Palacios Public Git Repository

To checkout Palacios execute

  git clone http://v3vee.org/palacios/palacios.web/palacios.git
This will give you the master branch. You probably want the devel branch or one of the release branches. To switch to the devel branch, simply execute
  cd palacios
  git checkout --track -b devel origin/devel
The other branches are similar.


added memory region generated page tables, and removed all the ugliness that was...
[palacios.git] / palacios / src / geekos / svm.c
1 #include <geekos/svm.h>
2 #include <geekos/vmm.h>
3
4 #include <geekos/vmcb.h>
5 #include <geekos/vmm_mem.h>
6 #include <geekos/vmm_paging.h>
7
8
9 extern struct vmm_os_hooks * os_hooks;
10
11 extern uint_t cpuid_ecx(uint_t op);
12 extern uint_t cpuid_edx(uint_t op);
13 extern void Get_MSR(uint_t MSR, uint_t * high_byte, uint_t * low_byte); 
14 extern void Set_MSR(uint_t MSR, uint_t high_byte, uint_t low_byte);
15 extern uint_t launch_svm(vmcb_t * vmcb_addr);
16
17
18 /* Checks machine SVM capability */
19 /* Implemented from: AMD Arch Manual 3, sect 15.4 */ 
20 int is_svm_capable() {
21   uint_t ret =  cpuid_ecx(CPUID_FEATURE_IDS);
22   uint_t vm_cr_low = 0, vm_cr_high = 0;
23
24
25   if ((ret & CPUID_FEATURE_IDS_ecx_svm_avail) == 0) {
26     PrintDebug("SVM Not Available\n");
27     return 0;
28   } 
29
30   Get_MSR(SVM_VM_CR_MSR, &vm_cr_high, &vm_cr_low);
31
32   if ((vm_cr_low & SVM_VM_CR_MSR_svmdis) == 0) {
33     return 1;
34   }
35
36   ret = cpuid_edx(CPUID_SVM_REV_AND_FEATURE_IDS);
37   
38   if ((ret & CPUID_SVM_REV_AND_FEATURE_IDS_edx_svml) == 0) {
39     PrintDebug("SVM BIOS Disabled, not unlockable\n");
40   } else {
41     PrintDebug("SVM is locked with a key\n");
42   }
43
44   return 0;
45 }
46
47
48
49 void Init_SVM(struct vmm_ctrl_ops * vmm_ops) {
50   reg_ex_t msr;
51   void * host_state;
52
53
54   // Enable SVM on the CPU
55   Get_MSR(EFER_MSR, &(msr.e_reg.high), &(msr.e_reg.low));
56   msr.e_reg.low |= EFER_MSR_svm_enable;
57   Set_MSR(EFER_MSR, 0, msr.e_reg.low);
58   
59   PrintDebug("SVM Enabled\n");
60
61
62   // Setup the host state save area
63   host_state = os_hooks->allocate_pages(1);
64   
65   msr.e_reg.high = 0;
66   msr.e_reg.low = (uint_t)host_state;
67
68
69   PrintDebug("Host State being saved at %x\n", (uint_t)host_state);
70   Set_MSR(SVM_VM_HSAVE_PA_MSR, msr.e_reg.high, msr.e_reg.low);
71
72
73
74   // Setup the SVM specific vmm operations
75   vmm_ops->init_guest = &init_svm_guest;
76   vmm_ops->start_guest = &start_svm_guest;
77
78
79   return;
80 }
81
82
83 int init_svm_guest(struct guest_info *info) {
84   pde_t * pde;
85
86   PrintDebug("Allocating VMCB\n");
87   info->vmm_data = (void*)Allocate_VMCB();
88
89
90   PrintDebug("Generating Guest nested page tables\n");
91   print_mem_list(&(info->mem_list));
92   print_mem_layout(&(info->mem_layout));
93   pde = generate_guest_page_tables(&(info->mem_layout), &(info->mem_list));
94   PrintDebugPageTables(pde);
95
96
97   PrintDebug("Initializing VMCB (addr=%x)\n", info->vmm_data);
98   Init_VMCB((vmcb_t*)(info->vmm_data), *info);
99
100
101   
102
103   return 0;
104 }
105
106
107 // can we start a kernel thread here...
108 int start_svm_guest(struct guest_info *info) {
109   vmcb_ctrl_t * guest_ctrl = 0;
110
111   ulong_t exit_code = 0;
112
113   PrintDebug("Launching SVM VM (vmcb=%x)\n", info->vmm_data);
114
115   launch_svm((vmcb_t*)(info->vmm_data));
116
117   guest_ctrl = GET_VMCB_CTRL_AREA((vmcb_t*)(info->vmm_data));
118
119
120   PrintDebug("SVM Returned: (Exit Code=%x) (VMCB=%x)\n",&(guest_ctrl->exit_code), info->vmm_data); 
121
122
123   exit_code = guest_ctrl->exit_code;
124
125   PrintDebug("SVM Returned: Exit Code: %x\n",exit_code); 
126
127   return 0;
128 }
129
130
131
132 /** 
133  *  We handle the svm exits here
134  *  This function should probably be moved to another file to keep things managable....
135  */
136 int handle_svm_exit(struct VMM_GPRs guest_gprs) {
137
138   return 0;
139 }
140
141
142 vmcb_t * Allocate_VMCB() {
143   vmcb_t * vmcb_page = (vmcb_t*)os_hooks->allocate_pages(1);
144
145
146   memset(vmcb_page, 0, 4096);
147
148   return vmcb_page;
149 }
150
151
152
153 void Init_VMCB(vmcb_t *vmcb, guest_info_t vm_info) {
154   vmcb_ctrl_t * ctrl_area = GET_VMCB_CTRL_AREA(vmcb);
155   vmcb_saved_state_t * guest_state = GET_VMCB_SAVE_STATE_AREA(vmcb);
156   uint_t i = 0;
157
158
159   guest_state->rsp = vm_info.rsp;
160   guest_state->rip = vm_info.rip;
161
162
163   /* I pretty much just gutted this from TVMM */
164   /* Note: That means its probably wrong */
165
166   // set the segment registers to mirror ours
167   guest_state->cs.selector = 0;
168   guest_state->cs.attrib.fields.type = 0xa; // Code segment+read
169   guest_state->cs.attrib.fields.S = 1;
170   guest_state->cs.attrib.fields.P = 1;
171   guest_state->cs.attrib.fields.db = 1;
172   guest_state->cs.limit = 0xffffffff;
173   guest_state->cs.base = 0;
174   
175   struct vmcb_selector *segregs [] = {&(guest_state->ss), &(guest_state->ds), &(guest_state->es), &(guest_state->fs), &(guest_state->gs), NULL};
176   for ( i = 0; segregs[i] != NULL; i++) {
177     struct vmcb_selector * seg = segregs[i];
178     
179     seg->selector = 0;
180     seg->attrib.fields.type = 0x2; // Data Segment+read/write
181     seg->attrib.fields.S = 1;
182     seg->attrib.fields.P = 1;
183     seg->attrib.fields.db = 1;
184     seg->limit = 0xffffffff;
185     seg->base = 0;
186   }
187
188
189   guest_state->efer |= EFER_MSR_svm_enable;
190   guest_state->cr0 = 0x00000001;    // PE 
191   guest_state->rflags = 0x00000002; // The reserved bit is always 1
192   ctrl_area->svm_instrs.instrs.VMRUN = 1;
193   ctrl_area->guest_ASID = 1;
194
195
196
197   /* ** */
198
199 }
200
201