Changeset 97264 in vbox for trunk/src/VBox/VMM/VMMR3
- Timestamp:
- Oct 21, 2022 12:08:51 PM (2 years ago)
- svn:sync-xref-src-repo-rev:
- 154250
- Location:
- trunk/src/VBox/VMM/VMMR3
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/VMM/VMMR3/CPUM.cpp
r97262 r97264 1728 1728 * 1729 1729 * @param pVM The cross context VM structure. 1730 * @param pCpumCfg The CPUM CFGM configuration node. 1730 1731 * @param pHostVmxMsrs The host VMX MSRs. Pass NULL when fully emulating VMX 1731 1732 * and no hardware-assisted nested-guest execution is … … 1733 1734 * @param pGuestVmxMsrs Where to store the initialized guest VMX MSRs. 1734 1735 */ 1735 void cpumR3InitVmxGuestFeaturesAndMsrs(PVM pVM, PC VMXMSRS pHostVmxMsrs, PVMXMSRS pGuestVmxMsrs)1736 void cpumR3InitVmxGuestFeaturesAndMsrs(PVM pVM, PCFGMNODE pCpumCfg, PCVMXMSRS pHostVmxMsrs, PVMXMSRS pGuestVmxMsrs) 1736 1737 { 1737 1738 Assert(pVM); 1739 Assert(pCpumCfg); 1738 1740 Assert(pGuestVmxMsrs); 1739 1741 1740 1742 /* 1741 * While it would be nice to check this earlier while initializing 1742 * fNestedVmxEpt but we would not have enumearted host features then, so do 1743 * it at least now. 1743 * Query VMX features from CFGM. 1744 1744 */ 1745 /** @todo r=bird: Why don't we just ditch the fNestedVmxEpt and 1746 * fNestedVmxUnrestrictedGuest state members and read the CFGM stuff 1747 * here? Neither of them have any purpose beyond keeping the two value 1748 * read in cpumR3CpuIdReadConfig for use here. They aren't even 1749 * necessarily correct after the feature merging has taken place. */ 1750 if (pVM->cpum.s.fNestedVmxEpt) 1745 bool fVmxPreemptTimer; 1746 bool fVmxEpt; 1747 bool fVmxUnrestrictedGuest; 1748 { 1749 /** @cfgm{/CPUM/NestedVmxPreemptTimer, bool, true} 1750 * Whether to expose the VMX-preemption timer feature to the guest (if also 1751 * supported by the host hardware). When disabled will prevent exposing the 1752 * VMX-preemption timer feature to the guest even if the host supports it. 1753 * 1754 * @todo Currently disabled, see @bugref{9180#c108}. 1755 */ 1756 int rc = CFGMR3QueryBoolDef(pCpumCfg, "NestedVmxPreemptTimer", &fVmxPreemptTimer, false); 1757 AssertLogRelRCReturnVoid(rc); 1758 1759 #ifdef VBOX_WITH_NESTED_HWVIRT_VMX_EPT 1760 /** @cfgm{/CPUM/NestedVmxEpt, bool, true} 1761 * Whether to expose the EPT feature to the guest. The default is true. 1762 * When disabled will automatically prevent exposing features that rely 1763 * on it. This is dependent upon nested paging being enabled for the VM. 1764 */ 1765 rc = CFGMR3QueryBoolDef(pCpumCfg, "NestedVmxEpt", &fVmxEpt, true); 1766 AssertLogRelRCReturnVoid(rc); 1767 1768 /** @cfgm{/CPUM/NestedVmxUnrestrictedGuest, bool, true} 1769 * Whether to expose the Unrestricted Guest feature to the guest. The 1770 * default is the same a /CPUM/Nested/VmxEpt. When disabled will 1771 * automatically prevent exposing features that rely on it. 1772 */ 1773 rc = CFGMR3QueryBoolDef(pCpumCfg, "NestedVmxUnrestrictedGuest", &fVmxUnrestrictedGuest, fVmxEpt); 1774 AssertLogRelRCReturnVoid(rc); 1775 #endif 1776 } 1777 1778 if (fVmxEpt) 1751 1779 { 1752 1780 const char *pszWhy = NULL; … … 1759 1787 if (pszWhy) 1760 1788 { 1761 LogRel(("CPUM: Warning! EPT not exposed to the guest because %s .\n", pszWhy));1762 pVM->cpum.s.fNestedVmxEpt = false;1789 LogRel(("CPUM: Warning! EPT not exposed to the guest because %s\n", pszWhy)); 1790 fVmxEpt = false; 1763 1791 } 1764 1792 } 1765 if ( pVM->cpum.s.fNestedVmxUnrestrictedGuest 1766 && !pVM->cpum.s.fNestedVmxEpt) 1793 else if (fVmxUnrestrictedGuest) 1767 1794 { 1768 1795 LogRel(("CPUM: Warning! Can't expose \"Unrestricted Guest\" to the guest when EPT is not exposed!\n")); 1769 pVM->cpum.s.fNestedVmxUnrestrictedGuest = false;1796 fVmxUnrestrictedGuest = false; 1770 1797 } 1771 1798 … … 1783 1810 EmuFeat.fVmxNmiExit = 1; 1784 1811 EmuFeat.fVmxVirtNmi = 1; 1785 EmuFeat.fVmxPreemptTimer = pVM->cpum.s.fNestedVmxPreemptTimer;1812 EmuFeat.fVmxPreemptTimer = fVmxPreemptTimer; 1786 1813 EmuFeat.fVmxPostedInt = 0; 1787 1814 EmuFeat.fVmxIntWindowExit = 1; … … 1808 1835 EmuFeat.fVmxSecondaryExecCtls = 1; 1809 1836 EmuFeat.fVmxVirtApicAccess = 1; 1810 EmuFeat.fVmxEpt = pVM->cpum.s.fNestedVmxEpt;1837 EmuFeat.fVmxEpt = fVmxEpt; 1811 1838 EmuFeat.fVmxDescTableExit = 1; 1812 1839 EmuFeat.fVmxRdtscp = 1; … … 1814 1841 EmuFeat.fVmxVpid = 0; /** @todo Consider enabling this when EPT works. */ 1815 1842 EmuFeat.fVmxWbinvdExit = 1; 1816 EmuFeat.fVmxUnrestrictedGuest = pVM->cpum.s.fNestedVmxUnrestrictedGuest;1843 EmuFeat.fVmxUnrestrictedGuest = fVmxUnrestrictedGuest; 1817 1844 EmuFeat.fVmxApicRegVirt = 0; 1818 1845 EmuFeat.fVmxVirtIntDelivery = 0; … … 1939 1966 && HMIsSubjectToVmxPreemptTimerErratum()) 1940 1967 { 1941 LogRel(("CPUM: Warning! VMX-preemption timer not exposed to guest due to host CPU erratum .\n"));1968 LogRel(("CPUM: Warning! VMX-preemption timer not exposed to guest due to host CPU erratum\n")); 1942 1969 pGuestFeat->fVmxPreemptTimer = 0; 1943 1970 pGuestFeat->fVmxSavePreemptTimer = 0; … … 2027 2054 return VERR_INTERNAL_ERROR_5; 2028 2055 } 2056 2029 2057 LogRel(("CPUM: No hardware-virtualization capability detected\n")); 2030 2058 return VINF_SUCCESS; … … 3954 3982 pHlp->pfnPrintf(pHlp, " %sSSP = %#RX64\n", pszPrefix, pVmcs->u64HostSsp.u); 3955 3983 pHlp->pfnPrintf(pHlp, " %sINTERRUPT_SSP_TABLE_ADDR = %#RX64\n", pszPrefix, pVmcs->u64HostIntrSspTableAddrMsr.u); 3956 3957 3984 } 3958 3985 -
trunk/src/VBox/VMM/VMMR3/CPUMR3CpuId.cpp
r97097 r97264 2716 2716 if (VM_IS_NEM_ENABLED(pVM)) 2717 2717 { 2718 LogRel(("CPUM: W ARNING! Can't turn on nested VT-x/AMD-V when NEM is used! (later)\n"));2718 LogRel(("CPUM: Warning! Can't turn on nested VT-x/AMD-V when NEM is used! (later)\n")); 2719 2719 pConfig->fNestedHWVirt = false; 2720 2720 } … … 2722 2722 return VMSetError(pVM, VERR_CPUM_INVALID_HWVIRT_CONFIG, RT_SRC_POS, 2723 2723 "Cannot enable nested VT-x/AMD-V without nested-paging and unrestricted guest execution!\n"); 2724 }2725 2726 if (pConfig->fNestedHWVirt)2727 {2728 /** @cfgm{/CPUM/NestedVmxPreemptTimer, bool, true}2729 * Whether to expose the VMX-preemption timer feature to the guest (if also2730 * supported by the host hardware). When disabled will prevent exposing the2731 * VMX-preemption timer feature to the guest even if the host supports it.2732 *2733 * @todo Currently disabled, see @bugref{9180#c108}.2734 */2735 rc = CFGMR3QueryBoolDef(pCpumCfg, "NestedVmxPreemptTimer", &pVM->cpum.s.fNestedVmxPreemptTimer, false);2736 AssertLogRelRCReturn(rc, rc);2737 2738 #ifdef VBOX_WITH_NESTED_HWVIRT_VMX_EPT2739 /** @cfgm{/CPUM/NestedVmxEpt, bool, true}2740 * Whether to expose the EPT feature to the guest. The default is true.2741 * When disabled will automatically prevent exposing features that rely2742 * on it. This is dependent upon nested paging being enabled for the. */2743 rc = CFGMR3QueryBoolDef(pCpumCfg, "NestedVmxEpt", &pVM->cpum.s.fNestedVmxEpt, true);2744 AssertLogRelRCReturn(rc, rc);2745 2746 /** @cfgm{/CPUM/NestedVmxUnrestrictedGuest, bool, true}2747 * Whether to expose the Unrestricted Guest feature to the guest. The2748 * default is the same a /CPUM/Nested/VmxEpt. When disabled will2749 * automatically prevent exposing features that rely on it.2750 */2751 rc = CFGMR3QueryBoolDef(pCpumCfg, "NestedVmxUnrestrictedGuest", &pVM->cpum.s.fNestedVmxUnrestrictedGuest,2752 pVM->cpum.s.fNestedVmxEpt);2753 AssertLogRelRCReturn(rc, rc);2754 #endif2755 2724 } 2756 2725 } … … 3159 3128 { 3160 3129 Assert(Config.fNestedHWVirt); 3161 cpumR3InitVmxGuestFeaturesAndMsrs(pVM, &pHostMsrs->hwvirt.vmx, &GuestMsrs.hwvirt.vmx);3130 cpumR3InitVmxGuestFeaturesAndMsrs(pVM, pCpumCfg, &pHostMsrs->hwvirt.vmx, &GuestMsrs.hwvirt.vmx); 3162 3131 3163 3132 /* Copy MSRs to all VCPUs */
Note:
See TracChangeset
for help on using the changeset viewer.