Add support for get/set of nested state when Enlightened VMCS is in use.
A new KVM_STATE_NESTED_EVMCS flag to indicate eVMCS on the vCPU was enabled
is added.

Signed-off-by: Vitaly Kuznetsov <[email protected]>
---
 arch/x86/include/uapi/asm/kvm.h |  1 +
 arch/x86/kvm/vmx.c              | 54 +++++++++++++++++++++++++++++------------
 arch/x86/kvm/x86.c              |  6 +++--
 3 files changed, 43 insertions(+), 18 deletions(-)

diff --git a/arch/x86/include/uapi/asm/kvm.h b/arch/x86/include/uapi/asm/kvm.h
index 86299efa804a..0b45bd0ea13b 100644
--- a/arch/x86/include/uapi/asm/kvm.h
+++ b/arch/x86/include/uapi/asm/kvm.h
@@ -380,6 +380,7 @@ struct kvm_sync_regs {
 
 #define KVM_STATE_NESTED_GUEST_MODE    0x00000001
 #define KVM_STATE_NESTED_RUN_PENDING   0x00000002
+#define KVM_STATE_NESTED_EVMCS         0x00000004
 
 #define KVM_STATE_NESTED_SMM_GUEST_MODE        0x00000001
 #define KVM_STATE_NESTED_SMM_VMXON     0x00000002
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 6eb86991ca60..81b36eeec95b 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -1448,7 +1448,8 @@ static int nested_enable_evmcs(struct kvm_vcpu *vcpu,
         * maximum supported version. KVM supports versions from 1 to
         * KVM_EVMCS_VERSION.
         */
-       *vmcs_version = (KVM_EVMCS_VERSION << 8) | 1;
+       if (vmcs_version)
+               *vmcs_version = (KVM_EVMCS_VERSION << 8) | 1;
 
        vmx->nested.msrs.pinbased_ctls_high &= ~EVMCS1_UNSUPPORTED_PINCTRL;
        vmx->nested.msrs.entry_ctls_high &= ~EVMCS1_UNSUPPORTED_VMENTRY_CTRL;
@@ -14036,16 +14037,16 @@ static int vmx_get_nested_state(struct kvm_vcpu *vcpu,
        vmx = to_vmx(vcpu);
        vmcs12 = get_vmcs12(vcpu);
 
-       /* FIXME: Enlightened VMCS is currently unsupported */
-       if (vmx->nested.hv_evmcs)
-               return -ENOTSUPP;
+       if (nested_vmx_allowed(vcpu) && vmx->nested.enlightened_vmcs_enabled)
+               kvm_state.flags |= KVM_STATE_NESTED_EVMCS;
 
        if (nested_vmx_allowed(vcpu) &&
            (vmx->nested.vmxon || vmx->nested.smm.vmxon)) {
                kvm_state.vmx.vmxon_pa = vmx->nested.vmxon_ptr;
                kvm_state.vmx.vmcs_pa = vmx->nested.current_vmptr;
 
-               if (vmx->nested.current_vmptr != -1ull) {
+               if (vmx->nested.current_vmptr != -1ull ||
+                   vmx->nested.hv_evmcs) {
                        kvm_state.size += VMCS12_SIZE;
 
                        if (is_guest_mode(vcpu) &&
@@ -14074,20 +14075,34 @@ static int vmx_get_nested_state(struct kvm_vcpu *vcpu,
        if (copy_to_user(user_kvm_nested_state, &kvm_state, sizeof(kvm_state)))
                return -EFAULT;
 
-       if (vmx->nested.current_vmptr == -1ull)
+       if (vmx->nested.current_vmptr == -1ull && !vmx->nested.hv_evmcs)
                goto out;
 
        /*
         * When running L2, the authoritative vmcs12 state is in the
         * vmcs02. When running L1, the authoritative vmcs12 state is
-        * in the shadow vmcs linked to vmcs01, unless
-        * sync_shadow_vmcs is set, in which case, the authoritative
-        * vmcs12 state is in the vmcs12 already.
+        * in the shadow or enlightened vmcs linked to vmcs01. In case
+        * need_vmcs12_sync is set the authoritative vmcs12 state is in
+        * the vmcs12 already.
         */
-       if (is_guest_mode(vcpu))
+       if (is_guest_mode(vcpu)) {
                sync_vmcs12(vcpu, vmcs12);
-       else if (enable_shadow_vmcs && !vmx->nested.need_vmcs12_sync)
-               copy_shadow_to_vmcs12(vmx);
+               /*
+                * Save Enlightened VMCS is to guest's memory here while we
+                * still have it mapped and avoid doing enlightened vmptrld
+                * on restore (this will require reading VP assist page so
+                * we must be sure MSRs are already restored). Unlike with
+                * shadow VMCS the format is know and can't change across
+                * migration.
+                */
+               if (vmx->nested.hv_evmcs)
+                       copy_vmcs12_to_enlightened(vmx);
+       } else if (!vmx->nested.need_vmcs12_sync) {
+               if (vmx->nested.hv_evmcs)
+                       copy_enlightened_to_vmcs12(vmx);
+               else if (enable_shadow_vmcs)
+                       copy_shadow_to_vmcs12(vmx);
+       }
 
        if (copy_to_user(user_kvm_nested_state->data, vmcs12, sizeof(*vmcs12)))
                return -EFAULT;
@@ -14115,6 +14130,9 @@ static int vmx_set_nested_state(struct kvm_vcpu *vcpu,
        if (kvm_state->format != 0)
                return -EINVAL;
 
+       if (kvm_state->flags & KVM_STATE_NESTED_EVMCS)
+               nested_enable_evmcs(vcpu, NULL);
+
        if (!nested_vmx_allowed(vcpu))
                return kvm_state->vmx.vmxon_pa == -1ull ? 0 : -EINVAL;
 
@@ -14157,11 +14175,15 @@ static int vmx_set_nested_state(struct kvm_vcpu *vcpu,
        if (kvm_state->size < sizeof(kvm_state) + sizeof(*vmcs12))
                return 0;
 
-       if (kvm_state->vmx.vmcs_pa == kvm_state->vmx.vmxon_pa ||
-           !page_address_valid(vcpu, kvm_state->vmx.vmcs_pa))
-               return -EINVAL;
+       if (kvm_state->vmx.vmcs_pa != -1ull) {
+               if (kvm_state->vmx.vmcs_pa == kvm_state->vmx.vmxon_pa ||
+                   !page_address_valid(vcpu, kvm_state->vmx.vmcs_pa))
+                       return -EINVAL;
 
-       set_current_vmptr(vmx, kvm_state->vmx.vmcs_pa);
+               set_current_vmptr(vmx, kvm_state->vmx.vmcs_pa);
+       } else if (!(kvm_state->flags & KVM_STATE_NESTED_EVMCS)) {
+               return -EINVAL;
+       }
 
        if (kvm_state->vmx.smm.flags & KVM_STATE_NESTED_SMM_VMXON) {
                vmx->nested.smm.vmxon = true;
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 22ca77e727f5..cabd03d1b8cb 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -4026,11 +4026,13 @@ long kvm_arch_vcpu_ioctl(struct file *filp,
                        return -EINVAL;
 
                if (kvm_state.flags &
-                   ~(KVM_STATE_NESTED_RUN_PENDING | 
KVM_STATE_NESTED_GUEST_MODE))
+                   ~(KVM_STATE_NESTED_RUN_PENDING | KVM_STATE_NESTED_GUEST_MODE
+                     | KVM_STATE_NESTED_EVMCS))
                        return -EINVAL;
 
                /* nested_run_pending implies guest_mode.  */
-               if (kvm_state.flags == KVM_STATE_NESTED_RUN_PENDING)
+               if ((kvm_state.flags & KVM_STATE_NESTED_RUN_PENDING)
+                   && !(kvm_state.flags & KVM_STATE_NESTED_GUEST_MODE))
                        return -EINVAL;
 
                r = kvm_x86_ops->set_nested_state(vcpu, user_kvm_nested_state, 
&kvm_state);
-- 
2.14.4

Reply via email to