aboutsummaryrefslogtreecommitdiff
path: root/hw/i386/kvm
diff options
context:
space:
mode:
authorDenis Plotnikov <dplotnikov@virtuozzo.com>2017-05-29 13:49:04 +0300
committerPaolo Bonzini <pbonzini@redhat.com>2017-06-07 18:22:02 +0200
commite2b6c1712e08bc5feafb44fdc65ab81ef2630b4b (patch)
tree2bb70a4ad941f89f05bc66afa1c1e66b25fc4d89 /hw/i386/kvm
parentdf8ad9f128c15aa0a0ebc7b24e9a22c9775b67af (diff)
downloadqemu-e2b6c1712e08bc5feafb44fdc65ab81ef2630b4b.zip
qemu-e2b6c1712e08bc5feafb44fdc65ab81ef2630b4b.tar.gz
qemu-e2b6c1712e08bc5feafb44fdc65ab81ef2630b4b.tar.bz2
kvmclock: update system_time_msr address forcibly
Do an update of system_time_msr address every time before reading the value of tsc_timestamp from guest's kvmclock page. There is no other code paths which ensure that qemu has an up-to-date value of system_time_msr. So, force this update on guest's tsc_timestamp reading. This bug causes effect on those nested setups which turn off TPR access interception for L2 guests and that access being intercepted by L0 doesn't show up in L1. Linux bootstrap initiate kvmclock before APIC initializing causing TPR access. That's why on L1 guests, having TPR interception turned on for L2, the effect of the bug is not revealed. This patch fixes this problem by making sure it knows the correct system_time_msr address every time it is needed. Signed-off-by: Denis Plotnikov <dplotnikov@virtuozzo.com> Message-Id: <1496054944-25623-1-git-send-email-dplotnikov@virtuozzo.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'hw/i386/kvm')
-rw-r--r--hw/i386/kvm/clock.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/hw/i386/kvm/clock.c b/hw/i386/kvm/clock.c
index 13eca37..363d1b5 100644
--- a/hw/i386/kvm/clock.c
+++ b/hw/i386/kvm/clock.c
@@ -19,6 +19,7 @@
#include "qemu/host-utils.h"
#include "sysemu/sysemu.h"
#include "sysemu/kvm.h"
+#include "sysemu/hw_accel.h"
#include "kvm_i386.h"
#include "hw/sysbus.h"
#include "hw/kvm/clock.h"
@@ -69,6 +70,8 @@ static uint64_t kvmclock_current_nsec(KVMClockState *s)
uint64_t nsec_hi;
uint64_t nsec;
+ cpu_synchronize_state(cpu);
+
if (!(env->system_time_msr & 1ULL)) {
/* KVM clock not active */
return 0;