VirtualBox

source: vbox/trunk/src/VBox/VMM/VMMR3/MM.cpp@ 95843

Last change on this file since 95843 was 93718, checked in by vboxsync, 3 years ago

VMM/MM: Removed the hyper heap. bugref:10093 bugref:9517

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id Revision
File size: 26.9 KB
Line 
1/* $Id: MM.cpp 93718 2022-02-14 11:09:36Z vboxsync $ */
2/** @file
3 * MM - Memory Manager.
4 */
5
6/*
7 * Copyright (C) 2006-2022 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17
18
19/** @page pg_mm MM - The Memory Manager
20 *
21 * The memory manager is in charge of the following memory:
22 * - Hypervisor Memory Area (HMA) - Address space management (obsolete in 6.1).
23 * - Hypervisor Heap - A memory heap that lives in all contexts.
24 * - User-Kernel Heap - A memory heap lives in both host context.
25 * - Tagged ring-3 heap.
26 * - Page pools - Primarily used by PGM for shadow page tables.
27 * - Locked process memory - Guest RAM and other. (reduce/obsolete this)
28 * - Physical guest memory (RAM & ROM) - Moving to PGM. (obsolete this)
29 *
30 * The global memory manager (GMM) is the global counter part / partner of MM.
31 * MM will provide therefore ring-3 callable interfaces for some of the GMM APIs
32 * related to resource tracking (PGM is the user).
33 *
34 * @see grp_mm
35 *
36 *
37 * @section sec_mm_hma Hypervisor Memory Area - Obsolete in 6.1
38 *
39 * The HMA is used when executing in raw-mode. We borrow, with the help of
40 * PGMMap, some unused space (one or more page directory entries to be precise)
41 * in the guest's virtual memory context. PGM will monitor the guest's virtual
42 * address space for changes and relocate the HMA when required.
43 *
44 * To give some idea what's in the HMA, study the 'info hma' output:
45 * @verbatim
46VBoxDbg> info hma
47Hypervisor Memory Area (HMA) Layout: Base 00000000a0000000, 0x00800000 bytes
4800000000a05cc000-00000000a05cd000 DYNAMIC fence
4900000000a05c4000-00000000a05cc000 DYNAMIC Dynamic mapping
5000000000a05c3000-00000000a05c4000 DYNAMIC fence
5100000000a05b8000-00000000a05c3000 DYNAMIC Paging
5200000000a05b6000-00000000a05b8000 MMIO2 0000000000000000 PCNetShMem
5300000000a0536000-00000000a05b6000 MMIO2 0000000000000000 VGA VRam
5400000000a0523000-00000000a0536000 00002aaab3d0c000 LOCKED autofree alloc once (PDM_DEVICE)
5500000000a0522000-00000000a0523000 DYNAMIC fence
5600000000a051e000-00000000a0522000 00002aaab36f5000 LOCKED autofree VBoxDD2RC.rc
5700000000a051d000-00000000a051e000 DYNAMIC fence
5800000000a04eb000-00000000a051d000 00002aaab36c3000 LOCKED autofree VBoxDDRC.rc
5900000000a04ea000-00000000a04eb000 DYNAMIC fence
6000000000a04e9000-00000000a04ea000 00002aaab36c2000 LOCKED autofree ram range (High ROM Region)
6100000000a04e8000-00000000a04e9000 DYNAMIC fence
6200000000a040e000-00000000a04e8000 00002aaab2e6d000 LOCKED autofree VMMRC.rc
6300000000a0208000-00000000a040e000 00002aaab2c67000 LOCKED autofree alloc once (PATM)
6400000000a01f7000-00000000a0208000 00002aaaab92d000 LOCKED autofree alloc once (SELM)
6500000000a01e7000-00000000a01f7000 00002aaaab5e8000 LOCKED autofree alloc once (SELM)
6600000000a01e6000-00000000a01e7000 DYNAMIC fence
6700000000a01e5000-00000000a01e6000 00002aaaab5e7000 HCPHYS 00000000c363c000 Core Code
6800000000a01e4000-00000000a01e5000 DYNAMIC fence
6900000000a01e3000-00000000a01e4000 00002aaaaab26000 HCPHYS 00000000619cf000 GIP
7000000000a01a2000-00000000a01e3000 00002aaaabf32000 LOCKED autofree alloc once (PGM_PHYS)
7100000000a016b000-00000000a01a2000 00002aaab233f000 LOCKED autofree alloc once (PGM_POOL)
7200000000a016a000-00000000a016b000 DYNAMIC fence
7300000000a0165000-00000000a016a000 DYNAMIC CR3 mapping
7400000000a0164000-00000000a0165000 DYNAMIC fence
7500000000a0024000-00000000a0164000 00002aaab215f000 LOCKED autofree Heap
7600000000a0023000-00000000a0024000 DYNAMIC fence
7700000000a0001000-00000000a0023000 00002aaab1d24000 LOCKED pages VM
7800000000a0000000-00000000a0001000 DYNAMIC fence
79 @endverbatim
80 *
81 *
82 * @section sec_mm_hyperheap Hypervisor Heap
83 *
84 * The heap is accessible from ring-3, ring-0 and the raw-mode context. That
85 * said, it's not necessarily mapped into ring-0 on if that's possible since we
86 * don't wish to waste kernel address space without a good reason.
87 *
88 * Allocations within the heap are always in the same relative position in all
89 * contexts, so, it's possible to use offset based linking. In fact, the heap is
90 * internally using offset based linked lists tracking heap blocks. We use
91 * offset linked AVL trees and lists in a lot of places where share structures
92 * between RC, R3 and R0, so this is a strict requirement of the heap. However
93 * this means that we cannot easily extend the heap since the extension won't
94 * necessarily be in the continuation of the current heap memory in all (or any)
95 * context.
96 *
97 * All allocations are tagged. Per tag allocation statistics will be maintaining
98 * and exposed thru STAM when VBOX_WITH_STATISTICS is defined.
99 *
100 *
101 * @section sec_mm_r3heap Tagged Ring-3 Heap
102 *
103 * The ring-3 heap is a wrapper around the RTMem API adding allocation
104 * statistics and automatic cleanup on VM destruction.
105 *
106 * Per tag allocation statistics will be maintaining and exposed thru STAM when
107 * VBOX_WITH_STATISTICS is defined.
108 *
109 *
110 * @section sec_mm_page Page Pool
111 *
112 * The MM manages a page pool from which other components can allocate locked,
113 * page aligned and page sized memory objects. The pool provides facilities to
114 * convert back and forth between (host) physical and virtual addresses (within
115 * the pool of course). Several specialized interfaces are provided for the most
116 * common allocations and conversions to save the caller from bothersome casting
117 * and extra parameter passing.
118 *
119 *
120 * @section sec_mm_locked Locked Process Memory
121 *
122 * MM manages the locked process memory. This is used for a bunch of things
123 * (count the LOCKED entries in the 'info hma' output found in @ref sec_mm_hma),
124 * but the main consumer of memory is currently for guest RAM. There is an
125 * ongoing rewrite that will move all the guest RAM allocation to PGM and
126 * GMM.
127 *
128 * The locking of memory is something doing in cooperation with the VirtualBox
129 * support driver, SUPDrv (aka. VBoxDrv), thru the support library API,
130 * SUPR3 (aka. SUPLib).
131 *
132 *
133 * @section sec_mm_phys Physical Guest Memory
134 *
135 * MM is currently managing the physical memory for the guest. It relies heavily
136 * on PGM for this. There is an ongoing rewrite that will move this to PGM. (The
137 * rewrite is driven by the need for more flexible guest ram allocation, but
138 * also motivated by the fact that MMPhys is just adding stupid bureaucracy and
139 * that MMR3PhysReserve is a totally weird artifact that must go away.)
140 *
141 */
142
143
144/*********************************************************************************************************************************
145* Header Files *
146*********************************************************************************************************************************/
147#define LOG_GROUP LOG_GROUP_MM
148#include <VBox/vmm/mm.h>
149#include <VBox/vmm/pgm.h>
150#include <VBox/vmm/cfgm.h>
151#include <VBox/vmm/ssm.h>
152#include <VBox/vmm/gmm.h>
153#include "MMInternal.h"
154#include <VBox/vmm/vm.h>
155#include <VBox/vmm/uvm.h>
156#include <VBox/err.h>
157#include <VBox/param.h>
158
159#include <VBox/log.h>
160#include <iprt/alloc.h>
161#include <iprt/assert.h>
162#include <iprt/string.h>
163
164
165/*********************************************************************************************************************************
166* Defined Constants And Macros *
167*********************************************************************************************************************************/
168/** The current saved state version of MM. */
169#define MM_SAVED_STATE_VERSION 2
170
171
172/*********************************************************************************************************************************
173* Internal Functions *
174*********************************************************************************************************************************/
175static DECLCALLBACK(int) mmR3Save(PVM pVM, PSSMHANDLE pSSM);
176static DECLCALLBACK(int) mmR3Load(PVM pVM, PSSMHANDLE pSSM, uint32_t uVersion, uint32_t uPass);
177
178
179
180
181/**
182 * Initializes the MM members of the UVM.
183 *
184 * This is currently only the ring-3 heap.
185 *
186 * @returns VBox status code.
187 * @param pUVM Pointer to the user mode VM structure.
188 */
189VMMR3DECL(int) MMR3InitUVM(PUVM pUVM)
190{
191 /*
192 * Assert sizes and order.
193 */
194 AssertCompile(sizeof(pUVM->mm.s) <= sizeof(pUVM->mm.padding));
195 AssertRelease(sizeof(pUVM->mm.s) <= sizeof(pUVM->mm.padding));
196 Assert(!pUVM->mm.s.pHeap);
197
198 /*
199 * Init the heap.
200 */
201 int rc = mmR3HeapCreateU(pUVM, &pUVM->mm.s.pHeap);
202 if (RT_SUCCESS(rc))
203 return VINF_SUCCESS;
204 return rc;
205}
206
207
208/**
209 * Initializes the MM.
210 *
211 * MM is managing the virtual address space (among other things) and
212 * setup the hypervisor memory area mapping in the VM structure and
213 * the hypervisor alloc-only-heap. Assuming the current init order
214 * and components the hypervisor memory area looks like this:
215 * -# VM Structure.
216 * -# Hypervisor alloc only heap (also call Hypervisor memory region).
217 * -# Core code.
218 *
219 * MM determines the virtual address of the hypervisor memory area by
220 * checking for location at previous run. If that property isn't available
221 * it will choose a default starting location, currently 0xa0000000.
222 *
223 * @returns VBox status code.
224 * @param pVM The cross context VM structure.
225 */
226VMMR3DECL(int) MMR3Init(PVM pVM)
227{
228 LogFlow(("MMR3Init\n"));
229
230 /*
231 * Assert alignment, sizes and order.
232 */
233 AssertRelease(!(RT_UOFFSETOF(VM, mm.s) & 31));
234 AssertRelease(sizeof(pVM->mm.s) <= sizeof(pVM->mm.padding));
235
236 /*
237 * Register the saved state data unit.
238 */
239 int rc = SSMR3RegisterInternal(pVM, "mm", 1, MM_SAVED_STATE_VERSION, sizeof(uint32_t) * 2,
240 NULL, NULL, NULL,
241 NULL, mmR3Save, NULL,
242 NULL, mmR3Load, NULL);
243 if (RT_SUCCESS(rc))
244 {
245 /*
246 * Statistics.
247 */
248 STAM_REG(pVM, &pVM->mm.s.cBasePages, STAMTYPE_U64, "/MM/Reserved/cBasePages", STAMUNIT_PAGES, "Reserved number of base pages, ROM and Shadow ROM included.");
249 STAM_REG(pVM, &pVM->mm.s.cHandyPages, STAMTYPE_U32, "/MM/Reserved/cHandyPages", STAMUNIT_PAGES, "Reserved number of handy pages.");
250 STAM_REG(pVM, &pVM->mm.s.cShadowPages, STAMTYPE_U32, "/MM/Reserved/cShadowPages", STAMUNIT_PAGES, "Reserved number of shadow paging pages.");
251 STAM_REG(pVM, &pVM->mm.s.cFixedPages, STAMTYPE_U32, "/MM/Reserved/cFixedPages", STAMUNIT_PAGES, "Reserved number of fixed pages (MMIO2).");
252 STAM_REG(pVM, &pVM->mm.s.cbRamBase, STAMTYPE_U64, "/MM/cbRamBase", STAMUNIT_BYTES, "Size of the base RAM.");
253
254 return rc;
255 }
256
257 return rc;
258}
259
260
261/**
262 * Initializes the MM parts which depends on PGM being initialized.
263 *
264 * @returns VBox status code.
265 * @param pVM The cross context VM structure.
266 * @remark No cleanup necessary since MMR3Term() will be called on failure.
267 */
268VMMR3DECL(int) MMR3InitPaging(PVM pVM)
269{
270 LogFlow(("MMR3InitPaging:\n"));
271
272 /*
273 * Query the CFGM values.
274 */
275 int rc;
276 PCFGMNODE pMMCfg = CFGMR3GetChild(CFGMR3GetRoot(pVM), "MM");
277 if (!pMMCfg)
278 {
279 rc = CFGMR3InsertNode(CFGMR3GetRoot(pVM), "MM", &pMMCfg);
280 AssertRCReturn(rc, rc);
281 }
282
283 /** @cfgm{/RamSize, uint64_t, 0, 16TB, 0}
284 * Specifies the size of the base RAM that is to be set up during
285 * VM initialization.
286 */
287 uint64_t cbRam;
288 rc = CFGMR3QueryU64(CFGMR3GetRoot(pVM), "RamSize", &cbRam);
289 if (rc == VERR_CFGM_VALUE_NOT_FOUND)
290 cbRam = 0;
291 else
292 AssertMsgRCReturn(rc, ("Configuration error: Failed to query integer \"RamSize\", rc=%Rrc.\n", rc), rc);
293 AssertLogRelMsg(!(cbRam & ~X86_PTE_PAE_PG_MASK), ("%RGp X86_PTE_PAE_PG_MASK=%RX64\n", cbRam, X86_PTE_PAE_PG_MASK));
294 AssertLogRelMsgReturn(cbRam <= GMM_GCPHYS_LAST, ("cbRam=%RGp GMM_GCPHYS_LAST=%RX64\n", cbRam, GMM_GCPHYS_LAST), VERR_OUT_OF_RANGE);
295 cbRam &= X86_PTE_PAE_PG_MASK;
296 pVM->mm.s.cbRamBase = cbRam;
297
298 /** @cfgm{/RamHoleSize, uint32_t, 0, 4032MB, 512MB}
299 * Specifies the size of the memory hole. The memory hole is used
300 * to avoid mapping RAM to the range normally used for PCI memory regions.
301 * Must be aligned on a 4MB boundary. */
302 uint32_t cbRamHole;
303 rc = CFGMR3QueryU32Def(CFGMR3GetRoot(pVM), "RamHoleSize", &cbRamHole, MM_RAM_HOLE_SIZE_DEFAULT);
304 AssertLogRelMsgRCReturn(rc, ("Configuration error: Failed to query integer \"RamHoleSize\", rc=%Rrc.\n", rc), rc);
305 AssertLogRelMsgReturn(cbRamHole <= 4032U * _1M,
306 ("Configuration error: \"RamHoleSize\"=%#RX32 is too large.\n", cbRamHole), VERR_OUT_OF_RANGE);
307 AssertLogRelMsgReturn(cbRamHole > 16 * _1M,
308 ("Configuration error: \"RamHoleSize\"=%#RX32 is too large.\n", cbRamHole), VERR_OUT_OF_RANGE);
309 AssertLogRelMsgReturn(!(cbRamHole & (_4M - 1)),
310 ("Configuration error: \"RamHoleSize\"=%#RX32 is misaligned.\n", cbRamHole), VERR_OUT_OF_RANGE);
311 uint64_t const offRamHole = _4G - cbRamHole;
312 if (cbRam < offRamHole)
313 Log(("MM: %RU64 bytes of RAM\n", cbRam));
314 else
315 Log(("MM: %RU64 bytes of RAM with a hole at %RU64 up to 4GB.\n", cbRam, offRamHole));
316
317 /** @cfgm{/MM/Policy, string, no overcommitment}
318 * Specifies the policy to use when reserving memory for this VM. The recognized
319 * value is 'no overcommitment' (default). See GMMPOLICY.
320 */
321 GMMOCPOLICY enmOcPolicy;
322 char sz[64];
323 rc = CFGMR3QueryString(CFGMR3GetRoot(pVM), "Policy", sz, sizeof(sz));
324 if (RT_SUCCESS(rc))
325 {
326 if ( !RTStrICmp(sz, "no_oc")
327 || !RTStrICmp(sz, "no overcommitment"))
328 enmOcPolicy = GMMOCPOLICY_NO_OC;
329 else
330 return VMSetError(pVM, VERR_INVALID_PARAMETER, RT_SRC_POS, "Unknown \"MM/Policy\" value \"%s\"", sz);
331 }
332 else if (rc == VERR_CFGM_VALUE_NOT_FOUND)
333 enmOcPolicy = GMMOCPOLICY_NO_OC;
334 else
335 AssertMsgFailedReturn(("Configuration error: Failed to query string \"MM/Policy\", rc=%Rrc.\n", rc), rc);
336
337 /** @cfgm{/MM/Priority, string, normal}
338 * Specifies the memory priority of this VM. The priority comes into play when the
339 * system is overcommitted and the VMs needs to be milked for memory. The recognized
340 * values are 'low', 'normal' (default) and 'high'. See GMMPRIORITY.
341 */
342 GMMPRIORITY enmPriority;
343 rc = CFGMR3QueryString(CFGMR3GetRoot(pVM), "Priority", sz, sizeof(sz));
344 if (RT_SUCCESS(rc))
345 {
346 if (!RTStrICmp(sz, "low"))
347 enmPriority = GMMPRIORITY_LOW;
348 else if (!RTStrICmp(sz, "normal"))
349 enmPriority = GMMPRIORITY_NORMAL;
350 else if (!RTStrICmp(sz, "high"))
351 enmPriority = GMMPRIORITY_HIGH;
352 else
353 return VMSetError(pVM, VERR_INVALID_PARAMETER, RT_SRC_POS, "Unknown \"MM/Priority\" value \"%s\"", sz);
354 }
355 else if (rc == VERR_CFGM_VALUE_NOT_FOUND)
356 enmPriority = GMMPRIORITY_NORMAL;
357 else
358 AssertMsgFailedReturn(("Configuration error: Failed to query string \"MM/Priority\", rc=%Rrc.\n", rc), rc);
359
360 /*
361 * Make the initial memory reservation with GMM.
362 */
363 uint32_t const cbUma = _1M - 640*_1K;
364 uint64_t cBasePages = ((cbRam - cbUma) >> GUEST_PAGE_SHIFT) + pVM->mm.s.cBasePages;
365 rc = GMMR3InitialReservation(pVM,
366 RT_MAX(cBasePages + pVM->mm.s.cHandyPages, 1),
367 RT_MAX(pVM->mm.s.cShadowPages, 1),
368 RT_MAX(pVM->mm.s.cFixedPages, 1),
369 enmOcPolicy,
370 enmPriority);
371 if (RT_FAILURE(rc))
372 {
373 if (rc == VERR_GMM_MEMORY_RESERVATION_DECLINED)
374 return VMSetError(pVM, rc, RT_SRC_POS,
375 N_("Insufficient free memory to start the VM (cbRam=%#RX64 enmOcPolicy=%d enmPriority=%d)"),
376 cbRam, enmOcPolicy, enmPriority);
377 return VMSetError(pVM, rc, RT_SRC_POS, "GMMR3InitialReservation(,%#RX64,0,0,%d,%d)",
378 cbRam >> GUEST_PAGE_SHIFT, enmOcPolicy, enmPriority);
379 }
380
381 /*
382 * If RamSize is 0 we're done now.
383 */
384 if (cbRam < GUEST_PAGE_SIZE)
385 {
386 Log(("MM: No RAM configured\n"));
387 return VINF_SUCCESS;
388 }
389
390 /*
391 * Setup the base ram (PGM).
392 */
393 pVM->mm.s.cbRamHole = cbRamHole;
394 pVM->mm.s.cbRamBelow4GB = cbRam > offRamHole ? offRamHole : cbRam;
395 pVM->mm.s.cbRamAbove4GB = cbRam > offRamHole ? cbRam - offRamHole : 0;
396
397 /* First the conventional memory: */
398 rc = PGMR3PhysRegisterRam(pVM, 0, RT_MIN(cbRam, 640*_1K), "Conventional RAM");
399 if (RT_SUCCESS(rc) && cbRam >= _1M)
400 {
401 /* The extended memory from 1MiB to 2MiB to align better with large pages in NEM mode: */
402 rc = PGMR3PhysRegisterRam(pVM, _1M, RT_MIN(_1M, cbRam - _1M), "Extended RAM, 1-2MB");
403 if (cbRam > _2M)
404 {
405 /* The extended memory from 2MiB up to 4GiB: */
406 rc = PGMR3PhysRegisterRam(pVM, _2M, pVM->mm.s.cbRamBelow4GB - _2M, "Extended RAM, >2MB");
407
408 /* Then all the memory above 4GiB: */
409 if (RT_SUCCESS(rc) && pVM->mm.s.cbRamAbove4GB > 0)
410 rc = PGMR3PhysRegisterRam(pVM, _4G, cbRam - offRamHole, "Above 4GB Base RAM");
411 }
412 }
413
414 /*
415 * Enabled mmR3UpdateReservation here since we don't want the
416 * PGMR3PhysRegisterRam calls above mess things up.
417 */
418 pVM->mm.s.fDoneMMR3InitPaging = true;
419 AssertMsg(pVM->mm.s.cBasePages == cBasePages || RT_FAILURE(rc), ("%RX64 != %RX64\n", pVM->mm.s.cBasePages, cBasePages));
420
421 LogFlow(("MMR3InitPaging: returns %Rrc\n", rc));
422 return rc;
423}
424
425
426/**
427 * Terminates the MM.
428 *
429 * Termination means cleaning up and freeing all resources,
430 * the VM it self is at this point powered off or suspended.
431 *
432 * @returns VBox status code.
433 * @param pVM The cross context VM structure.
434 */
435VMMR3DECL(int) MMR3Term(PVM pVM)
436{
437 RT_NOREF(pVM);
438 return VINF_SUCCESS;
439}
440
441
442/**
443 * Terminates the UVM part of MM.
444 *
445 * Termination means cleaning up and freeing all resources,
446 * the VM it self is at this point powered off or suspended.
447 *
448 * @returns VBox status code.
449 * @param pUVM Pointer to the user mode VM structure.
450 */
451VMMR3DECL(void) MMR3TermUVM(PUVM pUVM)
452{
453 /*
454 * Destroy the heap.
455 */
456 mmR3HeapDestroy(pUVM->mm.s.pHeap);
457 pUVM->mm.s.pHeap = NULL;
458}
459
460
461/**
462 * Execute state save operation.
463 *
464 * @returns VBox status code.
465 * @param pVM The cross context VM structure.
466 * @param pSSM SSM operation handle.
467 */
468static DECLCALLBACK(int) mmR3Save(PVM pVM, PSSMHANDLE pSSM)
469{
470 LogFlow(("mmR3Save:\n"));
471
472 /* (PGM saves the physical memory.) */
473 SSMR3PutU64(pSSM, pVM->mm.s.cBasePages);
474 return SSMR3PutU64(pSSM, pVM->mm.s.cbRamBase);
475}
476
477
478/**
479 * Execute state load operation.
480 *
481 * @returns VBox status code.
482 * @param pVM The cross context VM structure.
483 * @param pSSM SSM operation handle.
484 * @param uVersion Data layout version.
485 * @param uPass The data pass.
486 */
487static DECLCALLBACK(int) mmR3Load(PVM pVM, PSSMHANDLE pSSM, uint32_t uVersion, uint32_t uPass)
488{
489 LogFlow(("mmR3Load:\n"));
490 Assert(uPass == SSM_PASS_FINAL); NOREF(uPass);
491
492 /*
493 * Validate version.
494 */
495 if ( SSM_VERSION_MAJOR_CHANGED(uVersion, MM_SAVED_STATE_VERSION)
496 || !uVersion)
497 {
498 AssertMsgFailed(("mmR3Load: Invalid version uVersion=%d!\n", uVersion));
499 return VERR_SSM_UNSUPPORTED_DATA_UNIT_VERSION;
500 }
501
502 /*
503 * Check the cBasePages and cbRamBase values.
504 */
505 int rc;
506 RTUINT cb1;
507
508 /* cBasePages (ignored) */
509 uint64_t cGuestPages;
510 if (uVersion >= 2)
511 rc = SSMR3GetU64(pSSM, &cGuestPages);
512 else
513 {
514 rc = SSMR3GetUInt(pSSM, &cb1);
515 cGuestPages = cb1 >> GUEST_PAGE_SHIFT;
516 }
517 if (RT_FAILURE(rc))
518 return rc;
519
520 /* cbRamBase */
521 uint64_t cb;
522 if (uVersion != 1)
523 rc = SSMR3GetU64(pSSM, &cb);
524 else
525 {
526 rc = SSMR3GetUInt(pSSM, &cb1);
527 cb = cb1;
528 }
529 if (RT_FAILURE(rc))
530 return rc;
531 AssertLogRelMsgReturn(cb == pVM->mm.s.cbRamBase,
532 ("Memory configuration has changed. cbRamBase=%#RX64 save=%#RX64\n", pVM->mm.s.cbRamBase, cb),
533 VERR_SSM_LOAD_MEMORY_SIZE_MISMATCH);
534
535 /* (PGM restores the physical memory.) */
536 return rc;
537}
538
539
540/**
541 * Updates GMM with memory reservation changes.
542 *
543 * Called when MM::cbRamRegistered, MM::cShadowPages or MM::cFixedPages changes.
544 *
545 * @returns VBox status code - see GMMR0UpdateReservation.
546 * @param pVM The cross context VM structure.
547 */
548int mmR3UpdateReservation(PVM pVM)
549{
550 VM_ASSERT_EMT(pVM);
551 if (pVM->mm.s.fDoneMMR3InitPaging)
552 return GMMR3UpdateReservation(pVM,
553 RT_MAX(pVM->mm.s.cBasePages + pVM->mm.s.cHandyPages, 1),
554 RT_MAX(pVM->mm.s.cShadowPages, 1),
555 RT_MAX(pVM->mm.s.cFixedPages, 1));
556 return VINF_SUCCESS;
557}
558
559
560/**
561 * Interface for PGM to increase the reservation of RAM and ROM pages.
562 *
563 * This can be called before MMR3InitPaging.
564 *
565 * @returns VBox status code. Will set VM error on failure.
566 * @param pVM The cross context VM structure.
567 * @param cAddBasePages The number of pages to add.
568 */
569VMMR3DECL(int) MMR3IncreaseBaseReservation(PVM pVM, uint64_t cAddBasePages)
570{
571 uint64_t cOld = pVM->mm.s.cBasePages;
572 pVM->mm.s.cBasePages += cAddBasePages;
573 LogFlow(("MMR3IncreaseBaseReservation: +%RU64 (%RU64 -> %RU64)\n", cAddBasePages, cOld, pVM->mm.s.cBasePages));
574 int rc = mmR3UpdateReservation(pVM);
575 if (RT_FAILURE(rc))
576 {
577 VMSetError(pVM, rc, RT_SRC_POS, N_("Failed to reserved physical memory for the RAM (%#RX64 -> %#RX64 + %#RX32)"),
578 cOld, pVM->mm.s.cBasePages, pVM->mm.s.cHandyPages);
579 pVM->mm.s.cBasePages = cOld;
580 }
581 return rc;
582}
583
584
585/**
586 * Interface for PGM to make reservations for handy pages in addition to the
587 * base memory.
588 *
589 * This can be called before MMR3InitPaging.
590 *
591 * @returns VBox status code. Will set VM error on failure.
592 * @param pVM The cross context VM structure.
593 * @param cHandyPages The number of handy pages.
594 */
595VMMR3DECL(int) MMR3ReserveHandyPages(PVM pVM, uint32_t cHandyPages)
596{
597 AssertReturn(!pVM->mm.s.cHandyPages, VERR_WRONG_ORDER);
598
599 pVM->mm.s.cHandyPages = cHandyPages;
600 LogFlow(("MMR3ReserveHandyPages: %RU32 (base %RU64)\n", pVM->mm.s.cHandyPages, pVM->mm.s.cBasePages));
601 int rc = mmR3UpdateReservation(pVM);
602 if (RT_FAILURE(rc))
603 {
604 VMSetError(pVM, rc, RT_SRC_POS, N_("Failed to reserved physical memory for the RAM (%#RX64 + %#RX32)"),
605 pVM->mm.s.cBasePages, pVM->mm.s.cHandyPages);
606 pVM->mm.s.cHandyPages = 0;
607 }
608 return rc;
609}
610
611
612/**
613 * Interface for PGM to adjust the reservation of fixed pages.
614 *
615 * This can be called before MMR3InitPaging.
616 *
617 * @returns VBox status code. Will set VM error on failure.
618 * @param pVM The cross context VM structure.
619 * @param cDeltaFixedPages The number of guest pages to add (positive) or
620 * subtract (negative).
621 * @param pszDesc Some description associated with the reservation.
622 */
623VMMR3DECL(int) MMR3AdjustFixedReservation(PVM pVM, int32_t cDeltaFixedPages, const char *pszDesc)
624{
625 const uint32_t cOld = pVM->mm.s.cFixedPages;
626 pVM->mm.s.cFixedPages += cDeltaFixedPages;
627 LogFlow(("MMR3AdjustFixedReservation: %d (%u -> %u)\n", cDeltaFixedPages, cOld, pVM->mm.s.cFixedPages));
628 int rc = mmR3UpdateReservation(pVM);
629 if (RT_FAILURE(rc))
630 {
631 VMSetError(pVM, rc, RT_SRC_POS, N_("Failed to reserve physical memory (%#x -> %#x; %s)"),
632 cOld, pVM->mm.s.cFixedPages, pszDesc);
633 pVM->mm.s.cFixedPages = cOld;
634 }
635 return rc;
636}
637
638
639/**
640 * Interface for PGM to update the reservation of shadow pages.
641 *
642 * This can be called before MMR3InitPaging.
643 *
644 * @returns VBox status code. Will set VM error on failure.
645 * @param pVM The cross context VM structure.
646 * @param cShadowPages The new page count.
647 */
648VMMR3DECL(int) MMR3UpdateShadowReservation(PVM pVM, uint32_t cShadowPages)
649{
650 const uint32_t cOld = pVM->mm.s.cShadowPages;
651 pVM->mm.s.cShadowPages = cShadowPages;
652 LogFlow(("MMR3UpdateShadowReservation: %u -> %u\n", cOld, pVM->mm.s.cShadowPages));
653 int rc = mmR3UpdateReservation(pVM);
654 if (RT_FAILURE(rc))
655 {
656 VMSetError(pVM, rc, RT_SRC_POS, N_("Failed to reserve physical memory for shadow page tables (%#x -> %#x)"), cOld, pVM->mm.s.cShadowPages);
657 pVM->mm.s.cShadowPages = cOld;
658 }
659 return rc;
660}
661
662
663/**
664 * Get the size of the base RAM.
665 * This usually means the size of the first contiguous block of physical memory.
666 *
667 * @returns The guest base RAM size.
668 * @param pVM The cross context VM structure.
669 * @thread Any.
670 *
671 * @deprecated
672 */
673VMMR3DECL(uint64_t) MMR3PhysGetRamSize(PVM pVM)
674{
675 return pVM->mm.s.cbRamBase;
676}
677
678
679/**
680 * Get the size of RAM below 4GB (starts at address 0x00000000).
681 *
682 * @returns The amount of RAM below 4GB in bytes.
683 * @param pVM The cross context VM structure.
684 * @thread Any.
685 */
686VMMR3DECL(uint32_t) MMR3PhysGetRamSizeBelow4GB(PVM pVM)
687{
688 VM_ASSERT_VALID_EXT_RETURN(pVM, UINT32_MAX);
689 return pVM->mm.s.cbRamBelow4GB;
690}
691
692
693/**
694 * Get the size of RAM above 4GB (starts at address 0x000100000000).
695 *
696 * @returns The amount of RAM above 4GB in bytes.
697 * @param pVM The cross context VM structure.
698 * @thread Any.
699 */
700VMMR3DECL(uint64_t) MMR3PhysGetRamSizeAbove4GB(PVM pVM)
701{
702 VM_ASSERT_VALID_EXT_RETURN(pVM, UINT64_MAX);
703 return pVM->mm.s.cbRamAbove4GB;
704}
705
706
707/**
708 * Get the size of the RAM hole below 4GB.
709 *
710 * @returns Size in bytes.
711 * @param pVM The cross context VM structure.
712 * @thread Any.
713 */
714VMMR3DECL(uint32_t) MMR3PhysGet4GBRamHoleSize(PVM pVM)
715{
716 VM_ASSERT_VALID_EXT_RETURN(pVM, UINT32_MAX);
717 return pVM->mm.s.cbRamHole;
718}
719
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette