aboutsummaryrefslogtreecommitdiffstats
path: root/arch/x86
diff options
context:
space:
mode:
authorAbel Gordon <abelg@il.ibm.com>2013-04-18 07:39:55 -0400
committerGleb Natapov <gleb@redhat.com>2013-04-22 03:52:55 -0400
commit8a1b9dd0006bce5cc770fd80bc95f9916670c151 (patch)
treef0faef1346c67ca8d156912613082fd1938aec50 /arch/x86
parent012f83cb2f8d7b9b7ad3b65e7e53a9365a357014 (diff)
KVM: nVMX: Enable and disable shadow vmcs functionality
Once L1 loads VMCS12 we enable shadow-vmcs capability and copy all the VMCS12 shadowed fields to the shadow vmcs. When we release the VMCS12, we also disable shadow-vmcs capability. Signed-off-by: Abel Gordon <abelg@il.ibm.com> Reviewed-by: Orit Wasserman <owasserm@redhat.com> Signed-off-by: Gleb Natapov <gleb@redhat.com>
Diffstat (limited to 'arch/x86')
-rw-r--r--arch/x86/kvm/vmx.c11
1 files changed, 11 insertions, 0 deletions
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index c5baecc37c98..6abce2d5d18e 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -5616,12 +5616,17 @@ static int nested_vmx_check_permission(struct kvm_vcpu *vcpu)
5616 5616
5617static inline void nested_release_vmcs12(struct vcpu_vmx *vmx) 5617static inline void nested_release_vmcs12(struct vcpu_vmx *vmx)
5618{ 5618{
5619 u32 exec_control;
5619 if (enable_shadow_vmcs) { 5620 if (enable_shadow_vmcs) {
5620 if (vmx->nested.current_vmcs12 != NULL) { 5621 if (vmx->nested.current_vmcs12 != NULL) {
5621 /* copy to memory all shadowed fields in case 5622 /* copy to memory all shadowed fields in case
5622 they were modified */ 5623 they were modified */
5623 copy_shadow_to_vmcs12(vmx); 5624 copy_shadow_to_vmcs12(vmx);
5624 vmx->nested.sync_shadow_vmcs = false; 5625 vmx->nested.sync_shadow_vmcs = false;
5626 exec_control = vmcs_read32(SECONDARY_VM_EXEC_CONTROL);
5627 exec_control &= ~SECONDARY_EXEC_SHADOW_VMCS;
5628 vmcs_write32(SECONDARY_VM_EXEC_CONTROL, exec_control);
5629 vmcs_write64(VMCS_LINK_POINTER, -1ull);
5625 } 5630 }
5626 } 5631 }
5627 kunmap(vmx->nested.current_vmcs12_page); 5632 kunmap(vmx->nested.current_vmcs12_page);
@@ -6110,6 +6115,7 @@ static int handle_vmptrld(struct kvm_vcpu *vcpu)
6110 gva_t gva; 6115 gva_t gva;
6111 gpa_t vmptr; 6116 gpa_t vmptr;
6112 struct x86_exception e; 6117 struct x86_exception e;
6118 u32 exec_control;
6113 6119
6114 if (!nested_vmx_check_permission(vcpu)) 6120 if (!nested_vmx_check_permission(vcpu))
6115 return 1; 6121 return 1;
@@ -6155,6 +6161,11 @@ static int handle_vmptrld(struct kvm_vcpu *vcpu)
6155 vmx->nested.current_vmcs12 = new_vmcs12; 6161 vmx->nested.current_vmcs12 = new_vmcs12;
6156 vmx->nested.current_vmcs12_page = page; 6162 vmx->nested.current_vmcs12_page = page;
6157 if (enable_shadow_vmcs) { 6163 if (enable_shadow_vmcs) {
6164 exec_control = vmcs_read32(SECONDARY_VM_EXEC_CONTROL);
6165 exec_control |= SECONDARY_EXEC_SHADOW_VMCS;
6166 vmcs_write32(SECONDARY_VM_EXEC_CONTROL, exec_control);
6167 vmcs_write64(VMCS_LINK_POINTER,
6168 __pa(vmx->nested.current_shadow_vmcs));
6158 vmx->nested.sync_shadow_vmcs = true; 6169 vmx->nested.sync_shadow_vmcs = true;
6159 } 6170 }
6160 } 6171 }