VirtualBox

source: vbox/trunk/src/VBox/VMM/VMMR0/HWACCMR0.cpp@ 13972

Last change on this file since 13972 was 13960, checked in by vboxsync, 16 years ago

Moved guest and host CPU contexts into per-VCPU array.

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
File size: 50.5 KB
Line 
1/* $Id: HWACCMR0.cpp 13960 2008-11-07 13:04:45Z vboxsync $ */
2/** @file
3 * HWACCM - Host Context Ring 0.
4 */
5
6/*
7 * Copyright (C) 2006-2007 Sun Microsystems, Inc.
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 *
17 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa
18 * Clara, CA 95054 USA or visit http://www.sun.com if you need
19 * additional information or have any questions.
20 */
21
22
23/*******************************************************************************
24* Header Files *
25*******************************************************************************/
26#define LOG_GROUP LOG_GROUP_HWACCM
27#include <VBox/hwaccm.h>
28#include "HWACCMInternal.h"
29#include <VBox/vm.h>
30#include <VBox/x86.h>
31#include <VBox/hwacc_vmx.h>
32#include <VBox/hwacc_svm.h>
33#include <VBox/pgm.h>
34#include <VBox/pdm.h>
35#include <VBox/err.h>
36#include <VBox/log.h>
37#include <VBox/selm.h>
38#include <VBox/iom.h>
39#include <iprt/param.h>
40#include <iprt/assert.h>
41#include <iprt/asm.h>
42#include <iprt/string.h>
43#include <iprt/memobj.h>
44#include <iprt/cpuset.h>
45#include <iprt/power.h>
46#include "HWVMXR0.h"
47#include "HWSVMR0.h"
48
49/*******************************************************************************
50* Internal Functions *
51*******************************************************************************/
52static DECLCALLBACK(void) HWACCMR0EnableCPU(RTCPUID idCpu, void *pvUser1, void *pvUser2);
53static DECLCALLBACK(void) HWACCMR0DisableCPU(RTCPUID idCpu, void *pvUser1, void *pvUser2);
54static DECLCALLBACK(void) HWACCMR0InitCPU(RTCPUID idCpu, void *pvUser1, void *pvUser2);
55static int hwaccmR0CheckCpuRcArray(int *paRc, unsigned cErrorCodes, RTCPUID *pidCpu);
56static DECLCALLBACK(void) hwaccmR0PowerCallback(RTPOWEREVENT enmEvent, void *pvUser);
57
58/*******************************************************************************
59* Global Variables *
60*******************************************************************************/
61
62static struct
63{
64 HWACCM_CPUINFO aCpuInfo[RTCPUSET_MAX_CPUS];
65
66 /** Ring 0 handlers for VT-x and AMD-V. */
67 DECLR0CALLBACKMEMBER(int, pfnEnterSession,(PVM pVM, PVMCPU pVCpu, PHWACCM_CPUINFO pCpu));
68 DECLR0CALLBACKMEMBER(int, pfnLeaveSession,(PVM pVM, PVMCPU pVCpu, PCPUMCTX pCtx));
69 DECLR0CALLBACKMEMBER(int, pfnSaveHostState,(PVM pVM, PVMCPU pVCpu));
70 DECLR0CALLBACKMEMBER(int, pfnLoadGuestState,(PVM pVM, PVMCPU pVCpu, PCPUMCTX pCtx));
71 DECLR0CALLBACKMEMBER(int, pfnRunGuestCode,(PVM pVM, PVMCPU pVCpu, PCPUMCTX pCtx));
72 DECLR0CALLBACKMEMBER(int, pfnEnableCpu, (PHWACCM_CPUINFO pCpu, PVM pVM, void *pvPageCpu, RTHCPHYS pPageCpuPhys));
73 DECLR0CALLBACKMEMBER(int, pfnDisableCpu, (PHWACCM_CPUINFO pCpu, void *pvPageCpu, RTHCPHYS pPageCpuPhys));
74 DECLR0CALLBACKMEMBER(int, pfnInitVM, (PVM pVM));
75 DECLR0CALLBACKMEMBER(int, pfnTermVM, (PVM pVM));
76 DECLR0CALLBACKMEMBER(int, pfnSetupVM, (PVM pVM));
77
78 /** Maximum ASID allowed. */
79 uint32_t uMaxASID;
80
81 struct
82 {
83 /** Set by the ring-0 driver to indicate VMX is supported by the CPU. */
84 bool fSupported;
85
86 /** Host CR4 value (set by ring-0 VMX init) */
87 uint64_t hostCR4;
88
89 /** VMX MSR values */
90 struct
91 {
92 uint64_t feature_ctrl;
93 uint64_t vmx_basic_info;
94 VMX_CAPABILITY vmx_pin_ctls;
95 VMX_CAPABILITY vmx_proc_ctls;
96 VMX_CAPABILITY vmx_proc_ctls2;
97 VMX_CAPABILITY vmx_exit;
98 VMX_CAPABILITY vmx_entry;
99 uint64_t vmx_misc;
100 uint64_t vmx_cr0_fixed0;
101 uint64_t vmx_cr0_fixed1;
102 uint64_t vmx_cr4_fixed0;
103 uint64_t vmx_cr4_fixed1;
104 uint64_t vmx_vmcs_enum;
105 uint64_t vmx_eptcaps;
106 } msr;
107 /* Last instruction error */
108 uint32_t ulLastInstrError;
109 } vmx;
110 struct
111 {
112 /** Set by the ring-0 driver to indicate SVM is supported by the CPU. */
113 bool fSupported;
114
115 /** SVM revision. */
116 uint32_t u32Rev;
117
118 /** SVM feature bits from cpuid 0x8000000a */
119 uint32_t u32Features;
120 } svm;
121 /** Saved error from detection */
122 int32_t lLastError;
123
124 struct
125 {
126 uint32_t u32AMDFeatureECX;
127 uint32_t u32AMDFeatureEDX;
128 } cpuid;
129
130 HWACCMSTATE enmHwAccmState;
131
132 volatile bool fSuspended;
133} HWACCMR0Globals;
134
135
136
137/**
138 * Does global Ring-0 HWACCM initialization.
139 *
140 * @returns VBox status code.
141 */
142VMMR0DECL(int) HWACCMR0Init(void)
143{
144 int rc;
145
146 memset(&HWACCMR0Globals, 0, sizeof(HWACCMR0Globals));
147 HWACCMR0Globals.enmHwAccmState = HWACCMSTATE_UNINITIALIZED;
148 for (unsigned i = 0; i < RT_ELEMENTS(HWACCMR0Globals.aCpuInfo); i++)
149 HWACCMR0Globals.aCpuInfo[i].pMemObj = NIL_RTR0MEMOBJ;
150
151 /* Fill in all callbacks with placeholders. */
152 HWACCMR0Globals.pfnEnterSession = HWACCMR0DummyEnter;
153 HWACCMR0Globals.pfnLeaveSession = HWACCMR0DummyLeave;
154 HWACCMR0Globals.pfnSaveHostState = HWACCMR0DummySaveHostState;
155 HWACCMR0Globals.pfnLoadGuestState = HWACCMR0DummyLoadGuestState;
156 HWACCMR0Globals.pfnRunGuestCode = HWACCMR0DummyRunGuestCode;
157 HWACCMR0Globals.pfnEnableCpu = HWACCMR0DummyEnableCpu;
158 HWACCMR0Globals.pfnDisableCpu = HWACCMR0DummyDisableCpu;
159 HWACCMR0Globals.pfnInitVM = HWACCMR0DummyInitVM;
160 HWACCMR0Globals.pfnTermVM = HWACCMR0DummyTermVM;
161 HWACCMR0Globals.pfnSetupVM = HWACCMR0DummySetupVM;
162
163#ifndef VBOX_WITH_HYBIRD_32BIT_KERNEL /* paranoia */
164
165 /*
166 * Check for VT-x and AMD-V capabilities
167 */
168 if (ASMHasCpuId())
169 {
170 uint32_t u32FeaturesECX;
171 uint32_t u32Dummy;
172 uint32_t u32FeaturesEDX;
173 uint32_t u32VendorEBX, u32VendorECX, u32VendorEDX;
174
175 ASMCpuId(0, &u32Dummy, &u32VendorEBX, &u32VendorECX, &u32VendorEDX);
176 ASMCpuId(1, &u32Dummy, &u32Dummy, &u32FeaturesECX, &u32FeaturesEDX);
177 /* Query AMD features. */
178 ASMCpuId(0x80000001, &u32Dummy, &u32Dummy, &HWACCMR0Globals.cpuid.u32AMDFeatureECX, &HWACCMR0Globals.cpuid.u32AMDFeatureEDX);
179
180 if ( u32VendorEBX == X86_CPUID_VENDOR_INTEL_EBX
181 && u32VendorECX == X86_CPUID_VENDOR_INTEL_ECX
182 && u32VendorEDX == X86_CPUID_VENDOR_INTEL_EDX
183 )
184 {
185 /*
186 * Read all VMX MSRs if VMX is available. (same goes for RDMSR/WRMSR)
187 * We also assume all VMX-enabled CPUs support fxsave/fxrstor.
188 */
189 if ( (u32FeaturesECX & X86_CPUID_FEATURE_ECX_VMX)
190 && (u32FeaturesEDX & X86_CPUID_FEATURE_EDX_MSR)
191 && (u32FeaturesEDX & X86_CPUID_FEATURE_EDX_FXSR)
192 )
193 {
194 int aRc[RTCPUSET_MAX_CPUS];
195 RTCPUID idCpu = 0;
196
197 HWACCMR0Globals.vmx.msr.feature_ctrl = ASMRdMsr(MSR_IA32_FEATURE_CONTROL);
198
199 /* We need to check if VT-x has been properly initialized on all CPUs. Some BIOSes do a lousy job. */
200 memset(aRc, 0, sizeof(aRc));
201 HWACCMR0Globals.lLastError = RTMpOnAll(HWACCMR0InitCPU, (void *)u32VendorEBX, aRc);
202
203 /* Check the return code of all invocations. */
204 if (RT_SUCCESS(HWACCMR0Globals.lLastError))
205 HWACCMR0Globals.lLastError = hwaccmR0CheckCpuRcArray(aRc, RT_ELEMENTS(aRc), &idCpu);
206
207 if (RT_SUCCESS(HWACCMR0Globals.lLastError))
208 {
209 /* Reread in case we've changed it. */
210 HWACCMR0Globals.vmx.msr.feature_ctrl = ASMRdMsr(MSR_IA32_FEATURE_CONTROL);
211
212 if ( (HWACCMR0Globals.vmx.msr.feature_ctrl & (MSR_IA32_FEATURE_CONTROL_VMXON|MSR_IA32_FEATURE_CONTROL_LOCK))
213 == (MSR_IA32_FEATURE_CONTROL_VMXON|MSR_IA32_FEATURE_CONTROL_LOCK))
214 {
215 RTR0MEMOBJ pScatchMemObj;
216 void *pvScatchPage;
217 RTHCPHYS pScatchPagePhys;
218
219 HWACCMR0Globals.vmx.msr.vmx_basic_info = ASMRdMsr(MSR_IA32_VMX_BASIC_INFO);
220 HWACCMR0Globals.vmx.msr.vmx_pin_ctls.u = ASMRdMsr(MSR_IA32_VMX_PINBASED_CTLS);
221 HWACCMR0Globals.vmx.msr.vmx_proc_ctls.u = ASMRdMsr(MSR_IA32_VMX_PROCBASED_CTLS);
222 HWACCMR0Globals.vmx.msr.vmx_exit.u = ASMRdMsr(MSR_IA32_VMX_EXIT_CTLS);
223 HWACCMR0Globals.vmx.msr.vmx_entry.u = ASMRdMsr(MSR_IA32_VMX_ENTRY_CTLS);
224 HWACCMR0Globals.vmx.msr.vmx_misc = ASMRdMsr(MSR_IA32_VMX_MISC);
225 HWACCMR0Globals.vmx.msr.vmx_cr0_fixed0 = ASMRdMsr(MSR_IA32_VMX_CR0_FIXED0);
226 HWACCMR0Globals.vmx.msr.vmx_cr0_fixed1 = ASMRdMsr(MSR_IA32_VMX_CR0_FIXED1);
227 HWACCMR0Globals.vmx.msr.vmx_cr4_fixed0 = ASMRdMsr(MSR_IA32_VMX_CR4_FIXED0);
228 HWACCMR0Globals.vmx.msr.vmx_cr4_fixed1 = ASMRdMsr(MSR_IA32_VMX_CR4_FIXED1);
229 HWACCMR0Globals.vmx.msr.vmx_vmcs_enum = ASMRdMsr(MSR_IA32_VMX_VMCS_ENUM);
230 /* VPID 16 bits ASID. */
231 HWACCMR0Globals.uMaxASID = 0x10000; /* exclusive */
232
233 if (HWACCMR0Globals.vmx.msr.vmx_proc_ctls.n.allowed1 & VMX_VMCS_CTRL_PROC_EXEC_USE_SECONDARY_EXEC_CTRL)
234 {
235 HWACCMR0Globals.vmx.msr.vmx_proc_ctls2.u = ASMRdMsr(MSR_IA32_VMX_PROCBASED_CTLS2);
236 if (HWACCMR0Globals.vmx.msr.vmx_proc_ctls2.n.allowed1 & (VMX_VMCS_CTRL_PROC_EXEC2_EPT|VMX_VMCS_CTRL_PROC_EXEC2_VPID))
237 HWACCMR0Globals.vmx.msr.vmx_eptcaps = ASMRdMsr(MSR_IA32_VMX_EPT_CAPS);
238 }
239
240 HWACCMR0Globals.vmx.hostCR4 = ASMGetCR4();
241
242 rc = RTR0MemObjAllocCont(&pScatchMemObj, 1 << PAGE_SHIFT, true /* executable R0 mapping */);
243 if (RT_FAILURE(rc))
244 return rc;
245
246 pvScatchPage = RTR0MemObjAddress(pScatchMemObj);
247 pScatchPagePhys = RTR0MemObjGetPagePhysAddr(pScatchMemObj, 0);
248 memset(pvScatchPage, 0, PAGE_SIZE);
249
250 /* Set revision dword at the beginning of the structure. */
251 *(uint32_t *)pvScatchPage = MSR_IA32_VMX_BASIC_INFO_VMCS_ID(HWACCMR0Globals.vmx.msr.vmx_basic_info);
252
253 /* Make sure we don't get rescheduled to another cpu during this probe. */
254 RTCCUINTREG fFlags = ASMIntDisableFlags();
255
256 /*
257 * Check CR4.VMXE
258 */
259 if (!(HWACCMR0Globals.vmx.hostCR4 & X86_CR4_VMXE))
260 {
261 /* In theory this bit could be cleared behind our back. Which would cause #UD faults when we
262 * try to execute the VMX instructions...
263 */
264 ASMSetCR4(HWACCMR0Globals.vmx.hostCR4 | X86_CR4_VMXE);
265 }
266
267 /* Enter VMX Root Mode */
268 rc = VMXEnable(pScatchPagePhys);
269 if (RT_FAILURE(rc))
270 {
271 /* KVM leaves the CPU in VMX root mode. Not only is this not allowed, it will crash the host when we enter raw mode, because
272 * (a) clearing X86_CR4_VMXE in CR4 causes a #GP (we no longer modify this bit)
273 * (b) turning off paging causes a #GP (unavoidable when switching from long to 32 bits mode or 32 bits to PAE)
274 *
275 * They should fix their code, but until they do we simply refuse to run.
276 */
277 HWACCMR0Globals.lLastError = VERR_VMX_IN_VMX_ROOT_MODE;
278 }
279 else
280 {
281 HWACCMR0Globals.vmx.fSupported = true;
282 VMXDisable();
283 }
284
285 /* Restore CR4 again; don't leave the X86_CR4_VMXE flag set if it wasn't so before (some software could incorrectly think it's in VMX mode) */
286 ASMSetCR4(HWACCMR0Globals.vmx.hostCR4);
287 ASMSetFlags(fFlags);
288
289 RTR0MemObjFree(pScatchMemObj, false);
290 if (RT_FAILURE(HWACCMR0Globals.lLastError))
291 return HWACCMR0Globals.lLastError;
292 }
293 else
294 {
295 AssertFailed(); /* can't hit this case anymore */
296 HWACCMR0Globals.lLastError = VERR_VMX_ILLEGAL_FEATURE_CONTROL_MSR;
297 }
298 }
299#ifdef LOG_ENABLED
300 else
301 SUPR0Printf("HWACCMR0InitCPU failed with rc=%d\n", HWACCMR0Globals.lLastError);
302#endif
303 }
304 else
305 HWACCMR0Globals.lLastError = VERR_VMX_NO_VMX;
306 }
307 else
308 if ( u32VendorEBX == X86_CPUID_VENDOR_AMD_EBX
309 && u32VendorECX == X86_CPUID_VENDOR_AMD_ECX
310 && u32VendorEDX == X86_CPUID_VENDOR_AMD_EDX
311 )
312 {
313 /*
314 * Read all SVM MSRs if SVM is available. (same goes for RDMSR/WRMSR)
315 * We also assume all SVM-enabled CPUs support fxsave/fxrstor.
316 */
317 if ( (HWACCMR0Globals.cpuid.u32AMDFeatureECX & X86_CPUID_AMD_FEATURE_ECX_SVM)
318 && (u32FeaturesEDX & X86_CPUID_FEATURE_EDX_MSR)
319 && (u32FeaturesEDX & X86_CPUID_FEATURE_EDX_FXSR)
320 )
321 {
322 int aRc[RTCPUSET_MAX_CPUS];
323 RTCPUID idCpu = 0;
324
325 /* We need to check if AMD-V has been properly initialized on all CPUs. Some BIOSes might do a poor job. */
326 memset(aRc, 0, sizeof(aRc));
327 rc = RTMpOnAll(HWACCMR0InitCPU, (void *)u32VendorEBX, aRc);
328 AssertRC(rc);
329
330 /* Check the return code of all invocations. */
331 if (RT_SUCCESS(rc))
332 rc = hwaccmR0CheckCpuRcArray(aRc, RT_ELEMENTS(aRc), &idCpu);
333
334 AssertMsgRC(rc, ("HWACCMR0InitCPU failed for cpu %d with rc=%d\n", idCpu, rc));
335
336 if (RT_SUCCESS(rc))
337 {
338 /* Query AMD features. */
339 ASMCpuId(0x8000000A, &HWACCMR0Globals.svm.u32Rev, &HWACCMR0Globals.uMaxASID, &u32Dummy, &HWACCMR0Globals.svm.u32Features);
340
341 HWACCMR0Globals.svm.fSupported = true;
342 }
343 else
344 HWACCMR0Globals.lLastError = rc;
345 }
346 else
347 HWACCMR0Globals.lLastError = VERR_SVM_NO_SVM;
348 }
349 else
350 HWACCMR0Globals.lLastError = VERR_HWACCM_UNKNOWN_CPU;
351 }
352 else
353 HWACCMR0Globals.lLastError = VERR_HWACCM_NO_CPUID;
354
355#endif /* !VBOX_WITH_HYBIRD_32BIT_KERNEL */
356
357 if (HWACCMR0Globals.vmx.fSupported)
358 {
359 HWACCMR0Globals.pfnEnterSession = VMXR0Enter;
360 HWACCMR0Globals.pfnLeaveSession = VMXR0Leave;
361 HWACCMR0Globals.pfnSaveHostState = VMXR0SaveHostState;
362 HWACCMR0Globals.pfnLoadGuestState = VMXR0LoadGuestState;
363 HWACCMR0Globals.pfnRunGuestCode = VMXR0RunGuestCode;
364 HWACCMR0Globals.pfnEnableCpu = VMXR0EnableCpu;
365 HWACCMR0Globals.pfnDisableCpu = VMXR0DisableCpu;
366 HWACCMR0Globals.pfnInitVM = VMXR0InitVM;
367 HWACCMR0Globals.pfnTermVM = VMXR0TermVM;
368 HWACCMR0Globals.pfnSetupVM = VMXR0SetupVM;
369 }
370 else
371 if (HWACCMR0Globals.svm.fSupported)
372 {
373 HWACCMR0Globals.pfnEnterSession = SVMR0Enter;
374 HWACCMR0Globals.pfnLeaveSession = SVMR0Leave;
375 HWACCMR0Globals.pfnSaveHostState = SVMR0SaveHostState;
376 HWACCMR0Globals.pfnLoadGuestState = SVMR0LoadGuestState;
377 HWACCMR0Globals.pfnRunGuestCode = SVMR0RunGuestCode;
378 HWACCMR0Globals.pfnEnableCpu = SVMR0EnableCpu;
379 HWACCMR0Globals.pfnDisableCpu = SVMR0DisableCpu;
380 HWACCMR0Globals.pfnInitVM = SVMR0InitVM;
381 HWACCMR0Globals.pfnTermVM = SVMR0TermVM;
382 HWACCMR0Globals.pfnSetupVM = SVMR0SetupVM;
383 }
384
385 rc = RTPowerNotificationRegister(hwaccmR0PowerCallback, 0);
386 Assert(RT_SUCCESS(rc));
387
388 return VINF_SUCCESS;
389}
390
391
392/**
393 * Checks the error code array filled in for each cpu in the system.
394 *
395 * @returns VBox status code.
396 * @param paRc Error code array
397 * @param cErrorCodes Array size
398 * @param pidCpu Value of the first cpu that set an error (out)
399 */
400static int hwaccmR0CheckCpuRcArray(int *paRc, unsigned cErrorCodes, RTCPUID *pidCpu)
401{
402 int rc = VINF_SUCCESS;
403
404 Assert(cErrorCodes == RTCPUSET_MAX_CPUS);
405
406 for (unsigned i=0;i<cErrorCodes;i++)
407 {
408 if (RTMpIsCpuOnline(i))
409 {
410 if (RT_FAILURE(paRc[i]))
411 {
412 rc = paRc[i];
413 *pidCpu = i;
414 break;
415 }
416 }
417 }
418 return rc;
419}
420
421/**
422 * Does global Ring-0 HWACCM termination.
423 *
424 * @returns VBox status code.
425 */
426VMMR0DECL(int) HWACCMR0Term(void)
427{
428 int aRc[RTCPUSET_MAX_CPUS];
429 int rc;
430
431 rc = RTPowerNotificationDeregister(hwaccmR0PowerCallback, 0);
432 Assert(RT_SUCCESS(rc));
433
434 memset(aRc, 0, sizeof(aRc));
435 rc = RTMpOnAll(HWACCMR0DisableCPU, aRc, NULL);
436 Assert(RT_SUCCESS(rc) || rc == VERR_NOT_SUPPORTED);
437
438 /* Free the per-cpu pages used for VT-x and AMD-V */
439 for (unsigned i=0;i<RT_ELEMENTS(HWACCMR0Globals.aCpuInfo);i++)
440 {
441 AssertMsgRC(aRc[i], ("HWACCMR0DisableCPU failed for cpu %d with rc=%d\n", i, aRc[i]));
442 if (HWACCMR0Globals.aCpuInfo[i].pMemObj != NIL_RTR0MEMOBJ)
443 {
444 RTR0MemObjFree(HWACCMR0Globals.aCpuInfo[i].pMemObj, false);
445 HWACCMR0Globals.aCpuInfo[i].pMemObj = NIL_RTR0MEMOBJ;
446 }
447 }
448 return rc;
449}
450
451
452/**
453 * Worker function passed to RTMpOnAll, RTMpOnOthers and RTMpOnSpecific that
454 * is to be called on the target cpus.
455 *
456 * @param idCpu The identifier for the CPU the function is called on.
457 * @param pvUser1 The 1st user argument.
458 * @param pvUser2 The 2nd user argument.
459 */
460static DECLCALLBACK(void) HWACCMR0InitCPU(RTCPUID idCpu, void *pvUser1, void *pvUser2)
461{
462 unsigned u32VendorEBX = (uintptr_t)pvUser1;
463 int *paRc = (int *)pvUser2;
464 uint64_t val;
465
466#ifdef LOG_ENABLED
467 SUPR0Printf("HWACCMR0InitCPU cpu %d\n", idCpu);
468#endif
469 Assert(idCpu == (RTCPUID)RTMpCpuIdToSetIndex(idCpu)); /// @todo fix idCpu == index assumption (rainy day)
470
471 if (u32VendorEBX == X86_CPUID_VENDOR_INTEL_EBX)
472 {
473 val = ASMRdMsr(MSR_IA32_FEATURE_CONTROL);
474
475 /*
476 * Both the LOCK and VMXON bit must be set; otherwise VMXON will generate a #GP.
477 * Once the lock bit is set, this MSR can no longer be modified.
478 */
479 if (!(val & (MSR_IA32_FEATURE_CONTROL_VMXON|MSR_IA32_FEATURE_CONTROL_LOCK)))
480 {
481 /* MSR is not yet locked; we can change it ourselves here */
482 ASMWrMsr(MSR_IA32_FEATURE_CONTROL, HWACCMR0Globals.vmx.msr.feature_ctrl | MSR_IA32_FEATURE_CONTROL_VMXON | MSR_IA32_FEATURE_CONTROL_LOCK);
483 val = ASMRdMsr(MSR_IA32_FEATURE_CONTROL);
484 }
485 if ( (val & (MSR_IA32_FEATURE_CONTROL_VMXON|MSR_IA32_FEATURE_CONTROL_LOCK))
486 == (MSR_IA32_FEATURE_CONTROL_VMXON|MSR_IA32_FEATURE_CONTROL_LOCK))
487 paRc[idCpu] = VINF_SUCCESS;
488 else
489 paRc[idCpu] = VERR_VMX_MSR_LOCKED_OR_DISABLED;
490 }
491 else
492 if (u32VendorEBX == X86_CPUID_VENDOR_AMD_EBX)
493 {
494 /* Check if SVM is disabled */
495 val = ASMRdMsr(MSR_K8_VM_CR);
496 if (!(val & MSR_K8_VM_CR_SVM_DISABLE))
497 {
498 /* Turn on SVM in the EFER MSR. */
499 val = ASMRdMsr(MSR_K6_EFER);
500 if (!(val & MSR_K6_EFER_SVME))
501 ASMWrMsr(MSR_K6_EFER, val | MSR_K6_EFER_SVME);
502
503 /* Paranoia. */
504 val = ASMRdMsr(MSR_K6_EFER);
505 if (val & MSR_K6_EFER_SVME)
506 paRc[idCpu] = VINF_SUCCESS;
507 else
508 paRc[idCpu] = VERR_SVM_ILLEGAL_EFER_MSR;
509 }
510 else
511 paRc[idCpu] = HWACCMR0Globals.lLastError = VERR_SVM_DISABLED;
512 }
513 else
514 AssertFailed(); /* can't happen */
515 return;
516}
517
518
519/**
520 * Sets up HWACCM on all cpus.
521 *
522 * @returns VBox status code.
523 * @param pVM The VM to operate on.
524 * @param enmNewHwAccmState New hwaccm state
525 *
526 */
527VMMR0DECL(int) HWACCMR0EnableAllCpus(PVM pVM, HWACCMSTATE enmNewHwAccmState)
528{
529 Assert(sizeof(HWACCMR0Globals.enmHwAccmState) == sizeof(uint32_t));
530
531 /* Make sure we don't touch hwaccm after we've disabled hwaccm in preparation of a suspend. */
532 if (ASMAtomicReadBool(&HWACCMR0Globals.fSuspended))
533 return VERR_HWACCM_SUSPEND_PENDING;
534
535 if (ASMAtomicCmpXchgU32((volatile uint32_t *)&HWACCMR0Globals.enmHwAccmState, enmNewHwAccmState, HWACCMSTATE_UNINITIALIZED))
536 {
537 int aRc[RTCPUSET_MAX_CPUS];
538 RTCPUID idCpu = 0;
539
540 /* Don't setup hwaccm as that might not work (vt-x & 64 bits raw mode) */
541 if (enmNewHwAccmState == HWACCMSTATE_DISABLED)
542 return VINF_SUCCESS;
543
544 memset(aRc, 0, sizeof(aRc));
545
546 /* Allocate one page per cpu for the global vt-x and amd-v pages */
547 for (unsigned i=0;i<RT_ELEMENTS(HWACCMR0Globals.aCpuInfo);i++)
548 {
549 Assert(!HWACCMR0Globals.aCpuInfo[i].pMemObj);
550
551 /** @todo this is rather dangerous if cpus can be taken offline; we don't care for now */
552 if (RTMpIsCpuOnline(i))
553 {
554 int rc = RTR0MemObjAllocCont(&HWACCMR0Globals.aCpuInfo[i].pMemObj, 1 << PAGE_SHIFT, true /* executable R0 mapping */);
555 AssertRC(rc);
556 if (RT_FAILURE(rc))
557 return rc;
558
559 void *pvR0 = RTR0MemObjAddress(HWACCMR0Globals.aCpuInfo[i].pMemObj);
560 Assert(pvR0);
561 ASMMemZeroPage(pvR0);
562
563#ifdef LOG_ENABLED
564 SUPR0Printf("address %x phys %x\n", pvR0, (uint32_t)RTR0MemObjGetPagePhysAddr(HWACCMR0Globals.aCpuInfo[i].pMemObj, 0));
565#endif
566 }
567 }
568 /* First time, so initialize each cpu/core */
569 int rc = RTMpOnAll(HWACCMR0EnableCPU, (void *)pVM, aRc);
570
571 /* Check the return code of all invocations. */
572 if (RT_SUCCESS(rc))
573 rc = hwaccmR0CheckCpuRcArray(aRc, RT_ELEMENTS(aRc), &idCpu);
574
575 AssertMsgRC(rc, ("HWACCMR0EnableAllCpus failed for cpu %d with rc=%d\n", idCpu, rc));
576 return rc;
577 }
578
579 if (HWACCMR0Globals.enmHwAccmState == enmNewHwAccmState)
580 return VINF_SUCCESS;
581
582 /* Request to change the mode is not allowed */
583 return VERR_ACCESS_DENIED;
584}
585
586/**
587 * Worker function passed to RTMpOnAll, RTMpOnOthers and RTMpOnSpecific that
588 * is to be called on the target cpus.
589 *
590 * @param idCpu The identifier for the CPU the function is called on.
591 * @param pvUser1 The 1st user argument.
592 * @param pvUser2 The 2nd user argument.
593 */
594static DECLCALLBACK(void) HWACCMR0EnableCPU(RTCPUID idCpu, void *pvUser1, void *pvUser2)
595{
596 PVM pVM = (PVM)pvUser1; /* can be NULL! */
597 int *paRc = (int *)pvUser2;
598 void *pvPageCpu;
599 RTHCPHYS pPageCpuPhys;
600 PHWACCM_CPUINFO pCpu = &HWACCMR0Globals.aCpuInfo[idCpu];
601
602 Assert(idCpu == (RTCPUID)RTMpCpuIdToSetIndex(idCpu)); /// @todo fix idCpu == index assumption (rainy day)
603 Assert(idCpu < RT_ELEMENTS(HWACCMR0Globals.aCpuInfo));
604 Assert(!pCpu->fConfigured);
605 Assert(ASMAtomicReadBool(&pCpu->fInUse) == false);
606
607 pCpu->idCpu = idCpu;
608
609 /* Make sure we start with a clean TLB. */
610 pCpu->fFlushTLB = true;
611
612 pCpu->uCurrentASID = 0; /* we'll aways increment this the first time (host uses ASID 0) */
613 pCpu->cTLBFlushes = 0;
614
615 /* Should never happen */
616 if (!pCpu->pMemObj)
617 {
618 AssertFailed();
619 paRc[idCpu] = VERR_INTERNAL_ERROR;
620 return;
621 }
622
623 pvPageCpu = RTR0MemObjAddress(pCpu->pMemObj);
624 pPageCpuPhys = RTR0MemObjGetPagePhysAddr(pCpu->pMemObj, 0);
625
626 paRc[idCpu] = HWACCMR0Globals.pfnEnableCpu(pCpu, pVM, pvPageCpu, pPageCpuPhys);
627 AssertRC(paRc[idCpu]);
628 if (RT_SUCCESS(paRc[idCpu]))
629 pCpu->fConfigured = true;
630
631 return;
632}
633
634/**
635 * Worker function passed to RTMpOnAll, RTMpOnOthers and RTMpOnSpecific that
636 * is to be called on the target cpus.
637 *
638 * @param idCpu The identifier for the CPU the function is called on.
639 * @param pvUser1 The 1st user argument.
640 * @param pvUser2 The 2nd user argument.
641 */
642static DECLCALLBACK(void) HWACCMR0DisableCPU(RTCPUID idCpu, void *pvUser1, void *pvUser2)
643{
644 void *pvPageCpu;
645 RTHCPHYS pPageCpuPhys;
646 int *paRc = (int *)pvUser1;
647 PHWACCM_CPUINFO pCpu = &HWACCMR0Globals.aCpuInfo[idCpu];
648
649 Assert(idCpu == (RTCPUID)RTMpCpuIdToSetIndex(idCpu)); /// @todo fix idCpu == index assumption (rainy day)
650 Assert(idCpu < RT_ELEMENTS(HWACCMR0Globals.aCpuInfo));
651 Assert(ASMAtomicReadBool(&pCpu->fInUse) == false);
652
653 if (!pCpu->pMemObj)
654 return;
655
656 pvPageCpu = RTR0MemObjAddress(pCpu->pMemObj);
657 pPageCpuPhys = RTR0MemObjGetPagePhysAddr(pCpu->pMemObj, 0);
658
659 if (pCpu->fConfigured)
660 {
661 paRc[idCpu] = HWACCMR0Globals.pfnDisableCpu(pCpu, pvPageCpu, pPageCpuPhys);
662 AssertRC(paRc[idCpu]);
663 pCpu->fConfigured = false;
664 }
665 else
666 paRc[idCpu] = VINF_SUCCESS; /* nothing to do */
667
668 pCpu->uCurrentASID = 0;
669 return;
670}
671
672/**
673 * Called whenever a system power state change occurs.
674 *
675 * @param enmEvent Power event
676 * @param pvUser User argument
677 */
678static DECLCALLBACK(void) hwaccmR0PowerCallback(RTPOWEREVENT enmEvent, void *pvUser)
679{
680 NOREF(pvUser);
681
682#ifdef LOG_ENABLED
683 if (enmEvent == RTPOWEREVENT_SUSPEND)
684 SUPR0Printf("hwaccmR0PowerCallback RTPOWEREVENT_SUSPEND\n");
685 else
686 SUPR0Printf("hwaccmR0PowerCallback RTPOWEREVENT_RESUME\n");
687#endif
688
689 if (enmEvent == RTPOWEREVENT_SUSPEND)
690 ASMAtomicWriteBool(&HWACCMR0Globals.fSuspended, true);
691
692 if (HWACCMR0Globals.enmHwAccmState == HWACCMSTATE_ENABLED)
693 {
694 int aRc[RTCPUSET_MAX_CPUS];
695 int rc;
696 RTCPUID idCpu;
697
698 memset(aRc, 0, sizeof(aRc));
699 if (enmEvent == RTPOWEREVENT_SUSPEND)
700 {
701 /* Turn off VT-x or AMD-V on all CPUs. */
702 rc = RTMpOnAll(HWACCMR0DisableCPU, aRc, NULL);
703 Assert(RT_SUCCESS(rc) || rc == VERR_NOT_SUPPORTED);
704 }
705 else
706 {
707 /* Reinit the CPUs from scratch as the suspend state has messed with the MSRs. */
708 rc = RTMpOnAll(HWACCMR0InitCPU, (void *)((HWACCMR0Globals.vmx.fSupported) ? X86_CPUID_VENDOR_INTEL_EBX : X86_CPUID_VENDOR_AMD_EBX), aRc);
709 Assert(RT_SUCCESS(rc) || rc == VERR_NOT_SUPPORTED);
710
711 if (RT_SUCCESS(rc))
712 rc = hwaccmR0CheckCpuRcArray(aRc, RT_ELEMENTS(aRc), &idCpu);
713#ifdef LOG_ENABLED
714 if (RT_FAILURE(rc))
715 SUPR0Printf("hwaccmR0PowerCallback HWACCMR0InitCPU failed with %d\n", rc);
716#endif
717
718 /* Turn VT-x or AMD-V back on on all CPUs. */
719 rc = RTMpOnAll(HWACCMR0EnableCPU, NULL, aRc);
720 Assert(RT_SUCCESS(rc) || rc == VERR_NOT_SUPPORTED);
721 }
722 }
723 if (enmEvent == RTPOWEREVENT_RESUME)
724 ASMAtomicWriteBool(&HWACCMR0Globals.fSuspended, false);
725}
726
727
728/**
729 * Does Ring-0 per VM HWACCM initialization.
730 *
731 * This is mainly to check that the Host CPU mode is compatible
732 * with VMX.
733 *
734 * @returns VBox status code.
735 * @param pVM The VM to operate on.
736 */
737VMMR0DECL(int) HWACCMR0InitVM(PVM pVM)
738{
739 int rc;
740 RTCPUID idCpu = RTMpCpuId();
741 PHWACCM_CPUINFO pCpu = &HWACCMR0Globals.aCpuInfo[idCpu];
742
743 AssertReturn(pVM, VERR_INVALID_PARAMETER);
744
745#ifdef LOG_ENABLED
746 SUPR0Printf("HWACCMR0InitVM: %p\n", pVM);
747#endif
748
749 /* Make sure we don't touch hwaccm after we've disabled hwaccm in preparation of a suspend. */
750 if (ASMAtomicReadBool(&HWACCMR0Globals.fSuspended))
751 return VERR_HWACCM_SUSPEND_PENDING;
752
753 pVM->hwaccm.s.vmx.fSupported = HWACCMR0Globals.vmx.fSupported;
754 pVM->hwaccm.s.svm.fSupported = HWACCMR0Globals.svm.fSupported;
755
756 pVM->hwaccm.s.vmx.msr.feature_ctrl = HWACCMR0Globals.vmx.msr.feature_ctrl;
757 pVM->hwaccm.s.vmx.hostCR4 = HWACCMR0Globals.vmx.hostCR4;
758 pVM->hwaccm.s.vmx.msr.vmx_basic_info = HWACCMR0Globals.vmx.msr.vmx_basic_info;
759 pVM->hwaccm.s.vmx.msr.vmx_pin_ctls = HWACCMR0Globals.vmx.msr.vmx_pin_ctls;
760 pVM->hwaccm.s.vmx.msr.vmx_proc_ctls = HWACCMR0Globals.vmx.msr.vmx_proc_ctls;
761 pVM->hwaccm.s.vmx.msr.vmx_proc_ctls2 = HWACCMR0Globals.vmx.msr.vmx_proc_ctls2;
762 pVM->hwaccm.s.vmx.msr.vmx_exit = HWACCMR0Globals.vmx.msr.vmx_exit;
763 pVM->hwaccm.s.vmx.msr.vmx_entry = HWACCMR0Globals.vmx.msr.vmx_entry;
764 pVM->hwaccm.s.vmx.msr.vmx_misc = HWACCMR0Globals.vmx.msr.vmx_misc;
765 pVM->hwaccm.s.vmx.msr.vmx_cr0_fixed0 = HWACCMR0Globals.vmx.msr.vmx_cr0_fixed0;
766 pVM->hwaccm.s.vmx.msr.vmx_cr0_fixed1 = HWACCMR0Globals.vmx.msr.vmx_cr0_fixed1;
767 pVM->hwaccm.s.vmx.msr.vmx_cr4_fixed0 = HWACCMR0Globals.vmx.msr.vmx_cr4_fixed0;
768 pVM->hwaccm.s.vmx.msr.vmx_cr4_fixed1 = HWACCMR0Globals.vmx.msr.vmx_cr4_fixed1;
769 pVM->hwaccm.s.vmx.msr.vmx_vmcs_enum = HWACCMR0Globals.vmx.msr.vmx_vmcs_enum;
770 pVM->hwaccm.s.vmx.msr.vmx_eptcaps = HWACCMR0Globals.vmx.msr.vmx_eptcaps;
771 pVM->hwaccm.s.svm.u32Rev = HWACCMR0Globals.svm.u32Rev;
772 pVM->hwaccm.s.svm.u32Features = HWACCMR0Globals.svm.u32Features;
773 pVM->hwaccm.s.cpuid.u32AMDFeatureECX = HWACCMR0Globals.cpuid.u32AMDFeatureECX;
774 pVM->hwaccm.s.cpuid.u32AMDFeatureEDX = HWACCMR0Globals.cpuid.u32AMDFeatureEDX;
775 pVM->hwaccm.s.lLastError = HWACCMR0Globals.lLastError;
776
777 pVM->hwaccm.s.uMaxASID = HWACCMR0Globals.uMaxASID;
778
779 for (unsigned i=0;i<pVM->cCPUs;i++)
780 {
781 PVMCPU pVCpu = &pVM->aCpus[i];
782
783#ifdef VBOX_STRICT
784 pVCpu->hwaccm.s.idEnteredCpu = NIL_RTCPUID;
785#endif
786 /* Invalidate the last cpu we were running on. */
787 pVCpu->hwaccm.s.idLastCpu = NIL_RTCPUID;
788
789 /* we'll aways increment this the first time (host uses ASID 0) */
790 pVCpu->hwaccm.s.uCurrentASID = 0;
791 }
792
793 ASMAtomicWriteBool(&pCpu->fInUse, true);
794
795 /* Init a VT-x or AMD-V VM. */
796 rc = HWACCMR0Globals.pfnInitVM(pVM);
797
798 ASMAtomicWriteBool(&pCpu->fInUse, false);
799
800 return rc;
801}
802
803
804/**
805 * Does Ring-0 per VM HWACCM termination.
806 *
807 * @returns VBox status code.
808 * @param pVM The VM to operate on.
809 */
810VMMR0DECL(int) HWACCMR0TermVM(PVM pVM)
811{
812 int rc;
813 RTCPUID idCpu = RTMpCpuId();
814 PHWACCM_CPUINFO pCpu = &HWACCMR0Globals.aCpuInfo[idCpu];
815
816 AssertReturn(pVM, VERR_INVALID_PARAMETER);
817
818#ifdef LOG_ENABLED
819 SUPR0Printf("HWACCMR0TermVM: %p\n", pVM);
820#endif
821
822 /* Make sure we don't touch hwaccm after we've disabled hwaccm in preparation of a suspend. */
823 AssertReturn(!ASMAtomicReadBool(&HWACCMR0Globals.fSuspended), VERR_HWACCM_SUSPEND_PENDING);
824
825 ASMAtomicWriteBool(&pCpu->fInUse, true);
826
827 /* Terminate a VT-x or AMD-V VM. */
828 rc = HWACCMR0Globals.pfnTermVM(pVM);
829
830 ASMAtomicWriteBool(&pCpu->fInUse, false);
831 return rc;
832}
833
834
835/**
836 * Sets up a VT-x or AMD-V session
837 *
838 * @returns VBox status code.
839 * @param pVM The VM to operate on.
840 */
841VMMR0DECL(int) HWACCMR0SetupVM(PVM pVM)
842{
843 int rc;
844 RTCPUID idCpu = RTMpCpuId();
845 PHWACCM_CPUINFO pCpu = &HWACCMR0Globals.aCpuInfo[idCpu];
846
847 AssertReturn(pVM, VERR_INVALID_PARAMETER);
848
849 /* Make sure we don't touch hwaccm after we've disabled hwaccm in preparation of a suspend. */
850 AssertReturn(!ASMAtomicReadBool(&HWACCMR0Globals.fSuspended), VERR_HWACCM_SUSPEND_PENDING);
851
852#ifdef LOG_ENABLED
853 SUPR0Printf("HWACCMR0SetupVM: %p\n", pVM);
854#endif
855
856 ASMAtomicWriteBool(&pCpu->fInUse, true);
857
858 for (unsigned i=0;i<pVM->cCPUs;i++)
859 {
860 /* On first entry we'll sync everything. */
861 pVM->aCpus[i].hwaccm.s.fContextUseFlags = HWACCM_CHANGED_ALL;
862 }
863
864 /* Setup VT-x or AMD-V. */
865 rc = HWACCMR0Globals.pfnSetupVM(pVM);
866
867 ASMAtomicWriteBool(&pCpu->fInUse, false);
868
869 return rc;
870}
871
872
873/**
874 * Enters the VT-x or AMD-V session
875 *
876 * @returns VBox status code.
877 * @param pVM The VM to operate on.
878 * @param pVCpu VMCPUD id.
879 */
880VMMR0DECL(int) HWACCMR0Enter(PVM pVM, PVMCPU pVCpu)
881{
882 PCPUMCTX pCtx;
883 int rc;
884 RTCPUID idCpu = RTMpCpuId();
885 PHWACCM_CPUINFO pCpu = &HWACCMR0Globals.aCpuInfo[idCpu];
886
887 /* Make sure we can't enter a session after we've disabled hwaccm in preparation of a suspend. */
888 AssertReturn(!ASMAtomicReadBool(&HWACCMR0Globals.fSuspended), VERR_HWACCM_SUSPEND_PENDING);
889 ASMAtomicWriteBool(&pCpu->fInUse, true);
890
891 pCtx = CPUMQueryGuestCtxPtrEx(pVM, pVCpu);
892
893 /* Always load the guest's FPU/XMM state on-demand. */
894 CPUMDeactivateGuestFPUState(pVM);
895
896 /* Always load the guest's debug state on-demand. */
897 CPUMDeactivateGuestDebugState(pVM);
898
899 /* Always reload the host context and the guest's CR0 register. (!!!!) */
900 pVCpu->hwaccm.s.fContextUseFlags |= HWACCM_CHANGED_GUEST_CR0 | HWACCM_CHANGED_HOST_CONTEXT;
901
902 /* Setup the register and mask according to the current execution mode. */
903 if (pCtx->msrEFER & MSR_K6_EFER_LMA)
904 pVM->hwaccm.s.u64RegisterMask = UINT64_C(0xFFFFFFFFFFFFFFFF);
905 else
906 pVM->hwaccm.s.u64RegisterMask = UINT64_C(0xFFFFFFFF);
907
908 rc = HWACCMR0Globals.pfnEnterSession(pVM, pVCpu, pCpu);
909 AssertRC(rc);
910 /* We must save the host context here (VT-x) as we might be rescheduled on a different cpu after a long jump back to ring 3. */
911 rc |= HWACCMR0Globals.pfnSaveHostState(pVM, pVCpu);
912 AssertRC(rc);
913 rc |= HWACCMR0Globals.pfnLoadGuestState(pVM, pVCpu, pCtx);
914 AssertRC(rc);
915
916#ifdef VBOX_STRICT
917 /* keep track of the CPU owning the VMCS for debugging scheduling weirdness and ring-3 calls. */
918 if (RT_SUCCESS(rc))
919 {
920 AssertMsg(pVCpu->hwaccm.s.idEnteredCpu == NIL_RTCPUID, ("%d", (int)pVCpu->hwaccm.s.idEnteredCpu));
921 pVCpu->hwaccm.s.idEnteredCpu = idCpu;
922 }
923#endif
924 return rc;
925}
926
927
928/**
929 * Leaves the VT-x or AMD-V session
930 *
931 * @returns VBox status code.
932 * @param pVM The VM to operate on.
933 * @param pVCpu VMCPUD id.
934 */
935VMMR0DECL(int) HWACCMR0Leave(PVM pVM, PVMCPU pVCpu)
936{
937 PCPUMCTX pCtx;
938 int rc;
939 RTCPUID idCpu = RTMpCpuId();
940 PHWACCM_CPUINFO pCpu = &HWACCMR0Globals.aCpuInfo[idCpu];
941
942 AssertReturn(!ASMAtomicReadBool(&HWACCMR0Globals.fSuspended), VERR_HWACCM_SUSPEND_PENDING);
943
944 pCtx = CPUMQueryGuestCtxPtrEx(pVM, pVCpu);
945
946 /* Note: It's rather tricky with longjmps done by e.g. Log statements or the page fault handler.
947 * We must restore the host FPU here to make absolutely sure we don't leave the guest FPU state active
948 * or trash somebody else's FPU state.
949 */
950 /* Save the guest FPU and XMM state if necessary. */
951 if (CPUMIsGuestFPUStateActive(pVCpu))
952 {
953 Log2(("CPUMR0SaveGuestFPU\n"));
954 CPUMR0SaveGuestFPU(pVM, pVCpu, pCtx);
955
956 pVCpu->hwaccm.s.fContextUseFlags |= HWACCM_CHANGED_GUEST_CR0;
957 }
958
959 rc = HWACCMR0Globals.pfnLeaveSession(pVM, pVCpu, pCtx);
960
961#ifdef VBOX_STRICT
962 /* keep track of the CPU owning the VMCS for debugging scheduling weirdness and ring-3 calls. */
963 AssertMsg(pVCpu->hwaccm.s.idEnteredCpu == idCpu, ("owner is %d, I'm %d", (int)pVCpu->hwaccm.s.idEnteredCpu, (int)idCpu));
964 pVCpu->hwaccm.s.idEnteredCpu = NIL_RTCPUID;
965#endif
966
967 ASMAtomicWriteBool(&pCpu->fInUse, false);
968 return rc;
969}
970
971/**
972 * Runs guest code in a hardware accelerated VM.
973 *
974 * @returns VBox status code.
975 * @param pVM The VM to operate on.
976 * @param pVCpu VMCPUD id.
977 */
978VMMR0DECL(int) HWACCMR0RunGuestCode(PVM pVM, PVMCPU pVCpu)
979{
980 CPUMCTX *pCtx;
981 RTCPUID idCpu = RTMpCpuId(); NOREF(idCpu);
982#ifdef VBOX_STRICT
983 PHWACCM_CPUINFO pCpu = &HWACCMR0Globals.aCpuInfo[idCpu];
984#endif
985
986 Assert(!VM_FF_ISPENDING(pVM, VM_FF_PGM_SYNC_CR3 | VM_FF_PGM_SYNC_CR3_NON_GLOBAL));
987 Assert(HWACCMR0Globals.aCpuInfo[idCpu].fConfigured);
988 AssertReturn(!ASMAtomicReadBool(&HWACCMR0Globals.fSuspended), VERR_HWACCM_SUSPEND_PENDING);
989 Assert(ASMAtomicReadBool(&pCpu->fInUse) == true);
990
991 pCtx = CPUMQueryGuestCtxPtrEx(pVM, pVCpu);
992
993 return HWACCMR0Globals.pfnRunGuestCode(pVM, pVCpu, pCtx);
994}
995
996/**
997 * Returns suspend status of the host
998 *
999 * @returns Suspend pending or not
1000 */
1001VMMR0DECL(bool) HWACCMR0SuspendPending()
1002{
1003 return ASMAtomicReadBool(&HWACCMR0Globals.fSuspended);
1004}
1005
1006/**
1007 * Returns the cpu structure for the current cpu.
1008 * Keep in mind that there is no guarantee it will stay the same (long jumps to ring 3!!!).
1009 *
1010 * @returns cpu structure pointer
1011 * @param pVM The VM to operate on.
1012 */
1013VMMR0DECL(PHWACCM_CPUINFO) HWACCMR0GetCurrentCpu()
1014{
1015 RTCPUID idCpu = RTMpCpuId();
1016
1017 return &HWACCMR0Globals.aCpuInfo[idCpu];
1018}
1019
1020#ifdef VBOX_STRICT
1021# include <iprt/string.h>
1022/**
1023 * Dumps a descriptor.
1024 *
1025 * @param pDesc Descriptor to dump.
1026 * @param Sel Selector number.
1027 * @param pszMsg Message to prepend the log entry with.
1028 */
1029VMMR0DECL(void) HWACCMR0DumpDescriptor(PX86DESCHC pDesc, RTSEL Sel, const char *pszMsg)
1030{
1031 /*
1032 * Make variable description string.
1033 */
1034 static struct
1035 {
1036 unsigned cch;
1037 const char *psz;
1038 } const aTypes[32] =
1039 {
1040# define STRENTRY(str) { sizeof(str) - 1, str }
1041
1042 /* system */
1043# if HC_ARCH_BITS == 64
1044 STRENTRY("Reserved0 "), /* 0x00 */
1045 STRENTRY("Reserved1 "), /* 0x01 */
1046 STRENTRY("LDT "), /* 0x02 */
1047 STRENTRY("Reserved3 "), /* 0x03 */
1048 STRENTRY("Reserved4 "), /* 0x04 */
1049 STRENTRY("Reserved5 "), /* 0x05 */
1050 STRENTRY("Reserved6 "), /* 0x06 */
1051 STRENTRY("Reserved7 "), /* 0x07 */
1052 STRENTRY("Reserved8 "), /* 0x08 */
1053 STRENTRY("TSS64Avail "), /* 0x09 */
1054 STRENTRY("ReservedA "), /* 0x0a */
1055 STRENTRY("TSS64Busy "), /* 0x0b */
1056 STRENTRY("Call64 "), /* 0x0c */
1057 STRENTRY("ReservedD "), /* 0x0d */
1058 STRENTRY("Int64 "), /* 0x0e */
1059 STRENTRY("Trap64 "), /* 0x0f */
1060# else
1061 STRENTRY("Reserved0 "), /* 0x00 */
1062 STRENTRY("TSS16Avail "), /* 0x01 */
1063 STRENTRY("LDT "), /* 0x02 */
1064 STRENTRY("TSS16Busy "), /* 0x03 */
1065 STRENTRY("Call16 "), /* 0x04 */
1066 STRENTRY("Task "), /* 0x05 */
1067 STRENTRY("Int16 "), /* 0x06 */
1068 STRENTRY("Trap16 "), /* 0x07 */
1069 STRENTRY("Reserved8 "), /* 0x08 */
1070 STRENTRY("TSS32Avail "), /* 0x09 */
1071 STRENTRY("ReservedA "), /* 0x0a */
1072 STRENTRY("TSS32Busy "), /* 0x0b */
1073 STRENTRY("Call32 "), /* 0x0c */
1074 STRENTRY("ReservedD "), /* 0x0d */
1075 STRENTRY("Int32 "), /* 0x0e */
1076 STRENTRY("Trap32 "), /* 0x0f */
1077# endif
1078 /* non system */
1079 STRENTRY("DataRO "), /* 0x10 */
1080 STRENTRY("DataRO Accessed "), /* 0x11 */
1081 STRENTRY("DataRW "), /* 0x12 */
1082 STRENTRY("DataRW Accessed "), /* 0x13 */
1083 STRENTRY("DataDownRO "), /* 0x14 */
1084 STRENTRY("DataDownRO Accessed "), /* 0x15 */
1085 STRENTRY("DataDownRW "), /* 0x16 */
1086 STRENTRY("DataDownRW Accessed "), /* 0x17 */
1087 STRENTRY("CodeEO "), /* 0x18 */
1088 STRENTRY("CodeEO Accessed "), /* 0x19 */
1089 STRENTRY("CodeER "), /* 0x1a */
1090 STRENTRY("CodeER Accessed "), /* 0x1b */
1091 STRENTRY("CodeConfEO "), /* 0x1c */
1092 STRENTRY("CodeConfEO Accessed "), /* 0x1d */
1093 STRENTRY("CodeConfER "), /* 0x1e */
1094 STRENTRY("CodeConfER Accessed ") /* 0x1f */
1095# undef SYSENTRY
1096 };
1097# define ADD_STR(psz, pszAdd) do { strcpy(psz, pszAdd); psz += strlen(pszAdd); } while (0)
1098 char szMsg[128];
1099 char *psz = &szMsg[0];
1100 unsigned i = pDesc->Gen.u1DescType << 4 | pDesc->Gen.u4Type;
1101 memcpy(psz, aTypes[i].psz, aTypes[i].cch);
1102 psz += aTypes[i].cch;
1103
1104 if (pDesc->Gen.u1Present)
1105 ADD_STR(psz, "Present ");
1106 else
1107 ADD_STR(psz, "Not-Present ");
1108# if HC_ARCH_BITS == 64
1109 if (pDesc->Gen.u1Long)
1110 ADD_STR(psz, "64-bit ");
1111 else
1112 ADD_STR(psz, "Comp ");
1113# else
1114 if (pDesc->Gen.u1Granularity)
1115 ADD_STR(psz, "Page ");
1116 if (pDesc->Gen.u1DefBig)
1117 ADD_STR(psz, "32-bit ");
1118 else
1119 ADD_STR(psz, "16-bit ");
1120# endif
1121# undef ADD_STR
1122 *psz = '\0';
1123
1124 /*
1125 * Limit and Base and format the output.
1126 */
1127 uint32_t u32Limit = X86DESC_LIMIT(*pDesc);
1128 if (pDesc->Gen.u1Granularity)
1129 u32Limit = u32Limit << PAGE_SHIFT | PAGE_OFFSET_MASK;
1130
1131# if HC_ARCH_BITS == 64
1132 uint64_t u32Base = X86DESC64_BASE(*pDesc);
1133
1134 Log(("%s %04x - %RX64 %RX64 - base=%RX64 limit=%08x dpl=%d %s\n", pszMsg,
1135 Sel, pDesc->au64[0], pDesc->au64[1], u32Base, u32Limit, pDesc->Gen.u2Dpl, szMsg));
1136# else
1137 uint32_t u32Base = X86DESC_BASE(*pDesc);
1138
1139 Log(("%s %04x - %08x %08x - base=%08x limit=%08x dpl=%d %s\n", pszMsg,
1140 Sel, pDesc->au32[0], pDesc->au32[1], u32Base, u32Limit, pDesc->Gen.u2Dpl, szMsg));
1141# endif
1142}
1143
1144/**
1145 * Formats a full register dump.
1146 *
1147 * @param pVM The VM to operate on.
1148 * @param pCtx The context to format.
1149 */
1150VMMR0DECL(void) HWACCMDumpRegs(PVM pVM, PCPUMCTX pCtx)
1151{
1152 /*
1153 * Format the flags.
1154 */
1155 static struct
1156 {
1157 const char *pszSet; const char *pszClear; uint32_t fFlag;
1158 } aFlags[] =
1159 {
1160 { "vip",NULL, X86_EFL_VIP },
1161 { "vif",NULL, X86_EFL_VIF },
1162 { "ac", NULL, X86_EFL_AC },
1163 { "vm", NULL, X86_EFL_VM },
1164 { "rf", NULL, X86_EFL_RF },
1165 { "nt", NULL, X86_EFL_NT },
1166 { "ov", "nv", X86_EFL_OF },
1167 { "dn", "up", X86_EFL_DF },
1168 { "ei", "di", X86_EFL_IF },
1169 { "tf", NULL, X86_EFL_TF },
1170 { "nt", "pl", X86_EFL_SF },
1171 { "nz", "zr", X86_EFL_ZF },
1172 { "ac", "na", X86_EFL_AF },
1173 { "po", "pe", X86_EFL_PF },
1174 { "cy", "nc", X86_EFL_CF },
1175 };
1176 char szEFlags[80];
1177 char *psz = szEFlags;
1178 uint32_t efl = pCtx->eflags.u32;
1179 for (unsigned i = 0; i < RT_ELEMENTS(aFlags); i++)
1180 {
1181 const char *pszAdd = aFlags[i].fFlag & efl ? aFlags[i].pszSet : aFlags[i].pszClear;
1182 if (pszAdd)
1183 {
1184 strcpy(psz, pszAdd);
1185 psz += strlen(pszAdd);
1186 *psz++ = ' ';
1187 }
1188 }
1189 psz[-1] = '\0';
1190
1191
1192 /*
1193 * Format the registers.
1194 */
1195 if (CPUMIsGuestIn64BitCode(pVM, CPUMCTX2CORE(pCtx)))
1196 {
1197 Log(("rax=%016RX64 rbx=%016RX64 rcx=%016RX64 rdx=%016RX64\n"
1198 "rsi=%016RX64 rdi=%016RX64 r8 =%016RX64 r9 =%016RX64\n"
1199 "r10=%016RX64 r11=%016RX64 r12=%016RX64 r13=%016RX64\n"
1200 "r14=%016RX64 r15=%016RX64\n"
1201 "rip=%016RX64 rsp=%016RX64 rbp=%016RX64 iopl=%d %*s\n"
1202 "cs={%04x base=%016RX64 limit=%08x flags=%08x}\n"
1203 "ds={%04x base=%016RX64 limit=%08x flags=%08x}\n"
1204 "es={%04x base=%016RX64 limit=%08x flags=%08x}\n"
1205 "fs={%04x base=%016RX64 limit=%08x flags=%08x}\n"
1206 "gs={%04x base=%016RX64 limit=%08x flags=%08x}\n"
1207 "ss={%04x base=%016RX64 limit=%08x flags=%08x}\n"
1208 "cr0=%016RX64 cr2=%016RX64 cr3=%016RX64 cr4=%016RX64\n"
1209 "dr0=%016RX64 dr1=%016RX64 dr2=%016RX64 dr3=%016RX64\n"
1210 "dr4=%016RX64 dr5=%016RX64 dr6=%016RX64 dr7=%016RX64\n"
1211 "gdtr=%016RX64:%04x idtr=%016RX64:%04x eflags=%08x\n"
1212 "ldtr={%04x base=%08RX64 limit=%08x flags=%08x}\n"
1213 "tr ={%04x base=%08RX64 limit=%08x flags=%08x}\n"
1214 "SysEnter={cs=%04llx eip=%08llx esp=%08llx}\n"
1215 ,
1216 pCtx->rax, pCtx->rbx, pCtx->rcx, pCtx->rdx, pCtx->rsi, pCtx->rdi,
1217 pCtx->r8, pCtx->r9, pCtx->r10, pCtx->r11, pCtx->r12, pCtx->r13,
1218 pCtx->r14, pCtx->r15,
1219 pCtx->rip, pCtx->rsp, pCtx->rbp, X86_EFL_GET_IOPL(efl), 31, szEFlags,
1220 (RTSEL)pCtx->cs, pCtx->csHid.u64Base, pCtx->csHid.u32Limit, pCtx->csHid.Attr.u,
1221 (RTSEL)pCtx->ds, pCtx->dsHid.u64Base, pCtx->dsHid.u32Limit, pCtx->dsHid.Attr.u,
1222 (RTSEL)pCtx->es, pCtx->esHid.u64Base, pCtx->esHid.u32Limit, pCtx->esHid.Attr.u,
1223 (RTSEL)pCtx->fs, pCtx->fsHid.u64Base, pCtx->fsHid.u32Limit, pCtx->fsHid.Attr.u,
1224 (RTSEL)pCtx->gs, pCtx->gsHid.u64Base, pCtx->gsHid.u32Limit, pCtx->gsHid.Attr.u,
1225 (RTSEL)pCtx->ss, pCtx->ssHid.u64Base, pCtx->ssHid.u32Limit, pCtx->ssHid.Attr.u,
1226 pCtx->cr0, pCtx->cr2, pCtx->cr3, pCtx->cr4,
1227 pCtx->dr[0], pCtx->dr[1], pCtx->dr[2], pCtx->dr[3],
1228 pCtx->dr[4], pCtx->dr[5], pCtx->dr[6], pCtx->dr[7],
1229 pCtx->gdtr.pGdt, pCtx->gdtr.cbGdt, pCtx->idtr.pIdt, pCtx->idtr.cbIdt, efl,
1230 (RTSEL)pCtx->ldtr, pCtx->ldtrHid.u64Base, pCtx->ldtrHid.u32Limit, pCtx->ldtrHid.Attr.u,
1231 (RTSEL)pCtx->tr, pCtx->trHid.u64Base, pCtx->trHid.u32Limit, pCtx->trHid.Attr.u,
1232 pCtx->SysEnter.cs, pCtx->SysEnter.eip, pCtx->SysEnter.esp));
1233 }
1234 else
1235 Log(("eax=%08x ebx=%08x ecx=%08x edx=%08x esi=%08x edi=%08x\n"
1236 "eip=%08x esp=%08x ebp=%08x iopl=%d %*s\n"
1237 "cs={%04x base=%016RX64 limit=%08x flags=%08x} dr0=%08RX64 dr1=%08RX64\n"
1238 "ds={%04x base=%016RX64 limit=%08x flags=%08x} dr2=%08RX64 dr3=%08RX64\n"
1239 "es={%04x base=%016RX64 limit=%08x flags=%08x} dr4=%08RX64 dr5=%08RX64\n"
1240 "fs={%04x base=%016RX64 limit=%08x flags=%08x} dr6=%08RX64 dr7=%08RX64\n"
1241 "gs={%04x base=%016RX64 limit=%08x flags=%08x} cr0=%08RX64 cr2=%08RX64\n"
1242 "ss={%04x base=%016RX64 limit=%08x flags=%08x} cr3=%08RX64 cr4=%08RX64\n"
1243 "gdtr=%016RX64:%04x idtr=%016RX64:%04x eflags=%08x\n"
1244 "ldtr={%04x base=%08RX64 limit=%08x flags=%08x}\n"
1245 "tr ={%04x base=%08RX64 limit=%08x flags=%08x}\n"
1246 "SysEnter={cs=%04llx eip=%08llx esp=%08llx}\n"
1247 ,
1248 pCtx->eax, pCtx->ebx, pCtx->ecx, pCtx->edx, pCtx->esi, pCtx->edi,
1249 pCtx->eip, pCtx->esp, pCtx->ebp, X86_EFL_GET_IOPL(efl), 31, szEFlags,
1250 (RTSEL)pCtx->cs, pCtx->csHid.u64Base, pCtx->csHid.u32Limit, pCtx->csHid.Attr.u, pCtx->dr[0], pCtx->dr[1],
1251 (RTSEL)pCtx->ds, pCtx->dsHid.u64Base, pCtx->dsHid.u32Limit, pCtx->dsHid.Attr.u, pCtx->dr[2], pCtx->dr[3],
1252 (RTSEL)pCtx->es, pCtx->esHid.u64Base, pCtx->esHid.u32Limit, pCtx->esHid.Attr.u, pCtx->dr[4], pCtx->dr[5],
1253 (RTSEL)pCtx->fs, pCtx->fsHid.u64Base, pCtx->fsHid.u32Limit, pCtx->fsHid.Attr.u, pCtx->dr[6], pCtx->dr[7],
1254 (RTSEL)pCtx->gs, pCtx->gsHid.u64Base, pCtx->gsHid.u32Limit, pCtx->gsHid.Attr.u, pCtx->cr0, pCtx->cr2,
1255 (RTSEL)pCtx->ss, pCtx->ssHid.u64Base, pCtx->ssHid.u32Limit, pCtx->ssHid.Attr.u, pCtx->cr3, pCtx->cr4,
1256 pCtx->gdtr.pGdt, pCtx->gdtr.cbGdt, pCtx->idtr.pIdt, pCtx->idtr.cbIdt, efl,
1257 (RTSEL)pCtx->ldtr, pCtx->ldtrHid.u64Base, pCtx->ldtrHid.u32Limit, pCtx->ldtrHid.Attr.u,
1258 (RTSEL)pCtx->tr, pCtx->trHid.u64Base, pCtx->trHid.u32Limit, pCtx->trHid.Attr.u,
1259 pCtx->SysEnter.cs, pCtx->SysEnter.eip, pCtx->SysEnter.esp));
1260
1261 Log(("FPU:\n"
1262 "FCW=%04x FSW=%04x FTW=%02x\n"
1263 "res1=%02x FOP=%04x FPUIP=%08x CS=%04x Rsvrd1=%04x\n"
1264 "FPUDP=%04x DS=%04x Rsvrd2=%04x MXCSR=%08x MXCSR_MASK=%08x\n"
1265 ,
1266 pCtx->fpu.FCW, pCtx->fpu.FSW, pCtx->fpu.FTW,
1267 pCtx->fpu.huh1, pCtx->fpu.FOP, pCtx->fpu.FPUIP, pCtx->fpu.CS, pCtx->fpu.Rsvrd1,
1268 pCtx->fpu.FPUDP, pCtx->fpu.DS, pCtx->fpu.Rsrvd2,
1269 pCtx->fpu.MXCSR, pCtx->fpu.MXCSR_MASK));
1270
1271
1272 Log(("MSR:\n"
1273 "EFER =%016RX64\n"
1274 "PAT =%016RX64\n"
1275 "STAR =%016RX64\n"
1276 "CSTAR =%016RX64\n"
1277 "LSTAR =%016RX64\n"
1278 "SFMASK =%016RX64\n"
1279 "KERNELGSBASE =%016RX64\n",
1280 pCtx->msrEFER,
1281 pCtx->msrPAT,
1282 pCtx->msrSTAR,
1283 pCtx->msrCSTAR,
1284 pCtx->msrLSTAR,
1285 pCtx->msrSFMASK,
1286 pCtx->msrKERNELGSBASE));
1287
1288}
1289#endif /* VBOX_STRICT */
1290
1291/* Dummy callback handlers. */
1292VMMR0DECL(int) HWACCMR0DummyEnter(PVM pVM, PVMCPU pVCpu, PHWACCM_CPUINFO pCpu)
1293{
1294 return VINF_SUCCESS;
1295}
1296
1297VMMR0DECL(int) HWACCMR0DummyLeave(PVM pVM, PVMCPU pVCpu, PCPUMCTX pCtx)
1298{
1299 return VINF_SUCCESS;
1300}
1301
1302VMMR0DECL(int) HWACCMR0DummyEnableCpu(PHWACCM_CPUINFO pCpu, PVM pVM, void *pvPageCpu, RTHCPHYS pPageCpuPhys)
1303{
1304 return VINF_SUCCESS;
1305}
1306
1307VMMR0DECL(int) HWACCMR0DummyDisableCpu(PHWACCM_CPUINFO pCpu, void *pvPageCpu, RTHCPHYS pPageCpuPhys)
1308{
1309 return VINF_SUCCESS;
1310}
1311
1312VMMR0DECL(int) HWACCMR0DummyInitVM(PVM pVM)
1313{
1314 return VINF_SUCCESS;
1315}
1316
1317VMMR0DECL(int) HWACCMR0DummyTermVM(PVM pVM)
1318{
1319 return VINF_SUCCESS;
1320}
1321
1322VMMR0DECL(int) HWACCMR0DummySetupVM(PVM pVM)
1323{
1324 return VINF_SUCCESS;
1325}
1326
1327VMMR0DECL(int) HWACCMR0DummyRunGuestCode(PVM pVM, PVMCPU pVCpu, PCPUMCTX pCtx)
1328{
1329 return VINF_SUCCESS;
1330}
1331
1332VMMR0DECL(int) HWACCMR0DummySaveHostState(PVM pVM, PVMCPU pVCpu)
1333{
1334 return VINF_SUCCESS;
1335}
1336
1337VMMR0DECL(int) HWACCMR0DummyLoadGuestState(PVM pVM, PVMCPU pVCpu, PCPUMCTX pCtx)
1338{
1339 return VINF_SUCCESS;
1340}
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette