X-Git-Url: http://v3vee.org/palacios/gitweb/gitweb.cgi?a=blobdiff_plain;f=palacios%2Fsrc%2Fpalacios%2Fvmx_handler.c;h=af76455dcddec729a5169a5370eab7a938897abd;hb=cfcceed5890430afedcc544bd7dbb69e29dfd65a;hp=f872aeefb4cc95e7d269d82a3fff8dfa3d9d4036;hpb=61597ea2c5ccace036d8a65e429e32b8f8a7ed4a;p=palacios.git diff --git a/palacios/src/palacios/vmx_handler.c b/palacios/src/palacios/vmx_handler.c index f872aee..af76455 100644 --- a/palacios/src/palacios/vmx_handler.c +++ b/palacios/src/palacios/vmx_handler.c @@ -28,11 +28,16 @@ #include #include #include +#include +#ifdef CONFIG_TELEMETRY +#include +#endif -static int inline check_vmcs_write(vmcs_field_t field, addr_t val) -{ + +static int inline check_vmcs_write(vmcs_field_t field, addr_t val) { int ret = 0; + ret = vmcs_write(field, val); if (ret != VMX_SUCCESS) { @@ -42,9 +47,9 @@ static int inline check_vmcs_write(vmcs_field_t field, addr_t val) return ret; } -static int inline check_vmcs_read(vmcs_field_t field, void * val) -{ +static int inline check_vmcs_read(vmcs_field_t field, void * val) { int ret = 0; + ret = vmcs_read(field, val); if (ret != VMX_SUCCESS) { @@ -54,351 +59,336 @@ static int inline check_vmcs_read(vmcs_field_t field, void * val) return ret; } -static void inline translate_access_to_v3_seg(struct vmcs_segment_access * access, - struct v3_segment * v3_seg) { - v3_seg->type = access->type; - v3_seg->system = access->desc_type; - v3_seg->dpl = access->dpl; - v3_seg->present = access->present; - v3_seg->avail = access->avail; - v3_seg->long_mode = access->long_mode; - v3_seg->db = access->db; - v3_seg->granularity = access->granularity; +static int inline handle_cr_access(struct guest_info * info, ulong_t exit_qual) { + struct vmx_exit_cr_qual * cr_qual = (struct vmx_exit_cr_qual *)&exit_qual; + + // PrintDebug("Control register: %d\n", cr_qual->access_type); + switch(cr_qual->cr_id) { + case 0: + PrintDebug("Handling CR0 Access\n"); + return v3_vmx_handle_cr0_access(info); + case 3: + PrintDebug("Handling CR3 Access\n"); + return v3_vmx_handle_cr3_access(info); + default: + PrintError("Unhandled CR access: %d\n", cr_qual->cr_id); + return -1; + } + + return -1; } -static int load_vmcs_guest_state(struct guest_info * info) -{ - - struct vmcs_segment_access access; - int ret = 0; - - // JRL: Add error checking - memset(&access, 0, sizeof(access)); - - /* CS Segment */ - check_vmcs_read(VMCS_GUEST_CS_BASE, &(info->segments.cs.base)); - check_vmcs_read(VMCS_GUEST_CS_SELECTOR, &(info->segments.cs.selector)); - check_vmcs_read(VMCS_GUEST_CS_LIMIT, &(info->segments.cs.limit)); - check_vmcs_read(VMCS_GUEST_CS_ACCESS, &(access.value)); +/* At this point the GPRs are already copied into the guest_info state */ +int v3_handle_vmx_exit(struct v3_gprs * gprs, struct guest_info * info, struct v3_ctrl_regs * ctrl_regs) { + uint64_t tmp_tsc = 0; + uint32_t exit_reason = 0; + addr_t exit_qual = 0; + struct vmx_data * vmx_info = (struct vmx_data *)(info->vmm_data); + struct vmx_exit_idt_vec_info idt_vec_info; - translate_access_to_v3_seg(&access, &(info->segments.cs)); + rdtscll(tmp_tsc); + v3_update_time(info, tmp_tsc - info->time_state.cached_host_tsc); - /* SS Segment */ - check_vmcs_read(VMCS_GUEST_SS_BASE, &(info->segments.ss.base)); - check_vmcs_read(VMCS_GUEST_SS_SELECTOR, &(info->segments.ss.selector)); - check_vmcs_read(VMCS_GUEST_SS_LIMIT, &(info->segments.ss.limit)); - check_vmcs_read(VMCS_GUEST_SS_ACCESS, &(access.value)); + v3_enable_ints(); - translate_access_to_v3_seg(&access, &(info->segments.ss)); + check_vmcs_read(VMCS_EXIT_REASON, &exit_reason); + check_vmcs_read(VMCS_EXIT_QUAL, &exit_qual); - /* DS Segment */ - check_vmcs_read(VMCS_GUEST_DS_BASE, &(info->segments.ds.base)); - check_vmcs_read(VMCS_GUEST_DS_SELECTOR, &(info->segments.ds.selector)); - check_vmcs_read(VMCS_GUEST_DS_LIMIT, &(info->segments.ds.limit)); - check_vmcs_read(VMCS_GUEST_DS_ACCESS, &(access.value)); + //PrintDebug("VMX Exit taken, id-qual: %u-%lu\n", exit_reason, exit_qual); - translate_access_to_v3_seg(&access, &(info->segments.ds)); + /* Update guest state */ + v3_load_vmcs_guest_state(info); - /* ES Segment */ - check_vmcs_read(VMCS_GUEST_ES_BASE, &(info->segments.es.base)); - check_vmcs_read(VMCS_GUEST_ES_SELECTOR, &(info->segments.es.selector)); - check_vmcs_read(VMCS_GUEST_ES_LIMIT, &(info->segments.es.limit)); - check_vmcs_read(VMCS_GUEST_ES_ACCESS, &(access.value)); + // Load execution controls + check_vmcs_read(VMCS_PIN_CTRLS, &(vmx_info->pin_ctrls.value)); + check_vmcs_read(VMCS_PROC_CTRLS, &(vmx_info->pri_proc_ctrls.value)); - translate_access_to_v3_seg(&access, &(info->segments.es)); + if (vmx_info->pri_proc_ctrls.sec_ctrls) { + check_vmcs_read(VMCS_SEC_PROC_CTRLS, &(vmx_info->sec_proc_ctrls.value)); + } - /* FS Segment */ - check_vmcs_read(VMCS_GUEST_FS_BASE, &(info->segments.fs.base)); - check_vmcs_read(VMCS_GUEST_FS_SELECTOR, &(info->segments.fs.selector)); - check_vmcs_read(VMCS_GUEST_FS_LIMIT, &(info->segments.fs.limit)); - check_vmcs_read(VMCS_GUEST_FS_ACCESS, &(access.value)); + info->mem_mode = v3_get_vm_mem_mode(info); + info->cpu_mode = v3_get_vm_cpu_mode(info); - translate_access_to_v3_seg(&access, &(info->segments.fs)); + // Check if we got interrupted while delivering interrupt + // Variable will be used later if this is true + check_vmcs_read(VMCS_IDT_VECTOR_INFO, &(idt_vec_info.value)); - /* GS Segment */ - check_vmcs_read(VMCS_GUEST_GS_BASE, &(info->segments.gs.base)); - check_vmcs_read(VMCS_GUEST_GS_SELECTOR, &(info->segments.gs.selector)); - check_vmcs_read(VMCS_GUEST_GS_LIMIT, &(info->segments.gs.limit)); - check_vmcs_read(VMCS_GUEST_GS_ACCESS, &(access.value)); + if ((info->intr_state.irq_started == 1) && (idt_vec_info.valid == 0)) { +#ifdef CONFIG_DEBUG_INTERRUPTS + PrintDebug("Calling v3_injecting_intr\n"); +#endif + info->intr_state.irq_started = 0; + v3_injecting_intr(info, info->intr_state.irq_vector, V3_EXTERNAL_IRQ); + } - translate_access_to_v3_seg(&access, &(info->segments.gs)); + info->num_exits++; - /* LDTR Segment */ - check_vmcs_read(VMCS_GUEST_LDTR_BASE, &(info->segments.ldtr.base)); - check_vmcs_read(VMCS_GUEST_LDTR_SELECTOR, &(info->segments.ldtr.selector)); - check_vmcs_read(VMCS_GUEST_LDTR_LIMIT, &(info->segments.ldtr.limit)); - check_vmcs_read(VMCS_GUEST_LDTR_ACCESS, &(access.value)); - translate_access_to_v3_seg(&access, &(info->segments.ldtr)); - /* TR Segment */ - check_vmcs_read(VMCS_GUEST_TR_BASE, &(info->segments.tr.base)); - check_vmcs_read(VMCS_GUEST_TR_SELECTOR, &(info->segments.tr.selector)); - check_vmcs_read(VMCS_GUEST_TR_LIMIT, &(info->segments.tr.limit)); - check_vmcs_read(VMCS_GUEST_TR_ACCESS, &(access.value)); + if ((info->num_exits % 5000) == 0) { + PrintDebug("VMX Exit %d\n", (uint32_t)info->num_exits); + } - translate_access_to_v3_seg(&access, &(info->segments.tr)); +#ifdef CONFIG_TELEMETRY + if (info->enable_telemetry) { + v3_telemetry_start_exit(info); + } +#endif - /* GDTR Segment */ - check_vmcs_read(VMCS_GUEST_GDTR_BASE, &(info->segments.gdtr.base)); - check_vmcs_read(VMCS_GUEST_GDTR_LIMIT, &(info->segments.gdtr.limit)); - - /* IDTR Segment */ - check_vmcs_read(VMCS_GUEST_IDTR_BASE, &(info->segments.idtr.base)); - check_vmcs_read(VMCS_GUEST_IDTR_LIMIT, &(info->segments.idtr.limit)); + switch (exit_reason) { + case VMEXIT_INFO_EXCEPTION_OR_NMI: { + uint32_t int_info; + pf_error_t error_code; + check_vmcs_read(VMCS_EXIT_INT_INFO, &int_info); + check_vmcs_read(VMCS_EXIT_INT_ERR, &error_code); - /* - * Read the control state - */ - check_vmcs_read(VMCS_GUEST_RIP, &(info->rip)); - check_vmcs_read(VMCS_GUEST_RSP, &(info->vm_regs.rsp)); - check_vmcs_read(VMCS_GUEST_CR0, &(info->ctrl_regs.cr0)); - check_vmcs_read(VMCS_CR0_READ_SHDW, &(info->shdw_pg_state.guest_cr0)); - check_vmcs_read(VMCS_GUEST_CR3, &(info->ctrl_regs.cr3)); - check_vmcs_read(VMCS_GUEST_CR4, &(info->ctrl_regs.cr4)); + // JRL: Change "0x0e" to a macro value + if ((uint8_t)int_info == 0x0e) { +#ifdef CONFIG_DEBUG_SHADOW_PAGING + PrintDebug("Page Fault at %p error_code=%x\n", (void *)exit_qual, *(uint32_t *)&error_code); +#endif - return ret; -} + if (info->shdw_pg_mode == SHADOW_PAGING) { + if (v3_handle_shadow_pagefault(info, (addr_t)exit_qual, error_code) == -1) { + PrintError("Error handling shadow page fault\n"); + return -1; + } + } else { + PrintError("Page fault in unimplemented paging mode\n"); + return -1; + } + } else { + PrintError("Unknown exception: 0x%x\n", (uint8_t)int_info); + v3_print_GPRs(info); + return -1; + } + break; + } + case VMEXIT_INVLPG: + if (info->shdw_pg_mode == SHADOW_PAGING) { + if (v3_handle_shadow_invlpg(info) == -1) { + PrintError("Error handling INVLPG\n"); + return -1; + } + } -#if 0 -static void setup_v8086_mode_for_boot(struct guest_info * info) -{ + break; + case VMEXIT_CPUID: { + int instr_len; + uint32_t target = info->vm_regs.rax; - ((struct vmx_data *)info->vmm_data)->state = VMXASSIST_V8086_BIOS; - struct rflags * flags = (struct rflags *)&(info->ctrl_regs.rflags); - flags->rsvd1 = 1; - flags->vm = 1; - flags->iopl = 3; + v3_cpuid(target, (addr_t *)&(info->vm_regs.rax), (addr_t *)&(info->vm_regs.rbx), + (addr_t *)&(info->vm_regs.rcx), (addr_t *)&(info->vm_regs.rdx)); - info->rip = 0xfff0; - - /* Zero the segment registers */ - memset(&(info->segments), 0, sizeof(struct v3_segment)*6); + check_vmcs_read(VMCS_EXIT_INSTR_LEN, &instr_len); + info->rip += instr_len; - info->segments.cs.selector = 0xf000; - info->segments.cs.base = 0xf000 << 4; - info->segments.cs.limit = 0xffff; - info->segments.cs.type = 3; - info->segments.cs.system = 1; - info->segments.cs.dpl = 3; - info->segments.cs.present = 1; - info->segments.cs.granularity = 0; + break; + } + case VMEXIT_RDMSR: + if (v3_handle_msr_read(info) == -1) { + PrintError("Error handling MSR Read\n"); + return -1; + } - int i; - - /* Set values for selectors ds through ss */ - struct v3_segment * seg_ptr = (struct v3_segment *)&(info->segments); - for(i = 1; i < 6 ; i++) { - seg_ptr[i].selector = 0x0000; - seg_ptr[i].base = 0x00000; - seg_ptr[i].limit = 0xffff; - seg_ptr[i].type = 3; - seg_ptr[i].system = 1; - seg_ptr[i].dpl = 3; - seg_ptr[i].present = 1; - seg_ptr[i].granularity = 0; - } + break; + case VMEXIT_WRMSR: + if (v3_handle_msr_write(info) == -1) { + PrintError("Error handling MSR Write\n"); + return -1; + } -} + break; + case VMEXIT_IO_INSTR: { + struct vmx_exit_io_qual * io_qual = (struct vmx_exit_io_qual *)&exit_qual; + + if (io_qual->dir == 0) { + if (io_qual->string) { + if (v3_handle_vmx_io_outs(info) == -1) { + PrintError("Error in outs IO handler\n"); + return -1; + } + } else { + if (v3_handle_vmx_io_out(info) == -1) { + PrintError("Error in out IO handler\n"); + return -1; + } + } + } else { + if (io_qual->string) { + if(v3_handle_vmx_io_ins(info) == -1) { + PrintError("Error in ins IO handler\n"); + return -1; + } + } else { + if (v3_handle_vmx_io_in(info) == -1) { + PrintError("Error in in IO handler\n"); + return -1; + } + } + } + break; + } + case VMEXIT_CR_REG_ACCESSES: + if (handle_cr_access(info, exit_qual) != 0) { + PrintError("Error handling CR access\n"); + return -1; + } -#endif - -static int inline handle_cr_access(struct guest_info * info, ulong_t exit_qual) { - struct vmexit_cr_qual * cr_qual = (struct vmexit_cr_qual *)&exit_qual; + break; + case VMEXIT_HLT: + PrintDebug("Guest halted\n"); - PrintDebug("Control register: %d\n", cr_qual->access_type); + if (v3_handle_halt(info) == -1) { + PrintError("Error handling halt instruction\n"); + return -1; + } - if (cr_qual->access_type < 2) { - v3_reg_t reg = 0; - - switch(cr_qual->gpr) { - case 0: - reg = info->vm_regs.rax; - break; - case 1: - reg = info->vm_regs.rcx; - break; - case 2: - reg = info->vm_regs.rdx; - break; - case 3: - reg = info->vm_regs.rbx; - break; - case 4: - reg = info->vm_regs.rsp; - break; - case 5: - reg = info->vm_regs.rbp; - break; - case 6: - reg = info->vm_regs.rsi; - break; - case 7: - reg = info->vm_regs.rdi; - break; - case 8: - reg = info->vm_regs.r8; - break; - case 9: - reg = info->vm_regs.r9; - break; - case 10: - reg = info->vm_regs.r10; - break; - case 11: - reg = info->vm_regs.r11; - break; - case 12: - reg = info->vm_regs.r11; - break; - case 13: - reg = info->vm_regs.r13; - break; - case 14: - reg = info->vm_regs.r14; - break; - case 15: - reg = info->vm_regs.r15; - break; - } + break; + case VMEXIT_PAUSE: + // Handled as NOP + info->rip += 2; - if (cr_qual->cr_id == 0) { - uint32_t instr_len; + break; + case VMEXIT_EXTERNAL_INTR: + // Interrupts are handled outside switch + break; + case VMEXIT_INTR_WINDOW: - vmcs_read(VMCS_EXIT_INSTR_LEN, &instr_len); + vmx_info->pri_proc_ctrls.int_wndw_exit = 0; + check_vmcs_write(VMCS_PROC_CTRLS, vmx_info->pri_proc_ctrls.value); - if ( ~reg & CR0_PE ) { +#ifdef CONFIG_DEBUG_INTERRUPTS + PrintDebug("Interrupts available again! (RIP=%llx)\n", info->rip); +#endif - if (v3_vmxassist_ctx_switch(info) != 0) { - PrintError("Unable to execute VMXASSIST context switch!\n"); - return -1; - } + break; + default: + PrintError("Unhandled VMEXIT: %s (%u), %lu (0x%lx)\n", + v3_vmx_exit_code_to_str(exit_reason), + exit_reason, exit_qual, exit_qual); + return -1; + } - load_vmcs_guest_state(info); +#ifdef CONFIG_TELEMETRY + if (info->enable_telemetry) { + v3_telemetry_end_exit(info, exit_reason); + } +#endif - ((struct vmx_data *)info->vmm_data)->state = VMXASSIST_ENABLED; - PrintDebug("Loading vmxassist at RIP: 0x%p\n", (void *)info->rip); - return 0; - } else if (v3_vmx_handle_cr0_write(info, reg) != 0) { - PrintError("Could not handle CR0 Write\n"); - return -1; - } + /* Check for pending exceptions to inject */ + if (v3_excp_pending(info)) { + struct vmx_entry_int_info int_info; + int_info.value = 0; - load_vmcs_guest_state(info); + // In VMX, almost every exception is hardware + // Software exceptions are pretty much only for breakpoint or overflow + int_info.type = 3; + int_info.vector = v3_get_excp_number(info); - PrintDebug("Leaving VMXASSIST and entering protected mode at RIP: 0x%p\n", (void *)info->rip); + if (info->excp_state.excp_error_code_valid) { + check_vmcs_write(VMCS_ENTRY_EXCP_ERR, info->excp_state.excp_error_code); + int_info.error_code = 1; - return 0; + PrintDebug("Injecting exception %d with error code %x\n", + int_info.vector, info->excp_state.excp_error_code); } - } - PrintError("Unhandled CR access\n"); - return -1; -} + int_info.valid = 1; + PrintDebug("Injecting exception %d (EIP=%p)\n", int_info.vector, (void *)info->rip); + check_vmcs_write(VMCS_ENTRY_INT_INFO, int_info.value); + v3_injecting_excp(info, int_info.vector); -/* At this point the GPRs are already copied into the guest_info state */ -int v3_handle_vmx_exit(struct v3_gprs * gprs, struct guest_info * info) { - uint32_t exit_reason; - ulong_t exit_qual; + } else if (((struct rflags *)&(info->ctrl_regs.rflags))->intr == 1) { + + if ((info->intr_state.irq_started == 1) && (idt_vec_info.valid == 1)) { - check_vmcs_read(VMCS_EXIT_REASON, &exit_reason); - check_vmcs_read(VMCS_EXIT_QUAL, &exit_qual); +#ifdef CONFIG_DEBUG_INTERRUPTS + PrintDebug("IRQ pending from previous injection\n"); +#endif - // PrintDebug("VMX Exit taken, id-qual: %u-%lu\n", exit_reason, exit_qual); + // Copy the IDT vectoring info over to reinject the old interrupt + if (idt_vec_info.error_code == 1) { + uint32_t err_code = 0; - /* Update guest state */ - load_vmcs_guest_state(info); - - switch (exit_reason) { - case VMEXIT_INFO_EXCEPTION_OR_NMI: { - uint32_t int_info; - pf_error_t error_code; - - check_vmcs_read(VMCS_EXIT_INT_INFO, &int_info); - check_vmcs_read(VMCS_EXIT_INT_ERR, &error_code); - - // JRL: Change "0x0e" to a macro value - if ((uint8_t)int_info == 0x0e) { - PrintDebug("Page Fault at %p\n", (void *)exit_qual); - - if (info->shdw_pg_mode == SHADOW_PAGING) { - if (v3_handle_shadow_pagefault(info, (addr_t)exit_qual, error_code) == -1) { - PrintError("Error handling shadow page fault\n"); - return -1; - } - } else { - PrintError("Page fault in unimplemented paging mode\n"); - return -1; - } - } else { - PrintDebug("Unknown exception: 0x%x\n", (uint8_t)int_info); - v3_print_GPRs(info); - return -1; - } - break; - } - - case VMEXIT_CPUID: { - int instr_len; + check_vmcs_read(VMCS_IDT_VECTOR_ERR, &err_code); + check_vmcs_write(VMCS_ENTRY_EXCP_ERR, err_code); + } - v3_cpuid(info->vm_regs.rax, (addr_t *)&(info->vm_regs.rax), (addr_t *)&(info->vm_regs.rbx), - (addr_t *)&(info->vm_regs.rcx), (addr_t *)&(info->vm_regs.rdx)); + idt_vec_info.undef = 0; + check_vmcs_write(VMCS_ENTRY_INT_INFO, idt_vec_info.value); + + } else { + struct vmx_entry_int_info ent_int; + ent_int.value = 0; + + switch (v3_intr_pending(info)) { + case V3_EXTERNAL_IRQ: { + info->intr_state.irq_vector = v3_get_intr(info); + ent_int.vector = info->intr_state.irq_vector; + ent_int.type = 0; + ent_int.error_code = 0; + ent_int.valid = 1; + +#ifdef CONFIG_DEBUG_INTERRUPTS + PrintDebug("Injecting Interrupt %d at exit %u(EIP=%p)\n", + info->intr_state.irq_vector, + (uint32_t)info->num_exits, + (void *)info->rip); +#endif - check_vmcs_read(VMCS_EXIT_INSTR_LEN, &instr_len); + check_vmcs_write(VMCS_ENTRY_INT_INFO, ent_int.value); + info->intr_state.irq_started = 1; - info->rip += instr_len; - break; - } - - case VMEXIT_IO_INSTR: { - struct vmexit_io_qual * io_qual = (struct vmexit_io_qual *)&exit_qual; - - if (io_qual->dir == 0) { - if (io_qual->string) { - if (v3_handle_vmx_io_outs(info) == -1) { - PrintError("Error in outs IO handler\n"); - return -1; - } - } else { - if (v3_handle_vmx_io_out(info) == -1) { - PrintError("Error in out IO handler\n"); - return -1; - } - } - } else { - if (io_qual->string) { - if(v3_handle_vmx_io_ins(info) == -1) { - PrintError("Error in ins IO handler\n"); - return -1; - } - } else { - if (v3_handle_vmx_io_in(info) == -1) { - PrintError("Error in in IO handler\n"); - return -1; - } - } - } - break; - } - - case VMEXIT_CR_REG_ACCESSES: - if (handle_cr_access(info,exit_qual) != 0) { - PrintError("Error handling CR access\n"); - return -1; - } + break; + } + case V3_NMI: + PrintDebug("Injecting NMI\n"); + + ent_int.type = 2; + ent_int.vector = 2; + ent_int.valid = 1; + check_vmcs_write(VMCS_ENTRY_INT_INFO, ent_int.value); + + break; + case V3_SOFTWARE_INTR: + PrintDebug("Injecting software interrupt\n"); + ent_int.type = 4; + + ent_int.valid = 1; + check_vmcs_write(VMCS_ENTRY_INT_INFO, ent_int.value); + + break; + case V3_VIRTUAL_IRQ: + // Not sure what to do here, Intel doesn't have virtual IRQs + // May be the same as external interrupts/IRQs + + break; + case V3_INVALID_INTR: + default: + break; + } + } + } else if ((v3_intr_pending(info)) && (vmx_info->pri_proc_ctrls.int_wndw_exit == 0)) { + // Enable INTR window exiting so we know when IF=1 + uint32_t instr_len; - break; + check_vmcs_read(VMCS_EXIT_INSTR_LEN, &instr_len); - default: - PrintError("Unhandled VMEXIT: %u (0x%x), %lu (0x%lx)\n", exit_reason, exit_reason, exit_qual, exit_qual); - return -1; +#ifdef CONFIG_DEBUG_INTERRUPTS + PrintDebug("Enabling Interrupt-Window exiting: %d\n", instr_len); +#endif + + vmx_info->pri_proc_ctrls.int_wndw_exit = 1; + check_vmcs_write(VMCS_PROC_CTRLS, vmx_info->pri_proc_ctrls.value); } check_vmcs_write(VMCS_GUEST_CR0, info->ctrl_regs.cr0); @@ -409,5 +399,168 @@ int v3_handle_vmx_exit(struct v3_gprs * gprs, struct guest_info * info) { check_vmcs_write(VMCS_CR0_READ_SHDW, info->shdw_pg_state.guest_cr0); + v3_disable_ints(); + + rdtscll(info->time_state.cached_host_tsc); + return 0; } + +static const char VMEXIT_INFO_EXCEPTION_OR_NMI_STR[] = "VMEXIT_INFO_EXCEPTION_OR_NMI"; +static const char VMEXIT_EXTERNAL_INTR_STR[] = "VMEXIT_EXTERNAL_INTR"; +static const char VMEXIT_TRIPLE_FAULT_STR[] = "VMEXIT_TRIPLE_FAULT"; +static const char VMEXIT_INIT_SIGNAL_STR[] = "VMEXIT_INIT_SIGNAL"; +static const char VMEXIT_STARTUP_IPI_STR[] = "VMEXIT_STARTUP_IPI"; +static const char VMEXIT_IO_SMI_STR[] = "VMEXIT_IO_SMI"; +static const char VMEXIT_OTHER_SMI_STR[] = "VMEXIT_OTHER_SMI"; +static const char VMEXIT_INTR_WINDOW_STR[] = "VMEXIT_INTR_WINDOW"; +static const char VMEXIT_NMI_WINDOW_STR[] = "VMEXIT_NMI_WINDOW"; +static const char VMEXIT_TASK_SWITCH_STR[] = "VMEXIT_TASK_SWITCH"; +static const char VMEXIT_CPUID_STR[] = "VMEXIT_CPUID"; +static const char VMEXIT_HLT_STR[] = "VMEXIT_HLT"; +static const char VMEXIT_INVD_STR[] = "VMEXIT_INVD"; +static const char VMEXIT_INVLPG_STR[] = "VMEXIT_INVLPG"; +static const char VMEXIT_RDPMC_STR[] = "VMEXIT_RDPMC"; +static const char VMEXIT_RDTSC_STR[] = "VMEXIT_RDTSC"; +static const char VMEXIT_RSM_STR[] = "VMEXIT_RSM"; +static const char VMEXIT_VMCALL_STR[] = "VMEXIT_VMCALL"; +static const char VMEXIT_VMCLEAR_STR[] = "VMEXIT_VMCLEAR"; +static const char VMEXIT_VMLAUNCH_STR[] = "VMEXIT_VMLAUNCH"; +static const char VMEXIT_VMPTRLD_STR[] = "VMEXIT_VMPTRLD"; +static const char VMEXIT_VMPTRST_STR[] = "VMEXIT_VMPTRST"; +static const char VMEXIT_VMREAD_STR[] = "VMEXIT_VMREAD"; +static const char VMEXIT_VMRESUME_STR[] = "VMEXIT_VMRESUME"; +static const char VMEXIT_VMWRITE_STR[] = "VMEXIT_VMWRITE"; +static const char VMEXIT_VMXOFF_STR[] = "VMEXIT_VMXOFF"; +static const char VMEXIT_VMXON_STR[] = "VMEXIT_VMXON"; +static const char VMEXIT_CR_REG_ACCESSES_STR[] = "VMEXIT_CR_REG_ACCESSES"; +static const char VMEXIT_MOV_DR_STR[] = "VMEXIT_MOV_DR"; +static const char VMEXIT_IO_INSTR_STR[] = "VMEXIT_IO_INSTR"; +static const char VMEXIT_RDMSR_STR[] = "VMEXIT_RDMSR"; +static const char VMEXIT_WRMSR_STR[] = "VMEXIT_WRMSR"; +static const char VMEXIT_ENTRY_FAIL_INVALID_GUEST_STATE_STR[] = "VMEXIT_ENTRY_FAIL_INVALID_GUEST_STATE"; +static const char VMEXIT_ENTRY_FAIL_MSR_LOAD_STR[] = "VMEXIT_ENTRY_FAIL_MSR_LOAD"; +static const char VMEXIT_MWAIT_STR[] = "VMEXIT_MWAIT"; +static const char VMEXIT_MONITOR_STR[] = "VMEXIT_MONITOR"; +static const char VMEXIT_PAUSE_STR[] = "VMEXIT_PAUSE"; +static const char VMEXIT_ENTRY_FAILURE_MACHINE_CHECK_STR[] = "VMEXIT_ENTRY_FAILURE_MACHINE_CHECK"; +static const char VMEXIT_TPR_BELOW_THRESHOLD_STR[] = "VMEXIT_TPR_BELOW_THRESHOLD"; +static const char VMEXIT_APIC_STR[] = "VMEXIT_APIC"; +static const char VMEXIT_GDTR_IDTR_STR[] = "VMEXIT_GDTR_IDTR"; +static const char VMEXIT_LDTR_TR_STR[] = "VMEXIT_LDTR_TR"; +static const char VMEXIT_EPT_VIOLATION_STR[] = "VMEXIT_EPT_VIOLATION"; +static const char VMEXIT_EPT_CONFIG_STR[] = "VMEXIT_EPT_CONFIG"; +static const char VMEXIT_INVEPT_STR[] = "VMEXIT_INVEPT"; +static const char VMEXIT_RDTSCP_STR[] = "VMEXIT_RDTSCP"; +static const char VMEXIT_EXPIRED_PREEMPT_TIMER_STR[] = "VMEXIT_EXPIRED_PREEMPT_TIMER"; +static const char VMEXIT_INVVPID_STR[] = "VMEXIT_INVVPID"; +static const char VMEXIT_WBINVD_STR[] = "VMEXIT_WBINVD"; +static const char VMEXIT_XSETBV_STR[] = "VMEXIT_XSETBV"; + +const char * v3_vmx_exit_code_to_str(vmx_exit_t exit) +{ + switch(exit) { + case VMEXIT_INFO_EXCEPTION_OR_NMI: + return VMEXIT_INFO_EXCEPTION_OR_NMI_STR; + case VMEXIT_EXTERNAL_INTR: + return VMEXIT_EXTERNAL_INTR_STR; + case VMEXIT_TRIPLE_FAULT: + return VMEXIT_TRIPLE_FAULT_STR; + case VMEXIT_INIT_SIGNAL: + return VMEXIT_INIT_SIGNAL_STR; + case VMEXIT_STARTUP_IPI: + return VMEXIT_STARTUP_IPI_STR; + case VMEXIT_IO_SMI: + return VMEXIT_IO_SMI_STR; + case VMEXIT_OTHER_SMI: + return VMEXIT_OTHER_SMI_STR; + case VMEXIT_INTR_WINDOW: + return VMEXIT_INTR_WINDOW_STR; + case VMEXIT_NMI_WINDOW: + return VMEXIT_NMI_WINDOW_STR; + case VMEXIT_TASK_SWITCH: + return VMEXIT_TASK_SWITCH_STR; + case VMEXIT_CPUID: + return VMEXIT_CPUID_STR; + case VMEXIT_HLT: + return VMEXIT_HLT_STR; + case VMEXIT_INVD: + return VMEXIT_INVD_STR; + case VMEXIT_INVLPG: + return VMEXIT_INVLPG_STR; + case VMEXIT_RDPMC: + return VMEXIT_RDPMC_STR; + case VMEXIT_RDTSC: + return VMEXIT_RDTSC_STR; + case VMEXIT_RSM: + return VMEXIT_RSM_STR; + case VMEXIT_VMCALL: + return VMEXIT_VMCALL_STR; + case VMEXIT_VMCLEAR: + return VMEXIT_VMCLEAR_STR; + case VMEXIT_VMLAUNCH: + return VMEXIT_VMLAUNCH_STR; + case VMEXIT_VMPTRLD: + return VMEXIT_VMPTRLD_STR; + case VMEXIT_VMPTRST: + return VMEXIT_VMPTRST_STR; + case VMEXIT_VMREAD: + return VMEXIT_VMREAD_STR; + case VMEXIT_VMRESUME: + return VMEXIT_VMRESUME_STR; + case VMEXIT_VMWRITE: + return VMEXIT_VMWRITE_STR; + case VMEXIT_VMXOFF: + return VMEXIT_VMXOFF_STR; + case VMEXIT_VMXON: + return VMEXIT_VMXON_STR; + case VMEXIT_CR_REG_ACCESSES: + return VMEXIT_CR_REG_ACCESSES_STR; + case VMEXIT_MOV_DR: + return VMEXIT_MOV_DR_STR; + case VMEXIT_IO_INSTR: + return VMEXIT_IO_INSTR_STR; + case VMEXIT_RDMSR: + return VMEXIT_RDMSR_STR; + case VMEXIT_WRMSR: + return VMEXIT_WRMSR_STR; + case VMEXIT_ENTRY_FAIL_INVALID_GUEST_STATE: + return VMEXIT_ENTRY_FAIL_INVALID_GUEST_STATE_STR; + case VMEXIT_ENTRY_FAIL_MSR_LOAD: + return VMEXIT_ENTRY_FAIL_MSR_LOAD_STR; + case VMEXIT_MWAIT: + return VMEXIT_MWAIT_STR; + case VMEXIT_MONITOR: + return VMEXIT_MONITOR_STR; + case VMEXIT_PAUSE: + return VMEXIT_PAUSE_STR; + case VMEXIT_ENTRY_FAILURE_MACHINE_CHECK: + return VMEXIT_ENTRY_FAILURE_MACHINE_CHECK_STR; + case VMEXIT_TPR_BELOW_THRESHOLD: + return VMEXIT_TPR_BELOW_THRESHOLD_STR; + case VMEXIT_APIC: + return VMEXIT_APIC_STR; + case VMEXIT_GDTR_IDTR: + return VMEXIT_GDTR_IDTR_STR; + case VMEXIT_LDTR_TR: + return VMEXIT_LDTR_TR_STR; + case VMEXIT_EPT_VIOLATION: + return VMEXIT_EPT_VIOLATION_STR; + case VMEXIT_EPT_CONFIG: + return VMEXIT_EPT_CONFIG_STR; + case VMEXIT_INVEPT: + return VMEXIT_INVEPT_STR; + case VMEXIT_RDTSCP: + return VMEXIT_RDTSCP_STR; + case VMEXIT_EXPIRED_PREEMPT_TIMER: + return VMEXIT_EXPIRED_PREEMPT_TIMER_STR; + case VMEXIT_INVVPID: + return VMEXIT_INVVPID_STR; + case VMEXIT_WBINVD: + return VMEXIT_WBINVD_STR; + case VMEXIT_XSETBV: + return VMEXIT_XSETBV_STR; + } + return NULL; +} +