From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 1AEF1FCB624 for ; Fri, 6 Mar 2026 16:34:06 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.1247971.1546309 (Exim 4.92) (envelope-from ) id 1vyY7U-000311-DF; Fri, 06 Mar 2026 16:33:44 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 1247971.1546309; Fri, 06 Mar 2026 16:33:44 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vyY7U-00030u-9x; Fri, 06 Mar 2026 16:33:44 +0000 Received: by outflank-mailman (input) for mailman id 1247971; Fri, 06 Mar 2026 16:33:42 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vyY7S-00030j-QG for xen-devel@lists.xenproject.org; Fri, 06 Mar 2026 16:33:42 +0000 Received: from mail-wr1-x432.google.com (mail-wr1-x432.google.com [2a00:1450:4864:20::432]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 3bf053f2-197a-11f1-b164-2bf370ae4941; Fri, 06 Mar 2026 17:33:41 +0100 (CET) Received: by mail-wr1-x432.google.com with SMTP id ffacd0b85a97d-439b7a87fb5so3755447f8f.3 for ; Fri, 06 Mar 2026 08:33:41 -0800 (PST) Received: from fedora (user-109-243-67-101.play-internet.pl. [109.243.67.101]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-439dae57c05sm4406550f8f.39.2026.03.06.08.33.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 06 Mar 2026 08:33:39 -0800 (PST) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 3bf053f2-197a-11f1-b164-2bf370ae4941 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1772814820; x=1773419620; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=Tk71eqXgwXytuAS2ZjjNkmU2hi0kcr9lEEqFsgwbDFA=; b=GJvR+FzGt/+QNcgJTeygcXgCgdsEIvUSWgpXlyMu5CqWy9F9SLTZtsVdjbiytt9WPV VUJ2ra4o/ViCf9ohMOAOecz5DmFT0ypx9v4KUkfft2P5XvWUixEYJA4fqgId3Exw0EmX sQbR1JjSztsJD1rxgrIDFxdskJxmuZZHbrbLKOPA8Dlz3rHt8flAFaUr2v5eTyzRaepP dosY0llyAOCx7ZEO291rsOiq7LeB6ovijlTMwU0wFDQrwe2EqS/GRk95PajncrBl6bRc /OOPvnTuZPPRspTF+VhT+axg2YXb8P0iJpebA2HgGtD/5yNe6F6rStHjmN35YCrAXHIC Cnmw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1772814820; x=1773419620; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=Tk71eqXgwXytuAS2ZjjNkmU2hi0kcr9lEEqFsgwbDFA=; b=FUZzyfgmQ76oJSRzLRjMkrd4gEpj3G77tM2/vqyQ16XwwWcBYfeGx1FPo7H2zFc0zK AEJxt7t3aOgNqcldAdF29sTvfz32SbPoNZGfTf5XMXZytpiiZq69wfalTSelYSeNtX9f +GDVO729MehqlDPI+lKF7yHfu3foMYKveKuoBubtXmOvQvixgipo9vzW/lIhOCB3YxYb IWGkn03lKS4twIa30gJbu5yKFquFOX3kZ5RvxLmfJz7mi2Ruxg3OsSiFECIyK7rddBc6 OOzUKQTMkz4NngiR8er+wWeUyeVXg5FI3vQ2WZr9rFuR9QP9gX4XUIJ2fj6/ev2hOKXO Q91g== X-Gm-Message-State: AOJu0YymLOpW/gd5hiFTr8MLOCXtRL+A/S0wTxhqkY1YSw1w7CKlqFws Pb2G2lfN+5sGi/9VmsJWSRAoku39r7I3p+4z9gR0F80RP3MXStN1mOd+Cn+t+g== X-Gm-Gg: ATEYQzy0cy2XzN2GrVwRwP9rWKkZAIRPceI0LAJJbFpla1NFRTa3THB7OAqBS881SQh D66szOmXSkpwZiFuJpUoisc6fCsTKCHFjXCbk3VhtsQHnOJYN8duAJ5q77yAMdcO4JewB6A6x3k NFjICkQ8KEyw/A//17J5ktCtGcKgznThx8uncYvZnaH0AkfufTFTfoknG6OHJnRw3ZZLjoH4x97 OEfuMyRh7v4e0E0DnsJtULfEdYvTX/Kc1J83hqbdnvIdL7IHoLXMykFlswwXTlA0fSNvDu0jMRS Q4JftucgOZOS8JPsHuGEGQ7LJfTlpDuOTc91a6/CuEpXyzSN5C18AseiNgMqoEpke+2CXn6Pho1 bmK2JDtV2jVPomymU2dPWHO3SM3+7UJbEsn9e/r6vkekDr/Yg/NUW66BKw7A9fnPLwYTeHXr3Cc DE3JPDzSALDHT2kP6stONlIRS7Hxkj3Q1kGKJ9oh9g6crNsSG2pNDFMw0IIEqcSxFbDg== X-Received: by 2002:a05:6000:40cb:b0:439:ba75:7db0 with SMTP id ffacd0b85a97d-439da3488f6mr5176945f8f.1.1772814819810; Fri, 06 Mar 2026 08:33:39 -0800 (PST) From: Oleksii Kurochko To: xen-devel@lists.xenproject.org Cc: Romain Caritey , Oleksii Kurochko , Alistair Francis , Connor Davis , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Stefano Stabellini , Doug Goldstein Subject: [PATCH v7 00/14] xen/riscv: introduce vtimer related things Date: Fri, 6 Mar 2026 17:33:17 +0100 Message-ID: X-Mailer: git-send-email 2.53.0 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This patch series introduces the components necessary to implement a virtual timer (vtimer). Since the SSTC extension is not supported by Xen, an emulated (SBI-based) timer is required. To address this, a virtual timer built on Xen’s timer infrastructure is introduced, with save/restore support and SBI-based programming. To provide full guest software–based timer support, the following components are also introduced: - arch_vcpu_{create,destroy}() to initialize the virtual timer and other vCPU-related state not directly tied to timer functionality. As part of this work, struct arch_vcpu is introduced to describe the internal state of a virtual CPU, along with vcpu_csr_init() to initialize the relevant CSR state. - Support functions required by the virtual timer, including: - vcpu_kick(), and a stub implementation of smp_send_event_check_mask() (since SMP is not yet supported in Xen), which is used by vcpu_kick(). - Support for guest timer programming via interception of the SBI legacy SET_TIMER call from guest. - Implement reprogram_timer() using introduced sbi_set_timer(). - Initial lockless tracking of pending vCPU interrupts using atomic bitmaps. - Handling of hypervisor timer interrupts and dispatch into Xen’s generic timer softirq. CI tests: https://gitlab.com/xen-project/people/olkur/xen/-/pipelines/2368929819 --- Changes in v7: - Merged to upstream/staging: - xen/time: move ticks<->ns helpers to common code - Add Acked-by for Patch 2: xen/riscv: implement vcpu_csr_init(). - Address comments from ML for patch 1 and 3. - Add new patch to detect availabilty of SSTC. IMO, it is okay to have this patch separetely as at the moment it won't be an issue if Xen will use CSR_STIMECMP to setup its timer. The issue will start to occur when a guest will run. --- Changes in v6: - Address comments from ML for patch 1 and 3, and minor update of patch 2 because of introduced ro_one sub-struct in patch 1. --- Changes in v5: - Merged to upstream/staging: xen/riscv: implement arch_vcpu_{create,destroy}() xen/riscv: build setup code as .init - Rebase this patch series on top of: https://lore.kernel.org/xen-devel/5756356294dc066d835269334d0f3347fe24cec4.1771504676.git.oleksii.kurochko@gmail.com/T/#u There is no logical dependency, only the potential merge conflict question. - Address comments from ML. --- Changes in v4: - Merged to upstream/staging: xen/riscv: avoid reading hstateen0 when Smstateen is not implemented - Address other comments from ML. --- Changes in v3: - Squash patch "xen/riscv: introduce struct arch_vcpu" into other patches of the patch series. - Merged to staging: - xen/riscv: implement stub for smp_send_event_check_mask() - Address other comments from ML. --- Changes in v2: - Add consumer part of tracking of pending vCPU interrupts. - Split patch "xen/riscv: init tasklet subsystem" to two. - Patches were acked: - xen/riscv: introduce vcpu_kick() implementation - xen/riscv: implement SBI legacy SET_TIMER support for guests - All other changes are patch-specific. Please check them. --- Oleksii Kurochko (14): xen/riscv: detect and store supported hypervisor CSR bits at boot xen/riscv: implement vcpu_csr_init() xen/riscv: introduce tracking of pending vCPU interrupts, part 1 xen/riscv: introduce tracking of pending vCPU interrupts, part 2 xen/riscv: introduce basic vtimer infrastructure for guests xen/riscv: introduce vcpu_kick() implementation xen/riscv: add vtimer context switch helpers xen/riscv: implement SBI legacy SET_TIMER support for guests xen/riscv: introduce sbi_set_timer() xen/riscv: implement reprogram_timer() via SBI xen/riscv: handle hypervisor timer interrupts xen/riscv: init tasklet subsystem xen/riscv: implement sync_vcpu_execstate() xen/riscv: Disable SSTC extension and add trap-based CSR probing automation/scripts/qemu-smoke-riscv64.sh | 2 +- xen/arch/riscv/Makefile | 1 + xen/arch/riscv/cpufeature.c | 8 + xen/arch/riscv/domain.c | 244 +++++++++++++++++++- xen/arch/riscv/entry.S | 24 ++ xen/arch/riscv/include/asm/Makefile | 1 - xen/arch/riscv/include/asm/csr.h | 32 +++ xen/arch/riscv/include/asm/current.h | 2 + xen/arch/riscv/include/asm/domain.h | 32 +++ xen/arch/riscv/include/asm/perfc_defn.h | 3 + xen/arch/riscv/include/asm/riscv_encoding.h | 2 + xen/arch/riscv/include/asm/sbi.h | 22 ++ xen/arch/riscv/include/asm/setup.h | 2 + xen/arch/riscv/include/asm/traps.h | 7 + xen/arch/riscv/include/asm/vtimer.h | 20 ++ xen/arch/riscv/riscv64/asm-offsets.c | 7 +- xen/arch/riscv/sbi.c | 40 +++- xen/arch/riscv/setup.c | 5 + xen/arch/riscv/stubs.c | 20 -- xen/arch/riscv/time.c | 43 ++++ xen/arch/riscv/traps.c | 20 ++ xen/arch/riscv/vsbi/legacy-extension.c | 6 + xen/arch/riscv/vtimer.c | 86 +++++++ 23 files changed, 603 insertions(+), 26 deletions(-) create mode 100644 xen/arch/riscv/include/asm/perfc_defn.h create mode 100644 xen/arch/riscv/include/asm/vtimer.h create mode 100644 xen/arch/riscv/vtimer.c -- 2.53.0