VirtualBox

source: vbox/trunk/src/VBox/VMM/VMMR0/CPUMR0.cpp@ 11985

Last change on this file since 11985 was 10858, checked in by vboxsync, 16 years ago

We can't rely on #NM handling in kernel mode, so do what we did before (change cr0, save host, restore guest)

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
File size: 9.0 KB
Line 
1/* $Id: CPUMR0.cpp 10858 2008-07-24 16:21:42Z vboxsync $ */
2/** @file
3 * CPUM - Host Context Ring 0.
4 */
5
6/*
7 * Copyright (C) 2006-2007 Sun Microsystems, Inc.
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 *
17 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa
18 * Clara, CA 95054 USA or visit http://www.sun.com if you need
19 * additional information or have any questions.
20 */
21
22
23/*******************************************************************************
24* Header Files *
25*******************************************************************************/
26#define LOG_GROUP LOG_GROUP_CPUM
27#include <VBox/cpum.h>
28#include "CPUMInternal.h"
29#include <VBox/vm.h>
30#include <VBox/x86.h>
31#include <VBox/err.h>
32#include <VBox/log.h>
33#include <iprt/assert.h>
34#include <iprt/asm.h>
35
36
37
38
39/**
40 * Does Ring-0 CPUM initialization.
41 *
42 * This is mainly to check that the Host CPU mode is compatible
43 * with VBox.
44 *
45 * @returns VBox status code.
46 * @param pVM The VM to operate on.
47 */
48CPUMR0DECL(int) CPUMR0Init(PVM pVM)
49{
50 LogFlow(("CPUMR0Init: %p\n", pVM));
51
52 /*
53 * Check CR0 & CR4 flags.
54 */
55 uint32_t u32CR0 = ASMGetCR0();
56 if ((u32CR0 & (X86_CR0_PE | X86_CR0_PG)) != (X86_CR0_PE | X86_CR0_PG)) /* a bit paranoid perhaps.. */
57 {
58 Log(("CPUMR0Init: PE or PG not set. cr0=%#x\n", u32CR0));
59 return VERR_UNSUPPORTED_CPU_MODE;
60 }
61
62 /*
63 * Check for sysenter if it's used.
64 */
65 if (ASMHasCpuId())
66 {
67 uint32_t u32CpuVersion;
68 uint32_t u32Dummy;
69 uint32_t u32Features;
70 ASMCpuId(1, &u32CpuVersion, &u32Dummy, &u32Dummy, &u32Features);
71 uint32_t u32Family = u32CpuVersion >> 8;
72 uint32_t u32Model = (u32CpuVersion >> 4) & 0xF;
73 uint32_t u32Stepping = u32CpuVersion & 0xF;
74
75 /*
76 * Intel docs claim you should test both the flag and family, model & stepping.
77 * Some Pentium Pro cpus have the SEP cpuid flag set, but don't support it.
78 */
79 if ( (u32Features & X86_CPUID_FEATURE_EDX_SEP)
80 && !(u32Family == 6 && u32Model < 3 && u32Stepping < 3))
81 {
82 /*
83 * Read the MSR and see if it's in use or not.
84 */
85 uint32_t u32 = ASMRdMsr_Low(MSR_IA32_SYSENTER_CS);
86 if (u32)
87 {
88 pVM->cpum.s.fUseFlags |= CPUM_USE_SYSENTER;
89 Log(("CPUMR0Init: host uses sysenter cs=%08x%08x\n", ASMRdMsr_High(MSR_IA32_SYSENTER_CS), u32));
90 }
91 }
92
93 /** @todo check for AMD and syscall!!!!!! */
94 }
95
96
97 /*
98 * Check if debug registers are armed.
99 */
100 uint32_t u32DR7 = ASMGetDR7();
101 if (u32DR7 & X86_DR7_ENABLED_MASK)
102 {
103 pVM->cpum.s.fUseFlags |= CPUM_USE_DEBUG_REGS_HOST;
104 Log(("CPUMR0Init: host uses debug registers (dr7=%x)\n", u32DR7));
105 }
106
107 return VINF_SUCCESS;
108}
109
110
111/**
112 * Lazily sync in the FPU/XMM state
113 *
114 * @returns VBox status code.
115 * @param pVM VM handle.
116 * @param pCtx CPU context
117 */
118CPUMR0DECL(int) CPUMR0LoadGuestFPU(PVM pVM, PCPUMCTX pCtx)
119{
120 Assert(pVM->cpum.s.CPUFeatures.edx.u1FXSR);
121 Assert(ASMGetCR4() & X86_CR4_OSFSXR);
122
123 /* If the FPU state has already been loaded, then it's a guest trap. */
124 if (pVM->cpum.s.fUseFlags & CPUM_USED_FPU)
125 {
126 Assert( ((pCtx->cr0 & (X86_CR0_MP | X86_CR0_EM | X86_CR0_TS)) == (X86_CR0_MP | X86_CR0_EM | X86_CR0_TS))
127 || ((pCtx->cr0 & (X86_CR0_MP | X86_CR0_EM | X86_CR0_TS)) == (X86_CR0_MP | X86_CR0_TS)));
128 return VINF_EM_RAW_GUEST_TRAP;
129 }
130
131 /*
132 * There are two basic actions:
133 * 1. Save host fpu and restore guest fpu.
134 * 2. Generate guest trap.
135 *
136 * When entering the hypervisor we'll always enable MP (for proper wait
137 * trapping) and TS (for intercepting all fpu/mmx/sse stuff). The EM flag
138 * is taken from the guest OS in order to get proper SSE handling.
139 *
140 *
141 * Actions taken depending on the guest CR0 flags:
142 *
143 * 3 2 1
144 * TS | EM | MP | FPUInstr | WAIT :: VMM Action
145 * ------------------------------------------------------------------------
146 * 0 | 0 | 0 | Exec | Exec :: Clear TS & MP, Save HC, Load GC.
147 * 0 | 0 | 1 | Exec | Exec :: Clear TS, Save HC, Load GC.
148 * 0 | 1 | 0 | #NM | Exec :: Clear TS & MP, Save HC, Load GC.
149 * 0 | 1 | 1 | #NM | Exec :: Clear TS, Save HC, Load GC.
150 * 1 | 0 | 0 | #NM | Exec :: Clear MP, Save HC, Load GC. (EM is already cleared.)
151 * 1 | 0 | 1 | #NM | #NM :: Go to guest taking trap there.
152 * 1 | 1 | 0 | #NM | Exec :: Clear MP, Save HC, Load GC. (EM is already set.)
153 * 1 | 1 | 1 | #NM | #NM :: Go to guest taking trap there.
154 */
155
156 switch(pCtx->cr0 & (X86_CR0_MP | X86_CR0_EM | X86_CR0_TS))
157 {
158 case X86_CR0_MP | X86_CR0_TS:
159 case X86_CR0_MP | X86_CR0_EM | X86_CR0_TS:
160 return VINF_EM_RAW_GUEST_TRAP;
161
162 default:
163 break;
164 }
165
166#ifndef CPUM_CAN_HANDLE_NM_TRAPS_IN_KERNEL_MODE
167 uint64_t oldMsrEFERHost;
168 uint32_t oldCR0 = ASMGetCR0();
169
170 /* Clear MSR_K6_EFER_FFXSR or else we'll be unable to save/restore the XMM state with fxsave/fxrstor. */
171 if (pVM->cpum.s.CPUFeaturesExt.edx & X86_CPUID_AMD_FEATURE_EDX_FFXSR)
172 {
173 /* @todo Do we really need to read this every time?? The host could change this on the fly though. */
174 oldMsrEFERHost = ASMRdMsr(MSR_K6_EFER);
175
176 if (oldMsrEFERHost & MSR_K6_EFER_FFXSR)
177 {
178 ASMWrMsr(MSR_K6_EFER, oldMsrEFERHost & ~MSR_K6_EFER_FFXSR);
179 pVM->cpum.s.fUseFlags |= CPUM_MANUAL_XMM_RESTORE;
180 }
181 }
182
183 /* If we sync the FPU/XMM state on-demand, then we can continue execution as if nothing has happened. */
184 int rc = CPUMHandleLazyFPU(pVM);
185 AssertRC(rc);
186 Assert(CPUMIsGuestFPUStateActive(pVM));
187
188 /* Restore EFER MSR */
189 if (pVM->cpum.s.fUseFlags & CPUM_MANUAL_XMM_RESTORE)
190 ASMWrMsr(MSR_K6_EFER, oldMsrEFERHost);
191
192 /* CPUMHandleLazyFPU could have changed CR0; restore it. */
193 ASMSetCR0(oldCR0);
194#else
195 /* Save the FPU control word and MXCSR, so we can restore the properly afterwards.
196 * We don't want the guest to be able to trigger floating point/SSE exceptions on the host.
197 */
198 pVM->cpum.s.Host.fpu.FCW = CPUMGetFCW();
199 if (pVM->cpum.s.CPUFeatures.edx.u1SSE)
200 pVM->cpum.s.Host.fpu.MXCSR = CPUMGetMXCSR();
201
202 CPUMLoadFPUAsm(pCtx);
203
204 /* The MSR_K6_EFER_FFXSR feature is AMD only so far, but check the cpuid just in case Intel adds it in the future.
205 *
206 * MSR_K6_EFER_FFXSR changes the behaviour of fxsave and fxrstore: the XMM state isn't saved/restored
207 */
208 if (pVM->cpum.s.CPUFeaturesExt.edx & X86_CPUID_AMD_FEATURE_EDX_FFXSR)
209 {
210 /* @todo Do we really need to read this every time?? The host could change this on the fly though. */
211 uint64_t msrEFERHost = ASMRdMsr(MSR_K6_EFER);
212
213 if (msrEFERHost & MSR_K6_EFER_FFXSR)
214 {
215 /* fxrstor doesn't restore the XMM state! */
216 CPUMLoadXMMAsm(pCtx);
217 pVM->cpum.s.fUseFlags |= CPUM_MANUAL_XMM_RESTORE;
218 }
219 }
220#endif
221
222 pVM->cpum.s.fUseFlags |= CPUM_USED_FPU;
223 return VINF_SUCCESS;
224}
225
226
227/**
228 * Save guest FPU/XMM state
229 *
230 * @returns VBox status code.
231 * @param pVM VM handle.
232 * @param pCtx CPU context
233 */
234CPUMR0DECL(int) CPUMR0SaveGuestFPU(PVM pVM, PCPUMCTX pCtx)
235{
236 Assert(pVM->cpum.s.CPUFeatures.edx.u1FXSR);
237 Assert(ASMGetCR4() & X86_CR4_OSFSXR);
238 AssertReturn((pVM->cpum.s.fUseFlags & CPUM_USED_FPU), VINF_SUCCESS);
239
240#ifndef CPUM_CAN_HANDLE_NM_TRAPS_IN_KERNEL_MODE
241 uint64_t oldMsrEFERHost;
242
243 /* Clear MSR_K6_EFER_FFXSR or else we'll be unable to save/restore the XMM state with fxsave/fxrstor. */
244 if (pVM->cpum.s.fUseFlags & CPUM_MANUAL_XMM_RESTORE)
245 {
246 oldMsrEFERHost = ASMRdMsr(MSR_K6_EFER);
247 ASMWrMsr(MSR_K6_EFER, oldMsrEFERHost & ~MSR_K6_EFER_FFXSR);
248 }
249 CPUMRestoreHostFPUState(pVM);
250
251 /* Restore EFER MSR */
252 if (pVM->cpum.s.fUseFlags & CPUM_MANUAL_XMM_RESTORE)
253 ASMWrMsr(MSR_K6_EFER, oldMsrEFERHost | MSR_K6_EFER_FFXSR);
254
255#else
256 CPUMSaveFPUAsm(pCtx);
257 if (pVM->cpum.s.fUseFlags & CPUM_MANUAL_XMM_RESTORE)
258 {
259 /* fxsave doesn't save the XMM state! */
260 CPUMSaveXMMAsm(pCtx);
261 }
262 /* Restore the original FPU control word and MXCSR.
263 * We don't want the guest to be able to trigger floating point/SSE exceptions on the host.
264 */
265 CPUMSetFCW(pVM->cpum.s.Host.fpu.FCW);
266 if (pVM->cpum.s.CPUFeatures.edx.u1SSE)
267 CPUMSetMXCSR(pVM->cpum.s.Host.fpu.MXCSR);
268#endif
269
270 pVM->cpum.s.fUseFlags &= ~(CPUM_USED_FPU|CPUM_MANUAL_XMM_RESTORE);
271 return VINF_SUCCESS;
272}
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette