X-Git-Url: http://v3vee.org/palacios/gitweb/gitweb.cgi?a=blobdiff_plain;f=palacios%2Fsrc%2Fpalacios%2Fsvm_handler.c;h=21523f9606a61d0f9cd237a4ae4c7216106d7365;hb=d8e510143aa094363d5bf21d6cb7e31a29a6e826;hp=6f58b7c04af9890dc8448c0e72edc59849864fb7;hpb=2b1f4ef19d766727f873476861c64339c8836a40;p=palacios.git diff --git a/palacios/src/palacios/svm_handler.c b/palacios/src/palacios/svm_handler.c index 6f58b7c..21523f9 100644 --- a/palacios/src/palacios/svm_handler.c +++ b/palacios/src/palacios/svm_handler.c @@ -1,13 +1,13 @@ #include #include #include -#include -#include +#include +#include #include +#include +#include #include -extern struct vmm_os_hooks * os_hooks; - int handle_svm_exit(struct guest_info * info) { vmcb_ctrl_t * guest_ctrl = 0; @@ -22,12 +22,59 @@ int handle_svm_exit(struct guest_info * info) { info->rip = guest_state->rip; info->vm_regs.rsp = guest_state->rsp; info->vm_regs.rax = guest_state->rax; - info->vm_regs.rsp = guest_state->rsp; + + info->cpl = guest_state->cpl; + + + info->ctrl_regs.cr0 = guest_state->cr0; + info->ctrl_regs.cr2 = guest_state->cr2; + info->ctrl_regs.cr3 = guest_state->cr3; + info->ctrl_regs.cr4 = guest_state->cr4; + info->ctrl_regs.cr8 = guest_ctrl->guest_ctrl.V_TPR; + info->ctrl_regs.rflags = guest_state->rflags; + + get_vmcb_segments((vmcb_t*)(info->vmm_data), &(info->segments)); exit_code = guest_ctrl->exit_code; - PrintDebug("SVM Returned: Exit Code: %x\n",exit_code); + + // Disable printing io exits due to bochs debug messages + //if (!((exit_code == VMEXIT_IOIO) && ((ushort_t)(guest_ctrl->exit_info1 >> 16) == 0x402))) { + + + PrintDebug("SVM Returned: Exit Code: 0x%x \t\t(tsc=%ul)\n",exit_code, (uint_t)info->time_state.guest_tsc); + + if (exit_code < 0x4f) { + char instr[32]; + int ret; + // Dump out the instr stream + + //PrintDebug("RIP: %x\n", guest_state->rip); + PrintDebug("RIP Linear: %x\n", get_addr_linear(info, info->rip, &(info->segments.cs))); + + // OK, now we will read the instruction + // The only difference between PROTECTED and PROTECTED_PG is whether we read + // from guest_pa or guest_va + if (info->mem_mode == PHYSICAL_MEM) { + // The real rip address is actually a combination of the rip + CS base + ret = read_guest_pa_memory(info, get_addr_linear(info, info->rip, &(info->segments.cs)), 32, instr); + } else { + ret = read_guest_va_memory(info, get_addr_linear(info, info->rip, &(info->segments.cs)), 32, instr); + } + + if (ret != 32) { + // I think we should inject a GPF into the guest + PrintDebug("Could not read instruction (ret=%d)\n", ret); + } else { + + PrintDebug("Instr Stream:\n"); + PrintTraceMemDump(instr, 32); + } + } + + + // } // PrintDebugVMCB((vmcb_t*)(info->vmm_data)); @@ -92,39 +139,58 @@ int handle_svm_exit(struct guest_info * info) { PrintDebug("PageFault at %x (error=%d)\n", fault_addr, *error_code); - + if (info->shdw_pg_mode == SHADOW_PAGING) { + if (handle_shadow_pagefault(info, fault_addr, *error_code) == -1) { + return -1; + } + } else { - if (handle_shadow_pagefault(info, fault_addr, *error_code) == -1) { + PrintDebug("Page fault in un implemented paging mode\n"); + return -1; } + } else if (exit_code == VMEXIT_NPF) { + PrintDebug("Currently unhandled Nested Page Fault\n"); + return -1; + } else if (exit_code == VMEXIT_INVLPG) { + if (info->shdw_pg_mode == SHADOW_PAGING) { + PrintDebug("Invlpg\n"); + if (handle_shadow_invlpg(info) == -1) { + return -1; + } + } + /* - } else if (( (exit_code == VMEXIT_CR3_READ) || - (exit_code == VMEXIT_CR3_WRITE) || - (exit_code == VMEXIT_INVLPG) || (exit_code == VMEXIT_INVLPGA) || - (exit_code == VMEXIT_EXCP14)) && - (info->page_mode == SHADOW_PAGING)) { - handle_shadow_paging(info); */ } else if (exit_code == VMEXIT_INTR) { // handle_svm_intr(info); + } else if (exit_code == VMEXIT_SMI) { + + // handle_svm_smi(info); // ignored for now + } else if (exit_code == VMEXIT_HLT) { PrintDebug("Guest halted\n"); - return -1; + if (handle_svm_halt(info) == -1) { + return -1; + } + } else if (exit_code == VMEXIT_PAUSE) { + PrintDebug("Guest paused\n"); + if (handle_svm_pause(info) == -1) { + return -1; + } } else { addr_t rip_addr; char buf[15]; addr_t host_addr; - if (info->cpu_mode == REAL) { - rip_addr = get_addr_linear(info, guest_state->rip, guest_state->cs.selector); - } else { - rip_addr = get_addr_linear(info, guest_state->rip, guest_state->cs.base); - } + + rip_addr = get_addr_linear(info, guest_state->rip, &(info->segments.cs)); + PrintDebug("SVM Returned:(VMCB=%x)\n", info->vmm_data); @@ -141,8 +207,18 @@ int handle_svm_exit(struct guest_info * info) { - if (guest_pa_to_host_pa(info, guest_state->rip, &host_addr) == -1) { - PrintDebug("Could not translate guest_state->rip to host address\n"); + if (info->mem_mode == PHYSICAL_MEM) { + if (guest_pa_to_host_pa(info, guest_state->rip, &host_addr) == -1) { + PrintDebug("Could not translate guest_state->rip to host address\n"); + return -1; + } + } else if (info->mem_mode == VIRTUAL_MEM) { + if (guest_va_to_host_pa(info, guest_state->rip, &host_addr) == -1) { + PrintDebug("Could not translate guest_state->rip to host address\n"); + return -1; + } + } else { + PrintDebug("Invalid memory mode\n"); return -1; } @@ -152,37 +228,70 @@ int handle_svm_exit(struct guest_info * info) { PrintDebug("Reading from 0x%x in guest\n", rip_addr); - read_guest_pa_memory(info, rip_addr, 15, buf); + if (info->mem_mode == PHYSICAL_MEM) { + read_guest_pa_memory(info, rip_addr, 15, buf); + } else { + read_guest_va_memory(info, rip_addr, 15, buf); + } PrintTraceMemDump(buf, 15); - while(1); + return -1; } // Update the low level state - if (intr_pending(&(info->intr_state))) { - - switch (get_intr_type(&(info->intr_state))) { - case EXTERNAL_IRQ: - guest_ctrl->EVENTINJ.vector = get_intr_number(&(info->intr_state)); - guest_ctrl->EVENTINJ.valid = 1; - guest_ctrl->EVENTINJ.type = SVM_INJECTION_EXTERNAL_INTR; - - break; + if (intr_pending(info)) { + + switch (get_intr_type(info)) { + case EXTERNAL_IRQ: + { + uint_t irq = get_intr_number(info); + /* + guest_ctrl->EVENTINJ.vector = irq; + guest_ctrl->EVENTINJ.valid = 1; + guest_ctrl->EVENTINJ.type = SVM_INJECTION_EXTERNAL_INTR; + */ + + guest_ctrl->guest_ctrl.V_IRQ = 1; + guest_ctrl->guest_ctrl.V_INTR_VECTOR = irq; + guest_ctrl->guest_ctrl.V_IGN_TPR = 1; + guest_ctrl->guest_ctrl.V_INTR_PRIO = 0xf; + + PrintDebug("Injecting Interrupt %d (EIP=%x)\n", guest_ctrl->guest_ctrl.V_INTR_VECTOR, info->rip); + + injecting_intr(info, irq, EXTERNAL_IRQ); + + break; + } case NMI: guest_ctrl->EVENTINJ.type = SVM_INJECTION_NMI; break; case EXCEPTION: - guest_ctrl->EVENTINJ.type = SVM_INJECTION_EXCEPTION; - guest_ctrl->EVENTINJ.error_code = info->intr_state.excp_error_code; - break; - case SOFTWARE: + { + uint_t excp = get_intr_number(info); + + guest_ctrl->EVENTINJ.type = SVM_INJECTION_EXCEPTION; + + if (info->intr_state.excp_error_code_valid) { //PAD + guest_ctrl->EVENTINJ.error_code = info->intr_state.excp_error_code; + guest_ctrl->EVENTINJ.ev = 1; + PrintDebug("Injecting error code %x\n", guest_ctrl->EVENTINJ.error_code); + } + + guest_ctrl->EVENTINJ.vector = excp; + + guest_ctrl->EVENTINJ.valid = 1; + PrintDebug("Injecting Interrupt %d (EIP=%x)\n", guest_ctrl->EVENTINJ.vector, info->rip); + injecting_intr(info, excp, EXCEPTION); + break; + } + case SOFTWARE_INTR: guest_ctrl->EVENTINJ.type = SVM_INJECTION_SOFT_INTR; break; - case VIRTUAL: + case VIRTUAL_INTR: guest_ctrl->EVENTINJ.type = SVM_INJECTION_VIRTUAL_INTR; break; @@ -192,58 +301,30 @@ int handle_svm_exit(struct guest_info * info) { return -1; } + } - PrintDebug("Injecting Interrupt %d (EIP=%x)\n", guest_ctrl->EVENTINJ.vector, info->rip); - - - // IMPORTANT TODO - // We need to figure out stack parameters.... - - //EVENTINJ.error_code - } + guest_state->cr0 = info->ctrl_regs.cr0; + guest_state->cr2 = info->ctrl_regs.cr2; + guest_state->cr3 = info->ctrl_regs.cr3; + guest_state->cr4 = info->ctrl_regs.cr4; + guest_ctrl->guest_ctrl.V_TPR = info->ctrl_regs.cr8 & 0xff; + guest_state->rflags = info->ctrl_regs.rflags; + guest_state->cpl = info->cpl; guest_state->rax = info->vm_regs.rax; guest_state->rip = info->rip; guest_state->rsp = info->vm_regs.rsp; - if (exit_code == VMEXIT_INTR) { - PrintDebug("INTR ret IP = %x\n", guest_state->rip); - } - - return 0; -} - - + set_vmcb_segments((vmcb_t*)(info->vmm_data), &(info->segments)); -int handle_shadow_paging(struct guest_info * info) { - vmcb_ctrl_t * guest_ctrl = GET_VMCB_CTRL_AREA((vmcb_t*)(info->vmm_data)); - // vmcb_saved_state_t * guest_state = GET_VMCB_SAVE_STATE_AREA((vmcb_t*)(info->vmm_data)); - - if (guest_ctrl->exit_code == VMEXIT_CR3_READ) { - + if (exit_code == VMEXIT_INTR) { + //PrintDebug("INTR ret IP = %x\n", guest_state->rip); } return 0; } - - -int handle_svm_intr(struct guest_info * info) { - vmcb_ctrl_t * guest_ctrl = GET_VMCB_CTRL_AREA((vmcb_t*)(info->vmm_data)); - // vmcb_saved_state_t * guest_state = GET_VMCB_SAVE_STATE_AREA((vmcb_t*)(info->vmm_data)); - - //struct Interrupt_Info * int_info = &(guest_ctrl->exit_int_info); - - //struct vmm_irq_hook * get_irq_hook(&(info->irq_map), int_info->vector); - - PrintDebug("SVM Returned: Exit Code: %x\n",guest_ctrl->exit_code); - PrintDebug("V_INTR_VECTOR: 0x%x\n", guest_ctrl->guest_ctrl.V_INTR_VECTOR); - - while(1); - - return 0; -}