Re: [PATCH 3/5] KVM: nVMX: add enlightened VMCS state
From: Vitaly Kuznetsov
Date: Fri Jun 15 2018 - 06:33:43 EST
Liran Alon <liran.alon@xxxxxxxxxx> writes:
> ----- vkuznets@xxxxxxxxxx wrote:
>
>> Adds hv_evmcs pointer and implement copy_enlightened_to_vmcs12() and
>> copy_enlightened_to_vmcs12().
>>
>> prepare_vmcs02()/prepare_vmcs02_full() separation is not valid for
>> Enlightened VMCS, do full sync for now.
>>
>> Suggested-by: Ladi Prosek <lprosek@xxxxxxxxxx>
>> Signed-off-by: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
>> ---
>> arch/x86/kvm/vmx.c | 431
>> +++++++++++++++++++++++++++++++++++++++++++++++++++--
>> 1 file changed, 417 insertions(+), 14 deletions(-)
>>
>> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
>> index 51749207cef1..e7fa9f9c6e36 100644
>> --- a/arch/x86/kvm/vmx.c
>> +++ b/arch/x86/kvm/vmx.c
>> @@ -640,10 +640,10 @@ struct nested_vmx {
>> */
>> struct vmcs12 *cached_vmcs12;
>> /*
>> - * Indicates if the shadow vmcs must be updated with the
>> - * data hold by vmcs12
>> + * Indicates if the shadow vmcs or enlightened vmcs must be updated
>> + * with the data held by struct vmcs12.
>> */
>> - bool sync_shadow_vmcs;
>> + bool need_vmcs12_sync;
>> bool dirty_vmcs12;
>>
>> bool change_vmcs01_virtual_apic_mode;
>> @@ -689,6 +689,8 @@ struct nested_vmx {
>> /* in guest mode on SMM entry? */
>> bool guest_mode;
>> } smm;
>> +
>> + struct hv_enlightened_vmcs *hv_evmcs;
>> };
>>
>> #define POSTED_INTR_ON 0
>> @@ -8010,7 +8012,7 @@ static inline void nested_release_vmcs12(struct
>> vcpu_vmx *vmx)
>> /* copy to memory all shadowed fields in case
>> they were modified */
>> copy_shadow_to_vmcs12(vmx);
>> - vmx->nested.sync_shadow_vmcs = false;
>> + vmx->nested.need_vmcs12_sync = false;
>> vmx_disable_shadow_vmcs(vmx);
>> }
>> vmx->nested.posted_intr_nv = -1;
>> @@ -8187,6 +8189,393 @@ static inline int vmcs12_write_any(struct
>> kvm_vcpu *vcpu,
>>
>> }
>>
>> +static int copy_enlightened_to_vmcs12(struct vcpu_vmx *vmx, bool
>> full)
>> +{
>> + struct vmcs12 *vmcs12 = vmx->nested.cached_vmcs12;
>> + struct hv_enlightened_vmcs *evmcs = vmx->nested.hv_evmcs;
>> +
>> + /* HV_VMX_ENLIGHTENED_CLEAN_FIELD_NONE */
>> + vmcs12->tpr_threshold = evmcs->tpr_threshold;
>> + vmcs12->guest_rip = evmcs->guest_rip;
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_GUEST_BASIC))) {
>> + vmcs12->guest_rsp = evmcs->guest_rsp;
>> + vmcs12->guest_rflags = evmcs->guest_rflags;
>> + vmcs12->guest_interruptibility_info =
>> + evmcs->guest_interruptibility_info;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_CONTROL_PROC))) {
>> + vmcs12->cpu_based_vm_exec_control =
>> + evmcs->cpu_based_vm_exec_control;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_CONTROL_PROC))) {
>> + vmcs12->exception_bitmap = evmcs->exception_bitmap;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_CONTROL_ENTRY))) {
>> + vmcs12->vm_entry_controls = evmcs->vm_entry_controls;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_CONTROL_EVENT))) {
>> + vmcs12->vm_entry_intr_info_field =
>> + evmcs->vm_entry_intr_info_field;
>> + vmcs12->vm_entry_exception_error_code =
>> + evmcs->vm_entry_exception_error_code;
>> + vmcs12->vm_entry_instruction_len =
>> + evmcs->vm_entry_instruction_len;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_HOST_GRP1))) {
>> + vmcs12->host_ia32_pat = evmcs->host_ia32_pat;
>> + vmcs12->host_ia32_efer = evmcs->host_ia32_efer;
>> + vmcs12->host_cr0 = evmcs->host_cr0;
>> + vmcs12->host_cr3 = evmcs->host_cr3;
>> + vmcs12->host_cr4 = evmcs->host_cr4;
>> + vmcs12->host_ia32_sysenter_esp = evmcs->host_ia32_sysenter_esp;
>> + vmcs12->host_ia32_sysenter_eip = evmcs->host_ia32_sysenter_eip;
>> + vmcs12->host_rip = evmcs->host_rip;
>> + vmcs12->host_ia32_sysenter_cs = evmcs->host_ia32_sysenter_cs;
>> + vmcs12->host_es_selector = evmcs->host_es_selector;
>> + vmcs12->host_cs_selector = evmcs->host_cs_selector;
>> + vmcs12->host_ss_selector = evmcs->host_ss_selector;
>> + vmcs12->host_ds_selector = evmcs->host_ds_selector;
>> + vmcs12->host_fs_selector = evmcs->host_fs_selector;
>> + vmcs12->host_gs_selector = evmcs->host_gs_selector;
>> + vmcs12->host_tr_selector = evmcs->host_tr_selector;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_HOST_GRP1))) {
>> + vmcs12->pin_based_vm_exec_control =
>> + evmcs->pin_based_vm_exec_control;
>> + vmcs12->vm_exit_controls = evmcs->vm_exit_controls;
>> + vmcs12->secondary_vm_exec_control =
>> + evmcs->secondary_vm_exec_control;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_IO_BITMAP))) {
>> + vmcs12->io_bitmap_a = evmcs->io_bitmap_a;
>> + vmcs12->io_bitmap_b = evmcs->io_bitmap_b;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_MSR_BITMAP))) {
>> + vmcs12->msr_bitmap = evmcs->msr_bitmap;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_GUEST_GRP2))) {
>> + vmcs12->guest_es_base = evmcs->guest_es_base;
>> + vmcs12->guest_cs_base = evmcs->guest_cs_base;
>> + vmcs12->guest_ss_base = evmcs->guest_ss_base;
>> + vmcs12->guest_ds_base = evmcs->guest_ds_base;
>> + vmcs12->guest_fs_base = evmcs->guest_fs_base;
>> + vmcs12->guest_gs_base = evmcs->guest_gs_base;
>> + vmcs12->guest_ldtr_base = evmcs->guest_ldtr_base;
>> + vmcs12->guest_tr_base = evmcs->guest_tr_base;
>> + vmcs12->guest_gdtr_base = evmcs->guest_gdtr_base;
>> + vmcs12->guest_idtr_base = evmcs->guest_idtr_base;
>> + vmcs12->guest_es_limit = evmcs->guest_es_limit;
>> + vmcs12->guest_cs_limit = evmcs->guest_cs_limit;
>> + vmcs12->guest_ss_limit = evmcs->guest_ss_limit;
>> + vmcs12->guest_ds_limit = evmcs->guest_ds_limit;
>> + vmcs12->guest_fs_limit = evmcs->guest_fs_limit;
>> + vmcs12->guest_gs_limit = evmcs->guest_gs_limit;
>> + vmcs12->guest_ldtr_limit = evmcs->guest_ldtr_limit;
>> + vmcs12->guest_tr_limit = evmcs->guest_tr_limit;
>> + vmcs12->guest_gdtr_limit = evmcs->guest_gdtr_limit;
>> + vmcs12->guest_idtr_limit = evmcs->guest_idtr_limit;
>> + vmcs12->guest_es_ar_bytes = evmcs->guest_es_ar_bytes;
>> + vmcs12->guest_cs_ar_bytes = evmcs->guest_cs_ar_bytes;
>> + vmcs12->guest_ss_ar_bytes = evmcs->guest_ss_ar_bytes;
>> + vmcs12->guest_ds_ar_bytes = evmcs->guest_ds_ar_bytes;
>> + vmcs12->guest_fs_ar_bytes = evmcs->guest_fs_ar_bytes;
>> + vmcs12->guest_gs_ar_bytes = evmcs->guest_gs_ar_bytes;
>> + vmcs12->guest_ldtr_ar_bytes = evmcs->guest_ldtr_ar_bytes;
>> + vmcs12->guest_tr_ar_bytes = evmcs->guest_tr_ar_bytes;
>> + vmcs12->guest_es_selector = evmcs->guest_es_selector;
>> + vmcs12->guest_cs_selector = evmcs->guest_cs_selector;
>> + vmcs12->guest_ss_selector = evmcs->guest_ss_selector;
>> + vmcs12->guest_ds_selector = evmcs->guest_ds_selector;
>> + vmcs12->guest_fs_selector = evmcs->guest_fs_selector;
>> + vmcs12->guest_gs_selector = evmcs->guest_gs_selector;
>> + vmcs12->guest_ldtr_selector = evmcs->guest_ldtr_selector;
>> + vmcs12->guest_tr_selector = evmcs->guest_tr_selector;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_CONTROL_GRP2))) {
>> + vmcs12->tsc_offset = evmcs->tsc_offset;
>> + vmcs12->virtual_apic_page_addr = evmcs->virtual_apic_page_addr;
>> + vmcs12->xss_exit_bitmap = evmcs->xss_exit_bitmap;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_CRDR))) {
>> + vmcs12->cr0_guest_host_mask = evmcs->cr0_guest_host_mask;
>> + vmcs12->cr4_guest_host_mask = evmcs->cr4_guest_host_mask;
>> + vmcs12->cr0_read_shadow = evmcs->cr0_read_shadow;
>> + vmcs12->cr4_read_shadow = evmcs->cr4_read_shadow;
>> + vmcs12->guest_cr0 = evmcs->guest_cr0;
>> + vmcs12->guest_cr3 = evmcs->guest_cr3;
>> + vmcs12->guest_cr4 = evmcs->guest_cr4;
>> + vmcs12->guest_dr7 = evmcs->guest_dr7;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_HOST_POINTER))) {
>> + vmcs12->host_fs_base = evmcs->host_fs_base;
>> + vmcs12->host_gs_base = evmcs->host_gs_base;
>> + vmcs12->host_tr_base = evmcs->host_tr_base;
>> + vmcs12->host_gdtr_base = evmcs->host_gdtr_base;
>> + vmcs12->host_idtr_base = evmcs->host_idtr_base;
>> + vmcs12->host_rsp = evmcs->host_rsp;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_CONTROL_XLAT))) {
>> + vmcs12->ept_pointer = evmcs->ept_pointer;
>> + vmcs12->virtual_processor_id = evmcs->virtual_processor_id;
>> + }
>> +
>> + if (unlikely(full || !(evmcs->hv_clean_fields &
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_GUEST_GRP1))) {
>> + vmcs12->vmcs_link_pointer = evmcs->vmcs_link_pointer;
>> + vmcs12->guest_ia32_debugctl = evmcs->guest_ia32_debugctl;
>> + vmcs12->guest_ia32_pat = evmcs->guest_ia32_pat;
>> + vmcs12->guest_ia32_efer = evmcs->guest_ia32_efer;
>> + vmcs12->guest_pdptr0 = evmcs->guest_pdptr0;
>> + vmcs12->guest_pdptr1 = evmcs->guest_pdptr1;
>> + vmcs12->guest_pdptr2 = evmcs->guest_pdptr2;
>> + vmcs12->guest_pdptr3 = evmcs->guest_pdptr3;
>> + vmcs12->guest_pending_dbg_exceptions =
>> + evmcs->guest_pending_dbg_exceptions;
>> + vmcs12->guest_sysenter_esp = evmcs->guest_sysenter_esp;
>> + vmcs12->guest_sysenter_eip = evmcs->guest_sysenter_eip;
>> + vmcs12->guest_bndcfgs = evmcs->guest_bndcfgs;
>> + vmcs12->guest_activity_state = evmcs->guest_activity_state;
>> + vmcs12->guest_sysenter_cs = evmcs->guest_sysenter_cs;
>> + }
>> +
>> + /*
>> + * Not used?
>> + * vmcs12->vm_exit_msr_store_addr = evmcs->vm_exit_msr_store_addr;
>> + * vmcs12->vm_exit_msr_load_addr = evmcs->vm_exit_msr_load_addr;
>> + * vmcs12->vm_entry_msr_load_addr = evmcs->vm_entry_msr_load_addr;
>> + * vmcs12->cr3_target_value0 = evmcs->cr3_target_value0;
>> + * vmcs12->cr3_target_value1 = evmcs->cr3_target_value1;
>> + * vmcs12->cr3_target_value2 = evmcs->cr3_target_value2;
>> + * vmcs12->cr3_target_value3 = evmcs->cr3_target_value3;
>> + * vmcs12->page_fault_error_code_mask =
>> + * evmcs->page_fault_error_code_mask;
>> + * vmcs12->page_fault_error_code_match =
>> + * evmcs->page_fault_error_code_match;
>> + * vmcs12->cr3_target_count = evmcs->cr3_target_count;
>> + * vmcs12->vm_exit_msr_store_count =
>> evmcs->vm_exit_msr_store_count;
>> + * vmcs12->vm_exit_msr_load_count = evmcs->vm_exit_msr_load_count;
>> + * vmcs12->vm_entry_msr_load_count =
>> evmcs->vm_entry_msr_load_count;
>> + */
>> +
>> + /*
>> + * Read only fields:
>> + * vmcs12->guest_physical_address = evmcs->guest_physical_address;
>> + * vmcs12->vm_instruction_error = evmcs->vm_instruction_error;
>> + * vmcs12->vm_exit_reason = evmcs->vm_exit_reason;
>> + * vmcs12->vm_exit_intr_info = evmcs->vm_exit_intr_info;
>> + * vmcs12->vm_exit_intr_error_code =
>> evmcs->vm_exit_intr_error_code;
>> + * vmcs12->idt_vectoring_info_field =
>> evmcs->idt_vectoring_info_field;
>> + * vmcs12->idt_vectoring_error_code =
>> evmcs->idt_vectoring_error_code;
>> + * vmcs12->vm_exit_instruction_len =
>> evmcs->vm_exit_instruction_len;
>> + * vmcs12->vmx_instruction_info = evmcs->vmx_instruction_info;
>> + * vmcs12->exit_qualification = evmcs->exit_qualification;
>> + * vmcs12->guest_linear_address = evmcs->guest_linear_address;
>> + *
>> + * Not present in struct vmcs12:
>> + * vmcs12->exit_io_instruction_ecx =
>> evmcs->exit_io_instruction_ecx;
>> + * vmcs12->exit_io_instruction_esi =
>> evmcs->exit_io_instruction_esi;
>> + * vmcs12->exit_io_instruction_edi =
>> evmcs->exit_io_instruction_edi;
>> + * vmcs12->exit_io_instruction_eip =
>> evmcs->exit_io_instruction_eip;
>> + */
>> +
>> + return 0;
>> +}
>> +
>> +static int copy_vmcs12_to_enlightened(struct vcpu_vmx *vmx)
>> +{
>> + struct vmcs12 *vmcs12 = vmx->nested.cached_vmcs12;
>> + struct hv_enlightened_vmcs *evmcs = vmx->nested.hv_evmcs;
>> +
>> + /*
>> + * Should not be changed by KVM:
>> + *
>> + * evmcs->host_es_selector = vmcs12->host_es_selector;
>> + * evmcs->host_cs_selector = vmcs12->host_cs_selector;
>> + * evmcs->host_ss_selector = vmcs12->host_ss_selector;
>> + * evmcs->host_ds_selector = vmcs12->host_ds_selector;
>> + * evmcs->host_fs_selector = vmcs12->host_fs_selector;
>> + * evmcs->host_gs_selector = vmcs12->host_gs_selector;
>> + * evmcs->host_tr_selector = vmcs12->host_tr_selector;
>> + * evmcs->host_ia32_pat = vmcs12->host_ia32_pat;
>> + * evmcs->host_ia32_efer = vmcs12->host_ia32_efer;
>> + * evmcs->host_cr0 = vmcs12->host_cr0;
>> + * evmcs->host_cr3 = vmcs12->host_cr3;
>> + * evmcs->host_cr4 = vmcs12->host_cr4;
>> + * evmcs->host_ia32_sysenter_esp = vmcs12->host_ia32_sysenter_esp;
>> + * evmcs->host_ia32_sysenter_eip = vmcs12->host_ia32_sysenter_eip;
>> + * evmcs->host_rip = vmcs12->host_rip;
>> + * evmcs->host_ia32_sysenter_cs = vmcs12->host_ia32_sysenter_cs;
>> + * evmcs->host_fs_base = vmcs12->host_fs_base;
>> + * evmcs->host_gs_base = vmcs12->host_gs_base;
>> + * evmcs->host_tr_base = vmcs12->host_tr_base;
>> + * evmcs->host_gdtr_base = vmcs12->host_gdtr_base;
>> + * evmcs->host_idtr_base = vmcs12->host_idtr_base;
>> + * evmcs->host_rsp = vmcs12->host_rsp;
>> + * sync_vmcs12() doesn't read these:
>> + * evmcs->io_bitmap_a = vmcs12->io_bitmap_a;
>> + * evmcs->io_bitmap_b = vmcs12->io_bitmap_b;
>> + * evmcs->msr_bitmap = vmcs12->msr_bitmap;
>> + * evmcs->ept_pointer = vmcs12->ept_pointer;
>> + * evmcs->xss_exit_bitmap = vmcs12->xss_exit_bitmap;
>> + * evmcs->vm_exit_msr_store_addr = vmcs12->vm_exit_msr_store_addr;
>> + * evmcs->vm_exit_msr_load_addr = vmcs12->vm_exit_msr_load_addr;
>> + * evmcs->vm_entry_msr_load_addr = vmcs12->vm_entry_msr_load_addr;
>> + * evmcs->cr3_target_value0 = vmcs12->cr3_target_value0;
>> + * evmcs->cr3_target_value1 = vmcs12->cr3_target_value1;
>> + * evmcs->cr3_target_value2 = vmcs12->cr3_target_value2;
>> + * evmcs->cr3_target_value3 = vmcs12->cr3_target_value3;
>> + * evmcs->tpr_threshold = vmcs12->tpr_threshold;
>> + * evmcs->virtual_processor_id = vmcs12->virtual_processor_id;
>> + * evmcs->exception_bitmap = vmcs12->exception_bitmap;
>> + * evmcs->vmcs_link_pointer = vmcs12->vmcs_link_pointer;
>> + * evmcs->pin_based_vm_exec_control =
>> vmcs12->pin_based_vm_exec_control;
>> + * evmcs->vm_exit_controls = vmcs12->vm_exit_controls;
>> + * evmcs->secondary_vm_exec_control =
>> vmcs12->secondary_vm_exec_control;
>> + * evmcs->page_fault_error_code_mask =
>> + * vmcs12->page_fault_error_code_mask;
>> + * evmcs->page_fault_error_code_match =
>> + * vmcs12->page_fault_error_code_match;
>> + * evmcs->cr3_target_count = vmcs12->cr3_target_count;
>> + * evmcs->virtual_apic_page_addr = vmcs12->virtual_apic_page_addr;
>> + * evmcs->tsc_offset = vmcs12->tsc_offset;
>> + * evmcs->guest_ia32_debugctl = vmcs12->guest_ia32_debugctl;
>> + * evmcs->cr0_guest_host_mask = vmcs12->cr0_guest_host_mask;
>> + * evmcs->cr4_guest_host_mask = vmcs12->cr4_guest_host_mask;
>> + * evmcs->cr0_read_shadow = vmcs12->cr0_read_shadow;
>> + * evmcs->cr4_read_shadow = vmcs12->cr4_read_shadow;
>> + * evmcs->vm_exit_msr_store_count =
>> vmcs12->vm_exit_msr_store_count;
>> + * evmcs->vm_exit_msr_load_count = vmcs12->vm_exit_msr_load_count;
>> + * evmcs->vm_entry_msr_load_count =
>> vmcs12->vm_entry_msr_load_count;
>> + *
>> + * Not present in struct vmcs12:
>> + * evmcs->exit_io_instruction_ecx =
>> vmcs12->exit_io_instruction_ecx;
>> + * evmcs->exit_io_instruction_esi =
>> vmcs12->exit_io_instruction_esi;
>> + * evmcs->exit_io_instruction_edi =
>> vmcs12->exit_io_instruction_edi;
>> + * evmcs->exit_io_instruction_eip =
>> vmcs12->exit_io_instruction_eip;
>> + */
>> +
>> + evmcs->guest_es_selector = vmcs12->guest_es_selector;
>> + evmcs->guest_cs_selector = vmcs12->guest_cs_selector;
>> + evmcs->guest_ss_selector = vmcs12->guest_ss_selector;
>> + evmcs->guest_ds_selector = vmcs12->guest_ds_selector;
>> + evmcs->guest_fs_selector = vmcs12->guest_fs_selector;
>> + evmcs->guest_gs_selector = vmcs12->guest_gs_selector;
>> + evmcs->guest_ldtr_selector = vmcs12->guest_ldtr_selector;
>> + evmcs->guest_tr_selector = vmcs12->guest_tr_selector;
>> +
>> + evmcs->guest_es_limit = vmcs12->guest_es_limit;
>> + evmcs->guest_cs_limit = vmcs12->guest_cs_limit;
>> + evmcs->guest_ss_limit = vmcs12->guest_ss_limit;
>> + evmcs->guest_ds_limit = vmcs12->guest_ds_limit;
>> + evmcs->guest_fs_limit = vmcs12->guest_fs_limit;
>> + evmcs->guest_gs_limit = vmcs12->guest_gs_limit;
>> + evmcs->guest_ldtr_limit = vmcs12->guest_ldtr_limit;
>> + evmcs->guest_tr_limit = vmcs12->guest_tr_limit;
>> + evmcs->guest_gdtr_limit = vmcs12->guest_gdtr_limit;
>> + evmcs->guest_idtr_limit = vmcs12->guest_idtr_limit;
>> +
>> + evmcs->guest_es_ar_bytes = vmcs12->guest_es_ar_bytes;
>> + evmcs->guest_cs_ar_bytes = vmcs12->guest_cs_ar_bytes;
>> + evmcs->guest_ss_ar_bytes = vmcs12->guest_ss_ar_bytes;
>> + evmcs->guest_ds_ar_bytes = vmcs12->guest_ds_ar_bytes;
>> + evmcs->guest_fs_ar_bytes = vmcs12->guest_fs_ar_bytes;
>> + evmcs->guest_gs_ar_bytes = vmcs12->guest_gs_ar_bytes;
>> + evmcs->guest_ldtr_ar_bytes = vmcs12->guest_ldtr_ar_bytes;
>> + evmcs->guest_tr_ar_bytes = vmcs12->guest_tr_ar_bytes;
>> +
>> + evmcs->guest_es_base = vmcs12->guest_es_base;
>> + evmcs->guest_cs_base = vmcs12->guest_cs_base;
>> + evmcs->guest_ss_base = vmcs12->guest_ss_base;
>> + evmcs->guest_ds_base = vmcs12->guest_ds_base;
>> + evmcs->guest_fs_base = vmcs12->guest_fs_base;
>> + evmcs->guest_gs_base = vmcs12->guest_gs_base;
>> + evmcs->guest_ldtr_base = vmcs12->guest_ldtr_base;
>> + evmcs->guest_tr_base = vmcs12->guest_tr_base;
>> + evmcs->guest_gdtr_base = vmcs12->guest_gdtr_base;
>> + evmcs->guest_idtr_base = vmcs12->guest_idtr_base;
>> +
>> + evmcs->guest_ia32_pat = vmcs12->guest_ia32_pat;
>> + evmcs->guest_ia32_efer = vmcs12->guest_ia32_efer;
>> +
>> + evmcs->guest_pdptr0 = vmcs12->guest_pdptr0;
>> + evmcs->guest_pdptr1 = vmcs12->guest_pdptr1;
>> + evmcs->guest_pdptr2 = vmcs12->guest_pdptr2;
>> + evmcs->guest_pdptr3 = vmcs12->guest_pdptr3;
>> +
>> + evmcs->guest_pending_dbg_exceptions =
>> + vmcs12->guest_pending_dbg_exceptions;
>> + evmcs->guest_sysenter_esp = vmcs12->guest_sysenter_esp;
>> + evmcs->guest_sysenter_eip = vmcs12->guest_sysenter_eip;
>> +
>> + evmcs->guest_activity_state = vmcs12->guest_activity_state;
>> + evmcs->guest_sysenter_cs = vmcs12->guest_sysenter_cs;
>> +
>> + evmcs->guest_cr0 = vmcs12->guest_cr0;
>> + evmcs->guest_cr3 = vmcs12->guest_cr3;
>> + evmcs->guest_cr4 = vmcs12->guest_cr4;
>> + evmcs->guest_dr7 = vmcs12->guest_dr7;
>> +
>> + evmcs->guest_physical_address = vmcs12->guest_physical_address;
>> +
>> + evmcs->vm_instruction_error = vmcs12->vm_instruction_error;
>> + evmcs->vm_exit_reason = vmcs12->vm_exit_reason;
>> + evmcs->vm_exit_intr_info = vmcs12->vm_exit_intr_info;
>> + evmcs->vm_exit_intr_error_code = vmcs12->vm_exit_intr_error_code;
>> + evmcs->idt_vectoring_info_field = vmcs12->idt_vectoring_info_field;
>> + evmcs->idt_vectoring_error_code = vmcs12->idt_vectoring_error_code;
>> + evmcs->vm_exit_instruction_len = vmcs12->vm_exit_instruction_len;
>> + evmcs->vmx_instruction_info = vmcs12->vmx_instruction_info;
>> +
>> + evmcs->exit_qualification = vmcs12->exit_qualification;
>> +
>> + evmcs->guest_linear_address = vmcs12->guest_linear_address;
>> + evmcs->guest_rsp = vmcs12->guest_rsp;
>> + evmcs->guest_rflags = vmcs12->guest_rflags;
>> +
>> + evmcs->guest_interruptibility_info =
>> + vmcs12->guest_interruptibility_info;
>> + evmcs->cpu_based_vm_exec_control =
>> vmcs12->cpu_based_vm_exec_control;
>> + evmcs->vm_entry_controls = vmcs12->vm_entry_controls;
>> + evmcs->vm_entry_intr_info_field = vmcs12->vm_entry_intr_info_field;
>> + evmcs->vm_entry_exception_error_code =
>> + vmcs12->vm_entry_exception_error_code;
>> + evmcs->vm_entry_instruction_len = vmcs12->vm_entry_instruction_len;
>> +
>> + evmcs->guest_rip = vmcs12->guest_rip;
>> +
>> + evmcs->guest_bndcfgs = vmcs12->guest_bndcfgs;
>> +
>> + return 0;
>> +}
>> +
>> /*
>> * Copy the writable VMCS shadow fields back to the VMCS12, in case
>> * they have been modified by the L1 guest. Note that the
>> "read-only"
>> @@ -8398,7 +8787,7 @@ static void set_current_vmptr(struct vcpu_vmx
>> *vmx, gpa_t vmptr)
>> SECONDARY_EXEC_SHADOW_VMCS);
>> vmcs_write64(VMCS_LINK_POINTER,
>> __pa(vmx->vmcs01.shadow_vmcs));
>> - vmx->nested.sync_shadow_vmcs = true;
>> + vmx->nested.need_vmcs12_sync = true;
>> }
>> vmx->nested.dirty_vmcs12 = true;
>> }
>> @@ -9960,9 +10349,16 @@ static void __noclone vmx_vcpu_run(struct
>> kvm_vcpu *vcpu)
>> vmcs_write32(PLE_WINDOW, vmx->ple_window);
>> }
>>
>> - if (vmx->nested.sync_shadow_vmcs) {
>> - copy_vmcs12_to_shadow(vmx);
>> - vmx->nested.sync_shadow_vmcs = false;
>> + if (vmx->nested.need_vmcs12_sync) {
>> + if (unlikely(vmx->nested.hv_evmcs)) {
>
> Why is this marked with unlikely()?
> In L1 guest use eVMCS, we will always have this as true for vmx_vcpu_run()
> after simulating VMExit from L2 to L1. You should not have here unlikely()
> just like you don't have it in new code added to nested_vmx_run().
I think I thought "eVMCS usage is rare" but I think you're right, I'll
drop this unlikely.
>
>> + copy_vmcs12_to_enlightened(vmx);
>> + /* All fields are clean */
>> + vmx->nested.hv_evmcs->hv_clean_fields |=
>> + HV_VMX_ENLIGHTENED_CLEAN_FIELD_ALL;
>> + } else {
>> + copy_vmcs12_to_shadow(vmx);
>> + }
>> + vmx->nested.need_vmcs12_sync = false;
>> }
>>
>> if (test_bit(VCPU_REGS_RSP, (unsigned long
>> *)&vcpu->arch.regs_dirty))
>> @@ -11281,7 +11677,7 @@ static int prepare_vmcs02(struct kvm_vcpu
>> *vcpu, struct vmcs12 *vmcs12,
>> struct vcpu_vmx *vmx = to_vmx(vcpu);
>> u32 exec_control, vmcs12_exec_ctrl;
>>
>> - if (vmx->nested.dirty_vmcs12) {
>> + if (vmx->nested.dirty_vmcs12 || vmx->nested.hv_evmcs) {
>> prepare_vmcs02_full(vcpu, vmcs12);
>> vmx->nested.dirty_vmcs12 = false;
>> }
>> @@ -11757,8 +12153,13 @@ static int nested_vmx_run(struct kvm_vcpu
>> *vcpu, bool launch)
>>
>> vmcs12 = get_vmcs12(vcpu);
>>
>> - if (enable_shadow_vmcs)
>> + if (vmx->nested.hv_evmcs) {
>> + copy_enlightened_to_vmcs12(vmx, vmx->nested.dirty_vmcs12);
>> + /* Enlightened VMCS doesn't have launch state */
>> + vmcs12->launch_state = !launch;
>> + } else if (enable_shadow_vmcs) {
>> copy_shadow_to_vmcs12(vmx);
>> + }
>>
>> /*
>> * The nested entry process starts with enforcing various
>> prerequisites
>> @@ -12383,8 +12784,8 @@ static void nested_vmx_vmexit(struct kvm_vcpu
>> *vcpu, u32 exit_reason,
>> */
>> kvm_make_request(KVM_REQ_APIC_PAGE_RELOAD, vcpu);
>>
>> - if (enable_shadow_vmcs && exit_reason != -1)
>> - vmx->nested.sync_shadow_vmcs = true;
>> + if ((exit_reason != -1) && (enable_shadow_vmcs ||
>> vmx->nested.hv_evmcs))
>> + vmx->nested.need_vmcs12_sync = true;
>>
>> /* in case we halted in L2 */
>> vcpu->arch.mp_state = KVM_MP_STATE_RUNNABLE;
>> @@ -12463,12 +12864,14 @@ static void nested_vmx_entry_failure(struct
>> kvm_vcpu *vcpu,
>> struct vmcs12 *vmcs12,
>> u32 reason, unsigned long qualification)
>> {
>> + struct vcpu_vmx *vmx = to_vmx(vcpu);
>> +
>> load_vmcs12_host_state(vcpu, vmcs12);
>> vmcs12->vm_exit_reason = reason | VMX_EXIT_REASONS_FAILED_VMENTRY;
>> vmcs12->exit_qualification = qualification;
>> nested_vmx_succeed(vcpu);
>> - if (enable_shadow_vmcs)
>> - to_vmx(vcpu)->nested.sync_shadow_vmcs = true;
>> + if (enable_shadow_vmcs || vmx->nested.hv_evmcs)
>> + vmx->nested.need_vmcs12_sync = true;
>> }
>>
>> static int vmx_check_intercept(struct kvm_vcpu *vcpu,
>> --
>> 2.14.4
--
Vitaly