Re: [PATCH 10/10] KVM: nVMX: Enable and disable shadow vmcs functionality

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Apr 17, 2013 at 02:55:40PM +0300, Abel Gordon wrote:
> Once L1 loads VMCS12 we enable shadow-vmcs capability and copy all the VMCS12
> shadowed fields to the shadow vmcs.  When we release the VMCS12, we also
> disable shadow-vmcs capability.
> 
> Signed-off-by: Abel Gordon <abelg@xxxxxxxxxx>
> ---
>  arch/x86/kvm/vmx.c |   11 +++++++++++
>  1 file changed, 11 insertions(+)
> 
> --- .before/arch/x86/kvm/vmx.c	2013-04-17 14:20:51.000000000 +0300
> +++ .after/arch/x86/kvm/vmx.c	2013-04-17 14:20:51.000000000 +0300
> @@ -5590,12 +5590,17 @@ static int nested_vmx_check_permission(s
>  
>  static inline void nested_release_vmcs12(struct vcpu_vmx *vmx)
>  {
> +	u32 exec_control;
>  	if (enable_shadow_vmcs) {
>  		if (vmx->nested.current_vmcs12 != NULL) {
>  			/* copy to memory all shadowed fields in case
>  			   they were modified */
>  			copy_shadow_to_vmcs12(vmx);
>  			vmx->nested.sync_shadow_vmcs = false;
> +			exec_control = vmcs_read32(SECONDARY_VM_EXEC_CONTROL);
> +			exec_control &= ~SECONDARY_EXEC_SHADOW_VMCS;
> +			vmcs_write32(SECONDARY_VM_EXEC_CONTROL, exec_control);
> +			vmcs_write64(VMCS_LINK_POINTER, -1ull);
>  			free_vmcs(vmx->nested.current_shadow_vmcs);
>  		}
>  	}
> @@ -6084,6 +6089,7 @@ static int handle_vmptrld(struct kvm_vcp
>  	gpa_t vmptr;
>  	struct x86_exception e;
>  	struct vmcs *shadow_vmcs;
> +	u32 exec_control;
>  
>  	if (!nested_vmx_check_permission(vcpu))
>  		return 1;
> @@ -6140,6 +6146,11 @@ static int handle_vmptrld(struct kvm_vcp
>  			/* init shadow vmcs */
>  			vmcs_clear(shadow_vmcs);
>  			vmx->nested.current_shadow_vmcs = shadow_vmcs;
> +			exec_control = vmcs_read32(SECONDARY_VM_EXEC_CONTROL);
> +			exec_control |= SECONDARY_EXEC_SHADOW_VMCS;
> +			vmcs_write32(SECONDARY_VM_EXEC_CONTROL, exec_control);
> +			vmcs_write64(VMCS_LINK_POINTER,
> +				     __pa(shadow_vmcs));
How hard would it be to disable shadowing for individual vmcs if shadow
vmcs allocation fails? It bothers me a little that we can fail perfectly
valid vmptrld() because of failed allocation.


>  			vmx->nested.sync_shadow_vmcs = true;
>  		}
>  	}
> 
> --
> To unsubscribe from this list: send the line "unsubscribe kvm" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html


--
			Gleb.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux