- Timestamp:
- Oct 8, 2015 2:51:53 PM (9 years ago)
- Location:
- trunk
- Files:
-
- 45 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/Doxyfile.Core
r58106 r58116 484 484 DECLVBGL(type)=type \ 485 485 DECLR0VBGL(type)=type \ 486 USBLIB_DECL(type)=type 486 USBLIB_DECL(type)=type \ 487 VMMR0_INT_DECL(type)=type \ 488 VMMR3_INT_DECL(type)=type \ 489 VMMRC_INT_DECL(type)=type \ 490 VMMRZ_INT_DECL(type)=type 491 492 # templated fun. 493 PREDEFINED += \ 494 "PGM_BTH_DECL(type,name)=type pgmBth##name" \ 495 "PGM_SHW_DECL(type,name)=type pgmShw##name" \ 496 "PGM_GST_DECL(type,name)=type pgmGst##name" \ 497 "PGM_BTH_NAME(name)=pgmBth##name" \ 498 "PGM_SHW_NAME(name)=pgmShw##name" \ 499 "PGM_GST_NAME(name)=pgmGst##name" \ 500 PGM_ALL_CB_DECL(type)=type \ 501 PGM_ALL_CB2_DECL(type)=type \ 487 502 488 503 # context hacks. -
trunk/include/VBox/VBoxGuest.h
r58111 r58116 44 44 45 45 /** @defgroup grp_vboxguest_ioc VirtualBox Guest Additions Driver Interface 46 * @addtogroup grp_vboxguest47 46 * @{ 48 47 */ -
trunk/include/VBox/vmm/pdmdev.h
r58106 r58116 64 64 * expected to be in high demand in the constructor and is 65 65 * therefore passed as an argument. When using it at other 66 * times, it can be found in pD rvIns->pCfg.66 * times, it can be found in pDevIns->pCfg. 67 67 */ 68 68 typedef DECLCALLBACK(int) FNPDMDEVCONSTRUCT(PPDMDEVINS pDevIns, int iInstance, PCFGMNODE pCfg); … … 1499 1499 * @param pDevIns The APIC device instance. 1500 1500 * @param idCpu Virtual CPU to perform SIPI on 1501 * @param iVector SIPI vector1501 * @param uVector SIPI vector 1502 1502 */ 1503 1503 DECLR3CALLBACKMEMBER(void, pfnSendSipi,(PPDMDEVINS pDevIns, VMCPUID idCpu, uint32_t uVector)); … … 1914 1914 * @returns rc if we failed to set legacy mode. 1915 1915 * @param pDevIns Device instance of the HPET. 1916 * @param fActivate Activate or deactivate legacy mode. 1916 * @param iIrq IRQ number to set. 1917 * @param iLevel IRQ level. See the PDM_IRQ_LEVEL_* \#defines. 1917 1918 */ 1918 1919 DECLR3CALLBACKMEMBER(int, pfnSetIrq,(PPDMDEVINS pDevIns, int iIrq, int iLevel)); … … 3773 3774 * 3774 3775 * @returns rc. 3775 * @param pD rvIns Driver instance.3776 * @param pDevIns Driver instance. 3776 3777 * @param rc VBox status code. 3777 3778 * @param SRC_POS Use RT_SRC_POS. … … 3786 3787 * 3787 3788 * @returns rc. 3788 * @param pD rvIns Driver instance.3789 * @param pDevIns Driver instance. 3789 3790 * @param rc VBox status code. 3790 3791 * @param SRC_POS Use RT_SRC_POS. … … 4002 4003 * 4003 4004 * @returns rc. 4004 * @param pD rvIns Driver instance.4005 * @param pDevIns Driver instance. 4005 4006 * @param rc VBox status code. 4006 4007 * @param SRC_POS Use RT_SRC_POS. … … 4015 4016 * 4016 4017 * @returns rc. 4017 * @param pD rvIns Driver instance.4018 * @param pDevIns Driver instance. 4018 4019 * @param rc VBox status code. 4019 4020 * @param SRC_POS Use RT_SRC_POS. -
trunk/src/VBox/VMM/VMMAll/CPUMAllMsrs.cpp
r57558 r58116 363 363 364 364 365 /** @callback_method_impl{FNCPUM WRMSR} */365 /** @callback_method_impl{FNCPUMRDMSR} */ 366 366 static DECLCALLBACK(VBOXSTRICTRC) cpumMsrRd_Ia32MtrrCap(PVMCPU pVCpu, uint32_t idMsr, PCCPUMMSRRANGE pRange, uint64_t *puValue) 367 367 { -
trunk/src/VBox/VMM/VMMAll/CPUMAllRegs.cpp
r57856 r58116 320 320 321 321 322 /** @ MAYBE_LOAD_DRx322 /** @def MAYBE_LOAD_DRx 323 323 * Macro for updating DRx values in raw-mode and ring-0 contexts. 324 324 */ -
trunk/src/VBox/VMM/VMMAll/EMAll.cpp
r57860 r58116 1492 1492 { 1493 1493 AssertMsgFailed(("Illegal enabling of paging with CS.u1Long = 1!!\n")); 1494 return VERR_EM_INTERPRETER; /** @todo generate #GP(0) */1494 return VERR_EM_INTERPRETER; /** @todo generate \#GP(0) */ 1495 1495 } 1496 1496 … … 1499 1499 { 1500 1500 AssertMsgFailed(("Illegal enabling of paging with PAE disabled!!\n")); 1501 return VERR_EM_INTERPRETER; /** @todo generate #GP(0) */1501 return VERR_EM_INTERPRETER; /** @todo generate \#GP(0) */ 1502 1502 } 1503 1503 msrEFER |= MSR_K6_EFER_LMA; … … 1541 1541 && !(val & X86_CR4_PAE)) 1542 1542 { 1543 return VERR_EM_INTERPRETER; /** @todo generate #GP(0) */1543 return VERR_EM_INTERPRETER; /** @todo generate \#GP(0) */ 1544 1544 } 1545 1545 … … 1559 1559 { 1560 1560 Log(("Trying to set reserved CR4 bits: NewCR4=%#llx InvalidBits=%#llx\n", val, val & ~(uint64_t)fValid)); 1561 return VERR_EM_INTERPRETER; /** @todo generate #GP(0) */1561 return VERR_EM_INTERPRETER; /** @todo generate \#GP(0) */ 1562 1562 } 1563 1563 -
trunk/src/VBox/VMM/VMMAll/GIMAll.cpp
r57989 r58116 142 142 143 143 /** 144 * Whether #UD exceptions in the guest needs to be intercepted by the GIM144 * Whether \#UD exceptions in the guest needs to be intercepted by the GIM 145 145 * provider. 146 146 * … … 174 174 175 175 /** 176 * Exception handler for #UD when requested by the GIM provider.176 * Exception handler for \#UD when requested by the GIM provider. 177 177 * 178 178 * @param pVCpu Pointer to the VMCPU. -
trunk/src/VBox/VMM/VMMAll/GIMAllHv.cpp
r58074 r58116 688 688 689 689 /** 690 * Whether we need to trap #UD exceptions in the guest.691 * 692 * We only need to trap #UD exceptions for raw-mode guests when hypercalls are690 * Whether we need to trap \#UD exceptions in the guest. 691 * 692 * We only need to trap \#UD exceptions for raw-mode guests when hypercalls are 693 693 * enabled. For HM VMs, the hypercall would be handled via the 694 694 * VMCALL/VMMCALL VM-exit. … … 707 707 708 708 /** 709 * Exception handler for #UD.709 * Exception handler for \#UD. 710 710 * 711 711 * @param pVCpu Pointer to the VMCPU. -
trunk/src/VBox/VMM/VMMAll/GIMAllKvm.cpp
r57989 r58116 324 324 325 325 /** 326 * Whether we need to trap #UD exceptions in the guest.326 * Whether we need to trap \#UD exceptions in the guest. 327 327 * 328 328 * On AMD-V we need to trap them because paravirtualized Linux/KVM guests use … … 333 333 * I guess this was done so that guest teleporation between an AMD and an Intel 334 334 * machine would working without any changes at the time of teleporation. 335 * However, this also means we -always- need to intercept #UD exceptions on one335 * However, this also means we -always- need to intercept \#UD exceptions on one 336 336 * of the two CPU models (Intel or AMD). Hyper-V solves this problem more 337 337 * elegantly by letting the hypervisor supply an opaque hypercall page. … … 349 349 350 350 /** 351 * Exception handler for #UD.351 * Exception handler for \#UD. 352 352 * 353 353 * @param pVCpu Pointer to the VMCPU. -
trunk/src/VBox/VMM/VMMAll/HMAll.cpp
r57482 r58116 532 532 533 533 /** 534 * Notifies HM that GIM provider wants to trap #UD.534 * Notifies HM that GIM provider wants to trap \#UD. 535 535 * 536 536 * @param pVCpu Pointer to the VMCPU. … … 544 544 545 545 /** 546 * Notifies HM that GIM provider no longer wants to trap #UD.546 * Notifies HM that GIM provider no longer wants to trap \#UD. 547 547 * 548 548 * @param pVCpu Pointer to the VMCPU. -
trunk/src/VBox/VMM/VMMAll/IEMAll.cpp
r57432 r58116 74 74 * Use for pitting IEM against EM or something else in ring-0 or raw-mode 75 75 * context. */ 76 //#define IEM_VERIFICATION_MODE_MINIMAL 76 #if defined(DOXYGEN_RUNNING) 77 # define IEM_VERIFICATION_MODE_MINIMAL 78 #endif 77 79 //#define IEM_LOG_MEMORY_WRITES 78 80 #define IEM_IMPLEMENTS_TASKSWITCH … … 1285 1287 * on failure. 1286 1288 * 1287 * @param pi8Where to return the signed byte.1289 * @param a_pi8 Where to return the signed byte. 1288 1290 * @remark Implicitly references pIemCpu. 1289 1291 */ … … 1338 1340 * a word, returning automatically on failure. 1339 1341 * 1340 * @param pu16Where to return the word.1342 * @param a_pu16 Where to return the word. 1341 1343 * @remark Implicitly references pIemCpu. 1342 1344 */ … … 1391 1393 * a word, returning automatically on failure. 1392 1394 * 1393 * @param pu32Where to return the word.1395 * @param a_pu32 Where to return the word. 1394 1396 * @remark Implicitly references pIemCpu. 1395 1397 */ … … 1444 1446 * a word, returning automatically on failure. 1445 1447 * 1446 * @param pu64Where to return the word.1448 * @param a_pu64 Where to return the word. 1447 1449 * @remark Implicitly references pIemCpu. 1448 1450 */ … … 1643 1645 * on failure. 1644 1646 * 1645 * @param pi16Where to return the signed word.1647 * @param a_pi16 Where to return the signed word. 1646 1648 * @remark Implicitly references pIemCpu. 1647 1649 */ … … 1796 1798 * automatically on failure. 1797 1799 * 1798 * @param pi32Where to return the signed double word.1800 * @param a_pi32 Where to return the signed double word. 1799 1801 * @remark Implicitly references pIemCpu. 1800 1802 */ … … 2038 2040 * @param a_pIemCpu The IEM per CPU data. 2039 2041 * @param a_pCtx The CPU context. 2042 * @param a_fEfl The new EFLAGS. 2040 2043 */ 2041 2044 #ifdef VBOX_WITH_RAW_MODE_NOT_R0 … … 9288 9291 } while (0) 9289 9292 9290 /** The instruction allows no lock prefixing (in this encoding), throw #UD if9293 /** The instruction allows no lock prefixing (in this encoding), throw \#UD if 9291 9294 * lock prefixed. 9292 9295 * @deprecated IEMOP_HLP_DONE_DECODING_NO_LOCK_PREFIX */ … … 9298 9301 } while (0) 9299 9302 9300 /** The instruction is not available in 64-bit mode, throw #UD if we're in9303 /** The instruction is not available in 64-bit mode, throw \#UD if we're in 9301 9304 * 64-bit mode. */ 9302 9305 #define IEMOP_HLP_NO_64BIT() \ … … 9307 9310 } while (0) 9308 9311 9309 /** The instruction is only available in 64-bit mode, throw #UD if we're not in9312 /** The instruction is only available in 64-bit mode, throw \#UD if we're not in 9310 9313 * 64-bit mode. */ 9311 9314 #define IEMOP_HLP_ONLY_64BIT() \ -
trunk/src/VBox/VMM/VMMAll/IOMAllMMIO.cpp
r57860 r58116 55 55 * IEM deployment step. */ 56 56 #if ((defined(IN_RING3) || defined(IN_RING0)) && defined(VBOX_WITH_2ND_IEM_STEP)) \ 57 || defined(VBOX_WITH_3RD_IEM_STEP) 57 || defined(VBOX_WITH_3RD_IEM_STEP) || defined(DOXYGEN_RUNNING) 58 58 # define IEM_USE_IEM_INSTEAD 59 59 #endif -
trunk/src/VBox/VMM/VMMAll/PDMAllCritSect.cpp
r57358 r58116 87 87 * @param pCritSect The critical section. 88 88 * @param hNativeSelf The native handle of this thread. 89 * @param pSrcPos The source position of the lock operation. 89 90 */ 90 91 DECL_FORCE_INLINE(int) pdmCritSectEnterFirst(PPDMCRITSECT pCritSect, RTNATIVETHREAD hNativeSelf, PCRTLOCKVALSRCPOS pSrcPos) … … 117 118 * @param pCritSect The critsect. 118 119 * @param hNativeSelf The native thread handle. 120 * @param pSrcPos The source position of the lock operation. 119 121 */ 120 122 static int pdmR3R0CritSectEnterContended(PPDMCRITSECT pCritSect, RTNATIVETHREAD hNativeSelf, PCRTLOCKVALSRCPOS pSrcPos) … … 211 213 * @param pCritSect The PDM critical section to enter. 212 214 * @param rcBusy The status code to return when we're in GC or R0 213 * and the section is busy.215 * @param pSrcPos The source position of the lock operation. 214 216 */ 215 217 DECL_FORCE_INLINE(int) pdmCritSectEnter(PPDMCRITSECT pCritSect, int rcBusy, PCRTLOCKVALSRCPOS pSrcPos) … … 379 381 * @param uId Some kind of locking location ID. Typically a 380 382 * return address up the stack. Optional (0). 381 * @param pszFile The file where the lock is being acquired from. 382 * Optional. 383 * @param iLine The line number in that file. Optional (0). 384 * @param pszFunction The function where the lock is being acquired 385 * from. Optional. 383 * @param SRC_POS The source position where to lock is being 384 * acquired from. Optional. 386 385 */ 387 386 VMMDECL(int) PDMCritSectEnterDebug(PPDMCRITSECT pCritSect, int rcBusy, RTHCUINTPTR uId, RT_SRC_POS_DECL) … … 407 406 * 408 407 * @param pCritSect The critical section. 408 * @param pSrcPos The source position of the lock operation. 409 409 */ 410 410 static int pdmCritSectTryEnter(PPDMCRITSECT pCritSect, PCRTLOCKVALSRCPOS pSrcPos) … … 487 487 * @param uId Some kind of locking location ID. Typically a 488 488 * return address up the stack. Optional (0). 489 * @param pszFile The file where the lock is being acquired from. 490 * Optional. 491 * @param iLine The line number in that file. Optional (0). 492 * @param pszFunction The function where the lock is being acquired 493 * from. Optional. 489 * @param SRC_POS The source position where to lock is being 490 * acquired from. Optional. 494 491 */ 495 492 VMMDECL(int) PDMCritSectTryEnterDebug(PPDMCRITSECT pCritSect, RTHCUINTPTR uId, RT_SRC_POS_DECL) -
trunk/src/VBox/VMM/VMMAll/PDMAllCritSectRw.cpp
r57851 r58116 408 408 * @returns VBox status code. 409 409 * @retval VINF_SUCCESS on success. 410 * @retval @arcBusy if in ring-0 or raw-mode context and it is busy.410 * @retval rcBusy if in ring-0 or raw-mode context and it is busy. 411 411 * @retval VERR_SEM_NESTED if nested enter on a no nesting section. (Asserted.) 412 412 * @retval VERR_SEM_DESTROYED if the critical section is delete before or … … 418 418 * critical section thru a ring-3 call if necessary. 419 419 * @param uId Where we're entering the section. 420 * @param pszFile The source position - file.421 * @param iLine The source position - line.422 * @param pszFunction The source position - function.423 420 * @sa PDMCritSectRwEnterSharedDebug, PDMCritSectRwTryEnterShared, 424 421 * PDMCritSectRwTryEnterSharedDebug, PDMCritSectRwLeaveShared, … … 451 448 * critical section thru a ring-3 call if necessary. 452 449 * @param uId Where we're entering the section. 453 * @param pszFile The source position - file. 454 * @param iLine The source position - line. 455 * @param pszFunction The source position - function. 450 * @param SRC_POS The source position. 456 451 * @sa PDMCritSectRwEnterShared, PDMCritSectRwTryEnterShared, 457 452 * PDMCritSectRwTryEnterSharedDebug, PDMCritSectRwLeaveShared, … … 482 477 * @param pThis Pointer to the read/write critical section. 483 478 * @param uId Where we're entering the section. 484 * @param pszFile The source position - file. 485 * @param iLine The source position - line. 486 * @param pszFunction The source position - function. 479 * @param SRC_POS The source position. 487 480 * @sa PDMCritSectRwTryEnterSharedDebug, PDMCritSectRwEnterShared, 488 481 * PDMCritSectRwEnterSharedDebug, PDMCritSectRwLeaveShared, … … 512 505 * @param pThis Pointer to the read/write critical section. 513 506 * @param uId Where we're entering the section. 514 * @param pszFile The source position - file. 515 * @param iLine The source position - line. 516 * @param pszFunction The source position - function. 507 * @param SRC_POS The source position. 517 508 * @sa PDMCritSectRwTryEnterShared, PDMCritSectRwEnterShared, 518 509 * PDMCritSectRwEnterSharedDebug, PDMCritSectRwLeaveShared, … … 961 952 * @returns VBox status code. 962 953 * @retval VINF_SUCCESS on success. 963 * @retval @arcBusy if in ring-0 or raw-mode context and it is busy.954 * @retval rcBusy if in ring-0 or raw-mode context and it is busy. 964 955 * @retval VERR_SEM_NESTED if nested enter on a no nesting section. (Asserted.) 965 956 * @retval VERR_SEM_DESTROYED if the critical section is delete before or … … 991 982 * @returns VBox status code. 992 983 * @retval VINF_SUCCESS on success. 993 * @retval @arcBusy if in ring-0 or raw-mode context and it is busy.984 * @retval rcBusy if in ring-0 or raw-mode context and it is busy. 994 985 * @retval VERR_SEM_NESTED if nested enter on a no nesting section. (Asserted.) 995 986 * @retval VERR_SEM_DESTROYED if the critical section is delete before or … … 1001 992 * critical section thru a ring-3 call if necessary. 1002 993 * @param uId Where we're entering the section. 1003 * @param pszFile The source position - file. 1004 * @param iLine The source position - line. 1005 * @param pszFunction The source position - function. 994 * @param SRC_POS The source position. 1006 995 * @sa PDMCritSectRwEnterExcl, PDMCritSectRwTryEnterExcl, 1007 996 * PDMCritSectRwTryEnterExclDebug, … … 1058 1047 * @param pThis Pointer to the read/write critical section. 1059 1048 * @param uId Where we're entering the section. 1060 * @param pszFile The source position - file. 1061 * @param iLine The source position - line. 1062 * @param pszFunction The source position - function. 1049 * @param SRC_POS The source position. 1063 1050 * @sa PDMCritSectRwTryEnterExcl, PDMCritSectRwEnterExcl, 1064 1051 * PDMCritSectRwEnterExclDebug, … … 1274 1261 * Checks the caller is the exclusive (write) owner of the critical section. 1275 1262 * 1276 * @retval @ctrue if owner.1277 * @retval @cfalse if not owner.1263 * @retval true if owner. 1264 * @retval false if not owner. 1278 1265 * @param pThis Pointer to the read/write critical section. 1279 1266 * @sa PDMCritSectRwIsReadOwner, PDMCritSectIsOwner, … … 1442 1429 * Checks if the read/write critical section is initialized or not. 1443 1430 * 1444 * @retval @ctrue if initialized.1445 * @retval @cfalse if not initialized.1431 * @retval true if initialized. 1432 * @retval false if not initialized. 1446 1433 * @param pThis Pointer to the read/write critical section. 1447 1434 * @sa PDMCritSectIsInitialized, RTCritSectRwIsInitialized. -
trunk/src/VBox/VMM/VMMAll/PGMAllBth.h
r57853 r58116 439 439 440 440 /** 441 * #PF Handler for raw-mode guest execution.441 * \#PF Handler for raw-mode guest execution. 442 442 * 443 443 * @returns VBox status code (appropriate for trap handling and GC return). -
trunk/src/VBox/VMM/VMMAll/TMAllVirtual.cpp
r57411 r58116 44 44 45 45 /** 46 * @interface_method_impl{RTTIMENANOTSDATA, pfnBadPrev}47 */ 48 DECLCALLBACK(DECLEXPORT(void)) tmVirtualNanoTSBad Prev(PRTTIMENANOTSDATA pData, uint64_t u64NanoTS, uint64_t u64DeltaPrev,49 46 * @interface_method_impl{RTTIMENANOTSDATA,pfnBad} 47 */ 48 DECLCALLBACK(DECLEXPORT(void)) tmVirtualNanoTSBad(PRTTIMENANOTSDATA pData, uint64_t u64NanoTS, uint64_t u64DeltaPrev, 49 uint64_t u64PrevNanoTS) 50 50 { 51 51 PVM pVM = RT_FROM_MEMBER(pData, VM, CTX_SUFF(tm.s.VirtualGetRawData)); … … 61 61 62 62 /** 63 * @interface_method_impl{RTTIMENANOTSDATA, 63 * @interface_method_impl{RTTIMENANOTSDATA,pfnRediscover} 64 64 * 65 65 * This is the initial worker, so the first call in each context ends up here. … … 137 137 138 138 /** 139 * @interface_method_impl{RTTIMENANOTSDATA, pfnBadGipIndex}139 * @interface_method_impl{RTTIMENANOTSDATA,pfnBadCpuIndex} 140 140 */ 141 141 DECLEXPORT(uint64_t) tmVirtualNanoTSBadCpuIndex(PRTTIMENANOTSDATA pData, uint16_t idApic, uint16_t iCpuSet, uint16_t iGipCpu) -
trunk/src/VBox/VMM/VMMAll/TRPMAll.cpp
r57358 r58116 176 176 /** 177 177 * Gets the instruction-length for the current trap (only relevant for software 178 * interrupts and software exceptions #BP and#OF).178 * interrupts and software exceptions \#BP and \#OF). 179 179 * 180 180 * The caller is responsible for making sure there is an active trap 0x0e when … … 318 318 319 319 /** 320 * Sets the fault address of the current #PF trap. (This function is for use in320 * Sets the fault address of the current \#PF trap. (This function is for use in 321 321 * trap handlers and such.) 322 322 * … … 338 338 /** 339 339 * Sets the instruction-length of the current trap (relevant for software 340 * interrupts and software exceptions like #BP,#OF).340 * interrupts and software exceptions like \#BP, \#OF). 341 341 * 342 342 * The caller is responsible for making sure there is an active trap 0e -
trunk/src/VBox/VMM/VMMAll/VMAll.cpp
r57358 r58116 44 44 * @param pVM Pointer to the VM. Must be non-NULL. 45 45 * @param rc VBox status code. 46 * @param RT_SRC_POS_DECLUse RT_SRC_POS.46 * @param SRC_POS Use RT_SRC_POS. 47 47 * @param pszFormat Error message format string. 48 48 * @param ... Error message arguments. … … 68 68 * @param pVM Pointer to the VM. Must be non-NULL. 69 69 * @param rc VBox status code. 70 * @param RT_SRC_POS_DECLUse RT_SRC_POS.70 * @param SRC_POS Use RT_SRC_POS. 71 71 * @param pszFormat Error message format string. 72 72 * @param args Error message arguments. … … 105 105 * @param pVM Pointer to the VM. Must be non-NULL. 106 106 * @param rc VBox status code. 107 * @param RT_SRC_POS_DECLUse RT_SRC_POS.107 * @param SRC_POS Use RT_SRC_POS. 108 108 * @param pszFormat Error message format string. 109 109 * @param args Error message arguments. -
trunk/src/VBox/VMM/VMMR0/CPUMR0.cpp
r57558 r58116 321 321 322 322 /** 323 * Trap handler for device-not-available fault ( #NM).323 * Trap handler for device-not-available fault (\#NM). 324 324 * Device not available, FP or (F)WAIT instruction. 325 325 * -
trunk/src/VBox/VMM/VMMR0/GMMR0.cpp
r57858 r58116 522 522 523 523 /** The maximum number of pages we're allowed to allocate. 524 * @gcfgm 64-bit GMM/MaxPages Direct.525 * @gcfgm 32-bit GMM/PctPages Relative to the number of host pages.*/524 * @gcfgm{GMM/MaxPages,64-bit, Direct.} 525 * @gcfgm{GMM/PctPages,32-bit, Relative to the number of host pages.} */ 526 526 uint64_t cMaxPages; 527 527 /** The number of pages that has been reserved. -
trunk/src/VBox/VMM/VMMR0/HMSVMR0.cpp
r58014 r58116 191 191 * 192 192 * A state structure for holding miscellaneous information across AMD-V 193 * VMRUN/ #VMEXIT operation, restored after the transition.193 * VMRUN/\#VMEXIT operation, restored after the transition. 194 194 * 195 195 * @{ */ … … 202 202 #endif 203 203 204 /** The #VMEXIT exit code (the EXITCODE field in the VMCB). */204 /** The \#VMEXIT exit code (the EXITCODE field in the VMCB). */ 205 205 uint64_t u64ExitCode; 206 206 /** The guest's TPR value used for TPR shadowing. */ … … 209 209 uint8_t abAlignment0[7]; 210 210 211 /** Whether the guest FPU state was active at the time of #VMEXIT. */211 /** Whether the guest FPU state was active at the time of \#VMEXIT. */ 212 212 bool fWasGuestFPUStateActive; 213 /** Whether the guest debug state was active at the time of #VMEXIT. */213 /** Whether the guest debug state was active at the time of \#VMEXIT. */ 214 214 bool fWasGuestDebugStateActive; 215 /** Whether the hyper debug state was active at the time of #VMEXIT. */215 /** Whether the hyper debug state was active at the time of \#VMEXIT. */ 216 216 bool fWasHyperDebugStateActive; 217 217 /** Whether the TSC offset mode needs to be updated. */ 218 218 bool fUpdateTscOffsetting; 219 /** Whether the TSC_AUX MSR needs restoring on #VMEXIT. */219 /** Whether the TSC_AUX MSR needs restoring on \#VMEXIT. */ 220 220 bool fRestoreTscAuxMsr; 221 /** Whether the #VMEXIT was caused by a page-fault during delivery of a221 /** Whether the \#VMEXIT was caused by a page-fault during delivery of a 222 222 * contributary exception or a page-fault. */ 223 223 bool fVectoringDoublePF; 224 /** Whether the #VMEXIT was caused by a page-fault during delivery of an224 /** Whether the \#VMEXIT was caused by a page-fault during delivery of an 225 225 * external interrupt or NMI. */ 226 226 bool fVectoringPF; … … 235 235 typedef enum SVMMSREXITREAD 236 236 { 237 /** Reading this MSR causes a #VMEXIT. */237 /** Reading this MSR causes a \#VMEXIT. */ 238 238 SVMMSREXIT_INTERCEPT_READ = 0xb, 239 /** Reading this MSR does not cause a #VMEXIT. */239 /** Reading this MSR does not cause a \#VMEXIT. */ 240 240 SVMMSREXIT_PASSTHRU_READ 241 241 } SVMMSREXITREAD; … … 246 246 typedef enum SVMMSREXITWRITE 247 247 { 248 /** Writing to this MSR causes a #VMEXIT. */248 /** Writing to this MSR causes a \#VMEXIT. */ 249 249 SVMMSREXIT_INTERCEPT_WRITE = 0xd, 250 /** Writing to this MSR does not cause a #VMEXIT. */250 /** Writing to this MSR does not cause a \#VMEXIT. */ 251 251 SVMMSREXIT_PASSTHRU_WRITE 252 252 } SVMMSREXITWRITE; 253 253 254 254 /** 255 * SVM #VMEXIT handler.255 * SVM \#VMEXIT handler. 256 256 * 257 257 * @returns VBox status code. … … 270 270 static void hmR0SvmLeave(PVM pVM, PVMCPU pVCpu, PCPUMCTX pCtx); 271 271 272 /** @name #VMEXIT handlers.272 /** @name \#VMEXIT handlers. 273 273 * @{ 274 274 */ … … 869 869 * Flushes the appropriate tagged-TLB entries. 870 870 * 871 * @param pVM Pointer to the VM.872 871 * @param pVCpu Pointer to the VMCPU. 873 872 */ … … 2559 2558 /** 2560 2559 * Sets the virtual interrupt intercept control in the VMCB which 2561 * instructs AMD-V to cause a #VMEXIT as soon as the guest is in a state to2560 * instructs AMD-V to cause a \#VMEXIT as soon as the guest is in a state to 2562 2561 * receive interrupts. 2563 2562 * … … 2580 2579 /** 2581 2580 * Sets the IRET intercept control in the VMCB which instructs AMD-V to cause a 2582 * #VMEXIT as soon as a guest starts executing an IRET. This is used to unblock2581 * \#VMEXIT as soon as a guest starts executing an IRET. This is used to unblock 2583 2582 * virtual NMIs. 2584 2583 * … … 3493 3492 3494 3493 /** 3495 * Handles a #VMEXIT (for all EXITCODE values except SVM_EXIT_INVALID).3494 * Handles a \#VMEXIT (for all EXITCODE values except SVM_EXIT_INVALID). 3496 3495 * 3497 3496 * @returns VBox status code (informational status codes included). … … 3806 3805 * 3807 3806 * @param pVM Pointer to the VM. 3807 * @param pVCpu Pointer to the VMCPU. 3808 3808 * @param pCtx The guest CPU context. 3809 3809 * … … 3833 3833 3834 3834 /** 3835 * Sets an invalid-opcode ( #UD) exception as pending-for-injection into the VM.3835 * Sets an invalid-opcode (\#UD) exception as pending-for-injection into the VM. 3836 3836 * 3837 3837 * @param pVCpu Pointer to the VMCPU. … … 3849 3849 3850 3850 /** 3851 * Sets a debug ( #DB) exception as pending-for-injection into the VM.3851 * Sets a debug (\#DB) exception as pending-for-injection into the VM. 3852 3852 * 3853 3853 * @param pVCpu Pointer to the VMCPU. … … 3865 3865 3866 3866 /** 3867 * Sets a page fault ( #PF) exception as pending-for-injection into the VM.3867 * Sets a page fault (\#PF) exception as pending-for-injection into the VM. 3868 3868 * 3869 3869 * @param pVCpu Pointer to the VMCPU. … … 3896 3896 3897 3897 /** 3898 * Sets a device-not-available ( #NM) exception as pending-for-injection into the3899 * VM.3898 * Sets a device-not-available (\#NM) exception as pending-for-injection into 3899 * the VM. 3900 3900 * 3901 3901 * @param pVCpu Pointer to the VMCPU. … … 3913 3913 3914 3914 /** 3915 * Sets a math-fault ( #MF) exception as pending-for-injection into the VM.3915 * Sets a math-fault (\#MF) exception as pending-for-injection into the VM. 3916 3916 * 3917 3917 * @param pVCpu Pointer to the VMCPU. … … 3929 3929 3930 3930 /** 3931 * Sets a double fault ( #DF) exception as pending-for-injection into the VM.3931 * Sets a double fault (\#DF) exception as pending-for-injection into the VM. 3932 3932 * 3933 3933 * @param pVCpu Pointer to the VMCPU. … … 4061 4061 * 4062 4062 * @returns VBox status code (informational error codes included). 4063 * @retval VINF_SUCCESS if we should continue handling the #VMEXIT.4064 * @retval VINF_HM_DOUBLE_FAULT if a #DF condition was detected and we ought to4065 * continue execution of the guest which will delivery the #DF.4063 * @retval VINF_SUCCESS if we should continue handling the \#VMEXIT. 4064 * @retval VINF_HM_DOUBLE_FAULT if a \#DF condition was detected and we ought to 4065 * continue execution of the guest which will delivery the \#DF. 4066 4066 * @retval VINF_EM_RESET if we detected a triple-fault condition. 4067 4067 * … … 4206 4206 * @param cb RIP increment value in bytes. 4207 4207 * 4208 * @remarks Use this function only from #VMEXIT's where the NRIP value is valid4208 * @remarks Use this function only from \#VMEXIT's where the NRIP value is valid 4209 4209 * when NRIP_SAVE is supported by the CPU! 4210 4210 */ … … 4226 4226 /* -=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= */ 4227 4227 4228 /** @name #VMEXIT handlers.4228 /** @name \#VMEXIT handlers. 4229 4229 * @{ 4230 4230 */ 4231 4231 4232 4232 /** 4233 * #VMEXIT handler for external interrupts, NMIs, FPU assertion freeze and INIT4233 * \#VMEXIT handler for external interrupts, NMIs, FPU assertion freeze and INIT 4234 4234 * signals (SVM_EXIT_INTR, SVM_EXIT_NMI, SVM_EXIT_FERR_FREEZE, SVM_EXIT_INIT). 4235 4235 */ … … 4256 4256 4257 4257 /** 4258 * #VMEXIT handler for WBINVD (SVM_EXIT_WBINVD). Conditional#VMEXIT.4258 * \#VMEXIT handler for WBINVD (SVM_EXIT_WBINVD). Conditional \#VMEXIT. 4259 4259 */ 4260 4260 HMSVM_EXIT_DECL hmR0SvmExitWbinvd(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4271 4271 4272 4272 /** 4273 * #VMEXIT handler for INVD (SVM_EXIT_INVD). Unconditional#VMEXIT.4273 * \#VMEXIT handler for INVD (SVM_EXIT_INVD). Unconditional \#VMEXIT. 4274 4274 */ 4275 4275 HMSVM_EXIT_DECL hmR0SvmExitInvd(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4286 4286 4287 4287 /** 4288 * #VMEXIT handler for INVD (SVM_EXIT_CPUID). Conditional#VMEXIT.4288 * \#VMEXIT handler for INVD (SVM_EXIT_CPUID). Conditional \#VMEXIT. 4289 4289 */ 4290 4290 HMSVM_EXIT_DECL hmR0SvmExitCpuid(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4309 4309 4310 4310 /** 4311 * #VMEXIT handler for RDTSC (SVM_EXIT_RDTSC). Conditional#VMEXIT.4311 * \#VMEXIT handler for RDTSC (SVM_EXIT_RDTSC). Conditional \#VMEXIT. 4312 4312 */ 4313 4313 HMSVM_EXIT_DECL hmR0SvmExitRdtsc(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4335 4335 4336 4336 /** 4337 * #VMEXIT handler for RDTSCP (SVM_EXIT_RDTSCP). Conditional#VMEXIT.4337 * \#VMEXIT handler for RDTSCP (SVM_EXIT_RDTSCP). Conditional \#VMEXIT. 4338 4338 */ 4339 4339 HMSVM_EXIT_DECL hmR0SvmExitRdtscp(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4358 4358 4359 4359 /** 4360 * #VMEXIT handler for RDPMC (SVM_EXIT_RDPMC). Conditional#VMEXIT.4360 * \#VMEXIT handler for RDPMC (SVM_EXIT_RDPMC). Conditional \#VMEXIT. 4361 4361 */ 4362 4362 HMSVM_EXIT_DECL hmR0SvmExitRdpmc(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4380 4380 4381 4381 /** 4382 * #VMEXIT handler for INVLPG (SVM_EXIT_INVLPG). Conditional#VMEXIT.4382 * \#VMEXIT handler for INVLPG (SVM_EXIT_INVLPG). Conditional \#VMEXIT. 4383 4383 */ 4384 4384 HMSVM_EXIT_DECL hmR0SvmExitInvlpg(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4398 4398 4399 4399 /** 4400 * #VMEXIT handler for HLT (SVM_EXIT_HLT). Conditional#VMEXIT.4400 * \#VMEXIT handler for HLT (SVM_EXIT_HLT). Conditional \#VMEXIT. 4401 4401 */ 4402 4402 HMSVM_EXIT_DECL hmR0SvmExitHlt(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4415 4415 4416 4416 /** 4417 * #VMEXIT handler for MONITOR (SVM_EXIT_MONITOR). Conditional#VMEXIT.4417 * \#VMEXIT handler for MONITOR (SVM_EXIT_MONITOR). Conditional \#VMEXIT. 4418 4418 */ 4419 4419 HMSVM_EXIT_DECL hmR0SvmExitMonitor(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4437 4437 4438 4438 /** 4439 * #VMEXIT handler for MWAIT (SVM_EXIT_MWAIT). Conditional#VMEXIT.4439 * \#VMEXIT handler for MWAIT (SVM_EXIT_MWAIT). Conditional \#VMEXIT. 4440 4440 */ 4441 4441 HMSVM_EXIT_DECL hmR0SvmExitMwait(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4469 4469 4470 4470 /** 4471 * #VMEXIT handler for shutdown (triple-fault) (SVM_EXIT_SHUTDOWN).4472 * Conditional#VMEXIT.4471 * \#VMEXIT handler for shutdown (triple-fault) (SVM_EXIT_SHUTDOWN). Conditional 4472 * \#VMEXIT. 4473 4473 */ 4474 4474 HMSVM_EXIT_DECL hmR0SvmExitShutdown(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4480 4480 4481 4481 /** 4482 * #VMEXIT handler for CRx reads (SVM_EXIT_READ_CR*). Conditional#VMEXIT.4482 * \#VMEXIT handler for CRx reads (SVM_EXIT_READ_CR*). Conditional \#VMEXIT. 4483 4483 */ 4484 4484 HMSVM_EXIT_DECL hmR0SvmExitReadCRx(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4501 4501 4502 4502 /** 4503 * #VMEXIT handler for CRx writes (SVM_EXIT_WRITE_CR*). Conditional#VMEXIT.4503 * \#VMEXIT handler for CRx writes (SVM_EXIT_WRITE_CR*). Conditional \#VMEXIT. 4504 4504 */ 4505 4505 HMSVM_EXIT_DECL hmR0SvmExitWriteCRx(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4549 4549 4550 4550 /** 4551 * #VMEXIT handler for instructions that result in a #UD exception delivered to4552 * t he guest.4551 * \#VMEXIT handler for instructions that result in a \#UD exception delivered 4552 * to the guest. 4553 4553 */ 4554 4554 HMSVM_EXIT_DECL hmR0SvmExitSetPendingXcptUD(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4561 4561 4562 4562 /** 4563 * #VMEXIT handler for MSR read and writes (SVM_EXIT_MSR). Conditional #VMEXIT. 4563 * \#VMEXIT handler for MSR read and writes (SVM_EXIT_MSR). Conditional 4564 * \#VMEXIT. 4564 4565 */ 4565 4566 HMSVM_EXIT_DECL hmR0SvmExitMsr(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4663 4664 4664 4665 /** 4665 * #VMEXIT handler for DRx read (SVM_EXIT_READ_DRx). Conditional#VMEXIT.4666 * \#VMEXIT handler for DRx read (SVM_EXIT_READ_DRx). Conditional \#VMEXIT. 4666 4667 */ 4667 4668 HMSVM_EXIT_DECL hmR0SvmExitReadDRx(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4727 4728 4728 4729 /** 4729 * #VMEXIT handler for DRx write (SVM_EXIT_WRITE_DRx). Conditional#VMEXIT.4730 * \#VMEXIT handler for DRx write (SVM_EXIT_WRITE_DRx). Conditional \#VMEXIT. 4730 4731 */ 4731 4732 HMSVM_EXIT_DECL hmR0SvmExitWriteDRx(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4741 4742 4742 4743 /** 4743 * #VMEXIT handler for XCRx write (SVM_EXIT_XSETBV). Conditional#VMEXIT.4744 * \#VMEXIT handler for XCRx write (SVM_EXIT_XSETBV). Conditional \#VMEXIT. 4744 4745 */ 4745 4746 HMSVM_EXIT_DECL hmR0SvmExitXsetbv(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4762 4763 4763 4764 /** 4764 * #VMEXIT handler for I/O instructions (SVM_EXIT_IOIO). Conditional#VMEXIT.4765 * \#VMEXIT handler for I/O instructions (SVM_EXIT_IOIO). Conditional \#VMEXIT. 4765 4766 */ 4766 4767 HMSVM_EXIT_DECL hmR0SvmExitIOInstr(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 4980 4981 4981 4982 /** 4982 * #VMEXIT handler for Nested Page-faults (SVM_EXIT_NPF). Conditional 4983 * #VMEXIT. 4983 * \#VMEXIT handler for Nested Page-faults (SVM_EXIT_NPF). Conditional \#VMEXIT. 4984 4984 */ 4985 4985 HMSVM_EXIT_DECL hmR0SvmExitNestedPF(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 5084 5084 5085 5085 /** 5086 * #VMEXIT handler for virtual interrupt (SVM_EXIT_VINTR). Conditional #VMEXIT. 5086 * \#VMEXIT handler for virtual interrupt (SVM_EXIT_VINTR). Conditional 5087 * \#VMEXIT. 5087 5088 */ 5088 5089 HMSVM_EXIT_DECL hmR0SvmExitVIntr(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 5105 5106 5106 5107 /** 5107 * #VMEXIT handler for task switches (SVM_EXIT_TASK_SWITCH). Conditional #VMEXIT. 5108 * \#VMEXIT handler for task switches (SVM_EXIT_TASK_SWITCH). Conditional 5109 * \#VMEXIT. 5108 5110 */ 5109 5111 HMSVM_EXIT_DECL hmR0SvmExitTaskSwitch(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 5137 5139 5138 5140 /** 5139 * #VMEXIT handler for VMMCALL (SVM_EXIT_VMMCALL). Conditional#VMEXIT.5141 * \#VMEXIT handler for VMMCALL (SVM_EXIT_VMMCALL). Conditional \#VMEXIT. 5140 5142 */ 5141 5143 HMSVM_EXIT_DECL hmR0SvmExitVmmCall(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 5175 5177 5176 5178 /** 5177 * #VMEXIT handler for VMMCALL (SVM_EXIT_VMMCALL). Conditional#VMEXIT.5179 * \#VMEXIT handler for VMMCALL (SVM_EXIT_VMMCALL). Conditional \#VMEXIT. 5178 5180 */ 5179 5181 HMSVM_EXIT_DECL hmR0SvmExitPause(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 5186 5188 5187 5189 /** 5188 * #VMEXIT handler for IRET (SVM_EXIT_IRET). Conditional#VMEXIT.5190 * \#VMEXIT handler for IRET (SVM_EXIT_IRET). Conditional \#VMEXIT. 5189 5191 */ 5190 5192 HMSVM_EXIT_DECL hmR0SvmExitIret(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 5205 5207 5206 5208 /** 5207 * #VMEXIT handler for page-fault exceptions (SVM_EXIT_EXCEPTION_E). Conditional5208 * #VMEXIT.5209 * \#VMEXIT handler for page-fault exceptions (SVM_EXIT_EXCEPTION_E). 5210 * Conditional \#VMEXIT. 5209 5211 */ 5210 5212 HMSVM_EXIT_DECL hmR0SvmExitXcptPF(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 5325 5327 5326 5328 /** 5327 * #VMEXIT handler for device-not-available exceptions (SVM_EXIT_EXCEPTION_7).5328 * Conditional #VMEXIT.5329 * \#VMEXIT handler for device-not-available exceptions (SVM_EXIT_EXCEPTION_7). 5330 * Conditional \#VMEXIT. 5329 5331 */ 5330 5332 HMSVM_EXIT_DECL hmR0SvmExitXcptNM(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 5376 5378 5377 5379 /** 5378 * #VMEXIT handler for undefined opcode (SVM_EXIT_EXCEPTION_6).5379 * Conditional#VMEXIT.5380 * \#VMEXIT handler for undefined opcode (SVM_EXIT_EXCEPTION_6). Conditional 5381 * \#VMEXIT. 5380 5382 */ 5381 5383 HMSVM_EXIT_DECL hmR0SvmExitXcptUD(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 5396 5398 5397 5399 /** 5398 * #VMEXIT handler for math-fault exceptions (SVM_EXIT_EXCEPTION_10).5399 * Conditional #VMEXIT.5400 * \#VMEXIT handler for math-fault exceptions (SVM_EXIT_EXCEPTION_10). 5401 * Conditional \#VMEXIT. 5400 5402 */ 5401 5403 HMSVM_EXIT_DECL hmR0SvmExitXcptMF(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) … … 5431 5433 5432 5434 /** 5433 * #VMEXIT handler for debug exceptions (SVM_EXIT_EXCEPTION_1). Conditional5434 * #VMEXIT.5435 * \#VMEXIT handler for debug exceptions (SVM_EXIT_EXCEPTION_1). Conditional 5436 * \#VMEXIT. 5435 5437 */ 5436 5438 HMSVM_EXIT_DECL hmR0SvmExitXcptDB(PVMCPU pVCpu, PCPUMCTX pCtx, PSVMTRANSIENT pSvmTransient) -
trunk/src/VBox/VMM/VMMR0/HMVMXR0.cpp
r58014 r58116 138 138 * 139 139 * We need to intercept all exceptions manually except: 140 * - #NM,#MF handled in hmR0VmxLoadSharedCR0().141 * - #DB handled in hmR0VmxLoadSharedDebugState().142 * - #PF need not be intercepted even in real-mode if we have Nested Paging140 * - \#NM, \#MF handled in hmR0VmxLoadSharedCR0(). 141 * - \#DB handled in hmR0VmxLoadSharedDebugState(). 142 * - \#PF need not be intercepted even in real-mode if we have Nested Paging 143 143 * support. 144 144 */ … … 2297 2297 * @returns VBox status code. 2298 2298 * @param pVM Pointer to the VM. 2299 * @param pV MCPUPointer to the VMCPU.2299 * @param pVCpu Pointer to the VMCPU. 2300 2300 */ 2301 2301 static int hmR0VmxSetupProcCtls(PVM pVM, PVMCPU pVCpu) … … 3209 3209 * 3210 3210 * @returns VBox status code. 3211 * @param pVM Pointer to the VM.3212 3211 * @param pVCpu Pointer to the VMCPU. 3213 3212 * @param pMixedCtx Pointer to the guest-CPU context. The data may be … … 3291 3290 * 3292 3291 * @returns VBox status code. 3293 * @param pVM Pointer to the VM.3294 3292 * @param pVCpu Pointer to the VMCPU. 3295 3293 * @param pMixedCtx Pointer to the guest-CPU context. The data may be … … 3583 3581 * 3584 3582 * @returns VBox status code. 3585 * @param pVM Pointer to the VM.3586 3583 * @param pVCpu Pointer to the VMCPU. 3587 3584 * @param pMixedCtx Pointer to the guest-CPU context. The data may be … … 3774 3771 * 3775 3772 * @returns VBox status code. 3776 * @param pVM Pointer to the VM.3777 3773 * @param pVCpu Pointer to the VMCPU. 3778 3774 * @param pMixedCtx Pointer to the guest-CPU context. The data may be … … 4378 4374 * 4379 4375 * @returns VBox status code. 4380 * @param pVM Pointer to the VM.4381 4376 * @param pVCPU Pointer to the VMCPU. 4382 4377 * @param pMixedCtx Pointer to the guest-CPU context. The data may be … … 4712 4707 * @remarks No-long-jump zone!!! 4713 4708 */ 4714 static int hmR0VmxLoadGuestActivityState(PVMCPU pVCpu, PCPUMCTX p Ctx)4715 { 4716 NOREF(p Ctx);4709 static int hmR0VmxLoadGuestActivityState(PVMCPU pVCpu, PCPUMCTX pMixedCtx) 4710 { 4711 NOREF(pMixedCtx); 4717 4712 /** @todo See if we can make use of other states, e.g. 4718 4713 * VMX_VMCS_GUEST_ACTIVITY_SHUTDOWN or HLT. */ … … 5576 5571 5577 5572 /** 5578 * Sets a double-fault ( #DF) exception as pending-for-injection into the VM.5573 * Sets a double-fault (\#DF) exception as pending-for-injection into the VM. 5579 5574 * 5580 5575 * @param pVCpu Pointer to the VMCPU. … … 5599 5594 * @returns VBox status code (informational error codes included). 5600 5595 * @retval VINF_SUCCESS if we should continue handling the VM-exit. 5601 * @retval VINF_HM_DOUBLE_FAULT if a #DF condition was detected and we ought to5602 * continue execution of the guest which will delivery the #DF.5596 * @retval VINF_HM_DOUBLE_FAULT if a \#DF condition was detected and we ought to 5597 * continue execution of the guest which will delivery the \#DF. 5603 5598 * @retval VINF_EM_RESET if we detected a triple-fault condition. 5604 5599 * … … 7528 7523 7529 7524 /** 7530 * Sets an invalid-opcode ( #UD) exception as pending-for-injection into the VM.7525 * Sets an invalid-opcode (\#UD) exception as pending-for-injection into the VM. 7531 7526 * 7532 7527 * @param pVCpu Pointer to the VMCPU. … … 7544 7539 7545 7540 /** 7546 * Injects a double-fault ( #DF) exception into the VM.7541 * Injects a double-fault (\#DF) exception into the VM. 7547 7542 * 7548 7543 * @returns VBox status code (informational status code included). … … 7570 7565 7571 7566 /** 7572 * Sets a debug ( #DB) exception as pending-for-injection into the VM.7567 * Sets a debug (\#DB) exception as pending-for-injection into the VM. 7573 7568 * 7574 7569 * @param pVCpu Pointer to the VMCPU. … … 7587 7582 7588 7583 /** 7589 * Sets an overflow ( #OF) exception as pending-for-injection into the VM.7584 * Sets an overflow (\#OF) exception as pending-for-injection into the VM. 7590 7585 * 7591 7586 * @param pVCpu Pointer to the VMCPU. … … 7606 7601 7607 7602 /** 7608 * Injects a general-protection ( #GP) fault into the VM.7603 * Injects a general-protection (\#GP) fault into the VM. 7609 7604 * 7610 7605 * @returns VBox status code (informational status code included). … … 7615 7610 * @param fErrorCodeValid Whether the error code is valid (depends on the CPU 7616 7611 * mode, i.e. in real-mode it's not valid). 7617 * @param u32ErrorCode The error code associated with the #GP.7612 * @param u32ErrorCode The error code associated with the \#GP. 7618 7613 * @param fStepping Whether we're running in 7619 7614 * hmR0VmxRunGuestCodeStep() and should return … … 7638 7633 7639 7634 /** 7640 * Sets a general-protection ( #GP) exception as pending-for-injection into the7635 * Sets a general-protection (\#GP) exception as pending-for-injection into the 7641 7636 * VM. 7642 7637 * … … 7645 7640 * out-of-sync. Make sure to update the required fields 7646 7641 * before using them. 7647 * @param u32ErrorCode The error code associated with the #GP.7642 * @param u32ErrorCode The error code associated with the \#GP. 7648 7643 */ 7649 7644 DECLINLINE(void) hmR0VmxSetPendingXcptGP(PVMCPU pVCpu, PCPUMCTX pMixedCtx, uint32_t u32ErrorCode) … … 7724 7719 * software exceptions). 7725 7720 * @param u32ErrCode The VM-entry exception error code. 7726 * @param GCPtrFaultAddress The page-fault address for #PF exceptions.7721 * @param GCPtrFaultAddress The page-fault address for \#PF exceptions. 7727 7722 * @param puIntrState Pointer to the current guest interruptibility-state. 7728 7723 * This interruptibility-state will be updated if … … 10377 10372 10378 10373 /** 10379 * VM-exit handler for instructions that result in a #UD exception delivered to10374 * VM-exit handler for instructions that result in a \#UD exception delivered to 10380 10375 * the guest. 10381 10376 */ … … 11503 11498 11504 11499 /** 11505 * VM-exit exception handler for #MF (Math Fault: floating point exception).11500 * VM-exit exception handler for \#MF (Math Fault: floating point exception). 11506 11501 */ 11507 11502 static int hmR0VmxExitXcptMF(PVMCPU pVCpu, PCPUMCTX pMixedCtx, PVMXTRANSIENT pVmxTransient) … … 11533 11528 11534 11529 /** 11535 * VM-exit exception handler for #BP (Breakpoint exception).11530 * VM-exit exception handler for \#BP (Breakpoint exception). 11536 11531 */ 11537 11532 static int hmR0VmxExitXcptBP(PVMCPU pVCpu, PCPUMCTX pMixedCtx, PVMXTRANSIENT pVmxTransient) … … 11564 11559 11565 11560 /** 11566 * VM-exit exception handler for #DB (Debug exception).11561 * VM-exit exception handler for \#DB (Debug exception). 11567 11562 */ 11568 11563 static int hmR0VmxExitXcptDB(PVMCPU pVCpu, PCPUMCTX pMixedCtx, PVMXTRANSIENT pVmxTransient) … … 11647 11642 11648 11643 /** 11649 * VM-exit exception handler for #NM (Device-not-available exception: floating11644 * VM-exit exception handler for \#NM (Device-not-available exception: floating 11650 11645 * point exception). 11651 11646 */ … … 11703 11698 11704 11699 /** 11705 * VM-exit exception handler for #GP (General-protection exception).11700 * VM-exit exception handler for \#GP (General-protection exception). 11706 11701 * 11707 11702 * @remarks Requires pVmxTransient->uExitIntInfo to be up-to-date. … … 12018 12013 12019 12014 /** 12020 * VM-exit exception handler for #PF (Page-fault exception).12015 * VM-exit exception handler for \#PF (Page-fault exception). 12021 12016 */ 12022 12017 static int hmR0VmxExitXcptPF(PVMCPU pVCpu, PCPUMCTX pMixedCtx, PVMXTRANSIENT pVmxTransient) -
trunk/src/VBox/VMM/VMMR0/PGMR0.cpp
r57358 r58116 409 409 410 410 /** 411 * #PF Handler for nested paging.411 * \#PF Handler for nested paging. 412 412 * 413 413 * @returns VBox status code (appropriate for trap handling and GC return). … … 535 535 536 536 /** 537 * #PF Handler for deliberate nested paging misconfiguration (/reserved bit)537 * \#PF Handler for deliberate nested paging misconfiguration (/reserved bit) 538 538 * employed for MMIO pages. 539 539 * -
trunk/src/VBox/VMM/VMMR3/CPUMDbg.cpp
r57358 r58116 35 35 36 36 /** 37 * @interface_method_impl{DBGFREGDESC, 37 * @interface_method_impl{DBGFREGDESC,pfnGet} 38 38 */ 39 39 static DECLCALLBACK(int) cpumR3RegGet_Generic(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 58 58 59 59 /** 60 * @interface_method_impl{DBGFREGDESC, 60 * @interface_method_impl{DBGFREGDESC,pfnSet} 61 61 */ 62 62 static DECLCALLBACK(int) cpumR3RegSet_Generic(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 104 104 105 105 /** 106 * @interface_method_impl{DBGFREGDESC, 106 * @interface_method_impl{DBGFREGDESC,pfnGet} 107 107 */ 108 108 static DECLCALLBACK(int) cpumR3RegGet_XStateGeneric(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 127 127 128 128 /** 129 * @interface_method_impl{DBGFREGDESC, 129 * @interface_method_impl{DBGFREGDESC,pfnSet} 130 130 */ 131 131 static DECLCALLBACK(int) cpumR3RegSet_XStateGeneric(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 174 174 175 175 /** 176 * @interface_method_impl{DBGFREGDESC, 176 * @interface_method_impl{DBGFREGDESC,pfnGet} 177 177 */ 178 178 static DECLCALLBACK(int) cpumR3RegSet_seg(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 185 185 186 186 /** 187 * @interface_method_impl{DBGFREGDESC, 187 * @interface_method_impl{DBGFREGDESC,pfnGet} 188 188 */ 189 189 static DECLCALLBACK(int) cpumR3RegGet_gdtr(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 202 202 203 203 /** 204 * @interface_method_impl{DBGFREGDESC, 204 * @interface_method_impl{DBGFREGDESC,pfnGet} 205 205 */ 206 206 static DECLCALLBACK(int) cpumR3RegSet_gdtr(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 212 212 213 213 /** 214 * @interface_method_impl{DBGFREGDESC, 214 * @interface_method_impl{DBGFREGDESC,pfnGet} 215 215 */ 216 216 static DECLCALLBACK(int) cpumR3RegGet_idtr(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 229 229 230 230 /** 231 * @interface_method_impl{DBGFREGDESC, 231 * @interface_method_impl{DBGFREGDESC,pfnGet} 232 232 */ 233 233 static DECLCALLBACK(int) cpumR3RegSet_idtr(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 273 273 274 274 /** 275 * @interface_method_impl{DBGFREGDESC, 275 * @interface_method_impl{DBGFREGDESC,pfnGet} 276 276 */ 277 277 static DECLCALLBACK(int) cpumR3RegGet_ftw(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 296 296 297 297 /** 298 * @interface_method_impl{DBGFREGDESC, 298 * @interface_method_impl{DBGFREGDESC,pfnGet} 299 299 */ 300 300 static DECLCALLBACK(int) cpumR3RegSet_ftw(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 306 306 307 307 /** 308 * @interface_method_impl{DBGFREGDESC, 308 * @interface_method_impl{DBGFREGDESC,pfnGet} 309 309 */ 310 310 static DECLCALLBACK(int) cpumR3RegGet_Dummy(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 333 333 334 334 /** 335 * @interface_method_impl{DBGFREGDESC, 335 * @interface_method_impl{DBGFREGDESC,pfnSet} 336 336 */ 337 337 static DECLCALLBACK(int) cpumR3RegSet_Dummy(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 350 350 351 351 /** 352 * @interface_method_impl{DBGFREGDESC, 352 * @interface_method_impl{DBGFREGDESC,pfnGet} 353 353 */ 354 354 static DECLCALLBACK(int) cpumR3RegGstGet_crX(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 372 372 373 373 /** 374 * @interface_method_impl{DBGFREGDESC, 374 * @interface_method_impl{DBGFREGDESC,pfnGet} 375 375 */ 376 376 static DECLCALLBACK(int) cpumR3RegGstSet_crX(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 430 430 431 431 /** 432 * @interface_method_impl{DBGFREGDESC, 432 * @interface_method_impl{DBGFREGDESC,pfnGet} 433 433 */ 434 434 static DECLCALLBACK(int) cpumR3RegGstGet_drX(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 452 452 453 453 /** 454 * @interface_method_impl{DBGFREGDESC, 454 * @interface_method_impl{DBGFREGDESC,pfnGet} 455 455 */ 456 456 static DECLCALLBACK(int) cpumR3RegGstSet_drX(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 500 500 501 501 /** 502 * @interface_method_impl{DBGFREGDESC, 502 * @interface_method_impl{DBGFREGDESC,pfnGet} 503 503 */ 504 504 static DECLCALLBACK(int) cpumR3RegGstGet_msr(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 529 529 530 530 /** 531 * @interface_method_impl{DBGFREGDESC, 531 * @interface_method_impl{DBGFREGDESC,pfnGet} 532 532 */ 533 533 static DECLCALLBACK(int) cpumR3RegGstSet_msr(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 588 588 589 589 /** 590 * @interface_method_impl{DBGFREGDESC, 590 * @interface_method_impl{DBGFREGDESC,pfnGet} 591 591 */ 592 592 static DECLCALLBACK(int) cpumR3RegGstGet_stN(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 607 607 608 608 /** 609 * @interface_method_impl{DBGFREGDESC, 609 * @interface_method_impl{DBGFREGDESC,pfnGet} 610 610 */ 611 611 static DECLCALLBACK(int) cpumR3RegGstSet_stN(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 624 624 625 625 /** 626 * @interface_method_impl{DBGFREGDESC, 626 * @interface_method_impl{DBGFREGDESC,pfnGet} 627 627 */ 628 628 static DECLCALLBACK(int) cpumR3RegHyperGet_crX(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 654 654 655 655 /** 656 * @interface_method_impl{DBGFREGDESC, 656 * @interface_method_impl{DBGFREGDESC,pfnGet} 657 657 */ 658 658 static DECLCALLBACK(int) cpumR3RegHyperSet_crX(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 665 665 666 666 /** 667 * @interface_method_impl{DBGFREGDESC, 667 * @interface_method_impl{DBGFREGDESC,pfnGet} 668 668 */ 669 669 static DECLCALLBACK(int) cpumR3RegHyperGet_drX(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 696 696 697 697 /** 698 * @interface_method_impl{DBGFREGDESC, 698 * @interface_method_impl{DBGFREGDESC,pfnGet} 699 699 */ 700 700 static DECLCALLBACK(int) cpumR3RegHyperSet_drX(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) … … 707 707 708 708 /** 709 * @interface_method_impl{DBGFREGDESC, 709 * @interface_method_impl{DBGFREGDESC,pfnGet} 710 710 */ 711 711 static DECLCALLBACK(int) cpumR3RegHyperGet_msr(void *pvUser, PCDBGFREGDESC pDesc, PDBGFREGVAL pValue) … … 728 728 729 729 /** 730 * @interface_method_impl{DBGFREGDESC, 730 * @interface_method_impl{DBGFREGDESC,pfnGet} 731 731 */ 732 732 static DECLCALLBACK(int) cpumR3RegHyperSet_msr(void *pvUser, PCDBGFREGDESC pDesc, PCDBGFREGVAL pValue, PCDBGFREGVAL pfMask) -
trunk/src/VBox/VMM/VMMR3/CSAM.cpp
r57389 r58116 1467 1467 * @param pfnCSAMR3Analyse Callback for testing the disassembled instruction 1468 1468 * @param pUserData User pointer (callback specific) 1469 * 1469 * @param pCacheRec GC to HC cache record. 1470 1470 */ 1471 1471 static int csamAnalyseCodeStream(PVM pVM, RCPTRTYPE(uint8_t *) pInstrGC, RCPTRTYPE(uint8_t *) pCurInstrGC, bool fCode32, … … 2351 2351 * calling EMT. 2352 2352 * @param GCPtr The virtual address the guest has changed. 2353 * @param pvUser Ignored. 2353 2354 * 2354 2355 * @remarks Not currently called by PGM. It was actually only called for a month -
trunk/src/VBox/VMM/VMMR3/DBGFR3PlugIn.cpp
r57358 r58116 596 596 597 597 /** 598 * @ interface_method_impl{FNDBGFHANDLERINT, The 'plugins' info item.}598 * @callback_method_impl{FNDBGFHANDLERINT, The 'plugins' info item.} 599 599 */ 600 600 static DECLCALLBACK(void) dbgfR3PlugInInfoList(PVM pVM, PCDBGFINFOHLP pHlp, const char *pszArgs) -
trunk/src/VBox/VMM/VMMR3/GIM.cpp
r57989 r58116 529 529 * 530 530 * @todo In the future we might want to let the GIM provider decide what the 531 * handler should do (like throwing #GP faults).531 * handler should do (like throwing \#GP faults). 532 532 */ 533 533 static DECLCALLBACK(VBOXSTRICTRC) … … 539 539 */ 540 540 Assert(enmAccessType == PGMACCESSTYPE_WRITE); 541 return VINF_SUCCESS; /** @todo Hyper-V says we should #GP(0) fault for writes to the Hypercall and TSC page. */ 542 } 543 544 545 /** 546 * Maps a registered MMIO2 region in the guest address space. The region will be 547 * made read-only and writes from the guest will be ignored. 541 return VINF_SUCCESS; /** @todo Hyper-V says we should \#GP(0) fault for writes to the Hypercall and TSC page. */ 542 } 543 544 545 /** 546 * Maps a registered MMIO2 region in the guest address space. 547 * 548 * The region will be made read-only and writes from the guest will be ignored. 548 549 * 549 550 * @returns VBox status code. -
trunk/src/VBox/VMM/VMMR3/MMHeap.cpp
r57358 r58116 47 47 * 48 48 * @returns VBox status. 49 * @param p VM The handle to the VM the heap should be associated with.49 * @param pUVM Pointer to the user mode VM structure. 50 50 * @param ppHeap Where to store the heap pointer. 51 51 */ -
trunk/src/VBox/VMM/VMMR3/MMPagePool.cpp
r57358 r58116 63 63 * Allocate the pool structures. 64 64 */ 65 /** @todo @bu fref{1865},@bufref{3202}: mapping the page pool page into66 * ring-0.Need to change the ways we allocate it... */65 /** @todo @bugref{1865},@bugref{3202}: mapping the page pool page into ring-0. 66 * Need to change the ways we allocate it... */ 67 67 AssertReleaseReturn(sizeof(*pVM->mm.s.pPagePoolR3) + sizeof(*pVM->mm.s.pPagePoolLowR3) < PAGE_SIZE, VERR_INTERNAL_ERROR); 68 68 int rc = SUPR3PageAllocEx(1, 0 /*fFlags*/, (void **)&pVM->mm.s.pPagePoolR3, NULL /*pR0Ptr*/, NULL /*paPages*/); -
trunk/src/VBox/VMM/VMMR3/MMUkHeap.cpp
r57358 r58116 49 49 * 50 50 * @returns VBox status. 51 * @param p VM The handle to the VM the heap should be associated with.51 * @param pUVM Pointer to the user mode VM structure. 52 52 * @param ppHeap Where to store the heap pointer. 53 53 */ -
trunk/src/VBox/VMM/VMMR3/PATMR3Dbg.cpp
r57358 r58116 295 295 ADD_MEMBER(hDbgMod, PATMGCSTATE, Restore.uFlags, "Restore.uFlags"); 296 296 297 rc = RTDbgAsModuleLink(hDbgAs, hDbgMod, pVM->patm.s.pGCStateGC, 0 /*fFlags /*/);297 rc = RTDbgAsModuleLink(hDbgAs, hDbgMod, pVM->patm.s.pGCStateGC, 0 /*fFlags*/); 298 298 AssertLogRelRC(rc); 299 299 RTDbgModRelease(hDbgMod); … … 309 309 ADD_FUNC(hDbgMod, pVM->patm.s.pStatsGC, pVM->patm.s.pStatsGC, PATM_STAT_MEMSIZE, "PATMMemStatsStart"); 310 310 311 rc = RTDbgAsModuleLink(hDbgAs, hDbgMod, pVM->patm.s.pStatsGC, 0 /*fFlags /*/);311 rc = RTDbgAsModuleLink(hDbgAs, hDbgMod, pVM->patm.s.pStatsGC, 0 /*fFlags*/); 312 312 AssertLogRelRC(rc); 313 313 RTDbgModRelease(hDbgMod); … … 323 323 patmR3DbgAddPatches(pVM, hDbgMod); 324 324 325 rc = RTDbgAsModuleLink(hDbgAs, hDbgMod, pVM->patm.s.pPatchMemGC, 0 /*fFlags /*/);325 rc = RTDbgAsModuleLink(hDbgAs, hDbgMod, pVM->patm.s.pPatchMemGC, 0 /*fFlags*/); 326 326 AssertLogRelRC(rc); 327 327 } -
trunk/src/VBox/VMM/VMMR3/PDMCritSect.cpp
r57358 r58116 132 132 * @param pCritSect The critical section. 133 133 * @param pvKey The owner key. 134 * @param RT_SRC_POS_DECLThe source position.134 * @param SRC_POS The source position. 135 135 * @param pszName The name of the critical section (for statistics). 136 136 * @param pszNameFmt Format string for naming the critical section. For … … 219 219 * @param pCritSect The read/write critical section. 220 220 * @param pvKey The owner key. 221 * @param RT_SRC_POS_DECLThe source position.221 * @param SRC_POS The source position. 222 222 * @param pszName The name of the critical section (for statistics). 223 223 * @param pszNameFmt Format string for naming the critical section. For … … 325 325 * @param pDevIns Device instance. 326 326 * @param pCritSect Pointer to the critical section. 327 * @param RT_SRC_POS_DECLUse RT_SRC_POS.327 * @param SRC_POS Use RT_SRC_POS. 328 328 * @param pszNameFmt Format string for naming the critical section. For 329 329 * statistics and lock validation. … … 355 355 * @param pDevIns Device instance. 356 356 * @param pCritSect Pointer to the read/write critical section. 357 * @param RT_SRC_POS_DECLUse RT_SRC_POS.357 * @param SRC_POS Use RT_SRC_POS. 358 358 * @param pszNameFmt Format string for naming the critical section. For 359 359 * statistics and lock validation. … … 382 382 * @param pDevIns Device instance. 383 383 * @param pCritSect Pointer to the critical section. 384 * @param SRC_POS The source position. Optional. 384 385 * @param pszNameFmt Format string for naming the critical section. For 385 386 * statistics and lock validation. … … 400 401 * @param pDevIns Device instance. 401 402 * @param pCritSect Pointer to the read/write critical section. 403 * @param SRC_POS The source position. Optional. 402 404 * @param pszNameFmt Format string for naming the critical section. For 403 405 * statistics and lock validation. … … 417 419 * @param pVM Pointer to the VM. 418 420 * @param pDevIns Device instance. 421 * @param SRC_POS The source position. Optional. 419 422 * @param pCritSect Pointer to the critical section. 420 423 */ … … 439 442 * @param pDrvIns Driver instance. 440 443 * @param pCritSect Pointer to the critical section. 444 * @param SRC_POS The source position. Optional. 441 445 * @param pszNameFmt Format string for naming the critical section. For 442 446 * statistics and lock validation. … … 461 465 * @param pDrvIns Driver instance. 462 466 * @param pCritSect Pointer to the read/write critical section. 467 * @param SRC_POS The source position. Optional. 463 468 * @param pszNameFmt Format string for naming the critical section. For 464 469 * statistics and lock validation. -
trunk/src/VBox/VMM/VMMR3/PDMDevHlp.cpp
r57358 r58116 2136 2136 2137 2137 2138 /** @interface_method_impl{PDMDEVHLP ,pfnLdrGetRCInterfaceSymbols} */2138 /** @interface_method_impl{PDMDEVHLPR3,pfnLdrGetRCInterfaceSymbols} */ 2139 2139 static DECLCALLBACK(int) pdmR3DevHlp_LdrGetRCInterfaceSymbols(PPDMDEVINS pDevIns, void *pvInterface, size_t cbInterface, 2140 2140 const char *pszSymPrefix, const char *pszSymList) … … 2174 2174 2175 2175 2176 /** @interface_method_impl{PDMDEVHLP ,pfnLdrGetR0InterfaceSymbols} */2176 /** @interface_method_impl{PDMDEVHLPR3,pfnLdrGetR0InterfaceSymbols} */ 2177 2177 static DECLCALLBACK(int) pdmR3DevHlp_LdrGetR0InterfaceSymbols(PPDMDEVINS pDevIns, void *pvInterface, size_t cbInterface, 2178 2178 const char *pszSymPrefix, const char *pszSymList) … … 2212 2212 2213 2213 2214 /** @interface_method_impl{PDMDEVHLP ,pfnCallR0} */2214 /** @interface_method_impl{PDMDEVHLPR3,pfnCallR0} */ 2215 2215 static DECLCALLBACK(int) pdmR3DevHlp_CallR0(PPDMDEVINS pDevIns, uint32_t uOperation, uint64_t u64Arg) 2216 2216 { … … 2261 2261 2262 2262 2263 /** @interface_method_impl{PDMDEVHLP ,pfnVMGetSuspendReason} */2263 /** @interface_method_impl{PDMDEVHLPR3,pfnVMGetSuspendReason} */ 2264 2264 static DECLCALLBACK(VMSUSPENDREASON) pdmR3DevHlp_VMGetSuspendReason(PPDMDEVINS pDevIns) 2265 2265 { … … 2274 2274 2275 2275 2276 /** @interface_method_impl{PDMDEVHLP ,pfnVMGetResumeReason} */2276 /** @interface_method_impl{PDMDEVHLPR3,pfnVMGetResumeReason} */ 2277 2277 static DECLCALLBACK(VMRESUMEREASON) pdmR3DevHlp_VMGetResumeReason(PPDMDEVINS pDevIns) 2278 2278 { -
trunk/src/VBox/VMM/VMMR3/PDMDevMiscHlp.cpp
r57358 r58116 312 312 } 313 313 314 314 315 /** @interface_method_impl{PDMAPICHLPR3,pfnSendInitIpi} */ 315 316 static DECLCALLBACK(void) pdmR3ApicHlp_SendInitIpi(PPDMDEVINS pDevIns, VMCPUID idCpu) … … 319 320 VMMR3SendInitIpi(pDevIns->Internal.s.pVMR3, idCpu); 320 321 } 322 321 323 322 324 /** @interface_method_impl{PDMAPICHLPR3,pfnGetRCHelpers} */ … … 529 531 530 532 /** @interface_method_impl{PDMPCIHLPR3,pfnIoApicSendMsi} */ 531 static DECLCALLBACK(void) pdmR3PciHlp_IoApicSendMsi(PPDMDEVINS pDevIns, RTGCPHYS GC Addr, uint32_t uValue, uint32_t uTagSrc)532 { 533 PDMDEV_ASSERT_DEVINS(pDevIns); 534 Log4(("pdmR3PciHlp_IoApicSendMsi: address=%p value=%x uTagSrc=%#x\n", GC Addr, uValue, uTagSrc));535 PDMIoApicSendMsi(pDevIns->Internal.s.pVMR3, GC Addr, uValue, uTagSrc);533 static DECLCALLBACK(void) pdmR3PciHlp_IoApicSendMsi(PPDMDEVINS pDevIns, RTGCPHYS GCPhys, uint32_t uValue, uint32_t uTagSrc) 534 { 535 PDMDEV_ASSERT_DEVINS(pDevIns); 536 Log4(("pdmR3PciHlp_IoApicSendMsi: address=%p value=%x uTagSrc=%#x\n", GCPhys, uValue, uTagSrc)); 537 PDMIoApicSendMsi(pDevIns->Internal.s.pVMR3, GCPhys, uValue, uTagSrc); 536 538 } 537 539 -
trunk/src/VBox/VMM/VMMR3/PDMDriver.cpp
r57684 r58116 985 985 */ 986 986 987 /** @interface_method_impl{PDMDRVHLP ,pfnAttach} */987 /** @interface_method_impl{PDMDRVHLPR3,pfnAttach} */ 988 988 static DECLCALLBACK(int) pdmR3DrvHlp_Attach(PPDMDRVINS pDrvIns, uint32_t fFlags, PPDMIBASE *ppBaseInterface) 989 989 { … … 1023 1023 1024 1024 1025 /** @interface_method_impl{PDMDRVHLP ,pfnDetach} */1025 /** @interface_method_impl{PDMDRVHLPR3,pfnDetach} */ 1026 1026 static DECLCALLBACK(int) pdmR3DrvHlp_Detach(PPDMDRVINS pDrvIns, uint32_t fFlags) 1027 1027 { … … 1049 1049 1050 1050 1051 /** @interface_method_impl{PDMDRVHLP ,pfnDetachSelf} */1051 /** @interface_method_impl{PDMDRVHLPR3,pfnDetachSelf} */ 1052 1052 static DECLCALLBACK(int) pdmR3DrvHlp_DetachSelf(PPDMDRVINS pDrvIns, uint32_t fFlags) 1053 1053 { … … 1064 1064 1065 1065 1066 /** @interface_method_impl{PDMDRVHLP ,pfnMountPrepare} */1066 /** @interface_method_impl{PDMDRVHLPR3,pfnMountPrepare} */ 1067 1067 static DECLCALLBACK(int) pdmR3DrvHlp_MountPrepare(PPDMDRVINS pDrvIns, const char *pszFilename, const char *pszCoreDriver) 1068 1068 { … … 1138 1138 1139 1139 1140 /** @interface_method_impl{PDMDRVHLP ,pfnAssertEMT} */1140 /** @interface_method_impl{PDMDRVHLPR3,pfnAssertEMT} */ 1141 1141 static DECLCALLBACK(bool) pdmR3DrvHlp_AssertEMT(PPDMDRVINS pDrvIns, const char *pszFile, unsigned iLine, const char *pszFunction) 1142 1142 { … … 1154 1154 1155 1155 1156 /** @interface_method_impl{PDMDRVHLP ,pfnAssertOther} */1156 /** @interface_method_impl{PDMDRVHLPR3,pfnAssertOther} */ 1157 1157 static DECLCALLBACK(bool) pdmR3DrvHlp_AssertOther(PPDMDRVINS pDrvIns, const char *pszFile, unsigned iLine, const char *pszFunction) 1158 1158 { … … 1170 1170 1171 1171 1172 /** @interface_method_impl{PDMDRVHLP ,pfnVMSetError} */1172 /** @interface_method_impl{PDMDRVHLPR3,pfnVMSetError} */ 1173 1173 static DECLCALLBACK(int) pdmR3DrvHlp_VMSetError(PPDMDRVINS pDrvIns, int rc, RT_SRC_POS_DECL, const char *pszFormat, ...) 1174 1174 { … … 1182 1182 1183 1183 1184 /** @interface_method_impl{PDMDRVHLP ,pfnVMSetErrorV} */1184 /** @interface_method_impl{PDMDRVHLPR3,pfnVMSetErrorV} */ 1185 1185 static DECLCALLBACK(int) pdmR3DrvHlp_VMSetErrorV(PPDMDRVINS pDrvIns, int rc, RT_SRC_POS_DECL, const char *pszFormat, va_list va) 1186 1186 { … … 1191 1191 1192 1192 1193 /** @interface_method_impl{PDMDRVHLP ,pfnVMSetRuntimeError} */1193 /** @interface_method_impl{PDMDRVHLPR3,pfnVMSetRuntimeError} */ 1194 1194 static DECLCALLBACK(int) pdmR3DrvHlp_VMSetRuntimeError(PPDMDRVINS pDrvIns, uint32_t fFlags, const char *pszErrorId, const char *pszFormat, ...) 1195 1195 { … … 1203 1203 1204 1204 1205 /** @interface_method_impl{PDMDRVHLP ,pfnVMSetRuntimeErrorV} */1205 /** @interface_method_impl{PDMDRVHLPR3,pfnVMSetRuntimeErrorV} */ 1206 1206 static DECLCALLBACK(int) pdmR3DrvHlp_VMSetRuntimeErrorV(PPDMDRVINS pDrvIns, uint32_t fFlags, const char *pszErrorId, const char *pszFormat, va_list va) 1207 1207 { … … 1212 1212 1213 1213 1214 /** @interface_method_impl{PDMD EVHLPR3,pfnVMState} */1214 /** @interface_method_impl{PDMDRVHLPR3,pfnVMState} */ 1215 1215 static DECLCALLBACK(VMSTATE) pdmR3DrvHlp_VMState(PPDMDRVINS pDrvIns) 1216 1216 { … … 1225 1225 1226 1226 1227 /** @interface_method_impl{PDMD EVHLPR3,pfnVMTeleportedAndNotFullyResumedYet} */1227 /** @interface_method_impl{PDMDRVHLPR3,pfnVMTeleportedAndNotFullyResumedYet} */ 1228 1228 static DECLCALLBACK(bool) pdmR3DrvHlp_VMTeleportedAndNotFullyResumedYet(PPDMDRVINS pDrvIns) 1229 1229 { … … 1238 1238 1239 1239 1240 /** @interface_method_impl{PDMD EVHLPR3,pfnGetSupDrvSession} */1240 /** @interface_method_impl{PDMDRVHLPR3,pfnGetSupDrvSession} */ 1241 1241 static DECLCALLBACK(PSUPDRVSESSION) pdmR3DrvHlp_GetSupDrvSession(PPDMDRVINS pDrvIns) 1242 1242 { … … 1250 1250 1251 1251 1252 /** @interface_method_impl{PDMDRVHLP ,pfnQueueCreate} */1252 /** @interface_method_impl{PDMDRVHLPR3,pfnQueueCreate} */ 1253 1253 static DECLCALLBACK(int) pdmR3DrvHlp_QueueCreate(PPDMDRVINS pDrvIns, uint32_t cbItem, uint32_t cItems, uint32_t cMilliesInterval, 1254 1254 PFNPDMQUEUEDRV pfnCallback, const char *pszName, PPDMQUEUE *ppQueue) … … 1273 1273 1274 1274 1275 /** @interface_method_impl{PDMDRVHLP ,pfnTMGetVirtualFreq} */1275 /** @interface_method_impl{PDMDRVHLPR3,pfnTMGetVirtualFreq} */ 1276 1276 static DECLCALLBACK(uint64_t) pdmR3DrvHlp_TMGetVirtualFreq(PPDMDRVINS pDrvIns) 1277 1277 { … … 1282 1282 1283 1283 1284 /** @interface_method_impl{PDMDRVHLP ,pfnTMGetVirtualTime} */1284 /** @interface_method_impl{PDMDRVHLPR3,pfnTMGetVirtualTime} */ 1285 1285 static DECLCALLBACK(uint64_t) pdmR3DrvHlp_TMGetVirtualTime(PPDMDRVINS pDrvIns) 1286 1286 { … … 1291 1291 1292 1292 1293 /** @interface_method_impl{PDMDRVHLP ,pfnTMTimerCreate} */1293 /** @interface_method_impl{PDMDRVHLPR3,pfnTMTimerCreate} */ 1294 1294 static DECLCALLBACK(int) pdmR3DrvHlp_TMTimerCreate(PPDMDRVINS pDrvIns, TMCLOCK enmClock, PFNTMTIMERDRV pfnCallback, void *pvUser, uint32_t fFlags, const char *pszDesc, PPTMTIMERR3 ppTimer) 1295 1295 { … … 1306 1306 1307 1307 1308 /** @interface_method_impl{PDMDRVHLP ,pfnSSMRegister} */1308 /** @interface_method_impl{PDMDRVHLPR3,pfnSSMRegister} */ 1309 1309 static DECLCALLBACK(int) pdmR3DrvHlp_SSMRegister(PPDMDRVINS pDrvIns, uint32_t uVersion, size_t cbGuess, 1310 1310 PFNSSMDRVLIVEPREP pfnLivePrep, PFNSSMDRVLIVEEXEC pfnLiveExec, PFNSSMDRVLIVEVOTE pfnLiveVote, … … 1331 1331 1332 1332 1333 /** @interface_method_impl{PDMDRVHLP ,pfnSSMDeregister} */1334 static DECLCALLBACK(int) pdmR3DrvHlp_SSMDeregister(PPDMDRVINS pDrvIns, const char *pszName, uint32_t u 32Instance)1333 /** @interface_method_impl{PDMDRVHLPR3,pfnSSMDeregister} */ 1334 static DECLCALLBACK(int) pdmR3DrvHlp_SSMDeregister(PPDMDRVINS pDrvIns, const char *pszName, uint32_t uInstance) 1335 1335 { 1336 1336 PDMDRV_ASSERT_DRVINS(pDrvIns); 1337 1337 VM_ASSERT_EMT(pDrvIns->Internal.s.pVMR3); 1338 LogFlow(("pdmR3DrvHlp_SSMDeregister: caller='%s'/%d: pszName=%p:{%s} u 32Instance=%#x\n",1339 pDrvIns->pReg->szName, pDrvIns->iInstance, pszName, pszName, u 32Instance));1340 1341 int rc = SSMR3DeregisterDriver(pDrvIns->Internal.s.pVMR3, pDrvIns, pszName, u 32Instance);1338 LogFlow(("pdmR3DrvHlp_SSMDeregister: caller='%s'/%d: pszName=%p:{%s} uInstance=%#x\n", 1339 pDrvIns->pReg->szName, pDrvIns->iInstance, pszName, pszName, uInstance)); 1340 1341 int rc = SSMR3DeregisterDriver(pDrvIns->Internal.s.pVMR3, pDrvIns, pszName, uInstance); 1342 1342 1343 1343 LogFlow(("pdmR3DrvHlp_SSMDeregister: caller='%s'/%d: returns %Rrc\n", pDrvIns->pReg->szName, pDrvIns->iInstance, rc)); … … 1346 1346 1347 1347 1348 /** @interface_method_impl{PDMD EVHLP,pfnDBGFInfoRegister} */1348 /** @interface_method_impl{PDMDRVHLPR3,pfnDBGFInfoRegister} */ 1349 1349 static DECLCALLBACK(int) pdmR3DrvHlp_DBGFInfoRegister(PPDMDRVINS pDrvIns, const char *pszName, const char *pszDesc, PFNDBGFHANDLERDRV pfnHandler) 1350 1350 { … … 1360 1360 1361 1361 1362 /** @interface_method_impl{PDMD EVHLP,pfnDBGFInfoDeregister} */1362 /** @interface_method_impl{PDMDRVHLPR3,pfnDBGFInfoDeregister} */ 1363 1363 static DECLCALLBACK(int) pdmR3DrvHlp_DBGFInfoDeregister(PPDMDRVINS pDrvIns, const char *pszName) 1364 1364 { … … 1375 1375 1376 1376 1377 /** @interface_method_impl{PDMDRVHLP ,pfnSTAMRegister} */1377 /** @interface_method_impl{PDMDRVHLPR3,pfnSTAMRegister} */ 1378 1378 static DECLCALLBACK(void) pdmR3DrvHlp_STAMRegister(PPDMDRVINS pDrvIns, void *pvSample, STAMTYPE enmType, const char *pszName, STAMUNIT enmUnit, const char *pszDesc) 1379 1379 { … … 1387 1387 1388 1388 1389 /** @interface_method_impl{PDMDRVHLP ,pfnSTAMRegisterF} */1389 /** @interface_method_impl{PDMDRVHLPR3,pfnSTAMRegisterF} */ 1390 1390 static DECLCALLBACK(void) pdmR3DrvHlp_STAMRegisterF(PPDMDRVINS pDrvIns, void *pvSample, STAMTYPE enmType, STAMVISIBILITY enmVisibility, 1391 1391 STAMUNIT enmUnit, const char *pszDesc, const char *pszName, ...) … … 1402 1402 1403 1403 1404 /** @interface_method_impl{PDMDRVHLP ,pfnSTAMRegisterV} */1404 /** @interface_method_impl{PDMDRVHLPR3,pfnSTAMRegisterV} */ 1405 1405 static DECLCALLBACK(void) pdmR3DrvHlp_STAMRegisterV(PPDMDRVINS pDrvIns, void *pvSample, STAMTYPE enmType, STAMVISIBILITY enmVisibility, 1406 1406 STAMUNIT enmUnit, const char *pszDesc, const char *pszName, va_list args) … … 1414 1414 1415 1415 1416 /** @interface_method_impl{PDMDRVHLP ,pfnSTAMDeregister} */1416 /** @interface_method_impl{PDMDRVHLPR3,pfnSTAMDeregister} */ 1417 1417 static DECLCALLBACK(int) pdmR3DrvHlp_STAMDeregister(PPDMDRVINS pDrvIns, void *pvSample) 1418 1418 { … … 1426 1426 1427 1427 1428 /** @interface_method_impl{PDMDRVHLP ,pfnSUPCallVMMR0Ex} */1428 /** @interface_method_impl{PDMDRVHLPR3,pfnSUPCallVMMR0Ex} */ 1429 1429 static DECLCALLBACK(int) pdmR3DrvHlp_SUPCallVMMR0Ex(PPDMDRVINS pDrvIns, unsigned uOperation, void *pvArg, unsigned cbArg) 1430 1430 { … … 1447 1447 1448 1448 1449 /** @interface_method_impl{PDMDRVHLP ,pfnUSBRegisterHub} */1449 /** @interface_method_impl{PDMDRVHLPR3,pfnUSBRegisterHub} */ 1450 1450 static DECLCALLBACK(int) pdmR3DrvHlp_USBRegisterHub(PPDMDRVINS pDrvIns, uint32_t fVersions, uint32_t cPorts, PCPDMUSBHUBREG pUsbHubReg, PPCPDMUSBHUBHLP ppUsbHubHlp) 1451 1451 { … … 1466 1466 1467 1467 1468 /** @interface_method_impl{PDMDRVHLP ,pfnSetAsyncNotification} */1468 /** @interface_method_impl{PDMDRVHLPR3,pfnSetAsyncNotification} */ 1469 1469 static DECLCALLBACK(int) pdmR3DrvHlp_SetAsyncNotification(PPDMDRVINS pDrvIns, PFNPDMDRVASYNCNOTIFY pfnAsyncNotify) 1470 1470 { … … 1495 1495 1496 1496 1497 /** @interface_method_impl{PDMDRVHLP ,pfnAsyncNotificationCompleted} */1497 /** @interface_method_impl{PDMDRVHLPR3,pfnAsyncNotificationCompleted} */ 1498 1498 static DECLCALLBACK(void) pdmR3DrvHlp_AsyncNotificationCompleted(PPDMDRVINS pDrvIns) 1499 1499 { … … 1518 1518 1519 1519 1520 /** @interface_method_impl{PDMDRVHLP ,pfnThreadCreate} */1520 /** @interface_method_impl{PDMDRVHLPR3,pfnThreadCreate} */ 1521 1521 static DECLCALLBACK(int) pdmR3DrvHlp_ThreadCreate(PPDMDRVINS pDrvIns, PPPDMTHREAD ppThread, void *pvUser, PFNPDMTHREADDRV pfnThread, 1522 1522 PFNPDMTHREADWAKEUPDRV pfnWakeup, size_t cbStack, RTTHREADTYPE enmType, const char *pszName) … … 1535 1535 1536 1536 1537 /** @interface_method_impl{PDMDRVHLP ,pfnAsyncCompletionTemplateCreate} */1537 /** @interface_method_impl{PDMDRVHLPR3,pfnAsyncCompletionTemplateCreate} */ 1538 1538 static DECLCALLBACK(int) pdmR3DrvHlp_AsyncCompletionTemplateCreate(PPDMDRVINS pDrvIns, PPPDMASYNCCOMPLETIONTEMPLATE ppTemplate, 1539 1539 PFNPDMASYNCCOMPLETEDRV pfnCompleted, void *pvTemplateUser, … … 1553 1553 1554 1554 #ifdef VBOX_WITH_NETSHAPER 1555 /** @interface_method_impl{PDMDRVHLP ,pfnNetShaperAttach} */1555 /** @interface_method_impl{PDMDRVHLPR3,pfnNetShaperAttach} */ 1556 1556 static DECLCALLBACK(int) pdmR3DrvHlp_NetShaperAttach(PPDMDRVINS pDrvIns, const char *pszBwGroup, PPDMNSFILTER pFilter) 1557 1557 { … … 1568 1568 1569 1569 1570 /** @interface_method_impl{PDMDRVHLP ,pfnNetShaperDetach} */1570 /** @interface_method_impl{PDMDRVHLPR3,pfnNetShaperDetach} */ 1571 1571 static DECLCALLBACK(int) pdmR3DrvHlp_NetShaperDetach(PPDMDRVINS pDrvIns, PPDMNSFILTER pFilter) 1572 1572 { … … 1584 1584 1585 1585 1586 /** @interface_method_impl{PDMDRVHLP ,pfnLdrGetRCInterfaceSymbols} */1586 /** @interface_method_impl{PDMDRVHLPR3,pfnLdrGetRCInterfaceSymbols} */ 1587 1587 static DECLCALLBACK(int) pdmR3DrvHlp_LdrGetRCInterfaceSymbols(PPDMDRVINS pDrvIns, void *pvInterface, size_t cbInterface, 1588 1588 const char *pszSymPrefix, const char *pszSymList) … … 1622 1622 1623 1623 1624 /** @interface_method_impl{PDMDRVHLP ,pfnLdrGetR0InterfaceSymbols} */1624 /** @interface_method_impl{PDMDRVHLPR3,pfnLdrGetR0InterfaceSymbols} */ 1625 1625 static DECLCALLBACK(int) pdmR3DrvHlp_LdrGetR0InterfaceSymbols(PPDMDRVINS pDrvIns, void *pvInterface, size_t cbInterface, 1626 1626 const char *pszSymPrefix, const char *pszSymList) … … 1660 1660 1661 1661 1662 /** @interface_method_impl{PDMDRVHLP ,pfnCritSectInit} */1662 /** @interface_method_impl{PDMDRVHLPR3,pfnCritSectInit} */ 1663 1663 static DECLCALLBACK(int) pdmR3DrvHlp_CritSectInit(PPDMDRVINS pDrvIns, PPDMCRITSECT pCritSect, 1664 1664 RT_SRC_POS_DECL, const char *pszName) … … 1678 1678 1679 1679 1680 /** @interface_method_impl{PDMDRVHLP ,pfnCallR0} */1680 /** @interface_method_impl{PDMDRVHLPR3,pfnCallR0} */ 1681 1681 static DECLCALLBACK(int) pdmR3DrvHlp_CallR0(PPDMDRVINS pDrvIns, uint32_t uOperation, uint64_t u64Arg) 1682 1682 { … … 1730 1730 1731 1731 1732 /** @interface_method_impl{PDMDRVHLP ,pfnFTSetCheckpoint} */1732 /** @interface_method_impl{PDMDRVHLPR3,pfnFTSetCheckpoint} */ 1733 1733 static DECLCALLBACK(int) pdmR3DrvHlp_FTSetCheckpoint(PPDMDRVINS pDrvIns, FTMCHECKPOINTTYPE enmType) 1734 1734 { … … 1738 1738 1739 1739 1740 /** @interface_method_impl{PDMDRVHLP ,pfnBlkCacheRetain} */1740 /** @interface_method_impl{PDMDRVHLPR3,pfnBlkCacheRetain} */ 1741 1741 static DECLCALLBACK(int) pdmR3DrvHlp_BlkCacheRetain(PPDMDRVINS pDrvIns, PPPDMBLKCACHE ppBlkCache, 1742 1742 PFNPDMBLKCACHEXFERCOMPLETEDRV pfnXferComplete, … … 1752 1752 1753 1753 1754 /** @interface_method_impl{PDMDRVHLP ,pfnVMGetSuspendReason} */1754 /** @interface_method_impl{PDMDRVHLPR3,pfnVMGetSuspendReason} */ 1755 1755 static DECLCALLBACK(VMSUSPENDREASON) pdmR3DrvHlp_VMGetSuspendReason(PPDMDRVINS pDrvIns) 1756 1756 { … … 1765 1765 1766 1766 1767 /** @interface_method_impl{PDMDRVHLP ,pfnVMGetResumeReason} */1767 /** @interface_method_impl{PDMDRVHLPR3,pfnVMGetResumeReason} */ 1768 1768 static DECLCALLBACK(VMRESUMEREASON) pdmR3DrvHlp_VMGetResumeReason(PPDMDRVINS pDrvIns) 1769 1769 { -
trunk/src/VBox/VMM/VMMR3/PDMLdr.cpp
r57377 r58116 1023 1023 * @returns NULL on failure. 1024 1024 * 1025 * @param pszFile File name (no path). 1025 * @param pszFile File name (no path). 1026 * @param fShared If true, search in the shared directory (/usr/lib on Unix), else 1027 * search in the private directory (/usr/lib/virtualbox on Unix). 1028 * Ignored if VBOX_PATH_SHARED_LIBS is not defined. 1026 1029 */ 1027 1030 char *pdmR3FileR3(const char *pszFile, bool fShared) -
trunk/src/VBox/VMM/VMMR3/PDMUsb.cpp
r57358 r58116 1483 1483 */ 1484 1484 1485 /** @interface_method_impl{PDMUSBHLP R3,pfnDriverAttach} */1485 /** @interface_method_impl{PDMUSBHLP,pfnDriverAttach} */ 1486 1486 static DECLCALLBACK(int) pdmR3UsbHlp_DriverAttach(PPDMUSBINS pUsbIns, RTUINT iLun, PPDMIBASE pBaseInterface, 1487 1487 PPDMIBASE *ppBaseInterface, const char *pszDesc) -
trunk/src/VBox/VMM/VMMR3/PGM.cpp
r57446 r58116 156 156 * 157 157 * 158 * @subsection sec_pgm_handlers_ virt Virtual Access Handlers158 * @subsection sec_pgm_handlers_phys Physical Access Handlers 159 159 * 160 160 * Placeholder. … … 249 249 * 250 250 * 251 * @s ubsection subsec_pgmPhys_Definitions Definitions251 * @section sec_pgmPhys_Definitions Definitions 252 252 * 253 253 * Allocation chunk - A RTR0MemObjAllocPhysNC object and the tracking … … 257 257 * 258 258 * 259 * @s ubsection subsec_pgmPhys_AllocPage Allocating a page.259 * @section sec_pgmPhys_AllocPage Allocating a page. 260 260 * 261 261 * Initially we map *all* guest memory to the (per VM) zero page, which … … 286 286 * 287 287 * 288 * @s ubsection subsec_pgmPhys_FreePage Freeing a page288 * @section sec_pgmPhys_FreePage Freeing a page 289 289 * 290 290 * There are a few points where a page can be freed: … … 316 316 * 317 317 * 318 * @s ubsection subsec_pgmPhys_SharePage Sharing a page318 * @section sec_pgmPhys_SharePage Sharing a page 319 319 * 320 320 * The basic idea is that there there will be a idle priority kernel … … 337 337 * 338 338 * 339 * @s ubsection subsec_pgmPhys_Fragmentation Fragmentation Concerns and Counter Measures339 * @section sec_pgmPhys_Fragmentation Fragmentation Concerns and Counter Measures 340 340 * 341 341 * The pages are organized in allocation chunks in ring-0, this is a necessity … … 365 365 * 366 366 * 367 * @s ubsection subsec_pgmPhys_Tracking Tracking Structures And Their Cost367 * @section sec_pgmPhys_Tracking Tracking Structures And Their Cost 368 368 * 369 369 * There's a difficult balance between keeping the per-page tracking structures … … 375 375 * 376 376 * 377 * @subs ubsection subsubsec_pgmPhys_Tracking_Kernel Kernel Space377 * @subsection subsec_pgmPhys_Tracking_Kernel Kernel Space 378 378 * 379 379 * @see pg_GMM 380 380 * 381 * @subs ubsection subsubsec_pgmPhys_Tracking_PerVM Per-VM381 * @subsection subsec_pgmPhys_Tracking_PerVM Per-VM 382 382 * 383 383 * Fixed info is the physical address of the page (HCPhys) and the page id … … 471 471 * 472 472 * 473 * @s ubsection subsec_pgmPhys_Serializing Serializing Access473 * @section sec_pgmPhys_Serializing Serializing Access 474 474 * 475 475 * Initially, we'll try a simple scheme: … … 496 496 * 497 497 * 498 * @s ubsection subsec_pgmPhys_Request VM Request interface498 * @section sec_pgmPhys_Request VM Request interface 499 499 * 500 500 * When in ring-0 it will become necessary to send requests to a VM so it can -
trunk/src/VBox/VMM/VMMR3/PGMPool.cpp
r57358 r58116 70 70 * 71 71 * 72 * @section sec_pgm_pool_ implMonitoring72 * @section sec_pgm_pool_monitoring Monitoring 73 73 * 74 74 * We always monitor PAGE_SIZE chunks of memory. When we've got multiple shadow -
trunk/src/VBox/VMM/VMMR3/SSM.cpp
r57358 r58116 8978 8978 * @param pSSM The saved state handle. 8979 8979 * @param rc The status code of the error. Use RT_SRC_POS. 8980 * @param RT_SRC_POS_DECLThe source location.8980 * @param SRC_POS The source location. 8981 8981 * @param pszFormat The message format string. 8982 8982 * @param ... Variable argument list. … … 8998 8998 * @param pSSM The saved state handle. 8999 8999 * @param rc The status code of the error. 9000 * @param RT_SRC_POS_DECLThe error location, use RT_SRC_POS.9000 * @param SRC_POS The error location, use RT_SRC_POS. 9001 9001 * @param pszFormat The message format string. 9002 9002 * @param va Variable argument list. … … 9058 9058 * @returns VERR_SSM_LOAD_CONFIG_MISMATCH. 9059 9059 * @param pSSM The saved state handle. 9060 * @param RT_SRC_POS_DECLThe error location, use RT_SRC_POS.9060 * @param SRC_POS The error location, use RT_SRC_POS. 9061 9061 * @param pszFormat The message format string. 9062 9062 * @param va Variable argument list. -
trunk/src/VBox/VMM/VMMR3/TM.cpp
r57431 r58116 285 285 pVM->tm.s.pfnVirtualGetRawR3 = tmVirtualNanoTSRediscover; 286 286 pVM->tm.s.VirtualGetRawDataR3.pfnRediscover = tmVirtualNanoTSRediscover; 287 pVM->tm.s.VirtualGetRawDataR3.pfnBad = tmVirtualNanoTSBad Prev;287 pVM->tm.s.VirtualGetRawDataR3.pfnBad = tmVirtualNanoTSBad; 288 288 pVM->tm.s.VirtualGetRawDataR3.pfnBadCpuIndex = tmVirtualNanoTSBadCpuIndex; 289 289 pVM->tm.s.VirtualGetRawDataR3.pu64Prev = &pVM->tm.s.u64VirtualRawPrev; … … 1020 1020 if (!HMIsEnabled(pVM)) 1021 1021 { 1022 rc = PDMR3LdrGetSymbolRC(pVM, NULL, "tmVirtualNanoTSBad Prev",&pVM->tm.s.VirtualGetRawDataRC.pfnBad);1022 rc = PDMR3LdrGetSymbolRC(pVM, NULL, "tmVirtualNanoTSBad", &pVM->tm.s.VirtualGetRawDataRC.pfnBad); 1023 1023 AssertRCReturn(rc, rc); 1024 1024 rc = PDMR3LdrGetSymbolRC(pVM, NULL, "tmVirtualNanoTSBadCpuIndex", &pVM->tm.s.VirtualGetRawDataRC.pfnBadCpuIndex); … … 1029 1029 } 1030 1030 1031 rc = PDMR3LdrGetSymbolR0(pVM, NULL, "tmVirtualNanoTSBad Prev",&pVM->tm.s.VirtualGetRawDataR0.pfnBad);1031 rc = PDMR3LdrGetSymbolR0(pVM, NULL, "tmVirtualNanoTSBad", &pVM->tm.s.VirtualGetRawDataR0.pfnBad); 1032 1032 AssertRCReturn(rc, rc); 1033 1033 rc = PDMR3LdrGetSymbolR0(pVM, NULL, "tmVirtualNanoTSBadCpuIndex", &pVM->tm.s.VirtualGetRawDataR0.pfnBadCpuIndex); -
trunk/src/VBox/VMM/VMMR3/VM.cpp
r58090 r58116 3829 3829 * @param pUVM Pointer to the user mode VM structure. 3830 3830 * @param rc The VBox status code. 3831 * @param RT_SRC_POS_DECLThe source position of this error.3831 * @param SRC_POS The source position of this error. 3832 3832 * @param pszFormat Format string. 3833 3833 * @param ... The arguments. … … 3849 3849 * @param pUVM Pointer to the user mode VM structure. 3850 3850 * @param rc The VBox status code. 3851 * @param RT_SRC_POS_DECLThe source position of this error.3851 * @param SRC_POS The source position of this error. 3852 3852 * @param pszFormat Format string. 3853 3853 * @param pArgs Pointer to the format arguments. … … 3909 3909 * @param pUVM The user mode VM handle. 3910 3910 * @param rc VBox status code. 3911 * @param RT_SRC_POS_DECLUse RT_SRC_POS.3911 * @param SRC_POS Use RT_SRC_POS. 3912 3912 * @param pszFormat Error message format string. 3913 3913 * @param ... Error message arguments. … … 3933 3933 * @param pUVM The user mode VM handle. 3934 3934 * @param rc VBox status code. 3935 * @param RT_SRC_POS_DECLUse RT_SRC_POS.3935 * @param SRC_POS Use RT_SRC_POS. 3936 3936 * @param pszFormat Error message format string. 3937 3937 * @param va Error message arguments. -
trunk/src/VBox/VMM/VMMRC/MMRamRC.cpp
r57358 r58116 73 73 74 74 /** 75 * Read data in guest context with #PF control.75 * Read data in guest context with \#PF control. 76 76 * 77 77 * @returns VBox status. … … 130 130 131 131 /** 132 * Write data in guest context with #PF control.132 * Write data in guest context with \#PF control. 133 133 * 134 134 * @returns VBox status. -
trunk/src/VBox/VMM/VMMRC/PDMRCDevice.cpp
r57358 r58116 165 165 166 166 167 /** @interface_method_impl{PDMD RVHLPRC,pfnPCISetIrq} */167 /** @interface_method_impl{PDMDEVHLPRC,pfnISASetIrq} */ 168 168 static DECLCALLBACK(void) pdmRCDevHlp_ISASetIrq(PPDMDEVINS pDevIns, int iIrq, int iLevel) 169 169 { … … 404 404 */ 405 405 406 /** @interface_method_impl{PDMPICHLP GC,pfnSetInterruptFF} */406 /** @interface_method_impl{PDMPICHLPRC,pfnSetInterruptFF} */ 407 407 static DECLCALLBACK(void) pdmRCPicHlp_SetInterruptFF(PPDMDEVINS pDevIns) 408 408 { … … 428 428 429 429 430 /** @interface_method_impl{PDMPICHLP GC,pfnClearInterruptFF} */430 /** @interface_method_impl{PDMPICHLPRC,pfnClearInterruptFF} */ 431 431 static DECLCALLBACK(void) pdmRCPicHlp_ClearInterruptFF(PPDMDEVINS pDevIns) 432 432 { … … 453 453 454 454 455 /** @interface_method_impl{PDMPICHLP GC,pfnLock} */455 /** @interface_method_impl{PDMPICHLPRC,pfnLock} */ 456 456 static DECLCALLBACK(int) pdmRCPicHlp_Lock(PPDMDEVINS pDevIns, int rc) 457 457 { … … 461 461 462 462 463 /** @interface_method_impl{PDMPICHLP GC,pfnUnlock} */463 /** @interface_method_impl{PDMPICHLPRC,pfnUnlock} */ 464 464 static DECLCALLBACK(void) pdmRCPicHlp_Unlock(PPDMDEVINS pDevIns) 465 465 { -
trunk/src/VBox/VMM/include/TMInternal.h
r57411 r58116 767 767 int tmVirtualPauseLocked(PVM pVM); 768 768 int tmVirtualResumeLocked(PVM pVM); 769 DECLCALLBACK(DECLEXPORT(void)) tmVirtualNanoTSBad Prev(PRTTIMENANOTSDATA pData, uint64_t u64NanoTS,770 769 DECLCALLBACK(DECLEXPORT(void)) tmVirtualNanoTSBad(PRTTIMENANOTSDATA pData, uint64_t u64NanoTS, 770 uint64_t u64DeltaPrev, uint64_t u64PrevNanoTS); 771 771 DECLCALLBACK(DECLEXPORT(uint64_t)) tmVirtualNanoTSRediscover(PRTTIMENANOTSDATA pData); 772 772 DECLCALLBACK(DECLEXPORT(uint64_t)) tmVirtualNanoTSBadCpuIndex(PRTTIMENANOTSDATA pData, uint16_t idApic,
Note:
See TracChangeset
for help on using the changeset viewer.