1 | /* $Id: VMMR0.cpp 19255 2009-04-29 10:14:59Z vboxsync $ */
|
---|
2 | /** @file
|
---|
3 | * VMM - Host Context Ring 0.
|
---|
4 | */
|
---|
5 |
|
---|
6 | /*
|
---|
7 | * Copyright (C) 2006-2007 Sun Microsystems, Inc.
|
---|
8 | *
|
---|
9 | * This file is part of VirtualBox Open Source Edition (OSE), as
|
---|
10 | * available from http://www.virtualbox.org. This file is free software;
|
---|
11 | * you can redistribute it and/or modify it under the terms of the GNU
|
---|
12 | * General Public License (GPL) as published by the Free Software
|
---|
13 | * Foundation, in version 2 as it comes in the "COPYING" file of the
|
---|
14 | * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
|
---|
15 | * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
|
---|
16 | *
|
---|
17 | * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa
|
---|
18 | * Clara, CA 95054 USA or visit http://www.sun.com if you need
|
---|
19 | * additional information or have any questions.
|
---|
20 | */
|
---|
21 |
|
---|
22 | /*******************************************************************************
|
---|
23 | * Header Files *
|
---|
24 | *******************************************************************************/
|
---|
25 | #define LOG_GROUP LOG_GROUP_VMM
|
---|
26 | #include <VBox/vmm.h>
|
---|
27 | #include <VBox/sup.h>
|
---|
28 | #include <VBox/trpm.h>
|
---|
29 | #include <VBox/cpum.h>
|
---|
30 | #include <VBox/pgm.h>
|
---|
31 | #include <VBox/stam.h>
|
---|
32 | #include <VBox/tm.h>
|
---|
33 | #include "VMMInternal.h"
|
---|
34 | #include <VBox/vm.h>
|
---|
35 | #include <VBox/gvmm.h>
|
---|
36 | #include <VBox/gmm.h>
|
---|
37 | #include <VBox/intnet.h>
|
---|
38 | #include <VBox/hwaccm.h>
|
---|
39 | #include <VBox/param.h>
|
---|
40 |
|
---|
41 | #include <VBox/err.h>
|
---|
42 | #include <VBox/version.h>
|
---|
43 | #include <VBox/log.h>
|
---|
44 | #include <iprt/assert.h>
|
---|
45 | #include <iprt/stdarg.h>
|
---|
46 | #include <iprt/mp.h>
|
---|
47 | #include <iprt/string.h>
|
---|
48 |
|
---|
49 | #if defined(_MSC_VER) && defined(RT_ARCH_AMD64) /** @todo check this with with VC7! */
|
---|
50 | # pragma intrinsic(_AddressOfReturnAddress)
|
---|
51 | #endif
|
---|
52 |
|
---|
53 |
|
---|
54 | /*******************************************************************************
|
---|
55 | * Internal Functions *
|
---|
56 | *******************************************************************************/
|
---|
57 | __BEGIN_DECLS
|
---|
58 | VMMR0DECL(int) ModuleInit(void);
|
---|
59 | VMMR0DECL(void) ModuleTerm(void);
|
---|
60 | __END_DECLS
|
---|
61 |
|
---|
62 |
|
---|
63 | /*******************************************************************************
|
---|
64 | * Global Variables *
|
---|
65 | *******************************************************************************/
|
---|
66 | /** Pointer to the internal networking service instance. */
|
---|
67 | PINTNET g_pIntNet = 0;
|
---|
68 |
|
---|
69 |
|
---|
70 | /**
|
---|
71 | * Initialize the module.
|
---|
72 | * This is called when we're first loaded.
|
---|
73 | *
|
---|
74 | * @returns 0 on success.
|
---|
75 | * @returns VBox status on failure.
|
---|
76 | */
|
---|
77 | VMMR0DECL(int) ModuleInit(void)
|
---|
78 | {
|
---|
79 | LogFlow(("ModuleInit:\n"));
|
---|
80 |
|
---|
81 | /*
|
---|
82 | * Initialize the GVMM, GMM, HWACCM, PGM (Darwin) and INTNET.
|
---|
83 | */
|
---|
84 | int rc = GVMMR0Init();
|
---|
85 | if (RT_SUCCESS(rc))
|
---|
86 | {
|
---|
87 | rc = GMMR0Init();
|
---|
88 | if (RT_SUCCESS(rc))
|
---|
89 | {
|
---|
90 | rc = HWACCMR0Init();
|
---|
91 | if (RT_SUCCESS(rc))
|
---|
92 | {
|
---|
93 | rc = PGMRegisterStringFormatTypes();
|
---|
94 | if (RT_SUCCESS(rc))
|
---|
95 | {
|
---|
96 | #ifdef VBOX_WITH_2X_4GB_ADDR_SPACE
|
---|
97 | rc = PGMR0DynMapInit();
|
---|
98 | #endif
|
---|
99 | if (RT_SUCCESS(rc))
|
---|
100 | {
|
---|
101 | LogFlow(("ModuleInit: g_pIntNet=%p\n", g_pIntNet));
|
---|
102 | g_pIntNet = NULL;
|
---|
103 | LogFlow(("ModuleInit: g_pIntNet=%p should be NULL now...\n", g_pIntNet));
|
---|
104 | rc = INTNETR0Create(&g_pIntNet);
|
---|
105 | if (RT_SUCCESS(rc))
|
---|
106 | {
|
---|
107 | LogFlow(("ModuleInit: returns success. g_pIntNet=%p\n", g_pIntNet));
|
---|
108 | return VINF_SUCCESS;
|
---|
109 | }
|
---|
110 |
|
---|
111 | /* bail out */
|
---|
112 | g_pIntNet = NULL;
|
---|
113 | LogFlow(("ModuleTerm: returns %Rrc\n", rc));
|
---|
114 | #ifdef VBOX_WITH_2X_4GB_ADDR_SPACE
|
---|
115 | PGMR0DynMapTerm();
|
---|
116 | #endif
|
---|
117 | }
|
---|
118 | PGMDeregisterStringFormatTypes();
|
---|
119 | }
|
---|
120 | HWACCMR0Term();
|
---|
121 | }
|
---|
122 | GMMR0Term();
|
---|
123 | }
|
---|
124 | GVMMR0Term();
|
---|
125 | }
|
---|
126 |
|
---|
127 | LogFlow(("ModuleInit: failed %Rrc\n", rc));
|
---|
128 | return rc;
|
---|
129 | }
|
---|
130 |
|
---|
131 |
|
---|
132 | /**
|
---|
133 | * Terminate the module.
|
---|
134 | * This is called when we're finally unloaded.
|
---|
135 | */
|
---|
136 | VMMR0DECL(void) ModuleTerm(void)
|
---|
137 | {
|
---|
138 | LogFlow(("ModuleTerm:\n"));
|
---|
139 |
|
---|
140 | /*
|
---|
141 | * Destroy the internal networking instance.
|
---|
142 | */
|
---|
143 | if (g_pIntNet)
|
---|
144 | {
|
---|
145 | INTNETR0Destroy(g_pIntNet);
|
---|
146 | g_pIntNet = NULL;
|
---|
147 | }
|
---|
148 |
|
---|
149 | /*
|
---|
150 | * PGM (Darwin) and HWACCM global cleanup.
|
---|
151 | * Destroy the GMM and GVMM instances.
|
---|
152 | */
|
---|
153 | #ifdef VBOX_WITH_2X_4GB_ADDR_SPACE
|
---|
154 | PGMR0DynMapTerm();
|
---|
155 | #endif
|
---|
156 | PGMDeregisterStringFormatTypes();
|
---|
157 | HWACCMR0Term();
|
---|
158 |
|
---|
159 | GMMR0Term();
|
---|
160 | GVMMR0Term();
|
---|
161 |
|
---|
162 | LogFlow(("ModuleTerm: returns\n"));
|
---|
163 | }
|
---|
164 |
|
---|
165 |
|
---|
166 | /**
|
---|
167 | * Initaties the R0 driver for a particular VM instance.
|
---|
168 | *
|
---|
169 | * @returns VBox status code.
|
---|
170 | *
|
---|
171 | * @param pVM The VM instance in question.
|
---|
172 | * @param uSvnRev The SVN revision of the ring-3 part.
|
---|
173 | * @thread EMT.
|
---|
174 | */
|
---|
175 | static int vmmR0InitVM(PVM pVM, uint32_t uSvnRev)
|
---|
176 | {
|
---|
177 | /*
|
---|
178 | * Match the SVN revisions.
|
---|
179 | */
|
---|
180 | if (uSvnRev != VMMGetSvnRev())
|
---|
181 | {
|
---|
182 | LogRel(("VMMR0InitVM: Revision mismatch, r3=%d r0=%d\n", uSvnRev, VMMGetSvnRev()));
|
---|
183 | SUPR0Printf("VMMR0InitVM: Revision mismatch, r3=%d r0=%d\n", uSvnRev, VMMGetSvnRev());
|
---|
184 | return VERR_VERSION_MISMATCH;
|
---|
185 | }
|
---|
186 | if ( !VALID_PTR(pVM)
|
---|
187 | || pVM->pVMR0 != pVM)
|
---|
188 | return VERR_INVALID_PARAMETER;
|
---|
189 |
|
---|
190 | /*
|
---|
191 | * Register the EMT R0 logger instance.
|
---|
192 | */
|
---|
193 | PVMMR0LOGGER pR0Logger = pVM->vmm.s.pR0LoggerR0;
|
---|
194 | if (pR0Logger)
|
---|
195 | {
|
---|
196 | #if 0 /* testing of the logger. */
|
---|
197 | LogCom(("vmmR0InitVM: before %p\n", RTLogDefaultInstance()));
|
---|
198 | LogCom(("vmmR0InitVM: pfnFlush=%p actual=%p\n", pR0Logger->Logger.pfnFlush, vmmR0LoggerFlush));
|
---|
199 | LogCom(("vmmR0InitVM: pfnLogger=%p actual=%p\n", pR0Logger->Logger.pfnLogger, vmmR0LoggerWrapper));
|
---|
200 | LogCom(("vmmR0InitVM: offScratch=%d fFlags=%#x fDestFlags=%#x\n", pR0Logger->Logger.offScratch, pR0Logger->Logger.fFlags, pR0Logger->Logger.fDestFlags));
|
---|
201 |
|
---|
202 | RTLogSetDefaultInstanceThread(&pR0Logger->Logger, (uintptr_t)pVM->pSession);
|
---|
203 | LogCom(("vmmR0InitVM: after %p reg\n", RTLogDefaultInstance()));
|
---|
204 | RTLogSetDefaultInstanceThread(NULL, 0);
|
---|
205 | LogCom(("vmmR0InitVM: after %p dereg\n", RTLogDefaultInstance()));
|
---|
206 |
|
---|
207 | pR0Logger->Logger.pfnLogger("hello ring-0 logger\n");
|
---|
208 | LogCom(("vmmR0InitVM: returned succesfully from direct logger call.\n"));
|
---|
209 | pR0Logger->Logger.pfnFlush(&pR0Logger->Logger);
|
---|
210 | LogCom(("vmmR0InitVM: returned succesfully from direct flush call.\n"));
|
---|
211 |
|
---|
212 | RTLogSetDefaultInstanceThread(&pR0Logger->Logger, (uintptr_t)pVM->pSession);
|
---|
213 | LogCom(("vmmR0InitVM: after %p reg2\n", RTLogDefaultInstance()));
|
---|
214 | pR0Logger->Logger.pfnLogger("hello ring-0 logger\n");
|
---|
215 | LogCom(("vmmR0InitVM: returned succesfully from direct logger call (2). offScratch=%d\n", pR0Logger->Logger.offScratch));
|
---|
216 | RTLogSetDefaultInstanceThread(NULL, 0);
|
---|
217 | LogCom(("vmmR0InitVM: after %p dereg2\n", RTLogDefaultInstance()));
|
---|
218 |
|
---|
219 | RTLogLoggerEx(&pR0Logger->Logger, 0, ~0U, "hello ring-0 logger (RTLogLoggerEx)\n");
|
---|
220 | LogCom(("vmmR0InitVM: RTLogLoggerEx returned fine offScratch=%d\n", pR0Logger->Logger.offScratch));
|
---|
221 |
|
---|
222 | RTLogSetDefaultInstanceThread(&pR0Logger->Logger, (uintptr_t)pVM->pSession);
|
---|
223 | RTLogPrintf("hello ring-0 logger (RTLogPrintf)\n");
|
---|
224 | LogCom(("vmmR0InitVM: RTLogPrintf returned fine offScratch=%d\n", pR0Logger->Logger.offScratch));
|
---|
225 | #endif
|
---|
226 | Log(("Switching to per-thread logging instance %p (key=%p)\n", &pR0Logger->Logger, pVM->pSession));
|
---|
227 | RTLogSetDefaultInstanceThread(&pR0Logger->Logger, (uintptr_t)pVM->pSession);
|
---|
228 | }
|
---|
229 |
|
---|
230 | /*
|
---|
231 | * Initialize the per VM data for GVMM and GMM.
|
---|
232 | */
|
---|
233 | int rc = GVMMR0InitVM(pVM);
|
---|
234 | // if (RT_SUCCESS(rc))
|
---|
235 | // rc = GMMR0InitPerVMData(pVM);
|
---|
236 | if (RT_SUCCESS(rc))
|
---|
237 | {
|
---|
238 | /*
|
---|
239 | * Init HWACCM, CPUM and PGM (Darwin only).
|
---|
240 | */
|
---|
241 | rc = HWACCMR0InitVM(pVM);
|
---|
242 | if (RT_SUCCESS(rc))
|
---|
243 | {
|
---|
244 | rc = CPUMR0Init(pVM); /** @todo rename to CPUMR0InitVM */
|
---|
245 | if (RT_SUCCESS(rc))
|
---|
246 | {
|
---|
247 | #ifdef VBOX_WITH_2X_4GB_ADDR_SPACE
|
---|
248 | rc = PGMR0DynMapInitVM(pVM);
|
---|
249 | #endif
|
---|
250 | if (RT_SUCCESS(rc))
|
---|
251 | {
|
---|
252 | GVMMR0DoneInitVM(pVM);
|
---|
253 | return rc;
|
---|
254 | }
|
---|
255 |
|
---|
256 | /* bail out */
|
---|
257 | }
|
---|
258 | HWACCMR0TermVM(pVM);
|
---|
259 | }
|
---|
260 | }
|
---|
261 | RTLogSetDefaultInstanceThread(NULL, 0);
|
---|
262 | return rc;
|
---|
263 | }
|
---|
264 |
|
---|
265 |
|
---|
266 | /**
|
---|
267 | * Terminates the R0 driver for a particular VM instance.
|
---|
268 | *
|
---|
269 | * This is normally called by ring-3 as part of the VM termination process, but
|
---|
270 | * may alternatively be called during the support driver session cleanup when
|
---|
271 | * the VM object is destroyed (see GVMM).
|
---|
272 | *
|
---|
273 | * @returns VBox status code.
|
---|
274 | *
|
---|
275 | * @param pVM The VM instance in question.
|
---|
276 | * @param pGVM Pointer to the global VM structure. Optional.
|
---|
277 | * @thread EMT or session clean up thread.
|
---|
278 | */
|
---|
279 | VMMR0DECL(int) VMMR0TermVM(PVM pVM, PGVM pGVM)
|
---|
280 | {
|
---|
281 | /*
|
---|
282 | * Tell GVMM what we're up to and check that we only do this once.
|
---|
283 | */
|
---|
284 | if (GVMMR0DoingTermVM(pVM, pGVM))
|
---|
285 | {
|
---|
286 | #ifdef VBOX_WITH_2X_4GB_ADDR_SPACE
|
---|
287 | PGMR0DynMapTermVM(pVM);
|
---|
288 | #endif
|
---|
289 | HWACCMR0TermVM(pVM);
|
---|
290 | }
|
---|
291 |
|
---|
292 | /*
|
---|
293 | * Deregister the logger.
|
---|
294 | */
|
---|
295 | RTLogSetDefaultInstanceThread(NULL, 0);
|
---|
296 | return VINF_SUCCESS;
|
---|
297 | }
|
---|
298 |
|
---|
299 |
|
---|
300 | /**
|
---|
301 | * Calls the ring-3 host code.
|
---|
302 | *
|
---|
303 | * @returns VBox status code of the ring-3 call.
|
---|
304 | * @param pVM The VM handle.
|
---|
305 | * @param enmOperation The operation.
|
---|
306 | * @param uArg The argument to the operation.
|
---|
307 | */
|
---|
308 | VMMR0DECL(int) VMMR0CallHost(PVM pVM, VMMCALLHOST enmOperation, uint64_t uArg)
|
---|
309 | {
|
---|
310 | /** @todo profile this! */
|
---|
311 | pVM->vmm.s.enmCallHostOperation = enmOperation;
|
---|
312 | pVM->vmm.s.u64CallHostArg = uArg;
|
---|
313 | pVM->vmm.s.rcCallHost = VERR_INTERNAL_ERROR;
|
---|
314 | int rc = vmmR0CallHostLongJmp(&pVM->vmm.s.CallHostR0JmpBuf, VINF_VMM_CALL_HOST);
|
---|
315 | if (rc == VINF_SUCCESS)
|
---|
316 | rc = pVM->vmm.s.rcCallHost;
|
---|
317 | return rc;
|
---|
318 | }
|
---|
319 |
|
---|
320 |
|
---|
321 | #ifdef VBOX_WITH_STATISTICS
|
---|
322 | /**
|
---|
323 | * Record return code statistics
|
---|
324 | * @param pVM The VM handle.
|
---|
325 | * @param rc The status code.
|
---|
326 | */
|
---|
327 | static void vmmR0RecordRC(PVM pVM, int rc)
|
---|
328 | {
|
---|
329 | /*
|
---|
330 | * Collect statistics.
|
---|
331 | */
|
---|
332 | switch (rc)
|
---|
333 | {
|
---|
334 | case VINF_SUCCESS:
|
---|
335 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetNormal);
|
---|
336 | break;
|
---|
337 | case VINF_EM_RAW_INTERRUPT:
|
---|
338 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetInterrupt);
|
---|
339 | break;
|
---|
340 | case VINF_EM_RAW_INTERRUPT_HYPER:
|
---|
341 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetInterruptHyper);
|
---|
342 | break;
|
---|
343 | case VINF_EM_RAW_GUEST_TRAP:
|
---|
344 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetGuestTrap);
|
---|
345 | break;
|
---|
346 | case VINF_EM_RAW_RING_SWITCH:
|
---|
347 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetRingSwitch);
|
---|
348 | break;
|
---|
349 | case VINF_EM_RAW_RING_SWITCH_INT:
|
---|
350 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetRingSwitchInt);
|
---|
351 | break;
|
---|
352 | case VINF_EM_RAW_EXCEPTION_PRIVILEGED:
|
---|
353 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetExceptionPrivilege);
|
---|
354 | break;
|
---|
355 | case VINF_EM_RAW_STALE_SELECTOR:
|
---|
356 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetStaleSelector);
|
---|
357 | break;
|
---|
358 | case VINF_EM_RAW_IRET_TRAP:
|
---|
359 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetIRETTrap);
|
---|
360 | break;
|
---|
361 | case VINF_IOM_HC_IOPORT_READ:
|
---|
362 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetIORead);
|
---|
363 | break;
|
---|
364 | case VINF_IOM_HC_IOPORT_WRITE:
|
---|
365 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetIOWrite);
|
---|
366 | break;
|
---|
367 | case VINF_IOM_HC_MMIO_READ:
|
---|
368 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetMMIORead);
|
---|
369 | break;
|
---|
370 | case VINF_IOM_HC_MMIO_WRITE:
|
---|
371 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetMMIOWrite);
|
---|
372 | break;
|
---|
373 | case VINF_IOM_HC_MMIO_READ_WRITE:
|
---|
374 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetMMIOReadWrite);
|
---|
375 | break;
|
---|
376 | case VINF_PATM_HC_MMIO_PATCH_READ:
|
---|
377 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetMMIOPatchRead);
|
---|
378 | break;
|
---|
379 | case VINF_PATM_HC_MMIO_PATCH_WRITE:
|
---|
380 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetMMIOPatchWrite);
|
---|
381 | break;
|
---|
382 | case VINF_EM_RAW_EMULATE_INSTR:
|
---|
383 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetEmulate);
|
---|
384 | break;
|
---|
385 | case VINF_EM_RAW_EMULATE_IO_BLOCK:
|
---|
386 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetIOBlockEmulate);
|
---|
387 | break;
|
---|
388 | case VINF_PATCH_EMULATE_INSTR:
|
---|
389 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetPatchEmulate);
|
---|
390 | break;
|
---|
391 | case VINF_EM_RAW_EMULATE_INSTR_LDT_FAULT:
|
---|
392 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetLDTFault);
|
---|
393 | break;
|
---|
394 | case VINF_EM_RAW_EMULATE_INSTR_GDT_FAULT:
|
---|
395 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetGDTFault);
|
---|
396 | break;
|
---|
397 | case VINF_EM_RAW_EMULATE_INSTR_IDT_FAULT:
|
---|
398 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetIDTFault);
|
---|
399 | break;
|
---|
400 | case VINF_EM_RAW_EMULATE_INSTR_TSS_FAULT:
|
---|
401 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetTSSFault);
|
---|
402 | break;
|
---|
403 | case VINF_EM_RAW_EMULATE_INSTR_PD_FAULT:
|
---|
404 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetPDFault);
|
---|
405 | break;
|
---|
406 | case VINF_CSAM_PENDING_ACTION:
|
---|
407 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetCSAMTask);
|
---|
408 | break;
|
---|
409 | case VINF_PGM_SYNC_CR3:
|
---|
410 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetSyncCR3);
|
---|
411 | break;
|
---|
412 | case VINF_PATM_PATCH_INT3:
|
---|
413 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetPatchInt3);
|
---|
414 | break;
|
---|
415 | case VINF_PATM_PATCH_TRAP_PF:
|
---|
416 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetPatchPF);
|
---|
417 | break;
|
---|
418 | case VINF_PATM_PATCH_TRAP_GP:
|
---|
419 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetPatchGP);
|
---|
420 | break;
|
---|
421 | case VINF_PATM_PENDING_IRQ_AFTER_IRET:
|
---|
422 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetPatchIretIRQ);
|
---|
423 | break;
|
---|
424 | case VERR_REM_FLUSHED_PAGES_OVERFLOW:
|
---|
425 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetPageOverflow);
|
---|
426 | break;
|
---|
427 | case VINF_EM_RESCHEDULE_REM:
|
---|
428 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetRescheduleREM);
|
---|
429 | break;
|
---|
430 | case VINF_EM_RAW_TO_R3:
|
---|
431 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetToR3);
|
---|
432 | break;
|
---|
433 | case VINF_EM_RAW_TIMER_PENDING:
|
---|
434 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetTimerPending);
|
---|
435 | break;
|
---|
436 | case VINF_EM_RAW_INTERRUPT_PENDING:
|
---|
437 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetInterruptPending);
|
---|
438 | break;
|
---|
439 | case VINF_VMM_CALL_HOST:
|
---|
440 | switch (pVM->vmm.s.enmCallHostOperation)
|
---|
441 | {
|
---|
442 | case VMMCALLHOST_PDM_LOCK:
|
---|
443 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZCallPDMLock);
|
---|
444 | break;
|
---|
445 | case VMMCALLHOST_PDM_QUEUE_FLUSH:
|
---|
446 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZCallPDMQueueFlush);
|
---|
447 | break;
|
---|
448 | case VMMCALLHOST_PGM_POOL_GROW:
|
---|
449 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZCallPGMPoolGrow);
|
---|
450 | break;
|
---|
451 | case VMMCALLHOST_PGM_LOCK:
|
---|
452 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZCallPGMLock);
|
---|
453 | break;
|
---|
454 | case VMMCALLHOST_PGM_MAP_CHUNK:
|
---|
455 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZCallPGMMapChunk);
|
---|
456 | break;
|
---|
457 | case VMMCALLHOST_PGM_ALLOCATE_HANDY_PAGES:
|
---|
458 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZCallPGMAllocHandy);
|
---|
459 | break;
|
---|
460 | case VMMCALLHOST_REM_REPLAY_HANDLER_NOTIFICATIONS:
|
---|
461 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZCallRemReplay);
|
---|
462 | break;
|
---|
463 | case VMMCALLHOST_VMM_LOGGER_FLUSH:
|
---|
464 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZCallLogFlush);
|
---|
465 | break;
|
---|
466 | case VMMCALLHOST_VM_SET_ERROR:
|
---|
467 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZCallVMSetError);
|
---|
468 | break;
|
---|
469 | case VMMCALLHOST_VM_SET_RUNTIME_ERROR:
|
---|
470 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZCallVMSetRuntimeError);
|
---|
471 | break;
|
---|
472 | case VMMCALLHOST_VM_R0_ASSERTION:
|
---|
473 | default:
|
---|
474 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetCallHost);
|
---|
475 | break;
|
---|
476 | }
|
---|
477 | break;
|
---|
478 | case VINF_PATM_DUPLICATE_FUNCTION:
|
---|
479 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetPATMDuplicateFn);
|
---|
480 | break;
|
---|
481 | case VINF_PGM_CHANGE_MODE:
|
---|
482 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetPGMChangeMode);
|
---|
483 | break;
|
---|
484 | case VINF_EM_RAW_EMULATE_INSTR_HLT:
|
---|
485 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetEmulHlt);
|
---|
486 | break;
|
---|
487 | case VINF_EM_PENDING_REQUEST:
|
---|
488 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetPendingRequest);
|
---|
489 | break;
|
---|
490 | default:
|
---|
491 | STAM_COUNTER_INC(&pVM->vmm.s.StatRZRetMisc);
|
---|
492 | break;
|
---|
493 | }
|
---|
494 | }
|
---|
495 | #endif /* VBOX_WITH_STATISTICS */
|
---|
496 |
|
---|
497 |
|
---|
498 | /**
|
---|
499 | * Unused ring-0 entry point that used to be called from the interrupt gate.
|
---|
500 | *
|
---|
501 | * Will be removed one of the next times we do a major SUPDrv version bump.
|
---|
502 | *
|
---|
503 | * @returns VBox status code.
|
---|
504 | * @param pVM The VM to operate on.
|
---|
505 | * @param enmOperation Which operation to execute.
|
---|
506 | * @param pvArg Argument to the operation.
|
---|
507 | * @remarks Assume called with interrupts disabled.
|
---|
508 | */
|
---|
509 | VMMR0DECL(int) VMMR0EntryInt(PVM pVM, VMMR0OPERATION enmOperation, void *pvArg)
|
---|
510 | {
|
---|
511 | /*
|
---|
512 | * We're returning VERR_NOT_SUPPORT here so we've got something else
|
---|
513 | * than -1 which the interrupt gate glue code might return.
|
---|
514 | */
|
---|
515 | Log(("operation %#x is not supported\n", enmOperation));
|
---|
516 | return VERR_NOT_SUPPORTED;
|
---|
517 | }
|
---|
518 |
|
---|
519 |
|
---|
520 | /**
|
---|
521 | * The Ring 0 entry point, called by the fast-ioctl path.
|
---|
522 | *
|
---|
523 | * @param pVM The VM to operate on.
|
---|
524 | * The return code is stored in pVM->vmm.s.iLastGZRc.
|
---|
525 | * @param idCpu VMCPU id.
|
---|
526 | * @param enmOperation Which operation to execute.
|
---|
527 | * @remarks Assume called with interrupts _enabled_.
|
---|
528 | */
|
---|
529 | VMMR0DECL(void) VMMR0EntryFast(PVM pVM, unsigned idCpu, VMMR0OPERATION enmOperation)
|
---|
530 | {
|
---|
531 | PVMCPU pVCpu = &pVM->aCpus[idCpu];
|
---|
532 |
|
---|
533 | if (RT_UNLIKELY(idCpu >= pVM->cCPUs))
|
---|
534 | {
|
---|
535 | pVM->vmm.s.iLastGZRc = VERR_INVALID_PARAMETER;
|
---|
536 | return;
|
---|
537 | }
|
---|
538 |
|
---|
539 | switch (enmOperation)
|
---|
540 | {
|
---|
541 | /*
|
---|
542 | * Switch to GC and run guest raw mode code.
|
---|
543 | * Disable interrupts before doing the world switch.
|
---|
544 | */
|
---|
545 | case VMMR0_DO_RAW_RUN:
|
---|
546 | {
|
---|
547 | /* Safety precaution as hwaccm disables the switcher. */
|
---|
548 | if (RT_LIKELY(!pVM->vmm.s.fSwitcherDisabled))
|
---|
549 | {
|
---|
550 | RTCCUINTREG uFlags = ASMIntDisableFlags();
|
---|
551 | int rc;
|
---|
552 | bool fVTxDisabled;
|
---|
553 |
|
---|
554 | if (RT_UNLIKELY(pVM->cCPUs > 1))
|
---|
555 | {
|
---|
556 | pVM->vmm.s.iLastGZRc = VERR_RAW_MODE_INVALID_SMP;
|
---|
557 | return;
|
---|
558 | }
|
---|
559 |
|
---|
560 | #ifndef VBOX_WITH_2X_4GB_ADDR_SPACE_IN_R0
|
---|
561 | if (RT_UNLIKELY(!PGMGetHyperCR3(pVCpu)))
|
---|
562 | {
|
---|
563 | pVM->vmm.s.iLastGZRc = VERR_PGM_NO_CR3_SHADOW_ROOT;
|
---|
564 | return;
|
---|
565 | }
|
---|
566 | #endif
|
---|
567 |
|
---|
568 | /* We might need to disable VT-x if the active switcher turns off paging. */
|
---|
569 | rc = HWACCMR0EnterSwitcher(pVM, &fVTxDisabled);
|
---|
570 | if (RT_FAILURE(rc))
|
---|
571 | {
|
---|
572 | pVM->vmm.s.iLastGZRc = rc;
|
---|
573 | return;
|
---|
574 | }
|
---|
575 |
|
---|
576 | TMNotifyStartOfExecution(pVCpu);
|
---|
577 | rc = pVM->vmm.s.pfnHostToGuestR0(pVM);
|
---|
578 | pVM->vmm.s.iLastGZRc = rc;
|
---|
579 | TMNotifyEndOfExecution(pVCpu);
|
---|
580 |
|
---|
581 | /* Re-enable VT-x if previously turned off. */
|
---|
582 | HWACCMR0LeaveSwitcher(pVM, fVTxDisabled);
|
---|
583 |
|
---|
584 | if ( rc == VINF_EM_RAW_INTERRUPT
|
---|
585 | || rc == VINF_EM_RAW_INTERRUPT_HYPER)
|
---|
586 | TRPMR0DispatchHostInterrupt(pVM);
|
---|
587 |
|
---|
588 | ASMSetFlags(uFlags);
|
---|
589 |
|
---|
590 | #ifdef VBOX_WITH_STATISTICS
|
---|
591 | STAM_COUNTER_INC(&pVM->vmm.s.StatRunRC);
|
---|
592 | vmmR0RecordRC(pVM, rc);
|
---|
593 | #endif
|
---|
594 | }
|
---|
595 | else
|
---|
596 | {
|
---|
597 | Assert(!pVM->vmm.s.fSwitcherDisabled);
|
---|
598 | pVM->vmm.s.iLastGZRc = VERR_NOT_SUPPORTED;
|
---|
599 | }
|
---|
600 | break;
|
---|
601 | }
|
---|
602 |
|
---|
603 | /*
|
---|
604 | * Run guest code using the available hardware acceleration technology.
|
---|
605 | *
|
---|
606 | * Disable interrupts before we do anything interesting. On Windows we avoid
|
---|
607 | * this by having the support driver raise the IRQL before calling us, this way
|
---|
608 | * we hope to get away with page faults and later calling into the kernel.
|
---|
609 | */
|
---|
610 | case VMMR0_DO_HWACC_RUN:
|
---|
611 | {
|
---|
612 | int rc;
|
---|
613 | PVMCPU pVCpu = &pVM->aCpus[idCpu];
|
---|
614 |
|
---|
615 | STAM_COUNTER_INC(&pVM->vmm.s.StatRunRC);
|
---|
616 |
|
---|
617 | #ifndef RT_OS_WINDOWS /** @todo check other hosts */
|
---|
618 | RTCCUINTREG uFlags = ASMIntDisableFlags();
|
---|
619 | #endif
|
---|
620 | if (!HWACCMR0SuspendPending())
|
---|
621 | {
|
---|
622 | rc = HWACCMR0Enter(pVM, pVCpu);
|
---|
623 | if (RT_SUCCESS(rc))
|
---|
624 | {
|
---|
625 | rc = vmmR0CallHostSetJmp(&pVM->vmm.s.CallHostR0JmpBuf, HWACCMR0RunGuestCode, pVM, pVCpu); /* this may resume code. */
|
---|
626 | int rc2 = HWACCMR0Leave(pVM, pVCpu);
|
---|
627 | AssertRC(rc2);
|
---|
628 | }
|
---|
629 | }
|
---|
630 | else
|
---|
631 | {
|
---|
632 | /* System is about to go into suspend mode; go back to ring 3. */
|
---|
633 | rc = VINF_EM_RAW_INTERRUPT;
|
---|
634 | }
|
---|
635 | pVM->vmm.s.iLastGZRc = rc;
|
---|
636 | #ifndef RT_OS_WINDOWS /** @todo check other hosts */
|
---|
637 | ASMSetFlags(uFlags);
|
---|
638 | #endif
|
---|
639 |
|
---|
640 | #ifdef VBOX_WITH_STATISTICS
|
---|
641 | vmmR0RecordRC(pVM, rc);
|
---|
642 | #endif
|
---|
643 | /* No special action required for external interrupts, just return. */
|
---|
644 | break;
|
---|
645 | }
|
---|
646 |
|
---|
647 | /*
|
---|
648 | * For profiling.
|
---|
649 | */
|
---|
650 | case VMMR0_DO_NOP:
|
---|
651 | pVM->vmm.s.iLastGZRc = VINF_SUCCESS;
|
---|
652 | break;
|
---|
653 |
|
---|
654 | /*
|
---|
655 | * Impossible.
|
---|
656 | */
|
---|
657 | default:
|
---|
658 | AssertMsgFailed(("%#x\n", enmOperation));
|
---|
659 | pVM->vmm.s.iLastGZRc = VERR_NOT_SUPPORTED;
|
---|
660 | break;
|
---|
661 | }
|
---|
662 | }
|
---|
663 |
|
---|
664 |
|
---|
665 | /**
|
---|
666 | * Validates a session or VM session argument.
|
---|
667 | *
|
---|
668 | * @returns true / false accordingly.
|
---|
669 | * @param pVM The VM argument.
|
---|
670 | * @param pSession The session argument.
|
---|
671 | */
|
---|
672 | DECLINLINE(bool) vmmR0IsValidSession(PVM pVM, PSUPDRVSESSION pClaimedSession, PSUPDRVSESSION pSession)
|
---|
673 | {
|
---|
674 | /* This must be set! */
|
---|
675 | if (!pSession)
|
---|
676 | return false;
|
---|
677 |
|
---|
678 | /* Only one out of the two. */
|
---|
679 | if (pVM && pClaimedSession)
|
---|
680 | return false;
|
---|
681 | if (pVM)
|
---|
682 | pClaimedSession = pVM->pSession;
|
---|
683 | return pClaimedSession == pSession;
|
---|
684 | }
|
---|
685 |
|
---|
686 |
|
---|
687 | /**
|
---|
688 | * VMMR0EntryEx worker function, either called directly or when ever possible
|
---|
689 | * called thru a longjmp so we can exit safely on failure.
|
---|
690 | *
|
---|
691 | * @returns VBox status code.
|
---|
692 | * @param pVM The VM to operate on.
|
---|
693 | * @param enmOperation Which operation to execute.
|
---|
694 | * @param pReqHdr This points to a SUPVMMR0REQHDR packet. Optional.
|
---|
695 | * The support driver validates this if it's present.
|
---|
696 | * @param u64Arg Some simple constant argument.
|
---|
697 | * @param pSession The session of the caller.
|
---|
698 | * @remarks Assume called with interrupts _enabled_.
|
---|
699 | */
|
---|
700 | static int vmmR0EntryExWorker(PVM pVM, VMMR0OPERATION enmOperation, PSUPVMMR0REQHDR pReqHdr, uint64_t u64Arg, PSUPDRVSESSION pSession)
|
---|
701 | {
|
---|
702 | /*
|
---|
703 | * Common VM pointer validation.
|
---|
704 | */
|
---|
705 | if (pVM)
|
---|
706 | {
|
---|
707 | if (RT_UNLIKELY( !VALID_PTR(pVM)
|
---|
708 | || ((uintptr_t)pVM & PAGE_OFFSET_MASK)))
|
---|
709 | {
|
---|
710 | SUPR0Printf("vmmR0EntryExWorker: Invalid pVM=%p! (op=%d)\n", pVM, enmOperation);
|
---|
711 | return VERR_INVALID_POINTER;
|
---|
712 | }
|
---|
713 | if (RT_UNLIKELY( pVM->enmVMState < VMSTATE_CREATING
|
---|
714 | || pVM->enmVMState > VMSTATE_TERMINATED
|
---|
715 | || pVM->pVMR0 != pVM))
|
---|
716 | {
|
---|
717 | SUPR0Printf("vmmR0EntryExWorker: Invalid pVM=%p:{enmVMState=%d, .pVMR0=%p}! (op=%d)\n",
|
---|
718 | pVM, pVM->enmVMState, pVM->pVMR0, enmOperation);
|
---|
719 | return VERR_INVALID_POINTER;
|
---|
720 | }
|
---|
721 | }
|
---|
722 |
|
---|
723 | switch (enmOperation)
|
---|
724 | {
|
---|
725 | /*
|
---|
726 | * GVM requests
|
---|
727 | */
|
---|
728 | case VMMR0_DO_GVMM_CREATE_VM:
|
---|
729 | if (pVM || u64Arg)
|
---|
730 | return VERR_INVALID_PARAMETER;
|
---|
731 | return GVMMR0CreateVMReq((PGVMMCREATEVMREQ)pReqHdr);
|
---|
732 |
|
---|
733 | case VMMR0_DO_GVMM_DESTROY_VM:
|
---|
734 | if (pReqHdr || u64Arg)
|
---|
735 | return VERR_INVALID_PARAMETER;
|
---|
736 | return GVMMR0DestroyVM(pVM);
|
---|
737 |
|
---|
738 | case VMMR0_DO_GVMM_SCHED_HALT:
|
---|
739 | if (pReqHdr)
|
---|
740 | return VERR_INVALID_PARAMETER;
|
---|
741 | return GVMMR0SchedHalt(pVM, u64Arg);
|
---|
742 |
|
---|
743 | case VMMR0_DO_GVMM_SCHED_WAKE_UP:
|
---|
744 | if (pReqHdr || u64Arg)
|
---|
745 | return VERR_INVALID_PARAMETER;
|
---|
746 | return GVMMR0SchedWakeUp(pVM);
|
---|
747 |
|
---|
748 | case VMMR0_DO_GVMM_SCHED_POLL:
|
---|
749 | if (pReqHdr || u64Arg > 1)
|
---|
750 | return VERR_INVALID_PARAMETER;
|
---|
751 | return GVMMR0SchedPoll(pVM, !!u64Arg);
|
---|
752 |
|
---|
753 | case VMMR0_DO_GVMM_QUERY_STATISTICS:
|
---|
754 | if (u64Arg)
|
---|
755 | return VERR_INVALID_PARAMETER;
|
---|
756 | return GVMMR0QueryStatisticsReq(pVM, (PGVMMQUERYSTATISTICSSREQ)pReqHdr);
|
---|
757 |
|
---|
758 | case VMMR0_DO_GVMM_RESET_STATISTICS:
|
---|
759 | if (u64Arg)
|
---|
760 | return VERR_INVALID_PARAMETER;
|
---|
761 | return GVMMR0ResetStatisticsReq(pVM, (PGVMMRESETSTATISTICSSREQ)pReqHdr);
|
---|
762 |
|
---|
763 | /*
|
---|
764 | * Initialize the R0 part of a VM instance.
|
---|
765 | */
|
---|
766 | case VMMR0_DO_VMMR0_INIT:
|
---|
767 | return vmmR0InitVM(pVM, (uint32_t)u64Arg);
|
---|
768 |
|
---|
769 | /*
|
---|
770 | * Terminate the R0 part of a VM instance.
|
---|
771 | */
|
---|
772 | case VMMR0_DO_VMMR0_TERM:
|
---|
773 | return VMMR0TermVM(pVM, NULL);
|
---|
774 |
|
---|
775 | /*
|
---|
776 | * Attempt to enable hwacc mode and check the current setting.
|
---|
777 | *
|
---|
778 | */
|
---|
779 | case VMMR0_DO_HWACC_ENABLE:
|
---|
780 | return HWACCMR0EnableAllCpus(pVM);
|
---|
781 |
|
---|
782 | /*
|
---|
783 | * Setup the hardware accelerated raw-mode session.
|
---|
784 | */
|
---|
785 | case VMMR0_DO_HWACC_SETUP_VM:
|
---|
786 | {
|
---|
787 | RTCCUINTREG fFlags = ASMIntDisableFlags();
|
---|
788 | int rc = HWACCMR0SetupVM(pVM);
|
---|
789 | ASMSetFlags(fFlags);
|
---|
790 | return rc;
|
---|
791 | }
|
---|
792 |
|
---|
793 | /*
|
---|
794 | * Switch to GC to execute Hypervisor function.
|
---|
795 | */
|
---|
796 | case VMMR0_DO_CALL_HYPERVISOR:
|
---|
797 | {
|
---|
798 | int rc;
|
---|
799 | bool fVTxDisabled;
|
---|
800 |
|
---|
801 | /* Safety precaution as HWACCM can disable the switcher. */
|
---|
802 | Assert(!pVM->vmm.s.fSwitcherDisabled);
|
---|
803 | if (RT_UNLIKELY(pVM->vmm.s.fSwitcherDisabled))
|
---|
804 | return VERR_NOT_SUPPORTED;
|
---|
805 |
|
---|
806 | #ifndef VBOX_WITH_2X_4GB_ADDR_SPACE_IN_R0
|
---|
807 | if (RT_UNLIKELY(!PGMGetHyperCR3(VMMGetCpu0(pVM))))
|
---|
808 | return VERR_PGM_NO_CR3_SHADOW_ROOT;
|
---|
809 | #endif
|
---|
810 |
|
---|
811 | RTCCUINTREG fFlags = ASMIntDisableFlags();
|
---|
812 |
|
---|
813 | /* We might need to disable VT-x if the active switcher turns off paging. */
|
---|
814 | rc = HWACCMR0EnterSwitcher(pVM, &fVTxDisabled);
|
---|
815 | if (RT_FAILURE(rc))
|
---|
816 | return rc;
|
---|
817 |
|
---|
818 | rc = pVM->vmm.s.pfnHostToGuestR0(pVM);
|
---|
819 |
|
---|
820 | /* Re-enable VT-x if previously turned off. */
|
---|
821 | HWACCMR0LeaveSwitcher(pVM, fVTxDisabled);
|
---|
822 |
|
---|
823 | /** @todo dispatch interrupts? */
|
---|
824 | ASMSetFlags(fFlags);
|
---|
825 | return rc;
|
---|
826 | }
|
---|
827 |
|
---|
828 | /*
|
---|
829 | * PGM wrappers.
|
---|
830 | */
|
---|
831 | case VMMR0_DO_PGM_ALLOCATE_HANDY_PAGES:
|
---|
832 | return PGMR0PhysAllocateHandyPages(pVM);
|
---|
833 |
|
---|
834 | /*
|
---|
835 | * GMM wrappers.
|
---|
836 | */
|
---|
837 | case VMMR0_DO_GMM_INITIAL_RESERVATION:
|
---|
838 | if (u64Arg)
|
---|
839 | return VERR_INVALID_PARAMETER;
|
---|
840 | return GMMR0InitialReservationReq(pVM, (PGMMINITIALRESERVATIONREQ)pReqHdr);
|
---|
841 | case VMMR0_DO_GMM_UPDATE_RESERVATION:
|
---|
842 | if (u64Arg)
|
---|
843 | return VERR_INVALID_PARAMETER;
|
---|
844 | return GMMR0UpdateReservationReq(pVM, (PGMMUPDATERESERVATIONREQ)pReqHdr);
|
---|
845 |
|
---|
846 | case VMMR0_DO_GMM_ALLOCATE_PAGES:
|
---|
847 | if (u64Arg)
|
---|
848 | return VERR_INVALID_PARAMETER;
|
---|
849 | return GMMR0AllocatePagesReq(pVM, (PGMMALLOCATEPAGESREQ)pReqHdr);
|
---|
850 | case VMMR0_DO_GMM_FREE_PAGES:
|
---|
851 | if (u64Arg)
|
---|
852 | return VERR_INVALID_PARAMETER;
|
---|
853 | return GMMR0FreePagesReq(pVM, (PGMMFREEPAGESREQ)pReqHdr);
|
---|
854 | case VMMR0_DO_GMM_BALLOONED_PAGES:
|
---|
855 | if (u64Arg)
|
---|
856 | return VERR_INVALID_PARAMETER;
|
---|
857 | return GMMR0BalloonedPagesReq(pVM, (PGMMBALLOONEDPAGESREQ)pReqHdr);
|
---|
858 | case VMMR0_DO_GMM_DEFLATED_BALLOON:
|
---|
859 | if (pReqHdr)
|
---|
860 | return VERR_INVALID_PARAMETER;
|
---|
861 | return GMMR0DeflatedBalloon(pVM, (uint32_t)u64Arg);
|
---|
862 |
|
---|
863 | case VMMR0_DO_GMM_MAP_UNMAP_CHUNK:
|
---|
864 | if (u64Arg)
|
---|
865 | return VERR_INVALID_PARAMETER;
|
---|
866 | return GMMR0MapUnmapChunkReq(pVM, (PGMMMAPUNMAPCHUNKREQ)pReqHdr);
|
---|
867 | case VMMR0_DO_GMM_SEED_CHUNK:
|
---|
868 | if (pReqHdr)
|
---|
869 | return VERR_INVALID_PARAMETER;
|
---|
870 | return GMMR0SeedChunk(pVM, (RTR3PTR)u64Arg);
|
---|
871 |
|
---|
872 | /*
|
---|
873 | * A quick GCFGM mock-up.
|
---|
874 | */
|
---|
875 | /** @todo GCFGM with proper access control, ring-3 management interface and all that. */
|
---|
876 | case VMMR0_DO_GCFGM_SET_VALUE:
|
---|
877 | case VMMR0_DO_GCFGM_QUERY_VALUE:
|
---|
878 | {
|
---|
879 | if (pVM || !pReqHdr || u64Arg)
|
---|
880 | return VERR_INVALID_PARAMETER;
|
---|
881 | PGCFGMVALUEREQ pReq = (PGCFGMVALUEREQ)pReqHdr;
|
---|
882 | if (pReq->Hdr.cbReq != sizeof(*pReq))
|
---|
883 | return VERR_INVALID_PARAMETER;
|
---|
884 | int rc;
|
---|
885 | if (enmOperation == VMMR0_DO_GCFGM_SET_VALUE)
|
---|
886 | {
|
---|
887 | rc = GVMMR0SetConfig(pReq->pSession, &pReq->szName[0], pReq->u64Value);
|
---|
888 | //if (rc == VERR_CFGM_VALUE_NOT_FOUND)
|
---|
889 | // rc = GMMR0SetConfig(pReq->pSession, &pReq->szName[0], pReq->u64Value);
|
---|
890 | }
|
---|
891 | else
|
---|
892 | {
|
---|
893 | rc = GVMMR0QueryConfig(pReq->pSession, &pReq->szName[0], &pReq->u64Value);
|
---|
894 | //if (rc == VERR_CFGM_VALUE_NOT_FOUND)
|
---|
895 | // rc = GMMR0QueryConfig(pReq->pSession, &pReq->szName[0], &pReq->u64Value);
|
---|
896 | }
|
---|
897 | return rc;
|
---|
898 | }
|
---|
899 |
|
---|
900 |
|
---|
901 | /*
|
---|
902 | * Requests to the internal networking service.
|
---|
903 | */
|
---|
904 | case VMMR0_DO_INTNET_OPEN:
|
---|
905 | {
|
---|
906 | PINTNETOPENREQ pReq = (PINTNETOPENREQ)pReqHdr;
|
---|
907 | if (u64Arg || !pReq || !vmmR0IsValidSession(pVM, pReq->pSession, pSession))
|
---|
908 | return VERR_INVALID_PARAMETER;
|
---|
909 | if (!g_pIntNet)
|
---|
910 | return VERR_NOT_SUPPORTED;
|
---|
911 | return INTNETR0OpenReq(g_pIntNet, pSession, pReq);
|
---|
912 | }
|
---|
913 |
|
---|
914 | case VMMR0_DO_INTNET_IF_CLOSE:
|
---|
915 | if (u64Arg || !pReqHdr || !vmmR0IsValidSession(pVM, ((PINTNETIFCLOSEREQ)pReqHdr)->pSession, pSession))
|
---|
916 | return VERR_INVALID_PARAMETER;
|
---|
917 | if (!g_pIntNet)
|
---|
918 | return VERR_NOT_SUPPORTED;
|
---|
919 | return INTNETR0IfCloseReq(g_pIntNet, pSession, (PINTNETIFCLOSEREQ)pReqHdr);
|
---|
920 |
|
---|
921 | case VMMR0_DO_INTNET_IF_GET_RING3_BUFFER:
|
---|
922 | if (u64Arg || !pReqHdr || !vmmR0IsValidSession(pVM, ((PINTNETIFGETRING3BUFFERREQ)pReqHdr)->pSession, pSession))
|
---|
923 | return VERR_INVALID_PARAMETER;
|
---|
924 | if (!g_pIntNet)
|
---|
925 | return VERR_NOT_SUPPORTED;
|
---|
926 | return INTNETR0IfGetRing3BufferReq(g_pIntNet, pSession, (PINTNETIFGETRING3BUFFERREQ)pReqHdr);
|
---|
927 |
|
---|
928 | case VMMR0_DO_INTNET_IF_SET_PROMISCUOUS_MODE:
|
---|
929 | if (u64Arg || !pReqHdr || !vmmR0IsValidSession(pVM, ((PINTNETIFSETPROMISCUOUSMODEREQ)pReqHdr)->pSession, pSession))
|
---|
930 | return VERR_INVALID_PARAMETER;
|
---|
931 | if (!g_pIntNet)
|
---|
932 | return VERR_NOT_SUPPORTED;
|
---|
933 | return INTNETR0IfSetPromiscuousModeReq(g_pIntNet, pSession, (PINTNETIFSETPROMISCUOUSMODEREQ)pReqHdr);
|
---|
934 |
|
---|
935 | case VMMR0_DO_INTNET_IF_SET_MAC_ADDRESS:
|
---|
936 | if (u64Arg || !pReqHdr || !vmmR0IsValidSession(pVM, ((PINTNETIFSETMACADDRESSREQ)pReqHdr)->pSession, pSession))
|
---|
937 | return VERR_INVALID_PARAMETER;
|
---|
938 | if (!g_pIntNet)
|
---|
939 | return VERR_NOT_SUPPORTED;
|
---|
940 | return INTNETR0IfSetMacAddressReq(g_pIntNet, pSession, (PINTNETIFSETMACADDRESSREQ)pReqHdr);
|
---|
941 |
|
---|
942 | case VMMR0_DO_INTNET_IF_SET_ACTIVE:
|
---|
943 | if (u64Arg || !pReqHdr || !vmmR0IsValidSession(pVM, ((PINTNETIFSETACTIVEREQ)pReqHdr)->pSession, pSession))
|
---|
944 | return VERR_INVALID_PARAMETER;
|
---|
945 | if (!g_pIntNet)
|
---|
946 | return VERR_NOT_SUPPORTED;
|
---|
947 | return INTNETR0IfSetActiveReq(g_pIntNet, pSession, (PINTNETIFSETACTIVEREQ)pReqHdr);
|
---|
948 |
|
---|
949 | case VMMR0_DO_INTNET_IF_SEND:
|
---|
950 | if (u64Arg || !pReqHdr || !vmmR0IsValidSession(pVM, ((PINTNETIFSENDREQ)pReqHdr)->pSession, pSession))
|
---|
951 | return VERR_INVALID_PARAMETER;
|
---|
952 | if (!g_pIntNet)
|
---|
953 | return VERR_NOT_SUPPORTED;
|
---|
954 | return INTNETR0IfSendReq(g_pIntNet, pSession, (PINTNETIFSENDREQ)pReqHdr);
|
---|
955 |
|
---|
956 | case VMMR0_DO_INTNET_IF_WAIT:
|
---|
957 | if (u64Arg || !pReqHdr || !vmmR0IsValidSession(pVM, ((PINTNETIFWAITREQ)pReqHdr)->pSession, pSession))
|
---|
958 | return VERR_INVALID_PARAMETER;
|
---|
959 | if (!g_pIntNet)
|
---|
960 | return VERR_NOT_SUPPORTED;
|
---|
961 | return INTNETR0IfWaitReq(g_pIntNet, pSession, (PINTNETIFWAITREQ)pReqHdr);
|
---|
962 |
|
---|
963 | /*
|
---|
964 | * For profiling.
|
---|
965 | */
|
---|
966 | case VMMR0_DO_NOP:
|
---|
967 | case VMMR0_DO_SLOW_NOP:
|
---|
968 | return VINF_SUCCESS;
|
---|
969 |
|
---|
970 | /*
|
---|
971 | * For testing Ring-0 APIs invoked in this environment.
|
---|
972 | */
|
---|
973 | case VMMR0_DO_TESTS:
|
---|
974 | /** @todo make new test */
|
---|
975 | return VINF_SUCCESS;
|
---|
976 |
|
---|
977 |
|
---|
978 | #if HC_ARCH_BITS == 32 && defined(VBOX_WITH_64_BITS_GUESTS) && !defined(VBOX_WITH_HYBRID_32BIT_KERNEL)
|
---|
979 | case VMMR0_DO_TEST_SWITCHER3264:
|
---|
980 | return HWACCMR0TestSwitcher3264(pVM);
|
---|
981 | #endif
|
---|
982 | default:
|
---|
983 | /*
|
---|
984 | * We're returning VERR_NOT_SUPPORT here so we've got something else
|
---|
985 | * than -1 which the interrupt gate glue code might return.
|
---|
986 | */
|
---|
987 | Log(("operation %#x is not supported\n", enmOperation));
|
---|
988 | return VERR_NOT_SUPPORTED;
|
---|
989 | }
|
---|
990 | }
|
---|
991 |
|
---|
992 |
|
---|
993 | /**
|
---|
994 | * Argument for vmmR0EntryExWrapper containing the argument s ofr VMMR0EntryEx.
|
---|
995 | */
|
---|
996 | typedef struct VMMR0ENTRYEXARGS
|
---|
997 | {
|
---|
998 | PVM pVM;
|
---|
999 | VMMR0OPERATION enmOperation;
|
---|
1000 | PSUPVMMR0REQHDR pReq;
|
---|
1001 | uint64_t u64Arg;
|
---|
1002 | PSUPDRVSESSION pSession;
|
---|
1003 | } VMMR0ENTRYEXARGS;
|
---|
1004 | /** Pointer to a vmmR0EntryExWrapper argument package. */
|
---|
1005 | typedef VMMR0ENTRYEXARGS *PVMMR0ENTRYEXARGS;
|
---|
1006 |
|
---|
1007 | /**
|
---|
1008 | * This is just a longjmp wrapper function for VMMR0EntryEx calls.
|
---|
1009 | *
|
---|
1010 | * @returns VBox status code.
|
---|
1011 | * @param pvArgs The argument package
|
---|
1012 | */
|
---|
1013 | static int vmmR0EntryExWrapper(void *pvArgs)
|
---|
1014 | {
|
---|
1015 | return vmmR0EntryExWorker(((PVMMR0ENTRYEXARGS)pvArgs)->pVM,
|
---|
1016 | ((PVMMR0ENTRYEXARGS)pvArgs)->enmOperation,
|
---|
1017 | ((PVMMR0ENTRYEXARGS)pvArgs)->pReq,
|
---|
1018 | ((PVMMR0ENTRYEXARGS)pvArgs)->u64Arg,
|
---|
1019 | ((PVMMR0ENTRYEXARGS)pvArgs)->pSession);
|
---|
1020 | }
|
---|
1021 |
|
---|
1022 |
|
---|
1023 | /**
|
---|
1024 | * The Ring 0 entry point, called by the support library (SUP).
|
---|
1025 | *
|
---|
1026 | * @returns VBox status code.
|
---|
1027 | * @param pVM The VM to operate on.
|
---|
1028 | * @param enmOperation Which operation to execute.
|
---|
1029 | * @param pReq This points to a SUPVMMR0REQHDR packet. Optional.
|
---|
1030 | * @param u64Arg Some simple constant argument.
|
---|
1031 | * @param pSession The session of the caller.
|
---|
1032 | * @remarks Assume called with interrupts _enabled_.
|
---|
1033 | */
|
---|
1034 | VMMR0DECL(int) VMMR0EntryEx(PVM pVM, VMMR0OPERATION enmOperation, PSUPVMMR0REQHDR pReq, uint64_t u64Arg, PSUPDRVSESSION pSession)
|
---|
1035 | {
|
---|
1036 | /*
|
---|
1037 | * Requests that should only happen on the EMT thread will be
|
---|
1038 | * wrapped in a setjmp so we can assert without causing trouble.
|
---|
1039 | */
|
---|
1040 | if ( VALID_PTR(pVM)
|
---|
1041 | && pVM->pVMR0)
|
---|
1042 | {
|
---|
1043 | switch (enmOperation)
|
---|
1044 | {
|
---|
1045 | /* These might/will be called before VMMR3Init. */
|
---|
1046 | case VMMR0_DO_GMM_INITIAL_RESERVATION:
|
---|
1047 | case VMMR0_DO_GMM_UPDATE_RESERVATION:
|
---|
1048 | case VMMR0_DO_GMM_ALLOCATE_PAGES:
|
---|
1049 | case VMMR0_DO_GMM_FREE_PAGES:
|
---|
1050 | case VMMR0_DO_GMM_BALLOONED_PAGES:
|
---|
1051 | case VMMR0_DO_GMM_DEFLATED_BALLOON:
|
---|
1052 | /* On the mac we might not have a valid jmp buf, so check these as well. */
|
---|
1053 | case VMMR0_DO_VMMR0_INIT:
|
---|
1054 | case VMMR0_DO_VMMR0_TERM:
|
---|
1055 | {
|
---|
1056 | if (!pVM->vmm.s.CallHostR0JmpBuf.pvSavedStack)
|
---|
1057 | break;
|
---|
1058 |
|
---|
1059 | /** @todo validate this EMT claim... GVM knows. */
|
---|
1060 | VMMR0ENTRYEXARGS Args;
|
---|
1061 | Args.pVM = pVM;
|
---|
1062 | Args.enmOperation = enmOperation;
|
---|
1063 | Args.pReq = pReq;
|
---|
1064 | Args.u64Arg = u64Arg;
|
---|
1065 | Args.pSession = pSession;
|
---|
1066 | return vmmR0CallHostSetJmpEx(&pVM->vmm.s.CallHostR0JmpBuf, vmmR0EntryExWrapper, &Args);
|
---|
1067 | }
|
---|
1068 |
|
---|
1069 | default:
|
---|
1070 | break;
|
---|
1071 | }
|
---|
1072 | }
|
---|
1073 | return vmmR0EntryExWorker(pVM, enmOperation, pReq, u64Arg, pSession);
|
---|
1074 | }
|
---|
1075 |
|
---|
1076 |
|
---|
1077 | /**
|
---|
1078 | * Internal R0 logger worker: Flush logger.
|
---|
1079 | *
|
---|
1080 | * @param pLogger The logger instance to flush.
|
---|
1081 | * @remark This function must be exported!
|
---|
1082 | */
|
---|
1083 | VMMR0DECL(void) vmmR0LoggerFlush(PRTLOGGER pLogger)
|
---|
1084 | {
|
---|
1085 | /*
|
---|
1086 | * Convert the pLogger into a VM handle and 'call' back to Ring-3.
|
---|
1087 | * (This is a bit paranoid code.)
|
---|
1088 | */
|
---|
1089 | PVMMR0LOGGER pR0Logger = (PVMMR0LOGGER)((uintptr_t)pLogger - RT_OFFSETOF(VMMR0LOGGER, Logger));
|
---|
1090 | if ( !VALID_PTR(pR0Logger)
|
---|
1091 | || !VALID_PTR(pR0Logger + 1)
|
---|
1092 | || pLogger->u32Magic != RTLOGGER_MAGIC)
|
---|
1093 | {
|
---|
1094 | #ifdef DEBUG
|
---|
1095 | SUPR0Printf("vmmR0LoggerFlush: pLogger=%p!\n", pLogger);
|
---|
1096 | #endif
|
---|
1097 | return;
|
---|
1098 | }
|
---|
1099 | if (pR0Logger->fFlushingDisabled)
|
---|
1100 | return; /* quietly */
|
---|
1101 |
|
---|
1102 | PVM pVM = pR0Logger->pVM;
|
---|
1103 | if ( !VALID_PTR(pVM)
|
---|
1104 | || pVM->pVMR0 != pVM)
|
---|
1105 | {
|
---|
1106 | #ifdef DEBUG
|
---|
1107 | SUPR0Printf("vmmR0LoggerFlush: pVM=%p! pVMR0=%p! pLogger=%p\n", pVM, pVM->pVMR0, pLogger);
|
---|
1108 | #endif
|
---|
1109 | return;
|
---|
1110 | }
|
---|
1111 |
|
---|
1112 | /*
|
---|
1113 | * Check that the jump buffer is armed.
|
---|
1114 | */
|
---|
1115 | #ifdef RT_ARCH_X86
|
---|
1116 | if ( !pVM->vmm.s.CallHostR0JmpBuf.eip
|
---|
1117 | || pVM->vmm.s.CallHostR0JmpBuf.fInRing3Call)
|
---|
1118 | #else
|
---|
1119 | if ( !pVM->vmm.s.CallHostR0JmpBuf.rip
|
---|
1120 | || pVM->vmm.s.CallHostR0JmpBuf.fInRing3Call)
|
---|
1121 | #endif
|
---|
1122 | {
|
---|
1123 | #ifdef DEBUG
|
---|
1124 | SUPR0Printf("vmmR0LoggerFlush: Jump buffer isn't armed!\n");
|
---|
1125 | #endif
|
---|
1126 | return;
|
---|
1127 | }
|
---|
1128 | VMMR0CallHost(pVM, VMMCALLHOST_VMM_LOGGER_FLUSH, 0);
|
---|
1129 | }
|
---|
1130 |
|
---|
1131 |
|
---|
1132 | /**
|
---|
1133 | * Disables flushing of the ring-0 debug log.
|
---|
1134 | *
|
---|
1135 | * @param pVCpu The shared virtual cpu structure.
|
---|
1136 | */
|
---|
1137 | VMMR0DECL(void) VMMR0LogFlushDisable(PVMCPU pVCpu)
|
---|
1138 | {
|
---|
1139 | PVM pVM = pVCpu->pVMR0;
|
---|
1140 | if (pVM->vmm.s.pR0LoggerR0)
|
---|
1141 | pVM->vmm.s.pR0LoggerR0->fFlushingDisabled = true;
|
---|
1142 | }
|
---|
1143 |
|
---|
1144 |
|
---|
1145 | /**
|
---|
1146 | * Enables flushing of the ring-0 debug log.
|
---|
1147 | *
|
---|
1148 | * @param pVCpu The shared virtual cpu structure.
|
---|
1149 | */
|
---|
1150 | VMMR0DECL(void) VMMR0LogFlushEnable(PVMCPU pVCpu)
|
---|
1151 | {
|
---|
1152 | PVM pVM = pVCpu->pVMR0;
|
---|
1153 | if (pVM->vmm.s.pR0LoggerR0)
|
---|
1154 | pVM->vmm.s.pR0LoggerR0->fFlushingDisabled = false;
|
---|
1155 | }
|
---|
1156 |
|
---|
1157 |
|
---|
1158 | /**
|
---|
1159 | * Jump back to ring-3 if we're the EMT and the longjmp is armed.
|
---|
1160 | *
|
---|
1161 | * @returns true if the breakpoint should be hit, false if it should be ignored.
|
---|
1162 | */
|
---|
1163 | DECLEXPORT(bool) RTCALL RTAssertShouldPanic(void)
|
---|
1164 | {
|
---|
1165 | #if 0
|
---|
1166 | return true;
|
---|
1167 | #else
|
---|
1168 | PVM pVM = GVMMR0GetVMByEMT(NIL_RTNATIVETHREAD);
|
---|
1169 | if (pVM)
|
---|
1170 | {
|
---|
1171 | #ifdef RT_ARCH_X86
|
---|
1172 | if ( pVM->vmm.s.CallHostR0JmpBuf.eip
|
---|
1173 | && !pVM->vmm.s.CallHostR0JmpBuf.fInRing3Call)
|
---|
1174 | #else
|
---|
1175 | if ( pVM->vmm.s.CallHostR0JmpBuf.rip
|
---|
1176 | && !pVM->vmm.s.CallHostR0JmpBuf.fInRing3Call)
|
---|
1177 | #endif
|
---|
1178 | {
|
---|
1179 | int rc = VMMR0CallHost(pVM, VMMCALLHOST_VM_R0_ASSERTION, 0);
|
---|
1180 | return RT_FAILURE_NP(rc);
|
---|
1181 | }
|
---|
1182 | }
|
---|
1183 | #ifdef RT_OS_LINUX
|
---|
1184 | return true;
|
---|
1185 | #else
|
---|
1186 | return false;
|
---|
1187 | #endif
|
---|
1188 | #endif
|
---|
1189 | }
|
---|
1190 |
|
---|
1191 |
|
---|
1192 | /**
|
---|
1193 | * Override this so we can push it up to ring-3.
|
---|
1194 | *
|
---|
1195 | * @param pszExpr Expression. Can be NULL.
|
---|
1196 | * @param uLine Location line number.
|
---|
1197 | * @param pszFile Location file name.
|
---|
1198 | * @param pszFunction Location function name.
|
---|
1199 | */
|
---|
1200 | DECLEXPORT(void) RTCALL AssertMsg1(const char *pszExpr, unsigned uLine, const char *pszFile, const char *pszFunction)
|
---|
1201 | {
|
---|
1202 | #if !defined(DEBUG_sandervl) && !defined(RT_OS_DARWIN)
|
---|
1203 | SUPR0Printf("\n!!R0-Assertion Failed!!\n"
|
---|
1204 | "Expression: %s\n"
|
---|
1205 | "Location : %s(%d) %s\n",
|
---|
1206 | pszExpr, pszFile, uLine, pszFunction);
|
---|
1207 | #endif
|
---|
1208 | LogAlways(("\n!!R0-Assertion Failed!!\n"
|
---|
1209 | "Expression: %s\n"
|
---|
1210 | "Location : %s(%d) %s\n",
|
---|
1211 | pszExpr, pszFile, uLine, pszFunction));
|
---|
1212 |
|
---|
1213 | PVM pVM = GVMMR0GetVMByEMT(NIL_RTNATIVETHREAD);
|
---|
1214 | if (pVM)
|
---|
1215 | RTStrPrintf(pVM->vmm.s.szRing0AssertMsg1, sizeof(pVM->vmm.s.szRing0AssertMsg1),
|
---|
1216 | "\n!!R0-Assertion Failed!!\n"
|
---|
1217 | "Expression: %s\n"
|
---|
1218 | "Location : %s(%d) %s\n",
|
---|
1219 | pszExpr, pszFile, uLine, pszFunction);
|
---|
1220 | #ifdef RT_OS_DARWIN
|
---|
1221 | RTAssertMsg1(pszExpr, uLine, pszFile, pszFunction);
|
---|
1222 | #endif
|
---|
1223 | }
|
---|
1224 |
|
---|
1225 |
|
---|
1226 | /**
|
---|
1227 | * Callback for RTLogFormatV which writes to the ring-3 log port.
|
---|
1228 | * See PFNLOGOUTPUT() for details.
|
---|
1229 | */
|
---|
1230 | static DECLCALLBACK(size_t) rtLogOutput(void *pv, const char *pachChars, size_t cbChars)
|
---|
1231 | {
|
---|
1232 | for (size_t i = 0; i < cbChars; i++)
|
---|
1233 | {
|
---|
1234 | #if !defined(DEBUG_sandervl) && !defined(RT_OS_DARWIN)
|
---|
1235 | SUPR0Printf("%c", pachChars[i]);
|
---|
1236 | #endif
|
---|
1237 | LogAlways(("%c", pachChars[i]));
|
---|
1238 | }
|
---|
1239 |
|
---|
1240 | return cbChars;
|
---|
1241 | }
|
---|
1242 |
|
---|
1243 |
|
---|
1244 | DECLEXPORT(void) RTCALL AssertMsg2(const char *pszFormat, ...)
|
---|
1245 | {
|
---|
1246 | va_list va;
|
---|
1247 |
|
---|
1248 | PRTLOGGER pLog = RTLogDefaultInstance(); /** @todo we want this for release as well! */
|
---|
1249 | if (pLog)
|
---|
1250 | {
|
---|
1251 | va_start(va, pszFormat);
|
---|
1252 | RTLogFormatV(rtLogOutput, pLog, pszFormat, va);
|
---|
1253 | va_end(va);
|
---|
1254 |
|
---|
1255 | PVM pVM = GVMMR0GetVMByEMT(NIL_RTNATIVETHREAD);
|
---|
1256 | if (pVM)
|
---|
1257 | {
|
---|
1258 | va_start(va, pszFormat);
|
---|
1259 | RTStrPrintfV(pVM->vmm.s.szRing0AssertMsg2, sizeof(pVM->vmm.s.szRing0AssertMsg2), pszFormat, va);
|
---|
1260 | va_end(va);
|
---|
1261 | }
|
---|
1262 | }
|
---|
1263 |
|
---|
1264 | #ifdef RT_OS_DARWIN
|
---|
1265 | va_start(va, pszFormat);
|
---|
1266 | RTAssertMsg2V(pszFormat, va);
|
---|
1267 | va_end(va);
|
---|
1268 | #endif
|
---|
1269 | }
|
---|
1270 |
|
---|