-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
KVM: VMX: split list of shadowed VMCS field to a separate file
Prepare for multiple inclusions of the list. Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
- Loading branch information
Paolo Bonzini
authored and
Radim Krčmář
committed
Jan 16, 2018
1 parent
58e9ffa
commit c9e9dea
Showing
2 changed files
with
75 additions
and
60 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,71 @@ | ||
#ifndef SHADOW_FIELD_RO | ||
#define SHADOW_FIELD_RO(x) | ||
#endif | ||
#ifndef SHADOW_FIELD_RW | ||
#define SHADOW_FIELD_RW(x) | ||
#endif | ||
|
||
/* | ||
* We do NOT shadow fields that are modified when L0 | ||
* traps and emulates any vmx instruction (e.g. VMPTRLD, | ||
* VMXON...) executed by L1. | ||
* For example, VM_INSTRUCTION_ERROR is read | ||
* by L1 if a vmx instruction fails (part of the error path). | ||
* Note the code assumes this logic. If for some reason | ||
* we start shadowing these fields then we need to | ||
* force a shadow sync when L0 emulates vmx instructions | ||
* (e.g. force a sync if VM_INSTRUCTION_ERROR is modified | ||
* by nested_vmx_failValid) | ||
* | ||
* Keeping the fields ordered by size is an attempt at improving | ||
* branch prediction in vmcs_read_any and vmcs_write_any. | ||
*/ | ||
|
||
/* 16-bits */ | ||
SHADOW_FIELD_RW(GUEST_CS_SELECTOR) | ||
SHADOW_FIELD_RW(GUEST_INTR_STATUS) | ||
SHADOW_FIELD_RW(GUEST_PML_INDEX) | ||
SHADOW_FIELD_RW(HOST_FS_SELECTOR) | ||
SHADOW_FIELD_RW(HOST_GS_SELECTOR) | ||
|
||
/* 32-bits */ | ||
SHADOW_FIELD_RO(VM_EXIT_REASON) | ||
SHADOW_FIELD_RO(VM_EXIT_INTR_INFO) | ||
SHADOW_FIELD_RO(VM_EXIT_INSTRUCTION_LEN) | ||
SHADOW_FIELD_RO(IDT_VECTORING_INFO_FIELD) | ||
SHADOW_FIELD_RO(IDT_VECTORING_ERROR_CODE) | ||
SHADOW_FIELD_RO(VM_EXIT_INTR_ERROR_CODE) | ||
SHADOW_FIELD_RW(CPU_BASED_VM_EXEC_CONTROL) | ||
SHADOW_FIELD_RW(EXCEPTION_BITMAP) | ||
SHADOW_FIELD_RW(VM_ENTRY_EXCEPTION_ERROR_CODE) | ||
SHADOW_FIELD_RW(VM_ENTRY_INTR_INFO_FIELD) | ||
SHADOW_FIELD_RW(VM_ENTRY_INSTRUCTION_LEN) | ||
SHADOW_FIELD_RW(TPR_THRESHOLD) | ||
SHADOW_FIELD_RW(GUEST_CS_LIMIT) | ||
SHADOW_FIELD_RW(GUEST_CS_AR_BYTES) | ||
SHADOW_FIELD_RW(GUEST_INTERRUPTIBILITY_INFO) | ||
SHADOW_FIELD_RW(VMX_PREEMPTION_TIMER_VALUE) | ||
|
||
/* Natural width */ | ||
SHADOW_FIELD_RO(EXIT_QUALIFICATION) | ||
SHADOW_FIELD_RO(GUEST_LINEAR_ADDRESS) | ||
SHADOW_FIELD_RW(GUEST_RIP) | ||
SHADOW_FIELD_RW(GUEST_RSP) | ||
SHADOW_FIELD_RW(GUEST_CR0) | ||
SHADOW_FIELD_RW(GUEST_CR3) | ||
SHADOW_FIELD_RW(GUEST_CR4) | ||
SHADOW_FIELD_RW(GUEST_RFLAGS) | ||
SHADOW_FIELD_RW(GUEST_CS_BASE) | ||
SHADOW_FIELD_RW(GUEST_ES_BASE) | ||
SHADOW_FIELD_RW(CR0_GUEST_HOST_MASK) | ||
SHADOW_FIELD_RW(CR0_READ_SHADOW) | ||
SHADOW_FIELD_RW(CR4_READ_SHADOW) | ||
SHADOW_FIELD_RW(HOST_FS_BASE) | ||
SHADOW_FIELD_RW(HOST_GS_BASE) | ||
|
||
/* 64-bit */ | ||
SHADOW_FIELD_RO(GUEST_PHYSICAL_ADDRESS) | ||
SHADOW_FIELD_RO(GUEST_PHYSICAL_ADDRESS_HIGH) | ||
|
||
#undef SHADOW_FIELD_RO | ||
#undef SHADOW_FIELD_RW |