diff options
author | Abel Gordon <abelg@il.ibm.com> | 2013-04-18 07:39:55 -0400 |
---|---|---|
committer | Gleb Natapov <gleb@redhat.com> | 2013-04-22 03:52:55 -0400 |
commit | 8a1b9dd0006bce5cc770fd80bc95f9916670c151 (patch) | |
tree | f0faef1346c67ca8d156912613082fd1938aec50 /arch/x86 | |
parent | 012f83cb2f8d7b9b7ad3b65e7e53a9365a357014 (diff) |
KVM: nVMX: Enable and disable shadow vmcs functionality
Once L1 loads VMCS12 we enable shadow-vmcs capability and copy all the VMCS12
shadowed fields to the shadow vmcs. When we release the VMCS12, we also
disable shadow-vmcs capability.
Signed-off-by: Abel Gordon <abelg@il.ibm.com>
Reviewed-by: Orit Wasserman <owasserm@redhat.com>
Signed-off-by: Gleb Natapov <gleb@redhat.com>
Diffstat (limited to 'arch/x86')
-rw-r--r-- | arch/x86/kvm/vmx.c | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index c5baecc37c98..6abce2d5d18e 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c | |||
@@ -5616,12 +5616,17 @@ static int nested_vmx_check_permission(struct kvm_vcpu *vcpu) | |||
5616 | 5616 | ||
5617 | static inline void nested_release_vmcs12(struct vcpu_vmx *vmx) | 5617 | static inline void nested_release_vmcs12(struct vcpu_vmx *vmx) |
5618 | { | 5618 | { |
5619 | u32 exec_control; | ||
5619 | if (enable_shadow_vmcs) { | 5620 | if (enable_shadow_vmcs) { |
5620 | if (vmx->nested.current_vmcs12 != NULL) { | 5621 | if (vmx->nested.current_vmcs12 != NULL) { |
5621 | /* copy to memory all shadowed fields in case | 5622 | /* copy to memory all shadowed fields in case |
5622 | they were modified */ | 5623 | they were modified */ |
5623 | copy_shadow_to_vmcs12(vmx); | 5624 | copy_shadow_to_vmcs12(vmx); |
5624 | vmx->nested.sync_shadow_vmcs = false; | 5625 | vmx->nested.sync_shadow_vmcs = false; |
5626 | exec_control = vmcs_read32(SECONDARY_VM_EXEC_CONTROL); | ||
5627 | exec_control &= ~SECONDARY_EXEC_SHADOW_VMCS; | ||
5628 | vmcs_write32(SECONDARY_VM_EXEC_CONTROL, exec_control); | ||
5629 | vmcs_write64(VMCS_LINK_POINTER, -1ull); | ||
5625 | } | 5630 | } |
5626 | } | 5631 | } |
5627 | kunmap(vmx->nested.current_vmcs12_page); | 5632 | kunmap(vmx->nested.current_vmcs12_page); |
@@ -6110,6 +6115,7 @@ static int handle_vmptrld(struct kvm_vcpu *vcpu) | |||
6110 | gva_t gva; | 6115 | gva_t gva; |
6111 | gpa_t vmptr; | 6116 | gpa_t vmptr; |
6112 | struct x86_exception e; | 6117 | struct x86_exception e; |
6118 | u32 exec_control; | ||
6113 | 6119 | ||
6114 | if (!nested_vmx_check_permission(vcpu)) | 6120 | if (!nested_vmx_check_permission(vcpu)) |
6115 | return 1; | 6121 | return 1; |
@@ -6155,6 +6161,11 @@ static int handle_vmptrld(struct kvm_vcpu *vcpu) | |||
6155 | vmx->nested.current_vmcs12 = new_vmcs12; | 6161 | vmx->nested.current_vmcs12 = new_vmcs12; |
6156 | vmx->nested.current_vmcs12_page = page; | 6162 | vmx->nested.current_vmcs12_page = page; |
6157 | if (enable_shadow_vmcs) { | 6163 | if (enable_shadow_vmcs) { |
6164 | exec_control = vmcs_read32(SECONDARY_VM_EXEC_CONTROL); | ||
6165 | exec_control |= SECONDARY_EXEC_SHADOW_VMCS; | ||
6166 | vmcs_write32(SECONDARY_VM_EXEC_CONTROL, exec_control); | ||
6167 | vmcs_write64(VMCS_LINK_POINTER, | ||
6168 | __pa(vmx->nested.current_shadow_vmcs)); | ||
6158 | vmx->nested.sync_shadow_vmcs = true; | 6169 | vmx->nested.sync_shadow_vmcs = true; |
6159 | } | 6170 | } |
6160 | } | 6171 | } |