VirtualBox

source: vbox/trunk/src/VBox/VMM/HWACCMInternal.h@ 15869

Last change on this file since 15869 was 15866, checked in by vboxsync, 16 years ago

Backed out previous experiments.

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
File size: 24.3 KB
Line 
1/* $Id: HWACCMInternal.h 15866 2009-01-08 13:54:40Z vboxsync $ */
2/** @file
3 * HWACCM - Internal header file.
4 */
5
6/*
7 * Copyright (C) 2006-2007 Sun Microsystems, Inc.
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 *
17 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa
18 * Clara, CA 95054 USA or visit http://www.sun.com if you need
19 * additional information or have any questions.
20 */
21
22#ifndef ___HWACCMInternal_h
23#define ___HWACCMInternal_h
24
25#include <VBox/cdefs.h>
26#include <VBox/types.h>
27#include <VBox/em.h>
28#include <VBox/stam.h>
29#include <VBox/dis.h>
30#include <VBox/hwaccm.h>
31#include <VBox/pgm.h>
32#include <VBox/cpum.h>
33#include <iprt/memobj.h>
34#include <iprt/cpuset.h>
35#include <iprt/mp.h>
36
37#if HC_ARCH_BITS == 64 || defined(VBOX_WITH_HYBRID_32BIT_KERNEL) || defined (VBOX_WITH_64_BITS_GUESTS)
38/* Enable 64 bits guest support. */
39# define VBOX_ENABLE_64_BITS_GUESTS
40#endif
41
42#define VMX_USE_CACHED_VMCS_ACCESSES
43#define HWACCM_VMX_EMULATE_REALMODE
44#define HWACCM_VTX_WITH_EPT
45#define HWACCM_VTX_WITH_VPID
46
47__BEGIN_DECLS
48
49
50/** @defgroup grp_hwaccm_int Internal
51 * @ingroup grp_hwaccm
52 * @internal
53 * @{
54 */
55
56
57/** Maximum number of exit reason statistics counters. */
58#define MAX_EXITREASON_STAT 0x100
59#define MASK_EXITREASON_STAT 0xff
60
61/** @name Changed flags
62 * These flags are used to keep track of which important registers that
63 * have been changed since last they were reset.
64 * @{
65 */
66#define HWACCM_CHANGED_GUEST_FPU RT_BIT(0)
67#define HWACCM_CHANGED_GUEST_CR0 RT_BIT(1)
68#define HWACCM_CHANGED_GUEST_CR3 RT_BIT(2)
69#define HWACCM_CHANGED_GUEST_CR4 RT_BIT(3)
70#define HWACCM_CHANGED_GUEST_GDTR RT_BIT(4)
71#define HWACCM_CHANGED_GUEST_IDTR RT_BIT(5)
72#define HWACCM_CHANGED_GUEST_LDTR RT_BIT(6)
73#define HWACCM_CHANGED_GUEST_TR RT_BIT(7)
74#define HWACCM_CHANGED_GUEST_SYSENTER_MSR RT_BIT(8)
75#define HWACCM_CHANGED_GUEST_SEGMENT_REGS RT_BIT(9)
76#define HWACCM_CHANGED_GUEST_DEBUG RT_BIT(10)
77#define HWACCM_CHANGED_HOST_CONTEXT RT_BIT(11)
78
79#define HWACCM_CHANGED_ALL ( HWACCM_CHANGED_GUEST_SEGMENT_REGS \
80 | HWACCM_CHANGED_GUEST_CR0 \
81 | HWACCM_CHANGED_GUEST_CR3 \
82 | HWACCM_CHANGED_GUEST_CR4 \
83 | HWACCM_CHANGED_GUEST_GDTR \
84 | HWACCM_CHANGED_GUEST_IDTR \
85 | HWACCM_CHANGED_GUEST_LDTR \
86 | HWACCM_CHANGED_GUEST_TR \
87 | HWACCM_CHANGED_GUEST_SYSENTER_MSR \
88 | HWACCM_CHANGED_GUEST_FPU \
89 | HWACCM_CHANGED_GUEST_DEBUG \
90 | HWACCM_CHANGED_HOST_CONTEXT)
91
92#define HWACCM_CHANGED_ALL_GUEST ( HWACCM_CHANGED_GUEST_SEGMENT_REGS \
93 | HWACCM_CHANGED_GUEST_CR0 \
94 | HWACCM_CHANGED_GUEST_CR3 \
95 | HWACCM_CHANGED_GUEST_CR4 \
96 | HWACCM_CHANGED_GUEST_GDTR \
97 | HWACCM_CHANGED_GUEST_IDTR \
98 | HWACCM_CHANGED_GUEST_LDTR \
99 | HWACCM_CHANGED_GUEST_TR \
100 | HWACCM_CHANGED_GUEST_SYSENTER_MSR \
101 | HWACCM_CHANGED_GUEST_DEBUG \
102 | HWACCM_CHANGED_GUEST_FPU)
103
104/** @} */
105
106/** @name Intercepted traps
107 * Traps that need to be intercepted so we can correctly dispatch them to the guest if required.
108 * Currently #NM and #PF only
109 */
110#ifdef VBOX_STRICT
111#define HWACCM_VMX_TRAP_MASK RT_BIT(X86_XCPT_DE) | RT_BIT(X86_XCPT_NM) | RT_BIT(X86_XCPT_PF) | RT_BIT(X86_XCPT_UD) | RT_BIT(X86_XCPT_NP) | RT_BIT(X86_XCPT_SS) | RT_BIT(X86_XCPT_GP) | RT_BIT(X86_XCPT_MF)
112#define HWACCM_SVM_TRAP_MASK HWACCM_VMX_TRAP_MASK
113#else
114#define HWACCM_VMX_TRAP_MASK RT_BIT(X86_XCPT_NM) | RT_BIT(X86_XCPT_PF)
115#define HWACCM_SVM_TRAP_MASK RT_BIT(X86_XCPT_NM) | RT_BIT(X86_XCPT_PF)
116#endif
117/* All exceptions have to be intercept in emulated real-mode (minues NM & PF as they are always intercepted. */
118#define HWACCM_VMX_TRAP_MASK_REALMODE RT_BIT(X86_XCPT_DE) | RT_BIT(X86_XCPT_DB) | RT_BIT(X86_XCPT_NMI) | RT_BIT(X86_XCPT_BP) | RT_BIT(X86_XCPT_OF) | RT_BIT(X86_XCPT_BR) | RT_BIT(X86_XCPT_UD) | RT_BIT(X86_XCPT_DF) | RT_BIT(X86_XCPT_CO_SEG_OVERRUN) | RT_BIT(X86_XCPT_TS) | RT_BIT(X86_XCPT_NP) | RT_BIT(X86_XCPT_SS) | RT_BIT(X86_XCPT_GP) | RT_BIT(X86_XCPT_MF) | RT_BIT(X86_XCPT_AC) | RT_BIT(X86_XCPT_MC) | RT_BIT(X86_XCPT_XF)
119/** @} */
120
121
122/** Maxium resume loops allowed in ring 0 (safety precaution) */
123#define HWACCM_MAX_RESUME_LOOPS 1024
124
125/** Size for the EPT identity page table (1024 4 MB pages to cover the entire address space). */
126#define HWACCM_EPT_IDENTITY_PG_TABLE_SIZE PAGE_SIZE
127/** Size of the TSS structure + 2 pages for the IO bitmap + end byte. */
128#define HWACCM_VTX_TSS_SIZE (sizeof(VBOXTSS) + 2*PAGE_SIZE + 1)
129/** Total guest mapped memory needed. */
130#define HWACCM_VTX_TOTAL_DEVHEAP_MEM (HWACCM_EPT_IDENTITY_PG_TABLE_SIZE + HWACCM_VTX_TSS_SIZE)
131
132/** HWACCM SSM version
133 */
134#define HWACCM_SSM_VERSION 4
135#define HWACCM_SSM_VERSION_2_0_X 3
136
137/* Per-cpu information. (host) */
138typedef struct
139{
140 RTCPUID idCpu;
141
142 RTR0MEMOBJ pMemObj;
143 /* Current ASID (AMD-V)/VPID (Intel) */
144 uint32_t uCurrentASID;
145 /* TLB flush count */
146 uint32_t cTLBFlushes;
147
148 /* Set the first time a cpu is used to make sure we start with a clean TLB. */
149 bool fFlushTLB;
150
151 /** Configured for VT-x or AMD-V. */
152 bool fConfigured;
153
154 /** In use by our code. (for power suspend) */
155 volatile bool fInUse;
156} HWACCM_CPUINFO;
157typedef HWACCM_CPUINFO *PHWACCM_CPUINFO;
158
159/* VT-x capability qword. */
160typedef union
161{
162 struct
163 {
164 uint32_t disallowed0;
165 uint32_t allowed1;
166 } n;
167 uint64_t u;
168} VMX_CAPABILITY;
169
170/**
171 * Switcher function, HC to RC.
172 *
173 * @param pVM The VM handle.
174 * @returns Return code indicating the action to take.
175 */
176typedef DECLASMTYPE(int) FNHWACCMSWITCHERHC(PVM pVM);
177/** Pointer to switcher function. */
178typedef FNHWACCMSWITCHERHC *PFNHWACCMSWITCHERHC;
179
180/**
181 * HWACCM VM Instance data.
182 * Changes to this must checked against the padding of the cfgm union in VM!
183 */
184typedef struct HWACCM
185{
186 /** Set when we've initialized VMX or SVM. */
187 bool fInitialized;
188
189 /** Set when we're using VMX/SVN at that moment. */
190 bool fActive;
191
192 /** Set when hardware acceleration is allowed. */
193 bool fAllowed;
194
195 /** Set if nested paging is enabled. */
196 bool fNestedPaging;
197
198 /** Set if nested paging is allowed. */
199 bool fAllowNestedPaging;
200
201 /** Set if we're supposed to inject an NMI. */
202 bool fInjectNMI;
203
204 /** Set if we can support 64-bit guests or not. */
205 bool fAllow64BitGuests;
206
207 /** Explicit alignment padding to make 32-bit gcc align u64RegisterMask
208 * naturally. */
209 bool padding[1];
210
211 /** And mask for copying register contents. */
212 uint64_t u64RegisterMask;
213
214 /** Maximum ASID allowed. */
215 RTUINT uMaxASID;
216
217#if HC_ARCH_BITS == 32 && defined(VBOX_ENABLE_64_BITS_GUESTS) && !defined(VBOX_WITH_HYBRID_32BIT_KERNEL)
218 /** 32 to 64 bits switcher entrypoint. */
219 R0PTRTYPE(PFNHWACCMSWITCHERHC) pfnHost32ToGuest64R0;
220
221 /* AMD-V 64 bits vmrun handler */
222 RTRCPTR pfnSVMGCVMRun64;
223
224 /* VT-x 64 bits vmlaunch handler */
225 RTRCPTR pfnVMXGCStartVM64;
226
227 /* RC handler to setup the 64 bits FPU state. */
228 RTRCPTR pfnSaveGuestFPU64;
229
230 /* RC handler to setup the 64 bits debug state. */
231 RTRCPTR pfnSaveGuestDebug64;
232
233 /* Test handler */
234 RTRCPTR pfnTest64;
235
236 RTRCPTR uAlignment[1];
237#elif defined(VBOX_WITH_HYBRID_32BIT_KERNEL)
238 uint32_t u32Alignment[1];
239#endif
240
241 struct
242 {
243 /** Set by the ring-0 driver to indicate VMX is supported by the CPU. */
244 bool fSupported;
245
246 /** Set when we've enabled VMX. */
247 bool fEnabled;
248
249 /** Set if VPID is supported. */
250 bool fVPID;
251
252 /** Set if VT-x VPID is allowed. */
253 bool fAllowVPID;
254
255 /** Virtual address of the TSS page used for real mode emulation. */
256 R3PTRTYPE(PVBOXTSS) pRealModeTSS;
257
258 /** Virtual address of the identity page table used for real mode and protected mode without paging emulation in EPT mode. */
259 R3PTRTYPE(PX86PD) pNonPagingModeEPTPageTable;
260
261 /** R0 memory object for the virtual APIC mmio cache. */
262 RTR0MEMOBJ pMemObjAPIC;
263 /** Physical address of the virtual APIC mmio cache. */
264 RTHCPHYS pAPICPhys;
265 /** Virtual address of the virtual APIC mmio cache. */
266 R0PTRTYPE(uint8_t *) pAPIC;
267
268 /** R0 memory object for the MSR bitmap (1 page). */
269 RTR0MEMOBJ pMemObjMSRBitmap;
270 /** Physical address of the MSR bitmap (1 page). */
271 RTHCPHYS pMSRBitmapPhys;
272 /** Virtual address of the MSR bitmap (1 page). */
273 R0PTRTYPE(uint8_t *) pMSRBitmap;
274
275 /** R0 memory object for the MSR entry load page (guest MSRs). */
276 RTR0MEMOBJ pMemObjMSREntryLoad;
277 /** Physical address of the MSR entry load page (guest MSRs). */
278 RTHCPHYS pMSREntryLoadPhys;
279 /** Virtual address of the MSR entry load page (guest MSRs). */
280 R0PTRTYPE(uint8_t *) pMSREntryLoad;
281
282 /** R0 memory object for the MSR exit store page (guest MSRs). */
283 RTR0MEMOBJ pMemObjMSRExitStore;
284 /** Physical address of the MSR exit store page (guest MSRs). */
285 RTHCPHYS pMSRExitStorePhys;
286 /** Virtual address of the MSR exit store page (guest MSRs). */
287 R0PTRTYPE(uint8_t *) pMSRExitStore;
288
289 /** R0 memory object for the MSR exit load page (host MSRs). */
290 RTR0MEMOBJ pMemObjMSRExitLoad;
291 /** Physical address of the MSR exit load page (host MSRs). */
292 RTHCPHYS pMSRExitLoadPhys;
293 /** Virtual address of the MSR exit load page (host MSRs). */
294 R0PTRTYPE(uint8_t *) pMSRExitLoad;
295
296 /** Ring 0 handlers for VT-x. */
297 DECLR0CALLBACKMEMBER(void, pfnSetupTaggedTLB, (PVM pVM, PVMCPU pVCpu));
298
299 /** Host CR4 value (set by ring-0 VMX init) */
300 uint64_t hostCR4;
301
302 /** VMX MSR values */
303 struct
304 {
305 uint64_t feature_ctrl;
306 uint64_t vmx_basic_info;
307 VMX_CAPABILITY vmx_pin_ctls;
308 VMX_CAPABILITY vmx_proc_ctls;
309 VMX_CAPABILITY vmx_proc_ctls2;
310 VMX_CAPABILITY vmx_exit;
311 VMX_CAPABILITY vmx_entry;
312 uint64_t vmx_misc;
313 uint64_t vmx_cr0_fixed0;
314 uint64_t vmx_cr0_fixed1;
315 uint64_t vmx_cr4_fixed0;
316 uint64_t vmx_cr4_fixed1;
317 uint64_t vmx_vmcs_enum;
318 uint64_t vmx_eptcaps;
319 } msr;
320
321 /** Flush types for invept & invvpid; they depend on capabilities. */
322 VMX_FLUSH enmFlushPage;
323 VMX_FLUSH enmFlushContext;
324 } vmx;
325
326 struct
327 {
328 /** Set by the ring-0 driver to indicate SVM is supported by the CPU. */
329 bool fSupported;
330 /** Set when we've enabled SVM. */
331 bool fEnabled;
332 /** Set if erratum 170 affects the AMD cpu. */
333 bool fAlwaysFlushTLB;
334 /** Explicit alignment padding to make 32-bit gcc align u64RegisterMask
335 * naturally. */
336 bool padding[1];
337
338 /** R0 memory object for the host VM control block (VMCB). */
339 RTR0MEMOBJ pMemObjVMCBHost;
340 /** Physical address of the host VM control block (VMCB). */
341 RTHCPHYS pVMCBHostPhys;
342 /** Virtual address of the host VM control block (VMCB). */
343 R0PTRTYPE(void *) pVMCBHost;
344
345 /** R0 memory object for the IO bitmap (12kb). */
346 RTR0MEMOBJ pMemObjIOBitmap;
347 /** Physical address of the IO bitmap (12kb). */
348 RTHCPHYS pIOBitmapPhys;
349 /** Virtual address of the IO bitmap. */
350 R0PTRTYPE(void *) pIOBitmap;
351
352 /** R0 memory object for the MSR bitmap (8kb). */
353 RTR0MEMOBJ pMemObjMSRBitmap;
354 /** Physical address of the MSR bitmap (8kb). */
355 RTHCPHYS pMSRBitmapPhys;
356 /** Virtual address of the MSR bitmap. */
357 R0PTRTYPE(void *) pMSRBitmap;
358
359 /** SVM revision. */
360 uint32_t u32Rev;
361
362 /** SVM feature bits from cpuid 0x8000000a */
363 uint32_t u32Features;
364 } svm;
365
366 struct
367 {
368 uint32_t u32AMDFeatureECX;
369 uint32_t u32AMDFeatureEDX;
370 } cpuid;
371
372 /** Saved error from detection */
373 int32_t lLastError;
374
375 /** HWACCMR0Init was run */
376 bool fHWACCMR0Init;
377} HWACCM;
378/** Pointer to HWACCM VM instance data. */
379typedef HWACCM *PHWACCM;
380
381/* Maximum number of cached entries. */
382#define VMCSCACHE_MAX_ENTRY 128
383
384/* Structure for storing read and write VMCS actions. */
385typedef struct VMCSCACHE
386{
387 /* Magic marker for searching in crash dumps. */
388 uint8_t aMagic[16];
389 uint64_t uMagic;
390 uint32_t uPos;
391 uint32_t idCpu;
392
393 /* CR2 is saved here for EPT syncing. */
394 uint64_t cr2;
395 struct
396 {
397 uint32_t cValidEntries;
398 uint32_t uAlignment;
399 uint32_t aField[VMCSCACHE_MAX_ENTRY];
400 uint64_t aFieldVal[VMCSCACHE_MAX_ENTRY];
401 } Write;
402 struct
403 {
404 uint32_t cValidEntries;
405 uint32_t uAlignment;
406 uint32_t aField[VMCSCACHE_MAX_ENTRY];
407 uint64_t aFieldVal[VMCSCACHE_MAX_ENTRY];
408 } Read;
409#ifdef DEBUG
410 struct
411 {
412 RTHCPHYS pPageCpuPhys;
413 RTHCPHYS pVMCSPhys;
414 RTGCPTR pCache;
415 RTGCPTR pCtx;
416 } TestIn;
417 struct
418 {
419 RTHCPHYS pVMCSPhys;
420 RTGCPTR pCache;
421 RTGCPTR pCtx;
422 uint64_t eflags;
423 uint64_t cr8;
424 } TestOut;
425 struct
426 {
427 uint64_t param1;
428 uint64_t param2;
429 uint64_t param3;
430 uint64_t param4;
431 } ScratchPad;
432#endif
433} VMCSCACHE;
434/** Pointer to VMCSCACHE. */
435typedef VMCSCACHE *PVMCSCACHE;
436
437/**
438 * HWACCM VMCPU Instance data.
439 */
440typedef struct HWACCMCPU
441{
442 /** Old style FPU reporting trap mask override performed (optimization) */
443 bool fFPUOldStyleOverride;
444
445 /** Set if we don't have to flush the TLB on VM entry. */
446 bool fResumeVM;
447
448 /** Set if we need to flush the TLB during the world switch. */
449 bool fForceTLBFlush;
450
451 /** Explicit alignment padding to make 32-bit gcc align u64RegisterMask
452 * naturally. */
453 bool padding[1];
454
455 /** HWACCM_CHANGED_* flags. */
456 RTUINT fContextUseFlags;
457
458 /* Id of the last cpu we were executing code on (NIL_RTCPUID for the first time) */
459 RTCPUID idLastCpu;
460
461 /* TLB flush count */
462 RTUINT cTLBFlushes;
463
464 /* Current ASID in use by the VM */
465 RTUINT uCurrentASID;
466
467 struct
468 {
469 /** R0 memory object for the VM control structure (VMCS). */
470 RTR0MEMOBJ pMemObjVMCS;
471 /** Physical address of the VM control structure (VMCS). */
472 RTHCPHYS pVMCSPhys;
473 /** Virtual address of the VM control structure (VMCS). */
474 R0PTRTYPE(void *) pVMCS;
475
476 /** Ring 0 handlers for VT-x. */
477 DECLR0CALLBACKMEMBER(int, pfnStartVM,(RTHCUINT fResume, PCPUMCTX pCtx, PVMCSCACHE pCache, PVM pVM, PVMCPU pVCpu));
478
479 /** Current VMX_VMCS_CTRL_PROC_EXEC_CONTROLS. */
480 uint64_t proc_ctls;
481
482 /** Current CR0 mask. */
483 uint64_t cr0_mask;
484 /** Current CR4 mask. */
485 uint64_t cr4_mask;
486
487 /** Current EPTP. */
488 RTHCPHYS GCPhysEPTP;
489
490 /** VMCS cache. */
491 VMCSCACHE VMCSCache;
492
493 /** Real-mode emulation state. */
494 struct
495 {
496 X86EFLAGS eflags;
497 uint32_t fValid;
498 } RealMode;
499
500 struct
501 {
502 uint64_t u64VMCSPhys;
503 uint32_t ulVMCSRevision;
504 uint32_t ulInstrError;
505 uint32_t ulExitReason;
506 RTCPUID idEnteredCpu;
507 RTCPUID idCurrentCpu;
508 uint32_t padding;
509 } lasterror;
510
511 /** The last seen guest paging mode (by VT-x). */
512 PGMMODE enmLastSeenGuestMode;
513 /** Current guest paging mode (as seen by HWACCMR3PagingModeChanged). */
514 PGMMODE enmCurrGuestMode;
515 /** Previous guest paging mode (as seen by HWACCMR3PagingModeChanged). */
516 PGMMODE enmPrevGuestMode;
517 } vmx;
518
519 struct
520 {
521 /** R0 memory object for the VM control block (VMCB). */
522 RTR0MEMOBJ pMemObjVMCB;
523 /** Physical address of the VM control block (VMCB). */
524 RTHCPHYS pVMCBPhys;
525 /** Virtual address of the VM control block (VMCB). */
526 R0PTRTYPE(void *) pVMCB;
527
528 /** Ring 0 handlers for VT-x. */
529 DECLR0CALLBACKMEMBER(int, pfnVMRun,(RTHCPHYS pVMCBHostPhys, RTHCPHYS pVMCBPhys, PCPUMCTX pCtx, PVM pVM, PVMCPU pVCpu));
530
531 } svm;
532
533 /** Event injection state. */
534 struct
535 {
536 uint32_t fPending;
537 uint32_t errCode;
538 uint64_t intInfo;
539 } Event;
540
541 /** Currenty shadow paging mode. */
542 PGMMODE enmShadowMode;
543
544 /** The CPU ID of the CPU currently owning the VMCS. Set in
545 * HWACCMR0Enter and cleared in HWACCMR0Leave. */
546 RTCPUID idEnteredCpu;
547
548 STAMPROFILEADV StatEntry;
549 STAMPROFILEADV StatExit1;
550 STAMPROFILEADV StatExit2;
551#if 1 /* temporary for tracking down darwin issues. */
552 STAMPROFILEADV StatExit2Sub1;
553 STAMPROFILEADV StatExit2Sub2;
554 STAMPROFILEADV StatExit2Sub3;
555#endif
556 STAMPROFILEADV StatInGC;
557
558#if HC_ARCH_BITS == 32 && defined(VBOX_ENABLE_64_BITS_GUESTS) && !defined(VBOX_WITH_HYBRID_32BIT_KERNEL)
559 STAMPROFILEADV StatWorldSwitch3264;
560#endif
561
562 STAMCOUNTER StatIntInject;
563
564 STAMCOUNTER StatExitShadowNM;
565 STAMCOUNTER StatExitGuestNM;
566 STAMCOUNTER StatExitShadowPF;
567 STAMCOUNTER StatExitGuestPF;
568 STAMCOUNTER StatExitGuestUD;
569 STAMCOUNTER StatExitGuestSS;
570 STAMCOUNTER StatExitGuestNP;
571 STAMCOUNTER StatExitGuestGP;
572 STAMCOUNTER StatExitGuestDE;
573 STAMCOUNTER StatExitGuestDB;
574 STAMCOUNTER StatExitGuestMF;
575 STAMCOUNTER StatExitInvpg;
576 STAMCOUNTER StatExitInvd;
577 STAMCOUNTER StatExitCpuid;
578 STAMCOUNTER StatExitRdtsc;
579 STAMCOUNTER StatExitCRxWrite[8];
580 STAMCOUNTER StatExitCRxRead[8];
581 STAMCOUNTER StatExitDRxWrite;
582 STAMCOUNTER StatExitDRxRead;
583 STAMCOUNTER StatExitCLTS;
584 STAMCOUNTER StatExitLMSW;
585 STAMCOUNTER StatExitIOWrite;
586 STAMCOUNTER StatExitIORead;
587 STAMCOUNTER StatExitIOStringWrite;
588 STAMCOUNTER StatExitIOStringRead;
589 STAMCOUNTER StatExitIrqWindow;
590 STAMCOUNTER StatExitMaxResume;
591 STAMCOUNTER StatIntReinject;
592 STAMCOUNTER StatPendingHostIrq;
593
594 STAMCOUNTER StatFlushPageManual;
595 STAMCOUNTER StatFlushPhysPageManual;
596 STAMCOUNTER StatFlushTLBManual;
597 STAMCOUNTER StatFlushPageInvlpg;
598 STAMCOUNTER StatFlushTLBWorldSwitch;
599 STAMCOUNTER StatNoFlushTLBWorldSwitch;
600 STAMCOUNTER StatFlushTLBCRxChange;
601 STAMCOUNTER StatFlushASID;
602 STAMCOUNTER StatFlushTLBInvlpga;
603
604 STAMCOUNTER StatSwitchGuestIrq;
605 STAMCOUNTER StatSwitchToR3;
606
607 STAMCOUNTER StatTSCOffset;
608 STAMCOUNTER StatTSCIntercept;
609
610 STAMCOUNTER StatExitReasonNPF;
611 STAMCOUNTER StatDRxArmed;
612 STAMCOUNTER StatDRxContextSwitch;
613 STAMCOUNTER StatDRxIOCheck;
614
615
616 R3PTRTYPE(PSTAMCOUNTER) paStatExitReason;
617 R0PTRTYPE(PSTAMCOUNTER) paStatExitReasonR0;
618} HWACCMCPU;
619/** Pointer to HWACCM VM instance data. */
620typedef HWACCMCPU *PHWACCMCPU;
621
622
623#ifdef IN_RING0
624
625VMMR0DECL(PHWACCM_CPUINFO) HWACCMR0GetCurrentCpu();
626VMMR0DECL(PHWACCM_CPUINFO) HWACCMR0GetCurrentCpuEx(RTCPUID idCpu);
627
628
629#ifdef VBOX_STRICT
630VMMR0DECL(void) HWACCMDumpRegs(PVM pVM, PCPUMCTX pCtx);
631VMMR0DECL(void) HWACCMR0DumpDescriptor(PX86DESCHC Desc, RTSEL Sel, const char *pszMsg);
632#else
633#define HWACCMDumpRegs(a, b) do { } while (0)
634#define HWACCMR0DumpDescriptor(a, b, c) do { } while (0)
635#endif
636
637/* Dummy callback handlers. */
638VMMR0DECL(int) HWACCMR0DummyEnter(PVM pVM, PVMCPU pVCpu, PHWACCM_CPUINFO pCpu);
639VMMR0DECL(int) HWACCMR0DummyLeave(PVM pVM, PVMCPU pVCpu, PCPUMCTX pCtx);
640VMMR0DECL(int) HWACCMR0DummyEnableCpu(PHWACCM_CPUINFO pCpu, PVM pVM, void *pvPageCpu, RTHCPHYS pPageCpuPhys);
641VMMR0DECL(int) HWACCMR0DummyDisableCpu(PHWACCM_CPUINFO pCpu, void *pvPageCpu, RTHCPHYS pPageCpuPhys);
642VMMR0DECL(int) HWACCMR0DummyInitVM(PVM pVM);
643VMMR0DECL(int) HWACCMR0DummyTermVM(PVM pVM);
644VMMR0DECL(int) HWACCMR0DummySetupVM(PVM pVM);
645VMMR0DECL(int) HWACCMR0DummyRunGuestCode(PVM pVM, PVMCPU pVCpu, PCPUMCTX pCtx);
646VMMR0DECL(int) HWACCMR0DummySaveHostState(PVM pVM, PVMCPU pVCpu);
647VMMR0DECL(int) HWACCMR0DummyLoadGuestState(PVM pVM, PVMCPU pVCpu, PCPUMCTX pCtx);
648
649
650# ifdef VBOX_WITH_HYBRID_32BIT_KERNEL
651/**
652 * Gets 64-bit GDTR and IDTR on darwin.
653 * @param pGdtr Where to store the 64-bit GDTR.
654 * @param pIdtr Where to store the 64-bit IDTR.
655 */
656DECLASM(void) hwaccmR0Get64bitGDTRandIDTR(PX86XDTR64 pGdtr, PX86XDTR64 pIdtr);
657
658/**
659 * Gets 64-bit CR3 on darwin.
660 * @returns CR3
661 */
662DECLASM(uint64_t) hwaccmR0Get64bitCR3(void);
663# endif
664
665#endif /* IN_RING0 */
666
667/** @} */
668
669__END_DECLS
670
671#endif
672
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette