Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp761086rdb; Mon, 29 Jan 2024 18:45:15 -0800 (PST) X-Google-Smtp-Source: AGHT+IFu20uE/LGF4JkAxf5LK69QmoJLAgMZo3ANiD7EIyiaoYUJ3oPaQaDdylVs+L5ZiPTDY0Cs X-Received: by 2002:a05:6402:518b:b0:55e:fead:d6e2 with SMTP id q11-20020a056402518b00b0055efeadd6e2mr3336790edd.20.1706582714928; Mon, 29 Jan 2024 18:45:14 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706582714; cv=pass; d=google.com; s=arc-20160816; b=jP64LuYxDwPD350hsgf0/8A+HX8qT/H/KoFcXO5IgFK1oCs/1MCmab1XpgrrcjtZDD 4fFqSquBmVk3tC4wrrhFy/VgXnH9YImGFd7xHwbpkNK1KsNwqu3VcjNeYQW1/2ifEV1F sTI8pDJOJXBSdd1bdWNaD1AqTMqRhkvH2eFndrG0wUTsuprvOI2DY7RPrfuWKT2V9eLg HAbrGBoqRLzMsmr9bfFSI85RbpWbknrlDdmaG+cQsmMtWndBdHKidGACP3ekZIFxo6ET tHksChpzs8gy1OixfUJtJH54W+QM0Fr4/HLoESQVcTegXe3lA9VrOx4B5D1Nf8vPFDGt 8LDw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:content-language:in-reply-to:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:user-agent:date :message-id:from:references:cc:to:subject; bh=goVaDzEbbqpk87Sh62fG01eZXVgk/e571nsiBVGPf+0=; fh=8LSJ6bUYzYuj4PnA4CpGavysyxl2IC4oJ2qRM3h3oRE=; b=BT/eUDz3d9pib16B/WoN6BpfT5N2MRoKPWq7yJt3v4kVHJ8Ypieuz71tKHtLdKWTtu 74ySyDNxeqx8ANQAYWDV7/o/UUjH5o7YMKBje5BS2n5rkBTnclpyJyUO2BYrpZw5tWLb dFCEFObvSIihbSw3V4O2EeSfgNRBY0kjyNCXeDAaT9sxwodPOYFHZA7oBlg1a7+Mo+gC xizvv9rpgawQsVNt9Qxt8kkGazxgF/OEUVs/P3mH7+AQooriEdpmaPqRqUAT7V24nnTs kucvLFnBGJmuWfm+k3GN3rps77Sm8Ui5B/WnBbXYG+ep6QVCFRHHcx9/W25Ac2axBwwd NvBw== ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=loongson.cn); spf=pass (google.com: domain of linux-kernel+bounces-43849-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-43849-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id ez23-20020a056402451700b00553dc96be61si4111340edb.285.2024.01.29.18.45.14 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 29 Jan 2024 18:45:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-43849-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=loongson.cn); spf=pass (google.com: domain of linux-kernel+bounces-43849-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-43849-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 873031F2AB20 for ; Tue, 30 Jan 2024 02:45:14 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9F96536B1D; Tue, 30 Jan 2024 02:45:03 +0000 (UTC) Received: from mail.loongson.cn (mail.loongson.cn [114.242.206.163]) by smtp.subspace.kernel.org (Postfix) with ESMTP id E307E364DB; Tue, 30 Jan 2024 02:44:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=114.242.206.163 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706582702; cv=none; b=AZCY5DO4CtfxPIEl/XL0uk/TyFmZYi/r8/7Hl7e32RsYOfB4uIwZ4HA1zICThKuENSzUDqOJCbzl+/9sSM6UZPXNrAaOjejsQDT/OaGIp1lHSMzNiCJKl2DFEMgOUjtcC5voWIa2MtoCK8CLH6WlidrZ8/q88RW4ddMIWMGGSzE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706582702; c=relaxed/simple; bh=dX8hoAOJiVFoWHmxosb2QBFnYBhn7mMm1mFRQoBe93I=; h=Subject:To:Cc:References:From:Message-ID:Date:MIME-Version: In-Reply-To:Content-Type; b=bI/Bf4Rc9QEA1k2KurkEcvmuuOumHJcqXtxkD0CBoWRmpuYruWvT70vDPUdW72bQu+plm3tns1ND4+ZkyB4UpnS746AvzDqbt+aGov9qtxuG45aEmAJ+6nwmACTxYhg6jij5PtyHIH1xQ1rTLOaPmd4wwuOnsO3NPkEvEnbsyeA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=loongson.cn; spf=pass smtp.mailfrom=loongson.cn; arc=none smtp.client-ip=114.242.206.163 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=loongson.cn Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=loongson.cn Received: from loongson.cn (unknown [10.20.42.173]) by gateway (Coremail) with SMTP id _____8Axz+upYrhlACcIAA--.25126S3; Tue, 30 Jan 2024 10:44:57 +0800 (CST) Received: from [10.20.42.173] (unknown [10.20.42.173]) by localhost.localdomain (Coremail) with SMTP id AQAAf8BxXs2mYrhlyi4nAA--.19393S3; Tue, 30 Jan 2024 10:44:56 +0800 (CST) Subject: Re: [PATCH v3 6/6] LoongArch: Add pv ipi support on LoongArch system To: Huacai Chen Cc: Tianrui Zhao , Juergen Gross , Paolo Bonzini , loongarch@lists.linux.dev, linux-kernel@vger.kernel.org, virtualization@lists.linux.dev, kvm@vger.kernel.org References: <20240122100313.1589372-1-maobibo@loongson.cn> <20240122100313.1589372-7-maobibo@loongson.cn> From: maobibo Message-ID: <1cd32f84-fd70-1ed3-a366-3691c50ba806@loongson.cn> Date: Tue, 30 Jan 2024 10:44:54 +0800 User-Agent: Mozilla/5.0 (X11; Linux loongarch64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-CM-TRANSID:AQAAf8BxXs2mYrhlyi4nAA--.19393S3 X-CM-SenderInfo: xpdruxter6z05rqj20fqof0/ X-Coremail-Antispam: 1Uk129KBj9fXoW3ZF47urW7XF4xJry3JryrAFc_yoW8Xw4xAo W3JFs2qw4xW3yUuFs0y3sYqryUX34Ykr4UAa97AwnxWF17ta42gryrKw4aqF43GFs5KFy7 Ca43Xryvyayxtwn8l-sFpf9Il3svdjkaLaAFLSUrUUUU8b8apTn2vfkv8UJUUUU8wcxFpf 9Il3svdxBIdaVrn0xqx4xG64xvF2IEw4CE5I8CrVC2j2Jv73VFW2AGmfu7bjvjm3AaLaJ3 UjIYCTnIWjp_UUUOn7kC6x804xWl14x267AKxVWUJVW8JwAFc2x0x2IEx4CE42xK8VAvwI 8IcIk0rVWrJVCq3wAFIxvE14AKwVWUGVWUXwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xG Y2AK021l84ACjcxK6xIIjxv20xvE14v26r4j6ryUM28EF7xvwVC0I7IYx2IY6xkF7I0E14 v26r4j6F4UM28EF7xvwVC2z280aVAFwI0_Gr1j6F4UJwA2z4x0Y4vEx4A2jsIEc7CjxVAF wI0_Gr1j6F4UJwAaw2AFwI0_Jrv_JF1le2I262IYc4CY6c8Ij28IcVAaY2xG8wAqjxCEc2 xF0cIa020Ex4CE44I27wAqx4xG64xvF2IEw4CE5I8CrVC2j2WlYx0E2Ix0cI8IcVAFwI0_ Jw0_WrylYx0Ex4A2jsIE14v26r4j6F4UMcvjeVCFs4IE7xkEbVWUJVW8JwACjcxG0xvEwI xGrwCYjI0SjxkI62AI1cAE67vIY487MxkF7I0En4kS14v26r126r1DMxAIw28IcxkI7VAK I48JMxC20s026xCaFVCjc4AY6r1j6r4UMxCIbckI1I0E14v26r1Y6r17MI8I3I0E5I8CrV AFwI0_Jr0_Jr4lx2IqxVCjr7xvwVAFwI0_JrI_JrWlx4CE17CEb7AF67AKxVWUtVW8ZwCI c40Y0x0EwIxGrwCI42IY6xIIjxv20xvE14v26r1I6r4UMIIF0xvE2Ix0cI8IcVCY1x0267 AKxVW8JVWxJwCI42IY6xAIw20EY4v20xvaj40_Jr0_JF4lIxAIcVC2z280aVAFwI0_Jr0_ Gr1lIxAIcVC2z280aVCY1x0267AKxVW8JVW8JrUvcSsGvfC2KfnxnUUI43ZEXa7IU00eHD UUUUU== On 2024/1/29 下午9:10, Huacai Chen wrote: > Hi, Bibo, > > On Mon, Jan 22, 2024 at 6:03 PM Bibo Mao wrote: >> >> On LoongArch system, ipi hw uses iocsr registers, there is one iocsr >> register access on ipi sender and two iocsr access on ipi receiver >> which is ipi interrupt handler. On VM mode all iocsr registers >> accessing will trap into hypervisor. So with one ipi hw notification >> there will be three times of trap. >> >> This patch adds pv ipi support for VM, hypercall instruction is used >> to ipi sender, and hypervisor will inject SWI on the VM. During SWI >> interrupt handler, only estat CSR register is written to clear irq. >> Estat CSR register access will not trap into hypervisor. So with pv ipi >> supported, pv ipi sender will trap into hypervsor one time, pv ipi >> revicer will not trap, there is only one time of trap. >> >> Also this patch adds ipi multicast support, the method is similar with >> x86. With ipi multicast support, ipi notification can be sent to at most >> 128 vcpus at one time. It reduces trap into hypervisor greatly. >> >> Signed-off-by: Bibo Mao >> --- >> arch/loongarch/include/asm/hardirq.h | 1 + >> arch/loongarch/include/asm/kvm_host.h | 1 + >> arch/loongarch/include/asm/kvm_para.h | 124 +++++++++++++++++++++++++ >> arch/loongarch/include/asm/loongarch.h | 1 + >> arch/loongarch/kernel/irq.c | 2 +- >> arch/loongarch/kernel/paravirt.c | 113 ++++++++++++++++++++++ >> arch/loongarch/kernel/smp.c | 2 +- >> arch/loongarch/kvm/exit.c | 73 ++++++++++++++- >> arch/loongarch/kvm/vcpu.c | 1 + >> 9 files changed, 314 insertions(+), 4 deletions(-) >> >> diff --git a/arch/loongarch/include/asm/hardirq.h b/arch/loongarch/include/asm/hardirq.h >> index 9f0038e19c7f..8a611843c1f0 100644 >> --- a/arch/loongarch/include/asm/hardirq.h >> +++ b/arch/loongarch/include/asm/hardirq.h >> @@ -21,6 +21,7 @@ enum ipi_msg_type { >> typedef struct { >> unsigned int ipi_irqs[NR_IPI]; >> unsigned int __softirq_pending; >> + atomic_t messages ____cacheline_aligned_in_smp; >> } ____cacheline_aligned irq_cpustat_t; >> >> DECLARE_PER_CPU_SHARED_ALIGNED(irq_cpustat_t, irq_stat); >> diff --git a/arch/loongarch/include/asm/kvm_host.h b/arch/loongarch/include/asm/kvm_host.h >> index 57399d7cf8b7..1bf927e2bfac 100644 >> --- a/arch/loongarch/include/asm/kvm_host.h >> +++ b/arch/loongarch/include/asm/kvm_host.h >> @@ -43,6 +43,7 @@ struct kvm_vcpu_stat { >> u64 idle_exits; >> u64 cpucfg_exits; >> u64 signal_exits; >> + u64 hvcl_exits; >> }; >> >> #define KVM_MEM_HUGEPAGE_CAPABLE (1UL << 0) >> diff --git a/arch/loongarch/include/asm/kvm_para.h b/arch/loongarch/include/asm/kvm_para.h >> index 41200e922a82..a25a84e372b9 100644 >> --- a/arch/loongarch/include/asm/kvm_para.h >> +++ b/arch/loongarch/include/asm/kvm_para.h >> @@ -9,6 +9,10 @@ >> #define HYPERVISOR_VENDOR_SHIFT 8 >> #define HYPERCALL_CODE(vendor, code) ((vendor << HYPERVISOR_VENDOR_SHIFT) + code) >> >> +#define KVM_HC_CODE_SERVICE 0 >> +#define KVM_HC_SERVICE HYPERCALL_CODE(HYPERVISOR_KVM, KVM_HC_CODE_SERVICE) >> +#define KVM_HC_FUNC_IPI 1 >> + >> /* >> * LoongArch hypcall return code >> */ >> @@ -16,6 +20,126 @@ >> #define KVM_HC_INVALID_CODE -1UL >> #define KVM_HC_INVALID_PARAMETER -2UL >> >> +/* >> + * Hypercalls interface for KVM hypervisor >> + * >> + * a0: function identifier >> + * a1-a6: args >> + * Return value will be placed in v0. >> + * Up to 6 arguments are passed in a1, a2, a3, a4, a5, a6. >> + */ >> +static __always_inline long kvm_hypercall(u64 fid) >> +{ >> + register long ret asm("v0"); >> + register unsigned long fun asm("a0") = fid; >> + >> + __asm__ __volatile__( >> + "hvcl "__stringify(KVM_HC_SERVICE) >> + : "=r" (ret) >> + : "r" (fun) >> + : "memory" >> + ); >> + >> + return ret; >> +} >> + >> +static __always_inline long kvm_hypercall1(u64 fid, unsigned long arg0) >> +{ >> + register long ret asm("v0"); >> + register unsigned long fun asm("a0") = fid; >> + register unsigned long a1 asm("a1") = arg0; >> + >> + __asm__ __volatile__( >> + "hvcl "__stringify(KVM_HC_SERVICE) >> + : "=r" (ret) >> + : "r" (fun), "r" (a1) >> + : "memory" >> + ); >> + >> + return ret; >> +} >> + >> +static __always_inline long kvm_hypercall2(u64 fid, >> + unsigned long arg0, unsigned long arg1) >> +{ >> + register long ret asm("v0"); >> + register unsigned long fun asm("a0") = fid; >> + register unsigned long a1 asm("a1") = arg0; >> + register unsigned long a2 asm("a2") = arg1; >> + >> + __asm__ __volatile__( >> + "hvcl "__stringify(KVM_HC_SERVICE) >> + : "=r" (ret) >> + : "r" (fun), "r" (a1), "r" (a2) >> + : "memory" >> + ); >> + >> + return ret; >> +} >> + >> +static __always_inline long kvm_hypercall3(u64 fid, >> + unsigned long arg0, unsigned long arg1, unsigned long arg2) >> +{ >> + register long ret asm("v0"); >> + register unsigned long fun asm("a0") = fid; >> + register unsigned long a1 asm("a1") = arg0; >> + register unsigned long a2 asm("a2") = arg1; >> + register unsigned long a3 asm("a3") = arg2; >> + >> + __asm__ __volatile__( >> + "hvcl "__stringify(KVM_HC_SERVICE) >> + : "=r" (ret) >> + : "r" (fun), "r" (a1), "r" (a2), "r" (a3) >> + : "memory" >> + ); >> + >> + return ret; >> +} >> + >> +static __always_inline long kvm_hypercall4(u64 fid, >> + unsigned long arg0, unsigned long arg1, unsigned long arg2, >> + unsigned long arg3) >> +{ >> + register long ret asm("v0"); >> + register unsigned long fun asm("a0") = fid; >> + register unsigned long a1 asm("a1") = arg0; >> + register unsigned long a2 asm("a2") = arg1; >> + register unsigned long a3 asm("a3") = arg2; >> + register unsigned long a4 asm("a4") = arg3; >> + >> + __asm__ __volatile__( >> + "hvcl "__stringify(KVM_HC_SERVICE) >> + : "=r" (ret) >> + : "r"(fun), "r" (a1), "r" (a2), "r" (a3), "r" (a4) >> + : "memory" >> + ); >> + >> + return ret; >> +} >> + >> +static __always_inline long kvm_hypercall5(u64 fid, >> + unsigned long arg0, unsigned long arg1, unsigned long arg2, >> + unsigned long arg3, unsigned long arg4) >> +{ >> + register long ret asm("v0"); >> + register unsigned long fun asm("a0") = fid; >> + register unsigned long a1 asm("a1") = arg0; >> + register unsigned long a2 asm("a2") = arg1; >> + register unsigned long a3 asm("a3") = arg2; >> + register unsigned long a4 asm("a4") = arg3; >> + register unsigned long a5 asm("a5") = arg4; >> + >> + __asm__ __volatile__( >> + "hvcl "__stringify(KVM_HC_SERVICE) >> + : "=r" (ret) >> + : "r"(fun), "r" (a1), "r" (a2), "r" (a3), "r" (a4), "r" (a5) >> + : "memory" >> + ); >> + >> + return ret; >> +} >> + >> + >> static inline unsigned int kvm_arch_para_features(void) >> { >> return 0; >> diff --git a/arch/loongarch/include/asm/loongarch.h b/arch/loongarch/include/asm/loongarch.h >> index a1d22e8b6f94..0ad36704cb4b 100644 >> --- a/arch/loongarch/include/asm/loongarch.h >> +++ b/arch/loongarch/include/asm/loongarch.h >> @@ -167,6 +167,7 @@ >> #define CPUCFG_KVM_SIG CPUCFG_KVM_BASE >> #define KVM_SIGNATURE "KVM\0" >> #define CPUCFG_KVM_FEATURE (CPUCFG_KVM_BASE + 4) >> +#define KVM_FEATURE_PV_IPI BIT(1) >> >> #ifndef __ASSEMBLY__ >> >> diff --git a/arch/loongarch/kernel/irq.c b/arch/loongarch/kernel/irq.c >> index 1b58f7c3eed9..b5bd298c981f 100644 >> --- a/arch/loongarch/kernel/irq.c >> +++ b/arch/loongarch/kernel/irq.c >> @@ -113,5 +113,5 @@ void __init init_IRQ(void) >> per_cpu(irq_stack, i), per_cpu(irq_stack, i) + IRQ_STACK_SIZE); >> } >> >> - set_csr_ecfg(ECFGF_IP0 | ECFGF_IP1 | ECFGF_IP2 | ECFGF_IPI | ECFGF_PMC); >> + set_csr_ecfg(ECFGF_SIP0 | ECFGF_IP0 | ECFGF_IP1 | ECFGF_IP2 | ECFGF_IPI | ECFGF_PMC); >> } >> diff --git a/arch/loongarch/kernel/paravirt.c b/arch/loongarch/kernel/paravirt.c >> index 21d01d05791a..b840a004995a 100644 >> --- a/arch/loongarch/kernel/paravirt.c >> +++ b/arch/loongarch/kernel/paravirt.c >> @@ -1,6 +1,7 @@ >> // SPDX-License-Identifier: GPL-2.0 >> #include >> #include >> +#include >> #include >> #include >> #include >> @@ -16,6 +17,104 @@ static u64 native_steal_clock(int cpu) >> >> DEFINE_STATIC_CALL(pv_steal_clock, native_steal_clock); >> >> +#ifdef CONFIG_SMP >> +static void pv_send_ipi_single(int cpu, unsigned int action) >> +{ >> + unsigned int min, old; >> + unsigned long bitmap = 0; >> + irq_cpustat_t *info = &per_cpu(irq_stat, cpu); >> + >> + action = BIT(action); >> + old = atomic_fetch_or(action, &info->messages); >> + if (old == 0) { >> + min = cpu_logical_map(cpu); >> + bitmap = 1; >> + kvm_hypercall3(KVM_HC_FUNC_IPI, bitmap, 0, min); >> + } >> +} >> + >> +#define KVM_IPI_CLUSTER_SIZE (2 * BITS_PER_LONG) >> +static void pv_send_ipi_mask(const struct cpumask *mask, unsigned int action) >> +{ >> + unsigned int cpu, i, min = 0, max = 0, old; >> + __uint128_t bitmap = 0; >> + irq_cpustat_t *info; >> + >> + if (cpumask_empty(mask)) >> + return; >> + >> + action = BIT(action); >> + for_each_cpu(i, mask) { >> + info = &per_cpu(irq_stat, i); >> + old = atomic_fetch_or(action, &info->messages); >> + if (old) >> + continue; >> + >> + cpu = cpu_logical_map(i); >> + if (!bitmap) { >> + min = max = cpu; >> + } else if (cpu > min && cpu < min + KVM_IPI_CLUSTER_SIZE) { >> + max = cpu > max ? cpu : max; >> + } else if (cpu < min && (max - cpu) < KVM_IPI_CLUSTER_SIZE) { >> + bitmap <<= min - cpu; >> + min = cpu; >> + } else { >> + /* >> + * Physical cpuid is sorted in ascending order ascend >> + * for the next mask calculation, send IPI here >> + * directly and skip the remainding cpus >> + */ >> + kvm_hypercall3(KVM_HC_FUNC_IPI, (unsigned long)bitmap, >> + (unsigned long)(bitmap >> BITS_PER_LONG), min); >> + min = max = cpu; >> + bitmap = 0; >> + } >> + __set_bit(cpu - min, (unsigned long *)&bitmap); >> + } >> + >> + if (bitmap) >> + kvm_hypercall3(KVM_HC_FUNC_IPI, (unsigned long)bitmap, >> + (unsigned long)(bitmap >> BITS_PER_LONG), min); >> +} >> + >> +static irqreturn_t loongson_do_swi(int irq, void *dev) >> +{ >> + irq_cpustat_t *info; >> + long action; >> + >> + clear_csr_estat(1 << INT_SWI0); >> + >> + info = this_cpu_ptr(&irq_stat); >> + do { >> + action = atomic_xchg(&info->messages, 0); >> + if (action & SMP_CALL_FUNCTION) { >> + generic_smp_call_function_interrupt(); >> + info->ipi_irqs[IPI_CALL_FUNCTION]++; >> + } >> + >> + if (action & SMP_RESCHEDULE) { >> + scheduler_ipi(); >> + info->ipi_irqs[IPI_RESCHEDULE]++; >> + } >> + } while (action); >> + >> + return IRQ_HANDLED; >> +} >> + >> +static void pv_ipi_init(void) >> +{ >> + int r, swi0; >> + >> + swi0 = get_percpu_irq(INT_SWI0); >> + if (swi0 < 0) >> + panic("SWI0 IRQ mapping failed\n"); >> + irq_set_percpu_devid(swi0); >> + r = request_percpu_irq(swi0, loongson_do_swi, "SWI0", &irq_stat); >> + if (r < 0) >> + panic("SWI0 IRQ request failed\n"); >> +} >> +#endif >> + >> static bool kvm_para_available(void) >> { >> static int hypervisor_type; >> @@ -32,10 +131,24 @@ static bool kvm_para_available(void) >> >> int __init pv_guest_init(void) >> { >> + int feature; >> + >> if (!cpu_has_hypervisor) >> return 0; >> if (!kvm_para_available()) >> return 0; >> >> + /* >> + * check whether KVM hypervisor supports pv_ipi or not >> + */ >> +#ifdef CONFIG_SMP >> + feature = read_cpucfg(CPUCFG_KVM_FEATURE); >> + if (feature & KVM_FEATURE_PV_IPI) { >> + smp_ops.call_func_single_ipi = pv_send_ipi_single; >> + smp_ops.call_func_ipi = pv_send_ipi_mask; > From this patch I found that these function are supposed to send any > types of IPI, when the naming is call_func_xxx? Maybe send_ipi_single > and send_ipi_mask is more accurate. yes, you are right. Will modify in the next patch. Regards Bibo Mao > > Huacai > >> + smp_ops.ipi_init = pv_ipi_init; >> + } >> +#endif >> + >> return 1; >> } >> diff --git a/arch/loongarch/kernel/smp.c b/arch/loongarch/kernel/smp.c >> index 46735ba49815..57b5706cedb9 100644 >> --- a/arch/loongarch/kernel/smp.c >> +++ b/arch/loongarch/kernel/smp.c >> @@ -285,7 +285,7 @@ void loongson_boot_secondary(int cpu, struct task_struct *idle) >> void loongson_init_secondary(void) >> { >> unsigned int cpu = smp_processor_id(); >> - unsigned int imask = ECFGF_IP0 | ECFGF_IP1 | ECFGF_IP2 | >> + unsigned int imask = ECFGF_SIP0 | ECFGF_IP0 | ECFGF_IP1 | ECFGF_IP2 | >> ECFGF_IPI | ECFGF_PMC | ECFGF_TIMER; >> >> change_csr_ecfg(ECFG0_IM, imask); >> diff --git a/arch/loongarch/kvm/exit.c b/arch/loongarch/kvm/exit.c >> index f4e4df05f578..189b70bad825 100644 >> --- a/arch/loongarch/kvm/exit.c >> +++ b/arch/loongarch/kvm/exit.c >> @@ -227,6 +227,9 @@ static int kvm_emu_cpucfg(struct kvm_vcpu *vcpu, larch_inst inst) >> case CPUCFG_KVM_SIG: >> vcpu->arch.gprs[rd] = *(unsigned int *)KVM_SIGNATURE; >> break; >> + case CPUCFG_KVM_FEATURE: >> + vcpu->arch.gprs[rd] = KVM_FEATURE_PV_IPI; >> + break; >> default: >> vcpu->arch.gprs[rd] = 0; >> break; >> @@ -699,12 +702,78 @@ static int kvm_handle_lasx_disabled(struct kvm_vcpu *vcpu) >> return RESUME_GUEST; >> } >> >> +static int kvm_pv_send_ipi(struct kvm_vcpu *vcpu) >> +{ >> + unsigned long ipi_bitmap; >> + unsigned int min, cpu, i; >> + struct kvm_vcpu *dest; >> + >> + min = vcpu->arch.gprs[LOONGARCH_GPR_A3]; >> + for (i = 0; i < 2; i++) { >> + ipi_bitmap = vcpu->arch.gprs[LOONGARCH_GPR_A1 + i]; >> + if (!ipi_bitmap) >> + continue; >> + >> + cpu = find_first_bit((void *)&ipi_bitmap, BITS_PER_LONG); >> + while (cpu < BITS_PER_LONG) { >> + dest = kvm_get_vcpu_by_cpuid(vcpu->kvm, cpu + min); >> + cpu = find_next_bit((void *)&ipi_bitmap, BITS_PER_LONG, >> + cpu + 1); >> + if (!dest) >> + continue; >> + >> + /* >> + * Send SWI0 to dest vcpu to emulate IPI interrupt >> + */ >> + kvm_queue_irq(dest, INT_SWI0); >> + kvm_vcpu_kick(dest); >> + } >> + } >> + >> + return 0; >> +} >> + >> +/* >> + * hypcall emulation always return to guest, Caller should check retval. >> + */ >> +static void kvm_handle_pv_hcall(struct kvm_vcpu *vcpu) >> +{ >> + unsigned long func = vcpu->arch.gprs[LOONGARCH_GPR_A0]; >> + long ret; >> + >> + switch (func) { >> + case KVM_HC_FUNC_IPI: >> + kvm_pv_send_ipi(vcpu); >> + ret = KVM_HC_STATUS_SUCCESS; >> + break; >> + default: >> + ret = KVM_HC_INVALID_CODE; >> + break; >> + }; >> + >> + vcpu->arch.gprs[LOONGARCH_GPR_A0] = ret; >> +} >> + >> static int kvm_handle_hypcall(struct kvm_vcpu *vcpu) >> { >> + larch_inst inst; >> + unsigned int code; >> + >> + inst.word = vcpu->arch.badi; >> + code = inst.reg0i15_format.immediate; >> update_pc(&vcpu->arch); >> >> - /* Treat it as noop intruction, only set return value */ >> - vcpu->arch.gprs[LOONGARCH_GPR_A0] = KVM_HC_INVALID_CODE; >> + switch (code) { >> + case KVM_HC_SERVICE: >> + vcpu->stat.hvcl_exits++; >> + kvm_handle_pv_hcall(vcpu); >> + break; >> + default: >> + /* Treat it as noop intruction, only set return value */ >> + vcpu->arch.gprs[LOONGARCH_GPR_A0] = KVM_HC_INVALID_CODE; >> + break; >> + } >> + >> return RESUME_GUEST; >> } >> >> diff --git a/arch/loongarch/kvm/vcpu.c b/arch/loongarch/kvm/vcpu.c >> index 97ca9c7160e6..80e05ba9b48d 100644 >> --- a/arch/loongarch/kvm/vcpu.c >> +++ b/arch/loongarch/kvm/vcpu.c >> @@ -19,6 +19,7 @@ const struct _kvm_stats_desc kvm_vcpu_stats_desc[] = { >> STATS_DESC_COUNTER(VCPU, idle_exits), >> STATS_DESC_COUNTER(VCPU, cpucfg_exits), >> STATS_DESC_COUNTER(VCPU, signal_exits), >> + STATS_DESC_COUNTER(VCPU, hvcl_exits) >> }; >> >> const struct kvm_stats_header kvm_vcpu_stats_header = { >> -- >> 2.39.3 >> >>