VirtualBox

Changeset 66104 in vbox


Ignore:
Timestamp:
Mar 15, 2017 10:06:21 AM (8 years ago)
Author:
vboxsync
Message:

VMM: trailing spaces

Location:
trunk/src/VBox/VMM
Files:
8 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/VMM/VMMAll/HMAll.cpp

    r66000 r66104  
    560560/**
    561561 * VMX nested-guest VM-exit handler.
    562  * 
    563  * @param   pVCpu              The cross context virtual CPU structure. 
    564  * @param   uBasicExitReason   The basic exit reason. 
     562 *
     563 * @param   pVCpu              The cross context virtual CPU structure.
     564 * @param   uBasicExitReason   The basic exit reason.
    565565 */
    566566VMM_INT_DECL(void) HMNstGstVmxVmExit(PVMCPU pVCpu, uint16_t uBasicExitReason)
  • trunk/src/VBox/VMM/VMMAll/IEMAll.cpp

    r66000 r66104  
    396396/**
    397397 * Check if an SVM control/instruction intercept is set.
    398  */ 
     398 */
    399399#define IEM_IS_SVM_CTRL_INTERCEPT_SET(a_pVCpu, a_Intercept) (CPUMIsGuestSvmCtrlInterceptSet(IEM_GET_CTX(a_pVCpu), (a_Intercept)))
    400400
    401 /** 
     401/**
    402402 * Check if an SVM read CRx intercept is set.
    403  */ 
     403 */
    404404#define IEM_IS_SVM_READ_CR_INTERCEPT_SET(a_pVCpu, a_uCr)    (CPUMIsGuestSvmCtrlInterceptSet(IEM_GET_CTX(a_pVCpu), (a_uCr)))
    405405
    406 /** 
     406/**
    407407 * Check if an SVM write CRx intercept is set.
    408  */ 
     408 */
    409409#define IEM_IS_SVM_WRITE_CR_INTERCEPT_SET(a_pVCpu, a_uCr)   (CPUMIsGuestSvmCtrlInterceptSet(IEM_GET_CTX(a_pVCpu), (a_uCr)))
    410410
    411 /** 
     411/**
    412412 * Check if an SVM read DRx intercept is set.
    413  */ 
     413 */
    414414#define IEM_IS_SVM_READ_DR_INTERCEPT_SET(a_pVCpu, a_uDr)    (CPUMIsGuestSvmCtrlInterceptSet(IEM_GET_CTX(a_pVCpu), (a_uDr)))
    415415
    416 /** 
     416/**
    417417 * Check if an SVM write DRx intercept is set.
    418  */ 
     418 */
    419419#define IEM_IS_SVM_WRITE_DR_INTERCEPT_SET(a_pVCpu, a_uDr)   (CPUMIsGuestSvmWriteDRxInterceptSet(IEM_GET_CTX(a_pVCpu), (a_uDr)))
    420420
    421 /** 
     421/**
    422422 * Check if an SVM exception intercept is set.
    423  */ 
     423 */
    424424#define IEM_IS_SVM_XCPT_INTERCEPT_SET(a_pVCpu, a_enmXcpt)   (CPUMIsGuestSvmXcptInterceptSet(IEM_GET_CTX(a_pVCpu), (a_enmXcpt)))
    425425#endif /* VBOX_WITH_NESTED_HWVIRT */
     
    1496814968/**
    1496914969 * Interface for HM and EM to emulate the STGI instruction.
    14970  * 
    14971  * @returns Strict VBox status code. 
     14970 *
     14971 * @returns Strict VBox status code.
    1497214972 * @param   pVCpu       The cross context virtual CPU structure of the calling EMT.
    14973  * @param   cbInstr     The instruction length in bytes. 
    14974  * @thread  EMT(pVCpu) 
     14973 * @param   cbInstr     The instruction length in bytes.
     14974 * @thread  EMT(pVCpu)
    1497514975 */
    1497614976VMM_INT_DECL(VBOXSTRICTRC) IEMExecDecodedClgi(PVMCPU pVCpu, uint8_t cbInstr)
     
    1498614986/**
    1498714987 * Interface for HM and EM to emulate the STGI instruction.
    14988  * 
    14989  * @returns Strict VBox status code. 
     14988 *
     14989 * @returns Strict VBox status code.
    1499014990 * @param   pVCpu       The cross context virtual CPU structure of the calling EMT.
    14991  * @param   cbInstr     The instruction length in bytes. 
    14992  * @thread  EMT(pVCpu) 
     14991 * @param   cbInstr     The instruction length in bytes.
     14992 * @thread  EMT(pVCpu)
    1499314993 */
    1499414994VMM_INT_DECL(VBOXSTRICTRC) IEMExecDecodedStgi(PVMCPU pVCpu, uint8_t cbInstr)
  • trunk/src/VBox/VMM/VMMR0/HMSVMR0.cpp

    r66015 r66104  
    13061306        HMSVM_SEG_REG_COPY_TO_VMCB(pCtx, pVmcb, ES, es);
    13071307        HMSVM_SEG_REG_COPY_TO_VMCB(pCtx, pVmcb, FS, fs);
    1308         HMSVM_SEG_REG_COPY_TO_VMCB(pCtx, pVmcb, GS, gs); 
     1308        HMSVM_SEG_REG_COPY_TO_VMCB(pCtx, pVmcb, GS, gs);
    13091309
    13101310        pVmcb->guest.u8CPL = pCtx->ss.Attr.n.u2Dpl;
     
    27682768        Log4(("ctrl.u16InterceptWrDRx            %#x\n",      pVmcb->ctrl.u16InterceptWrDRx));
    27692769        Log4(("ctrl.u32InterceptXcpt             %#x\n",      pVmcb->ctrl.u32InterceptXcpt));
    2770         Log4(("ctrl.u64InterceptCtrl             %#RX64\n",   pVmcb->ctrl.u64InterceptCtrl)); 
     2770        Log4(("ctrl.u64InterceptCtrl             %#RX64\n",   pVmcb->ctrl.u64InterceptCtrl));
    27712771        Log4(("ctrl.u64IOPMPhysAddr              %#RX64\n",   pVmcb->ctrl.u64IOPMPhysAddr));
    27722772        Log4(("ctrl.u64MSRPMPhysAddr             %#RX64\n",   pVmcb->ctrl.u64MSRPMPhysAddr));
     
    31763176     */
    31773177    if (    (pVM->hm.s.cpuid.u32AMDFeatureEDX & X86_CPUID_EXT_FEATURE_EDX_RDTSCP)
    3178         && !(pVmcb->ctrl.u64InterceptCtrl & SVM_CTRL_INTERCEPT_RDTSCP)) 
     3178        && !(pVmcb->ctrl.u64InterceptCtrl & SVM_CTRL_INTERCEPT_RDTSCP))
    31793179    {
    31803180        hmR0SvmSetMsrPermission(pVCpu, MSR_K8_TSC_AUX, SVMMSREXIT_PASSTHRU_READ, SVMMSREXIT_PASSTHRU_WRITE);
  • trunk/src/VBox/VMM/VMMR3/DBGFR3Flow.cpp

    r64766 r66104  
    12551255                        if (RT_SUCCESS(rc))
    12561256                        {
    1257                             rc = dbgfR3FlowQueryDirectBranchTarget(pUVM, idCpu, &DisState.Param1, &pInstr->AddrInstr, pInstr->cbInstr, 
     1257                            rc = dbgfR3FlowQueryDirectBranchTarget(pUVM, idCpu, &DisState.Param1, &pInstr->AddrInstr, pInstr->cbInstr,
    12581258                                                                   RT_BOOL(DisState.pCurInstr->fOpType & DISOPTYPE_RELATIVE_CONTROLFLOW),
    12591259                                                                   &pFlowBb->AddrTarget);
     
    16171617 *       for every other basic block type.
    16181618 * @note For indirect unconditional branches using a branch table this will return the start address
    1619  *       of the branch table. 
     1619 *       of the branch table.
    16201620 */
    16211621VMMR3DECL(PDBGFADDRESS) DBGFR3FlowBbGetBranchAddress(DBGFFLOWBB hFlowBb, PDBGFADDRESS pAddrTarget)
  • trunk/src/VBox/VMM/VMMR3/PATMA.asm

    r62478 r66104  
    5959    at PATCHASMRECORD.cbFunction,     DD          NAME(%1 %+ _EndProc) - NAME(%1)
    6060    at PATCHASMRECORD.cRelocs,        DD          %2
    61 iend                                                         
     61iend
    6262%endmacro
    6363
     
    7676    at PATCHASMRECORD.cbFunction,     DD          NAME(%1 %+ _EndProc) - NAME(%1)
    7777    at PATCHASMRECORD.cRelocs,        DD          %3
    78 iend                                                         
     78iend
    7979%endmacro
    8080
     
    107107    at PATCHASMRECORD.cbFunction,     DD          NAME(%1 %+ _EndProc) - NAME(%1)
    108108    at PATCHASMRECORD.cRelocs,        DD          %5
    109 iend                                                         
     109iend
    110110%endmacro
    111111
     
    124124
    125125;;
    126 ; Switches to the data section for the read-only patch descriptor data and 
     126; Switches to the data section for the read-only patch descriptor data and
    127127; aligns it appropriately.
    128128;
     
    177177;;
    178178; Ends a patch.
    179 ; 
     179;
    180180; This terminates the function and fixup array.
    181181;
     
    198198;
    199199%ifdef RT_ARCH_AMD64
    200  BITS 32 
     200 BITS 32
    201201%endif
    202202
     
    357357GLOBALNAME g_patmClearInhibitIRQContIF0Record
    358358    PATCHASMRECORD_INIT PATMClearInhibitIRQContIF0, 11
    359     DD      PATM_ASMFIX_INTERRUPTFLAG,      0   
     359    DD      PATM_ASMFIX_INTERRUPTFLAG,      0
    360360    DD      PATM_ASMFIX_INHIBITIRQADDR,     0
    361361    DD      PATM_ASMFIX_VMFLAGS,            0
     
    16041604%endif
    16051605    DD      PATM_ASMFIX_INTERRUPTFLAG,      0
    1606 %ifdef PATM_LOG_PATCHIRET           
     1606%ifdef PATM_LOG_PATCHIRET
    16071607    DD      PATM_ASMFIX_PENDINGACTION,      0
    1608 %endif                               
     1608%endif
    16091609    DD      PATM_ASMFIX_VM_FORCEDACTIONS,   0
    16101610    DD      PATM_ASMFIX_TEMP_EAX,           0
     
    17711771; Patch record for 'JEcx'
    17721772BEGIN_PATCH_RODATA_SECTION
    1773 GLOBALNAME g_patmJEcxRecord 
     1773GLOBALNAME g_patmJEcxRecord
    17741774    PATCHASMRECORD_INIT_EX PATMJEcxReplacement, , PATMJEcxJump, PATMJEcxSizeOverride, 3
    17751775    DD      PATM_ASMFIX_INTERRUPTFLAG, 0
     
    20112011    DD      PATM_ASMFIX_STACKBASE_GUEST,        0
    20122012    DD      PATM_ASMFIX_CALL_PATCH_TARGET_ADDR, 0
    2013 %ifdef PATM_LOG_PATCHINSTR               
     2013%ifdef PATM_LOG_PATCHINSTR
    20142014    DD      PATM_ASMFIX_PENDINGACTION,          0
    2015 %endif                                   
     2015%endif
    20162016    DD      PATM_ASMFIX_CALL_RETURN_ADDR,       0
    20172017    DD      PATM_ASMFIX_CALL_PATCH_TARGET_ADDR, 0
     
    24632463    DD      PATM_ASMFIX_STACKBASE,       0
    24642464    DD      PATM_ASMFIX_PATCHBASE,       0
    2465 %ifdef PATM_LOG_PATCHINSTR       
     2465%ifdef PATM_LOG_PATCHINSTR
    24662466    DD      PATM_ASMFIX_PENDINGACTION,   0
    2467 %endif                           
     2467%endif
    24682468    DD      PATM_ASMFIX_PENDINGACTION,   0
    24692469    DD      PATM_ASMFIX_PATCHBASE,       0
    2470 %ifdef PATM_LOG_PATCHINSTR       
     2470%ifdef PATM_LOG_PATCHINSTR
    24712471    DD      PATM_ASMFIX_PENDINGACTION,   0
    24722472%endif
     
    25242524    DD      PATM_ASMFIX_INTERRUPTFLAG, 0
    25252525    DD      PATM_ASMFIX_STACKPTR,      0
    2526 %ifdef PATM_LOG_PATCHINSTR     
     2526%ifdef PATM_LOG_PATCHINSTR
    25272527    DD      PATM_ASMFIX_PENDINGACTION, 0
    2528 %endif                         
     2528%endif
    25292529    DD      PATM_ASMFIX_INTERRUPTFLAG, 0
    25302530    DD      0ffffffffh, 0ffffffffh
  • trunk/src/VBox/VMM/VMMR3/PATMA.mac

    r62478 r66104  
    7676
    7777
    78 ;; Everything except IOPL, NT, IF, VM, VIF, VIP and RF 
     78;; Everything except IOPL, NT, IF, VM, VIF, VIP and RF
    7979%define PATM_FLAGS_MASK      (X86_EFL_CF|X86_EFL_PF|X86_EFL_AF|X86_EFL_ZF|X86_EFL_SF|X86_EFL_TF|X86_EFL_DF|X86_EFL_OF|X86_EFL_AC|X86_EFL_ID)
    8080
     
    134134    ;; Offset of the jump table?
    135135    .offJump            resd 1
    136     ;; Used only by loop/loopz/loopnz. 
    137     .offRelJump         resd 1       
     136    ;; Used only by loop/loopz/loopnz.
     137    .offRelJump         resd 1
    138138    ;; Size override byte position.
    139     .offSizeOverride    resd 1       
     139    .offSizeOverride    resd 1
    140140    ;; The size of the patch function.
    141141    .cbFunction         resd 1
  • trunk/src/VBox/VMM/VMMRC/CPUMRCPatchHlp.asm

    r62478 r66104  
    3636
    3737;;
    38 ; Helper for PATMCpuidReplacement. 
    39 ; 
     38; Helper for PATMCpuidReplacement.
     39;
    4040; We have at most 32 bytes of stack to play with, .
    4141;
     
    5959    ;
    6060    ; Perform a binary search looking for leaf with the EAX value.
    61     ;             
    62     mov     edx, [ss:edi + VM.cpum + CPUM.GuestInfo + CPUMINFO.cCpuIdLeaves]   
     61    ;
     62    mov     edx, [ss:edi + VM.cpum + CPUM.GuestInfo + CPUMINFO.cCpuIdLeaves]
    6363    mov     ecx, [ss:edi + VM.cpum + CPUM.GuestInfo + CPUMINFO.paCpuIdLeavesRC]
    6464    test    edx, edx
     
    9898    ; We've to a matching leaf, does the sub-leaf match too?
    9999    ;
    100 cpuid_match_eax:   
     100cpuid_match_eax:
    101101    mov     ecx, [esp + 4]
    102102    and     ecx, [ss:ebx + CPUMCPUIDLEAF.fSubLeafMask]
     
    112112
    113113cpuid_lookup_subleaf_backwards_loop:
    114     cmp     ebx, edx                    ; Is there a leaf before the current? 
     114    cmp     ebx, edx                    ; Is there a leaf before the current?
    115115    jbe     cpuid_subleaf_not_found     ; If not we're out of luck.
    116116    cmp     eax, [ss:ebx - CPUMCPUIDLEAF_size + CPUMCPUIDLEAF.uLeaf]
     
    123123
    124124    ;
    125     ; Search forward until we've got a matching sub-leaf (or not). 
     125    ; Search forward until we've got a matching sub-leaf (or not).
    126126    ;
    127127cpuid_lookup_subleaf_forwards:
    128128    ; Calculate the last leaf address.
    129     mov     edx, [ss:edi + VM.cpum + CPUM.GuestInfo + CPUMINFO.cCpuIdLeaves]   
     129    mov     edx, [ss:edi + VM.cpum + CPUM.GuestInfo + CPUMINFO.cCpuIdLeaves]
    130130    dec     edx
    131131    shl     edx, CPUMCPUIDLEAF_SIZE_LOG2
     
    138138    jne     cpuid_subleaf_not_found
    139139    add     ebx, CPUMCPUIDLEAF_size
    140     cmp     ecx, [ss:ebx + CPUMCPUIDLEAF.uSubLeaf]   
     140    cmp     ecx, [ss:ebx + CPUMCPUIDLEAF.uSubLeaf]
    141141    ja      cpuid_subleaf_lookup
    142142    je      cpuid_fetch
    143    
     143
    144144    ;
    145145    ; Out of range sub-leaves aren't quite as easy and pretty as we emulate them
    146146    ; here, but we do an adequate job.
    147     ;   
     147    ;
    148148cpuid_subleaf_not_found:
    149149    xor     ecx, ecx
     
    189189    mov     eax, [ss:ebx + CPUMCPUIDLEAF.uEax]
    190190    mov     ebx, [ss:ebx + CPUMCPUIDLEAF.uEbx]
    191              
     191
    192192cpuid_done:
    193193    pop     edi
  • trunk/src/VBox/VMM/tools/VBoxCpuReport.cpp

    r62869 r66104  
    519519                    && g_enmMicroarch == kCpumMicroarch_Intel_Atom_Bonnell)
    520520                || (   (uMsr == 0x280)
    521                     && g_enmMicroarch == kCpumMicroarch_Intel_P6_III)) 
     521                    && g_enmMicroarch == kCpumMicroarch_Intel_P6_III))
    522522                vbCpuRepDebug("Skipping %#x\n", uMsr);
    523523            else
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette