SIZ= E) { > + bitmap <<=3D min - cpu; > + min =3D cpu; > + } else { > + /* > + * Physical cpuid is sorted in ascending order as= cend > + * for the next mask calculation, send IPI here > + * directly and skip the remainding cpus > + */ > + kvm_hypercall3(KVM_HC_FUNC_IPI, (unsigned long)bi= tmap, > + (unsigned long)(bitmap >> BITS_PER_LONG),= min); > + min =3D max =3D cpu; > + bitmap =3D 0; > + } > + __set_bit(cpu - min, (unsigned long *)&bitmap); > + } > + > + if (bitmap) > + kvm_hypercall3(KVM_HC_FUNC_IPI, (unsigned long)bitmap, > + (unsigned long)(bitmap >> BITS_PER_LONG),= min); > +} > + > +static irqreturn_t loongson_do_swi(int irq, void *dev) > +{ > + irq_cpustat_t *info; > + long action; > + > + clear_csr_estat(1 << INT_SWI0); > + > + info =3D this_cpu_ptr(&irq_stat); > + do { > + action =3D atomic_xchg(&info->messages, 0); > + if (action & SMP_CALL_FUNCTION) { > + generic_smp_call_function_interrupt(); > + info->ipi_irqs[IPI_CALL_FUNCTION]++; > + } > + > + if (action & SMP_RESCHEDULE) { > + scheduler_ipi(); > + info->ipi_irqs[IPI_RESCHEDULE]++; > + } > + } while (action); > + > + return IRQ_HANDLED; > +} > + > +static void pv_ipi_init(void) > +{ > + int r, swi0; > + > + swi0 =3D get_percpu_irq(INT_SWI0); > + if (swi0 < 0) > + panic("SWI0 IRQ mapping failed\n"); > + irq_set_percpu_devid(swi0); > + r =3D request_percpu_irq(swi0, loongson_do_swi, "SWI0", &irq_stat= ); > + if (r < 0) > + panic("SWI0 IRQ request failed\n"); > +} > +#endif > + > static bool kvm_para_available(void) > { > static int hypervisor_type; > @@ -32,10 +131,24 @@ static bool kvm_para_available(void) > > int __init pv_guest_init(void) > { > + int feature; > + > if (!cpu_has_hypervisor) > return 0; > if (!kvm_para_available()) > return 0; > > + /* > + * check whether KVM hypervisor supports pv_ipi or not > + */ > +#ifdef CONFIG_SMP > + feature =3D read_cpucfg(CPUCFG_KVM_FEATURE); > + if (feature & KVM_FEATURE_PV_IPI) { > + smp_ops.call_func_single_ipi =3D pv_send_ipi_single; > + smp_ops.call_func_ipi =3D pv_send_ipi_mask; From this patch I found that these function are supposed to send any types of IPI, when the naming is call_func_xxx? Maybe send_ipi_single and send_ipi_mask is more accurate. Huacai > + smp_ops.ipi_init =3D pv_ipi_init; > + } > +#endif > + > return 1; > } > diff --git a/arch/loongarch/kernel/smp.c b/arch/loongarch/kernel/smp.c > index 46735ba49815..57b5706cedb9 100644 > --- a/arch/loongarch/kernel/smp.c > +++ b/arch/loongarch/kernel/smp.c > @@ -285,7 +285,7 @@ void loongson_boot_secondary(int cpu, struct task_str= uct *idle) > void loongson_init_secondary(void) > { > unsigned int cpu =3D smp_processor_id(); > - unsigned int imask =3D ECFGF_IP0 | ECFGF_IP1 | ECFGF_IP2 | > + unsigned int imask =3D ECFGF_SIP0 | ECFGF_IP0 | ECFGF_IP1 | ECFGF= _IP2 | > ECFGF_IPI | ECFGF_PMC | ECFGF_TIMER; > > change_csr_ecfg(ECFG0_IM, imask); > diff --git a/arch/loongarch/kvm/exit.c b/arch/loongarch/kvm/exit.c > index f4e4df05f578..189b70bad825 100644 > --- a/arch/loongarch/kvm/exit.c > +++ b/arch/loongarch/kvm/exit.c > @@ -227,6 +227,9 @@ static int kvm_emu_cpucfg(struct kvm_vcpu *vcpu, larc= h_inst inst) > case CPUCFG_KVM_SIG: > vcpu->arch.gprs[rd] =3D *(unsigned int *)KVM_SIGNATURE; > break; > + case CPUCFG_KVM_FEATURE: > + vcpu->arch.gprs[rd] =3D KVM_FEATURE_PV_IPI; > + break; > default: > vcpu->arch.gprs[rd] =3D 0; > break; > @@ -699,12 +702,78 @@ static int kvm_handle_lasx_disabled(struct kvm_vcpu= *vcpu) > return RESUME_GUEST; > } > > +static int kvm_pv_send_ipi(struct kvm_vcpu *vcpu) > +{ > + unsigned long ipi_bitmap; > + unsigned int min, cpu, i; > + struct kvm_vcpu *dest; > + > + min =3D vcpu->arch.gprs[LOONGARCH_GPR_A3]; > + for (i =3D 0; i < 2; i++) { > + ipi_bitmap =3D vcpu->arch.gprs[LOONGARCH_GPR_A1 + i]; > + if (!ipi_bitmap) > + continue; > + > + cpu =3D find_first_bit((void *)&ipi_bitmap, BITS_PER_LONG= ); > + while (cpu < BITS_PER_LONG) { > + dest =3D kvm_get_vcpu_by_cpuid(vcpu->kvm, cpu + m= in); > + cpu =3D find_next_bit((void *)&ipi_bitmap, BITS_P= ER_LONG, > + cpu + 1); > + if (!dest) > + continue; > + > + /* > + * Send SWI0 to dest vcpu to emulate IPI interrup= t > + */ > + kvm_queue_irq(dest, INT_SWI0); > + kvm_vcpu_kick(dest); > + } > + } > + > + return 0; > +} > + > +/* > + * hypcall emulation always return to guest, Caller should check retval. > + */ > +static void kvm_handle_pv_hcall(struct kvm_vcpu *vcpu) > +{ > + unsigned long func =3D vcpu->arch.gprs[LOONGARCH_GPR_A0]; > + long ret; > + > + switch (func) { > + case KVM_HC_FUNC_IPI: > + kvm_pv_send_ipi(vcpu); > + ret =3D KVM_HC_STATUS_SUCCESS; > + break; > + default: > + ret =3D KVM_HC_INVALID_CODE; > + break; > + }; > + > + vcpu->arch.gprs[LOONGARCH_GPR_A0] =3D ret; > +} > + > static int kvm_handle_hypcall(struct kvm_vcpu *vcpu) > { > + larch_inst inst; > + unsigned int code; > + > + inst.word =3D vcpu->arch.badi; > + code =3D inst.reg0i15_format.immediate; > update_pc(&vcpu->arch); > > - /* Treat it as noop intruction, only set return value */ > - vcpu->arch.gprs[LOONGARCH_GPR_A0] =3D KVM_HC_INVALID_CODE; > + switch (code) { > + case KVM_HC_SERVICE: > + vcpu->stat.hvcl_exits++; > + kvm_handle_pv_hcall(vcpu); > + break; > + default: > + /* Treat it as noop intruction, only set return value */ > + vcpu->arch.gprs[LOONGARCH_GPR_A0] =3D KVM_HC_INVALID_CODE= ; > + break; > + } > + > return RESUME_GUEST; > } > > diff --git a/arch/loongarch/kvm/vcpu.c b/arch/loongarch/kvm/vcpu.c > index 97ca9c7160e6..80e05ba9b48d 100644 > --- a/arch/loongarch/kvm/vcpu.c > +++ b/arch/loongarch/kvm/vcpu.c > @@ -19,6 +19,7 @@ const struct _kvm_stats_desc kvm_vcpu_stats_desc[] =3D = { > STATS_DESC_COUNTER(VCPU, idle_exits), > STATS_DESC_COUNTER(VCPU, cpucfg_exits), > STATS_DESC_COUNTER(VCPU, signal_exits), > + STATS_DESC_COUNTER(VCPU, hvcl_exits) > }; > > const struct kvm_stats_header kvm_vcpu_stats_header =3D { > -- > 2.39.3 > >