summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorvboxsync <vboxsync@cfe28804-0f27-0410-a406-dd0f0b0b656f>2019-07-26 17:06:38 +0000
committervboxsync <vboxsync@cfe28804-0f27-0410-a406-dd0f0b0b656f>2019-07-26 17:06:38 +0000
commitc5e3683679de9d115e5c63cce116fdb7ceddf514 (patch)
tree2a127dec00efe11fe4daa75876b8bc3b099f0f03 /src
parentb8e0feaf58655a3adfe4e86b292a395ee641fd7a (diff)
downloadVirtualBox-svn-c5e3683679de9d115e5c63cce116fdb7ceddf514.tar.gz
VMM: Kicking out raw-mode (work in progress) - EM. bugref:9517
git-svn-id: https://www.virtualbox.org/svn/vbox/trunk@80016 cfe28804-0f27-0410-a406-dd0f0b0b656f
Diffstat (limited to 'src')
-rw-r--r--src/VBox/VMM/Makefile.kmk1
-rw-r--r--src/VBox/VMM/VMMAll/EMAll.cpp69
-rw-r--r--src/VBox/VMM/VMMR3/EM.cpp101
-rw-r--r--src/VBox/VMM/VMMR3/EMHM.cpp10
-rw-r--r--src/VBox/VMM/VMMR3/EMR3Nem.cpp4
-rw-r--r--src/VBox/VMM/VMMR3/EMRaw.cpp1516
-rw-r--r--src/VBox/VMM/include/EMHandleRCTmpl.h158
-rw-r--r--src/VBox/VMM/include/EMInternal.h42
-rw-r--r--src/VBox/VMM/testcase/tstVMStruct.h1
9 files changed, 32 insertions, 1870 deletions
diff --git a/src/VBox/VMM/Makefile.kmk b/src/VBox/VMM/Makefile.kmk
index eb4f6d859a6..5015cdcf5b6 100644
--- a/src/VBox/VMM/Makefile.kmk
+++ b/src/VBox/VMM/Makefile.kmk
@@ -111,7 +111,6 @@ VBoxVMM_SOURCES = \
VMMR3/DBGFR3Type.cpp \
VMMR3/EM.cpp \
VMMR3/EMR3Dbg.cpp \
- $(if $(VBOX_WITH_RAW_MODE),VMMR3/EMRaw.cpp) \
VMMR3/EMHM.cpp \
VMMR3/EMR3Nem.cpp \
VMMR3/FTM.cpp \
diff --git a/src/VBox/VMM/VMMAll/EMAll.cpp b/src/VBox/VMM/VMMAll/EMAll.cpp
index c897d0a6386..f669ef6feaf 100644
--- a/src/VBox/VMM/VMMAll/EMAll.cpp
+++ b/src/VBox/VMM/VMMAll/EMAll.cpp
@@ -1005,11 +1005,7 @@ VMM_INT_DECL(int) EMRemTryLock(PVM pVM)
static DECLCALLBACK(int) emReadBytes(PDISCPUSTATE pDis, uint8_t offInstr, uint8_t cbMinRead, uint8_t cbMaxRead)
{
PVMCPU pVCpu = (PVMCPU)pDis->pvUser;
-#if defined(VBOX_WITH_RAW_MODE) && (defined(IN_RC) || defined(IN_RING3))
- PVM pVM = pVCpu->CTX_SUFF(pVM);
-#endif
RTUINTPTR uSrcAddr = pDis->uInstrAddr + offInstr;
- int rc;
/*
* Figure how much we can or must read.
@@ -1020,62 +1016,29 @@ static DECLCALLBACK(int) emReadBytes(PDISCPUSTATE pDis, uint8_t offInstr, uint8_
else if (cbToRead < cbMinRead)
cbToRead = cbMinRead;
-#if defined(VBOX_WITH_RAW_MODE) && (defined(IN_RC) || defined(IN_RING3))
- /*
- * We might be called upon to interpret an instruction in a patch.
- */
- if (PATMIsPatchGCAddr(pVM, uSrcAddr))
- {
-# ifdef IN_RC
- memcpy(&pDis->abInstr[offInstr], (void *)(uintptr_t)uSrcAddr, cbToRead);
-# else
- memcpy(&pDis->abInstr[offInstr], PATMR3GCPtrToHCPtr(pVM, uSrcAddr), cbToRead);
-# endif
- rc = VINF_SUCCESS;
- }
- else
-#endif
+ int rc = PGMPhysSimpleReadGCPtr(pVCpu, &pDis->abInstr[offInstr], uSrcAddr, cbToRead);
+ if (RT_FAILURE(rc))
{
-# ifdef IN_RC
- /*
- * Try access it thru the shadow page tables first. Fall back on the
- * slower PGM method if it fails because the TLB or page table was
- * modified recently.
- */
- rc = MMGCRamRead(pVCpu->pVMRC, &pDis->abInstr[offInstr], (void *)(uintptr_t)uSrcAddr, cbToRead);
- if (rc == VERR_ACCESS_DENIED && cbToRead > cbMinRead)
+ if (cbToRead > cbMinRead)
{
cbToRead = cbMinRead;
- rc = MMGCRamRead(pVCpu->pVMRC, &pDis->abInstr[offInstr], (void *)(uintptr_t)uSrcAddr, cbToRead);
+ rc = PGMPhysSimpleReadGCPtr(pVCpu, &pDis->abInstr[offInstr], uSrcAddr, cbToRead);
}
- if (rc == VERR_ACCESS_DENIED)
-#endif
+ if (RT_FAILURE(rc))
{
- rc = PGMPhysSimpleReadGCPtr(pVCpu, &pDis->abInstr[offInstr], uSrcAddr, cbToRead);
- if (RT_FAILURE(rc))
- {
- if (cbToRead > cbMinRead)
- {
- cbToRead = cbMinRead;
- rc = PGMPhysSimpleReadGCPtr(pVCpu, &pDis->abInstr[offInstr], uSrcAddr, cbToRead);
- }
- if (RT_FAILURE(rc))
- {
#ifndef IN_RC
- /*
- * If we fail to find the page via the guest's page tables
- * we invalidate the page in the host TLB (pertaining to
- * the guest in the NestedPaging case). See @bugref{6043}.
- */
- if (rc == VERR_PAGE_TABLE_NOT_PRESENT || rc == VERR_PAGE_NOT_PRESENT)
- {
- HMInvalidatePage(pVCpu, uSrcAddr);
- if (((uSrcAddr + cbToRead - 1) >> PAGE_SHIFT) != (uSrcAddr >> PAGE_SHIFT))
- HMInvalidatePage(pVCpu, uSrcAddr + cbToRead - 1);
- }
-#endif
- }
+ /*
+ * If we fail to find the page via the guest's page tables
+ * we invalidate the page in the host TLB (pertaining to
+ * the guest in the NestedPaging case). See @bugref{6043}.
+ */
+ if (rc == VERR_PAGE_TABLE_NOT_PRESENT || rc == VERR_PAGE_NOT_PRESENT)
+ {
+ HMInvalidatePage(pVCpu, uSrcAddr);
+ if (((uSrcAddr + cbToRead - 1) >> PAGE_SHIFT) != (uSrcAddr >> PAGE_SHIFT))
+ HMInvalidatePage(pVCpu, uSrcAddr + cbToRead - 1);
}
+#endif
}
}
diff --git a/src/VBox/VMM/VMMR3/EM.cpp b/src/VBox/VMM/VMMR3/EM.cpp
index d3943f38eea..e4f9f03d868 100644
--- a/src/VBox/VMM/VMMR3/EM.cpp
+++ b/src/VBox/VMM/VMMR3/EM.cpp
@@ -101,12 +101,12 @@ VMMR3_INT_DECL(int) EMR3Init(PVM pVM)
*/
AssertCompileMemberAlignment(VM, em.s, 32);
AssertCompile(sizeof(pVM->em.s) <= sizeof(pVM->em.padding));
- AssertCompile(sizeof(pVM->aCpus[0].em.s.u.FatalLongJump) <= sizeof(pVM->aCpus[0].em.s.u.achPaddingFatalLongJump));
+ AssertCompile(RT_SIZEOFMEMB(VMCPU, em.s.u.FatalLongJump) <= RT_SIZEOFMEMB(VMCPU, em.s.u.achPaddingFatalLongJump));
+ AssertCompile(RT_SIZEOFMEMB(VMCPU, em.s) <= RT_SIZEOFMEMB(VMCPU, em.padding));
/*
* Init the structure.
*/
- pVM->em.s.offVM = RT_UOFFSETOF(VM, em.s);
PCFGMNODE pCfgRoot = CFGMR3GetRoot(pVM);
PCFGMNODE pCfgEM = CFGMR3GetChild(pCfgRoot, "EM");
@@ -233,18 +233,9 @@ VMMR3_INT_DECL(int) EMR3Init(PVM pVM)
pVCpu->em.s.enmState = i == 0 ? EMSTATE_NONE : EMSTATE_WAIT_SIPI;
pVCpu->em.s.enmPrevState = EMSTATE_NONE;
- pVCpu->em.s.fForceRAW = false;
pVCpu->em.s.u64TimeSliceStart = 0; /* paranoia */
pVCpu->em.s.idxContinueExitRec = UINT16_MAX;
-#ifdef VBOX_WITH_RAW_MODE
- if (VM_IS_RAW_MODE_ENABLED(pVM))
- {
- pVCpu->em.s.pPatmGCState = PATMR3QueryGCStateHC(pVM);
- AssertMsg(pVCpu->em.s.pPatmGCState, ("PATMR3QueryGCStateHC failed!\n"));
- }
-#endif
-
# define EM_REG_COUNTER(a, b, c) \
rc = STAMR3RegisterF(pVM, a, STAMTYPE_COUNTER, STAMVISIBILITY_ALWAYS, STAMUNIT_OCCURENCES, c, b, i); \
AssertRC(rc);
@@ -272,7 +263,6 @@ VMMR3_INT_DECL(int) EMR3Init(PVM pVM)
pVCpu->em.s.pStatsR3 = pStats;
pVCpu->em.s.pStatsR0 = MMHyperR3ToR0(pVM, pStats);
- pVCpu->em.s.pStatsRC = MMHyperR3ToRC(pVM, pStats);
# if 1 /* rawmode only? */
EM_REG_COUNTER_USED(&pStats->StatIoRestarted, "/EM/CPU%d/R3/PrivInst/IoRestarted", "I/O instructions restarted in ring-3.");
@@ -401,12 +391,7 @@ VMMR3_INT_DECL(int) EMR3InitCompleted(PVM pVM, VMINITCOMPLETED enmWhat)
VMMR3_INT_DECL(void) EMR3Relocate(PVM pVM)
{
LogFlow(("EMR3Relocate\n"));
- for (VMCPUID i = 0; i < pVM->cCpus; i++)
- {
- PVMCPU pVCpu = &pVM->aCpus[i];
- if (pVCpu->em.s.pStatsR3)
- pVCpu->em.s.pStatsRC = MMHyperR3ToRC(pVM, pVCpu->em.s.pStatsR3);
- }
+ RT_NOREF(pVM);
}
@@ -420,7 +405,6 @@ VMMR3_INT_DECL(void) EMR3Relocate(PVM pVM)
VMMR3_INT_DECL(void) EMR3ResetCpu(PVMCPU pVCpu)
{
/* Reset scheduling state. */
- pVCpu->em.s.fForceRAW = false;
VMCPU_FF_CLEAR(pVCpu, VMCPU_FF_UNHALT);
/* VMR3ResetFF may return VINF_EM_RESET or VINF_EM_SUSPEND, so transition
@@ -458,8 +442,6 @@ VMMR3_INT_DECL(void) EMR3Reset(PVM pVM)
*/
VMMR3_INT_DECL(int) EMR3Term(PVM pVM)
{
- AssertMsg(pVM->em.s.offVM, ("bad init order!\n"));
-
#ifdef VBOX_WITH_REM
PDMR3CritSectDelete(&pVM->em.s.CritSectREM);
#else
@@ -482,7 +464,7 @@ static DECLCALLBACK(int) emR3Save(PVM pVM, PSSMHANDLE pSSM)
{
PVMCPU pVCpu = &pVM->aCpus[i];
- SSMR3PutBool(pSSM, pVCpu->em.s.fForceRAW);
+ SSMR3PutBool(pSSM, false /*fForceRAW*/);
Assert(pVCpu->em.s.enmState == EMSTATE_SUSPENDED);
Assert(pVCpu->em.s.enmPrevState != EMSTATE_SUSPENDED);
@@ -530,9 +512,8 @@ static DECLCALLBACK(int) emR3Load(PVM pVM, PSSMHANDLE pSSM, uint32_t uVersion, u
{
PVMCPU pVCpu = &pVM->aCpus[i];
- int rc = SSMR3GetBool(pSSM, &pVCpu->em.s.fForceRAW);
- if (RT_FAILURE(rc))
- pVCpu->em.s.fForceRAW = false;
+ bool fForceRAWIgnored;
+ int rc = SSMR3GetBool(pSSM, &fForceRAWIgnored);
AssertRCReturn(rc, rc);
if (uVersion > EM_SAVED_STATE_VERSION_PRE_SMP)
@@ -871,13 +852,8 @@ static VBOXSTRICTRC emR3Debug(PVM pVM, PVMCPU pVCpu, VBOXSTRICTRC rc)
*/
case VINF_EM_DBG_STEP:
if ( pVCpu->em.s.enmState == EMSTATE_DEBUG_GUEST_RAW
- || pVCpu->em.s.enmState == EMSTATE_DEBUG_HYPER
- || pVCpu->em.s.fForceRAW /* paranoia */)
-#ifdef VBOX_WITH_RAW_MODE
- rc = emR3RawStep(pVM, pVCpu);
-#else
+ || pVCpu->em.s.enmState == EMSTATE_DEBUG_HYPER)
AssertLogRelMsgFailedStmt(("Bad EM state."), VERR_EM_INTERNAL_ERROR);
-#endif
else if (pVCpu->em.s.enmState == EMSTATE_DEBUG_GUEST_HM)
rc = EMR3HmSingleInstruction(pVM, pVCpu, 0 /*fFlags*/);
else if (pVCpu->em.s.enmState == EMSTATE_DEBUG_GUEST_NEM)
@@ -978,15 +954,7 @@ static VBOXSTRICTRC emR3Debug(PVM pVM, PVMCPU pVCpu, VBOXSTRICTRC rc)
case VINF_EM_RESCHEDULE_REM:
case VINF_EM_HALT:
if (pVCpu->em.s.enmState == EMSTATE_DEBUG_HYPER)
- {
-#ifdef VBOX_WITH_RAW_MODE
- rc = emR3RawResumeHyper(pVM, pVCpu);
- if (rc != VINF_SUCCESS && RT_SUCCESS(rc))
- continue;
-#else
AssertLogRelMsgFailedReturn(("Not implemented\n"), VERR_EM_INTERNAL_ERROR);
-#endif
- }
if (rc == VINF_SUCCESS)
rc = VINF_EM_RESCHEDULE;
return rc;
@@ -1421,12 +1389,6 @@ static VBOXSTRICTRC emR3ExecuteIemThenRem(PVM pVM, PVMCPU pVCpu, bool *pfFFDone)
EMSTATE emR3Reschedule(PVM pVM, PVMCPU pVCpu)
{
/*
- * When forcing raw-mode execution, things are simple.
- */
- if (pVCpu->em.s.fForceRAW)
- return EMSTATE_RAW;
-
- /*
* We stay in the wait for SIPI state unless explicitly told otherwise.
*/
if (pVCpu->em.s.enmState == EMSTATE_WAIT_SIPI)
@@ -1557,17 +1519,6 @@ EMSTATE emR3Reschedule(PVM pVM, PVMCPU pVCpu)
return EMSTATE_REM;
}
-# ifdef VBOX_WITH_RAW_MODE
- if (PATMShouldUseRawMode(pVM, (RTGCPTR)pVCpu->cpum.GstCtx.eip))
- {
- Log2(("raw r0 mode forced: patch code\n"));
-# ifdef VBOX_WITH_SAFE_STR
- Assert(pVCpu->cpum.GstCtx.tr.Sel);
-# endif
- return EMSTATE_RAW;
- }
-# endif /* VBOX_WITH_RAW_MODE */
-
# if !defined(VBOX_ALLOW_IF0) && !defined(VBOX_RUN_INTERRUPT_GATE_HANDLERS)
if (!(EFlags.u32 & X86_EFL_IF))
{
@@ -1693,11 +1644,6 @@ VBOXSTRICTRC emR3HighPriorityPostForcedActions(PVM pVM, PVMCPU pVCpu, VBOXSTRICT
pVCpu->em.s.idxContinueExitRec = UINT16_MAX;
}
-#ifdef VBOX_WITH_RAW_MODE
- if (VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_CSAM_PENDING_ACTION))
- CSAMR3DoPendingAction(pVM, pVCpu);
-#endif
-
if (VM_FF_IS_SET(pVM, VM_FF_PGM_NO_MEMORY))
{
if ( rc > VINF_EM_NO_MEMORY
@@ -1910,21 +1856,6 @@ int emR3ForcedActions(PVM pVM, PVMCPU pVCpu, int rc)
UPDATE_RC();
}
-#ifdef VBOX_WITH_RAW_MODE
- /*
- * CSAM page scanning.
- */
- if ( !VM_FF_IS_SET(pVM, VM_FF_PGM_NO_MEMORY)
- && VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_CSAM_SCAN_PAGE))
- {
- /** @todo check for 16 or 32 bits code! (D bit in the code selector) */
- Log(("Forced action VMCPU_FF_CSAM_SCAN_PAGE\n"));
- CPUM_IMPORT_EXTRN_RCSTRICT(pVCpu, ~CPUMCTX_EXTRN_KEEPER_MASK, rc);
- CSAMR3CheckCodeEx(pVM, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.eip);
- VMCPU_FF_CLEAR(pVCpu, VMCPU_FF_CSAM_SCAN_PAGE);
- }
-#endif
-
/*
* Out of memory? Putting this after CSAM as it may in theory cause us to run out of memory.
*/
@@ -2175,9 +2106,6 @@ int emR3ForcedActions(PVM pVM, PVMCPU pVCpu, int rc)
}
bool fGif = CPUMGetGuestGif(&pVCpu->cpum.GstCtx);
-#ifdef VBOX_WITH_RAW_MODE
- fGif &= !PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip);
-#endif
if (fGif)
{
#ifdef VBOX_WITH_NESTED_HWVIRT_VMX
@@ -2506,12 +2434,11 @@ bool emR3IsExecutionAllowed(PVM pVM, PVMCPU pVCpu)
*/
VMMR3_INT_DECL(int) EMR3ExecuteVM(PVM pVM, PVMCPU pVCpu)
{
- Log(("EMR3ExecuteVM: pVM=%p enmVMState=%d (%s) enmState=%d (%s) enmPrevState=%d (%s) fForceRAW=%RTbool\n",
+ Log(("EMR3ExecuteVM: pVM=%p enmVMState=%d (%s) enmState=%d (%s) enmPrevState=%d (%s)\n",
pVM,
pVM->enmVMState, VMR3GetStateName(pVM->enmVMState),
pVCpu->em.s.enmState, emR3GetStateName(pVCpu->em.s.enmState),
- pVCpu->em.s.enmPrevState, emR3GetStateName(pVCpu->em.s.enmPrevState),
- pVCpu->em.s.fForceRAW));
+ pVCpu->em.s.enmPrevState, emR3GetStateName(pVCpu->em.s.enmPrevState) ));
VM_ASSERT_EMT(pVM);
AssertMsg( pVCpu->em.s.enmState == EMSTATE_NONE
|| pVCpu->em.s.enmState == EMSTATE_WAIT_SIPI
@@ -2565,9 +2492,8 @@ VMMR3_INT_DECL(int) EMR3ExecuteVM(PVM pVM, PVMCPU pVCpu)
{
rc = emR3ForcedActions(pVM, pVCpu, rc);
VBOXVMM_EM_FF_ALL_RET(pVCpu, rc);
- if ( ( rc == VINF_EM_RESCHEDULE_REM
- || rc == VINF_EM_RESCHEDULE_HM)
- && pVCpu->em.s.fForceRAW)
+ if ( rc == VINF_EM_RESCHEDULE_REM
+ || rc == VINF_EM_RESCHEDULE_HM)
rc = VINF_EM_RESCHEDULE_RAW;
}
else if (fFFDone)
@@ -2609,7 +2535,6 @@ VMMR3_INT_DECL(int) EMR3ExecuteVM(PVM pVM, PVMCPU pVCpu)
*/
case VINF_EM_RESCHEDULE_HM:
Assert(!pVM->em.s.fIemExecutesAll || pVCpu->em.s.enmState != EMSTATE_IEM);
- Assert(!pVCpu->em.s.fForceRAW);
if (VM_IS_HM_ENABLED(pVM))
{
Log2(("EMR3ExecuteVM: VINF_EM_RESCHEDULE_HM: %d -> %d (EMSTATE_HM)\n", enmOldState, EMSTATE_HM));
@@ -2905,12 +2830,8 @@ VMMR3_INT_DECL(int) EMR3ExecuteVM(PVM pVM, PVMCPU pVCpu)
* Execute raw.
*/
case EMSTATE_RAW:
-#ifdef VBOX_WITH_RAW_MODE
- rc = emR3RawExecute(pVM, pVCpu, &fFFDone);
-#else
AssertLogRelMsgFailed(("%Rrc\n", rc));
rc = VERR_EM_INTERNAL_ERROR;
-#endif
break;
/*
diff --git a/src/VBox/VMM/VMMR3/EMHM.cpp b/src/VBox/VMM/VMMR3/EMHM.cpp
index b4b55a39149..5ac7b60064c 100644
--- a/src/VBox/VMM/VMMR3/EMHM.cpp
+++ b/src/VBox/VMM/VMMR3/EMHM.cpp
@@ -308,10 +308,6 @@ static int emR3HmForcedActions(PVM pVM, PVMCPU pVCpu)
if (RT_FAILURE(rc))
return rc;
-#ifdef VBOX_WITH_RAW_MODE
- Assert(!VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_GDT | VMCPU_FF_SELM_SYNC_LDT));
-#endif
-
/* Prefetch pages for EIP and ESP. */
/** @todo This is rather expensive. Should investigate if it really helps at all. */
/** @todo this should be skipped! */
@@ -331,9 +327,6 @@ static int emR3HmForcedActions(PVM pVM, PVMCPU pVCpu)
return rc;
}
/** @todo maybe prefetch the supervisor stack page as well */
-#ifdef VBOX_WITH_RAW_MODE
- Assert(!VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_GDT | VMCPU_FF_SELM_SYNC_LDT));
-#endif
}
/*
@@ -400,9 +393,6 @@ int emR3HmExecute(PVM pVM, PVMCPU pVCpu, bool *pfFFDone)
/*
* Process high priority pre-execution raw-mode FFs.
*/
-#ifdef VBOX_WITH_RAW_MODE
- Assert(!VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_TSS | VMCPU_FF_SELM_SYNC_GDT | VMCPU_FF_SELM_SYNC_LDT));
-#endif
if ( VM_FF_IS_ANY_SET(pVM, VM_FF_HIGH_PRIORITY_PRE_RAW_MASK)
|| VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_HIGH_PRIORITY_PRE_RAW_MASK))
{
diff --git a/src/VBox/VMM/VMMR3/EMR3Nem.cpp b/src/VBox/VMM/VMMR3/EMR3Nem.cpp
index 28c8b72e228..74bd6cdd36b 100644
--- a/src/VBox/VMM/VMMR3/EMR3Nem.cpp
+++ b/src/VBox/VMM/VMMR3/EMR3Nem.cpp
@@ -299,10 +299,6 @@ static int emR3NemExecuteIOInstruction(PVM pVM, PVMCPU pVCpu)
*/
static int emR3NemForcedActions(PVM pVM, PVMCPU pVCpu)
{
-#ifdef VBOX_WITH_RAW_MODE
- Assert(!VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_TSS | VMCPU_FF_SELM_SYNC_GDT | VMCPU_FF_SELM_SYNC_LDT));
-#endif
-
/*
* Sync page directory should not happen in NEM mode.
*/
diff --git a/src/VBox/VMM/VMMR3/EMRaw.cpp b/src/VBox/VMM/VMMR3/EMRaw.cpp
deleted file mode 100644
index e3a4db6d105..00000000000
--- a/src/VBox/VMM/VMMR3/EMRaw.cpp
+++ /dev/null
@@ -1,1516 +0,0 @@
-/* $Id$ */
-/** @file
- * EM - Execution Monitor / Manager - software virtualization
- */
-
-/*
- * Copyright (C) 2006-2019 Oracle Corporation
- *
- * This file is part of VirtualBox Open Source Edition (OSE), as
- * available from http://www.virtualbox.org. This file is free software;
- * you can redistribute it and/or modify it under the terms of the GNU
- * General Public License (GPL) as published by the Free Software
- * Foundation, in version 2 as it comes in the "COPYING" file of the
- * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
- * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
- */
-
-
-/*********************************************************************************************************************************
-* Header Files *
-*********************************************************************************************************************************/
-#define LOG_GROUP LOG_GROUP_EM
-#define VMCPU_INCL_CPUM_GST_CTX
-#include <VBox/vmm/em.h>
-#include <VBox/vmm/vmm.h>
-#include <VBox/vmm/selm.h>
-#include <VBox/vmm/trpm.h>
-#include <VBox/vmm/iem.h>
-#include <VBox/vmm/iom.h>
-#include <VBox/vmm/dbgf.h>
-#include <VBox/vmm/pgm.h>
-#ifdef VBOX_WITH_REM
-# include <VBox/vmm/rem.h>
-#endif
-#include <VBox/vmm/tm.h>
-#include <VBox/vmm/mm.h>
-#include <VBox/vmm/ssm.h>
-#include <VBox/vmm/pdmapi.h>
-#include <VBox/vmm/pdmcritsect.h>
-#include <VBox/vmm/pdmqueue.h>
-#include <VBox/vmm/patm.h>
-#include "EMInternal.h"
-#include <VBox/vmm/vm.h>
-#include <VBox/vmm/gim.h>
-#include <VBox/vmm/cpumdis.h>
-#include <VBox/dis.h>
-#include <VBox/disopcode.h>
-#include <VBox/vmm/dbgf.h>
-#include "VMMTracing.h"
-
-#include <VBox/err.h>
-#include <VBox/log.h>
-#include <iprt/asm.h>
-#include <iprt/string.h>
-#include <iprt/stream.h>
-
-
-
-/*********************************************************************************************************************************
-* Internal Functions *
-*********************************************************************************************************************************/
-static int emR3RawHandleRC(PVM pVM, PVMCPU pVCpu, int rc);
-static int emR3RawForcedActions(PVM pVM, PVMCPU pVCpu);
-DECLINLINE(int) emR3RawExecuteInstruction(PVM pVM, PVMCPU pVCpu, const char *pszPrefix, int rcGC = VINF_SUCCESS);
-static int emR3RawGuestTrap(PVM pVM, PVMCPU pVCpu);
-static int emR3RawPatchTrap(PVM pVM, PVMCPU pVCpu, int gcret);
-static int emR3RawPrivileged(PVM pVM, PVMCPU pVCpu);
-static int emR3RawExecuteIOInstruction(PVM pVM, PVMCPU pVCpu);
-static int emR3RawRingSwitch(PVM pVM, PVMCPU pVCpu);
-static int emR3RawUpdateForceFlag(PVM pVM, PVMCPU pVCpu, int rc);
-
-#define EMHANDLERC_WITH_PATM
-#define emR3ExecuteInstruction emR3RawExecuteInstruction
-#define emR3ExecuteIOInstruction emR3RawExecuteIOInstruction
-#include "EMHandleRCTmpl.h"
-
-
-
-#ifdef VBOX_WITH_STATISTICS
-/**
- * Just a braindead function to keep track of cli addresses.
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- * @param GCPtrInstr The EIP of the cli instruction.
- */
-static void emR3RecordCli(PVM pVM, PVMCPU pVCpu, RTGCPTR GCPtrInstr)
-{
- PCLISTAT pRec;
-
- pRec = (PCLISTAT)RTAvlGCPtrGet(&pVCpu->em.s.pCliStatTree, GCPtrInstr);
- if (!pRec)
- {
- /* New cli instruction; insert into the tree. */
- pRec = (PCLISTAT)MMR3HeapAllocZ(pVM, MM_TAG_EM, sizeof(*pRec));
- Assert(pRec);
- if (!pRec)
- return;
- pRec->Core.Key = GCPtrInstr;
-
- char szCliStatName[32];
- RTStrPrintf(szCliStatName, sizeof(szCliStatName), "/EM/Cli/0x%RGv", GCPtrInstr);
- STAM_REG(pVM, &pRec->Counter, STAMTYPE_COUNTER, szCliStatName, STAMUNIT_OCCURENCES, "Number of times cli was executed.");
-
- bool fRc = RTAvlGCPtrInsert(&pVCpu->em.s.pCliStatTree, &pRec->Core);
- Assert(fRc); NOREF(fRc);
- }
- STAM_COUNTER_INC(&pRec->Counter);
- STAM_COUNTER_INC(&pVCpu->em.s.StatTotalClis);
-}
-#endif /* VBOX_WITH_STATISTICS */
-
-
-
-/**
- * Resumes executing hypervisor after a debug event.
- *
- * This is kind of special since our current guest state is
- * potentially out of sync.
- *
- * @returns VBox status code.
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- */
-int emR3RawResumeHyper(PVM pVM, PVMCPU pVCpu)
-{
- int rc;
- Assert(pVCpu->em.s.enmState == EMSTATE_DEBUG_HYPER);
- Log(("emR3RawResumeHyper: cs:eip=%RTsel:%RGr efl=%RGr\n", pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.eflags));
-
- /*
- * Resume execution.
- */
- CPUMRawEnter(pVCpu);
- CPUMSetHyperEFlags(pVCpu, CPUMGetHyperEFlags(pVCpu) | X86_EFL_RF);
- rc = VMMR3ResumeHyper(pVM, pVCpu);
- Log(("emR3RawResumeHyper: cs:eip=%RTsel:%RGr efl=%RGr - returned from GC with rc=%Rrc\n", pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.eflags, rc));
- rc = CPUMRawLeave(pVCpu, rc);
- VMCPU_FF_CLEAR_MASK(pVCpu, VMCPU_FF_RESUME_GUEST_MASK);
-
- /*
- * Deal with the return code.
- */
- rc = VBOXSTRICTRC_TODO(emR3HighPriorityPostForcedActions(pVM, pVCpu, rc));
- rc = emR3RawHandleRC(pVM, pVCpu, rc);
- rc = emR3RawUpdateForceFlag(pVM, pVCpu, rc);
- return rc;
-}
-
-
-/**
- * Steps rawmode.
- *
- * @returns VBox status code.
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- */
-int emR3RawStep(PVM pVM, PVMCPU pVCpu)
-{
- Assert( pVCpu->em.s.enmState == EMSTATE_DEBUG_HYPER
- || pVCpu->em.s.enmState == EMSTATE_DEBUG_GUEST_RAW
- || pVCpu->em.s.enmState == EMSTATE_DEBUG_GUEST_REM);
- int rc;
- bool fGuest = pVCpu->em.s.enmState != EMSTATE_DEBUG_HYPER;
-#ifndef DEBUG_sander
- Log(("emR3RawStep: cs:eip=%RTsel:%RGr efl=%RGr\n", fGuest ? CPUMGetGuestCS(pVCpu) : CPUMGetHyperCS(pVCpu),
- fGuest ? CPUMGetGuestEIP(pVCpu) : CPUMGetHyperEIP(pVCpu), fGuest ? CPUMGetGuestEFlags(pVCpu) : CPUMGetHyperEFlags(pVCpu)));
-#endif
- if (fGuest)
- {
- /*
- * Check vital forced actions, but ignore pending interrupts and timers.
- */
- if ( VM_FF_IS_ANY_SET(pVM, VM_FF_HIGH_PRIORITY_PRE_RAW_MASK)
- || VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_HIGH_PRIORITY_PRE_RAW_MASK))
- {
- rc = emR3RawForcedActions(pVM, pVCpu);
- VBOXVMM_EM_FF_RAW_RET(pVCpu, rc);
- if (rc != VINF_SUCCESS)
- return rc;
- }
-
- /*
- * Set flags for single stepping.
- */
- CPUMSetGuestEFlags(pVCpu, CPUMGetGuestEFlags(pVCpu) | X86_EFL_TF | X86_EFL_RF);
- }
- else
- CPUMSetHyperEFlags(pVCpu, CPUMGetHyperEFlags(pVCpu) | X86_EFL_TF | X86_EFL_RF);
-
- /*
- * Single step.
- * We do not start time or anything, if anything we should just do a few nanoseconds.
- */
- CPUMRawEnter(pVCpu);
- do
- {
- if (pVCpu->em.s.enmState == EMSTATE_DEBUG_HYPER)
- rc = VMMR3ResumeHyper(pVM, pVCpu);
- else
- rc = VMMR3RawRunGC(pVM, pVCpu);
-#ifndef DEBUG_sander
- Log(("emR3RawStep: cs:eip=%RTsel:%RGr efl=%RGr - GC rc %Rrc\n", fGuest ? CPUMGetGuestCS(pVCpu) : CPUMGetHyperCS(pVCpu),
- fGuest ? CPUMGetGuestEIP(pVCpu) : CPUMGetHyperEIP(pVCpu), fGuest ? CPUMGetGuestEFlags(pVCpu) : CPUMGetHyperEFlags(pVCpu), rc));
-#endif
- } while ( rc == VINF_SUCCESS
- || rc == VINF_EM_RAW_INTERRUPT);
- rc = CPUMRawLeave(pVCpu, rc);
- VMCPU_FF_CLEAR_MASK(pVCpu, VMCPU_FF_RESUME_GUEST_MASK);
-
- /*
- * Make sure the trap flag is cleared.
- * (Too bad if the guest is trying to single step too.)
- */
- if (fGuest)
- CPUMSetGuestEFlags(pVCpu, CPUMGetGuestEFlags(pVCpu) & ~X86_EFL_TF);
- else
- CPUMSetHyperEFlags(pVCpu, CPUMGetHyperEFlags(pVCpu) & ~X86_EFL_TF);
-
- /*
- * Deal with the return codes.
- */
- rc = VBOXSTRICTRC_TODO(emR3HighPriorityPostForcedActions(pVM, pVCpu, rc));
- rc = emR3RawHandleRC(pVM, pVCpu, rc);
- rc = emR3RawUpdateForceFlag(pVM, pVCpu, rc);
- return rc;
-}
-
-
-#ifdef DEBUG
-
-
-int emR3SingleStepExecRaw(PVM pVM, PVMCPU pVCpu, uint32_t cIterations)
-{
- int rc = VINF_SUCCESS;
- EMSTATE enmOldState = pVCpu->em.s.enmState;
- pVCpu->em.s.enmState = EMSTATE_DEBUG_GUEST_RAW;
-
- Log(("Single step BEGIN:\n"));
- for (uint32_t i = 0; i < cIterations; i++)
- {
- DBGFR3PrgStep(pVCpu);
- DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "RSS");
- rc = emR3RawStep(pVM, pVCpu);
- if ( rc != VINF_SUCCESS
- && rc != VINF_EM_DBG_STEPPED)
- break;
- }
- Log(("Single step END: rc=%Rrc\n", rc));
- CPUMSetGuestEFlags(pVCpu, CPUMGetGuestEFlags(pVCpu) & ~X86_EFL_TF);
- pVCpu->em.s.enmState = enmOldState;
- return rc;
-}
-
-#endif /* DEBUG */
-
-
-/**
- * Executes one (or perhaps a few more) instruction(s).
- *
- * @returns VBox status code suitable for EM.
- *
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- * @param rcGC GC return code
- * @param pszPrefix Disassembly prefix. If not NULL we'll disassemble the
- * instruction and prefix the log output with this text.
- */
-#if defined(LOG_ENABLED) || defined(DOXYGEN_RUNNING)
-static int emR3RawExecuteInstructionWorker(PVM pVM, PVMCPU pVCpu, int rcGC, const char *pszPrefix)
-#else
-static int emR3RawExecuteInstructionWorker(PVM pVM, PVMCPU pVCpu, int rcGC)
-#endif
-{
- int rc;
-
-#ifdef LOG_ENABLED
- /*
- * Disassemble the instruction if requested.
- */
- if (pszPrefix)
- {
- DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", pszPrefix);
- DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, pszPrefix);
- }
-#endif /* LOG_ENABLED */
-
- /*
- * PATM is making life more interesting.
- * We cannot hand anything to REM which has an EIP inside patch code. So, we'll
- * tell PATM there is a trap in this code and have it take the appropriate actions
- * to allow us execute the code in REM.
- */
- if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip))
- {
- Log(("emR3RawExecuteInstruction: In patch block. eip=%RRv\n", (RTRCPTR)pVCpu->cpum.GstCtx.eip));
-
- RTGCPTR uNewEip;
- rc = PATMR3HandleTrap(pVM, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.eip, &uNewEip);
- switch (rc)
- {
- /*
- * It's not very useful to emulate a single instruction and then go back to raw
- * mode; just execute the whole block until IF is set again.
- */
- case VINF_SUCCESS:
- Log(("emR3RawExecuteInstruction: Executing instruction starting at new address %RGv IF=%d VMIF=%x\n",
- uNewEip, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pVCpu->em.s.pPatmGCState->uVMFlags));
- pVCpu->cpum.GstCtx.eip = uNewEip;
- Assert(pVCpu->cpum.GstCtx.eip);
-
- if (pVCpu->cpum.GstCtx.eflags.Bits.u1IF)
- {
- /*
- * The last instruction in the patch block needs to be executed!! (sti/sysexit for example)
- */
- Log(("PATCH: IF=1 -> emulate last instruction as it can't be interrupted!!\n"));
- return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHIR");
- }
- else if (rcGC == VINF_PATM_PENDING_IRQ_AFTER_IRET)
- {
- /* special case: iret, that sets IF, detected a pending irq/event */
- return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHIRET");
- }
- return VINF_EM_RESCHEDULE_REM;
-
- /*
- * One instruction.
- */
- case VINF_PATCH_EMULATE_INSTR:
- Log(("emR3RawExecuteInstruction: Emulate patched instruction at %RGv IF=%d VMIF=%x\n",
- uNewEip, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pVCpu->em.s.pPatmGCState->uVMFlags));
- pVCpu->cpum.GstCtx.eip = uNewEip;
- return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHIR");
-
- /*
- * The patch was disabled, hand it to the REM.
- */
- case VERR_PATCH_DISABLED:
- Log(("emR3RawExecuteInstruction: Disabled patch -> new eip %RGv IF=%d VMIF=%x\n",
- uNewEip, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pVCpu->em.s.pPatmGCState->uVMFlags));
- pVCpu->cpum.GstCtx.eip = uNewEip;
- if (pVCpu->cpum.GstCtx.eflags.Bits.u1IF)
- {
- /*
- * The last instruction in the patch block needs to be executed!! (sti/sysexit for example)
- */
- Log(("PATCH: IF=1 -> emulate last instruction as it can't be interrupted!!\n"));
- return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHIR");
- }
- return VINF_EM_RESCHEDULE_REM;
-
- /* Force continued patch exection; usually due to write monitored stack. */
- case VINF_PATCH_CONTINUE:
- return VINF_SUCCESS;
-
- default:
- AssertReleaseMsgFailed(("Unknown return code %Rrc from PATMR3HandleTrap\n", rc));
- return VERR_IPE_UNEXPECTED_STATUS;
- }
- }
-
-
- /*
- * Use IEM and fallback on REM if the functionality is missing.
- * Once IEM gets mature enough, nothing should ever fall back.
- */
-#define VBOX_WITH_FIRST_IEM_STEP_B
-#if defined(VBOX_WITH_FIRST_IEM_STEP_B) || !defined(VBOX_WITH_REM)
- Log(("EMINS: %04x:%RGv RSP=%RGv\n", pVCpu->cpum.GstCtx.cs.Sel, (RTGCPTR)pVCpu->cpum.GstCtx.rip, (RTGCPTR)pVCpu->cpum.GstCtx.rsp));
- STAM_PROFILE_START(&pVCpu->em.s.StatIEMEmu, a);
- rc = VBOXSTRICTRC_TODO(IEMExecOne(pVCpu));
- STAM_PROFILE_STOP(&pVCpu->em.s.StatIEMEmu, a);
- if (RT_SUCCESS(rc))
- {
- if (rc == VINF_SUCCESS || rc == VINF_EM_RESCHEDULE)
- rc = VINF_EM_RESCHEDULE;
- }
- else if ( rc == VERR_IEM_ASPECT_NOT_IMPLEMENTED
- || rc == VERR_IEM_INSTR_NOT_IMPLEMENTED)
-#endif
- {
-#ifdef VBOX_WITH_REM
- STAM_PROFILE_START(&pVCpu->em.s.StatREMEmu, b);
-# ifndef VBOX_WITH_FIRST_IEM_STEP_B
- Log(("EMINS[rem]: %04x:%RGv RSP=%RGv\n", pVCpu->cpum.GstCtx.cs.Sel, (RTGCPTR)pVCpu->cpum.GstCtx.rip, (RTGCPTR)pVCpu->cpum.GstCtx.rsp));
-//# elif defined(DEBUG_bird)
-// AssertFailed();
-# endif
- EMRemLock(pVM);
- /* Flush the recompiler TLB if the VCPU has changed. */
- if (pVM->em.s.idLastRemCpu != pVCpu->idCpu)
- CPUMSetChangedFlags(pVCpu, CPUM_CHANGED_ALL);
- pVM->em.s.idLastRemCpu = pVCpu->idCpu;
-
- rc = REMR3EmulateInstruction(pVM, pVCpu);
- EMRemUnlock(pVM);
- STAM_PROFILE_STOP(&pVCpu->em.s.StatREMEmu, b);
-#else /* !VBOX_WITH_REM */
- NOREF(pVM);
-#endif /* !VBOX_WITH_REM */
- }
- return rc;
-}
-
-
-/**
- * Executes one (or perhaps a few more) instruction(s).
- * This is just a wrapper for discarding pszPrefix in non-logging builds.
- *
- * @returns VBox status code suitable for EM.
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- * @param pszPrefix Disassembly prefix. If not NULL we'll disassemble the
- * instruction and prefix the log output with this text.
- * @param rcGC GC return code
- */
-DECLINLINE(int) emR3RawExecuteInstruction(PVM pVM, PVMCPU pVCpu, const char *pszPrefix, int rcGC)
-{
-#ifdef LOG_ENABLED
- return emR3RawExecuteInstructionWorker(pVM, pVCpu, rcGC, pszPrefix);
-#else
- RT_NOREF_PV(pszPrefix);
- return emR3RawExecuteInstructionWorker(pVM, pVCpu, rcGC);
-#endif
-}
-
-/**
- * Executes one (or perhaps a few more) IO instruction(s).
- *
- * @returns VBox status code suitable for EM.
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- */
-static int emR3RawExecuteIOInstruction(PVM pVM, PVMCPU pVCpu)
-{
- STAM_PROFILE_START(&pVCpu->em.s.StatIOEmu, a);
- RT_NOREF_PV(pVM);
-
- /* Hand it over to the interpreter. */
- VBOXSTRICTRC rcStrict = IEMExecOne(pVCpu);
- LogFlow(("emR3RawExecuteIOInstruction: %Rrc\n", VBOXSTRICTRC_VAL(rcStrict)));
- STAM_COUNTER_INC(&pVCpu->em.s.CTX_SUFF(pStats)->StatIoIem);
- STAM_PROFILE_STOP(&pVCpu->em.s.StatIOEmu, a);
- return VBOXSTRICTRC_TODO(rcStrict);
-}
-
-
-/**
- * Handle a guest context trap.
- *
- * @returns VBox status code suitable for EM.
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- */
-static int emR3RawGuestTrap(PVM pVM, PVMCPU pVCpu)
-{
- /*
- * Get the trap info.
- */
- uint8_t u8TrapNo;
- TRPMEVENT enmType;
- RTGCUINT uErrorCode;
- RTGCUINTPTR uCR2;
- int rc = TRPMQueryTrapAll(pVCpu, &u8TrapNo, &enmType, &uErrorCode, &uCR2, NULL /* pu8InstrLen */);
- if (RT_FAILURE(rc))
- {
- AssertReleaseMsgFailed(("No trap! (rc=%Rrc)\n", rc));
- return rc;
- }
-
-
-#if 1 /* Experimental: Review, disable if it causes trouble. */
- /*
- * Handle traps in patch code first.
- *
- * We catch a few of these cases in RC before returning to R3 (#PF, #GP, #BP)
- * but several traps isn't handled specially by TRPM in RC and we end up here
- * instead. One example is #DE.
- */
- uint32_t uCpl = CPUMGetGuestCPL(pVCpu);
- if ( uCpl == 0
- && PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip))
- {
- LogFlow(("emR3RawGuestTrap: trap %#x in patch code; eip=%08x\n", u8TrapNo, pVCpu->cpum.GstCtx.eip));
- return emR3RawPatchTrap(pVM, pVCpu, rc);
- }
-#endif
-
- /*
- * If the guest gate is marked unpatched, then we will check again if we can patch it.
- * (This assumes that we've already tried and failed to dispatch the trap in
- * RC for the gates that already has been patched. Which is true for most high
- * volume traps, because these are handled specially, but not for odd ones like #DE.)
- */
- if (TRPMR3GetGuestTrapHandler(pVM, u8TrapNo) == TRPM_INVALID_HANDLER)
- {
- CSAMR3CheckGates(pVM, u8TrapNo, 1);
- Log(("emR3RawHandleRC: recheck gate %x -> valid=%d\n", u8TrapNo, TRPMR3GetGuestTrapHandler(pVM, u8TrapNo) != TRPM_INVALID_HANDLER));
-
- /* If it was successful, then we could go back to raw mode. */
- if (TRPMR3GetGuestTrapHandler(pVM, u8TrapNo) != TRPM_INVALID_HANDLER)
- {
- /* Must check pending forced actions as our IDT or GDT might be out of sync. */
- rc = EMR3CheckRawForcedActions(pVM, pVCpu);
- AssertRCReturn(rc, rc);
-
- TRPMERRORCODE enmError = uErrorCode != ~0U
- ? TRPM_TRAP_HAS_ERRORCODE
- : TRPM_TRAP_NO_ERRORCODE;
- rc = TRPMForwardTrap(pVCpu, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), u8TrapNo, uErrorCode, enmError, TRPM_TRAP, -1);
- if (rc == VINF_SUCCESS /* Don't use RT_SUCCESS */)
- {
- TRPMResetTrap(pVCpu);
- return VINF_EM_RESCHEDULE_RAW;
- }
- AssertMsg(rc == VINF_EM_RAW_GUEST_TRAP, ("%Rrc\n", rc));
- }
- }
-
- /*
- * Scan kernel code that traps; we might not get another chance.
- */
- /** @todo move this up before the dispatching? */
- if ( (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) <= 1
- && !pVCpu->cpum.GstCtx.eflags.Bits.u1VM)
- {
- Assert(!PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip));
- CSAMR3CheckCodeEx(pVM, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.eip);
- }
-
- /*
- * Trap specific handling.
- */
- if (u8TrapNo == 6) /* (#UD) Invalid opcode. */
- {
- /*
- * If MONITOR & MWAIT are supported, then interpret them here.
- */
- DISCPUSTATE cpu;
- rc = CPUMR3DisasmInstrCPU(pVM, pVCpu, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.rip, &cpu, "Guest Trap (#UD): ");
- if ( RT_SUCCESS(rc)
- && (cpu.pCurInstr->uOpcode == OP_MONITOR || cpu.pCurInstr->uOpcode == OP_MWAIT))
- {
- uint32_t u32Dummy, u32Features, u32ExtFeatures;
- CPUMGetGuestCpuId(pVCpu, 1, 0, &u32Dummy, &u32Dummy, &u32ExtFeatures, &u32Features);
- if (u32ExtFeatures & X86_CPUID_FEATURE_ECX_MONITOR)
- {
- rc = TRPMResetTrap(pVCpu);
- AssertRC(rc);
-
- rc = VBOXSTRICTRC_TODO(EMInterpretInstructionDisasState(pVCpu, &cpu, CPUMCTX2CORE(&pVCpu->cpum.GstCtx),
- 0, EMCODETYPE_SUPERVISOR));
- if (RT_SUCCESS(rc))
- return rc;
- return emR3RawExecuteInstruction(pVM, pVCpu, "Monitor: ");
- }
- }
- }
- else if (u8TrapNo == 13) /* (#GP) Privileged exception */
- {
- /*
- * Handle I/O bitmap?
- */
- /** @todo We're not supposed to be here with a false guest trap concerning
- * I/O access. We can easily handle those in RC. */
- DISCPUSTATE cpu;
- rc = CPUMR3DisasmInstrCPU(pVM, pVCpu, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.rip, &cpu, "Guest Trap: ");
- if ( RT_SUCCESS(rc)
- && (cpu.pCurInstr->fOpType & DISOPTYPE_PORTIO))
- {
- /*
- * We should really check the TSS for the IO bitmap, but it's not like this
- * lazy approach really makes things worse.
- */
- rc = TRPMResetTrap(pVCpu);
- AssertRC(rc);
- return emR3RawExecuteInstruction(pVM, pVCpu, "IO Guest Trap: ");
- }
- }
-
-#ifdef LOG_ENABLED
- DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", "Guest trap");
- DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "Guest trap");
-
- /* Get guest page information. */
- uint64_t fFlags = 0;
- RTGCPHYS GCPhys = 0;
- int rc2 = PGMGstGetPage(pVCpu, uCR2, &fFlags, &GCPhys);
- Log(("emR3RawGuestTrap: cs:eip=%04x:%08x: trap=%02x err=%08x cr2=%08x cr0=%08x%s: Phys=%RGp fFlags=%08llx %s %s %s%s rc2=%d\n",
- pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, u8TrapNo, uErrorCode, uCR2, (uint32_t)pVCpu->cpum.GstCtx.cr0,
- (enmType == TRPM_SOFTWARE_INT) ? " software" : "", GCPhys, fFlags,
- fFlags & X86_PTE_P ? "P " : "NP", fFlags & X86_PTE_US ? "U" : "S",
- fFlags & X86_PTE_RW ? "RW" : "R0", fFlags & X86_PTE_G ? " G" : "", rc2));
-#endif
-
- /*
- * #PG has CR2.
- * (Because of stuff like above we must set CR2 in a delayed fashion.)
- */
- if (u8TrapNo == 14 /* #PG */)
- pVCpu->cpum.GstCtx.cr2 = uCR2;
-
- return VINF_EM_RESCHEDULE_REM;
-}
-
-
-/**
- * Handle a ring switch trap.
- * Need to do statistics and to install patches. The result is going to REM.
- *
- * @returns VBox status code suitable for EM.
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- */
-static int emR3RawRingSwitch(PVM pVM, PVMCPU pVCpu)
-{
- int rc;
- DISCPUSTATE Cpu;
-
- /*
- * sysenter, syscall & callgate
- */
- rc = CPUMR3DisasmInstrCPU(pVM, pVCpu, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.rip, &Cpu, "RSWITCH: ");
- if (RT_SUCCESS(rc))
- {
- if (Cpu.pCurInstr->uOpcode == OP_SYSENTER)
- {
- if (pVCpu->cpum.GstCtx.SysEnter.cs != 0)
- {
- rc = PATMR3InstallPatch(pVM, SELMToFlat(pVM, DISSELREG_CS, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), pVCpu->cpum.GstCtx.eip),
- CPUMGetGuestCodeBits(pVCpu) == 32 ? PATMFL_CODE32 : 0);
- if (RT_SUCCESS(rc))
- {
- DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "Patched sysenter instruction");
- return VINF_EM_RESCHEDULE_RAW;
- }
- }
- }
-
-#ifdef VBOX_WITH_STATISTICS
- switch (Cpu.pCurInstr->uOpcode)
- {
- case OP_SYSENTER:
- STAM_COUNTER_INC(&pVCpu->em.s.CTX_SUFF(pStats)->StatSysEnter);
- break;
- case OP_SYSEXIT:
- STAM_COUNTER_INC(&pVCpu->em.s.CTX_SUFF(pStats)->StatSysExit);
- break;
- case OP_SYSCALL:
- STAM_COUNTER_INC(&pVCpu->em.s.CTX_SUFF(pStats)->StatSysCall);
- break;
- case OP_SYSRET:
- STAM_COUNTER_INC(&pVCpu->em.s.CTX_SUFF(pStats)->StatSysRet);
- break;
- }
-#endif
- }
- else
- AssertRC(rc);
-
- /* go to the REM to emulate a single instruction */
- return emR3RawExecuteInstruction(pVM, pVCpu, "RSWITCH: ");
-}
-
-
-/**
- * Handle a trap (\#PF or \#GP) in patch code
- *
- * @returns VBox status code suitable for EM.
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- * @param gcret GC return code.
- */
-static int emR3RawPatchTrap(PVM pVM, PVMCPU pVCpu, int gcret)
-{
- uint8_t u8TrapNo;
- int rc;
- TRPMEVENT enmType;
- RTGCUINT uErrorCode;
- RTGCUINTPTR uCR2;
-
- Assert(PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip));
-
- if (gcret == VINF_PATM_PATCH_INT3)
- {
- u8TrapNo = 3;
- uCR2 = 0;
- uErrorCode = 0;
- }
- else if (gcret == VINF_PATM_PATCH_TRAP_GP)
- {
- /* No active trap in this case. Kind of ugly. */
- u8TrapNo = X86_XCPT_GP;
- uCR2 = 0;
- uErrorCode = 0;
- }
- else
- {
- rc = TRPMQueryTrapAll(pVCpu, &u8TrapNo, &enmType, &uErrorCode, &uCR2, NULL /* pu8InstrLen */);
- if (RT_FAILURE(rc))
- {
- AssertReleaseMsgFailed(("emR3RawPatchTrap: no trap! (rc=%Rrc) gcret=%Rrc\n", rc, gcret));
- return rc;
- }
- /* Reset the trap as we'll execute the original instruction again. */
- TRPMResetTrap(pVCpu);
- }
-
- /*
- * Deal with traps inside patch code.
- * (This code won't run outside GC.)
- */
- if (u8TrapNo != 1)
- {
-#ifdef LOG_ENABLED
- DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", "Trap in patch code");
- DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "Patch code");
-
- DISCPUSTATE Cpu;
- rc = CPUMR3DisasmInstrCPU(pVM, pVCpu, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.eip, &Cpu, "Patch code: ");
- if ( RT_SUCCESS(rc)
- && Cpu.pCurInstr->uOpcode == OP_IRET)
- {
- uint32_t eip, selCS, uEFlags;
-
- /* Iret crashes are bad as we have already changed the flags on the stack */
- rc = PGMPhysSimpleReadGCPtr(pVCpu, &eip, pVCpu->cpum.GstCtx.esp, 4);
- rc |= PGMPhysSimpleReadGCPtr(pVCpu, &selCS, pVCpu->cpum.GstCtx.esp+4, 4);
- rc |= PGMPhysSimpleReadGCPtr(pVCpu, &uEFlags, pVCpu->cpum.GstCtx.esp+8, 4);
- if (rc == VINF_SUCCESS)
- {
- if ( (uEFlags & X86_EFL_VM)
- || (selCS & X86_SEL_RPL) == 3)
- {
- uint32_t selSS, esp;
-
- rc |= PGMPhysSimpleReadGCPtr(pVCpu, &esp, pVCpu->cpum.GstCtx.esp + 12, 4);
- rc |= PGMPhysSimpleReadGCPtr(pVCpu, &selSS, pVCpu->cpum.GstCtx.esp + 16, 4);
-
- if (uEFlags & X86_EFL_VM)
- {
- uint32_t selDS, selES, selFS, selGS;
- rc = PGMPhysSimpleReadGCPtr(pVCpu, &selES, pVCpu->cpum.GstCtx.esp + 20, 4);
- rc |= PGMPhysSimpleReadGCPtr(pVCpu, &selDS, pVCpu->cpum.GstCtx.esp + 24, 4);
- rc |= PGMPhysSimpleReadGCPtr(pVCpu, &selFS, pVCpu->cpum.GstCtx.esp + 28, 4);
- rc |= PGMPhysSimpleReadGCPtr(pVCpu, &selGS, pVCpu->cpum.GstCtx.esp + 32, 4);
- if (rc == VINF_SUCCESS)
- {
- Log(("Patch code: IRET->VM stack frame: return address %04X:%08RX32 eflags=%08x ss:esp=%04X:%08RX32\n", selCS, eip, uEFlags, selSS, esp));
- Log(("Patch code: IRET->VM stack frame: DS=%04X ES=%04X FS=%04X GS=%04X\n", selDS, selES, selFS, selGS));
- }
- }
- else
- Log(("Patch code: IRET stack frame: return address %04X:%08RX32 eflags=%08x ss:esp=%04X:%08RX32\n", selCS, eip, uEFlags, selSS, esp));
- }
- else
- Log(("Patch code: IRET stack frame: return address %04X:%08RX32 eflags=%08x\n", selCS, eip, uEFlags));
- }
- }
-#endif /* LOG_ENABLED */
- Log(("emR3RawPatchTrap: in patch: eip=%08x: trap=%02x err=%08x cr2=%08x cr0=%08x\n",
- pVCpu->cpum.GstCtx.eip, u8TrapNo, uErrorCode, uCR2, (uint32_t)pVCpu->cpum.GstCtx.cr0));
-
- RTGCPTR uNewEip;
- rc = PATMR3HandleTrap(pVM, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.eip, &uNewEip);
- switch (rc)
- {
- /*
- * Execute the faulting instruction.
- */
- case VINF_SUCCESS:
- {
- /** @todo execute a whole block */
- Log(("emR3RawPatchTrap: Executing faulting instruction at new address %RGv\n", uNewEip));
- if (!(pVCpu->em.s.pPatmGCState->uVMFlags & X86_EFL_IF))
- Log(("emR3RawPatchTrap: Virtual IF flag disabled!!\n"));
-
- pVCpu->cpum.GstCtx.eip = uNewEip;
- AssertRelease(pVCpu->cpum.GstCtx.eip);
-
- if (pVCpu->cpum.GstCtx.eflags.Bits.u1IF)
- {
- /* Windows XP lets irets fault intentionally and then takes action based on the opcode; an
- * int3 patch overwrites it and leads to blue screens. Remove the patch in this case.
- */
- if ( u8TrapNo == X86_XCPT_GP
- && PATMIsInt3Patch(pVM, pVCpu->cpum.GstCtx.eip, NULL, NULL))
- {
- /** @todo move to PATMR3HandleTrap */
- Log(("Possible Windows XP iret fault at %08RX32\n", pVCpu->cpum.GstCtx.eip));
- PATMR3RemovePatch(pVM, pVCpu->cpum.GstCtx.eip);
- }
-
- /** @todo Knoppix 5 regression when returning VINF_SUCCESS here and going back to raw mode. */
- /* Note: possibly because a reschedule is required (e.g. iret to V86 code) */
-
- return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHIR");
- /* Interrupts are enabled; just go back to the original instruction.
- return VINF_SUCCESS; */
- }
- return VINF_EM_RESCHEDULE_REM;
- }
-
- /*
- * One instruction.
- */
- case VINF_PATCH_EMULATE_INSTR:
- Log(("emR3RawPatchTrap: Emulate patched instruction at %RGv IF=%d VMIF=%x\n",
- uNewEip, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pVCpu->em.s.pPatmGCState->uVMFlags));
- pVCpu->cpum.GstCtx.eip = uNewEip;
- AssertRelease(pVCpu->cpum.GstCtx.eip);
- return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHEMUL: ");
-
- /*
- * The patch was disabled, hand it to the REM.
- */
- case VERR_PATCH_DISABLED:
- if (!(pVCpu->em.s.pPatmGCState->uVMFlags & X86_EFL_IF))
- Log(("emR3RawPatchTrap: Virtual IF flag disabled!!\n"));
- pVCpu->cpum.GstCtx.eip = uNewEip;
- AssertRelease(pVCpu->cpum.GstCtx.eip);
-
- if (pVCpu->cpum.GstCtx.eflags.Bits.u1IF)
- {
- /*
- * The last instruction in the patch block needs to be executed!! (sti/sysexit for example)
- */
- Log(("PATCH: IF=1 -> emulate last instruction as it can't be interrupted!!\n"));
- return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHIR");
- }
- return VINF_EM_RESCHEDULE_REM;
-
- /* Force continued patch exection; usually due to write monitored stack. */
- case VINF_PATCH_CONTINUE:
- return VINF_SUCCESS;
-
- /*
- * Anything else is *fatal*.
- */
- default:
- AssertReleaseMsgFailed(("Unknown return code %Rrc from PATMR3HandleTrap!\n", rc));
- return VERR_IPE_UNEXPECTED_STATUS;
- }
- }
- return VINF_SUCCESS;
-}
-
-
-/**
- * Handle a privileged instruction.
- *
- * @returns VBox status code suitable for EM.
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- */
-static int emR3RawPrivileged(PVM pVM, PVMCPU pVCpu)
-{
- Assert(!pVCpu->cpum.GstCtx.eflags.Bits.u1VM);
-
- if (PATMIsEnabled(pVM))
- {
- /*
- * Check if in patch code.
- */
- if (PATMR3IsInsidePatchJump(pVM, pVCpu->cpum.GstCtx.eip, NULL))
- {
-#ifdef LOG_ENABLED
- DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", "PRIV");
-#endif
- AssertMsgFailed(("FATAL ERROR: executing random instruction inside generated patch jump %08x\n", pVCpu->cpum.GstCtx.eip));
- return VERR_EM_RAW_PATCH_CONFLICT;
- }
- if ( (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 0
- && !pVCpu->cpum.GstCtx.eflags.Bits.u1VM
- && !PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip))
- {
- int rc = PATMR3InstallPatch(pVM, SELMToFlat(pVM, DISSELREG_CS, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), pVCpu->cpum.GstCtx.eip),
- CPUMGetGuestCodeBits(pVCpu) == 32 ? PATMFL_CODE32 : 0);
- if (RT_SUCCESS(rc))
- {
-#ifdef LOG_ENABLED
- DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", "PRIV");
-#endif
- DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "Patched privileged instruction");
- return VINF_SUCCESS;
- }
- }
- }
-
-#ifdef LOG_ENABLED
- if (!PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip))
- {
- DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", "PRIV");
- DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "Privileged instr");
- }
-#endif
-
- /*
- * Instruction statistics and logging.
- */
- DISCPUSTATE Cpu;
- int rc;
-
- rc = CPUMR3DisasmInstrCPU(pVM, pVCpu, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.rip, &Cpu, "PRIV: ");
- if (RT_SUCCESS(rc))
- {
-#ifdef VBOX_WITH_STATISTICS
- PEMSTATS pStats = pVCpu->em.s.CTX_SUFF(pStats);
- switch (Cpu.pCurInstr->uOpcode)
- {
- case OP_INVLPG:
- STAM_COUNTER_INC(&pStats->StatInvlpg);
- break;
- case OP_IRET:
- STAM_COUNTER_INC(&pStats->StatIret);
- break;
- case OP_CLI:
- STAM_COUNTER_INC(&pStats->StatCli);
- emR3RecordCli(pVM, pVCpu, pVCpu->cpum.GstCtx.rip);
- break;
- case OP_STI:
- STAM_COUNTER_INC(&pStats->StatSti);
- break;
- case OP_INSB:
- case OP_INSWD:
- case OP_IN:
- case OP_OUTSB:
- case OP_OUTSWD:
- case OP_OUT:
- AssertMsgFailed(("Unexpected privileged exception due to port IO\n"));
- break;
-
- case OP_MOV_CR:
- if (Cpu.Param1.fUse & DISUSE_REG_GEN32)
- {
- //read
- Assert(Cpu.Param2.fUse & DISUSE_REG_CR);
- Assert(Cpu.Param2.Base.idxCtrlReg <= DISCREG_CR4);
- STAM_COUNTER_INC(&pStats->StatMovReadCR[Cpu.Param2.Base.idxCtrlReg]);
- }
- else
- {
- //write
- Assert(Cpu.Param1.fUse & DISUSE_REG_CR);
- Assert(Cpu.Param1.Base.idxCtrlReg <= DISCREG_CR4);
- STAM_COUNTER_INC(&pStats->StatMovWriteCR[Cpu.Param1.Base.idxCtrlReg]);
- }
- break;
-
- case OP_MOV_DR:
- STAM_COUNTER_INC(&pStats->StatMovDRx);
- break;
- case OP_LLDT:
- STAM_COUNTER_INC(&pStats->StatMovLldt);
- break;
- case OP_LIDT:
- STAM_COUNTER_INC(&pStats->StatMovLidt);
- break;
- case OP_LGDT:
- STAM_COUNTER_INC(&pStats->StatMovLgdt);
- break;
- case OP_SYSENTER:
- STAM_COUNTER_INC(&pStats->StatSysEnter);
- break;
- case OP_SYSEXIT:
- STAM_COUNTER_INC(&pStats->StatSysExit);
- break;
- case OP_SYSCALL:
- STAM_COUNTER_INC(&pStats->StatSysCall);
- break;
- case OP_SYSRET:
- STAM_COUNTER_INC(&pStats->StatSysRet);
- break;
- case OP_HLT:
- STAM_COUNTER_INC(&pStats->StatHlt);
- break;
- default:
- STAM_COUNTER_INC(&pStats->StatMisc);
- Log4(("emR3RawPrivileged: opcode=%d\n", Cpu.pCurInstr->uOpcode));
- break;
- }
-#endif /* VBOX_WITH_STATISTICS */
- if ( (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 0
- && !pVCpu->cpum.GstCtx.eflags.Bits.u1VM
- && CPUMGetGuestCodeBits(pVCpu) == 32)
- {
- STAM_PROFILE_START(&pVCpu->em.s.StatPrivEmu, a);
- switch (Cpu.pCurInstr->uOpcode)
- {
- case OP_CLI:
- pVCpu->cpum.GstCtx.eflags.u32 &= ~X86_EFL_IF;
- Assert(Cpu.cbInstr == 1);
- pVCpu->cpum.GstCtx.rip += Cpu.cbInstr;
- STAM_PROFILE_STOP(&pVCpu->em.s.StatPrivEmu, a);
- return VINF_EM_RESCHEDULE_REM; /* must go to the recompiler now! */
-
- case OP_STI:
- pVCpu->cpum.GstCtx.eflags.u32 |= X86_EFL_IF;
- EMSetInhibitInterruptsPC(pVCpu, pVCpu->cpum.GstCtx.rip + Cpu.cbInstr);
- Assert(Cpu.cbInstr == 1);
- pVCpu->cpum.GstCtx.rip += Cpu.cbInstr;
- STAM_PROFILE_STOP(&pVCpu->em.s.StatPrivEmu, a);
- return VINF_SUCCESS;
-
- case OP_HLT:
- if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip))
- {
- PATMTRANSSTATE enmState;
- RTGCPTR pOrgInstrGC = PATMR3PatchToGCPtr(pVM, pVCpu->cpum.GstCtx.eip, &enmState);
-
- if (enmState == PATMTRANS_OVERWRITTEN)
- {
- rc = PATMR3DetectConflict(pVM, pOrgInstrGC, pOrgInstrGC);
- Assert(rc == VERR_PATCH_DISABLED);
- /* Conflict detected, patch disabled */
- Log(("emR3RawPrivileged: detected conflict -> disabled patch at %08RX32\n", pVCpu->cpum.GstCtx.eip));
-
- enmState = PATMTRANS_SAFE;
- }
-
- /* The translation had better be successful. Otherwise we can't recover. */
- AssertReleaseMsg(pOrgInstrGC && enmState != PATMTRANS_OVERWRITTEN, ("Unable to translate instruction address at %08RX32\n", pVCpu->cpum.GstCtx.eip));
- if (enmState != PATMTRANS_OVERWRITTEN)
- pVCpu->cpum.GstCtx.eip = pOrgInstrGC;
- }
- /* no break; we could just return VINF_EM_HALT here */
- RT_FALL_THRU();
-
- case OP_MOV_CR:
- case OP_MOV_DR:
-#ifdef LOG_ENABLED
- if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip))
- {
- DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", "PRIV");
- DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "Privileged instr");
- }
-#endif
-
- rc = VBOXSTRICTRC_TODO(EMInterpretInstructionDisasState(pVCpu, &Cpu, CPUMCTX2CORE(&pVCpu->cpum.GstCtx),
- 0, EMCODETYPE_SUPERVISOR));
- if (RT_SUCCESS(rc))
- {
- STAM_PROFILE_STOP(&pVCpu->em.s.StatPrivEmu, a);
-
- if ( Cpu.pCurInstr->uOpcode == OP_MOV_CR
- && Cpu.Param1.fUse == DISUSE_REG_CR /* write */
- )
- {
- /* Deal with CR0 updates inside patch code that force
- * us to go to the recompiler.
- */
- if ( PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.rip)
- && (pVCpu->cpum.GstCtx.cr0 & (X86_CR0_WP|X86_CR0_PG|X86_CR0_PE)) != (X86_CR0_WP|X86_CR0_PG|X86_CR0_PE))
- {
- PATMTRANSSTATE enmState;
- RTGCPTR pOrgInstrGC = PATMR3PatchToGCPtr(pVM, pVCpu->cpum.GstCtx.rip, &enmState);
-
- Log(("Force recompiler switch due to cr0 (%RGp) update rip=%RGv -> %RGv (enmState=%d)\n", pVCpu->cpum.GstCtx.cr0, pVCpu->cpum.GstCtx.rip, pOrgInstrGC, enmState));
- if (enmState == PATMTRANS_OVERWRITTEN)
- {
- rc = PATMR3DetectConflict(pVM, pOrgInstrGC, pOrgInstrGC);
- Assert(rc == VERR_PATCH_DISABLED);
- /* Conflict detected, patch disabled */
- Log(("emR3RawPrivileged: detected conflict -> disabled patch at %RGv\n", (RTGCPTR)pVCpu->cpum.GstCtx.rip));
- enmState = PATMTRANS_SAFE;
- }
- /* The translation had better be successful. Otherwise we can't recover. */
- AssertReleaseMsg(pOrgInstrGC && enmState != PATMTRANS_OVERWRITTEN, ("Unable to translate instruction address at %RGv\n", (RTGCPTR)pVCpu->cpum.GstCtx.rip));
- if (enmState != PATMTRANS_OVERWRITTEN)
- pVCpu->cpum.GstCtx.rip = pOrgInstrGC;
- }
-
- /* Reschedule is necessary as the execution/paging mode might have changed. */
- return VINF_EM_RESCHEDULE;
- }
- return rc; /* can return VINF_EM_HALT as well. */
- }
- AssertMsgReturn(rc == VERR_EM_INTERPRETER, ("%Rrc\n", rc), rc);
- break; /* fall back to the recompiler */
- }
- STAM_PROFILE_STOP(&pVCpu->em.s.StatPrivEmu, a);
- }
- }
-
- if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip))
- return emR3RawPatchTrap(pVM, pVCpu, VINF_PATM_PATCH_TRAP_GP);
-
- return emR3RawExecuteInstruction(pVM, pVCpu, "PRIV");
-}
-
-
-/**
- * Update the forced rawmode execution modifier.
- *
- * This function is called when we're returning from the raw-mode loop(s). If we're
- * in patch code, it will set a flag forcing execution to be resumed in raw-mode,
- * if not in patch code, the flag will be cleared.
- *
- * We should never interrupt patch code while it's being executed. Cli patches can
- * contain big code blocks, but they are always executed with IF=0. Other patches
- * replace single instructions and should be atomic.
- *
- * @returns Updated rc.
- *
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- * @param rc The result code.
- */
-static int emR3RawUpdateForceFlag(PVM pVM, PVMCPU pVCpu, int rc)
-{
- if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip)) /** @todo check cs selector base/type */
- {
- /* ignore reschedule attempts. */
- switch (rc)
- {
- case VINF_EM_RESCHEDULE:
- case VINF_EM_RESCHEDULE_REM:
- LogFlow(("emR3RawUpdateForceFlag: patch address -> force raw reschedule\n"));
- rc = VINF_SUCCESS;
- break;
- }
- pVCpu->em.s.fForceRAW = true;
- }
- else
- pVCpu->em.s.fForceRAW = false;
- return rc;
-}
-
-
-/**
- * Check for pending raw actions
- *
- * @returns VBox status code. May return VINF_EM_NO_MEMORY but none of the other
- * EM statuses.
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- */
-VMMR3_INT_DECL(int) EMR3CheckRawForcedActions(PVM pVM, PVMCPU pVCpu)
-{
- int rc = emR3RawForcedActions(pVM, pVCpu);
- VBOXVMM_EM_FF_RAW_RET(pVCpu, rc);
- return rc;
-}
-
-
-/**
- * Process raw-mode specific forced actions.
- *
- * This function is called when any FFs in the VM_FF_HIGH_PRIORITY_PRE_RAW_MASK is pending.
- *
- * @returns VBox status code. May return VINF_EM_NO_MEMORY but none of the other
- * EM statuses.
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- */
-static int emR3RawForcedActions(PVM pVM, PVMCPU pVCpu)
-{
- /*
- * Note that the order is *vitally* important!
- * Also note that SELMR3UpdateFromCPUM may trigger VM_FF_SELM_SYNC_TSS.
- */
- VBOXVMM_EM_FF_RAW(pVCpu, pVM->fGlobalForcedActions, pVCpu->fLocalForcedActions);
-
- /*
- * Sync selector tables.
- */
- if (VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_GDT | VMCPU_FF_SELM_SYNC_LDT))
- {
- VBOXSTRICTRC rcStrict = SELMR3UpdateFromCPUM(pVM, pVCpu);
- if (rcStrict != VINF_SUCCESS)
- return VBOXSTRICTRC_TODO(rcStrict);
- }
-
- /*
- * Sync IDT.
- *
- * The CSAMR3CheckGates call in TRPMR3SyncIDT may call PGMPrefetchPage
- * and PGMShwModifyPage, so we're in for trouble if for instance a
- * PGMSyncCR3+pgmR3PoolClearAll is pending.
- */
- if (VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_TRPM_SYNC_IDT))
- {
- if ( VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3)
- && EMIsRawRing0Enabled(pVM)
- && CSAMIsEnabled(pVM))
- {
- int rc = PGMSyncCR3(pVCpu, pVCpu->cpum.GstCtx.cr0, pVCpu->cpum.GstCtx.cr3, pVCpu->cpum.GstCtx.cr4, VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3));
- if (RT_FAILURE(rc))
- return rc;
- }
-
- int rc = TRPMR3SyncIDT(pVM, pVCpu);
- if (RT_FAILURE(rc))
- return rc;
- }
-
- /*
- * Sync TSS.
- */
- if (VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_SELM_SYNC_TSS))
- {
- int rc = SELMR3SyncTSS(pVM, pVCpu);
- if (RT_FAILURE(rc))
- return rc;
- }
-
- /*
- * Sync page directory.
- */
- if (VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3 | VMCPU_FF_PGM_SYNC_CR3_NON_GLOBAL))
- {
- Assert(pVCpu->em.s.enmState != EMSTATE_WAIT_SIPI);
- int rc = PGMSyncCR3(pVCpu, pVCpu->cpum.GstCtx.cr0, pVCpu->cpum.GstCtx.cr3, pVCpu->cpum.GstCtx.cr4, VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3));
- if (RT_FAILURE(rc))
- return rc == VERR_PGM_NO_HYPERVISOR_ADDRESS ? VINF_EM_RESCHEDULE_REM : rc;
-
- Assert(!VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_GDT | VMCPU_FF_SELM_SYNC_LDT));
-
- /* Prefetch pages for EIP and ESP. */
- /** @todo This is rather expensive. Should investigate if it really helps at all. */
- rc = PGMPrefetchPage(pVCpu, SELMToFlat(pVM, DISSELREG_CS, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), pVCpu->cpum.GstCtx.rip));
- if (rc == VINF_SUCCESS)
- rc = PGMPrefetchPage(pVCpu, SELMToFlat(pVM, DISSELREG_SS, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), pVCpu->cpum.GstCtx.rsp));
- if (rc != VINF_SUCCESS)
- {
- if (rc != VINF_PGM_SYNC_CR3)
- {
- AssertLogRelMsgReturn(RT_FAILURE(rc), ("%Rrc\n", rc), VERR_IPE_UNEXPECTED_INFO_STATUS);
- return rc;
- }
- rc = PGMSyncCR3(pVCpu, pVCpu->cpum.GstCtx.cr0, pVCpu->cpum.GstCtx.cr3, pVCpu->cpum.GstCtx.cr4, VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3));
- if (RT_FAILURE(rc))
- return rc;
- }
- /** @todo maybe prefetch the supervisor stack page as well */
- Assert(!VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_GDT | VMCPU_FF_SELM_SYNC_LDT));
- }
-
- /*
- * Allocate handy pages (just in case the above actions have consumed some pages).
- */
- if (VM_FF_IS_PENDING_EXCEPT(pVM, VM_FF_PGM_NEED_HANDY_PAGES, VM_FF_PGM_NO_MEMORY))
- {
- int rc = PGMR3PhysAllocateHandyPages(pVM);
- if (RT_FAILURE(rc))
- return rc;
- }
-
- /*
- * Check whether we're out of memory now.
- *
- * This may stem from some of the above actions or operations that has been executed
- * since we ran FFs. The allocate handy pages must for instance always be followed by
- * this check.
- */
- if (VM_FF_IS_SET(pVM, VM_FF_PGM_NO_MEMORY))
- return VINF_EM_NO_MEMORY;
-
- return VINF_SUCCESS;
-}
-
-
-/**
- * Executes raw code.
- *
- * This function contains the raw-mode version of the inner
- * execution loop (the outer loop being in EMR3ExecuteVM()).
- *
- * @returns VBox status code. The most important ones are: VINF_EM_RESCHEDULE,
- * VINF_EM_RESCHEDULE_REM, VINF_EM_SUSPEND, VINF_EM_RESET and VINF_EM_TERMINATE.
- *
- * @param pVM The cross context VM structure.
- * @param pVCpu The cross context virtual CPU structure.
- * @param pfFFDone Where to store an indicator telling whether or not
- * FFs were done before returning.
- */
-int emR3RawExecute(PVM pVM, PVMCPU pVCpu, bool *pfFFDone)
-{
- STAM_REL_PROFILE_ADV_START(&pVCpu->em.s.StatRAWTotal, a);
-
- int rc = VERR_IPE_UNINITIALIZED_STATUS;
- LogFlow(("emR3RawExecute: (cs:eip=%04x:%08x)\n", pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip));
- pVCpu->em.s.fForceRAW = false;
- *pfFFDone = false;
-
-
- /*
- *
- * Spin till we get a forced action or raw mode status code resulting in
- * in anything but VINF_SUCCESS or VINF_EM_RESCHEDULE_RAW.
- *
- */
- for (;;)
- {
- STAM_PROFILE_ADV_START(&pVCpu->em.s.StatRAWEntry, b);
-
- /*
- * Check various preconditions.
- */
-#ifdef VBOX_STRICT
- Assert(pVCpu->cpum.GstCtx.eflags.Bits.u1VM || (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 3 || (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 0
- || (EMIsRawRing1Enabled(pVM) && (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 1));
- AssertMsg( (pVCpu->cpum.GstCtx.eflags.u32 & X86_EFL_IF)
- || PATMShouldUseRawMode(pVM, (RTGCPTR)pVCpu->cpum.GstCtx.eip),
- ("Tried to execute code with IF at EIP=%08x!\n", pVCpu->cpum.GstCtx.eip));
- if ( !VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3 | VMCPU_FF_PGM_SYNC_CR3_NON_GLOBAL)
- && PGMMapHasConflicts(pVM))
- {
- PGMMapCheck(pVM);
- AssertMsgFailed(("We should not get conflicts any longer!!!\n"));
- return VERR_EM_UNEXPECTED_MAPPING_CONFLICT;
- }
-#endif /* VBOX_STRICT */
-
- /*
- * Process high priority pre-execution raw-mode FFs.
- */
- if ( VM_FF_IS_ANY_SET(pVM, VM_FF_HIGH_PRIORITY_PRE_RAW_MASK)
- || VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_HIGH_PRIORITY_PRE_RAW_MASK))
- {
- rc = emR3RawForcedActions(pVM, pVCpu);
- VBOXVMM_EM_FF_RAW_RET(pVCpu, rc);
- if (rc != VINF_SUCCESS)
- break;
- }
-
- /*
- * If we're going to execute ring-0 code, the guest state needs to
- * be modified a bit and some of the state components (IF, SS/CS RPL,
- * and perhaps EIP) needs to be stored with PATM.
- */
- rc = CPUMRawEnter(pVCpu);
- if (rc != VINF_SUCCESS)
- {
- STAM_PROFILE_ADV_STOP(&pVCpu->em.s.StatRAWEntry, b);
- break;
- }
-
- /*
- * Scan code before executing it. Don't bother with user mode or V86 code
- */
- if ( (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) <= 1
- && !pVCpu->cpum.GstCtx.eflags.Bits.u1VM
- && !PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip))
- {
- STAM_PROFILE_ADV_SUSPEND(&pVCpu->em.s.StatRAWEntry, b);
- CSAMR3CheckCodeEx(pVM, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.eip);
- STAM_PROFILE_ADV_RESUME(&pVCpu->em.s.StatRAWEntry, b);
- if ( VM_FF_IS_ANY_SET(pVM, VM_FF_HIGH_PRIORITY_PRE_RAW_MASK)
- || VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_HIGH_PRIORITY_PRE_RAW_MASK))
- {
- rc = emR3RawForcedActions(pVM, pVCpu);
- VBOXVMM_EM_FF_RAW_RET(pVCpu, rc);
- if (rc != VINF_SUCCESS)
- {
- rc = CPUMRawLeave(pVCpu, rc);
- break;
- }
- }
- }
-
-#ifdef LOG_ENABLED
- /*
- * Log important stuff before entering GC.
- */
- PPATMGCSTATE pGCState = PATMR3QueryGCStateHC(pVM);
- if (pVCpu->cpum.GstCtx.eflags.Bits.u1VM)
- Log(("RV86: %04x:%08x IF=%d VMFlags=%x\n", pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pGCState->uVMFlags));
- else if ((pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 1)
- Log(("RR0: %x:%08x ESP=%x:%08x EFL=%x IF=%d/%d VMFlags=%x PIF=%d CPL=%d (Scanned=%d)\n",
- pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.ss.Sel, pVCpu->cpum.GstCtx.esp, CPUMRawGetEFlags(pVCpu), !!(pGCState->uVMFlags & X86_EFL_IF), pVCpu->cpum.GstCtx.eflags.Bits.u1IF,
- pGCState->uVMFlags, pGCState->fPIF, (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL), CSAMIsPageScanned(pVM, (RTGCPTR)pVCpu->cpum.GstCtx.eip)));
-# ifdef VBOX_WITH_RAW_RING1
- else if ((pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 2)
- Log(("RR1: %x:%08x ESP=%x:%08x IF=%d VMFlags=%x CPL=%x\n", pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.ss.Sel, pVCpu->cpum.GstCtx.esp, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pGCState->uVMFlags, (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL)));
-# endif
- else if ((pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 3)
- Log(("RR3: %x:%08x ESP=%x:%08x IF=%d VMFlags=%x\n", pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.ss.Sel, pVCpu->cpum.GstCtx.esp, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pGCState->uVMFlags));
-#endif /* LOG_ENABLED */
-
-
-
- /*
- * Execute the code.
- */
- STAM_PROFILE_ADV_STOP(&pVCpu->em.s.StatRAWEntry, b);
- if (RT_LIKELY(emR3IsExecutionAllowed(pVM, pVCpu)))
- {
- STAM_PROFILE_START(&pVCpu->em.s.StatRAWExec, c);
- VBOXVMM_EM_RAW_RUN_PRE(pVCpu, &pVCpu->cpum.GstCtx);
- rc = VMMR3RawRunGC(pVM, pVCpu);
- VBOXVMM_EM_RAW_RUN_RET(pVCpu, &pVCpu->cpum.GstCtx, rc);
- STAM_PROFILE_STOP(&pVCpu->em.s.StatRAWExec, c);
- }
- else
- {
- /* Give up this time slice; virtual time continues */
- STAM_REL_PROFILE_ADV_START(&pVCpu->em.s.StatCapped, u);
- RTThreadSleep(5);
- STAM_REL_PROFILE_ADV_STOP(&pVCpu->em.s.StatCapped, u);
- rc = VINF_SUCCESS;
- }
- STAM_PROFILE_ADV_START(&pVCpu->em.s.StatRAWTail, d);
-
- LogFlow(("RR%u-E: %08x ESP=%08x EFL=%x IF=%d/%d VMFlags=%x PIF=%d\n",
- (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL), pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.esp, CPUMRawGetEFlags(pVCpu),
- !!(pGCState->uVMFlags & X86_EFL_IF), pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pGCState->uVMFlags, pGCState->fPIF));
- LogFlow(("VMMR3RawRunGC returned %Rrc\n", rc));
-
-
-
- /*
- * Restore the real CPU state and deal with high priority post
- * execution FFs before doing anything else.
- */
- rc = CPUMRawLeave(pVCpu, rc);
- VMCPU_FF_CLEAR_MASK(pVCpu, VMCPU_FF_RESUME_GUEST_MASK);
- if ( VM_FF_IS_ANY_SET(pVM, VM_FF_HIGH_PRIORITY_POST_MASK)
- || VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_HIGH_PRIORITY_POST_MASK))
- rc = VBOXSTRICTRC_TODO(emR3HighPriorityPostForcedActions(pVM, pVCpu, rc));
-
-#ifdef VBOX_STRICT
- /*
- * Assert TSS consistency & rc vs patch code.
- */
- if ( !VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_TSS | VMCPU_FF_SELM_SYNC_GDT) /* GDT implies TSS at the moment. */
- && EMIsRawRing0Enabled(pVM))
- SELMR3CheckTSS(pVM);
- switch (rc)
- {
- case VINF_SUCCESS:
- case VINF_EM_RAW_INTERRUPT:
- case VINF_PATM_PATCH_TRAP_PF:
- case VINF_PATM_PATCH_TRAP_GP:
- case VINF_PATM_PATCH_INT3:
- case VINF_PATM_CHECK_PATCH_PAGE:
- case VINF_EM_RAW_EXCEPTION_PRIVILEGED:
- case VINF_EM_RAW_GUEST_TRAP:
- case VINF_EM_RESCHEDULE_RAW:
- break;
-
- default:
- if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip) && !(pVCpu->cpum.GstCtx.eflags.u32 & X86_EFL_TF))
- LogIt(0, LOG_GROUP_PATM, ("Patch code interrupted at %RRv for reason %Rrc\n", (RTRCPTR)CPUMGetGuestEIP(pVCpu), rc));
- break;
- }
- /*
- * Let's go paranoid!
- */
- if ( !VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3 | VMCPU_FF_PGM_SYNC_CR3_NON_GLOBAL)
- && PGMMapHasConflicts(pVM))
- {
- PGMMapCheck(pVM);
- AssertMsgFailed(("We should not get conflicts any longer!!! rc=%Rrc\n", rc));
- return VERR_EM_UNEXPECTED_MAPPING_CONFLICT;
- }
-#endif /* VBOX_STRICT */
-
- /*
- * Process the returned status code.
- */
- if (rc >= VINF_EM_FIRST && rc <= VINF_EM_LAST)
- {
- STAM_PROFILE_ADV_STOP(&pVCpu->em.s.StatRAWTail, d);
- break;
- }
- rc = emR3RawHandleRC(pVM, pVCpu, rc);
- if (rc != VINF_SUCCESS)
- {
- rc = emR3RawUpdateForceFlag(pVM, pVCpu, rc);
- if (rc != VINF_SUCCESS)
- {
- STAM_PROFILE_ADV_STOP(&pVCpu->em.s.StatRAWTail, d);
- break;
- }
- }
-
- /*
- * Check and execute forced actions.
- */
-#ifdef VBOX_HIGH_RES_TIMERS_HACK
- TMTimerPollVoid(pVM, pVCpu);
-#endif
- STAM_PROFILE_ADV_STOP(&pVCpu->em.s.StatRAWTail, d);
- if ( VM_FF_IS_ANY_SET(pVM, ~VM_FF_HIGH_PRIORITY_PRE_RAW_MASK | VM_FF_PGM_NO_MEMORY)
- || VMCPU_FF_IS_ANY_SET(pVCpu, ~VMCPU_FF_HIGH_PRIORITY_PRE_RAW_MASK))
- {
- Assert(pVCpu->cpum.GstCtx.eflags.Bits.u1VM || (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) != (EMIsRawRing1Enabled(pVM) ? 2U : 1U));
-
- STAM_REL_PROFILE_ADV_SUSPEND(&pVCpu->em.s.StatRAWTotal, a);
- rc = emR3ForcedActions(pVM, pVCpu, rc);
- VBOXVMM_EM_FF_ALL_RET(pVCpu, rc);
- STAM_REL_PROFILE_ADV_RESUME(&pVCpu->em.s.StatRAWTotal, a);
- if ( rc != VINF_SUCCESS
- && rc != VINF_EM_RESCHEDULE_RAW)
- {
- rc = emR3RawUpdateForceFlag(pVM, pVCpu, rc);
- if (rc != VINF_SUCCESS)
- {
- *pfFFDone = true;
- break;
- }
- }
- }
- }
-
- /*
- * Return to outer loop.
- */
-#if defined(LOG_ENABLED) && defined(DEBUG)
- RTLogFlush(NULL);
-#endif
- STAM_REL_PROFILE_ADV_STOP(&pVCpu->em.s.StatRAWTotal, a);
- return rc;
-}
-
diff --git a/src/VBox/VMM/include/EMHandleRCTmpl.h b/src/VBox/VMM/include/EMHandleRCTmpl.h
index a181092b937..7fa0ad91d34 100644
--- a/src/VBox/VMM/include/EMHandleRCTmpl.h
+++ b/src/VBox/VMM/include/EMHandleRCTmpl.h
@@ -39,9 +39,7 @@
* @param pVCpu The cross context virtual CPU structure.
* @param rc The return code.
*/
-#ifdef EMHANDLERC_WITH_PATM
-int emR3RawHandleRC(PVM pVM, PVMCPU pVCpu, int rc)
-#elif defined(EMHANDLERC_WITH_HM) || defined(DOXYGEN_RUNNING)
+#if defined(EMHANDLERC_WITH_HM) || defined(DOXYGEN_RUNNING)
int emR3HmHandleRC(PVM pVM, PVMCPU pVCpu, int rc)
#elif defined(EMHANDLERC_WITH_NEM)
int emR3NemHandleRC(PVM pVM, PVMCPU pVCpu, int rc)
@@ -63,73 +61,6 @@ int emR3NemHandleRC(PVM pVM, PVMCPU pVCpu, int rc)
rc = VINF_SUCCESS;
break;
-#ifdef EMHANDLERC_WITH_PATM
- /*
- * Privileged instruction.
- */
- case VINF_EM_RAW_EXCEPTION_PRIVILEGED:
- case VINF_PATM_PATCH_TRAP_GP:
- rc = emR3RawPrivileged(pVM, pVCpu);
- break;
-
- case VINF_EM_RAW_GUEST_TRAP:
- /*
- * Got a trap which needs dispatching.
- */
- if (PATMR3IsInsidePatchJump(pVM, pVCpu->cpum.GstCtx.eip, NULL))
- {
- AssertReleaseMsgFailed(("FATAL ERROR: executing random instruction inside generated patch jump %08X\n", CPUMGetGuestEIP(pVCpu)));
- rc = VERR_EM_RAW_PATCH_CONFLICT;
- break;
- }
- rc = emR3RawGuestTrap(pVM, pVCpu);
- break;
-
- /*
- * Trap in patch code.
- */
- case VINF_PATM_PATCH_TRAP_PF:
- case VINF_PATM_PATCH_INT3:
- rc = emR3RawPatchTrap(pVM, pVCpu, rc);
- break;
-
- case VINF_PATM_DUPLICATE_FUNCTION:
- Assert(PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip));
- rc = PATMR3DuplicateFunctionRequest(pVM, &pVCpu->cpum.GstCtx);
- AssertRC(rc);
- rc = VINF_SUCCESS;
- break;
-
- case VINF_PATM_CHECK_PATCH_PAGE:
- rc = PATMR3HandleMonitoredPage(pVM);
- AssertRC(rc);
- rc = VINF_SUCCESS;
- break;
-
- /*
- * Patch manager.
- */
- case VERR_EM_RAW_PATCH_CONFLICT:
- AssertReleaseMsgFailed(("%Rrc handling is not yet implemented\n", rc));
- break;
-
- /*
- * Memory mapped I/O access - attempt to patch the instruction
- */
- case VINF_PATM_HC_MMIO_PATCH_READ:
- rc = PATMR3InstallPatch(pVM, SELMToFlat(pVM, DISSELREG_CS, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), pVCpu->cpum.GstCtx.eip),
- PATMFL_MMIO_ACCESS
- | (CPUMGetGuestCodeBits(pVCpu) == 32 ? PATMFL_CODE32 : 0));
- if (RT_FAILURE(rc))
- rc = emR3ExecuteInstruction(pVM, pVCpu, "MMIO");
- break;
-
- case VINF_PATM_HC_MMIO_PATCH_WRITE:
- AssertFailed(); /* not yet implemented. */
- rc = emR3ExecuteInstruction(pVM, pVCpu, "MMIO");
- break;
-#endif /* EMHANDLERC_WITH_PATM */
-
#ifndef EMHANDLERC_WITH_NEM
/*
* Conflict or out of page tables.
@@ -173,44 +104,6 @@ int emR3NemHandleRC(PVM pVM, PVMCPU pVCpu, int rc)
break;
#endif /* !EMHANDLERC_WITH_NEM */
-#ifdef EMHANDLERC_WITH_PATM
- /*
- * CSAM wants to perform a task in ring-3. It has set an FF action flag.
- */
- case VINF_CSAM_PENDING_ACTION:
- rc = VINF_SUCCESS;
- break;
-
- /*
- * Invoked Interrupt gate - must directly (!) go to the recompiler.
- */
- case VINF_EM_RAW_INTERRUPT_PENDING:
- case VINF_EM_RAW_RING_SWITCH_INT:
- Assert(TRPMHasTrap(pVCpu));
- Assert(!PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip));
-
- if (TRPMHasTrap(pVCpu))
- {
- /* If the guest gate is marked unpatched, then we will check again if we can patch it. */
- uint8_t u8Interrupt = TRPMGetTrapNo(pVCpu);
- if (TRPMR3GetGuestTrapHandler(pVM, u8Interrupt) == TRPM_INVALID_HANDLER)
- {
- CSAMR3CheckGates(pVM, u8Interrupt, 1);
- Log(("emR3RawHandleRC: recheck gate %x -> valid=%d\n", u8Interrupt, TRPMR3GetGuestTrapHandler(pVM, u8Interrupt) != TRPM_INVALID_HANDLER));
- /* Note: If it was successful, then we could go back to raw mode, but let's keep things simple for now. */
- }
- }
- rc = VINF_EM_RESCHEDULE_REM;
- break;
-
- /*
- * Other ring switch types.
- */
- case VINF_EM_RAW_RING_SWITCH:
- rc = emR3RawRingSwitch(pVM, pVCpu);
- break;
-#endif /* EMHANDLERC_WITH_PATM */
-
/*
* I/O Port access - emulate the instruction.
*/
@@ -260,31 +153,7 @@ int emR3NemHandleRC(PVM pVM, PVMCPU pVCpu, int rc)
break;
#endif
-#ifdef EMHANDLERC_WITH_PATM
- /*
- * Execute instruction.
- */
- case VINF_EM_RAW_EMULATE_INSTR_LDT_FAULT:
- rc = emR3ExecuteInstruction(pVM, pVCpu, "LDT FAULT: ");
- break;
- case VINF_EM_RAW_EMULATE_INSTR_GDT_FAULT:
- rc = emR3ExecuteInstruction(pVM, pVCpu, "GDT FAULT: ");
- break;
- case VINF_EM_RAW_EMULATE_INSTR_IDT_FAULT:
- rc = emR3ExecuteInstruction(pVM, pVCpu, "IDT FAULT: ");
- break;
- case VINF_EM_RAW_EMULATE_INSTR_TSS_FAULT:
- rc = emR3ExecuteInstruction(pVM, pVCpu, "TSS FAULT: ");
- break;
-
- case VINF_PATM_PENDING_IRQ_AFTER_IRET:
- rc = emR3ExecuteInstruction(pVM, pVCpu, "EMUL: ", VINF_PATM_PENDING_IRQ_AFTER_IRET);
- break;
-
- case VINF_PATCH_EMULATE_INSTR:
-#else
case VINF_EM_RAW_GUEST_TRAP:
-#endif
case VINF_EM_RAW_EMULATE_INSTR:
rc = emR3ExecuteInstruction(pVM, pVCpu, "EMUL: ");
break;
@@ -298,31 +167,6 @@ int emR3NemHandleRC(PVM pVM, PVMCPU pVCpu, int rc)
break;
-#ifdef EMHANDLERC_WITH_PATM
- /*
- * Stale selector and iret traps => REM.
- */
- case VINF_EM_RAW_STALE_SELECTOR:
- case VINF_EM_RAW_IRET_TRAP:
- /* We will not go to the recompiler if EIP points to patch code. */
- if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip))
- {
- pVCpu->cpum.GstCtx.eip = PATMR3PatchToGCPtr(pVM, (RTGCPTR)pVCpu->cpum.GstCtx.eip, 0);
- }
- LogFlow(("emR3RawHandleRC: %Rrc -> %Rrc\n", rc, VINF_EM_RESCHEDULE_REM));
- rc = VINF_EM_RESCHEDULE_REM;
- break;
-
- /*
- * Conflict in GDT, resync and continue.
- */
- case VINF_SELM_SYNC_GDT:
- AssertMsg(VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_GDT | VMCPU_FF_SELM_SYNC_LDT | VMCPU_FF_SELM_SYNC_TSS),
- ("VINF_SELM_SYNC_GDT without VMCPU_FF_SELM_SYNC_GDT/LDT/TSS!\n"));
- rc = VINF_SUCCESS;
- break;
-#endif
-
/*
* Up a level.
*/
diff --git a/src/VBox/VMM/include/EMInternal.h b/src/VBox/VMM/include/EMInternal.h
index 0dad6f3e95a..6074cd94e4d 100644
--- a/src/VBox/VMM/include/EMInternal.h
+++ b/src/VBox/VMM/include/EMInternal.h
@@ -146,28 +146,16 @@ typedef EMEXITENTRY const *PCEMEXITENTRY;
/**
- * Converts a EM pointer into a VM pointer.
- * @returns Pointer to the VM structure the EM is part of.
- * @param pEM Pointer to EM instance data.
- */
-#define EM2VM(pEM) ( (PVM)((char*)pEM - pEM->offVM) )
-
-/**
* EM VM Instance data.
- * Changes to this must checked against the padding of the cfgm union in VM!
*/
typedef struct EM
{
- /** Offset to the VM structure.
- * See EM2VM(). */
- RTUINT offVM;
-
/** Whether IEM executes everything. */
bool fIemExecutesAll;
/** Whether a triple fault triggers a guru. */
bool fGuruOnTripleFault;
/** Alignment padding. */
- bool afPadding[6];
+ bool afPadding[2];
/** Id of the VCPU that last executed code in the recompiler. */
VMCPUID idLastRemCpu;
@@ -194,18 +182,13 @@ typedef struct EMCPU
/** The state prior to the suspending of the VM. */
EMSTATE enmPrevState;
- /** Force raw-mode execution.
- * This is used to prevent REM from trying to execute patch code.
- * The flag is cleared upon entering emR3RawExecute() and updated in certain return paths. */
- bool fForceRAW;
-
/** Set if hypercall instruction VMMCALL (AMD) & VMCALL (Intel) are enabled.
* GIM sets this and the execution managers queries it. Not saved, as GIM
* takes care of that bit too. */
bool fHypercallEnabled;
/** Explicit padding. */
- uint8_t abPadding[2];
+ uint8_t abPadding[3];
/** The number of instructions we've executed in IEM since switching to the
* EMSTATE_IEM_THEN_REM state. */
@@ -214,17 +197,6 @@ typedef struct EMCPU
/** Inhibit interrupts for this instruction. Valid only when VM_FF_INHIBIT_INTERRUPTS is set. */
RTGCUINTPTR GCPtrInhibitInterrupts;
-#ifdef VBOX_WITH_RAW_MODE
- /** Pointer to the PATM status structure. (R3 Ptr) */
- R3PTRTYPE(PPATMGCSTATE) pPatmGCState;
-#else
- RTR3PTR R3PtrPaddingNoRaw;
-#endif
- RTR3PTR R3PtrNullPadding; /**< Used to be pCtx. */
-#if GC_ARCH_BITS == 64
- RTGCPTR aPadding1;
-#endif
-
/** Start of the current time slice in ms. */
uint64_t u64TimeSliceStart;
/** Start of the current time slice in thread execution time (ms). */
@@ -304,18 +276,12 @@ typedef struct EMCPU
R3PTRTYPE(PEMSTATS) pStatsR3;
/** More statistics (R0). */
R0PTRTYPE(PEMSTATS) pStatsR0;
- /** More statistics (RC). */
- RCPTRTYPE(PEMSTATS) pStatsRC;
-#if HC_ARCH_BITS == 64
- RTRCPTR padding0;
-#endif
/** Tree for keeping track of cli occurrences (debug only). */
R3PTRTYPE(PAVLGCPTRNODECORE) pCliStatTree;
STAMCOUNTER StatTotalClis;
-#if HC_ARCH_BITS == 32
- uint64_t padding1;
-#endif
+ /** Put the history at a 32-byte boundrary. */
+ uint64_t au64Padding[3];
/** Exit history table (6KB). */
EMEXITENTRY aExitHistory[256];
diff --git a/src/VBox/VMM/testcase/tstVMStruct.h b/src/VBox/VMM/testcase/tstVMStruct.h
index 017b802c5b4..b4c44b60d27 100644
--- a/src/VBox/VMM/testcase/tstVMStruct.h
+++ b/src/VBox/VMM/testcase/tstVMStruct.h
@@ -318,7 +318,6 @@
GEN_CHECK_SIZE(EM);
GEN_CHECK_OFF(EM, offVM);
GEN_CHECK_OFF(EMCPU, enmState);
- GEN_CHECK_OFF(EMCPU, fForceRAW);
GEN_CHECK_OFF_DOT(EMCPU, u.achPaddingFatalLongJump);
GEN_CHECK_OFF(EMCPU, DisState);
GEN_CHECK_OFF(EMCPU, StatForcedActions);