VirtualBox

source: vbox/trunk/src/VBox/VMM/include/HMInternal.h@ 55295

Last change on this file since 55295 was 55295, checked in by vboxsync, 10 years ago

VMM/HM: comment.

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
File size: 40.2 KB
Line 
1/* $Id: HMInternal.h 55295 2015-04-15 16:26:55Z vboxsync $ */
2/** @file
3 * HM - Internal header file.
4 */
5
6/*
7 * Copyright (C) 2006-2015 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17
18#ifndef ___HMInternal_h
19#define ___HMInternal_h
20
21#include <VBox/cdefs.h>
22#include <VBox/types.h>
23#include <VBox/vmm/em.h>
24#include <VBox/vmm/stam.h>
25#include <VBox/dis.h>
26#include <VBox/vmm/hm.h>
27#include <VBox/vmm/hm_vmx.h>
28#include <VBox/vmm/pgm.h>
29#include <VBox/vmm/cpum.h>
30#include <iprt/memobj.h>
31#include <iprt/cpuset.h>
32#include <iprt/mp.h>
33#include <iprt/avl.h>
34#include <iprt/string.h>
35
36#if HC_ARCH_BITS == 64 || defined(VBOX_WITH_HYBRID_32BIT_KERNEL) || defined (VBOX_WITH_64_BITS_GUESTS)
37/* Enable 64 bits guest support. */
38# define VBOX_ENABLE_64_BITS_GUESTS
39#endif
40
41#if HC_ARCH_BITS == 32 && defined(VBOX_ENABLE_64_BITS_GUESTS) && !defined(VBOX_WITH_HYBRID_32BIT_KERNEL)
42# define VMX_USE_CACHED_VMCS_ACCESSES
43#endif
44
45/** @def HM_PROFILE_EXIT_DISPATCH
46 * Enables profiling of the VM exit handler dispatching. */
47#if 0
48# define HM_PROFILE_EXIT_DISPATCH
49#endif
50
51RT_C_DECLS_BEGIN
52
53
54/** @defgroup grp_hm_int Internal
55 * @ingroup grp_hm
56 * @internal
57 * @{
58 */
59
60/** @def HMCPU_CF_CLEAR
61 * Clears a HM-context flag.
62 *
63 * @param pVCpu Pointer to the VMCPU.
64 * @param fFlag The flag to clear.
65 */
66#define HMCPU_CF_CLEAR(pVCpu, fFlag) (ASMAtomicUoAndU32(&(pVCpu)->hm.s.fContextUseFlags, ~(fFlag)))
67
68/** @def HMCPU_CF_SET
69 * Sets a HM-context flag.
70 *
71 * @param pVCpu Pointer to the VMCPU.
72 * @param fFlag The flag to set.
73 */
74#define HMCPU_CF_SET(pVCpu, fFlag) (ASMAtomicUoOrU32(&(pVCpu)->hm.s.fContextUseFlags, (fFlag)))
75
76/** @def HMCPU_CF_IS_SET
77 * Checks if all the flags in the specified HM-context set is pending.
78 *
79 * @param pVCpu Pointer to the VMCPU.
80 * @param fFlag The flag to check.
81 */
82#define HMCPU_CF_IS_SET(pVCpu, fFlag) ((ASMAtomicUoReadU32(&(pVCpu)->hm.s.fContextUseFlags) & (fFlag)) == (fFlag))
83
84/** @def HMCPU_CF_IS_PENDING
85 * Checks if one or more of the flags in the specified HM-context set is
86 * pending.
87 *
88 * @param pVCpu Pointer to the VMCPU.
89 * @param fFlags The flags to check for.
90 */
91#define HMCPU_CF_IS_PENDING(pVCpu, fFlags) RT_BOOL(ASMAtomicUoReadU32(&(pVCpu)->hm.s.fContextUseFlags) & (fFlags))
92
93/** @def HMCPU_CF_IS_PENDING_ONLY
94 * Checks if -only- one or more of the specified HM-context flags is pending.
95 *
96 * @param pVCpu Pointer to the VMCPU.
97 * @param fFlags The flags to check for.
98 */
99#define HMCPU_CF_IS_PENDING_ONLY(pVCpu, fFlags) !RT_BOOL(ASMAtomicUoReadU32(&(pVCpu)->hm.s.fContextUseFlags) & ~(fFlags))
100
101/** @def HMCPU_CF_IS_SET_ONLY
102 * Checks if -only- all the flags in the specified HM-context set is pending.
103 *
104 * @param pVCpu Pointer to the VMCPU.
105 * @param fFlags The flags to check for.
106 */
107#define HMCPU_CF_IS_SET_ONLY(pVCpu, fFlags) (ASMAtomicUoReadU32(&(pVCpu)->hm.s.fContextUseFlags) == (fFlags))
108
109/** @def HMCPU_CF_RESET_TO
110 * Resets the HM-context flags to the specified value.
111 *
112 * @param pVCpu Pointer to the VMCPU.
113 * @param fFlags The new value.
114 */
115#define HMCPU_CF_RESET_TO(pVCpu, fFlags) (ASMAtomicUoWriteU32(&(pVCpu)->hm.s.fContextUseFlags, (fFlags)))
116
117/** @def HMCPU_CF_VALUE
118 * Returns the current HM-context flags value.
119 *
120 * @param pVCpu Pointer to the VMCPU.
121 */
122#define HMCPU_CF_VALUE(pVCpu) (ASMAtomicUoReadU32(&(pVCpu)->hm.s.fContextUseFlags))
123
124
125/** Resets/initializes the VM-exit/#VMEXIT history array. */
126#define HMCPU_EXIT_HISTORY_RESET(pVCpu) (memset(&(pVCpu)->hm.s.auExitHistory, 0xff, sizeof((pVCpu)->hm.s.auExitHistory)))
127
128/** Updates the VM-exit/#VMEXIT history array. */
129#define HMCPU_EXIT_HISTORY_ADD(pVCpu, a_ExitReason) \
130 do { \
131 AssertMsg((pVCpu)->hm.s.idxExitHistoryFree < RT_ELEMENTS((pVCpu)->hm.s.auExitHistory), ("%u\n", (pVCpu)->hm.s.idxExitHistoryFree)); \
132 (pVCpu)->hm.s.auExitHistory[(pVCpu)->hm.s.idxExitHistoryFree++] = (uint16_t)(a_ExitReason); \
133 if ((pVCpu)->hm.s.idxExitHistoryFree == RT_ELEMENTS((pVCpu)->hm.s.auExitHistory)) \
134 (pVCpu)->hm.s.idxExitHistoryFree = 0; \
135 (pVCpu)->hm.s.auExitHistory[(pVCpu)->hm.s.idxExitHistoryFree] = UINT16_MAX; \
136 } while (0)
137
138/** Maximum number of exit reason statistics counters. */
139#define MAX_EXITREASON_STAT 0x100
140#define MASK_EXITREASON_STAT 0xff
141#define MASK_INJECT_IRQ_STAT 0xff
142
143/** @name HM changed flags.
144 * These flags are used to keep track of which important registers that
145 * have been changed since last they were reset.
146 * @{
147 */
148#define HM_CHANGED_GUEST_CR0 RT_BIT(0) /* Shared */
149#define HM_CHANGED_GUEST_CR3 RT_BIT(1)
150#define HM_CHANGED_GUEST_CR4 RT_BIT(2)
151#define HM_CHANGED_GUEST_GDTR RT_BIT(3)
152#define HM_CHANGED_GUEST_IDTR RT_BIT(4)
153#define HM_CHANGED_GUEST_LDTR RT_BIT(5)
154#define HM_CHANGED_GUEST_TR RT_BIT(6)
155#define HM_CHANGED_GUEST_SEGMENT_REGS RT_BIT(7)
156#define HM_CHANGED_GUEST_DEBUG RT_BIT(8) /* Shared */
157#define HM_CHANGED_GUEST_RIP RT_BIT(9)
158#define HM_CHANGED_GUEST_RSP RT_BIT(10)
159#define HM_CHANGED_GUEST_RFLAGS RT_BIT(11)
160#define HM_CHANGED_GUEST_CR2 RT_BIT(12)
161#define HM_CHANGED_GUEST_SYSENTER_CS_MSR RT_BIT(13)
162#define HM_CHANGED_GUEST_SYSENTER_EIP_MSR RT_BIT(14)
163#define HM_CHANGED_GUEST_SYSENTER_ESP_MSR RT_BIT(15)
164#define HM_CHANGED_GUEST_EFER_MSR RT_BIT(16)
165#define HM_CHANGED_GUEST_LAZY_MSRS RT_BIT(17) /* Shared */
166#define HM_CHANGED_GUEST_XCPT_INTERCEPTS RT_BIT(18)
167/* VT-x specific state. */
168#define HM_CHANGED_VMX_GUEST_AUTO_MSRS RT_BIT(19)
169#define HM_CHANGED_VMX_GUEST_ACTIVITY_STATE RT_BIT(20)
170#define HM_CHANGED_VMX_GUEST_APIC_STATE RT_BIT(21)
171#define HM_CHANGED_VMX_ENTRY_CTLS RT_BIT(22)
172#define HM_CHANGED_VMX_EXIT_CTLS RT_BIT(23)
173/* AMD-V specific state. */
174#define HM_CHANGED_SVM_GUEST_APIC_STATE RT_BIT(19)
175#define HM_CHANGED_SVM_RESERVED1 RT_BIT(20)
176#define HM_CHANGED_SVM_RESERVED2 RT_BIT(21)
177#define HM_CHANGED_SVM_RESERVED3 RT_BIT(22)
178#define HM_CHANGED_SVM_RESERVED4 RT_BIT(23)
179
180#define HM_CHANGED_ALL_GUEST ( HM_CHANGED_GUEST_CR0 \
181 | HM_CHANGED_GUEST_CR3 \
182 | HM_CHANGED_GUEST_CR4 \
183 | HM_CHANGED_GUEST_GDTR \
184 | HM_CHANGED_GUEST_IDTR \
185 | HM_CHANGED_GUEST_LDTR \
186 | HM_CHANGED_GUEST_TR \
187 | HM_CHANGED_GUEST_SEGMENT_REGS \
188 | HM_CHANGED_GUEST_DEBUG \
189 | HM_CHANGED_GUEST_RIP \
190 | HM_CHANGED_GUEST_RSP \
191 | HM_CHANGED_GUEST_RFLAGS \
192 | HM_CHANGED_GUEST_CR2 \
193 | HM_CHANGED_GUEST_SYSENTER_CS_MSR \
194 | HM_CHANGED_GUEST_SYSENTER_EIP_MSR \
195 | HM_CHANGED_GUEST_SYSENTER_ESP_MSR \
196 | HM_CHANGED_GUEST_EFER_MSR \
197 | HM_CHANGED_GUEST_LAZY_MSRS \
198 | HM_CHANGED_GUEST_XCPT_INTERCEPTS \
199 | HM_CHANGED_VMX_GUEST_AUTO_MSRS \
200 | HM_CHANGED_VMX_GUEST_ACTIVITY_STATE \
201 | HM_CHANGED_VMX_GUEST_APIC_STATE \
202 | HM_CHANGED_VMX_ENTRY_CTLS \
203 | HM_CHANGED_VMX_EXIT_CTLS)
204
205#define HM_CHANGED_HOST_CONTEXT RT_BIT(24)
206
207/* Bits shared between host and guest. */
208#define HM_CHANGED_HOST_GUEST_SHARED_STATE ( HM_CHANGED_GUEST_CR0 \
209 | HM_CHANGED_GUEST_DEBUG \
210 | HM_CHANGED_GUEST_LAZY_MSRS)
211/** @} */
212
213/** Maximum number of page flushes we are willing to remember before considering a full TLB flush. */
214#define HM_MAX_TLB_SHOOTDOWN_PAGES 8
215
216/** Size for the EPT identity page table (1024 4 MB pages to cover the entire address space). */
217#define HM_EPT_IDENTITY_PG_TABLE_SIZE PAGE_SIZE
218/** Size of the TSS structure + 2 pages for the IO bitmap + end byte. */
219#define HM_VTX_TSS_SIZE (sizeof(VBOXTSS) + 2 * PAGE_SIZE + 1)
220/** Total guest mapped memory needed. */
221#define HM_VTX_TOTAL_DEVHEAP_MEM (HM_EPT_IDENTITY_PG_TABLE_SIZE + HM_VTX_TSS_SIZE)
222
223/** Enable for TPR guest patching. */
224#define VBOX_HM_WITH_GUEST_PATCHING
225
226/** HM SSM version
227 */
228#ifdef VBOX_HM_WITH_GUEST_PATCHING
229# define HM_SAVED_STATE_VERSION 5
230# define HM_SAVED_STATE_VERSION_NO_PATCHING 4
231#else
232# define HM_SAVED_STATE_VERSION 4
233# define HM_SAVED_STATE_VERSION_NO_PATCHING 4
234#endif
235#define HM_SAVED_STATE_VERSION_2_0_X 3
236
237/**
238 * Global per-cpu information. (host)
239 */
240typedef struct HMGLOBALCPUINFO
241{
242 /** The CPU ID. */
243 RTCPUID idCpu;
244 /** The VM_HSAVE_AREA (AMD-V) / VMXON region (Intel) memory backing. */
245 RTR0MEMOBJ hMemObj;
246 /** Current ASID (AMD-V) / VPID (Intel). */
247 uint32_t uCurrentAsid;
248 /** TLB flush count. */
249 uint32_t cTlbFlushes;
250 /** Whether to flush each new ASID/VPID before use. */
251 bool fFlushAsidBeforeUse;
252 /** Configured for VT-x or AMD-V. */
253 bool fConfigured;
254 /** Set if the VBOX_HWVIRTEX_IGNORE_SVM_IN_USE hack is active. */
255 bool fIgnoreAMDVInUseError;
256 /** In use by our code. (for power suspend) */
257 volatile bool fInUse;
258} HMGLOBALCPUINFO;
259/** Pointer to the per-cpu global information. */
260typedef HMGLOBALCPUINFO *PHMGLOBALCPUINFO;
261
262typedef enum
263{
264 HMPENDINGIO_INVALID = 0,
265 HMPENDINGIO_PORT_READ,
266 HMPENDINGIO_PORT_WRITE,
267 HMPENDINGIO_STRING_READ,
268 HMPENDINGIO_STRING_WRITE,
269 /** The usual 32-bit paranoia. */
270 HMPENDINGIO_32BIT_HACK = 0x7fffffff
271} HMPENDINGIO;
272
273
274typedef enum
275{
276 HMTPRINSTR_INVALID,
277 HMTPRINSTR_READ,
278 HMTPRINSTR_READ_SHR4,
279 HMTPRINSTR_WRITE_REG,
280 HMTPRINSTR_WRITE_IMM,
281 HMTPRINSTR_JUMP_REPLACEMENT,
282 /** The usual 32-bit paranoia. */
283 HMTPRINSTR_32BIT_HACK = 0x7fffffff
284} HMTPRINSTR;
285
286typedef struct
287{
288 /** The key is the address of patched instruction. (32 bits GC ptr) */
289 AVLOU32NODECORE Core;
290 /** Original opcode. */
291 uint8_t aOpcode[16];
292 /** Instruction size. */
293 uint32_t cbOp;
294 /** Replacement opcode. */
295 uint8_t aNewOpcode[16];
296 /** Replacement instruction size. */
297 uint32_t cbNewOp;
298 /** Instruction type. */
299 HMTPRINSTR enmType;
300 /** Source operand. */
301 uint32_t uSrcOperand;
302 /** Destination operand. */
303 uint32_t uDstOperand;
304 /** Number of times the instruction caused a fault. */
305 uint32_t cFaults;
306 /** Patch address of the jump replacement. */
307 RTGCPTR32 pJumpTarget;
308} HMTPRPATCH;
309/** Pointer to HMTPRPATCH. */
310typedef HMTPRPATCH *PHMTPRPATCH;
311
312/**
313 * Switcher function, HC to the special 64-bit RC.
314 *
315 * @param pVM Pointer to the VM.
316 * @param offCpumVCpu Offset from pVM->cpum to pVM->aCpus[idCpu].cpum.
317 * @returns Return code indicating the action to take.
318 */
319typedef DECLCALLBACK(int) FNHMSWITCHERHC(PVM pVM, uint32_t offCpumVCpu);
320/** Pointer to switcher function. */
321typedef FNHMSWITCHERHC *PFNHMSWITCHERHC;
322
323/**
324 * HM VM Instance data.
325 * Changes to this must checked against the padding of the hm union in VM!
326 */
327typedef struct HM
328{
329 /** Set when we've initialized VMX or SVM. */
330 bool fInitialized;
331 /** Set if nested paging is enabled. */
332 bool fNestedPaging;
333 /** Set if nested paging is allowed. */
334 bool fAllowNestedPaging;
335 /** Set if large pages are enabled (requires nested paging). */
336 bool fLargePages;
337 /** Set if we can support 64-bit guests or not. */
338 bool fAllow64BitGuests;
339 /** Set if an IO-APIC is configured for this VM. */
340 bool fHasIoApic;
341 /** Set when TPR patching is allowed. */
342 bool fTprPatchingAllowed;
343 /** Set when we initialize VT-x or AMD-V once for all CPUs. */
344 bool fGlobalInit;
345 /** Set when TPR patching is active. */
346 bool fTPRPatchingActive;
347 bool u8Alignment[3];
348
349 /** Host kernel flags that HM might need to know (SUPKERNELFEATURES_XXX). */
350 uint32_t uHostKernelFeatures;
351
352 /** Maximum ASID allowed. */
353 uint32_t uMaxAsid;
354 /** The maximum number of resumes loops allowed in ring-0 (safety precaution).
355 * This number is set much higher when RTThreadPreemptIsPending is reliable. */
356 uint32_t cMaxResumeLoops;
357
358 /** Guest allocated memory for patching purposes. */
359 RTGCPTR pGuestPatchMem;
360 /** Current free pointer inside the patch block. */
361 RTGCPTR pFreeGuestPatchMem;
362 /** Size of the guest patch memory block. */
363 uint32_t cbGuestPatchMem;
364 uint32_t u32Alignment0;
365
366#if HC_ARCH_BITS == 32 && defined(VBOX_ENABLE_64_BITS_GUESTS) && !defined(VBOX_WITH_HYBRID_32BIT_KERNEL)
367 /** 32 to 64 bits switcher entrypoint. */
368 R0PTRTYPE(PFNHMSWITCHERHC) pfnHost32ToGuest64R0;
369 RTR0PTR pvR0Alignment0;
370#endif
371
372 struct
373 {
374 /** Set by the ring-0 side of HM to indicate VMX is supported by the
375 * CPU. */
376 bool fSupported;
377 /** Set when we've enabled VMX. */
378 bool fEnabled;
379 /** Set if VPID is supported. */
380 bool fVpid;
381 /** Set if VT-x VPID is allowed. */
382 bool fAllowVpid;
383 /** Set if unrestricted guest execution is in use (real and protected mode without paging). */
384 bool fUnrestrictedGuest;
385 /** Set if unrestricted guest execution is allowed to be used. */
386 bool fAllowUnrestricted;
387 /** Whether we're using the preemption timer or not. */
388 bool fUsePreemptTimer;
389 /** The shift mask employed by the VMX-Preemption timer. */
390 uint8_t cPreemptTimerShift;
391
392 /** Virtual address of the TSS page used for real mode emulation. */
393 R3PTRTYPE(PVBOXTSS) pRealModeTSS;
394 /** Virtual address of the identity page table used for real mode and protected mode without paging emulation in EPT mode. */
395 R3PTRTYPE(PX86PD) pNonPagingModeEPTPageTable;
396
397 /** Physical address of the APIC-access page. */
398 RTHCPHYS HCPhysApicAccess;
399 /** R0 memory object for the APIC-access page. */
400 RTR0MEMOBJ hMemObjApicAccess;
401 /** Virtual address of the APIC-access page. */
402 R0PTRTYPE(uint8_t *) pbApicAccess;
403
404#ifdef VBOX_WITH_CRASHDUMP_MAGIC
405 RTHCPHYS HCPhysScratch;
406 RTR0MEMOBJ hMemObjScratch;
407 R0PTRTYPE(uint8_t *) pbScratch;
408#endif
409
410 /** Internal Id of which flush-handler to use for tagged-TLB entries. */
411 uint32_t uFlushTaggedTlb;
412 uint32_t u32Alignment0;
413 /** Host CR4 value (set by ring-0 VMX init) */
414 uint64_t u64HostCr4;
415
416 /** Host EFER value (set by ring-0 VMX init) */
417 uint64_t u64HostEfer;
418 /** Whether the CPU supports VMCS fields for swapping EFER. */
419 bool fSupportsVmcsEfer;
420 uint8_t u8Alignment2[7];
421
422 /** VMX MSR values */
423 VMXMSRS Msrs;
424
425 /** Flush types for invept & invvpid; they depend on capabilities. */
426 VMXFLUSHEPT enmFlushEpt;
427 VMXFLUSHVPID enmFlushVpid;
428 } vmx;
429
430 struct
431 {
432 /** Set by the ring-0 side of HM to indicate SVM is supported by the
433 * CPU. */
434 bool fSupported;
435 /** Set when we've enabled SVM. */
436 bool fEnabled;
437 /** Set if erratum 170 affects the AMD cpu. */
438 bool fAlwaysFlushTLB;
439 /** Set when the hack to ignore VERR_SVM_IN_USE is active. */
440 bool fIgnoreInUseError;
441 uint8_t u8Alignment0[4];
442
443 /** Physical address of the IO bitmap (12kb). */
444 RTHCPHYS HCPhysIOBitmap;
445 /** R0 memory object for the IO bitmap (12kb). */
446 RTR0MEMOBJ hMemObjIOBitmap;
447 /** Virtual address of the IO bitmap. */
448 R0PTRTYPE(void *) pvIOBitmap;
449
450 /* HWCR MSR (for diagnostics) */
451 uint64_t u64MsrHwcr;
452
453 /** SVM revision. */
454 uint32_t u32Rev;
455 /** SVM feature bits from cpuid 0x8000000a */
456 uint32_t u32Features;
457 } svm;
458
459 /**
460 * AVL tree with all patches (active or disabled) sorted by guest instruction
461 * address.
462 */
463 AVLOU32TREE PatchTree;
464 uint32_t cPatches;
465 HMTPRPATCH aPatches[64];
466
467 struct
468 {
469 uint32_t u32AMDFeatureECX;
470 uint32_t u32AMDFeatureEDX;
471 } cpuid;
472
473 /** Saved error from detection */
474 int32_t lLastError;
475
476 /** HMR0Init was run */
477 bool fHMR0Init;
478 bool u8Alignment1[7];
479
480 STAMCOUNTER StatTprPatchSuccess;
481 STAMCOUNTER StatTprPatchFailure;
482 STAMCOUNTER StatTprReplaceSuccess;
483 STAMCOUNTER StatTprReplaceFailure;
484} HM;
485/** Pointer to HM VM instance data. */
486typedef HM *PHM;
487
488/* Maximum number of cached entries. */
489#define VMCSCACHE_MAX_ENTRY 128
490
491/**
492 * Structure for storing read and write VMCS actions.
493 */
494typedef struct VMCSCACHE
495{
496#ifdef VBOX_WITH_CRASHDUMP_MAGIC
497 /* Magic marker for searching in crash dumps. */
498 uint8_t aMagic[16];
499 uint64_t uMagic;
500 uint64_t u64TimeEntry;
501 uint64_t u64TimeSwitch;
502 uint64_t cResume;
503 uint64_t interPD;
504 uint64_t pSwitcher;
505 uint32_t uPos;
506 uint32_t idCpu;
507#endif
508 /* CR2 is saved here for EPT syncing. */
509 uint64_t cr2;
510 struct
511 {
512 uint32_t cValidEntries;
513 uint32_t uAlignment;
514 uint32_t aField[VMCSCACHE_MAX_ENTRY];
515 uint64_t aFieldVal[VMCSCACHE_MAX_ENTRY];
516 } Write;
517 struct
518 {
519 uint32_t cValidEntries;
520 uint32_t uAlignment;
521 uint32_t aField[VMCSCACHE_MAX_ENTRY];
522 uint64_t aFieldVal[VMCSCACHE_MAX_ENTRY];
523 } Read;
524#ifdef VBOX_STRICT
525 struct
526 {
527 RTHCPHYS HCPhysCpuPage;
528 RTHCPHYS HCPhysVmcs;
529 RTGCPTR pCache;
530 RTGCPTR pCtx;
531 } TestIn;
532 struct
533 {
534 RTHCPHYS HCPhysVmcs;
535 RTGCPTR pCache;
536 RTGCPTR pCtx;
537 uint64_t eflags;
538 uint64_t cr8;
539 } TestOut;
540 struct
541 {
542 uint64_t param1;
543 uint64_t param2;
544 uint64_t param3;
545 uint64_t param4;
546 } ScratchPad;
547#endif
548} VMCSCACHE;
549/** Pointer to VMCSCACHE. */
550typedef VMCSCACHE *PVMCSCACHE;
551AssertCompileSizeAlignment(VMCSCACHE, 8);
552
553/** VMX StartVM function. */
554typedef DECLCALLBACK(int) FNHMVMXSTARTVM(RTHCUINT fResume, PCPUMCTX pCtx, PVMCSCACHE pCache, PVM pVM, PVMCPU pVCpu);
555/** Pointer to a VMX StartVM function. */
556typedef R0PTRTYPE(FNHMVMXSTARTVM *) PFNHMVMXSTARTVM;
557
558/** SVM VMRun function. */
559typedef DECLCALLBACK(int) FNHMSVMVMRUN(RTHCPHYS pVmcbHostPhys, RTHCPHYS pVmcbPhys, PCPUMCTX pCtx, PVM pVM, PVMCPU pVCpu);
560/** Pointer to a SVM VMRun function. */
561typedef R0PTRTYPE(FNHMSVMVMRUN *) PFNHMSVMVMRUN;
562
563/**
564 * HM VMCPU Instance data.
565 *
566 * Note! If you change members of this struct, make sure to check if the
567 * assembly counterpart in HMInternal.mac needs to be updated as well.
568 */
569typedef struct HMCPU
570{
571 /** Set if we need to flush the TLB during the world switch. */
572 bool fForceTLBFlush;
573 /** Set when we're using VT-x or AMD-V at that moment. */
574 bool fActive;
575 /** Set when the TLB has been checked until we return from the world switch. */
576 volatile bool fCheckedTLBFlush;
577 /** Whether we're executing a single instruction. */
578 bool fSingleInstruction;
579 /** Set if we need to clear the trap flag because of single stepping. */
580 bool fClearTrapFlag;
581 /** Whether we've completed the inner HM leave function. */
582 bool fLeaveDone;
583 /** Whether we're using the hyper DR7 or guest DR7. */
584 bool fUsingHyperDR7;
585 /** Whether to preload the guest-FPU state to avoid #NM VM-exit overhead. */
586 bool fPreloadGuestFpu;
587 /** Set if XCR0 needs to be loaded and saved when entering and exiting guest
588 * code execution. */
589 bool fLoadSaveGuestXcr0;
590
591 /** Whether #UD needs to be intercepted (required by certain GIM providers). */
592 bool fGIMTrapXcptUD;
593 /** Whether paravirt. hypercalls are enabled. */
594 bool fHypercallsEnabled;
595 uint8_t u8Alignment0[5];
596
597 /** World switch exit counter. */
598 volatile uint32_t cWorldSwitchExits;
599 /** HM_CHANGED_* flags. */
600 volatile uint32_t fContextUseFlags;
601 /** Id of the last cpu we were executing code on (NIL_RTCPUID for the first
602 * time). */
603 RTCPUID idLastCpu;
604 /** TLB flush count. */
605 uint32_t cTlbFlushes;
606 /** Current ASID in use by the VM. */
607 uint32_t uCurrentAsid;
608 /** An additional error code used for some gurus. */
609 uint32_t u32HMError;
610 /** Host's TSC_AUX MSR (used when RDTSCP doesn't cause VM-exits). */
611 uint64_t u64HostTscAux;
612
613 struct
614 {
615 /** Ring 0 handlers for VT-x. */
616 PFNHMVMXSTARTVM pfnStartVM;
617#if HC_ARCH_BITS == 32
618 uint32_t u32Alignment0;
619#endif
620 /** Current VMX_VMCS32_CTRL_PIN_EXEC. */
621 uint32_t u32PinCtls;
622 /** Current VMX_VMCS32_CTRL_PROC_EXEC. */
623 uint32_t u32ProcCtls;
624 /** Current VMX_VMCS32_CTRL_PROC_EXEC2. */
625 uint32_t u32ProcCtls2;
626 /** Current VMX_VMCS32_CTRL_EXIT. */
627 uint32_t u32ExitCtls;
628 /** Current VMX_VMCS32_CTRL_ENTRY. */
629 uint32_t u32EntryCtls;
630
631 /** Current CR0 mask. */
632 uint32_t u32CR0Mask;
633 /** Current CR4 mask. */
634 uint32_t u32CR4Mask;
635 /** Current exception bitmap. */
636 uint32_t u32XcptBitmap;
637 /** The updated-guest-state mask. */
638 volatile uint32_t fUpdatedGuestState;
639 uint32_t u32Alignment1;
640
641 /** Physical address of the VM control structure (VMCS). */
642 RTHCPHYS HCPhysVmcs;
643 /** R0 memory object for the VM control structure (VMCS). */
644 RTR0MEMOBJ hMemObjVmcs;
645 /** Virtual address of the VM control structure (VMCS). */
646 R0PTRTYPE(void *) pvVmcs;
647
648 /** Physical address of the virtual APIC page for TPR caching. */
649 RTHCPHYS HCPhysVirtApic;
650 /** R0 memory object for the virtual APIC page for TPR caching. */
651 RTR0MEMOBJ hMemObjVirtApic;
652 /** Virtual address of the virtual APIC page for TPR caching. */
653 R0PTRTYPE(uint8_t *) pbVirtApic;
654
655 /** Physical address of the MSR bitmap. */
656 RTHCPHYS HCPhysMsrBitmap;
657 /** R0 memory object for the MSR bitmap. */
658 RTR0MEMOBJ hMemObjMsrBitmap;
659 /** Virtual address of the MSR bitmap. */
660 R0PTRTYPE(void *) pvMsrBitmap;
661
662 /** Physical address of the VM-entry MSR-load and VM-exit MSR-store area (used
663 * for guest MSRs). */
664 RTHCPHYS HCPhysGuestMsr;
665 /** R0 memory object of the VM-entry MSR-load and VM-exit MSR-store area
666 * (used for guest MSRs). */
667 RTR0MEMOBJ hMemObjGuestMsr;
668 /** Virtual address of the VM-entry MSR-load and VM-exit MSR-store area (used
669 * for guest MSRs). */
670 R0PTRTYPE(void *) pvGuestMsr;
671
672 /** Physical address of the VM-exit MSR-load area (used for host MSRs). */
673 RTHCPHYS HCPhysHostMsr;
674 /** R0 memory object for the VM-exit MSR-load area (used for host MSRs). */
675 RTR0MEMOBJ hMemObjHostMsr;
676 /** Virtual address of the VM-exit MSR-load area (used for host MSRs). */
677 R0PTRTYPE(void *) pvHostMsr;
678
679 /** Current EPTP. */
680 RTHCPHYS HCPhysEPTP;
681
682 /** Number of guest/host MSR pairs in the auto-load/store area. */
683 uint32_t cMsrs;
684 /** Whether the host MSR values are up-to-date in the auto-load/store area. */
685 bool fUpdatedHostMsrs;
686 uint8_t u8Alignment0[3];
687
688 /** Host LSTAR MSR value to restore lazily while leaving VT-x. */
689 uint64_t u64HostLStarMsr;
690 /** Host STAR MSR value to restore lazily while leaving VT-x. */
691 uint64_t u64HostStarMsr;
692 /** Host SF_MASK MSR value to restore lazily while leaving VT-x. */
693 uint64_t u64HostSFMaskMsr;
694 /** Host KernelGS-Base MSR value to restore lazily while leaving VT-x. */
695 uint64_t u64HostKernelGSBaseMsr;
696 /** A mask of which MSRs have been swapped and need restoration. */
697 uint32_t fLazyMsrs;
698 uint32_t u32Alignment2;
699
700 /** The cached APIC-base MSR used for identifying when to map the HC physical APIC-access page. */
701 uint64_t u64MsrApicBase;
702 /** Last use TSC offset value. (cached) */
703 uint64_t u64TSCOffset;
704
705 /** VMCS cache. */
706 VMCSCACHE VMCSCache;
707
708 /** Real-mode emulation state. */
709 struct
710 {
711 X86DESCATTR AttrCS;
712 X86DESCATTR AttrDS;
713 X86DESCATTR AttrES;
714 X86DESCATTR AttrFS;
715 X86DESCATTR AttrGS;
716 X86DESCATTR AttrSS;
717 X86EFLAGS Eflags;
718 uint32_t fRealOnV86Active;
719 } RealMode;
720
721 /** VT-x error-reporting (mainly for ring-3 propagation). */
722 struct
723 {
724 uint64_t u64VMCSPhys;
725 uint32_t u32VMCSRevision;
726 uint32_t u32InstrError;
727 uint32_t u32ExitReason;
728 RTCPUID idEnteredCpu;
729 RTCPUID idCurrentCpu;
730 uint32_t u32Alignment0;
731 } LastError;
732
733 /** Current state of the VMCS. */
734 uint32_t uVmcsState;
735 /** Which host-state bits to restore before being preempted. */
736 uint32_t fRestoreHostFlags;
737 /** The host-state restoration structure. */
738 VMXRESTOREHOST RestoreHost;
739
740 /** Set if guest was executing in real mode (extra checks). */
741 bool fWasInRealMode;
742 uint8_t u8Alignment1[7];
743 } vmx;
744
745 struct
746 {
747 /** Ring 0 handlers for VT-x. */
748 PFNHMSVMVMRUN pfnVMRun;
749#if HC_ARCH_BITS == 32
750 uint32_t u32Alignment0;
751#endif
752
753 /** Physical address of the host VMCB which holds additional host-state. */
754 RTHCPHYS HCPhysVmcbHost;
755 /** R0 memory object for the host VMCB which holds additional host-state. */
756 RTR0MEMOBJ hMemObjVmcbHost;
757 /** Virtual address of the host VMCB which holds additional host-state. */
758 R0PTRTYPE(void *) pvVmcbHost;
759
760 /** Physical address of the guest VMCB. */
761 RTHCPHYS HCPhysVmcb;
762 /** R0 memory object for the guest VMCB. */
763 RTR0MEMOBJ hMemObjVmcb;
764 /** Virtual address of the guest VMCB. */
765 R0PTRTYPE(void *) pvVmcb;
766
767 /** Physical address of the MSR bitmap (8 KB). */
768 RTHCPHYS HCPhysMsrBitmap;
769 /** R0 memory object for the MSR bitmap (8 KB). */
770 RTR0MEMOBJ hMemObjMsrBitmap;
771 /** Virtual address of the MSR bitmap. */
772 R0PTRTYPE(void *) pvMsrBitmap;
773
774 /** Whether VTPR with V_INTR_MASKING set is in effect, indicating
775 * we should check if the VTPR changed on every VM-exit. */
776 bool fSyncVTpr;
777 uint8_t u8Alignment0[7];
778 } svm;
779
780 /** Event injection state. */
781 struct
782 {
783 uint32_t fPending;
784 uint32_t u32ErrCode;
785 uint32_t cbInstr;
786 uint32_t u32Padding; /**< Explicit alignment padding. */
787 uint64_t u64IntInfo;
788 RTGCUINTPTR GCPtrFaultAddress;
789 } Event;
790
791 /** IO Block emulation state. */
792 struct
793 {
794 bool fEnabled;
795 uint8_t u8Align[7];
796
797 /** RIP at the start of the io code we wish to emulate in the recompiler. */
798 RTGCPTR GCPtrFunctionEip;
799
800 uint64_t cr0;
801 } EmulateIoBlock;
802
803 struct
804 {
805 /** Pending IO operation type. */
806 HMPENDINGIO enmType;
807 uint32_t u32Alignment0;
808 RTGCPTR GCPtrRip;
809 RTGCPTR GCPtrRipNext;
810 union
811 {
812 struct
813 {
814 uint32_t uPort;
815 uint32_t uAndVal;
816 uint32_t cbSize;
817 } Port;
818 uint64_t aRaw[2];
819 } s;
820 } PendingIO;
821
822 /** The PAE PDPEs used with Nested Paging (only valid when
823 * VMCPU_FF_HM_UPDATE_PAE_PDPES is set). */
824 X86PDPE aPdpes[4];
825
826 /** Current shadow paging mode. */
827 PGMMODE enmShadowMode;
828
829 /** The CPU ID of the CPU currently owning the VMCS. Set in
830 * HMR0Enter and cleared in HMR0Leave. */
831 RTCPUID idEnteredCpu;
832
833 /** To keep track of pending TLB shootdown pages. (SMP guest only) */
834 struct
835 {
836 RTGCPTR aPages[HM_MAX_TLB_SHOOTDOWN_PAGES];
837 uint32_t cPages;
838 uint32_t u32Alignment0; /**< Explicit alignment padding. */
839 } TlbShootdown;
840
841 /** VT-x/AMD-V VM-exit/#VMXEXIT history, circular array. */
842 uint16_t auExitHistory[31];
843 /** The index of the next free slot in the history array. */
844 uint16_t idxExitHistoryFree;
845
846 /** For saving stack space, the disassembler state is allocated here instead of
847 * on the stack. */
848 DISCPUSTATE DisState;
849
850 STAMPROFILEADV StatEntry;
851 STAMPROFILEADV StatExit1;
852 STAMPROFILEADV StatExit2;
853 STAMPROFILEADV StatExitIO;
854 STAMPROFILEADV StatExitMovCRx;
855 STAMPROFILEADV StatExitXcptNmi;
856 STAMPROFILEADV StatLoadGuestState;
857 STAMPROFILEADV StatInGC;
858
859#if HC_ARCH_BITS == 32 && defined(VBOX_ENABLE_64_BITS_GUESTS) && !defined(VBOX_WITH_HYBRID_32BIT_KERNEL)
860 STAMPROFILEADV StatWorldSwitch3264;
861#endif
862 STAMPROFILEADV StatPoke;
863 STAMPROFILEADV StatSpinPoke;
864 STAMPROFILEADV StatSpinPokeFailed;
865
866 STAMCOUNTER StatInjectInterrupt;
867 STAMCOUNTER StatInjectXcpt;
868 STAMCOUNTER StatInjectPendingReflect;
869
870 STAMCOUNTER StatExitAll;
871 STAMCOUNTER StatExitShadowNM;
872 STAMCOUNTER StatExitGuestNM;
873 STAMCOUNTER StatExitShadowPF; /* Misleading, currently used for MMIO #PFs as well. */
874 STAMCOUNTER StatExitShadowPFEM;
875 STAMCOUNTER StatExitGuestPF;
876 STAMCOUNTER StatExitGuestUD;
877 STAMCOUNTER StatExitGuestSS;
878 STAMCOUNTER StatExitGuestNP;
879 STAMCOUNTER StatExitGuestTS;
880 STAMCOUNTER StatExitGuestGP;
881 STAMCOUNTER StatExitGuestDE;
882 STAMCOUNTER StatExitGuestDB;
883 STAMCOUNTER StatExitGuestMF;
884 STAMCOUNTER StatExitGuestBP;
885 STAMCOUNTER StatExitGuestXF;
886 STAMCOUNTER StatExitGuestXcpUnk;
887 STAMCOUNTER StatExitInvlpg;
888 STAMCOUNTER StatExitInvd;
889 STAMCOUNTER StatExitWbinvd;
890 STAMCOUNTER StatExitPause;
891 STAMCOUNTER StatExitCpuid;
892 STAMCOUNTER StatExitRdtsc;
893 STAMCOUNTER StatExitRdtscp;
894 STAMCOUNTER StatExitRdpmc;
895 STAMCOUNTER StatExitVmcall;
896 STAMCOUNTER StatExitRdrand;
897 STAMCOUNTER StatExitCli;
898 STAMCOUNTER StatExitSti;
899 STAMCOUNTER StatExitPushf;
900 STAMCOUNTER StatExitPopf;
901 STAMCOUNTER StatExitIret;
902 STAMCOUNTER StatExitInt;
903 STAMCOUNTER StatExitCRxWrite[16];
904 STAMCOUNTER StatExitCRxRead[16];
905 STAMCOUNTER StatExitDRxWrite;
906 STAMCOUNTER StatExitDRxRead;
907 STAMCOUNTER StatExitRdmsr;
908 STAMCOUNTER StatExitWrmsr;
909 STAMCOUNTER StatExitClts;
910 STAMCOUNTER StatExitXdtrAccess;
911 STAMCOUNTER StatExitHlt;
912 STAMCOUNTER StatExitMwait;
913 STAMCOUNTER StatExitMonitor;
914 STAMCOUNTER StatExitLmsw;
915 STAMCOUNTER StatExitIOWrite;
916 STAMCOUNTER StatExitIORead;
917 STAMCOUNTER StatExitIOStringWrite;
918 STAMCOUNTER StatExitIOStringRead;
919 STAMCOUNTER StatExitIntWindow;
920 STAMCOUNTER StatExitExtInt;
921 STAMCOUNTER StatExitHostNmiInGC;
922 STAMCOUNTER StatExitPreemptTimer;
923 STAMCOUNTER StatExitTprBelowThreshold;
924 STAMCOUNTER StatExitTaskSwitch;
925 STAMCOUNTER StatExitMtf;
926 STAMCOUNTER StatExitApicAccess;
927 STAMCOUNTER StatPendingHostIrq;
928
929 STAMCOUNTER StatPreemptPreempting;
930 STAMCOUNTER StatPreemptSaveHostState;
931
932 STAMCOUNTER StatFlushPage;
933 STAMCOUNTER StatFlushPageManual;
934 STAMCOUNTER StatFlushPhysPageManual;
935 STAMCOUNTER StatFlushTlb;
936 STAMCOUNTER StatFlushTlbManual;
937 STAMCOUNTER StatFlushTlbWorldSwitch;
938 STAMCOUNTER StatNoFlushTlbWorldSwitch;
939 STAMCOUNTER StatFlushEntire;
940 STAMCOUNTER StatFlushAsid;
941 STAMCOUNTER StatFlushNestedPaging;
942 STAMCOUNTER StatFlushTlbInvlpgVirt;
943 STAMCOUNTER StatFlushTlbInvlpgPhys;
944 STAMCOUNTER StatTlbShootdown;
945 STAMCOUNTER StatTlbShootdownFlush;
946
947 STAMCOUNTER StatSwitchGuestIrq;
948 STAMCOUNTER StatSwitchHmToR3FF;
949 STAMCOUNTER StatSwitchExitToR3;
950 STAMCOUNTER StatSwitchLongJmpToR3;
951 STAMCOUNTER StatSwitchMaxResumeLoops;
952 STAMCOUNTER StatSwitchHltToR3;
953 STAMCOUNTER StatSwitchApicAccessToR3;
954
955 STAMCOUNTER StatTscParavirt;
956 STAMCOUNTER StatTscOffset;
957 STAMCOUNTER StatTscIntercept;
958
959 STAMCOUNTER StatExitReasonNpf;
960 STAMCOUNTER StatDRxArmed;
961 STAMCOUNTER StatDRxContextSwitch;
962 STAMCOUNTER StatDRxIoCheck;
963
964 STAMCOUNTER StatLoadMinimal;
965 STAMCOUNTER StatLoadFull;
966
967 STAMCOUNTER StatVmxCheckBadRmSelBase;
968 STAMCOUNTER StatVmxCheckBadRmSelLimit;
969 STAMCOUNTER StatVmxCheckRmOk;
970
971 STAMCOUNTER StatVmxCheckBadSel;
972 STAMCOUNTER StatVmxCheckBadRpl;
973 STAMCOUNTER StatVmxCheckBadLdt;
974 STAMCOUNTER StatVmxCheckBadTr;
975 STAMCOUNTER StatVmxCheckPmOk;
976
977#if HC_ARCH_BITS == 32 && defined(VBOX_ENABLE_64_BITS_GUESTS) && !defined(VBOX_WITH_HYBRID_32BIT_KERNEL)
978 STAMCOUNTER StatFpu64SwitchBack;
979 STAMCOUNTER StatDebug64SwitchBack;
980#endif
981
982#ifdef VBOX_WITH_STATISTICS
983 R3PTRTYPE(PSTAMCOUNTER) paStatExitReason;
984 R0PTRTYPE(PSTAMCOUNTER) paStatExitReasonR0;
985 R3PTRTYPE(PSTAMCOUNTER) paStatInjectedIrqs;
986 R0PTRTYPE(PSTAMCOUNTER) paStatInjectedIrqsR0;
987#endif
988#ifdef HM_PROFILE_EXIT_DISPATCH
989 STAMPROFILEADV StatExitDispatch;
990#endif
991} HMCPU;
992/** Pointer to HM VMCPU instance data. */
993typedef HMCPU *PHMCPU;
994AssertCompileMemberAlignment(HMCPU, vmx, 8);
995AssertCompileMemberAlignment(HMCPU, svm, 8);
996AssertCompileMemberAlignment(HMCPU, Event, 8);
997
998
999#ifdef IN_RING0
1000VMMR0DECL(PHMGLOBALCPUINFO) HMR0GetCurrentCpu(void);
1001VMMR0DECL(PHMGLOBALCPUINFO) HMR0GetCurrentCpuEx(RTCPUID idCpu);
1002
1003
1004# ifdef VBOX_STRICT
1005VMMR0DECL(void) HMDumpRegs(PVM pVM, PVMCPU pVCpu, PCPUMCTX pCtx);
1006VMMR0DECL(void) HMR0DumpDescriptor(PCX86DESCHC pDesc, RTSEL Sel, const char *pszMsg);
1007# else
1008# define HMDumpRegs(a, b ,c) do { } while (0)
1009# define HMR0DumpDescriptor(a, b, c) do { } while (0)
1010# endif /* VBOX_STRICT */
1011
1012# ifdef VBOX_WITH_KERNEL_USING_XMM
1013DECLASM(int) HMR0VMXStartVMWrapXMM(RTHCUINT fResume, PCPUMCTX pCtx, PVMCSCACHE pCache, PVM pVM, PVMCPU pVCpu, PFNHMVMXSTARTVM pfnStartVM);
1014DECLASM(int) HMR0SVMRunWrapXMM(RTHCPHYS pVmcbHostPhys, RTHCPHYS pVmcbPhys, PCPUMCTX pCtx, PVM pVM, PVMCPU pVCpu, PFNHMSVMVMRUN pfnVMRun);
1015# endif
1016
1017# ifdef VBOX_WITH_HYBRID_32BIT_KERNEL
1018/**
1019 * Gets 64-bit GDTR and IDTR on darwin.
1020 * @param pGdtr Where to store the 64-bit GDTR.
1021 * @param pIdtr Where to store the 64-bit IDTR.
1022 */
1023DECLASM(void) HMR0Get64bitGdtrAndIdtr(PX86XDTR64 pGdtr, PX86XDTR64 pIdtr);
1024
1025/**
1026 * Gets 64-bit CR3 on darwin.
1027 * @returns CR3
1028 */
1029DECLASM(uint64_t) HMR0Get64bitCR3(void);
1030# endif /* VBOX_WITH_HYBRID_32BIT_KERNEL */
1031
1032#endif /* IN_RING0 */
1033
1034/** @} */
1035
1036RT_C_DECLS_END
1037
1038#endif
1039
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette