From: Andy Gocke Date: Mon, 10 Aug 2009 22:22:12 +0000 (-0500) Subject: Added shadow page handling, IO and MSR bitmap allocation, and started X-Git-Url: http://v3vee.org/palacios/gitweb/gitweb.cgi?p=palacios.git;a=commitdiff_plain;h=52a58bb7bdf06ca22ad6883f8095f8aa5ca4b8a4 Added shadow page handling, IO and MSR bitmap allocation, and started handlers for IO exits. --- diff --git a/palacios/build/Makefile b/palacios/build/Makefile index 7e7c8a2..a80ec28 100644 --- a/palacios/build/Makefile +++ b/palacios/build/Makefile @@ -312,6 +312,8 @@ VMM_OBJS := \ palacios/vmx_handler.o \ palacios/vmx_lowlevel.o \ palacios/vmxassist.o \ + palacios/vmx_io.o \ + palacios/vmx_msr.o \ $(OBJ_FILES) diff --git a/palacios/include/palacios/vmcs.h b/palacios/include/palacios/vmcs.h index 2d0b17e..491f80e 100644 --- a/palacios/include/palacios/vmcs.h +++ b/palacios/include/palacios/vmcs.h @@ -41,6 +41,8 @@ #define MWAIT_EXIT 0x00000400 #define RDPMC_EXIT 0x00000800 #define RDTSC_EXIT 0x00001000 +#define CR3_LOAD_EXIT 0x00008000 +#define CR3_STORE_EXIT 0x00010000 #define CR8_LOAD_EXIT 0x00080000 #define CR8_STORE_EXIT 0x00100000 #define USE_TPR_SHADOW 0x00200000 @@ -51,6 +53,7 @@ #define USE_MSR_BITMAPS 0x10000000 #define MONITOR_EXIT 0x20000000 #define PAUSE_EXIT 0x40000000 +#define ACTIVE_SEC_CTRLS 0x80000000 /* VM-Exit Controls */ /* INTEL MANUAL: 20-16 vol. 3B */ #define HOST_ADDR_SPACE_SIZE 0x00000200 @@ -214,7 +217,7 @@ void v3_print_vmcs(); /* VMCS Exit QUALIFICATIONs */ -struct VMExitIOQual { +struct vmcs_io_qual { uint32_t accessSize : 3; // (0: 1 Byte ;; 1: 2 Bytes ;; 3: 4 Bytes) uint32_t dir : 1; // (0: Out ;; 1: In) uint32_t string : 1; // (0: not string ;; 1: string) diff --git a/palacios/include/palacios/vmx.h b/palacios/include/palacios/vmx.h index 9dcaa5d..4ac707b 100644 --- a/palacios/include/palacios/vmx.h +++ b/palacios/include/palacios/vmx.h @@ -114,6 +114,13 @@ struct vmx_data { vmx_state_t state; addr_t vmcs_ptr_phys; struct vmcs_host_state host_state; + /* VMX Control Fields */ + uint32_t pinbased_ctrls; + uint32_t pri_procbased_ctrls; + uint32_t sec_procbased_ctrls; + uint32_t exit_ctrls; + uint32_t entry_ctrls; + uint32_t excp_bitmap; }; diff --git a/palacios/include/palacios/vmx_handler.h b/palacios/include/palacios/vmx_handler.h index e7871c0..956136e 100644 --- a/palacios/include/palacios/vmx_handler.h +++ b/palacios/include/palacios/vmx_handler.h @@ -80,7 +80,7 @@ typedef enum { VMEXIT_XSETBV = 55 } vmx_exit_t; -int v3_handle_vmx_exit(struct v3_gprs * gprs); +int v3_handle_vmx_exit(struct v3_gprs * gprs, struct guest_info * info); #endif diff --git a/palacios/include/palacios/vmx_io.h b/palacios/include/palacios/vmx_io.h new file mode 100644 index 0000000..2530a7f --- /dev/null +++ b/palacios/include/palacios/vmx_io.h @@ -0,0 +1,10 @@ + +#include + +int v3_init_vmx_io_map(struct guest_info * info); + +int v3_handle_vmx_io_in(struct guest_info * info); +int v3_handle_vmx_io_ins(struct guest_info * info); +int v3_handle_vmx_io_out(struct guest_info * info); +int v3_handle_vmx_io_outs(struct guest_info * info); + diff --git a/palacios/include/palacios/vmx_msr.h b/palacios/include/palacios/vmx_msr.h new file mode 100644 index 0000000..4b89491 --- /dev/null +++ b/palacios/include/palacios/vmx_msr.h @@ -0,0 +1,4 @@ + +#include + +int v3_init_vmx_msr_map(struct guest_info * info); diff --git a/palacios/src/palacios/vmx.c b/palacios/src/palacios/vmx.c index fe119c3..445c416 100644 --- a/palacios/src/palacios/vmx.c +++ b/palacios/src/palacios/vmx.c @@ -28,10 +28,13 @@ #include #include #include +#include +#include +#include static addr_t vmxon_ptr_phys; extern int v3_vmx_exit_handler(); -extern int v3_vmx_vmlaunch(struct v3_gprs * vm_regs); +extern int v3_vmx_vmlaunch(struct v3_gprs * vm_regs, struct guest_info * info); static int inline check_vmcs_write(vmcs_field_t field, addr_t val) { @@ -59,6 +62,23 @@ static void inline translate_segment_access(struct v3_segment * v3_seg, access->granularity = v3_seg->granularity; } +static int update_vmcs_ctrl_fields(struct guest_info * info) { + int vmx_ret = 0; + struct vmx_data * arch_data = (struct vmx_data *)(info->vmm_data); + + vmx_ret |= check_vmcs_write(VMCS_PIN_CTRLS, arch_data->pinbased_ctrls); + vmx_ret |= check_vmcs_write(VMCS_PROC_CTRLS, arch_data->pri_procbased_ctrls); + + if(arch_data->pri_procbased_ctrls & ACTIVE_SEC_CTRLS) { + vmx_ret |= check_vmcs_write(VMCS_SEC_PROC_CTRLS, arch_data->sec_procbased_ctrls); + } + + vmx_ret |= check_vmcs_write(VMCS_EXIT_CTRLS, arch_data->exit_ctrls); + vmx_ret |= check_vmcs_write(VMCS_ENTRY_CTRLS, arch_data->entry_ctrls); + vmx_ret |= check_vmcs_write(VMCS_EXCP_BITMAP, arch_data->excp_bitmap); + + return vmx_ret; +} static int update_vmcs_host_state(struct guest_info * info) { int vmx_ret = 0; @@ -174,6 +194,7 @@ static int inline update_vmcs_guest_state(struct guest_info * info) vmx_ret |= check_vmcs_write(VMCS_GUEST_CR0, info->ctrl_regs.cr0); + vmx_ret |= check_vmcs_write(VMCS_GUEST_CR3, info->ctrl_regs.cr3); vmx_ret |= check_vmcs_write(VMCS_GUEST_CR4, info->ctrl_regs.cr4); vmx_ret |= check_vmcs_write(VMCS_GUEST_RFLAGS, info->ctrl_regs.rflags); @@ -186,6 +207,7 @@ static int inline update_vmcs_guest_state(struct guest_info * info) vmx_ret |= check_vmcs_write(VMCS_LINK_PTR, 0xffffffffffffffff); + /*** Write VMCS Segments ***/ struct vmcs_segment_access access; @@ -313,14 +335,6 @@ static addr_t sanitize_bits2(uint32_t msr_num0, uint32_t msr_num1, addr_t val) { return val; } -static int setup_base_host_state() { - - - - // vmwrite(HOST_IDTR_BASE, - - -} #endif @@ -477,31 +491,6 @@ static int init_vmx_guest(struct guest_info * info, struct v3_vm_config * config - /********** Setup and write VMX Control Fields ***********/ - struct v3_msr tmp_msr; - - v3_get_msr(VMX_PINBASED_CTLS_MSR,&(tmp_msr.hi),&(tmp_msr.lo)); - /* Add NMI exiting */ - tmp_msr.lo |= NMI_EXIT; - check_vmcs_write(VMCS_PIN_CTRLS, tmp_msr.lo); - - v3_get_msr(VMX_PROCBASED_CTLS_MSR, &(tmp_msr.hi), &(tmp_msr.lo)); - /* Add unconditional I/O */ - tmp_msr.lo |= UNCOND_IO_EXIT; - check_vmcs_write(VMCS_PROC_CTRLS, tmp_msr.lo); - - v3_get_msr(VMX_EXIT_CTLS_MSR, &(tmp_msr.hi), &(tmp_msr.lo)); - tmp_msr.lo |= HOST_ADDR_SPACE_SIZE; - check_vmcs_write(VMCS_EXIT_CTRLS, tmp_msr.lo); - - v3_get_msr(VMX_ENTRY_CTLS_MSR, &(tmp_msr.hi), &(tmp_msr.lo)); - check_vmcs_write(VMCS_ENTRY_CTRLS, tmp_msr.lo); - - check_vmcs_write(VMCS_EXCP_BITMAP, 0xffffffff); - - - - /******* Setup Host State **********/ /* Cache GDTR, IDTR, and TR in host struct */ @@ -554,35 +543,71 @@ static int init_vmx_guest(struct guest_info * info, struct v3_vm_config * config vmx_data->host_state.tr.base = tmp_seg.base; - if(update_vmcs_host_state(info)) { - PrintError("Could not write host state\n"); - return -1; - } + + + /********** Setup and VMX Control Fields from MSR ***********/ + struct v3_msr tmp_msr; + + v3_get_msr(VMX_PINBASED_CTLS_MSR,&(tmp_msr.hi),&(tmp_msr.lo)); + /* Add NMI exiting */ + vmx_data->pinbased_ctrls = tmp_msr.lo | NMI_EXIT; + + v3_get_msr(VMX_PROCBASED_CTLS_MSR, &(tmp_msr.hi), &(tmp_msr.lo)); + vmx_data->pri_procbased_ctrls = tmp_msr.lo; + + v3_get_msr(VMX_EXIT_CTLS_MSR, &(tmp_msr.hi), &(tmp_msr.lo)); + vmx_data->exit_ctrls = tmp_msr.lo | HOST_ADDR_SPACE_SIZE; + + v3_get_msr(VMX_ENTRY_CTLS_MSR, &(tmp_msr.hi), &(tmp_msr.lo)); + vmx_data->entry_ctrls = tmp_msr.lo; + + vmx_data->excp_bitmap = 0xffffffff; /******* Setup VMXAssist guest state ***********/ + info->rip = 0xd0000; info->vm_regs.rsp = 0x80000; struct rflags * flags = (struct rflags *)&(info->ctrl_regs.rflags); flags->rsvd1 = 1; + /* Print Control MSRs */ + v3_get_msr(VMX_CR0_FIXED0_MSR, &(tmp_msr.hi), &(tmp_msr.lo)); + PrintDebug("CR0 MSR: %p\n", (void*)tmp_msr.value); + v3_get_msr(VMX_CR4_FIXED0_MSR, &(tmp_msr.hi), &(tmp_msr.lo)); + PrintDebug("CR4 MSR: %p\n", (void*)tmp_msr.value); + + #define GUEST_CR0 0x80000031 #define GUEST_CR4 0x00002000 info->ctrl_regs.cr0 = GUEST_CR0; info->ctrl_regs.cr4 = GUEST_CR4; - addr_t guest_cr3 = (addr_t)V3_AllocPages(1); + /* Setup paging */ + if(info->shdw_pg_mode == SHADOW_PAGING) { + PrintDebug("Creating initial shadow page table\n"); - memset(V3_VAddr((void*)guest_cr3), 0, 4096); - vmcs_write(VMCS_GUEST_CR3, guest_cr3); + if(v3_init_passthrough_pts(info) == -1) { + PrintError("Could not initialize passthrough page tables\n"); + return -1; + } - v3_get_msr(VMX_CR0_FIXED0_MSR, &(tmp_msr.hi), &(tmp_msr.lo)); - PrintDebug("CR0 MSR: %p\n", (void*)tmp_msr.value); + info->shdw_pg_state.guest_cr0 = 0x10LL; + PrintDebug("Created\n"); - v3_get_msr(VMX_CR4_FIXED0_MSR, &(tmp_msr.hi), &(tmp_msr.lo)); - PrintDebug("CR4 MSR: %p\n", (void*)tmp_msr.value); + vmx_ret |= check_vmcs_write(VMCS_CR0_MASK, 0xffffffffffffffffLL); + vmx_ret |= check_vmcs_write(VMCS_CR4_MASK, 0xffffffffffffffffLL); + + info->ctrl_regs.cr3 = info->direct_map_pt; + + /* Add unconditional I/O and CR exits */ + vmx_data->pri_procbased_ctrls |= UNCOND_IO_EXIT | + CR3_LOAD_EXIT | + CR3_STORE_EXIT; + + } struct v3_segment * seg_reg = (struct v3_segment *)&(info->segments); @@ -613,18 +638,21 @@ static int init_vmx_guest(struct guest_info * info, struct v3_vm_config * config info->segments.ldtr.present = 1; info->segments.ldtr.granularity = 0; + /* Setup IO map */ + (void) v3_init_vmx_io_map(info); + (void) v3_init_vmx_msr_map(info); + /************* Map in GDT and vmxassist *************/ + uint64_t gdt[] __attribute__ ((aligned(32))) = { + 0x0000000000000000ULL, /* 0x00: reserved */ + 0x0000830000000000ULL, /* 0x08: 32-bit TSS */ + // 0x0000890000000000ULL, /* 0x08: 32-bit TSS */ + 0x00CF9b000000FFFFULL, /* 0x10: CS 32-bit */ + 0x00CF93000000FFFFULL, /* 0x18: DS 32-bit */ + 0x000082000000FFFFULL, /* 0x20: LDTR 32-bit */ + }; -uint64_t gdt[] __attribute__ ((aligned(32))) = { - 0x0000000000000000ULL, /* 0x00: reserved */ - 0x0000830000000000ULL, /* 0x08: 32-bit TSS */ - // 0x0000890000000000ULL, /* 0x08: 32-bit TSS */ - 0x00CF9b000000FFFFULL, /* 0x10: CS 32-bit */ - 0x00CF93000000FFFFULL, /* 0x18: DS 32-bit */ - 0x000082000000FFFFULL, /* 0x20: LDTR 32-bit */ -}; - #define VMXASSIST_GDT 0x10000 addr_t vmxassist_gdt = 0; if(guest_pa_to_host_va(info, VMXASSIST_GDT, &vmxassist_gdt) == -1) { @@ -663,16 +691,28 @@ uint64_t gdt[] __attribute__ ((aligned(32))) = { return -1; } memcpy((void*)vmxassist_dst, vmxassist_start, vmxassist_end-vmxassist_start); + + /*** Write all the info to the VMCS ***/ + if(update_vmcs_ctrl_fields(info)) { + PrintError("Could not write control fields!\n"); + return -1; + } + + if(update_vmcs_host_state(info)) { + PrintError("Could not write host state\n"); + return -1; + } + if(update_vmcs_guest_state(info) != VMX_SUCCESS) { - PrintDebug("Writing guest state failed!\n"); + PrintError("Writing guest state failed!\n"); return -1; } v3_print_vmcs(); - //v3_post_config_guest(info, config_ptr); + v3_post_config_guest(info, config_ptr); return 0; } @@ -684,7 +724,7 @@ static int start_vmx_guest(struct guest_info* info) { PrintDebug("Attempting VMLAUNCH\n"); - ret = v3_vmx_vmlaunch(&(info->vm_regs)); + ret = v3_vmx_vmlaunch(&(info->vm_regs), info); if (ret != VMX_SUCCESS) { vmcs_read(VMCS_INSTR_ERR, &error); PrintError("VMLAUNCH failed: %d\n", error); diff --git a/palacios/src/palacios/vmx_bak.c b/palacios/src/palacios/vmx_bak.c deleted file mode 100644 index ba5734b..0000000 --- a/palacios/src/palacios/vmx_bak.c +++ /dev/null @@ -1,933 +0,0 @@ -/* - * This file is part of the Palacios Virtual Machine Monitor developed - * by the V3VEE Project with funding from the United States National - * Science Foundation and the Department of Energy. - * - * The V3VEE Project is a joint project between Northwestern University - * and the University of New Mexico. You can find out more at - * http://www.v3vee.org - * - * Copyright (c) 2008, Peter Dinda - * Copyright (c) 2008, Jack Lange - * Copyright (c) 2008, The V3VEE Project - * All rights reserved. - * - * Author: Peter Dinda - * Jack Lange - * - * This is free software. You are permitted to use, - * redistribute, and modify it as specified in the file "V3VEE_LICENSE". - */ - - -/* Eventually we want to get rid of these */ - -#include -#include -#include -/* ** */ - -#include -#include -#include -#include -#include - - -extern void Get_MSR(unsigned int msr, uint_t * high, uint_t * low); -extern void Set_MSR(unsigned int msr, uint_t high, uint_t low); -extern int Enable_VMX(ullong_t regionPtr); -extern int cpuid_ecx(unsigned int op); -extern int Launch_VM(ullong_t vmcsPtr, uint_t eip); - -#define NUMPORTS 65536 - - -#define VMXASSIST_INFO_PORT 0x0e9 -#define ROMBIOS_PANIC_PORT 0x400 -#define ROMBIOS_PANIC_PORT2 0x401 -#define ROMBIOS_INFO_PORT 0x402 -#define ROMBIOS_DEBUG_PORT 0x403 - - -extern struct vmm_os_hooks * os_hooks; - - -static struct VM theVM; - -static uint_t GetLinearIP(struct VM *vm) -{ - if (vm->state==VM_VMXASSIST_V8086_BIOS || vm->state==VM_VMXASSIST_V8086) { - return vm->vmcs.guestStateArea.cs.baseAddr + vm->vmcs.guestStateArea.rip; - } else { - return vm->vmcs.guestStateArea.rip; - } -} - - -static void VMXPanic() -{ - while (1) {} -} - - -#define MAX_CODE 512 -#define INSTR_OFFSET_START 17 -#define NOP_SEQ_LEN 10 -#define INSTR_OFFSET_END (INSTR_OFFSET_START+NOP_SEQ_LEN-1) -#define TEMPLATE_CODE_LEN 35 - -uint_t oldesp=0; -uint_t myregs=0; - -// simply execute the instruction that is faulting and return -static int ExecFaultingInstructionInVMM(struct VM *vm) -{ - uint_t address = GetLinearIP(vm); - myregs = (uint_t)&(vm->registers); - - - PrintTrace("About the execute faulting instruction!\n"); - PrintTrace("Instruction is:\n"); - PrintTraceMemDump((void*)(address),vm->vmcs.exitInfoFields.instrLength); - - - PrintTrace("The template code is:\n"); - PrintTraceMemDump(&&template_code,TEMPLATE_CODE_LEN); - - // clone the template code - //memcpy(&&template_code,code,MAX_CODE); - - // clean up the nop field - memset(&&template_code+INSTR_OFFSET_START,*((uchar_t *)(&&template_code+0)),NOP_SEQ_LEN); - // overwrite the nops with the faulting instruction - memcpy(&&template_code+INSTR_OFFSET_START, (void*)(address),vm->vmcs.exitInfoFields.instrLength); - - PrintTrace("Finished modifying the template code, which now is:\n"); - PrintTraceMemDump(&&template_code,TEMPLATE_CODE_LEN); - - PrintTrace("Now entering modified template code\n"); - - - template_code: - // Template code stores current registers, - // restores registers, has a landing pad of noops - // that will be modified, restores current regs, and then returns - // - // Note that this currently ignores cr0, cr3, cr4, dr7, rsp, rip, and rflags - // it also blythly assumes it can exec the instruction in protected mode - // - __asm__ __volatile__ ("nop\n" // for cloning purposes (1 byte) - "pusha\n" // push our current regs onto the current stack (1 byte) - "movl %0, %%eax\n" // Get oldesp location (5 bytes) - "movl %%esp, (%%eax)\n" // store the current stack pointer in oldesp (2 bytes) - "movl %1, %%eax\n" // Get regs location (5 bytes) - "movl (%%eax), %%esp\n" // point esp at regs (2 bytes) - "popa\n" // now we have the VM registers restored (1 byte) - "nop\n" // now we execute the actual instruction (1 byte x 10) - "nop\n" // now we execute the actual instruction - "nop\n" // now we execute the actual instruction - "nop\n" // now we execute the actual instruction - "nop\n" // now we execute the actual instruction - "nop\n" // now we execute the actual instruction - "nop\n" // now we execute the actual instruction - "nop\n" // now we execute the actual instruction - "nop\n" // now we execute the actual instruction - "nop\n" // now we execute the actual instruction - // need to copy back to the VM registers! - "movl %0, %%eax\n" // recapture oldesp location (5 bytes) - "movl (%%eax), %%esp\n" // now we'll get our esp back from oldesp (2 bytes) - "popa\n" // and restore our GP regs and we're done (1 byte) - : "=m"(oldesp) - : "m"(myregs) - ); - - PrintTrace("Survived executing the faulting instruction and returning.\n"); - - vm->vmcs.guestStateArea.rip += vm->vmcs.exitInfoFields.instrLength; - - return 0; - -} - - -int is_vmx_capable() { - uint_t ret; - union VMX_MSR featureMSR; - - ret = cpuid_ecx(1); - if (ret & CPUID_1_ECX_VTXFLAG) { - Get_MSR(IA32_FEATURE_CONTROL_MSR, &featureMSR.regs.high, &featureMSR.regs.low); - - PrintTrace("MSRREGlow: 0x%.8x\n", featureMSR.regs.low); - - if ((featureMSR.regs.low & FEATURE_CONTROL_VALID) != FEATURE_CONTROL_VALID) { - PrintDebug("VMX is locked -- enable in the BIOS\n"); - return 0; - } - } else { - PrintDebug("VMX not supported on this cpu\n"); - return 0; - } - - return 1; - -} - - -VmxOnRegion * Init_VMX() { - uint_t ret; - VmxOnRegion * region = NULL; - - - region = CreateVmxOnRegion(); - - - ret = Enable_VMX((ullong_t)((uint_t)region)); - if (ret == 0) { - PrintDebug("VMX Enabled\n"); - } else { - PrintDebug("VMX failure (ret = %d)\n", ret); - } - - theVM.vmxonregion = region; - - return region; -} - -extern uint_t VMCS_CLEAR(); -extern uint_t VMCS_LOAD(); -extern uint_t VMCS_STORE(); -extern uint_t VMCS_LAUNCH(); -extern uint_t VMCS_RESUME(); -extern uint_t Init_VMCS_HostState(); -extern uint_t Init_VMCS_GuestState(); - -void SetCtrlBitsCorrectly(int msrno, int vmcsno) -{ - uint_t reserved =0; - union VMX_MSR msr; - - PrintTrace("SetCtrlBitsCorrectly(%x,%x)\n", msrno, vmcsno); - Get_MSR(msrno, &msr.regs.high, &msr.regs.low); - PrintTrace("MSR %x = %x : %x \n", msrno, msr.regs.high, msr.regs.low); - reserved = msr.regs.low; - reserved &= msr.regs.high; - VMCS_WRITE(vmcsno, &reserved); -} - - -void SetCRBitsCorrectly(int msr0no, int msr1no, int vmcsno) -{ - uint_t reserved =0; - union VMX_MSR msr0, msr1; - - PrintTrace("SetCRBitsCorrectly(%x,%x,%x)\n",msr0no,msr1no,vmcsno); - Get_MSR(msr0no, &msr0.regs.high, &msr0.regs.low); - Get_MSR(msr1no, &msr1.regs.high, &msr1.regs.low); - PrintTrace("MSR %x = %x, %x = %x \n", msr0no, msr0.regs.low, msr1no, msr1.regs.low); - reserved = msr0.regs.low; - reserved &= msr1.regs.low; - VMCS_WRITE(vmcsno, &reserved); -} - - -extern int Get_CR2(); -extern int vmRunning; - - -static int PanicUnhandledVMExit(struct VM *vm) -{ - PrintInfo("Panicking due to VMExit with reason %u\n", vm->vmcs.exitInfoFields.reason); - PrintTrace("Panicking due to VMExit with reason %u\n", vm->vmcs.exitInfoFields.reason); - PrintTrace_VMCS_ALL(); - PrintTrace_VMX_Regs(&(vm->registers)); - VMXPanic(); - return 0; -} - - -static int HandleVMPrintsAndPanics(struct VM *vm, uint_t port, uint_t data) -{ - if (port==VMXASSIST_INFO_PORT && - (vm->state == VM_VMXASSIST_STARTUP || - vm->state == VM_VMXASSIST_V8086_BIOS || - vm->state == VM_VMXASSIST_V8086)) { - // Communication channel from VMXAssist - PrintTrace("VMXASSIST Output Port\n"); - PrintDebug("%c",data&0xff); - return 1; - } - - if ((port==ROMBIOS_PANIC_PORT || - port==ROMBIOS_PANIC_PORT2 || - port==ROMBIOS_DEBUG_PORT || - port==ROMBIOS_INFO_PORT) && - (vm->state==VM_VMXASSIST_V8086_BIOS)) { - // rombios is communicating - PrintTrace("ROMBIOS Output Port\n"); - // PrintDebug("%c",data&0xff); - return 1; - } - - if (port==BOOT_STATE_CARD_PORT && vm->state==VM_VMXASSIST_V8086_BIOS) { - // rombios is sending something to the display card - PrintTrace("Hex Display: 0x%x\n",data&0xff); - return 1; - } - return 0; -} - -static int HandleInOutExit(struct VM *vm) -{ - uint_t address; - - struct VMCSExitInfoFields *exitinfo = &(vm->vmcs.exitInfoFields); - struct VMExitIOQual * qual = (struct VMExitIOQual *)&(vm->vmcs.exitInfoFields.qualification); - struct VMXRegs *regs = &(vm->registers); - - address=GetLinearIP(vm); - - PrintTrace("Handling Input/Output Instruction Exit\n"); - - PrintTrace_VMX_Regs(regs); - - PrintTrace("Qualifications=0x%x\n", exitinfo->qualification); - PrintTrace("Reason=0x%x\n", exitinfo->reason); - PrintTrace("IO Port: 0x%x (%d)\n", qual->port, qual->port); - PrintTrace("Instruction Info=%x\n", exitinfo->instrInfo); - PrintTrace("%x : %s %s %s instruction of length %d for %d bytes from/to port 0x%x\n", - address, - qual->dir == 0 ? "output" : "input", - qual->string ==0 ? "nonstring" : "STRING", - qual->REP == 0 ? "with no rep" : "WITH REP", - exitinfo->instrLength, - qual->accessSize==0 ? 1 : qual->accessSize==1 ? 2 : 4, - qual->port); - - if ((qual->port == PIC_MASTER_CMD_ISR_PORT) || - (qual->port == PIC_MASTER_IMR_PORT) || - (qual->port == PIC_SLAVE_CMD_ISR_PORT) || - (qual->port == PIC_SLAVE_IMR_PORT)) { - PrintTrace( "PIC Access\n"); - } - - - if ((qual->dir == 1) && (qual->REP == 0) && (qual->string == 0)) { - char byte = In_Byte(qual->port); - - vm->vmcs.guestStateArea.rip += exitinfo->instrLength; - regs->eax = (regs->eax & 0xffffff00) | byte; - PrintTrace("Returning 0x%x in eax\n", (regs->eax)); - } - - if (qual->dir==0 && qual->REP==0 && qual->string==0) { - // See if we need to handle the outb as a signal or - // print from the VM - if (HandleVMPrintsAndPanics(vm,qual->port,regs->eax)) { - } else { - // If not, just go ahead and do the outb - Out_Byte(qual->port,regs->eax); - PrintTrace("Wrote 0x%x to port\n",(regs->eax)); - } - vm->vmcs.guestStateArea.rip += exitinfo->instrLength; - } - - return 0; -} - - -static int HandleExternalIRQExit(struct VM *vm) -{ - struct VMCSExitInfoFields * exitinfo = &(vm->vmcs.exitInfoFields); - struct VMExitIntInfo * intInfo = (struct VMExitIntInfo *)&(vm->vmcs.exitInfoFields.intInfo); - - PrintTrace("External Interrupt captured\n"); - PrintTrace("IntInfo: %x\n", exitinfo->intInfo); - - - if (!intInfo->valid) { - // interrupts are off, but this interrupt is not acknoledged (still pending) - // so we turn on interrupts to deliver appropriately in the - // host - PrintTrace("External Interrupt is invald. Turning Interrupts back on\n"); - asm("sti"); - return 0; - } - - // At this point, interrupts are off and the interrupt has been - // acknowledged. We will now handle the interrupt ourselves - // and turn interrupts back on in the host - - PrintTrace("type: %d\n", intInfo->type); - PrintTrace("number: %d\n", intInfo->nr); - - PrintTrace("Interrupt %d occuring now and handled by HandleExternalIRQExit\n",intInfo->nr); - - switch (intInfo->type) { - case 0: { // ext. IRQ - // In the following, we construct an "int x" instruction - // where x is the specific interrupt number that is raised - // then we execute that instruciton - // because we are in host context, that means it is delivered as normal - // through the host IDT - - ((char*)(&&ext_int_seq_start))[1] = intInfo->nr; - - PrintTrace("Interrupt instruction setup done %x\n", *((ushort_t *)(&&ext_int_seq_start))); - -ext_int_seq_start: - asm("int $0"); - } - - break; - case 2: // NMI - PrintTrace("Type: NMI\n"); - break; - case 3: // hw exception - PrintTrace("Type: HW Exception\n"); - break; - case 4: // sw exception - PrintTrace("Type: SW Exception\n"); - break; - default: - PrintTrace("Invalid Interrupt Type\n"); - return -1; - } - - if (intInfo->valid && intInfo->errorCode) { - PrintTrace("IntError: %x\n", exitinfo->intErrorCode); - } - - - return 0; - -} - - - -void DecodeCurrentInstruction(struct VM *vm, struct Instruction *inst) -{ - // this is a gruesome hack - uint_t address = GetLinearIP(vm); - uint_t length = vm->vmcs.exitInfoFields.instrLength; - unsigned char *t = (unsigned char *) address; - - - - PrintTrace("DecodeCurrentInstruction: instruction is\n"); - PrintTraceMemDump(t,length); - - if (length==3 && t[0]==0x0f && t[1]==0x22 && t[2]==0xc0) { - // mov from eax to cr0 - // usually used to signal - inst->type=VM_MOV_TO_CR0; - inst->address=address; - inst->size=length; - inst->input1=vm->registers.eax; - inst->input2=vm->vmcs.guestStateArea.cr0; - inst->output=vm->registers.eax; - PrintTrace("MOV FROM EAX TO CR0\n"); - } else { - inst->type=VM_UNKNOWN_INST; - } -} - - -static void V8086ModeSegmentRegisterFixup(struct VM *vm) -{ - vm->vmcs.guestStateArea.cs.baseAddr=vm->vmcs.guestStateArea.cs.selector<<4; - vm->vmcs.guestStateArea.es.baseAddr=vm->vmcs.guestStateArea.es.selector<<4; - vm->vmcs.guestStateArea.ss.baseAddr=vm->vmcs.guestStateArea.ss.selector<<4; - vm->vmcs.guestStateArea.ds.baseAddr=vm->vmcs.guestStateArea.ds.selector<<4; - vm->vmcs.guestStateArea.fs.baseAddr=vm->vmcs.guestStateArea.fs.selector<<4; - vm->vmcs.guestStateArea.gs.baseAddr=vm->vmcs.guestStateArea.gs.selector<<4; -} - -static void SetupV8086ModeForBoot(struct VM *vm) -{ - vm->state = VM_VMXASSIST_V8086_BIOS; - - // Put guest into V8086 mode on return - vm->vmcs.guestStateArea.rflags |= EFLAGS_VM | EFLAGS_IOPL_HI | EFLAGS_IOPL_LO ; - - // We will start at f000:fff0 on return - // - // We want this to look as much as possible as a processor - // reset - vm->vmcs.guestStateArea.rip = 0xfff0; // note, 16 bit rip - vm->vmcs.guestStateArea.cs.selector = 0xf000; - vm->vmcs.guestStateArea.cs.limit=0xffff; - vm->vmcs.guestStateArea.cs.access.as_dword = 0xf3; - - vm->vmcs.guestStateArea.ss.selector = 0x0000; - vm->vmcs.guestStateArea.ss.limit=0xffff; - vm->vmcs.guestStateArea.ss.access.as_dword = 0xf3; - - vm->vmcs.guestStateArea.ds.selector = 0x0000; - vm->vmcs.guestStateArea.ds.limit=0xffff; - vm->vmcs.guestStateArea.ds.access.as_dword = 0xf3; - - vm->vmcs.guestStateArea.es.selector = 0x0000; - vm->vmcs.guestStateArea.es.limit=0xffff; - vm->vmcs.guestStateArea.es.access.as_dword = 0xf3; - - vm->vmcs.guestStateArea.fs.selector = 0x0000; - vm->vmcs.guestStateArea.fs.limit=0xffff; - vm->vmcs.guestStateArea.fs.access.as_dword = 0xf3; - - vm->vmcs.guestStateArea.gs.selector = 0x0000; - vm->vmcs.guestStateArea.gs.limit=0xffff; - vm->vmcs.guestStateArea.gs.access.as_dword = 0xf3; - - V8086ModeSegmentRegisterFixup(vm); - - PrintTrace_VMCSData(&(vm->vmcs)); - -} - - - -static int HandleExceptionOrNMI(struct VM *vm) -{ - struct Instruction inst; - uint_t num; - uint_t type; - uint_t errorvalid; - uint_t error; - uint_t ext=0; - uint_t idt=0; - uint_t ti=0; - uint_t selectorindex=0; - - PrintTrace("Exception or NMI occurred\n"); - - num=vm->vmcs.exitInfoFields.intInfo & 0xff; - type=(vm->vmcs.exitInfoFields.intInfo & 0x700)>>8; - errorvalid=(vm->vmcs.exitInfoFields.intInfo & 0x800)>>11; - if (errorvalid) { - error=vm->vmcs.exitInfoFields.intErrorCode; - ext=error&0x1; - idt=(error&0x2)>>1; - ti=(error&0x4)>>2; - selectorindex=(error>>3)&0xffff; - } - - PrintTrace("Exception %d now - handled by HandleExceptionOrNMI\n",num); - - PrintTrace("Exception Number %u : %s\n", num, exception_names[num]); - PrintTrace("Exception Type %u : %s\n", type, exception_type_names[type]); - if (errorvalid) { - if (ext) { - PrintTrace("External\n"); - } else { - PrintTrace("%s - Selector Index is %u\n", idt ? "IDT" : ti ? "LDT" : "GDT", selectorindex); - } - } - - DecodeCurrentInstruction(vm,&inst); - - if (inst.type==VM_MOV_TO_CR0) { - PrintTrace("MOV TO CR0, oldvalue=0x%x, newvalue=0x%x\n",inst.input2, inst.input1); - if ((inst.input2 & CR0_PE) && !(inst.input1 & CR0_PE) && vm->state==VM_VMXASSIST_STARTUP) { - // This is VMXAssist signalling for us to turn on V8086 mode and - // jump into the bios - PrintTrace("VMXAssist is signaling us for switch to V8086 mode and jump to 0xf000:fff0\n"); - SetupV8086ModeForBoot(vm); - goto leave; - } else { - PrintTrace("Instruction is a write to CR0, but we don't understand it so we'll just exec it\n"); - } - } - - - PrintTrace("Trying to execute the faulting instruction in VMM context now\n"); - ExecFaultingInstructionInVMM(vm); - - leave: - // - //PanicUnhandledVMExit(vmcs,regs); - //VMXPanic(); - return 0; -} - - -static struct VM *FindVM() -{ - return &theVM; -} - - -int Do_VMM(struct VMXRegs regs) -{ - - ullong_t vmcs_ptr = 0; - uint_t vmcs_ptr_low = 0; - int ret = 0; - uint_t vmx_abort = 0; - - - - PrintTrace("Vm Exit\n"); - ret = VMCS_STORE(&vmcs_ptr); - vmcs_ptr &= 0xffffffff; - vmcs_ptr_low += vmcs_ptr; - - - - - PrintTrace("ret=%d\n", ret); - PrintTrace("Revision: %x\n", *(uint_t *)(vmcs_ptr_low)); - vmx_abort = *(uint_t*)(((char *)vmcs_ptr_low)+4); - - struct VM *vm = FindVM(); - - if (vmx_abort != 0) { - PrintTrace("VM ABORTED w/ code: %x\n", vmx_abort); - return -1; - } - - vm->registers = regs; - - if (CopyOutVMCSData(&(vm->vmcs)) != 0) { - PrintTrace("Could not copy out VMCS\n"); - return -1; - } - - - PrintTrace("Guest esp: 0x%x (%u)\n", vm->vmcs.guestStateArea.rsp, vm->vmcs.guestStateArea.rsp); - - PrintTrace("VM Exit for reason: %d (%x)\n", - vm->vmcs.exitInfoFields.reason & 0x00000fff, - vm->vmcs.exitInfoFields.reason); - - if (vm->vmcs.exitInfoFields.reason & (0x1<<29) ) { - PrintTrace("VM Exit is from VMX root operation. Panicking\n"); - VMXPanic(); - } - - if (vm->vmcs.exitInfoFields.reason & (0x1<<31) ) { - PrintTrace("VM Exit is due to a VM entry failure. Shouldn't happen here. Panicking\n"); - PrintTrace_VMCSData(&(vm->vmcs)); - VMXPanic(); - } - - switch (vm->vmcs.exitInfoFields.reason) { - case VM_EXIT_REASON_INFO_EXCEPTION_OR_NMI: - ret = HandleExceptionOrNMI(vm); - break; - case VM_EXIT_REASON_EXTERNAL_INTR: - ret = HandleExternalIRQExit(vm); - break; - case VM_EXIT_REASON_TRIPLE_FAULT: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_INIT_SIGNAL: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_STARTUP_IPI: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_IO_SMI: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_OTHER_SMI: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_INTR_WINDOW: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_NMI_WINDOW: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_TASK_SWITCH: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_CPUID: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_INVD: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_INVLPG: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_RDPMC: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_RDTSC: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_RSM: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_VMCALL: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_VMCLEAR: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_VMLAUNCH: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_VMPTRLD: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_VMPTRST: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_VMREAD: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_VMRESUME: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_VMWRITE: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_VMXOFF: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_VMXON: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_CR_REG_ACCESSES: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_MOV_DR: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_IO_INSTR: - ret = HandleInOutExit(vm); - break; - case VM_EXIT_REASON_RDMSR: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_WRMSR: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_ENTRY_FAIL_INVALID_GUEST_STATE: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_ENTRY_FAIL_MSR_LOAD: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_MWAIT: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_MONITOR: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_PAUSE: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_ENTRY_FAILURE_MACHINE_CHECK: - ret = PanicUnhandledVMExit(vm); - break; - case VM_EXIT_REASON_TPR_BELOW_THRESHOLD: - ret = PanicUnhandledVMExit(vm); - break; - default: - ret = PanicUnhandledVMExit(vm); - break; - } - - - regs = vm->registers; - CopyInVMCSData(&(vm->vmcs)); - - /* - { - VMCS_CLEAR(vmcs_ptr); - } - */ - - PrintTrace("Returning from Do_VMM: %d\n", ret); - - return ret; -} - - -static void ConfigureExits(struct VM *vm) -{ - CopyOutVMCSExecCtrlFields(&(vm->vmcs.execCtrlFields)); - - vm->vmcs.execCtrlFields.pinCtrls |= 0 - // EXTERNAL_INTERRUPT_EXITING - | NMI_EXITING; - vm->vmcs.execCtrlFields.procCtrls |= 0 - // INTERRUPT_WINDOWS_EXIT - | USE_TSC_OFFSETTING - | HLT_EXITING - |INVLPG_EXITING - |MWAIT_EXITING - |RDPMC_EXITING - |RDTSC_EXITING - |MOVDR_EXITING - |UNCONDITION_IO_EXITING - |MONITOR_EXITING - |PAUSE_EXITING ; - - CopyInVMCSExecCtrlFields(&(vm->vmcs.execCtrlFields)); - - CopyOutVMCSExitCtrlFields(&(vm->vmcs.exitCtrlFields)); - - vm->vmcs.exitCtrlFields.exitCtrls |= ACK_IRQ_ON_EXIT; - - CopyInVMCSExitCtrlFields(&(vm->vmcs.exitCtrlFields)); - - -/* VMCS_READ(VM_EXIT_CTRLS, &flags); */ -/* flags |= ACK_IRQ_ON_EXIT; */ -/* VMCS_WRITE(VM_EXIT_CTRLS, &flags); */ -} - - -extern int RunVMM(); -extern int SAFE_VM_LAUNCH(); - -int MyLaunch(struct VM *vm) -{ - ullong_t vmcs = (ullong_t)((uint_t) (vm->vmcsregion)); - uint_t entry_eip = vm->descriptor.entry_ip; - uint_t exit_eip = vm->descriptor.exit_eip; - uint_t guest_esp = vm->descriptor.guest_esp; - uint_t f = 0xffffffff; - uint_t tmpReg = 0; - int ret; - int vmm_ret = 0; - - PrintTrace("Guest ESP: 0x%x (%u)\n", guest_esp, guest_esp); - - exit_eip=(uint_t)RunVMM; - - PrintTrace("Clear\n"); - VMCS_CLEAR(vmcs); - PrintTrace("Load\n"); - VMCS_LOAD(vmcs); - - - PrintTrace("VMCS_LINK_PTR\n"); - VMCS_WRITE(VMCS_LINK_PTR, &f); - PrintTrace("VMCS_LINK_PTR_HIGH\n"); - VMCS_WRITE(VMCS_LINK_PTR_HIGH, &f); - - - SetCtrlBitsCorrectly(IA32_VMX_PINBASED_CTLS_MSR, PIN_VM_EXEC_CTRLS); - SetCtrlBitsCorrectly(IA32_VMX_PROCBASED_CTLS_MSR, PROC_VM_EXEC_CTRLS); - SetCtrlBitsCorrectly(IA32_VMX_EXIT_CTLS_MSR, VM_EXIT_CTRLS); - SetCtrlBitsCorrectly(IA32_VMX_ENTRY_CTLS_MSR, VM_ENTRY_CTRLS); - - // - // - //SetCtrlBitsCorrectly(IA32_something,GUEST_IA32_DEBUGCTL); - //SetCtrlBitsCorrectly(IA32_something,GUEST_IA32_DEBUGCTL_HIGH); - - - /* Host state */ - PrintTrace("Setting up host state\n"); - SetCRBitsCorrectly(IA32_VMX_CR0_FIXED0_MSR, IA32_VMX_CR0_FIXED1_MSR, HOST_CR0); - SetCRBitsCorrectly(IA32_VMX_CR4_FIXED0_MSR, IA32_VMX_CR4_FIXED1_MSR, HOST_CR4); - ret = Init_VMCS_HostState(); - - if (ret != VMX_SUCCESS) { - if (ret == VMX_FAIL_VALID) { - PrintTrace("Init Host state: VMCS FAILED WITH ERROR\n"); - } else { - PrintTrace("Init Host state: Invalid VMCS\n"); - } - return ret; - } - - // PrintTrace("HOST_RIP: %x (%u)\n", exit_eip, exit_eip); - VMCS_WRITE(HOST_RIP, &exit_eip); - - /* Guest state */ - PrintTrace("Setting up guest state\n"); - PrintTrace("GUEST_RIP: %x (%u)\n", entry_eip, entry_eip); - VMCS_WRITE(GUEST_RIP,&entry_eip); - - SetCRBitsCorrectly(IA32_VMX_CR0_FIXED0_MSR, IA32_VMX_CR0_FIXED1_MSR, GUEST_CR0); - SetCRBitsCorrectly(IA32_VMX_CR4_FIXED0_MSR, IA32_VMX_CR4_FIXED1_MSR, GUEST_CR4); - ret = Init_VMCS_GuestState(); - - PrintTrace("InitGuestState returned\n"); - if (ret != VMX_SUCCESS) { - if (ret == VMX_FAIL_VALID) { - PrintTrace("Init Guest state: VMCS FAILED WITH ERROR\n"); - } else { - PrintTrace("Init Guest state: Invalid VMCS\n"); - } - return ret; - } - PrintTrace("GUEST_RSP: %x (%u)\n", guest_esp, (uint_t)guest_esp); - VMCS_WRITE(GUEST_RSP,&guest_esp); - - // tmpReg = 0x4100; - tmpReg = 0xffffffff; - if (VMCS_WRITE(EXCEPTION_BITMAP,&tmpReg ) != VMX_SUCCESS) { - PrintInfo("Bitmap error\n"); - } - - ConfigureExits(vm); - - PrintTrace("VMCS_LAUNCH\n"); - - vm->state=VM_VMXASSIST_STARTUP; - - vmm_ret = SAFE_VM_LAUNCH(); - - PrintTrace("VMM error %d\n", vmm_ret); - - return vmm_ret; -} - - - - -int VMLaunch(struct VMDescriptor *vm) -{ - VMCS * vmcs = CreateVMCS(); - int rc; - - ullong_t vmcs_ptr = (ullong_t)((uint_t)vmcs); - uint_t top = (vmcs_ptr>>32)&0xffffffff; - uint_t bottom = (vmcs_ptr)&0xffffffff; - - theVM.vmcsregion = vmcs; - theVM.descriptor = *vm; - - PrintTrace("vmcs_ptr_top=%x vmcs_ptr_bottom=%x, eip=%x\n", top, bottom, vm->entry_ip); - rc=MyLaunch(&theVM); // vmcs_ptr, vm->entry_ip, vm->exit_eip, vm->guest_esp); - PrintTrace("Returned from MyLaunch();\n"); - return rc; -} - - -VmxOnRegion * CreateVmxOnRegion() { - union VMX_MSR basicMSR; - VmxOnRegion * region = (VmxOnRegion *)(os_hooks)->allocate_pages(1); - - Get_MSR(IA32_VMX_BASIC_MSR, &basicMSR.regs.high, &basicMSR.regs.low); - // memcpy(region, &basicMSR.vmxBasic.revision, sizeof(uint_t)); - - *(ulong_t*)region = basicMSR.vmxBasic.revision; - - PrintInfo("VMX revision: 0x%lu\n", *(ulong_t *)region); - - return region; -} - -VMCS * CreateVMCS() { - union VMX_MSR basicMSR; - VMCS * vmcs = (VMCS *)(os_hooks)->allocate_pages(1); - - Get_MSR(IA32_VMX_BASIC_MSR, &basicMSR.regs.high, &basicMSR.regs.low); - *(ulong_t *)vmcs = basicMSR.vmxBasic.revision; - *(ulong_t *)((char*)vmcs + 4) = 0; - - PrintTrace("VMCS Region size: %u\n", basicMSR.vmxBasic.regionSize); - PrintTrace("VMCS Abort: %x\n",*(uint_t *)(((char*)vmcs)+4)); - - return vmcs; -} diff --git a/palacios/src/palacios/vmx_handler.c b/palacios/src/palacios/vmx_handler.c index dafb2ff..2bcc394 100644 --- a/palacios/src/palacios/vmx_handler.c +++ b/palacios/src/palacios/vmx_handler.c @@ -22,6 +22,7 @@ #include #include #include +#include static int inline check_vmcs_write(vmcs_field_t field, addr_t val) @@ -44,19 +45,93 @@ static int inline check_vmcs_read(vmcs_field_t field, void * val) if(ret != VMX_SUCCESS) { PrintError("VMREAD error on %s!: %d\n", v3_vmcs_field_to_str(field), ret); - return 1; + return ret; } return 0; } -int v3_handle_vmx_exit(struct v3_gprs * gprs) +int v3_handle_vmx_exit(struct v3_gprs * gprs, struct guest_info * info) { uint32_t exit_reason; ulong_t exit_qual; check_vmcs_read(VMCS_EXIT_REASON, &exit_reason); check_vmcs_read(VMCS_EXIT_QUAL, &exit_qual); - PrintDebug("VMX Exit taken, id-qual: %x-%ld\n", exit_reason, exit_qual); - return -1; + + PrintDebug("VMX Exit taken, id-qual: %d-%ld\n", exit_reason, exit_qual); + + /* Update guest state */ + check_vmcs_read(VMCS_GUEST_RIP, &(info->rip)); + check_vmcs_read(VMCS_GUEST_RSP, &(info->vm_regs.rsp)); + check_vmcs_read(VMCS_GUEST_CR0, &(info->ctrl_regs.cr0)); + check_vmcs_read(VMCS_GUEST_CR3, &(info->ctrl_regs.cr3)); + check_vmcs_read(VMCS_GUEST_CR4, &(info->ctrl_regs.cr4)); + + // read out segments + + switch(exit_reason) + { + case VMEXIT_INFO_EXCEPTION_OR_NMI: + { + uint32_t int_info; + pf_error_t error_code; + check_vmcs_read(VMCS_EXIT_INT_INFO, &int_info); + check_vmcs_read(VMCS_EXIT_INT_ERR, &error_code); + + if((uint8_t)int_info == 0x0e) { + PrintDebug("Page Fault at %p\n", (void*)exit_qual); + if(info->shdw_pg_mode == SHADOW_PAGING) { + if(v3_handle_shadow_pagefault(info, (addr_t)exit_qual, error_code) == -1) { + return -1; + } + } else { + PrintError("Page fault in unimplemented paging mode\n"); + return -1; + } + } + break; + } + + case VMEXIT_IO_INSTR: + { + struct vmcs_io_qual * io_qual = (struct vmcs_io_qual *)&exit_qual; + + if(io_qual->dir == 0) { + if(io_qual->string) { + if(v3_handle_vmx_io_outs(info) == -1) { + return -1; + } + } else { + if(v3_handle_vmx_io_out(info) == -1) { + return -1; + } + } + } else { + if(io_qual->string) { + if(v3_handle_vmx_io_ins(info) == -1) { + return -1; + } + } else { + if(v3_handle_vmx_io_in(info) == -1) { + return -1; + } + } + } + break; + } + + default: + PrintError("Unhandled VMEXIT\n"); + return -1; + } + + check_vmcs_write(VMCS_GUEST_CR0, info->ctrl_regs.cr0); + check_vmcs_write(VMCS_GUEST_CR3, info->ctrl_regs.cr3); + check_vmcs_write(VMCS_GUEST_CR4, info->ctrl_regs.cr4); + check_vmcs_write(VMCS_GUEST_RIP, info->rip); + check_vmcs_write(VMCS_GUEST_RSP, info->vm_regs.rsp); + + PrintDebug("Executing VMRESUME\n"); + return 0; } diff --git a/palacios/src/palacios/vmx_io.c b/palacios/src/palacios/vmx_io.c new file mode 100644 index 0000000..bfe1703 --- /dev/null +++ b/palacios/src/palacios/vmx_io.c @@ -0,0 +1,89 @@ + +#include +#include +#include +#include +#include + +/* Same as SVM */ +static int update_map(struct guest_info * info, uint16_t port, int hook_read, int hook_write) +{ + uchar_t * bitmap = (uint8_t *)(info->io_map.arch_data); + int major = port / 8; + int minor = port % 8; + + if ((hook_read == 0) && (hook_write == 0)) { + *(bitmap + major) &= ~(0x1 << minor); + } else { + *(bitmap + major) |= (0x1 << minor); + } + + return 0; +} + +int v3_init_vmx_io_map(struct guest_info * info) +{ + info->io_map.update_map = update_map; + + info->io_map.arch_data = V3_VAddr(V3_AllocPages(2)); + memset(info->io_map.arch_data, 0, PAGE_SIZE_4KB*2); + + return 0; +} + +int v3_handle_vmx_io_in(struct guest_info * info) +{ + PrintDebug("IN not implemented\n"); + return -1; +} + +int v3_handle_vmx_io_ins(struct guest_info * info) +{ + PrintDebug("INS not implemented\n"); + return -1; +} + +int v3_handle_vmx_io_out(struct guest_info * info) +{ + ulong_t exit_qual; + + vmcs_read(VMCS_EXIT_QUAL, &exit_qual); + + struct vmcs_io_qual * io_qual = (struct vmcs_io_qual *)&exit_qual; + + struct v3_io_hook * hook = v3_get_io_hook(info, io_qual->port); + + if(hook == NULL) { + PrintError("Hook not present for out on port %x\n", io_qual->port); + return -1; + } + + int write_size = 1<<(io_qual->accessSize); + + PrintDebug("OUT of %d bytes on port %d (0x%x)\n", write_size, io_qual->port, io_qual->port); + + if(hook->write(io_qual->port, &(info->vm_regs.rax), write_size, hook->priv_data) != write_size) { + PrintError("Write failure for out on port %x\n",io_qual->port); + return -1; + } + + uint32_t instr_length; + + vmcs_read(VMCS_EXIT_INSTR_LEN, &instr_length); + + info->rip += instr_length; + + return 0; +} + +int v3_handle_vmx_io_outs(struct guest_info * info) +{ + ulong_t exit_qual; + + vmcs_read(VMCS_EXIT_QUAL, &exit_qual); + + struct vmcs_io_qual * io_qual = (struct vmcs_io_qual *)&exit_qual; + + PrintDebug("OUTS on port %d, (0x%x)\n", io_qual->port, io_qual->port); + return -1; +} diff --git a/palacios/src/palacios/vmx_lowlevel.S b/palacios/src/palacios/vmx_lowlevel.S index ee244ed..f0e793f 100644 --- a/palacios/src/palacios/vmx_lowlevel.S +++ b/palacios/src/palacios/vmx_lowlevel.S @@ -100,12 +100,14 @@ v3_vmx_exit_handler: POPA popf pushq %rdi + pushq %rsi call v3_handle_vmx_exit andq %rax, %rax jnz .Lvmm_failure v3_vmx_vmresume: + pop %rsi pop %rdi pushf PUSHA @@ -162,7 +164,7 @@ v3_vmx_vmlaunch: jmp .Lreturn .Lvmm_failure: - addq $8, %rsp + addq $16, %rsp movq $VMM_FAILURE, %rax jmp .Lreturn diff --git a/palacios/src/palacios/vmx_msr.c b/palacios/src/palacios/vmx_msr.c new file mode 100644 index 0000000..0b46b88 --- /dev/null +++ b/palacios/src/palacios/vmx_msr.c @@ -0,0 +1,42 @@ + +#include +#include + +/* Same as SVM */ +static int update_map(struct guest_info * info, uint_t msr, int hook_reads, int hook_writes) +{ + +#if 0 + int index = get_bitmap_index(msr); + uint_t major = index / 4; + uint_t minor = (index % 4) * 2; + uchar_t val = 0; + uchar_t mask = 0x3; + uint8_t * bitmap = (uint8_t *)(info->msr_map.arch_data); + + if (hook_reads) { + val |= 0x1; + } + + if (hook_writes) { + val |= 0x2; + } + + *(bitmap + major) &= ~(mask << minor); + *(bitmap + major) |= (val << minor); +#endif + + return 0; +} + +int v3_init_vmx_msr_map(struct guest_info * info) +{ + struct v3_msr_map * msr_map = &(info->msr_map); + + msr_map->update_map = update_map; + + msr_map->arch_data = V3_VAddr(V3_AllocPages(1)); + memset(msr_map->arch_data, 0, PAGE_SIZE_4KB); + + return 0; +}