VirtualBox

Changeset 97264 in vbox for trunk/src/VBox/VMM/VMMR3


Ignore:
Timestamp:
Oct 21, 2022 12:08:51 PM (2 years ago)
Author:
vboxsync
svn:sync-xref-src-repo-rev:
154250
Message:

VMM/CPUM: Nested VMX: bugref:10092 Addressed todo regarding keeping extra memebers in VM::CPUM just for passing on VMX features to cpumR3InitVmxGuestFeaturesAndMsrs.

Location:
trunk/src/VBox/VMM/VMMR3
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/VMM/VMMR3/CPUM.cpp

    r97262 r97264  
    17281728 *
    17291729 * @param   pVM             The cross context VM structure.
     1730 * @param   pCpumCfg        The CPUM CFGM configuration node.
    17301731 * @param   pHostVmxMsrs    The host VMX MSRs. Pass NULL when fully emulating VMX
    17311732 *                          and no hardware-assisted nested-guest execution is
     
    17331734 * @param   pGuestVmxMsrs   Where to store the initialized guest VMX MSRs.
    17341735 */
    1735 void cpumR3InitVmxGuestFeaturesAndMsrs(PVM pVM, PCVMXMSRS pHostVmxMsrs, PVMXMSRS pGuestVmxMsrs)
     1736void cpumR3InitVmxGuestFeaturesAndMsrs(PVM pVM, PCFGMNODE pCpumCfg, PCVMXMSRS pHostVmxMsrs, PVMXMSRS pGuestVmxMsrs)
    17361737{
    17371738    Assert(pVM);
     1739    Assert(pCpumCfg);
    17381740    Assert(pGuestVmxMsrs);
    17391741
    17401742    /*
    1741      * While it would be nice to check this earlier while initializing
    1742      * fNestedVmxEpt but we would not have enumearted host features then, so do
    1743      * it at least now.
     1743     * Query VMX features from CFGM.
    17441744     */
    1745     /** @todo r=bird: Why don't we just ditch the fNestedVmxEpt and
    1746      *        fNestedVmxUnrestrictedGuest state members and read the CFGM stuff
    1747      *        here?  Neither of them have any purpose beyond keeping the two value
    1748      *        read in cpumR3CpuIdReadConfig for use here.  They aren't even
    1749      *        necessarily correct after the feature merging has taken place.  */
    1750     if (pVM->cpum.s.fNestedVmxEpt)
     1745    bool fVmxPreemptTimer;
     1746    bool fVmxEpt;
     1747    bool fVmxUnrestrictedGuest;
     1748    {
     1749        /** @cfgm{/CPUM/NestedVmxPreemptTimer, bool, true}
     1750         * Whether to expose the VMX-preemption timer feature to the guest (if also
     1751         * supported by the host hardware). When disabled will prevent exposing the
     1752         * VMX-preemption timer feature to the guest even if the host supports it.
     1753         *
     1754         * @todo Currently disabled, see @bugref{9180#c108}.
     1755         */
     1756        int rc = CFGMR3QueryBoolDef(pCpumCfg, "NestedVmxPreemptTimer", &fVmxPreemptTimer, false);
     1757        AssertLogRelRCReturnVoid(rc);
     1758
     1759#ifdef VBOX_WITH_NESTED_HWVIRT_VMX_EPT
     1760        /** @cfgm{/CPUM/NestedVmxEpt, bool, true}
     1761         * Whether to expose the EPT feature to the guest. The default is true.
     1762         * When disabled will automatically prevent exposing features that rely
     1763         * on it.  This is dependent upon nested paging being enabled for the VM.
     1764         */
     1765        rc = CFGMR3QueryBoolDef(pCpumCfg, "NestedVmxEpt", &fVmxEpt, true);
     1766        AssertLogRelRCReturnVoid(rc);
     1767
     1768        /** @cfgm{/CPUM/NestedVmxUnrestrictedGuest, bool, true}
     1769         * Whether to expose the Unrestricted Guest feature to the guest. The
     1770         * default is the same a /CPUM/Nested/VmxEpt. When disabled will
     1771         * automatically prevent exposing features that rely on it.
     1772         */
     1773        rc = CFGMR3QueryBoolDef(pCpumCfg, "NestedVmxUnrestrictedGuest", &fVmxUnrestrictedGuest, fVmxEpt);
     1774        AssertLogRelRCReturnVoid(rc);
     1775#endif
     1776    }
     1777
     1778    if (fVmxEpt)
    17511779    {
    17521780        const char *pszWhy = NULL;
     
    17591787        if (pszWhy)
    17601788        {
    1761             LogRel(("CPUM: Warning! EPT not exposed to the guest because %s.\n", pszWhy));
    1762             pVM->cpum.s.fNestedVmxEpt = false;
     1789            LogRel(("CPUM: Warning! EPT not exposed to the guest because %s\n", pszWhy));
     1790            fVmxEpt = false;
    17631791        }
    17641792    }
    1765     if (    pVM->cpum.s.fNestedVmxUnrestrictedGuest
    1766         && !pVM->cpum.s.fNestedVmxEpt)
     1793    else if (fVmxUnrestrictedGuest)
    17671794    {
    17681795        LogRel(("CPUM: Warning! Can't expose \"Unrestricted Guest\" to the guest when EPT is not exposed!\n"));
    1769         pVM->cpum.s.fNestedVmxUnrestrictedGuest = false;
     1796        fVmxUnrestrictedGuest = false;
    17701797    }
    17711798
     
    17831810    EmuFeat.fVmxNmiExit               = 1;
    17841811    EmuFeat.fVmxVirtNmi               = 1;
    1785     EmuFeat.fVmxPreemptTimer          = pVM->cpum.s.fNestedVmxPreemptTimer;
     1812    EmuFeat.fVmxPreemptTimer          = fVmxPreemptTimer;
    17861813    EmuFeat.fVmxPostedInt             = 0;
    17871814    EmuFeat.fVmxIntWindowExit         = 1;
     
    18081835    EmuFeat.fVmxSecondaryExecCtls     = 1;
    18091836    EmuFeat.fVmxVirtApicAccess        = 1;
    1810     EmuFeat.fVmxEpt                   = pVM->cpum.s.fNestedVmxEpt;
     1837    EmuFeat.fVmxEpt                   = fVmxEpt;
    18111838    EmuFeat.fVmxDescTableExit         = 1;
    18121839    EmuFeat.fVmxRdtscp                = 1;
     
    18141841    EmuFeat.fVmxVpid                  = 0;  /** @todo Consider enabling this when EPT works. */
    18151842    EmuFeat.fVmxWbinvdExit            = 1;
    1816     EmuFeat.fVmxUnrestrictedGuest     = pVM->cpum.s.fNestedVmxUnrestrictedGuest;
     1843    EmuFeat.fVmxUnrestrictedGuest     = fVmxUnrestrictedGuest;
    18171844    EmuFeat.fVmxApicRegVirt           = 0;
    18181845    EmuFeat.fVmxVirtIntDelivery       = 0;
     
    19391966        && HMIsSubjectToVmxPreemptTimerErratum())
    19401967    {
    1941         LogRel(("CPUM: Warning! VMX-preemption timer not exposed to guest due to host CPU erratum.\n"));
     1968        LogRel(("CPUM: Warning! VMX-preemption timer not exposed to guest due to host CPU erratum\n"));
    19421969        pGuestFeat->fVmxPreemptTimer     = 0;
    19431970        pGuestFeat->fVmxSavePreemptTimer = 0;
     
    20272054        return VERR_INTERNAL_ERROR_5;
    20282055    }
     2056
    20292057    LogRel(("CPUM: No hardware-virtualization capability detected\n"));
    20302058    return VINF_SUCCESS;
     
    39543982        pHlp->pfnPrintf(pHlp, "  %sSSP                        = %#RX64\n",   pszPrefix, pVmcs->u64HostSsp.u);
    39553983        pHlp->pfnPrintf(pHlp, "  %sINTERRUPT_SSP_TABLE_ADDR   = %#RX64\n",   pszPrefix, pVmcs->u64HostIntrSspTableAddrMsr.u);
    3956 
    39573984    }
    39583985
  • trunk/src/VBox/VMM/VMMR3/CPUMR3CpuId.cpp

    r97097 r97264  
    27162716            if (VM_IS_NEM_ENABLED(pVM))
    27172717            {
    2718                 LogRel(("CPUM: WARNING! Can't turn on nested VT-x/AMD-V when NEM is used! (later)\n"));
     2718                LogRel(("CPUM: Warning! Can't turn on nested VT-x/AMD-V when NEM is used! (later)\n"));
    27192719                pConfig->fNestedHWVirt = false;
    27202720            }
     
    27222722                return VMSetError(pVM, VERR_CPUM_INVALID_HWVIRT_CONFIG, RT_SRC_POS,
    27232723                                  "Cannot enable nested VT-x/AMD-V without nested-paging and unrestricted guest execution!\n");
    2724         }
    2725 
    2726         if (pConfig->fNestedHWVirt)
    2727         {
    2728             /** @cfgm{/CPUM/NestedVmxPreemptTimer, bool, true}
    2729              * Whether to expose the VMX-preemption timer feature to the guest (if also
    2730              * supported by the host hardware). When disabled will prevent exposing the
    2731              * VMX-preemption timer feature to the guest even if the host supports it.
    2732              *
    2733              * @todo Currently disabled, see @bugref{9180#c108}.
    2734              */
    2735             rc = CFGMR3QueryBoolDef(pCpumCfg, "NestedVmxPreemptTimer", &pVM->cpum.s.fNestedVmxPreemptTimer, false);
    2736             AssertLogRelRCReturn(rc, rc);
    2737 
    2738 #ifdef VBOX_WITH_NESTED_HWVIRT_VMX_EPT
    2739             /** @cfgm{/CPUM/NestedVmxEpt, bool, true}
    2740              * Whether to expose the EPT feature to the guest. The default is true.
    2741              * When disabled will automatically prevent exposing features that rely
    2742              * on it.  This is dependent upon nested paging being enabled for the. */
    2743             rc = CFGMR3QueryBoolDef(pCpumCfg, "NestedVmxEpt", &pVM->cpum.s.fNestedVmxEpt, true);
    2744             AssertLogRelRCReturn(rc, rc);
    2745 
    2746             /** @cfgm{/CPUM/NestedVmxUnrestrictedGuest, bool, true}
    2747              * Whether to expose the Unrestricted Guest feature to the guest. The
    2748              * default is the same a /CPUM/Nested/VmxEpt. When disabled will
    2749              * automatically prevent exposing features that rely on it.
    2750              */
    2751             rc = CFGMR3QueryBoolDef(pCpumCfg, "NestedVmxUnrestrictedGuest", &pVM->cpum.s.fNestedVmxUnrestrictedGuest,
    2752                                     pVM->cpum.s.fNestedVmxEpt);
    2753             AssertLogRelRCReturn(rc, rc);
    2754 #endif
    27552724        }
    27562725    }
     
    31593128        {
    31603129            Assert(Config.fNestedHWVirt);
    3161             cpumR3InitVmxGuestFeaturesAndMsrs(pVM, &pHostMsrs->hwvirt.vmx, &GuestMsrs.hwvirt.vmx);
     3130            cpumR3InitVmxGuestFeaturesAndMsrs(pVM, pCpumCfg, &pHostMsrs->hwvirt.vmx, &GuestMsrs.hwvirt.vmx);
    31623131
    31633132            /* Copy MSRs to all VCPUs */
Note: See TracChangeset for help on using the changeset viewer.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette