3 * This file is part of the Palacios Virtual Machine Monitor developed
4 * by the V3VEE Project with funding from the United States National
5 * Science Foundation and the Department of Energy.
7 * The V3VEE Project is a joint project between Northwestern University
8 * and the University of New Mexico. You can find out more at
11 * Copyright (c) 2008, Andy Gocke <agocke@gmail.com>
12 * Copyright (c) 2008, The V3VEE Project <http://www.v3vee.org>
13 * All rights reserved.
15 * Author: Andy Gocke <agocke@gmail.com>
17 * This is free software. You are permitted to use,
18 * redistribute, and modify it as specified in the file "V3VEE_LICENSE".
21 #include <palacios/vmx_ctrl_regs.h>
22 #include <palacios/vmm.h>
23 #include <palacios/vmx_lowlevel.h>
24 #include <palacios/vmx.h>
25 #include <palacios/vmx_assist.h>
26 #include <palacios/vm_guest_mem.h>
27 #include <palacios/vmm_direct_paging.h>
28 #include <palacios/vmm_ctrl_regs.h>
30 #ifndef CONFIG_DEBUG_VMX
32 #define PrintDebug(fmt, args...)
35 static v3_reg_t * get_reg_ptr(struct guest_info * info, struct vmx_exit_cr_qual * cr_qual);
36 static int handle_mov_to_cr0(struct guest_info * info, v3_reg_t * new_val, struct vmx_exit_info * exit_info);
37 static int handle_mov_to_cr3(struct guest_info * info, v3_reg_t * cr3_reg);
38 static int handle_mov_from_cr3(struct guest_info * info, v3_reg_t * cr3_reg);
40 int v3_vmx_handle_cr0_access(struct guest_info * info, struct vmx_exit_cr_qual * cr_qual, struct vmx_exit_info * exit_info) {
42 if (cr_qual->access_type < 2) {
43 v3_reg_t * reg = get_reg_ptr(info, cr_qual);
45 if (cr_qual->access_type == 0) {
47 if (handle_mov_to_cr0(info, reg, exit_info) != 0) {
48 PrintError("Could not handle CR0 write\n");
53 PrintError("Mov From CR0 not handled\n");
60 PrintError("Invalid CR0 Access type?? (type=%d)\n", cr_qual->access_type);
64 int v3_vmx_handle_cr3_access(struct guest_info * info, struct vmx_exit_cr_qual * cr_qual) {
66 if (cr_qual->access_type < 2) {
67 v3_reg_t * reg = get_reg_ptr(info, cr_qual);
69 if (cr_qual->access_type == 0) {
70 return handle_mov_to_cr3(info, reg);
72 return handle_mov_from_cr3(info, reg);
76 PrintError("Invalid CR3 Access type?? (type=%d)\n", cr_qual->access_type);
80 static int handle_mov_to_cr3(struct guest_info * info, v3_reg_t * cr3_reg) {
82 if (info->shdw_pg_mode == SHADOW_PAGING) {
85 PrintDebug("Old Guest CR3=%p, Old Shadow CR3=%p\n",
86 (void *)info->ctrl_regs.cr3,
87 (void *)info->shdw_pg_state.guest_cr3);
90 if (info->cpu_mode == LONG) {
91 info->shdw_pg_state.guest_cr3 = (uint64_t)*cr3_reg;
93 info->shdw_pg_state.guest_cr3 = (uint32_t)*cr3_reg;
97 if (v3_get_vm_mem_mode(info) == VIRTUAL_MEM) {
98 if (v3_activate_shadow_pt(info) == -1) {
99 PrintError("Failed to activate 32 bit shadow page table\n");
104 PrintDebug("New guest CR3=%p, New shadow CR3=%p\n",
105 (void *)info->ctrl_regs.cr3,
106 (void *)info->shdw_pg_state.guest_cr3);
108 } else if (info->shdw_pg_mode == NESTED_PAGING) {
109 PrintError("Nested paging not available in VMX right now!\n");
118 static int handle_mov_from_cr3(struct guest_info * info, v3_reg_t * cr3_reg) {
121 if (info->shdw_pg_mode == SHADOW_PAGING) {
123 if ((v3_get_vm_cpu_mode(info) == LONG) ||
124 (v3_get_vm_cpu_mode(info) == LONG_32_COMPAT)) {
126 *cr3_reg = (uint64_t)info->shdw_pg_state.guest_cr3;
128 *cr3_reg = (uint32_t)info->shdw_pg_state.guest_cr3;
132 PrintError("Unhandled paging mode\n");
140 static int handle_mov_to_cr0(struct guest_info * info, v3_reg_t * new_cr0, struct vmx_exit_info * exit_info) {
141 struct cr0_32 * guest_cr0 = (struct cr0_32 *)&(info->ctrl_regs.cr0);
142 struct cr0_32 * shdw_cr0 = (struct cr0_32 *)&(info->shdw_pg_state.guest_cr0);
143 struct cr0_32 * new_shdw_cr0 = (struct cr0_32 *)new_cr0;
144 struct vmx_data * vmx_info = (struct vmx_data *)info->vmm_data;
145 uint_t paging_transition = 0;
148 PrintDebug("Old shadow CR0: 0x%x, New shadow CR0: 0x%x\n",
149 (uint32_t)info->shdw_pg_state.guest_cr0, (uint32_t)*new_cr0);
152 if (new_shdw_cr0->pe != shdw_cr0->pe) {
154 PrintDebug("Guest CR0: 0x%x\n", *(uint32_t *)guest_cr0);
155 PrintDebug("Old shadow CR0: 0x%x\n", *(uint32_t *)shdw_cr0);
156 PrintDebug("New shadow CR0: 0x%x\n", *(uint32_t *)new_shdw_cr0);
159 if (v3_vmxassist_ctx_switch(info) != 0) {
160 PrintError("Unable to execute VMXASSIST context switch!\n");
164 if (vmx_info->assist_state == VMXASSIST_ENABLED) {
165 PrintDebug("Loading VMXASSIST at RIP: %p\n", (void *)(addr_t)info->rip);
167 PrintDebug("Leaving VMXASSIST and entering protected mode at RIP: %p\n",
168 (void *)(addr_t)info->rip);
171 // PE switches modify the RIP directly, so we clear the instr_len field to avoid catastrophe
172 exit_info->instr_len = 0;
174 // v3_vmx_restore_vmcs(info);
175 // v3_print_vmcs(info);
179 if (new_shdw_cr0->pg != shdw_cr0->pg) {
180 paging_transition = 1;
183 // The shadow always reflects the new value
184 *shdw_cr0 = *new_shdw_cr0;
186 // We don't care about most of the flags, so lets go for it
187 // and set them to the guest values
188 *guest_cr0 = *shdw_cr0;
190 // Except PG, PE, and NE, which are always set
195 if (paging_transition) {
198 if (v3_get_vm_mem_mode(info) == VIRTUAL_MEM) {
199 struct efer_64 * guest_efer = (struct efer_64 *)&(info->ctrl_regs.efer);
201 if (guest_efer->lme == 1) {
202 // PrintDebug("Enabling long mode\n");
207 vmx_info->entry_ctrls.guest_ia32e = 1;
210 // PrintDebug("Activating Shadow Page tables\n");
212 if (v3_activate_shadow_pt(info) == -1) {
213 PrintError("Failed to activate shadow page tables\n");
217 } else if (v3_activate_passthrough_pt(info) == -1) {
218 PrintError("Failed to activate passthrough page tables\n");
227 static v3_reg_t * get_reg_ptr(struct guest_info * info, struct vmx_exit_cr_qual * cr_qual) {
228 v3_reg_t * reg = NULL;
230 switch (cr_qual->gpr) {
232 reg = &(info->vm_regs.rax);
235 reg = &(info->vm_regs.rcx);
238 reg = &(info->vm_regs.rdx);
241 reg = &(info->vm_regs.rbx);
244 reg = &(info->vm_regs.rsp);
247 reg = &(info->vm_regs.rbp);
250 reg = &(info->vm_regs.rsi);
253 reg = &(info->vm_regs.rdi);
256 reg = &(info->vm_regs.r8);
259 reg = &(info->vm_regs.r9);
262 reg = &(info->vm_regs.r10);
265 reg = &(info->vm_regs.r11);
268 reg = &(info->vm_regs.r11);
271 reg = &(info->vm_regs.r13);
274 reg = &(info->vm_regs.r14);
277 reg = &(info->vm_regs.r15);