Hello! Thank you for quick response. > This is fairly unreadable. Please use a switch statement instead. Christoffer disliked it in v1, so i thought a bit and changed it. Ok, will change it back. > And here, we're going to assume that the arch timer still usable. We > definitely need a way to *prevent* the timer to be used when there is no > GIC. Otherwise, we're going to start trying to setup the mapping for the > active state, and the guest may start poking it. But, this seems to be already done, isn't it? According to http://lxr.free-electrons.com/source/arch/arm/kvm/arm.c#L439: --- cut --- 459 /* 460 * Enable the arch timers only if we have an in-kernel VGIC 461 * and it has been properly initialized, since we cannot handle 462 * interrupts from the virtual timer with a userspace gic. 463 */ 464 if (irqchip_in_kernel(kvm) && vgic_initialized(kvm)) 465 kvm_timer_enable(kvm); --- cut --- Without kvm->arch.timer.enabled set to 1 by kvm_timer_enable() VM context save/restore code will not actually touch timer registers. Therefore the host part of the code will not do anything. As to guest itself, only userspace can stop it from accessing timer registers. My experimental qemu does this by removing generic timer node from guest's device tree. Virtual timer access simply cannot be trapped, otherwise there would be no problem at all. But, OK, even if the guest programs timer, we will just see "Unexpected IRQ 27" on the console, and the guest will not work, so it's not terribly fatal. You know, i actually looked at it before posting v3. I tried to omit kvm_timer_hyp_init() call too, and got lots of crashes because: 1. kvm_timer_init() is called unconditionally 2. qemu does some initialization of timer registers unconditionally using ioctl, and they end up in kvm_arm_timer_set_reg() Both of these points end up in kvm_phys_timer_read() which dereferences timecounter == NULL. Well, i could make kvm_phys_timer_read() just returning 0 in this case, but this could mis-trigger kvm_timer_should_fire() in some circumstances. I would have to patch it too... At this point i decided to stop because the result perhaps does not worth the effort and amount of patching. While writing this message i was walking through this code once again, and... I have a suggestion. Actually, if we are really paranoid, we could be afraid of kvm_vgic_inject_irq() being called, which would do some weird things without vGIC. It is possible to add a check for kvm->arch.timer.enabled in kvm_timer_sync_hwstate() and kvm_timer_flush_hwstate(). If the timer is disabled those functions will simply return doing nothing. This would guarantee that interrupt injection is never attempted. What do you think? And some more. Actually, it is possible to emulate generic timer in userspace, just not the virtual one. IIRC access to physical timer can be trapped. So, if we modify guest's device tree by removing virtual timer IRQ, the guest will fall back to physical timer. And this will be caught by the hypervisor. After this all we have to do is to add corresponding exit code which would allow the userspace to emulate missing CP15 (or system in case of ARM64) registers. So, this timer issue is not grave, just i postpone implementing it until GIC issues are settled down. Kind regards, Pavel Fedin Expert Engineer Samsung Electronics Research center Russia _______________________________________________ kvmarm mailing list kvmarm@xxxxxxxxxxxxxxxxxxxxx https://lists.cs.columbia.edu/mailman/listinfo/kvmarm