diff mbox series

[v2] xen/arm: remove physical timer offset

Message ID 20191126211324.122736-1-jeff.kubascik@dornerworks.com (mailing list archive)
State New, archived
Headers show
Series [v2] xen/arm: remove physical timer offset | expand

Commit Message

Jeff Kubascik Nov. 26, 2019, 9:13 p.m. UTC
The physical timer traps apply an offset so that time starts at 0 for
the guest. However, this offset is not currently applied to the physical
counter. Per the ARMv8 Reference Manual (ARM DDI 0487E.a), section
D11.2.4 Timers, the "Offset" between the counter and timer should be
zero for a physical timer. This removes the offset to make the timer and
counter consistent.

Furthermore, section D11.2.4 specifies that the values in the TimerValue
view of the timers are signed in standard two's complement form. When
writing to the TimerValue register, it should be signed extended as
described by the equation

  CompareValue = (Counter[63:0] + SignExtend(TimerValue))[63:0]

Signed-off-by: Jeff Kubascik <jeff.kubascik@dornerworks.com>
---
Changes in v2:
- Update commit message to specify reference manual version and section
- Change physical timer cval to hold hardware value
- Make sure to sign extend TimerValue on writes. This was done by first
  casting the r pointer to (int32_t *), dereferencing it, then casting
  to uint64_t. Please let me know if there is a more correct way to do
  this
---
 xen/arch/arm/vtimer.c        | 21 +++++++++------------
 xen/include/asm-arm/domain.h |  3 ---
 2 files changed, 9 insertions(+), 15 deletions(-)

Comments

Julien Grall Dec. 3, 2019, 6:04 p.m. UTC | #1
Hi,

On 26/11/2019 21:13, Jeff Kubascik wrote:
> The physical timer traps apply an offset so that time starts at 0 for
> the guest. However, this offset is not currently applied to the physical
> counter. Per the ARMv8 Reference Manual (ARM DDI 0487E.a), section
> D11.2.4 Timers, the "Offset" between the counter and timer should be
> zero for a physical timer. This removes the offset to make the timer and
> counter consistent.
> 
> Furthermore, section D11.2.4 specifies that the values in the TimerValue
> view of the timers are signed in standard two's complement form. When
> writing to the TimerValue register, it should be signed extended as
> described by the equation
> 
>    CompareValue = (Counter[63:0] + SignExtend(TimerValue))[63:0]

I am a bit confused, is it a new bug introduced by the change or 
previously existing? If the latter, then I think this should be modified 
in a separate patch.

> 
> Signed-off-by: Jeff Kubascik <jeff.kubascik@dornerworks.com>
> ---
> Changes in v2:
> - Update commit message to specify reference manual version and section
> - Change physical timer cval to hold hardware value

I think this change should be explained in the commit message.

> - Make sure to sign extend TimerValue on writes. This was done by first
>    casting the r pointer to (int32_t *), dereferencing it, then casting
>    to uint64_t. Please let me know if there is a more correct way to do
>    this
> ---
>   xen/arch/arm/vtimer.c        | 21 +++++++++------------
>   xen/include/asm-arm/domain.h |  3 ---
>   2 files changed, 9 insertions(+), 15 deletions(-)
> 
> diff --git a/xen/arch/arm/vtimer.c b/xen/arch/arm/vtimer.c
> index e6aebdac9e..eb12a08acf 100644
> --- a/xen/arch/arm/vtimer.c
> +++ b/xen/arch/arm/vtimer.c
> @@ -62,7 +62,6 @@ static void virt_timer_expired(void *data)
>   
>   int domain_vtimer_init(struct domain *d, struct xen_arch_domainconfig *config)
>   {
> -    d->arch.phys_timer_base.offset = NOW();
>       d->arch.virt_timer_base.offset = READ_SYSREG64(CNTPCT_EL0);
>       d->time_offset_seconds = ticks_to_ns(d->arch.virt_timer_base.offset - boot_count);
>       do_div(d->time_offset_seconds, 1000000000);

I think you need to update the initialization of cval to avoid storing 
ns. But CTNP_CVAL_EL0 is reset to a unknown value at reboot, so we 
should not need to set a value at all as the guest would have to set it.

> @@ -185,7 +184,7 @@ static bool vtimer_cntp_ctl(struct cpu_user_regs *regs, uint32_t *r, bool read)
>           if ( v->arch.phys_timer.ctl & CNTx_CTL_ENABLE )
>           {
>               set_timer(&v->arch.phys_timer.timer,
> -                      v->arch.phys_timer.cval + v->domain->arch.phys_timer_base.offset);
> +                      ticks_to_ns(v->arch.phys_timer.cval - boot_count));

cval may be smaller than boot_count. In that case, we will set the timer 
to expire a very long time. This is not the expected behavior from the 
guest.

Instead, we should either use 0 to create the timer or call 
phys_timer_expired directly.

>           }
>           else
>               stop_timer(&v->arch.phys_timer.timer);
> @@ -197,26 +196,25 @@ static bool vtimer_cntp_tval(struct cpu_user_regs *regs, uint32_t *r,
>                                bool read)
>   {
>       struct vcpu *v = current;
> -    s_time_t now;
> +    uint64_t cntpct;
>   
>       if ( !ACCESS_ALLOWED(regs, EL0PTEN) )
>           return false;
>   
> -    now = NOW() - v->domain->arch.phys_timer_base.offset;
> +    cntpct = get_cycles();
>   
>       if ( read )
>       {
> -        *r = (uint32_t)(ns_to_ticks(v->arch.phys_timer.cval - now) & 0xffffffffull);
> +        *r = (uint32_t)((v->arch.phys_timer.cval - cntpct) & 0xffffffffull);
>       }
>       else
>       {
> -        v->arch.phys_timer.cval = now + ticks_to_ns(*r);
> +        v->arch.phys_timer.cval = cntpct + (uint64_t)(*((int32_t *)r));

I would prefer (uint64_t)(int32_t)*r.

>           if ( v->arch.phys_timer.ctl & CNTx_CTL_ENABLE )
>           {
>               v->arch.phys_timer.ctl &= ~CNTx_CTL_PENDING;
>               set_timer(&v->arch.phys_timer.timer,
> -                      v->arch.phys_timer.cval +
> -                      v->domain->arch.phys_timer_base.offset);
> +                      ticks_to_ns(v->arch.phys_timer.cval - boot_count));
>           }
>       }
>       return true;
> @@ -232,17 +230,16 @@ static bool vtimer_cntp_cval(struct cpu_user_regs *regs, uint64_t *r,
>   
>       if ( read )
>       {
> -        *r = ns_to_ticks(v->arch.phys_timer.cval);
> +        *r = v->arch.phys_timer.cval;
>       }
>       else
>       {
> -        v->arch.phys_timer.cval = ticks_to_ns(*r);
> +        v->arch.phys_timer.cval = *r;
>           if ( v->arch.phys_timer.ctl & CNTx_CTL_ENABLE )
>           {
>               v->arch.phys_timer.ctl &= ~CNTx_CTL_PENDING;
>               set_timer(&v->arch.phys_timer.timer,
> -                      v->arch.phys_timer.cval +
> -                      v->domain->arch.phys_timer_base.offset);
> +                      ticks_to_ns(v->arch.phys_timer.cval - boot_count));
>           }
>       }
>       return true;
> diff --git a/xen/include/asm-arm/domain.h b/xen/include/asm-arm/domain.h
> index 86ebdd2bcf..16a7150a95 100644
> --- a/xen/include/asm-arm/domain.h
> +++ b/xen/include/asm-arm/domain.h
> @@ -65,9 +65,6 @@ struct arch_domain
>           RELMEM_done,
>       } relmem;
>   
> -    struct {
> -        uint64_t offset;
> -    } phys_timer_base;
>       struct {
>           uint64_t offset;
>       } virt_timer_base;
> 

Cheers,
Jeff Kubascik Dec. 5, 2019, 7:17 p.m. UTC | #2
On 12/3/2019 1:04 PM, Julien Grall wrote:
> Hi,
> 
> On 26/11/2019 21:13, Jeff Kubascik wrote:
>> The physical timer traps apply an offset so that time starts at 0 for
>> the guest. However, this offset is not currently applied to the physical
>> counter. Per the ARMv8 Reference Manual (ARM DDI 0487E.a), section
>> D11.2.4 Timers, the "Offset" between the counter and timer should be
>> zero for a physical timer. This removes the offset to make the timer and
>> counter consistent.
>>
>> Furthermore, section D11.2.4 specifies that the values in the TimerValue
>> view of the timers are signed in standard two's complement form. When
>> writing to the TimerValue register, it should be signed extended as
>> described by the equation
>>
>>    CompareValue = (Counter[63:0] + SignExtend(TimerValue))[63:0]
> 
> I am a bit confused, is it a new bug introduced by the change or
> previously existing? If the latter, then I think this should be modified
> in a separate patch.

This would be a previously existing bug - a quirk in the timer design that
wasn't emulated correctly before. I can break this out into a separate patch.

>>
>> Signed-off-by: Jeff Kubascik <jeff.kubascik@dornerworks.com>
>> ---
>> Changes in v2:
>> - Update commit message to specify reference manual version and section
>> - Change physical timer cval to hold hardware value
> 
> I think this change should be explained in the commit message.

I will update the commit message accordingly.

>> - Make sure to sign extend TimerValue on writes. This was done by first
>>    casting the r pointer to (int32_t *), dereferencing it, then casting
>>    to uint64_t. Please let me know if there is a more correct way to do
>>    this
>> ---
>>   xen/arch/arm/vtimer.c        | 21 +++++++++------------
>>   xen/include/asm-arm/domain.h |  3 ---
>>   2 files changed, 9 insertions(+), 15 deletions(-)
>>
>> diff --git a/xen/arch/arm/vtimer.c b/xen/arch/arm/vtimer.c
>> index e6aebdac9e..eb12a08acf 100644
>> --- a/xen/arch/arm/vtimer.c
>> +++ b/xen/arch/arm/vtimer.c
>> @@ -62,7 +62,6 @@ static void virt_timer_expired(void *data)
>>
>>   int domain_vtimer_init(struct domain *d, struct xen_arch_domainconfig *config)
>>   {
>> -    d->arch.phys_timer_base.offset = NOW();
>>       d->arch.virt_timer_base.offset = READ_SYSREG64(CNTPCT_EL0);
>>       d->time_offset_seconds = ticks_to_ns(d->arch.virt_timer_base.offset - boot_count);
>>       do_div(d->time_offset_seconds, 1000000000);
> 
> I think you need to update the initialization of cval to avoid storing
> ns. But CTNP_CVAL_EL0 is reset to a unknown value at reboot, so we
> should not need to set a value at all as the guest would have to set it.

Good catch, I missed this. I will remove the "t->cval = NOW();" line in
vcpu_vtimer_init.

>> @@ -185,7 +184,7 @@ static bool vtimer_cntp_ctl(struct cpu_user_regs *regs, uint32_t *r, bool read)
>>           if ( v->arch.phys_timer.ctl & CNTx_CTL_ENABLE )
>>           {
>>               set_timer(&v->arch.phys_timer.timer,
>> -                      v->arch.phys_timer.cval + v->domain->arch.phys_timer_base.offset);
>> +                      ticks_to_ns(v->arch.phys_timer.cval - boot_count));
> 
> cval may be smaller than boot_count. In that case, we will set the timer
> to expire a very long time. This is not the expected behavior from the
> guest.
> 
> Instead, we should either use 0 to create the timer or call
> phys_timer_expired directly.

I disagree - if you set cval to a value smaller than boot_count, you are setting
cval to a value less than the physical counter value. This would result in the
timer having a long expiration time.

However, set_timer expects a signed 64 bit value in ns. The conversion of cval
(unsigned 64 bit) from ticks to ns is going to overflow this. I'm not sure what
would be the best way to work around this limitation. At the very least, I think
we should print a warning message.

>>           }
>>           else
>>               stop_timer(&v->arch.phys_timer.timer);
>> @@ -197,26 +196,25 @@ static bool vtimer_cntp_tval(struct cpu_user_regs *regs, uint32_t *r,
>>                                bool read)
>>   {
>>       struct vcpu *v = current;
>> -    s_time_t now;
>> +    uint64_t cntpct;
>>
>>       if ( !ACCESS_ALLOWED(regs, EL0PTEN) )
>>           return false;
>>
>> -    now = NOW() - v->domain->arch.phys_timer_base.offset;
>> +    cntpct = get_cycles();
>>
>>       if ( read )
>>       {
>> -        *r = (uint32_t)(ns_to_ticks(v->arch.phys_timer.cval - now) & 0xffffffffull);
>> +        *r = (uint32_t)((v->arch.phys_timer.cval - cntpct) & 0xffffffffull);
>>       }
>>       else
>>       {
>> -        v->arch.phys_timer.cval = now + ticks_to_ns(*r);
>> +        v->arch.phys_timer.cval = cntpct + (uint64_t)(*((int32_t *)r));
> 
> I would prefer (uint64_t)(int32_t)*r.

I will update accordingly.

>>           if ( v->arch.phys_timer.ctl & CNTx_CTL_ENABLE )
>>           {
>>               v->arch.phys_timer.ctl &= ~CNTx_CTL_PENDING;
>>               set_timer(&v->arch.phys_timer.timer,
>> -                      v->arch.phys_timer.cval +
>> -                      v->domain->arch.phys_timer_base.offset);
>> +                      ticks_to_ns(v->arch.phys_timer.cval - boot_count));
>>           }
>>       }
>>       return true;
>> @@ -232,17 +230,16 @@ static bool vtimer_cntp_cval(struct cpu_user_regs *regs, uint64_t *r,
>>
>>       if ( read )
>>       {
>> -        *r = ns_to_ticks(v->arch.phys_timer.cval);
>> +        *r = v->arch.phys_timer.cval;
>>       }
>>       else
>>       {
>> -        v->arch.phys_timer.cval = ticks_to_ns(*r);
>> +        v->arch.phys_timer.cval = *r;
>>           if ( v->arch.phys_timer.ctl & CNTx_CTL_ENABLE )
>>           {
>>               v->arch.phys_timer.ctl &= ~CNTx_CTL_PENDING;
>>               set_timer(&v->arch.phys_timer.timer,
>> -                      v->arch.phys_timer.cval +
>> -                      v->domain->arch.phys_timer_base.offset);
>> +                      ticks_to_ns(v->arch.phys_timer.cval - boot_count));
>>           }
>>       }
>>       return true;
>> diff --git a/xen/include/asm-arm/domain.h b/xen/include/asm-arm/domain.h
>> index 86ebdd2bcf..16a7150a95 100644
>> --- a/xen/include/asm-arm/domain.h
>> +++ b/xen/include/asm-arm/domain.h
>> @@ -65,9 +65,6 @@ struct arch_domain
>>           RELMEM_done,
>>       } relmem;
>>
>> -    struct {
>> -        uint64_t offset;
>> -    } phys_timer_base;
>>       struct {
>>           uint64_t offset;
>>       } virt_timer_base;
>>
> 
> Cheers,
> 
> --
> Julien Grall
> 

Sincerely,
Jeff Kubascik
Julien Grall Dec. 5, 2019, 8:28 p.m. UTC | #3
Hi,

On 05/12/2019 19:17, Jeff Kubascik wrote:
> On 12/3/2019 1:04 PM, Julien Grall wrote:
>> Hi,
>>
>> On 26/11/2019 21:13, Jeff Kubascik wrote:
>>> The physical timer traps apply an offset so that time starts at 0 for
>>> the guest. However, this offset is not currently applied to the physical
>>> counter. Per the ARMv8 Reference Manual (ARM DDI 0487E.a), section
>>> D11.2.4 Timers, the "Offset" between the counter and timer should be
>>> zero for a physical timer. This removes the offset to make the timer and
>>> counter consistent.
>>>
>>> Furthermore, section D11.2.4 specifies that the values in the TimerValue
>>> view of the timers are signed in standard two's complement form. When
>>> writing to the TimerValue register, it should be signed extended as
>>> described by the equation
>>>
>>>     CompareValue = (Counter[63:0] + SignExtend(TimerValue))[63:0]
>>
>> I am a bit confused, is it a new bug introduced by the change or
>> previously existing? If the latter, then I think this should be modified
>> in a separate patch.
> 
> This would be a previously existing bug - a quirk in the timer design that
> wasn't emulated correctly before. I can break this out into a separate patch.

It would be great if you can split it. Thank you!

[...]


>>> @@ -185,7 +184,7 @@ static bool vtimer_cntp_ctl(struct cpu_user_regs *regs, uint32_t *r, bool read)
>>>            if ( v->arch.phys_timer.ctl & CNTx_CTL_ENABLE )
>>>            {
>>>                set_timer(&v->arch.phys_timer.timer,
>>> -                      v->arch.phys_timer.cval + v->domain->arch.phys_timer_base.offset);
>>> +                      ticks_to_ns(v->arch.phys_timer.cval - boot_count));
>>
>> cval may be smaller than boot_count. In that case, we will set the timer
>> to expire a very long time. This is not the expected behavior from the
>> guest.
>>
>> Instead, we should either use 0 to create the timer or call
>> phys_timer_expired directly.
> 
> I disagree - if you set cval to a value smaller than boot_count, you are setting
> cval to a value less than the physical counter value. This would result in the
> timer having a long expiration time.

boot_count refers to when Xen began to boot, not the start of the 
physical counter. If you look at the condition to fire the timer (see 
below), then it means the timer will fire right now because the physical 
counter is past CompareValue (cval).

TimerConditionMet = (((Counter[63:0] – Offset[63:0])[63:0] - 
CompareValue[63:0]) >= 0)

We only subtract boot_count here as the timer subsystem expects a 
relative number of nanoseconds from when Xen booted.

> 
> However, set_timer expects a signed 64 bit value in ns. The conversion of cval
> (unsigned 64 bit) from ticks to ns is going to overflow this. I'm not sure what
> would be the best way to work around this limitation. At the very least, I think
> we should print a warning message.

A warning message in emulation is definitely not the right solution. If 
a user asks something that is valid from the spec PoV then we should 
implement it correctly. The more that I don't think boot_count store 
what you expect (see above).

But we definitely can't allow the caller of ticks_to_ns() to pass a 
negative value as argument because (cval - boot_count) may be over 2^63 
for instance if the user requests a timer to be set in a million of year 
(I didn't do the math!).

Cheers,
Jeff Kubascik Dec. 11, 2019, 8 p.m. UTC | #4
On 12/5/2019 3:28 PM, Julien Grall wrote:
> Hi,
> 
> On 05/12/2019 19:17, Jeff Kubascik wrote:
>> On 12/3/2019 1:04 PM, Julien Grall wrote:
>>> Hi,
>>>
>>> On 26/11/2019 21:13, Jeff Kubascik wrote:
>>>> The physical timer traps apply an offset so that time starts at 0 for
>>>> the guest. However, this offset is not currently applied to the physical
>>>> counter. Per the ARMv8 Reference Manual (ARM DDI 0487E.a), section
>>>> D11.2.4 Timers, the "Offset" between the counter and timer should be
>>>> zero for a physical timer. This removes the offset to make the timer and
>>>> counter consistent.
>>>>
>>>> Furthermore, section D11.2.4 specifies that the values in the TimerValue
>>>> view of the timers are signed in standard two's complement form. When
>>>> writing to the TimerValue register, it should be signed extended as
>>>> described by the equation
>>>>
>>>>     CompareValue = (Counter[63:0] + SignExtend(TimerValue))[63:0]
>>>
>>> I am a bit confused, is it a new bug introduced by the change or
>>> previously existing? If the latter, then I think this should be modified
>>> in a separate patch.
>>
>> This would be a previously existing bug - a quirk in the timer design that
>> wasn't emulated correctly before. I can break this out into a separate patch.
> 
> It would be great if you can split it. Thank you!
> 
> [...]
> 
> 
>>>> @@ -185,7 +184,7 @@ static bool vtimer_cntp_ctl(struct cpu_user_regs *regs, uint32_t *r, bool read)
>>>>            if ( v->arch.phys_timer.ctl & CNTx_CTL_ENABLE )
>>>>            {
>>>>                set_timer(&v->arch.phys_timer.timer,
>>>> -                      v->arch.phys_timer.cval + v->domain->arch.phys_timer_base.offset);
>>>> +                      ticks_to_ns(v->arch.phys_timer.cval - boot_count));
>>>
>>> cval may be smaller than boot_count. In that case, we will set the timer
>>> to expire a very long time. This is not the expected behavior from the
>>> guest.
>>>
>>> Instead, we should either use 0 to create the timer or call
>>> phys_timer_expired directly.
>>
>> I disagree - if you set cval to a value smaller than boot_count, you are setting
>> cval to a value less than the physical counter value. This would result in the
>> timer having a long expiration time.
> 
> boot_count refers to when Xen began to boot, not the start of the
> physical counter. If you look at the condition to fire the timer (see
> below), then it means the timer will fire right now because the physical
> counter is past CompareValue (cval).
> 
> TimerConditionMet = (((Counter[63:0] – Offset[63:0])[63:0] -
> CompareValue[63:0]) >= 0)

This makes sense now - I wasn't considering the greater than equals condition.

> We only subtract boot_count here as the timer subsystem expects a
> relative number of nanoseconds from when Xen booted.

Makes sense.

>>
>> However, set_timer expects a signed 64 bit value in ns. The conversion of cval
>> (unsigned 64 bit) from ticks to ns is going to overflow this. I'm not sure what
>> would be the best way to work around this limitation. At the very least, I think
>> we should print a warning message.
> 
> A warning message in emulation is definitely not the right solution. If
> a user asks something that is valid from the spec PoV then we should
> implement it correctly. The more that I don't think boot_count store
> what you expect (see above).
> 
> But we definitely can't allow the caller of ticks_to_ns() to pass a
> negative value as argument because (cval - boot_count) may be over 2^63
> for instance if the user requests a timer to be set in a million of year
> (I didn't do the math!).

Assuming 100MHz timer frequency, the math works out to be about 5,850 years,
give or take. I'm assuming we don't need to worry about rollover conditions?

> Cheers,
> 
> --
> Julien Grall
> 

Sincerely,
Jeff Kubascik
Julien Grall Dec. 12, 2019, 12:16 p.m. UTC | #5
Hi,

On 11/12/2019 20:00, Jeff Kubascik wrote:
> On 12/5/2019 3:28 PM, Julien Grall wrote:
>>> However, set_timer expects a signed 64 bit value in ns. The conversion of cval
>>> (unsigned 64 bit) from ticks to ns is going to overflow this. I'm not sure what
>>> would be the best way to work around this limitation. At the very least, I think
>>> we should print a warning message.
>>
>> A warning message in emulation is definitely not the right solution. If
>> a user asks something that is valid from the spec PoV then we should
>> implement it correctly. The more that I don't think boot_count store
>> what you expect (see above).
>>
>> But we definitely can't allow the caller of ticks_to_ns() to pass a
>> negative value as argument because (cval - boot_count) may be over 2^63
>> for instance if the user requests a timer to be set in a million of year
>> (I didn't do the math!).
> 
> Assuming 100MHz timer frequency, the math works out to be about 5,850 years,
> give or take. I'm assuming we don't need to worry about rollover conditions?

Do you mean for the timer exposed to the guest? If so, I think this is 
up to the guest to take care of the roll-over.

In Xen, we only have to be careful if this will roll-over our counter. 
Looking at the code, I don't think we are taking care of this.

 From the Arm Arm mandates the timer to have roll-over time of not less 
than 40 years. So anything running Xen more than 40 years continuously 
may hit the problem.

The major hurdle to handle rollover is that the size of the counter is 
at least 56 bits on Armv8. But you have no way to detect the number of 
bits. In short, for roll-over, we may need to use TVAL rather than CVAL 
in Xen.

Cheers,
diff mbox series

Patch

diff --git a/xen/arch/arm/vtimer.c b/xen/arch/arm/vtimer.c
index e6aebdac9e..eb12a08acf 100644
--- a/xen/arch/arm/vtimer.c
+++ b/xen/arch/arm/vtimer.c
@@ -62,7 +62,6 @@  static void virt_timer_expired(void *data)
 
 int domain_vtimer_init(struct domain *d, struct xen_arch_domainconfig *config)
 {
-    d->arch.phys_timer_base.offset = NOW();
     d->arch.virt_timer_base.offset = READ_SYSREG64(CNTPCT_EL0);
     d->time_offset_seconds = ticks_to_ns(d->arch.virt_timer_base.offset - boot_count);
     do_div(d->time_offset_seconds, 1000000000);
@@ -185,7 +184,7 @@  static bool vtimer_cntp_ctl(struct cpu_user_regs *regs, uint32_t *r, bool read)
         if ( v->arch.phys_timer.ctl & CNTx_CTL_ENABLE )
         {
             set_timer(&v->arch.phys_timer.timer,
-                      v->arch.phys_timer.cval + v->domain->arch.phys_timer_base.offset);
+                      ticks_to_ns(v->arch.phys_timer.cval - boot_count));
         }
         else
             stop_timer(&v->arch.phys_timer.timer);
@@ -197,26 +196,25 @@  static bool vtimer_cntp_tval(struct cpu_user_regs *regs, uint32_t *r,
                              bool read)
 {
     struct vcpu *v = current;
-    s_time_t now;
+    uint64_t cntpct;
 
     if ( !ACCESS_ALLOWED(regs, EL0PTEN) )
         return false;
 
-    now = NOW() - v->domain->arch.phys_timer_base.offset;
+    cntpct = get_cycles();
 
     if ( read )
     {
-        *r = (uint32_t)(ns_to_ticks(v->arch.phys_timer.cval - now) & 0xffffffffull);
+        *r = (uint32_t)((v->arch.phys_timer.cval - cntpct) & 0xffffffffull);
     }
     else
     {
-        v->arch.phys_timer.cval = now + ticks_to_ns(*r);
+        v->arch.phys_timer.cval = cntpct + (uint64_t)(*((int32_t *)r));
         if ( v->arch.phys_timer.ctl & CNTx_CTL_ENABLE )
         {
             v->arch.phys_timer.ctl &= ~CNTx_CTL_PENDING;
             set_timer(&v->arch.phys_timer.timer,
-                      v->arch.phys_timer.cval +
-                      v->domain->arch.phys_timer_base.offset);
+                      ticks_to_ns(v->arch.phys_timer.cval - boot_count));
         }
     }
     return true;
@@ -232,17 +230,16 @@  static bool vtimer_cntp_cval(struct cpu_user_regs *regs, uint64_t *r,
 
     if ( read )
     {
-        *r = ns_to_ticks(v->arch.phys_timer.cval);
+        *r = v->arch.phys_timer.cval;
     }
     else
     {
-        v->arch.phys_timer.cval = ticks_to_ns(*r);
+        v->arch.phys_timer.cval = *r;
         if ( v->arch.phys_timer.ctl & CNTx_CTL_ENABLE )
         {
             v->arch.phys_timer.ctl &= ~CNTx_CTL_PENDING;
             set_timer(&v->arch.phys_timer.timer,
-                      v->arch.phys_timer.cval +
-                      v->domain->arch.phys_timer_base.offset);
+                      ticks_to_ns(v->arch.phys_timer.cval - boot_count));
         }
     }
     return true;
diff --git a/xen/include/asm-arm/domain.h b/xen/include/asm-arm/domain.h
index 86ebdd2bcf..16a7150a95 100644
--- a/xen/include/asm-arm/domain.h
+++ b/xen/include/asm-arm/domain.h
@@ -65,9 +65,6 @@  struct arch_domain
         RELMEM_done,
     } relmem;
 
-    struct {
-        uint64_t offset;
-    } phys_timer_base;
     struct {
         uint64_t offset;
     } virt_timer_base;