From patchwork Fri Feb 14 09:29:27 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Roger_Pau_Monn=C3=A9?= X-Patchwork-Id: 13974642 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 614A4C02198 for ; Fri, 14 Feb 2025 09:30:16 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.888662.1298004 (Exim 4.92) (envelope-from ) id 1tis1G-0004wn-Fd; Fri, 14 Feb 2025 09:29:58 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 888662.1298004; Fri, 14 Feb 2025 09:29:58 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tis1G-0004wg-Cn; Fri, 14 Feb 2025 09:29:58 +0000 Received: by outflank-mailman (input) for mailman id 888662; Fri, 14 Feb 2025 09:29:57 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tis1F-0004wC-GO for xen-devel@lists.xenproject.org; Fri, 14 Feb 2025 09:29:57 +0000 Received: from mail-ej1-x62b.google.com (mail-ej1-x62b.google.com [2a00:1450:4864:20::62b]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 404df216-eab6-11ef-9896-31a8f345e629; Fri, 14 Feb 2025 10:29:55 +0100 (CET) Received: by mail-ej1-x62b.google.com with SMTP id a640c23a62f3a-aba868c6e88so5780766b.2 for ; Fri, 14 Feb 2025 01:29:55 -0800 (PST) Received: from localhost ([84.78.159.3]) by smtp.gmail.com with ESMTPSA id 4fb4d7f45d1cf-5dece1c43a0sm2620484a12.28.2025.02.14.01.29.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 14 Feb 2025 01:29:54 -0800 (PST) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 404df216-eab6-11ef-9896-31a8f345e629 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=citrix.com; s=google; t=1739525395; x=1740130195; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=OLL0Cu2im+2s7soMt+7n0C+aAoH5FL3BBfhVGKeMFWE=; b=I2azivfEw3GXRhzjyqHD4GZz2qDhrHE8mJqQu2s2Y/xdNwzJC9xMDqkYpoBYR6tQaZ ERETabLxdO+ziMjcV6jgAVNRpzBVZxQmwlRRqgs7xQtbw9k4E5zucJuJYEA3wR3ySWpU mJqIlVV2tXhUErIMuPoZ1iYLdJMviiZ3B/KGo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1739525395; x=1740130195; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=OLL0Cu2im+2s7soMt+7n0C+aAoH5FL3BBfhVGKeMFWE=; b=wuQNfzFNKBZ1r4AmRfW25Mt3/WFts0yGWB8ilFgWx3CtUxxYWjySSO9RToJUMCT6uf 5RHjjHbupJIVQUbG3n5VUgZL2uaEStrT6/aHBQapk/vKmD5DXhtypQmyAEn1CX2w16bq ptqCpjnslvddRw3Fz743mBlsGVFUUyoIDzeWvj2OJm849kRELPOkBMolEFXRcRcwh9hE hIA4SwWD6MXElMtUHGsShnAcri3tJ5cRIrJ6TS6crYu6QlgSde+CSAf4TgqeRceNbrP9 4Pi0ZAnCq+/KRw1PD1biisBcvmEiDB1LrDoQPgGKh8Z3VmaL/cudpR+D/1mpeYIWcoiC Viug== X-Gm-Message-State: AOJu0Yx5Vmt2GqnCFxwFhLg3Yu4jgJYfGLqo3mnx1s0fPsBO85bD6EP0 lZz8q6X/9shgfAoPraS81f4SLlsgn+5RVwu69HHgkOyhxs+dykd08oM9bagZUm9HeSCn9GUOcwr R X-Gm-Gg: ASbGncu5opW0Y1s8hFdWdgZ1WtRSiuezJEaaeZOm6ZXHxUNlnz1xuCTzZydA3wP8FNo jZPKst3unWhgzwE2mh1JVsCwHAWiChelcqOM9z16TwM/Qq6sM9fgSPPyiPOqPQcPYZ4DcIvnMru mcY9gANh7Zw8nOCCVEx6VZeqUL57h4zoBGcsqDKLiNXz57NZcTRbB2/5w7VmX5Faf8mJqprwuBO VM09m4ZZWWSvwb5tzz+MyE4XFH8mjHPAOKoZry2h4XDuoJLmaEuMUV0lrZnrlTNVxhPZjy0Zbi7 nI3LladdRbcur9oa9hiHlPBC6Q== X-Google-Smtp-Source: AGHT+IFfUv1SX/hbJsebXW64LoqO4z+xKfYYYcxyFEuF98CtB+fGpEpf0TJLAgmBv4HUBcG+PSmUkA== X-Received: by 2002:a17:907:6d0e:b0:aba:667d:7cd6 with SMTP id a640c23a62f3a-aba667d805fmr235657566b.18.1739525394889; Fri, 14 Feb 2025 01:29:54 -0800 (PST) From: Roger Pau Monne To: xen-devel@lists.xenproject.org Cc: Roger Pau Monne , Jan Beulich , Andrew Cooper Subject: [PATCH 1/2] x86/emul: dump unhandled memory accesses for PVH dom0 Date: Fri, 14 Feb 2025 10:29:27 +0100 Message-ID: <20250214092928.28932-2-roger.pau@citrix.com> X-Mailer: git-send-email 2.46.0 In-Reply-To: <20250214092928.28932-1-roger.pau@citrix.com> References: <20250214092928.28932-1-roger.pau@citrix.com> MIME-Version: 1.0 A PV dom0 can map any host memory as long as it's allowed by the IO capability range in d->iomem_caps. On the other hand, a PVH dom0 has no way to populate MMIO region onto it's p2m, so it's limited to what Xen initially populates on the p2m based on the host memory map and the enabled device BARs. Introduce a new debug build only printk that reports attempts by dom0 to access addresses not populated on the p2m, and not handled by any emulator. This is for information purposes only, but might allow getting an idea of what MMIO ranges might be missing on the p2m. Signed-off-by: Roger Pau Monné Acked-by: Jan Beulich --- xen/arch/x86/hvm/emulate.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/xen/arch/x86/hvm/emulate.c b/xen/arch/x86/hvm/emulate.c index 0d90cc4598be..8aa7e49c056c 100644 --- a/xen/arch/x86/hvm/emulate.c +++ b/xen/arch/x86/hvm/emulate.c @@ -337,6 +337,9 @@ static int hvmemul_do_io( /* If there is no suitable backing DM, just ignore accesses */ if ( !s ) { + if ( is_mmio && is_hardware_domain(currd) ) + gdprintk(XENLOG_DEBUG, "unhandled memory %s to %#lx size %u\n", + dir ? "read" : "write", addr, size); rc = hvm_process_io_intercept(&null_handler, &p); vio->req.state = STATE_IOREQ_NONE; } From patchwork Fri Feb 14 09:29:28 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Roger_Pau_Monn=C3=A9?= X-Patchwork-Id: 13974643 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 5D1AFC021A4 for ; Fri, 14 Feb 2025 09:30:20 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.888665.1298013 (Exim 4.92) (envelope-from ) id 1tis1I-0005CD-M4; Fri, 14 Feb 2025 09:30:00 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 888665.1298013; Fri, 14 Feb 2025 09:30:00 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tis1I-0005C6-JA; Fri, 14 Feb 2025 09:30:00 +0000 Received: by outflank-mailman (input) for mailman id 888665; Fri, 14 Feb 2025 09:29:58 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tis1G-0004wC-Qd for xen-devel@lists.xenproject.org; Fri, 14 Feb 2025 09:29:58 +0000 Received: from mail-ed1-x52d.google.com (mail-ed1-x52d.google.com [2a00:1450:4864:20::52d]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 413460ee-eab6-11ef-9896-31a8f345e629; Fri, 14 Feb 2025 10:29:57 +0100 (CET) Received: by mail-ed1-x52d.google.com with SMTP id 4fb4d7f45d1cf-5de5a853090so4115459a12.3 for ; Fri, 14 Feb 2025 01:29:57 -0800 (PST) Received: from localhost ([84.78.159.3]) by smtp.gmail.com with ESMTPSA id a640c23a62f3a-aba53259546sm307975666b.64.2025.02.14.01.29.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 14 Feb 2025 01:29:55 -0800 (PST) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 413460ee-eab6-11ef-9896-31a8f345e629 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=citrix.com; s=google; t=1739525396; x=1740130196; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=hFfu24KhrvaQp0fxJDrznaHKB4GavpmxXNs5QOAkgRM=; b=bMKnMfp2/MHzqMJYWrOrIjb0ilQedvnmNixJH14LVK8MzgmjfNC+tsQ3zFJOBLNAHs k4BEylztFVw1mt+wsteCikruSaTsbtpFwnXxGAlL2jNw4Tor6B1f5wwJkfMzL71yvBSs RtI4jKfzZ/q7ZqKI+ENWJPXStKIVCgSof3FCg= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1739525396; x=1740130196; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=hFfu24KhrvaQp0fxJDrznaHKB4GavpmxXNs5QOAkgRM=; b=JgWDmzjNw31LuZn5kMs/+uXhkKs9Op55Wjio12x97DZPMmQG40APhqM2Py1XzZs1EJ 6BN550ad/rUE1JcZQExJALUrc4pBBMbtZdd9l+b2/ynUjW7XvGmJ9QunaZsrvTx0sgzH oHjdEDssMczk24NRIznrzBrXsBH5dZAJquWxIUoZSAAj8H86cpq5pYTp5gKZEtN/L2Th 3LhgLgZxwgWoyR9RKuZTcds3mX/s7hz+J5JEY89kUtstTWrGuSrAGhsRR1JtW2Yu2+Rt eTWcaOtxPvFeqBpMTMtcGalCLHU2ydBUoy+dcui4uwkeeSz8TMwwwCzkAl43Uwlk6W/2 qNQQ== X-Gm-Message-State: AOJu0YztEEO7uUiCayxoMuOpTajeuPIcT270MrX+/PMhGZsDhkGSMEMJ 1DPzwu3mdgu+Sl/+FXyZbw7+X0miL0K2l/Y4W7CESOXLoJXXlpL4CHHFSo3L4s49kVC5qB1QzP1 6 X-Gm-Gg: ASbGncv1SfNaLsYWkFQ6oAz8H0QZsYkvvJ6BODWJg6jPLcO6iZ3ZDuTbfYYj6WqpQ/U KRtow7uBSX7inFthWhTqKYDvUMvN6qMVnLLcL0oNUacfWZszMvFanMcXYe2EOZL+KHgB7WkQ5d0 UECvMGUcVycJjc3w3l2ddX+DfieXfiyeJq7/e0I9QMtOn6tBV6GLJBuCOHf4mmijZ9RACWSUc6E 9ZMuCI9HOykU0NnugkGCtfix9uzpbWTNqGwYWeHgJpYbtZexMbr6gLpOXuPjvsKZ6cDYuwFQ16g u2Z931AKlvkOzn5kCm///qUpVw== X-Google-Smtp-Source: AGHT+IFoDXYBli37uyiAtAYfJjPrhGbpUc723Gn08G5ekilp+ywEwkwnBv/9HoNwSrqDUNfrYD5uYQ== X-Received: by 2002:a17:907:3daa:b0:ab7:b250:aaa with SMTP id a640c23a62f3a-ab7f34d5051mr1084325566b.54.1739525396104; Fri, 14 Feb 2025 01:29:56 -0800 (PST) From: Roger Pau Monne To: xen-devel@lists.xenproject.org Cc: Roger Pau Monne , Oleksii Kurochko , Community Manager , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , Stefano Stabellini Subject: [PATCH 2/2] x86/dom0: attempt to fixup p2m page-faults for PVH dom0 Date: Fri, 14 Feb 2025 10:29:28 +0100 Message-ID: <20250214092928.28932-3-roger.pau@citrix.com> X-Mailer: git-send-email 2.46.0 In-Reply-To: <20250214092928.28932-1-roger.pau@citrix.com> References: <20250214092928.28932-1-roger.pau@citrix.com> MIME-Version: 1.0 When building a PVH dom0 Xen attempts to map all (relevant) MMIO regions into the p2m for dom0 access. However the information Xen has about the host memory map is limited. Xen doesn't have access to any resources described in ACPI dynamic tables, and hence the p2m mappings provided might not be complete. PV doesn't suffer from this issue because a PV dom0 is capable of mapping into it's page-tables any address not explicitly banned in d->iomem_caps. Introduce a new command line options that allows Xen to attempt to fixup the p2m page-faults, by creating p2m identity maps in response to p2m page-faults. This is aimed as a workaround to small ACPI regions Xen doesn't know about. Note that missing large MMIO regions mapped in this way will lead to slowness due to the VM exit processing, plus the mappings will always use small pages. The ultimate aim is to attempt to bring better parity with a classic PV dom0. Note such fixup rely on the CPU doing the access to the unpopulated address. If the access is attempted from a device instead there's no possible way to fixup, as IOMMU page-fault are asynchronous. Signed-off-by: Roger Pau Monné --- Only slightly tested on my local PVH dom0 deployment. --- CHANGELOG.md | 10 +++++++++ docs/misc/xen-command-line.pandoc | 16 +++++++++++++- xen/arch/x86/dom0_build.c | 4 ++++ xen/arch/x86/hvm/emulate.c | 34 ++++++++++++++++++++++++++++-- xen/arch/x86/hvm/hvm.c | 31 +++++++++++++++++++++++++++ xen/arch/x86/include/asm/hvm/hvm.h | 5 +++++ 6 files changed, 97 insertions(+), 3 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 1de1d1eca17f..e5e6ab3a8902 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -4,6 +4,16 @@ Notable changes to Xen will be documented in this file. The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/) +## [4.21.0 UNRELEASED](https://xenbits.xenproject.org/gitweb/?p=xen.git;a=shortlog;h=staging) - TBD + +### Changed + +### Added + - On x86: + - Option to attempt to fixup p2m page-faults on PVH dom0. + +### Removed + ## [4.20.0 UNRELEASED](https://xenbits.xenproject.org/gitweb/?p=xen.git;a=shortlog;h=staging) - TBD ### Changed diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line.pandoc index 9bbd00baef91..e9884de07e9e 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -822,7 +822,8 @@ Specify the bit width of the DMA heap. ### dom0 = List of [ pv | pvh, shadow=, verbose=, - cpuid-faulting=, msr-relaxed= ] (x86) + cpuid-faulting=, msr-relaxed=, + pf-fixup= ] (x86) = List of [ sve= ] (Arm64) @@ -883,6 +884,19 @@ Controls for how dom0 is constructed on x86 systems. If using this option is necessary to fix an issue, please report a bug. +* The `pf-fixup` boolean is only applicable when using a PVH dom0 and + defaults to false. + + When running dom0 in PVH mode the dom0 kernel has no way to map MMIO + regions into the p2m, such mode relies on Xen dom0 builder populating + the p2m with all MMIO regions that dom0 should access. However Xen + doesn't have a complete picture of the host memory map, due to not + being able to process ACPI dynamic tables. + + The `pf-fixup` option allows Xen to attempt to add missing MMIO regions + to the p2m in response to page-faults generated by dom0 trying to access + unpopulated entries in the p2m. + Enables features on dom0 on Arm systems. * The `sve` integer parameter enables Arm SVE usage for Dom0 and sets the diff --git a/xen/arch/x86/dom0_build.c b/xen/arch/x86/dom0_build.c index d1b4ef83b2d0..34b6166f4922 100644 --- a/xen/arch/x86/dom0_build.c +++ b/xen/arch/x86/dom0_build.c @@ -286,6 +286,10 @@ int __init parse_arch_dom0_param(const char *s, const char *e) opt_dom0_cpuid_faulting = val; else if ( (val = parse_boolean("msr-relaxed", s, e)) >= 0 ) opt_dom0_msr_relaxed = val; +#ifdef CONFIG_HVM + else if ( (val = parse_boolean("pf-fixup", s, e)) >= 0 ) + opt_dom0_pf_fixup = val; +#endif else return -EINVAL; diff --git a/xen/arch/x86/hvm/emulate.c b/xen/arch/x86/hvm/emulate.c index 8aa7e49c056c..aa16ed0e9cac 100644 --- a/xen/arch/x86/hvm/emulate.c +++ b/xen/arch/x86/hvm/emulate.c @@ -338,8 +338,38 @@ static int hvmemul_do_io( if ( !s ) { if ( is_mmio && is_hardware_domain(currd) ) - gdprintk(XENLOG_DEBUG, "unhandled memory %s to %#lx size %u\n", - dir ? "read" : "write", addr, size); + { + /* + * PVH dom0 is likely missing MMIO mappings on the p2m, due to + * the incomplete information Xen has about the memory layout. + * + * Either print a message to note dom0 attempted to access an + * unpopulated GPA, or try to fixup the p2m by creating an + * identity mapping for the faulting GPA. + */ + if ( opt_dom0_pf_fixup ) + { + int inner_rc = hvm_hwdom_fixup_p2m(addr); + + if ( !inner_rc ) + { + gdprintk(XENLOG_DEBUG, + "fixup p2m mapping for page %lx added\n", + paddr_to_pfn(addr)); + rc = X86EMUL_RETRY; + vio->req.state = STATE_IOREQ_NONE; + break; + } + + gprintk(XENLOG_WARNING, + "unable to fixup memory %s to %#lx size %u: %d\n", + dir ? "read" : "write", addr, size, inner_rc); + } + else + gdprintk(XENLOG_DEBUG, + "unhandled memory %s to %#lx size %u\n", + dir ? "read" : "write", addr, size); + } rc = hvm_process_io_intercept(&null_handler, &p); vio->req.state = STATE_IOREQ_NONE; } diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index 39e39ce4ce36..4505868f025c 100644 --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -13,6 +13,7 @@ #include #include #include +#include #include #include #include @@ -5458,6 +5459,36 @@ int hvm_copy_context_and_params(struct domain *dst, struct domain *src) return rc; } +bool __ro_after_init opt_dom0_pf_fixup; +int hvm_hwdom_fixup_p2m(paddr_t addr) +{ + unsigned long gfn = paddr_to_pfn(addr); + struct domain *currd = current->domain; + p2m_type_t type; + mfn_t mfn; + int rc; + + ASSERT(is_hardware_domain(currd)); + ASSERT(!altp2m_active(currd)); + + /* + * Fixups are only applied for MMIO holes, and rely on the hardware domain + * having identity mappings for non RAM regions (gfn == mfn). + */ + if ( !iomem_access_permitted(currd, gfn, gfn) || + !is_memory_hole(_mfn(gfn), _mfn(gfn)) ) + return -EPERM; + + mfn = get_gfn(currd, gfn, &type); + if ( !mfn_eq(mfn, INVALID_MFN) || !p2m_is_hole(type) ) + rc = mfn_eq(mfn, _mfn(gfn)) ? 0 : -EEXIST; + else + rc = set_mmio_p2m_entry(currd, _gfn(gfn), _mfn(gfn), 0); + put_gfn(currd, gfn); + + return rc; +} + /* * Local variables: * mode: C diff --git a/xen/arch/x86/include/asm/hvm/hvm.h b/xen/arch/x86/include/asm/hvm/hvm.h index cad3a9427801..e084e1c7d665 100644 --- a/xen/arch/x86/include/asm/hvm/hvm.h +++ b/xen/arch/x86/include/asm/hvm/hvm.h @@ -772,6 +772,11 @@ static inline int hvm_vmtrace_reset(struct vcpu *v) return -EOPNOTSUPP; } +/* For PVH dom0: signal whether to attempt fixup of p2m page-faults. */ +extern bool opt_dom0_pf_fixup; +/* Attempt to fixup a p2m page-fault by adding an identity mapping entry. */ +int hvm_hwdom_fixup_p2m(paddr_t addr); + /* * Accessors for registers which have per-guest-type or per-vendor locations * (e.g. VMCS, msr load/save lists, VMCB, VMLOAD lazy, etc).