From nobody Tue Mar 3 04:56:06 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1771604394; cv=none; d=zohomail.com; s=zohoarc; b=EnFkv8ALFmMkjoSUy4x+usxSYcl0fhwMaqdRBS9+ww7VnxQDXJ8qwOx02yyEJW7hcS5XEPpqjFr6lPVdQIpmuasLT/VLm0USPiVu//9lB0EfsgNIaoEZMHYmhDsTQc9ysbIYiAo461h843Q471GPJw/PO8fW1LcP7TzM+1gfhSM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1771604394; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=3VAMf5wEbjWTV3qUp1H5TFWR6XdnKzjzMGvNMq2GKmE=; b=HzCGgns4BMLVxBpfoxy6xj/JmxkYUa6++bEjS8hCNG1aICSQUl6xC1QN6BbYy4r2QlJ3DE1sUjc6AO70QfyzMSbu62Xiv2Yz11JatmStcXI48f4m2O8ZhwnMvgax2LA35eLqNHv8cXZwIzhW2DuXf92sbWHsPp7yVtlPcj5oPOI= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1771604394461836.4421116839366; Fri, 20 Feb 2026 08:19:54 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1237343.1539775 (Exim 4.92) (envelope-from ) id 1vtTE6-0002pH-9w; Fri, 20 Feb 2026 16:19:34 +0000 Received: by outflank-mailman (output) from mailman id 1237343.1539775; Fri, 20 Feb 2026 16:19:34 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vtTE6-0002oQ-3z; Fri, 20 Feb 2026 16:19:34 +0000 Received: by outflank-mailman (input) for mailman id 1237343; Fri, 20 Feb 2026 16:19:32 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vtTE3-0000Q4-V6 for xen-devel@lists.xenproject.org; Fri, 20 Feb 2026 16:19:31 +0000 Received: from mail-wm1-x32f.google.com (mail-wm1-x32f.google.com [2a00:1450:4864:20::32f]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id ef079b3d-0e77-11f1-9ccf-f158ae23cfc8; Fri, 20 Feb 2026 17:19:30 +0100 (CET) Received: by mail-wm1-x32f.google.com with SMTP id 5b1f17b1804b1-48334ee0aeaso17009375e9.1 for ; Fri, 20 Feb 2026 08:19:30 -0800 (PST) Received: from fedora (user-109-243-67-101.play-internet.pl. [109.243.67.101]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43796a6c1bfsm56991068f8f.13.2026.02.20.08.19.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 20 Feb 2026 08:19:28 -0800 (PST) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: ef079b3d-0e77-11f1-9ccf-f158ae23cfc8 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1771604369; x=1772209169; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=3VAMf5wEbjWTV3qUp1H5TFWR6XdnKzjzMGvNMq2GKmE=; b=jGNQpjWrU8VIWmAKD9uYAFQLk2GxEGlPr1fjj5Fa6R6W1u9daTFnAjeDioKbVmflc4 XZvUi+TlN2CGSn+MVAXrEfdHESZSNfR9PIuOvKjaWqLtTiU6SC0yQI0Ke2q2WOqjPhd/ a1VePKAtukASbG1Srz+Akr1iHq+YWPDDMgvgh0u5GCoYC1zqun0rNVzfX0x9atsnwKii fv3ds78ZVww1leIDwfeuWq6rQOtG405bUVOz4KC8thrmOF7G7cPDdqapbkB1+EYCkdpA rBm+PqAzRnBLAA8NNvjO6Nn/pvFxo/kVB2nqM5YAYaaV9oqHgtPIbmzcZ2xAptGLm5PT tK5w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1771604369; x=1772209169; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=3VAMf5wEbjWTV3qUp1H5TFWR6XdnKzjzMGvNMq2GKmE=; b=uge/Gyr9Bpe0KpqNFDTsX9hoRuW6mxhzja7FAFrGxX8iNlP/rhEE4zkDZWxHcNuhtR fKeHdLsQiuOOSeKwgKouJL1Tfaojzhdspz9LvhVYK9eUB5rlY9cHMPtPCkW8KSOfiHuI Jg0ZP1rZRkgy+KtJdTbcwSlY3bWBl0MQ+hCWfD95G9Dp3S4puZipR1JNA/mDKDp9A34U 7gUNh+hYvaUyN9R4fbw03G08HjC1EpdxZNMCKHt9muvcjOBkjIhrjlXYWxR8urKilwtY irP98bCiXkH0mvSvlFkZyLn2Rfao31+h5oMJwtp4xxF+Sq6EgoT7+v3sdC3uzrpahuK/ 2RNg== X-Gm-Message-State: AOJu0Yw2rrnFunofG5yJtLPR8fSz9KRla0V2chWgz10GDRjoStipmjvJ PO/wlrR2GbOLDhV53VW1GUIJts6qJdBmMJQ9qjY+xqbhznJb1/6euYwtoWS+fA== X-Gm-Gg: AZuq6aIstN+Pihplvy8hQ5iTcROzoCMvHPCve15BFO0JJe2bZP8sCmnitYGA/qyOdW+ pmMurzj0LUFZdSZHyqilQQ3QZSPkrH4osjTu9KBYVmADIPaPC9WAPjaxh429slrl1jvMZH6Wwd8 BViUin8VEoBbakuRELaDBrehP8HwhvKB/STCvWSuahpku8xLi4C4x3aohFEvvtS45IK0NOSI6er df9Xj5BOv/rQHM4/aE7NmO6w4rJoBJhFXQKCWZ/uTsz9gF8kT+oHlRHNWEWuvQVoRW+jdhN3aOB 2OanJK1CGHiPWUJcvsGHX93/cyt+Z7q+0zuK0FPlmjeYJCvgBnKqWscVC3m091q5j8UKj0F4IVB Jg8P1pqzdhEZn9SouOsJ/i5XSwZD9BKT+twiL0IB/mcQHy2OVnMAHpJQ7l0uiiMG9CHST7AL39W iC64zZoIywofviQ7AWNQwMp64POu/uokohiRMIdzLk1FieORYOousbmCOulBCb0MbPlc+Heg== X-Received: by 2002:a05:600c:1f8f:b0:483:6d4e:9811 with SMTP id 5b1f17b1804b1-483a95ee3f2mr1262605e9.31.1771604369073; Fri, 20 Feb 2026 08:19:29 -0800 (PST) From: Oleksii Kurochko To: xen-devel@lists.xenproject.org Cc: Romain Caritey , Oleksii Kurochko , Alistair Francis , Connor Davis , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Stefano Stabellini Subject: [PATCH v5 10/14] xen/riscv: introduce sbi_set_timer() Date: Fri, 20 Feb 2026 17:19:05 +0100 Message-ID: <8f3a1ea2d841ce9f184583cdb9915bd39d760825.1771590794.git.oleksii.kurochko@gmail.com> X-Mailer: git-send-email 2.53.0 In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1771604396817154100 Introduce a function pointer for sbi_set_timer(), since different OpenSBI versions may implement the TIME extension with different extension IDs and/or function IDs. If the TIME extension is not available, fall back to the legacy timer mechanism. This is useful when Xen runs as a guest under another Xen, because the TIME extension is not currently virtualised and therefore will not appear as available. Despite of the fact that sbi_set_timer_v01 is introduced and used as fall back, SBI v0.1 still isn't fully supported (with the current SBI calls usage, sbi_rfence_v01 should be introduced too), so panic() in sbi_init() isn't removed. The sbi_set_timer() pointer will be used by reprogram_timer() to program Xen=E2=80=99s physical timer as without SSTC extension there is no any other option except SBI call to do that as only M-timer is available for us. Use dprintk() for all the cases to print that a speicifc SBI extension is available as it isn't really necessary in case of release builds. Signed-off-by: Oleksii Kurochko Acked-by: Jan Beulich --- Changes in v5: - Add inclusion of to to deal with the compila= tion issue: ./arch/riscv/include/asm/sbi.h:156:30: error: expected ')' before 'sbi_= set_timer' 156 | extern int (* __ro_after_init sbi_set_timer)(uint64_t stime_value= ); - Rephrase the first sentence of the comment above declaration of sbi_set_t= imer pointer to function. --- Changes in v4: - Add "stime_value is in absolute time" to the comment above declaration of sbi_set_timer() function pointer. - Add Acked-by: Jan Beulich . --- Changes in v3: - Init sbi_set_timer with sbi_set_timer_v01 as fallback value. - Sort SBI IDs in the same way as SBI EXT IDs are declared. - Add __ro_after_init for sbi_set_timer variable. - use dprintk instead of printk to print information if SBI ext is availab= le. --- Changes in v2: - Move up defintion of SBI_EXT_TIME_SET_TIMER and use the same padding as defintions around it. - Add an extra comment about stime_value granuality above declaration of sbi_set_timer function pointer. - Refactor implemetation of sbi_set_timer_v02(). - Provide fallback for sbi_set_timer_v01(). - Update the commit message. --- xen/arch/riscv/include/asm/sbi.h | 22 ++++++++++++++++++ xen/arch/riscv/sbi.c | 40 +++++++++++++++++++++++++++++++- 2 files changed, 61 insertions(+), 1 deletion(-) diff --git a/xen/arch/riscv/include/asm/sbi.h b/xen/arch/riscv/include/asm/= sbi.h index 79f7ff5c5501..ed7af200288f 100644 --- a/xen/arch/riscv/include/asm/sbi.h +++ b/xen/arch/riscv/include/asm/sbi.h @@ -13,6 +13,7 @@ #define ASM__RISCV__SBI_H =20 #include +#include =20 /* SBI-defined implementation ID */ #define SBI_XEN_IMPID 7 @@ -29,6 +30,7 @@ =20 #define SBI_EXT_BASE 0x10 #define SBI_EXT_RFENCE 0x52464E43 +#define SBI_EXT_TIME 0x54494D45 =20 /* SBI function IDs for BASE extension */ #define SBI_EXT_BASE_GET_SPEC_VERSION 0x0 @@ -48,6 +50,9 @@ #define SBI_EXT_RFENCE_REMOTE_HFENCE_VVMA 0x5 #define SBI_EXT_RFENCE_REMOTE_HFENCE_VVMA_ASID 0x6 =20 +/* SBI function IDs for TIME extension */ +#define SBI_EXT_TIME_SET_TIMER 0x0 + #define SBI_SPEC_VERSION_MAJOR_MASK 0x7f000000 #define SBI_SPEC_VERSION_MINOR_MASK 0x00ffffff =20 @@ -134,6 +139,23 @@ int sbi_remote_hfence_gvma(const cpumask_t *cpu_mask, = vaddr_t start, int sbi_remote_hfence_gvma_vmid(const cpumask_t *cpu_mask, vaddr_t start, size_t size, unsigned long vmid); =20 +/* + * Programs the clock for next event at (or after) stime_value. stime_valu= e is + * in absolute time. This function must clear the pending timer interrupt = bit + * as well. + * + * If the supervisor wishes to clear the timer interrupt without schedulin= g the + * next timer event, it can either request a timer interrupt infinitely far + * into the future (i.e., (uint64_t)-1), or it can instead mask the timer + * interrupt by clearing sie.STIE CSR bit. + * + * The stime_value parameter represents absolute time measured in ticks. + * + * This SBI call returns 0 upon success or an implementation specific nega= tive + * error code. + */ +extern int (* __ro_after_init sbi_set_timer)(uint64_t stime_value); + /* * Initialize SBI library * diff --git a/xen/arch/riscv/sbi.c b/xen/arch/riscv/sbi.c index 425dce44c679..b4a7ae6940c1 100644 --- a/xen/arch/riscv/sbi.c +++ b/xen/arch/riscv/sbi.c @@ -249,6 +249,38 @@ static int (* __ro_after_init sbi_rfence)(unsigned lon= g fid, unsigned long arg4, unsigned long arg5); =20 +static int cf_check sbi_set_timer_v02(uint64_t stime_value) +{ + struct sbiret ret; + + ret =3D sbi_ecall(SBI_EXT_TIME, SBI_EXT_TIME_SET_TIMER, stime_value, +#ifdef CONFIG_RISCV_32 + stime_value >> 32, +#else + 0, +#endif + 0, 0, 0, 0); + + return sbi_err_map_xen_errno(ret.error); +} + +static int cf_check sbi_set_timer_v01(uint64_t stime_value) +{ + struct sbiret ret; + + ret =3D sbi_ecall(SBI_EXT_0_1_SET_TIMER, 0, stime_value, +#ifdef CONFIG_RISCV_32 + stime_value >> 32, +#else + 0, +#endif + 0, 0, 0, 0); + + return sbi_err_map_xen_errno(ret.error); +} + +int (* __ro_after_init sbi_set_timer)(uint64_t stime_value) =3D sbi_set_ti= mer_v01; + int sbi_remote_sfence_vma(const cpumask_t *cpu_mask, vaddr_t start, size_t size) { @@ -324,7 +356,13 @@ int __init sbi_init(void) if ( sbi_probe_extension(SBI_EXT_RFENCE) > 0 ) { sbi_rfence =3D sbi_rfence_v02; - printk("SBI v0.2 RFENCE extension detected\n"); + dprintk(XENLOG_INFO, "SBI v0.2 RFENCE extension detected\n"); + } + + if ( sbi_probe_extension(SBI_EXT_TIME) > 0 ) + { + sbi_set_timer =3D sbi_set_timer_v02; + dprintk(XENLOG_INFO, "SBI v0.2 TIME extension detected\n"); } } else --=20 2.53.0