3 * This file is part of the Palacios Virtual Machine Monitor developed
4 * by the V3VEE Project with funding from the United States National
5 * Science Foundation and the Department of Energy.
7 * The V3VEE Project is a joint project between Northwestern University
8 * and the University of New Mexico. You can find out more at
11 * Copyright (c) 2008, Andy Gocke <agocke@gmail.com>
12 * Copyright (c) 2008, The V3VEE Project <http://www.v3vee.org>
13 * All rights reserved.
15 * Author: Andy Gocke <agocke@gmail.com>
17 * This is free software. You are permitted to use,
18 * redistribute, and modify it as specified in the file "V3VEE_LICENSE".
21 #include <palacios/vmx_ctrl_regs.h>
22 #include <palacios/vmm.h>
23 #include <palacios/vmx_lowlevel.h>
24 #include <palacios/vmx.h>
25 #include <palacios/vmx_assist.h>
26 #include <palacios/vm_guest_mem.h>
27 #include <palacios/vmm_direct_paging.h>
28 #include <palacios/vmm_ctrl_regs.h>
30 #ifndef V3_CONFIG_DEBUG_VMX
32 #define PrintDebug(fmt, args...)
35 static v3_reg_t * get_reg_ptr(struct guest_info * info, struct vmx_exit_cr_qual * cr_qual);
36 static int handle_mov_to_cr0(struct guest_info * info, v3_reg_t * new_val, struct vmx_exit_info * exit_info);
37 static int handle_mov_to_cr3(struct guest_info * info, v3_reg_t * cr3_reg);
38 static int handle_mov_from_cr3(struct guest_info * info, v3_reg_t * cr3_reg);
40 int v3_vmx_handle_cr0_access(struct guest_info * info, struct vmx_exit_cr_qual * cr_qual, struct vmx_exit_info * exit_info) {
42 if (cr_qual->access_type < 2) {
43 v3_reg_t * reg = get_reg_ptr(info, cr_qual);
45 if (cr_qual->access_type == 0) {
47 if (handle_mov_to_cr0(info, reg, exit_info) != 0) {
48 PrintError("Could not handle CR0 write\n");
53 PrintError("Mov From CR0 not handled\n");
60 PrintError("Invalid CR0 Access type?? (type=%d)\n", cr_qual->access_type);
64 int v3_vmx_handle_cr3_access(struct guest_info * info, struct vmx_exit_cr_qual * cr_qual) {
66 if (cr_qual->access_type < 2) {
67 v3_reg_t * reg = get_reg_ptr(info, cr_qual);
69 if (cr_qual->access_type == 0) {
70 return handle_mov_to_cr3(info, reg);
72 return handle_mov_from_cr3(info, reg);
76 PrintError("Invalid CR3 Access type?? (type=%d)\n", cr_qual->access_type);
80 int v3_vmx_handle_cr4_access(struct guest_info * info, struct vmx_exit_cr_qual * cr_qual) {
81 if (cr_qual->access_type < 2) {
83 if (cr_qual->access_type == 0) {
84 if (v3_handle_cr4_write(info) != 0) {
85 PrintError("Could not handle CR4 write\n");
88 info->ctrl_regs.cr4 |= 0x2000; // no VMX allowed in guest, so mask CR4.VMXE
90 if (v3_handle_cr4_read(info) != 0) {
91 PrintError("Could not handle CR4 read\n");
99 PrintError("Invalid CR4 Access type?? (type=%d)\n", cr_qual->access_type);
103 static int handle_mov_to_cr3(struct guest_info * info, v3_reg_t * cr3_reg) {
105 if (info->shdw_pg_mode == SHADOW_PAGING) {
108 PrintDebug("Old Guest CR3=%p, Old Shadow CR3=%p\n",
109 (void *)info->ctrl_regs.cr3,
110 (void *)info->shdw_pg_state.guest_cr3);
113 if (info->cpu_mode == LONG) {
114 info->shdw_pg_state.guest_cr3 = (uint64_t)*cr3_reg;
116 info->shdw_pg_state.guest_cr3 = (uint32_t)*cr3_reg;
120 if (v3_get_vm_mem_mode(info) == VIRTUAL_MEM) {
121 if (v3_activate_shadow_pt(info) == -1) {
122 PrintError("Failed to activate 32 bit shadow page table\n");
127 PrintDebug("New guest CR3=%p, New shadow CR3=%p\n",
128 (void *)info->ctrl_regs.cr3,
129 (void *)info->shdw_pg_state.guest_cr3);
131 } else if (info->shdw_pg_mode == NESTED_PAGING) {
132 PrintError("Nested paging not available in VMX right now!\n");
141 static int handle_mov_from_cr3(struct guest_info * info, v3_reg_t * cr3_reg) {
144 if (info->shdw_pg_mode == SHADOW_PAGING) {
146 if ((v3_get_vm_cpu_mode(info) == LONG) ||
147 (v3_get_vm_cpu_mode(info) == LONG_32_COMPAT)) {
149 *cr3_reg = (uint64_t)info->shdw_pg_state.guest_cr3;
151 *cr3_reg = (uint32_t)info->shdw_pg_state.guest_cr3;
155 PrintError("Unhandled paging mode\n");
163 static int handle_mov_to_cr0(struct guest_info * info, v3_reg_t * new_cr0, struct vmx_exit_info * exit_info) {
164 struct cr0_32 * guest_cr0 = (struct cr0_32 *)&(info->ctrl_regs.cr0);
165 struct cr0_32 * shdw_cr0 = (struct cr0_32 *)&(info->shdw_pg_state.guest_cr0);
166 struct cr0_32 * new_shdw_cr0 = (struct cr0_32 *)new_cr0;
167 struct vmx_data * vmx_info = (struct vmx_data *)info->vmm_data;
168 uint_t paging_transition = 0;
171 PrintDebug("Old shadow CR0: 0x%x, New shadow CR0: 0x%x\n",
172 (uint32_t)info->shdw_pg_state.guest_cr0, (uint32_t)*new_cr0);
175 if (new_shdw_cr0->pe != shdw_cr0->pe) {
177 PrintDebug("Guest CR0: 0x%x\n", *(uint32_t *)guest_cr0);
178 PrintDebug("Old shadow CR0: 0x%x\n", *(uint32_t *)shdw_cr0);
179 PrintDebug("New shadow CR0: 0x%x\n", *(uint32_t *)new_shdw_cr0);
182 if (v3_vmxassist_ctx_switch(info) != 0) {
183 PrintError("Unable to execute VMXASSIST context switch!\n");
187 if (vmx_info->assist_state == VMXASSIST_ENABLED) {
188 PrintDebug("Loading VMXASSIST at RIP: %p\n", (void *)(addr_t)info->rip);
190 PrintDebug("Leaving VMXASSIST and entering protected mode at RIP: %p\n",
191 (void *)(addr_t)info->rip);
194 // PE switches modify the RIP directly, so we clear the instr_len field to avoid catastrophe
195 exit_info->instr_len = 0;
197 // v3_vmx_restore_vmcs(info);
198 // v3_print_vmcs(info);
202 if (new_shdw_cr0->pg != shdw_cr0->pg) {
203 paging_transition = 1;
206 // The shadow always reflects the new value
207 *shdw_cr0 = *new_shdw_cr0;
209 // We don't care about most of the flags, so lets go for it
210 // and set them to the guest values
211 *guest_cr0 = *shdw_cr0;
213 // Except PG, PE, and NE, which are always set
218 if ((paging_transition)) {
221 if (v3_get_vm_mem_mode(info) == VIRTUAL_MEM) {
222 struct efer_64 * vm_efer = (struct efer_64 *)&(info->shdw_pg_state.guest_efer);
223 struct efer_64 * hw_efer = (struct efer_64 *)&(info->ctrl_regs.efer);
226 // PrintDebug("Enabling long mode\n");
231 vmx_info->entry_ctrls.guest_ia32e = 1;
234 // PrintDebug("Activating Shadow Page tables\n");
236 if (info->shdw_pg_mode == SHADOW_PAGING) {
237 if (v3_activate_shadow_pt(info) == -1) {
238 PrintError("Failed to activate shadow page tables\n");
245 if (info->shdw_pg_mode == SHADOW_PAGING) {
246 if (v3_activate_passthrough_pt(info) == -1) {
247 PrintError("Failed to activate passthrough page tables\n");
251 // This is hideous... Let's hope that the 1to1 page table has not been nuked...
252 info->ctrl_regs.cr3 = VMXASSIST_1to1_PT;
261 static v3_reg_t * get_reg_ptr(struct guest_info * info, struct vmx_exit_cr_qual * cr_qual) {
262 v3_reg_t * reg = NULL;
264 switch (cr_qual->gpr) {
266 reg = &(info->vm_regs.rax);
269 reg = &(info->vm_regs.rcx);
272 reg = &(info->vm_regs.rdx);
275 reg = &(info->vm_regs.rbx);
278 reg = &(info->vm_regs.rsp);
281 reg = &(info->vm_regs.rbp);
284 reg = &(info->vm_regs.rsi);
287 reg = &(info->vm_regs.rdi);
290 reg = &(info->vm_regs.r8);
293 reg = &(info->vm_regs.r9);
296 reg = &(info->vm_regs.r10);
299 reg = &(info->vm_regs.r11);
302 reg = &(info->vm_regs.r11);
305 reg = &(info->vm_regs.r13);
308 reg = &(info->vm_regs.r14);
311 reg = &(info->vm_regs.r15);