Re: [PATCH] KVM: x86: Update Xen TSC leaves during CPUID emulation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2025-01-23 at 19:02 +0000, Fred Griffoul wrote:

> +static inline void kvm_xen_may_update_tsc_info(struct kvm_vcpu *vcpu,
> +					       u32 function, u32 index,
> +					       u32 *eax, u32 *ecx, u32 *edx)

Should this be called kvm_xen_maybe_update_tsc_info() ? 

Is it worth adding if (static_branch_unlikely(&kvm_xen_enabled.key))? 

> +{
> +	u32 base = vcpu->arch.xen.cpuid.base;
> +
> +	if (base && (function == (base | XEN_CPUID_LEAF(3)))) {
> +		if (index == 1) {
> +			*ecx = vcpu->arch.hv_clock.tsc_to_system_mul;
> +			*edx = vcpu->arch.hv_clock.tsc_shift;

Are these fields in vcpu->arch.hv_clock definitely going to be set? If
so, can we have a comment to that effect? And perhaps a warning to
assert the truth of that claim?

Before this patch, if the hv_clock isn't yet set then the guest would
see the original content of the leaves as set by userspace? Now it gets
zeroes if that happens?


Attachment: smime.p7s
Description: S/MIME cryptographic signature


[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux