/* $Id: SSM.cpp 8155 2008-04-18 15:16:47Z vboxsync $ */ /** @file * SSM - Saved State Manager. */ /* * Copyright (C) 2006-2007 Sun Microsystems, Inc. * * This file is part of VirtualBox Open Source Edition (OSE), as * available from http://www.virtualbox.org. This file is free software; * you can redistribute it and/or modify it under the terms of the GNU * General Public License (GPL) as published by the Free Software * Foundation, in version 2 as it comes in the "COPYING" file of the * VirtualBox OSE distribution. VirtualBox OSE is distributed in the * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind. * * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa * Clara, CA 95054 USA or visit http://www.sun.com if you need * additional information or have any questions. */ /** @page pg_ssm SSM - The Saved State Manager * * The Saved State Manager (SSM) implements facilities for saving and loading * a VM state in a structural manner using callbacks for each collection of * data which needs saving. * * At init time each of the VM components will register data entities which * they need to save and restore. Each entity have a unique name (ascii) and * a set of callbacks associated with it. The name will be used to identify * the entity during restore. The callbacks are for the two operations, save * and restore. There are three callbacks for each of the two - a prepare, * a execute and a what-now. * * The SSM provides a number of APIs for encoding and decoding the data. */ /******************************************************************************* * Header Files * *******************************************************************************/ #define LOG_GROUP LOG_GROUP_SSM #include #include #include #include "SSMInternal.h" #include #include #include #include #include #include #include #include #include #include #include /******************************************************************************* * Defined Constants And Macros * *******************************************************************************/ /** Start structure magic. (Isacc Asimov) */ #define SSMR3STRUCT_BEGIN 0x19200102 /** End structure magic. (Isacc Asimov) */ #define SSMR3STRUCT_END 0x19920406 /******************************************************************************* * Structures and Typedefs * *******************************************************************************/ typedef enum SSMSTATE { SSMSTATE_SAVE_PREP = 1, SSMSTATE_SAVE_EXEC, SSMSTATE_SAVE_DONE, SSMSTATE_LOAD_PREP, SSMSTATE_LOAD_EXEC, SSMSTATE_LOAD_DONE, SSMSTATE_OPEN_READ } SSMSTATE; /** * Handle structure. */ typedef struct SSMHANDLE { /** The file handle. */ RTFILE File; /** The VM handle. */ PVM pVM; /** The size of the file header. * Because the file header was incorrectly aligned there we've ended up with * differences between the 64-bit and 32-bit file header. */ size_t cbFileHdr; /** The current operation. */ SSMSTATE enmOp; /** What to do after save completes. (move the enum) */ SSMAFTER enmAfter; /** The current rc of the save operation. */ int rc; /** The compressor of the current data unit. */ PRTZIPCOMP pZipComp; /** The decompressor of the current data unit. */ PRTZIPDECOMP pZipDecomp; /** Number of bytes left in the current data unit. */ uint64_t cbUnitLeft; /** Pointer to the progress callback function. */ PFNVMPROGRESS pfnProgress; /** User specified arguemnt to the callback function. */ void *pvUser; /** Next completion percentage. (corresponds to offEstProgress) */ unsigned uPercent; /** The position of the next progress callback in the estimated file. */ uint64_t offEstProgress; /** The estimated total byte count. * (Only valid after the prep.) */ uint64_t cbEstTotal; /** Current position in the estimated file. */ uint64_t offEst; /** End of current unit in the estimated file. */ uint64_t offEstUnitEnd; /** the amount of % we reserve for the 'prepare' phase */ unsigned uPercentPrepare; /** the amount of % we reserve for the 'done' stage */ unsigned uPercentDone; } SSMHANDLE; /** * Header of the saved state file. */ typedef struct SSMFILEHDR { /** Magic string which identifies this file as a version of VBox saved state file format. */ char achMagic[32]; /** The size of this file. Used to check * whether the save completed and that things are fine otherwise. */ uint64_t cbFile; /** File checksum. The actual calculation skips past the u32CRC field. */ uint32_t u32CRC; /** Padding. */ uint32_t u32Reserved; /** The machine UUID. (Ignored if NIL.) */ RTUUID MachineUuid; } SSMFILEHDR, *PSSMFILEHDR; AssertCompileSize(SSMFILEHDR, 64); /** * The x86 edition of the 1.0 header. */ #pragma pack(1) /* darn, MachineUuid got missaligned! */ typedef struct SSMFILEHDRV10X86 { /** Magic string which identifies this file as a version of VBox saved state file format. */ char achMagic[32]; /** The size of this file. Used to check * whether the save completed and that things are fine otherwise. */ uint64_t cbFile; /** File checksum. The actual calculation skips past the u32CRC field. */ uint32_t u32CRC; /** The machine UUID. (Ignored if NIL.) */ RTUUID MachineUuid; } SSMFILEHDRV10X86, *PSSMFILEHDRV10X86; #pragma pack() /** * The amd64 edition of the 1.0 header. */ typedef SSMFILEHDR SSMFILEHDRV10AMD64, *PSSMFILEHDRV10AMD64; /** Saved state file magic base string. */ #define SSMFILEHDR_MAGIC_BASE "\177VirtualBox SavedState " /** Saved state file v1.0 magic. */ #define SSMFILEHDR_MAGIC_V1_0 "\177VirtualBox SavedState V1.0\n" /** Saved state file v1.1 magic. */ #define SSMFILEHDR_MAGIC_V1_1 "\177VirtualBox SavedState V1.1\n" /** * Data unit header. */ typedef struct SSMFILEUNITHDR { /** Magic. */ char achMagic[8]; /** Number of bytes in this data unit including the header. */ uint64_t cbUnit; /** Data version. */ uint32_t u32Version; /** Instance number. */ uint32_t u32Instance; /** Size of the data unit name including the terminator. (bytes) */ uint32_t cchName; /** Data unit name. */ char szName[1]; } SSMFILEUNITHDR, *PSSMFILEUNITHDR; /** Data unit magic. */ #define SSMFILEUNITHDR_MAGIC "\nUnit\n" /** Data end marker magic. */ #define SSMFILEUNITHDR_END "\nTheEnd" /******************************************************************************* * Internal Functions * *******************************************************************************/ static int smmr3Register(PVM pVM, const char *pszName, uint32_t u32Instance, uint32_t u32Version, size_t cbGuess, PSSMUNIT *ppUnit); static int ssmr3CalcChecksum(RTFILE File, uint64_t cbFile, uint32_t *pu32CRC); static void ssmR3Progress(PSSMHANDLE pSSM, uint64_t cbAdvance); static int ssmr3Validate(RTFILE File, PSSMFILEHDR pHdr, size_t *pcbFileHdr); static PSSMUNIT ssmr3Find(PVM pVM, const char *pszName, uint32_t u32Instance); static int ssmr3WriteFinish(PSSMHANDLE pSSM); static int ssmr3Write(PSSMHANDLE pSSM, const void *pvBuf, size_t cbBuf); static DECLCALLBACK(int) ssmr3WriteOut(void *pvSSM, const void *pvBuf, size_t cbBuf); static void ssmr3ReadFinish(PSSMHANDLE pSSM); static int ssmr3Read(PSSMHANDLE pSSM, void *pvBuf, size_t cbBuf); static DECLCALLBACK(int) ssmr3ReadIn(void *pvSSM, void *pvBuf, size_t cbBuf, size_t *pcbRead); /** * Internal registration worker. * * @returns VBox status code. * @param pVM The VM handle. * @param pszName Data unit name. * @param u32Instance The instance id. * @param u32Version The data unit version. * @param cbGuess The guessed data unit size. * @param ppUnit Where to store the insterted unit node. * Caller must fill in the missing details. */ static int smmr3Register(PVM pVM, const char *pszName, uint32_t u32Instance, uint32_t u32Version, size_t cbGuess, PSSMUNIT *ppUnit) { /* * Walk to the end of the list checking for duplicates as we go. */ size_t cchName = strlen(pszName); PSSMUNIT pUnitPrev = NULL; PSSMUNIT pUnit = pVM->ssm.s.pHead; while (pUnit) { if ( pUnit->u32Instance == u32Instance && pUnit->cchName == cchName && !memcmp(pUnit->szName, pszName, cchName)) { AssertMsgFailed(("Duplicate registration %s\n", pszName)); return VERR_SSM_UNIT_EXISTS; } /* next */ pUnitPrev = pUnit; pUnit = pUnit->pNext; } /* * Allocate new node. */ pUnit = (PSSMUNIT)MMR3HeapAllocZ(pVM, MM_TAG_SSM, RT_OFFSETOF(SSMUNIT, szName[cchName + 1])); if (!pUnit) return VERR_NO_MEMORY; /* * Fill in (some) data. (Stuff is zero'ed.) */ pUnit->u32Version = u32Version; pUnit->u32Instance = u32Instance; pUnit->cbGuess = cbGuess; pUnit->cchName = cchName; memcpy(pUnit->szName, pszName, cchName); /* * Insert */ if (pUnitPrev) pUnitPrev->pNext = pUnit; else pVM->ssm.s.pHead = pUnit; *ppUnit = pUnit; return VINF_SUCCESS; } /** * Register a PDM Devices data unit. * * @returns VBox status. * @param pVM The VM handle. * @param pDevIns Device instance. * @param pszName Data unit name. * @param u32Instance The instance identifier of the data unit. * This must together with the name be unique. * @param u32Version Data layout version number. * @param cbGuess The approximate amount of data in the unit. * Only for progress indicators. * @param pfnSavePrep Prepare save callback, optional. * @param pfnSaveExec Execute save callback, optional. * @param pfnSaveDone Done save callback, optional. * @param pfnLoadPrep Prepare load callback, optional. * @param pfnLoadExec Execute load callback, optional. * @param pfnLoadDone Done load callback, optional. */ SSMR3DECL(int) SSMR3Register(PVM pVM, PPDMDEVINS pDevIns, const char *pszName, uint32_t u32Instance, uint32_t u32Version, size_t cbGuess, PFNSSMDEVSAVEPREP pfnSavePrep, PFNSSMDEVSAVEEXEC pfnSaveExec, PFNSSMDEVSAVEDONE pfnSaveDone, PFNSSMDEVLOADPREP pfnLoadPrep, PFNSSMDEVLOADEXEC pfnLoadExec, PFNSSMDEVLOADDONE pfnLoadDone) { PSSMUNIT pUnit; int rc = smmr3Register(pVM, pszName, u32Instance, u32Version, cbGuess, &pUnit); if (VBOX_SUCCESS(rc)) { pUnit->enmType = SSMUNITTYPE_DEV; pUnit->u.Dev.pfnSavePrep = pfnSavePrep; pUnit->u.Dev.pfnSaveExec = pfnSaveExec; pUnit->u.Dev.pfnSaveDone = pfnSaveDone; pUnit->u.Dev.pfnLoadPrep = pfnLoadPrep; pUnit->u.Dev.pfnLoadExec = pfnLoadExec; pUnit->u.Dev.pfnLoadDone = pfnLoadDone; pUnit->u.Dev.pDevIns = pDevIns; } return rc; } /** * Register a PDM driver data unit. * * @returns VBox status. * @param pVM The VM handle. * @param pDrvIns Driver instance. * @param pszName Data unit name. * @param u32Instance The instance identifier of the data unit. * This must together with the name be unique. * @param u32Version Data layout version number. * @param cbGuess The approximate amount of data in the unit. * Only for progress indicators. * @param pfnSavePrep Prepare save callback, optional. * @param pfnSaveExec Execute save callback, optional. * @param pfnSaveDone Done save callback, optional. * @param pfnLoadPrep Prepare load callback, optional. * @param pfnLoadExec Execute load callback, optional. * @param pfnLoadDone Done load callback, optional. */ SSMR3DECL(int) SSMR3RegisterDriver(PVM pVM, PPDMDRVINS pDrvIns, const char *pszName, uint32_t u32Instance, uint32_t u32Version, size_t cbGuess, PFNSSMDRVSAVEPREP pfnSavePrep, PFNSSMDRVSAVEEXEC pfnSaveExec, PFNSSMDRVSAVEDONE pfnSaveDone, PFNSSMDRVLOADPREP pfnLoadPrep, PFNSSMDRVLOADEXEC pfnLoadExec, PFNSSMDRVLOADDONE pfnLoadDone) { PSSMUNIT pUnit; int rc = smmr3Register(pVM, pszName, u32Instance, u32Version, cbGuess, &pUnit); if (VBOX_SUCCESS(rc)) { pUnit->enmType = SSMUNITTYPE_DRV; pUnit->u.Drv.pfnSavePrep = pfnSavePrep; pUnit->u.Drv.pfnSaveExec = pfnSaveExec; pUnit->u.Drv.pfnSaveDone = pfnSaveDone; pUnit->u.Drv.pfnLoadPrep = pfnLoadPrep; pUnit->u.Drv.pfnLoadExec = pfnLoadExec; pUnit->u.Drv.pfnLoadDone = pfnLoadDone; pUnit->u.Drv.pDrvIns = pDrvIns; } return rc; } /** * Register a internal data unit. * * @returns VBox status. * @param pVM The VM handle. * @param pszName Data unit name. * @param u32Instance The instance identifier of the data unit. * This must together with the name be unique. * @param u32Version Data layout version number. * @param cbGuess The approximate amount of data in the unit. * Only for progress indicators. * @param pfnSavePrep Prepare save callback, optional. * @param pfnSaveExec Execute save callback, optional. * @param pfnSaveDone Done save callback, optional. * @param pfnLoadPrep Prepare load callback, optional. * @param pfnLoadExec Execute load callback, optional. * @param pfnLoadDone Done load callback, optional. */ SSMR3DECL(int) SSMR3RegisterInternal(PVM pVM, const char *pszName, uint32_t u32Instance, uint32_t u32Version, size_t cbGuess, PFNSSMINTSAVEPREP pfnSavePrep, PFNSSMINTSAVEEXEC pfnSaveExec, PFNSSMINTSAVEDONE pfnSaveDone, PFNSSMINTLOADPREP pfnLoadPrep, PFNSSMINTLOADEXEC pfnLoadExec, PFNSSMINTLOADDONE pfnLoadDone) { PSSMUNIT pUnit; int rc = smmr3Register(pVM, pszName, u32Instance, u32Version, cbGuess, &pUnit); if (VBOX_SUCCESS(rc)) { pUnit->enmType = SSMUNITTYPE_INTERNAL; pUnit->u.Internal.pfnSavePrep = pfnSavePrep; pUnit->u.Internal.pfnSaveExec = pfnSaveExec; pUnit->u.Internal.pfnSaveDone = pfnSaveDone; pUnit->u.Internal.pfnLoadPrep = pfnLoadPrep; pUnit->u.Internal.pfnLoadExec = pfnLoadExec; pUnit->u.Internal.pfnLoadDone = pfnLoadDone; } return rc; } /** * Register an external data unit. * * @returns VBox status. * @param pVM The VM handle. * @param pszName Data unit name. * @param u32Instance The instance identifier of the data unit. * This must together with the name be unique. * @param u32Version Data layout version number. * @param cbGuess The approximate amount of data in the unit. * Only for progress indicators. * @param pfnSavePrep Prepare save callback, optional. * @param pfnSaveExec Execute save callback, optional. * @param pfnSaveDone Done save callback, optional. * @param pfnLoadPrep Prepare load callback, optional. * @param pfnLoadExec Execute load callback, optional. * @param pfnLoadDone Done load callback, optional. * @param pvUser User argument. */ SSMR3DECL(int) SSMR3RegisterExternal(PVM pVM, const char *pszName, uint32_t u32Instance, uint32_t u32Version, size_t cbGuess, PFNSSMEXTSAVEPREP pfnSavePrep, PFNSSMEXTSAVEEXEC pfnSaveExec, PFNSSMEXTSAVEDONE pfnSaveDone, PFNSSMEXTLOADPREP pfnLoadPrep, PFNSSMEXTLOADEXEC pfnLoadExec, PFNSSMEXTLOADDONE pfnLoadDone, void *pvUser) { PSSMUNIT pUnit; int rc = smmr3Register(pVM, pszName, u32Instance, u32Version, cbGuess, &pUnit); if (VBOX_SUCCESS(rc)) { pUnit->enmType = SSMUNITTYPE_EXTERNAL; pUnit->u.External.pfnSavePrep = pfnSavePrep; pUnit->u.External.pfnSaveExec = pfnSaveExec; pUnit->u.External.pfnSaveDone = pfnSaveDone; pUnit->u.External.pfnLoadPrep = pfnLoadPrep; pUnit->u.External.pfnLoadExec = pfnLoadExec; pUnit->u.External.pfnLoadDone = pfnLoadDone; pUnit->u.External.pvUser = pvUser; } return rc; } /** * Deregister one or more PDM Device data units. * * @returns VBox status. * @param pVM The VM handle. * @param pDevIns Device instance. * @param pszName Data unit name. * Use NULL to deregister all data units for that device instance. * @param u32Instance The instance identifier of the data unit. * This must together with the name be unique. * @remark Only for dynmaic data units and dynamic unloaded modules. */ SSMR3DECL(int) SSMR3Deregister(PVM pVM, PPDMDEVINS pDevIns, const char *pszName, uint32_t u32Instance) { /* * Validate input. */ if (!pDevIns) { AssertMsgFailed(("pDevIns is NULL!\n")); return VERR_INVALID_PARAMETER; } /* * Search the list. */ size_t cchName = pszName ? strlen(pszName) : 0; int rc = pszName ? VERR_SSM_UNIT_NOT_FOUND : VINF_SUCCESS; PSSMUNIT pUnitPrev = NULL; PSSMUNIT pUnit = pVM->ssm.s.pHead; while (pUnit) { if ( pUnit->enmType == SSMUNITTYPE_DEV && ( !pszName || ( pUnit->cchName == cchName && !memcmp(pUnit->szName, pszName, cchName))) && pUnit->u32Instance == u32Instance ) { if (pUnit->u.Dev.pDevIns == pDevIns) { /* * Unlink it, advance pointer, and free the node. */ PSSMUNIT pFree = pUnit; pUnit = pUnit->pNext; if (pUnitPrev) pUnitPrev->pNext = pUnit; else pVM->ssm.s.pHead = pUnit; Log(("SSM: Removed data unit '%s' (pdm dev).\n", pFree->szName)); MMR3HeapFree(pFree); if (pszName) return VINF_SUCCESS; rc = VINF_SUCCESS; continue; } else if (pszName) { AssertMsgFailed(("Caller is not owner! Owner=%p Caller=%p %s\n", pUnit->u.Dev.pDevIns, pDevIns, pszName)); return VERR_SSM_UNIT_NOT_OWNER; } } /* next */ pUnitPrev = pUnit; pUnit = pUnit->pNext; } return rc; } /** * Deregister one ore more PDM Driver data units. * * @returns VBox status. * @param pVM The VM handle. * @param pDrvIns Driver instance. * @param pszName Data unit name. * Use NULL to deregister all data units for that driver instance. * @param u32Instance The instance identifier of the data unit. * This must together with the name be unique. Ignored if pszName is NULL. * @remark Only for dynmaic data units and dynamic unloaded modules. */ SSMR3DECL(int) SSMR3DeregisterDriver(PVM pVM, PPDMDRVINS pDrvIns, const char *pszName, uint32_t u32Instance) { /* * Validate input. */ if (!pDrvIns) { AssertMsgFailed(("pDrvIns is NULL!\n")); return VERR_INVALID_PARAMETER; } /* * Search the list. */ size_t cchName = pszName ? strlen(pszName) : 0; int rc = pszName ? VERR_SSM_UNIT_NOT_FOUND : VINF_SUCCESS; PSSMUNIT pUnitPrev = NULL; PSSMUNIT pUnit = pVM->ssm.s.pHead; while (pUnit) { if ( pUnit->enmType == SSMUNITTYPE_DRV && ( !pszName || ( pUnit->cchName == cchName && !memcmp(pUnit->szName, pszName, cchName) && pUnit->u32Instance == u32Instance)) ) { if (pUnit->u.Drv.pDrvIns == pDrvIns) { /* * Unlink it, advance pointer, and free the node. */ PSSMUNIT pFree = pUnit; pUnit = pUnit->pNext; if (pUnitPrev) pUnitPrev->pNext = pUnit; else pVM->ssm.s.pHead = pUnit; Log(("SSM: Removed data unit '%s' (pdm drv).\n", pFree->szName)); MMR3HeapFree(pFree); if (pszName) return VINF_SUCCESS; rc = VINF_SUCCESS; continue; } else if (pszName) { AssertMsgFailed(("Caller is not owner! Owner=%p Caller=%p %s\n", pUnit->u.Drv.pDrvIns, pDrvIns, pszName)); return VERR_SSM_UNIT_NOT_OWNER; } } /* next */ pUnitPrev = pUnit; pUnit = pUnit->pNext; } return rc; } /** * Deregister a data unit. * * @returns VBox status. * @param pVM The VM handle. * @param enmType Unit type * @param pszName Data unit name. * @remark Only for dynmaic data units. */ static int ssmR3DeregisterByNameAndType(PVM pVM, const char *pszName, SSMUNITTYPE enmType) { /* * Validate input. */ if (!pszName) { AssertMsgFailed(("pszName is NULL!\n")); return VERR_INVALID_PARAMETER; } /* * Search the list. */ size_t cchName = strlen(pszName); int rc = VERR_SSM_UNIT_NOT_FOUND; PSSMUNIT pUnitPrev = NULL; PSSMUNIT pUnit = pVM->ssm.s.pHead; while (pUnit) { if ( pUnit->enmType == enmType && pUnit->cchName == cchName && !memcmp(pUnit->szName, pszName, cchName)) { /* * Unlink it, advance pointer, and free the node. */ PSSMUNIT pFree = pUnit; pUnit = pUnit->pNext; if (pUnitPrev) pUnitPrev->pNext = pUnit; else pVM->ssm.s.pHead = pUnit; Log(("SSM: Removed data unit '%s' (type=%d).\n", pFree->szName, enmType)); MMR3HeapFree(pFree); return VINF_SUCCESS; } /* next */ pUnitPrev = pUnit; pUnit = pUnit->pNext; } return rc; } /** * Deregister an internal data unit. * * @returns VBox status. * @param pVM The VM handle. * @param pszName Data unit name. * @remark Only for dynmaic data units. */ SSMR3DECL(int) SSMR3DeregisterInternal(PVM pVM, const char *pszName) { return ssmR3DeregisterByNameAndType(pVM, pszName, SSMUNITTYPE_INTERNAL); } /** * Deregister an external data unit. * * @returns VBox status. * @param pVM The VM handle. * @param pszName Data unit name. * @remark Only for dynmaic data units. */ SSMR3DECL(int) SSMR3DeregisterExternal(PVM pVM, const char *pszName) { return ssmR3DeregisterByNameAndType(pVM, pszName, SSMUNITTYPE_EXTERNAL); } /** * Calculate the checksum of a file portion. * * The current implementation is a cut&past of the libkern/crc32.c file from FreeBSD. * * @returns VBox status. * @param File Handle to the file. * @param cbFile Size of the file. * @param pu32CRC Where to store the calculated checksum. */ static int ssmr3CalcChecksum(RTFILE File, uint64_t cbFile, uint32_t *pu32CRC) { /* * Allocate a buffer. */ void *pvBuf = RTMemTmpAlloc(32*1024); if (!pvBuf) return VERR_NO_TMP_MEMORY; /* * Loop reading and calculating CRC32. */ int rc = VINF_SUCCESS; uint32_t u32CRC = RTCrc32Start(); while (cbFile) { /* read chunk */ register unsigned cbToRead = 32*1024; if (cbFile < 32*1024) cbToRead = (unsigned)cbFile; rc = RTFileRead(File, pvBuf, cbToRead, NULL); if (VBOX_FAILURE(rc)) { AssertMsgFailed(("Failed with rc=%Vrc while calculating crc.\n", rc)); RTMemTmpFree(pvBuf); return rc; } /* update total */ cbFile -= cbToRead; /* calc crc32. */ u32CRC = RTCrc32Process(u32CRC, pvBuf, cbToRead); } RTMemTmpFree(pvBuf); /* store the calculated crc */ u32CRC = RTCrc32Finish(u32CRC); Log(("SSM: u32CRC=0x%08x\n", u32CRC)); *pu32CRC = u32CRC; return VINF_SUCCESS; } /** * Works the progress calculation. * * @param pSSM The SSM handle. * @param cbAdvance Number of bytes to advance */ static void ssmR3Progress(PSSMHANDLE pSSM, uint64_t cbAdvance) { /* Can't advance it beyond the estimated end of the unit. */ uint64_t cbLeft = pSSM->offEstUnitEnd - pSSM->offEst; if (cbAdvance > cbLeft) cbAdvance = cbLeft; pSSM->offEst += cbAdvance; /* uPercentPrepare% prepare, xx% exec, uPercentDone% done+crc */ while (pSSM->offEst >= pSSM->offEstProgress && pSSM->uPercent <= 100-pSSM->uPercentDone) { if (pSSM->pfnProgress) pSSM->pfnProgress(pSSM->pVM, pSSM->uPercent, pSSM->pvUser); pSSM->uPercent++; pSSM->offEstProgress = (pSSM->uPercent - pSSM->uPercentPrepare) * pSSM->cbEstTotal / (100-pSSM->uPercentDone-pSSM->uPercentPrepare); } } /** * Start VM save operation. * The caller must be the emulation thread! * * @returns VBox status. * @param pVM The VM handle. * @param pszFilename Name of the file to save the state in. * @param enmAfter What is planned after a successful save operation. * @param pfnProgress Progress callback. Optional. * @param pvUser User argument for the progress callback. */ SSMR3DECL(int) SSMR3Save(PVM pVM, const char *pszFilename, SSMAFTER enmAfter, PFNVMPROGRESS pfnProgress, void *pvUser) { LogFlow(("SSMR3Save: pszFilename=%p:{%s} enmAfter=%d pfnProgress=%p pvUser=%p\n", pszFilename, pszFilename, enmAfter, pfnProgress, pvUser)); /* * Validate input. */ if ( enmAfter != SSMAFTER_DESTROY && enmAfter != SSMAFTER_CONTINUE) { AssertMsgFailed(("Invalid enmAfter=%d!\n", enmAfter)); return VERR_INVALID_PARAMETER; } /* * Try open the file. */ SSMHANDLE Handle = {0}; Handle.enmAfter = enmAfter; Handle.pVM = pVM; Handle.cbFileHdr = sizeof(SSMFILEHDR); Handle.pfnProgress = pfnProgress; Handle.pvUser = pvUser; /* * The 'done' part might take much time: * (1) Call the SaveDone function of each module * (2) Calculate the Checksum * (3) RTFileClose() will probably flush the write cache */ Handle.uPercentPrepare = 2; Handle.uPercentDone = 20; /* reserve substantial time for crc-checking the image */ int rc = RTFileOpen(&Handle.File, pszFilename, RTFILE_O_READWRITE | RTFILE_O_CREATE_REPLACE | RTFILE_O_DENY_WRITE); if (VBOX_FAILURE(rc)) { LogRel(("SSM: Failed to create save state file '%s', rc=%Vrc.\n", pszFilename, rc)); return rc; } Log(("SSM: Starting state save to file '%s'...\n", pszFilename)); /* * Write header. */ SSMFILEHDR Hdr = { SSMFILEHDR_MAGIC_V1_1, 0, 0, 0 }; rc = RTFileWrite(Handle.File, &Hdr, sizeof(Hdr), NULL); if (VBOX_SUCCESS(rc)) { /* * Clear the per unit flags. */ PSSMUNIT pUnit; for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext) pUnit->fCalled = false; /* * Do the prepare run. */ Handle.rc = VINF_SUCCESS; Handle.enmOp = SSMSTATE_SAVE_PREP; for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext) { switch (pUnit->enmType) { case SSMUNITTYPE_DEV: if (pUnit->u.Dev.pfnSavePrep) { rc = pUnit->u.Dev.pfnSavePrep(pUnit->u.Dev.pDevIns, &Handle); pUnit->fCalled = true; } break; case SSMUNITTYPE_DRV: if (pUnit->u.Drv.pfnSavePrep) { rc = pUnit->u.Drv.pfnSavePrep(pUnit->u.Drv.pDrvIns, &Handle); pUnit->fCalled = true; } break; case SSMUNITTYPE_INTERNAL: if (pUnit->u.Internal.pfnSavePrep) { rc = pUnit->u.Internal.pfnSavePrep(pVM, &Handle); pUnit->fCalled = true; } break; case SSMUNITTYPE_EXTERNAL: if (pUnit->u.External.pfnSavePrep) { rc = pUnit->u.External.pfnSavePrep(&Handle, pUnit->u.External.pvUser); pUnit->fCalled = true; } break; } if (VBOX_FAILURE(rc)) { LogRel(("SSM: Prepare save failed with rc=%Vrc for data unit '%s.\n", rc, pUnit->szName)); break; } Handle.cbEstTotal += pUnit->cbGuess; } /* Progress. */ if (pfnProgress) pfnProgress(pVM, Handle.uPercentPrepare-1, pvUser); Handle.uPercent = Handle.uPercentPrepare; /* * Do the execute run. */ if (VBOX_SUCCESS(rc)) { Handle.enmOp = SSMSTATE_SAVE_EXEC; for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext) { /* * Estimate. */ ssmR3Progress(&Handle, Handle.offEstUnitEnd - Handle.offEst); Handle.offEstUnitEnd += pUnit->cbGuess; /* * Does this unit have a callback? If, not skip it. */ bool fSkip; switch (pUnit->enmType) { case SSMUNITTYPE_DEV: fSkip = pUnit->u.Dev.pfnSaveExec == NULL; break; case SSMUNITTYPE_DRV: fSkip = pUnit->u.Drv.pfnSaveExec == NULL; break; case SSMUNITTYPE_INTERNAL: fSkip = pUnit->u.Internal.pfnSaveExec == NULL; break; case SSMUNITTYPE_EXTERNAL: fSkip = pUnit->u.External.pfnSaveExec == NULL; break; default: fSkip = true; break; } if (fSkip) { pUnit->fCalled = true; continue; } /* * Write data unit header */ uint64_t offHdr = RTFileTell(Handle.File); SSMFILEUNITHDR UnitHdr = { SSMFILEUNITHDR_MAGIC, 0, pUnit->u32Version, pUnit->u32Instance, pUnit->cchName + 1, { '\0' } }; rc = RTFileWrite(Handle.File, &UnitHdr, RT_OFFSETOF(SSMFILEUNITHDR, szName[0]), NULL); if (VBOX_SUCCESS(rc)) { rc = RTFileWrite(Handle.File, &pUnit->szName[0], pUnit->cchName + 1, NULL); if (VBOX_SUCCESS(rc)) { /* * Call the execute handler. */ switch (pUnit->enmType) { case SSMUNITTYPE_DEV: rc = pUnit->u.Dev.pfnSaveExec(pUnit->u.Dev.pDevIns, &Handle); break; case SSMUNITTYPE_DRV: rc = pUnit->u.Drv.pfnSaveExec(pUnit->u.Drv.pDrvIns, &Handle); break; case SSMUNITTYPE_INTERNAL: rc = pUnit->u.Internal.pfnSaveExec(pVM, &Handle); break; case SSMUNITTYPE_EXTERNAL: pUnit->u.External.pfnSaveExec(&Handle, pUnit->u.External.pvUser); rc = Handle.rc; break; } pUnit->fCalled = true; if (VBOX_FAILURE(Handle.rc) && VBOX_SUCCESS(rc)) rc = Handle.rc; if (VBOX_SUCCESS(rc)) { /* * Flush buffer / end compression stream. */ if (Handle.pZipComp) rc = ssmr3WriteFinish(&Handle); if (VBOX_SUCCESS(rc)) { /* * Update header with correct length. */ uint64_t offEnd = RTFileTell(Handle.File); rc = RTFileSeek(Handle.File, offHdr, RTFILE_SEEK_BEGIN, NULL); if (VBOX_SUCCESS(rc)) { UnitHdr.cbUnit = offEnd - offHdr; rc = RTFileWrite(Handle.File, &UnitHdr, RT_OFFSETOF(SSMFILEUNITHDR, szName[0]), NULL); if (VBOX_SUCCESS(rc)) { rc = RTFileSeek(Handle.File, offEnd, RTFILE_SEEK_BEGIN, NULL); if (VBOX_SUCCESS(rc)) Log(("SSM: Data unit: offset %#9llx size %9lld '%s'\n", offHdr, UnitHdr.cbUnit, pUnit->szName)); } } } else { LogRel(("SSM: Failed ending compression stream. rc=%Vrc\n", rc)); break; } } else { LogRel(("SSM: Execute save failed with rc=%Vrc for data unit '%s.\n", rc, pUnit->szName)); break; } } } if (VBOX_FAILURE(rc)) { LogRel(("SSM: Failed to write unit header. rc=%Vrc\n", rc)); break; } } /* for each unit */ /* finish the progress. */ if (VBOX_SUCCESS(rc)) ssmR3Progress(&Handle, Handle.offEstUnitEnd - Handle.offEst); } /* (progress should be pending 99% now) */ AssertMsg(VBOX_FAILURE(rc) || Handle.uPercent == (101-Handle.uPercentDone), ("%d\n", Handle.uPercent)); /* * Do the done run. */ Handle.rc = rc; Handle.enmOp = SSMSTATE_SAVE_DONE; for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext) { switch (pUnit->enmType) { case SSMUNITTYPE_DEV: if ( pUnit->u.Dev.pfnSaveDone && ( pUnit->fCalled || (!pUnit->u.Dev.pfnSavePrep && !pUnit->u.Dev.pfnSaveExec))) rc = pUnit->u.Dev.pfnSaveDone(pUnit->u.Dev.pDevIns, &Handle); break; case SSMUNITTYPE_DRV: if ( pUnit->u.Drv.pfnSaveDone && ( pUnit->fCalled || (!pUnit->u.Drv.pfnSavePrep && !pUnit->u.Drv.pfnSaveExec))) rc = pUnit->u.Drv.pfnSaveDone(pUnit->u.Drv.pDrvIns, &Handle); break; case SSMUNITTYPE_INTERNAL: if ( pUnit->u.Internal.pfnSaveDone && ( pUnit->fCalled || (!pUnit->u.Internal.pfnSavePrep && !pUnit->u.Internal.pfnSaveExec))) rc = pUnit->u.Internal.pfnSaveDone(pVM, &Handle); break; case SSMUNITTYPE_EXTERNAL: if ( pUnit->u.External.pfnSaveDone && ( pUnit->fCalled || (!pUnit->u.External.pfnSavePrep && !pUnit->u.External.pfnSaveExec))) rc = pUnit->u.External.pfnSaveDone(&Handle, pUnit->u.External.pvUser); break; } if (VBOX_FAILURE(rc)) { LogRel(("SSM: Done save failed with rc=%Vrc for data unit '%s.\n", rc, pUnit->szName)); if (VBOX_SUCCESS(Handle.rc)) Handle.rc = rc; } } rc = Handle.rc; /* * Finalize the file if successfully saved. */ if (VBOX_SUCCESS(rc)) { /* end record */ SSMFILEUNITHDR UnitHdr = { SSMFILEUNITHDR_END, RT_OFFSETOF(SSMFILEUNITHDR, szName[0]), 0, '\0'}; rc = RTFileWrite(Handle.File, &UnitHdr, RT_OFFSETOF(SSMFILEUNITHDR, szName[0]), NULL); if (VBOX_SUCCESS(rc)) { /* get size */ Hdr.cbFile = RTFileTell(Handle.File); /* calc checksum */ rc = RTFileSeek(Handle.File, RT_OFFSETOF(SSMFILEHDR, u32CRC) + sizeof(Hdr.u32CRC), RTFILE_SEEK_BEGIN, NULL); if (VBOX_SUCCESS(rc)) rc = ssmr3CalcChecksum(Handle.File, Hdr.cbFile - sizeof(Hdr), &Hdr.u32CRC); if (VBOX_SUCCESS(rc)) { if (pfnProgress) pfnProgress(pVM, 90, pvUser); /* * Write the update the header to the file. */ rc = RTFileSeek(Handle.File, 0, RTFILE_SEEK_BEGIN, NULL); if (VBOX_SUCCESS(rc)) rc = RTFileWrite(Handle.File, &Hdr, sizeof(Hdr), NULL); if (VBOX_SUCCESS(rc)) { rc = RTFileClose(Handle.File); AssertRC(rc); if (pfnProgress) pfnProgress(pVM, 100, pvUser); Log(("SSM: Successfully saved the vm state to '%s'.\n", pszFilename)); Log(("\n\n\n")); DBGFR3InfoLog(pVM, "cpum", "verbose"); DBGFR3InfoLog(pVM, "timers", NULL); DBGFR3InfoLog(pVM, "activetimers", NULL); DBGFR3InfoLog(pVM, "ioport", NULL); DBGFR3InfoLog(pVM, "mmio", NULL); DBGFR3InfoLog(pVM, "phys", NULL); Log(("\n\n\n")); return VINF_SUCCESS; } } } LogRel(("SSM: Failed to finalize state file! rc=%Vrc\n", pszFilename)); } } /* * Delete the file on failure and destroy any compressors. */ int rc2 = RTFileClose(Handle.File); AssertRC(rc2); rc2 = RTFileDelete(pszFilename); AssertRC(rc2); if (Handle.pZipComp) RTZipCompDestroy(Handle.pZipComp); return rc; } /** * Validates the integrity of a saved state file. * * @returns VBox status. * @param File File to validate. * The file position is undefined on return. * @param pHdr Where to store the file header. * @param pcbFileHdr Where to store the file header size. */ static int ssmr3Validate(RTFILE File, PSSMFILEHDR pHdr, size_t *pcbFileHdr) { /* * Read the header. */ int rc = RTFileRead(File, pHdr, sizeof(*pHdr), NULL); if (VBOX_FAILURE(rc)) { Log(("SSM: Failed to read file header. rc=%Vrc\n", rc)); return rc; } /* * Verify the magic and make adjustments for versions differences. */ if (memcmp(pHdr->achMagic, SSMFILEHDR_MAGIC_BASE, sizeof(SSMFILEHDR_MAGIC_BASE) - 1)) { Log(("SSM: Not a saved state file. magic=%.*s\n", sizeof(pHdr->achMagic) - 1, pHdr->achMagic)); return VERR_SSM_INTEGRITY_MAGIC; } size_t offCrc32 = RT_OFFSETOF(SSMFILEHDR, u32CRC) + sizeof(pHdr->u32CRC); *pcbFileHdr = sizeof(*pHdr); if (!memcmp(pHdr->achMagic, SSMFILEHDR_MAGIC_V1_0, sizeof(SSMFILEHDR_MAGIC_V1_0))) { if (pHdr->MachineUuid.au32[3]) { SSMFILEHDRV10X86 OldHdr; memcpy(&OldHdr, pHdr, sizeof(OldHdr)); pHdr->cbFile = OldHdr.cbFile; pHdr->u32CRC = OldHdr.u32CRC; pHdr->u32Reserved = 0; pHdr->MachineUuid = OldHdr.MachineUuid; offCrc32 = RT_OFFSETOF(SSMFILEHDRV10X86, u32CRC) + sizeof(pHdr->u32CRC); *pcbFileHdr = sizeof(OldHdr); } else { /* (It's identical, but this doesn't harm us and will continue working after future changes.) */ SSMFILEHDRV10AMD64 OldHdr; memcpy(&OldHdr, pHdr, sizeof(OldHdr)); pHdr->cbFile = OldHdr.cbFile; pHdr->u32CRC = OldHdr.u32CRC; pHdr->u32Reserved = 0; pHdr->MachineUuid = OldHdr.MachineUuid; offCrc32 = RT_OFFSETOF(SSMFILEHDRV10AMD64, u32CRC) + sizeof(pHdr->u32CRC); *pcbFileHdr = sizeof(OldHdr); } } else if (memcmp(pHdr->achMagic, SSMFILEHDR_MAGIC_V1_1, sizeof(SSMFILEHDR_MAGIC_V1_1))) { Log(("SSM: Unknown file format version. magic=%.*s\n", sizeof(pHdr->achMagic) - 1, pHdr->achMagic)); return VERR_SSM_INTEGRITY_VERSION; } /* * Verify the file size. */ uint64_t cbFile; rc = RTFileGetSize(File, &cbFile); if (VBOX_FAILURE(rc)) { Log(("SSM: Failed to get file size. rc=%Vrc\n", rc)); return rc; } if (cbFile != pHdr->cbFile) { Log(("SSM: File size mistmatch. hdr.cbFile=%lld actual %lld\n", pHdr->cbFile, cbFile)); return VERR_SSM_INTEGRITY_SIZE; } /* * Verify the checksum. */ rc = RTFileSeek(File, offCrc32, RTFILE_SEEK_BEGIN, NULL); if (VBOX_FAILURE(rc)) { Log(("SSM: Failed to seek to crc start. rc=%Vrc\n", rc)); return rc; } uint32_t u32CRC; rc = ssmr3CalcChecksum(File, pHdr->cbFile - *pcbFileHdr, &u32CRC); if (VBOX_FAILURE(rc)) return rc; if (u32CRC != pHdr->u32CRC) { Log(("SSM: Invalid CRC! Calculated %#08x, in header %#08x\n", u32CRC, pHdr->u32CRC)); return VERR_SSM_INTEGRITY_CRC; } /* * Verify Virtual Machine UUID. */ RTUUID Uuid; memset(&Uuid, 0, sizeof(Uuid)); /** @todo get machine uuids CFGGetUuid(, &Uuid); */ if ( RTUuidCompare(&pHdr->MachineUuid, &Uuid) && !RTUuidIsNull(&pHdr->MachineUuid)) /* temporary hack, allowing NULL uuids. */ { Log(("SSM: The UUID of the saved state doesn't match the running VM.\n")); return VERR_SMM_INTEGRITY_MACHINE; } return VINF_SUCCESS; } /** * Find a data unit by name. * * @returns Pointer to the unit. * @returns NULL if not found. * @param pVM VM handle. * @param pszName Data unit name. * @param u32Instance The data unit instance id. */ static PSSMUNIT ssmr3Find(PVM pVM, const char *pszName, uint32_t u32Instance) { size_t cchName = strlen(pszName); PSSMUNIT pUnit = pVM->ssm.s.pHead; while ( pUnit && ( pUnit->u32Instance != u32Instance || pUnit->cchName != cchName || memcmp(pUnit->szName, pszName, cchName))) pUnit = pUnit->pNext; return pUnit; } /** * Load VM save operation. * The caller must be the emulation thread! * * @returns VBox status. * @param pVM The VM handle. * @param pszFilename Name of the file to save the state in. * @param enmAfter What is planned after a successful load operation. * Only acceptable values are SSMAFTER_RESUME and SSMAFTER_DEBUG_IT. * @param pfnProgress Progress callback. Optional. * @param pvUser User argument for the progress callback. */ SSMR3DECL(int) SSMR3Load(PVM pVM, const char *pszFilename, SSMAFTER enmAfter, PFNVMPROGRESS pfnProgress, void *pvUser) { LogFlow(("SSMR3Load: pszFilename=%p:{%s} enmAfter=%d pfnProgress=%p pvUser=%p\n", pszFilename, pszFilename, enmAfter, pfnProgress, pvUser)); /* * Validate input. */ if ( enmAfter != SSMAFTER_RESUME && enmAfter != SSMAFTER_DEBUG_IT) { AssertMsgFailed(("Invalid enmAfter=%d!\n", enmAfter)); return VERR_INVALID_PARAMETER; } /* * Open the file. */ SSMHANDLE Handle = {0}; Handle.enmAfter = enmAfter; Handle.pVM = pVM; Handle.cbFileHdr = sizeof(SSMFILEHDR); Handle.pfnProgress = pfnProgress; Handle.pvUser = pvUser; Handle.uPercentPrepare = 20; /* reserve substantial time for validating the image */ Handle.uPercentDone = 2; int rc = RTFileOpen(&Handle.File, pszFilename, RTFILE_O_READ | RTFILE_O_OPEN | RTFILE_O_DENY_WRITE); if (VBOX_FAILURE(rc)) { Log(("SSM: Failed to open save state file '%s', rc=%Vrc.\n", pszFilename, rc)); return rc; } /* * Read file header and validate it. */ SSMFILEHDR Hdr; rc = ssmr3Validate(Handle.File, &Hdr, &Handle.cbFileHdr); if (VBOX_SUCCESS(rc)) { /* * Clear the per unit flags. */ PSSMUNIT pUnit; for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext) pUnit->fCalled = false; /* * Do the prepare run. */ Handle.rc = VINF_SUCCESS; Handle.enmOp = SSMSTATE_LOAD_PREP; for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext) { switch (pUnit->enmType) { case SSMUNITTYPE_DEV: if (pUnit->u.Dev.pfnLoadPrep) { rc = pUnit->u.Dev.pfnLoadPrep(pUnit->u.Dev.pDevIns, &Handle); pUnit->fCalled = true; } break; case SSMUNITTYPE_DRV: if (pUnit->u.Drv.pfnLoadPrep) { rc = pUnit->u.Drv.pfnLoadPrep(pUnit->u.Drv.pDrvIns, &Handle); pUnit->fCalled = true; } break; case SSMUNITTYPE_INTERNAL: if (pUnit->u.Internal.pfnLoadPrep) { rc = pUnit->u.Internal.pfnLoadPrep(pVM, &Handle); pUnit->fCalled = true; } break; case SSMUNITTYPE_EXTERNAL: if (pUnit->u.External.pfnLoadPrep) { rc = pUnit->u.External.pfnLoadPrep(&Handle, pUnit->u.External.pvUser); pUnit->fCalled = true; } break; } if (VBOX_FAILURE(rc)) { LogRel(("SSM: Prepare load failed with rc=%Vrc for data unit '%s.\n", rc, pUnit->szName)); break; } } /* pending 2% */ if (pfnProgress) pfnProgress(pVM, Handle.uPercentPrepare-1, pvUser); Handle.uPercent = Handle.uPercentPrepare; Handle.cbEstTotal = Hdr.cbFile; /* * Do the execute run. */ if (VBOX_SUCCESS(rc)) rc = RTFileSeek(Handle.File, Handle.cbFileHdr, RTFILE_SEEK_BEGIN, NULL); if (VBOX_SUCCESS(rc)) { char *pszName = NULL; size_t cchName = 0; Handle.enmOp = SSMSTATE_LOAD_EXEC; for (;;) { /* * Save the current file position and read the data unit header. */ uint64_t offUnit = RTFileTell(Handle.File); SSMFILEUNITHDR UnitHdr; rc = RTFileRead(Handle.File, &UnitHdr, RT_OFFSETOF(SSMFILEUNITHDR, szName), NULL); if (VBOX_SUCCESS(rc)) { /* * Check the magic and see if it's valid and whether it is a end header or not. */ if (memcmp(&UnitHdr.achMagic[0], SSMFILEUNITHDR_MAGIC, sizeof(SSMFILEUNITHDR_MAGIC))) { if (!memcmp(&UnitHdr.achMagic[0], SSMFILEUNITHDR_END, sizeof(SSMFILEUNITHDR_END))) { Log(("SSM: EndOfFile: offset %#9llx size %9d\n", offUnit, UnitHdr.cbUnit)); /* Complete the progress bar (pending 99% afterwards). */ Handle.offEstUnitEnd = Handle.cbEstTotal; ssmR3Progress(&Handle, Handle.cbEstTotal - Handle.offEst); break; } LogRel(("SSM: Invalid unit magic at offset %#llx (%lld), '%.*s'!\n", offUnit, offUnit, sizeof(UnitHdr.achMagic) - 1, &UnitHdr.achMagic[0])); rc = VERR_SSM_INTEGRITY_UNIT_MAGIC; break; } /* * Read the name. * Adjust the name buffer first. */ if (cchName < UnitHdr.cchName) { if (pszName) RTMemTmpFree(pszName); cchName = RT_ALIGN_Z(UnitHdr.cchName, 64); pszName = (char *)RTMemTmpAlloc(cchName); } if (pszName) { rc = RTFileRead(Handle.File, pszName, UnitHdr.cchName, NULL); if (VBOX_SUCCESS(rc)) { if (!pszName[UnitHdr.cchName - 1]) { Log(("SSM: Data unit: offset %#9llx size %9lld '%s'\n", offUnit, UnitHdr.cbUnit, pszName)); /* * Progress */ Handle.offEstUnitEnd += UnitHdr.cbUnit; /* * Find the data unit in our internal table. */ pUnit = ssmr3Find(pVM, pszName, UnitHdr.u32Instance); if (pUnit) { /* * Call the execute handler. */ Handle.cbUnitLeft = UnitHdr.cbUnit - RT_OFFSETOF(SSMFILEUNITHDR, szName[UnitHdr.cchName]); switch (pUnit->enmType) { case SSMUNITTYPE_DEV: if (pUnit->u.Dev.pfnLoadExec) rc = pUnit->u.Dev.pfnLoadExec(pUnit->u.Dev.pDevIns, &Handle, UnitHdr.u32Version); else rc = VERR_SSM_NO_LOAD_EXEC; break; case SSMUNITTYPE_DRV: if (pUnit->u.Drv.pfnLoadExec) rc = pUnit->u.Drv.pfnLoadExec(pUnit->u.Drv.pDrvIns, &Handle, UnitHdr.u32Version); else rc = VERR_SSM_NO_LOAD_EXEC; break; case SSMUNITTYPE_INTERNAL: if (pUnit->u.Internal.pfnLoadExec) rc = pUnit->u.Internal.pfnLoadExec(pVM, &Handle, UnitHdr.u32Version); else rc = VERR_SSM_NO_LOAD_EXEC; break; case SSMUNITTYPE_EXTERNAL: if (pUnit->u.External.pfnLoadExec) { rc = pUnit->u.External.pfnLoadExec(&Handle, pUnit->u.External.pvUser, UnitHdr.u32Version); if (!rc) rc = Handle.rc; } else rc = VERR_SSM_NO_LOAD_EXEC; break; } if (rc != VERR_SSM_NO_LOAD_EXEC) { /* * Close the reader stream. */ if (Handle.pZipDecomp) ssmr3ReadFinish(&Handle); pUnit->fCalled = true; if (VBOX_SUCCESS(rc)) rc = Handle.rc; if (VBOX_SUCCESS(rc)) { /* * Now, we'll check the current position to see if all, or * more than all, the data was read. * * Note! Because of buffering / compression we'll only see the * really bad ones here. */ uint64_t off = RTFileTell(Handle.File); int64_t i64Diff = off - (offUnit + UnitHdr.cbUnit); if (i64Diff < 0) { Log(("SSM: Unit '%s' left %lld bytes unread!\n", pszName, -i64Diff)); rc = RTFileSeek(Handle.File, offUnit + UnitHdr.cbUnit, RTFILE_SEEK_BEGIN, NULL); } else if (i64Diff > 0) { LogRel(("SSM: Unit '%s' read %lld bytes too much!\n", pszName, i64Diff)); rc = VERR_SSM_INTEGRITY; break; } /* Advance the progress bar to the end of the block. */ ssmR3Progress(&Handle, Handle.offEstUnitEnd - Handle.offEst); } else { /* * We failed, but if loading for the debugger ignore certain failures * just to get it all loaded (big hack). */ LogRel(("SSM: LoadExec failed with rc=%Vrc for unit '%s'!\n", rc, pszName)); if ( Handle.enmAfter != SSMAFTER_DEBUG_IT || rc != VERR_SSM_LOADED_TOO_MUCH) break; Handle.rc = rc = VINF_SUCCESS; ssmR3Progress(&Handle, Handle.offEstUnitEnd - Handle.offEst); } } else { LogRel(("SSM: No load exec callback for unit '%s'!\n", pszName)); rc = VERR_SSM_INTEGRITY; break; } } else { /* * SSM unit wasn't found - ignore this when loading for the debugger. */ LogRel(("SSM: Found no handler for unit '%s'!\n", pszName)); rc = VERR_SSM_INTEGRITY_UNIT_NOT_FOUND; if (Handle.enmAfter != SSMAFTER_DEBUG_IT) break; rc = RTFileSeek(Handle.File, offUnit + UnitHdr.cbUnit, RTFILE_SEEK_BEGIN, NULL); } } else { LogRel(("SSM: Unit name '%.*s' was not properly terminated.\n", UnitHdr.cchName, pszName)); rc = VERR_SSM_INTEGRITY; break; } } } else rc = VERR_NO_TMP_MEMORY; } /* * I/O errors ends up here (yea, I know, very nice programming). */ if (VBOX_FAILURE(rc)) { LogRel(("SSM: I/O error. rc=%Vrc\n", rc)); break; } } } /* (progress should be pending 99% now) */ AssertMsg(VBOX_FAILURE(rc) || Handle.uPercent == (101-Handle.uPercentDone), ("%d\n", Handle.uPercent)); /* * Do the done run. */ Handle.rc = rc; Handle.enmOp = SSMSTATE_LOAD_DONE; for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext) { rc = VINF_SUCCESS; switch (pUnit->enmType) { case SSMUNITTYPE_DEV: if ( pUnit->u.Dev.pfnLoadDone && ( pUnit->fCalled || (!pUnit->u.Dev.pfnLoadPrep && !pUnit->u.Dev.pfnLoadExec))) rc = pUnit->u.Dev.pfnLoadDone(pUnit->u.Dev.pDevIns, &Handle); break; case SSMUNITTYPE_DRV: if ( pUnit->u.Drv.pfnLoadDone && ( pUnit->fCalled || (!pUnit->u.Drv.pfnLoadPrep && !pUnit->u.Drv.pfnLoadExec))) rc = pUnit->u.Drv.pfnLoadDone(pUnit->u.Drv.pDrvIns, &Handle); break; case SSMUNITTYPE_INTERNAL: if (pUnit->u.Internal.pfnLoadDone && ( pUnit->fCalled || (!pUnit->u.Internal.pfnLoadPrep && !pUnit->u.Internal.pfnLoadExec))) rc = pUnit->u.Internal.pfnLoadDone(pVM, &Handle); break; case SSMUNITTYPE_EXTERNAL: if (pUnit->u.External.pfnLoadDone && ( pUnit->fCalled || (!pUnit->u.Internal.pfnLoadPrep && !pUnit->u.Internal.pfnLoadExec))) rc = pUnit->u.External.pfnLoadDone(&Handle, pUnit->u.External.pvUser); break; } if (VBOX_FAILURE(rc)) { LogRel(("SSM: Done load failed with rc=%Vrc for data unit '%s'.\n", rc, pUnit->szName)); if (VBOX_SUCCESS(Handle.rc)) Handle.rc = rc; } } rc = Handle.rc; /* progress */ if (pfnProgress) pfnProgress(pVM, 99, pvUser); } /* * Done */ int rc2 = RTFileClose(Handle.File); AssertRC(rc2); if (VBOX_SUCCESS(rc)) { /* progress */ if (pfnProgress) pfnProgress(pVM, 100, pvUser); Log(("SSM: Load of '%s' completed!\n", pszFilename)); Log(("\n\n\n")); DBGFR3InfoLog(pVM, "cpum", "verbose"); DBGFR3InfoLog(pVM, "timers", NULL); DBGFR3InfoLog(pVM, "activetimers", NULL); DBGFR3InfoLog(pVM, "ioport", NULL); DBGFR3InfoLog(pVM, "mmio", NULL); DBGFR3InfoLog(pVM, "phys", NULL); Log(("\n\n\n")); } return rc; } /** * Validates a file as a validate SSM saved state. * * This will only verify the file format, the format and content of individual * data units are not inspected. * * @returns VINF_SUCCESS if valid. * @returns VBox status code on other failures. * @param pszFilename The path to the file to validate. */ SSMR3DECL(int) SSMR3ValidateFile(const char *pszFilename) { LogFlow(("SSMR3ValidateFile: pszFilename=%p:{%s}\n", pszFilename, pszFilename)); /* * Try open the file and validate it. */ RTFILE File; int rc = RTFileOpen(&File, pszFilename, RTFILE_O_READ | RTFILE_O_OPEN | RTFILE_O_DENY_WRITE); if (VBOX_SUCCESS(rc)) { size_t cbFileHdr; SSMFILEHDR Hdr; rc = ssmr3Validate(File, &Hdr, &cbFileHdr); RTFileClose(File); } else Log(("SSM: Failed to open saved state file '%s', rc=%Vrc.\n", pszFilename, rc)); return rc; } /** * Opens a saved state file for reading. * * @returns VBox status code. * @param pszFilename The path to the saved state file. * @param fFlags Open flags. Reserved, must be 0. * @param ppSSM Where to store the SSM handle. */ SSMR3DECL(int) SSMR3Open(const char *pszFilename, unsigned fFlags, PSSMHANDLE *ppSSM) { LogFlow(("SSMR3Open: pszFilename=%p:{%s} fFlags=%#x ppSSM=%p\n", pszFilename, pszFilename, fFlags, ppSSM)); /* * Validate input. */ AssertMsgReturn(VALID_PTR(pszFilename), ("%p\n", pszFilename), VERR_INVALID_PARAMETER); AssertMsgReturn(!fFlags, ("%#x\n", fFlags), VERR_INVALID_PARAMETER); AssertMsgReturn(VALID_PTR(ppSSM), ("%p\n", ppSSM), VERR_INVALID_PARAMETER); /* * Allocate a handle. */ PSSMHANDLE pSSM = (PSSMHANDLE)RTMemAllocZ(sizeof(*pSSM)); AssertReturn(pSSM, VERR_NO_MEMORY); /* * Try open the file and validate it. */ int rc = RTFileOpen(&pSSM->File, pszFilename, RTFILE_O_READ | RTFILE_O_OPEN | RTFILE_O_DENY_WRITE); if (VBOX_SUCCESS(rc)) { SSMFILEHDR Hdr; size_t cbFileHdr; rc = ssmr3Validate(pSSM->File, &Hdr, &cbFileHdr); if (VBOX_SUCCESS(rc)) { //pSSM->pVM = NULL; pSSM->cbFileHdr = cbFileHdr; pSSM->enmOp = SSMSTATE_OPEN_READ; pSSM->enmAfter = SSMAFTER_OPENED; pSSM->uPercentPrepare = 20; /* reserve substantial time for validating the image */ pSSM->uPercentDone = 2; //pSSM->rc = VINF_SUCCESS; //pSSM->pZipComp = NULL; //pSSM->pZipDecomp = NULL; //pSSM->cbUnitLeft = 0; //pSSM->pfnProgress = NULL; //pSSM->pvUser = NULL; //pSSM->uPercent = 0; //pSSM->offEstProgress= 0; //pSSM->cbEstTotal = 0; //pSSM->offEst = 0; //pSSM->offEstUnitEnd = 0; *ppSSM = pSSM; LogFlow(("SSMR3Open: returns VINF_SUCCESS *ppSSM=%p\n", *ppSSM)); return VINF_SUCCESS; } Log(("SSMR3Open: Validation of '%s' failed, rc=%Vrc.\n", pszFilename, rc)); RTFileClose(pSSM->File); } else Log(("SSMR3Open: Failed to open saved state file '%s', rc=%Vrc.\n", pszFilename, rc)); RTMemFree(pSSM); return rc; } /** * Closes a saved state file opened by SSMR3Open(). * * @returns VBox status code. * @param pSSM The SSM handle returned by SSMR3Open(). */ SSMR3DECL(int) SSMR3Close(PSSMHANDLE pSSM) { LogFlow(("SSMR3Close: pSSM=%p\n", pSSM)); /* * Validate input. */ AssertMsgReturn(VALID_PTR(pSSM), ("%p\n", pSSM), VERR_INVALID_PARAMETER); AssertMsgReturn(pSSM->enmAfter == SSMAFTER_OPENED, ("%d\n", pSSM->enmAfter),VERR_INVALID_PARAMETER); AssertMsgReturn(pSSM->enmOp == SSMSTATE_OPEN_READ, ("%d\n", pSSM->enmOp), VERR_INVALID_PARAMETER); /* * Close the file and free the handle. */ int rc = RTFileClose(pSSM->File); AssertRC(rc); RTMemFree(pSSM); return rc; } /** * Seeks to a specific data unit. * * After seeking it's possible to use the getters to on * that data unit. * * @returns VBox status code. * @returns VERR_SSM_UNIT_NOT_FOUND if the unit+instance wasn't found. * @param pSSM The SSM handle returned by SSMR3Open(). * @param pszUnit The name of the data unit. * @param iInstance The instance number. * @param piVersion Where to store the version number. (Optional) */ SSMR3DECL(int) SSMR3Seek(PSSMHANDLE pSSM, const char *pszUnit, uint32_t iInstance, uint32_t *piVersion) { LogFlow(("SSMR3Seek: pSSM=%p pszUnit=%p:{%s} iInstance=%RU32 piVersion=%p\n", pSSM, pszUnit, pszUnit, iInstance, piVersion)); /* * Validate input. */ AssertMsgReturn(VALID_PTR(pSSM), ("%p\n", pSSM), VERR_INVALID_PARAMETER); AssertMsgReturn(pSSM->enmAfter == SSMAFTER_OPENED, ("%d\n", pSSM->enmAfter),VERR_INVALID_PARAMETER); AssertMsgReturn(pSSM->enmOp == SSMSTATE_OPEN_READ, ("%d\n", pSSM->enmOp), VERR_INVALID_PARAMETER); AssertMsgReturn(VALID_PTR(pszUnit), ("%p\n", pszUnit), VERR_INVALID_POINTER); AssertMsgReturn(!piVersion || VALID_PTR(piVersion), ("%p\n", piVersion), VERR_INVALID_POINTER); /* * Reset the state. */ if (pSSM->pZipDecomp) { RTZipDecompDestroy(pSSM->pZipDecomp); pSSM->pZipDecomp = NULL; } pSSM->rc = VERR_SSM_UNIT_NOT_FOUND; pSSM->cbUnitLeft = 0; /* * Walk the data units until we find EOF or a match. */ size_t cchUnit = strlen(pszUnit) + 1; int rc = VINF_SUCCESS; char *pszName = NULL; size_t cchName = 0; SSMFILEUNITHDR UnitHdr; for (RTFOFF off = pSSM->cbFileHdr; ; off += UnitHdr.cbUnit) { /* * Read the unit header and verify it. */ rc = RTFileReadAt(pSSM->File, off, &UnitHdr, RT_OFFSETOF(SSMFILEUNITHDR, szName), NULL); AssertRC(rc); if (VBOX_SUCCESS(rc)) { if (!memcmp(&UnitHdr.achMagic[0], SSMFILEUNITHDR_MAGIC, sizeof(SSMFILEUNITHDR_MAGIC))) { /* * Does it match thus far or should we just skip along? */ if ( UnitHdr.u32Instance != iInstance && UnitHdr.cchName != cchUnit) continue; /* * Read the name. * Adjust the name buffer first. */ if (cchName < UnitHdr.cchName) { if (pszName) RTMemTmpFree(pszName); cchName = RT_ALIGN_Z(UnitHdr.cchName, 64); pszName = (char *)RTMemTmpAlloc(cchName); } rc = VERR_NO_MEMORY; if (pszName) { rc = RTFileRead(pSSM->File, pszName, UnitHdr.cchName, NULL); AssertRC(rc); if (VBOX_SUCCESS(rc)) { if (!pszName[UnitHdr.cchName - 1]) { /* * Does the name match? If not continue with the next item. */ if (memcmp(pszName, pszUnit, cchUnit)) continue; pSSM->rc = rc = VINF_SUCCESS; pSSM->cbUnitLeft = UnitHdr.cbUnit - RT_OFFSETOF(SSMFILEUNITHDR, szName[UnitHdr.cchName]); if (piVersion) *piVersion = UnitHdr.u32Version; } else { AssertMsgFailed((" Unit name '%.*s' was not properly terminated.\n", UnitHdr.cchName, pszName)); rc = VERR_SSM_INTEGRITY; } } } } else { if (!memcmp(&UnitHdr.achMagic[0], SSMFILEUNITHDR_END, sizeof(SSMFILEUNITHDR_END))) rc = VERR_SSM_UNIT_NOT_FOUND; else { AssertMsgFailed(("Invalid unit magic at offset %RTfoff, '%.*s'!\n", off, sizeof(UnitHdr.achMagic) - 1, &UnitHdr.achMagic[0])); rc = VERR_SSM_INTEGRITY_UNIT_MAGIC; } } } /* error or success, two continue statements cover the iterating */ break; } RTMemFree(pszName); return rc; } /** * Finishes a data unit. * All buffers and compressor instances are flushed and destroyed. * * @returns VBox status. * @param pSSM SSM operation handle. */ static int ssmr3WriteFinish(PSSMHANDLE pSSM) { //Log2(("ssmr3WriteFinish: %#010llx start\n", RTFileTell(pSSM->File))); if (!pSSM->pZipComp) return VINF_SUCCESS; int rc = RTZipCompFinish(pSSM->pZipComp); if (VBOX_SUCCESS(rc)) { rc = RTZipCompDestroy(pSSM->pZipComp); if (VBOX_SUCCESS(rc)) { pSSM->pZipComp = NULL; //Log2(("ssmr3WriteFinish: %#010llx done\n", RTFileTell(pSSM->File))); return VINF_SUCCESS; } } if (VBOX_SUCCESS(pSSM->rc)) pSSM->rc = rc; Log2(("ssmr3WriteFinish: failure rc=%Vrc\n", rc)); return rc; } /** * Writes something to the current data item in the saved state file. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pvBuf The bits to write. * @param cbBuf The number of bytes to write. */ static int ssmr3Write(PSSMHANDLE pSSM, const void *pvBuf, size_t cbBuf) { Log2(("ssmr3Write: pvBuf=%p cbBuf=%#x %.*Vhxs%s\n", pvBuf, cbBuf, RT_MIN(cbBuf, 128), pvBuf, cbBuf > 128 ? "..." : "")); /* * Check that everything is fine. */ if (VBOX_SUCCESS(pSSM->rc)) { /* * First call starts the compression. */ if (!pSSM->pZipComp) { //int rc = RTZipCompCreate(&pSSM->pZipComp, pSSM, ssmr3WriteOut, RTZIPTYPE_ZLIB, RTZIPLEVEL_FAST); int rc = RTZipCompCreate(&pSSM->pZipComp, pSSM, ssmr3WriteOut, RTZIPTYPE_LZF, RTZIPLEVEL_FAST); if (VBOX_FAILURE(rc)) return rc; } /* * Write the data item in 128kb chunks for progress indicator reasons. */ while (cbBuf > 0) { size_t cbChunk = RT_MIN(cbBuf, 128*1024); pSSM->rc = RTZipCompress(pSSM->pZipComp, pvBuf, cbChunk); if (VBOX_FAILURE(pSSM->rc)) break; ssmR3Progress(pSSM, cbChunk); cbBuf -= cbChunk; pvBuf = (char *)pvBuf + cbChunk; } } return pSSM->rc; } /** * Callback for flusing the output buffer of a compression stream. * * @returns VBox status. * @param pvSSM SSM operation handle. * @param pvBuf Compressed data. * @param cbBuf Size of the compressed data. */ static DECLCALLBACK(int) ssmr3WriteOut(void *pvSSM, const void *pvBuf, size_t cbBuf) { //Log2(("ssmr3WriteOut: %#010llx cbBuf=%#x\n", RTFileTell(((PSSMHANDLE)pvSSM)->File), cbBuf)); int rc = RTFileWrite(((PSSMHANDLE)pvSSM)->File, pvBuf, cbBuf, NULL); if (VBOX_SUCCESS(rc)) return rc; Log(("ssmr3WriteOut: RTFileWrite(,,%d) -> %d\n", cbBuf, rc)); return rc; } /** * Puts a structure. * * @returns VBox status code. * @param pSSM The saved state handle. * @param pvStruct The structure address. * @param paFields The array of structure fields descriptions. * The array must be terminated by a SSMFIELD_ENTRY_TERM(). */ SSMR3DECL(int) SSMR3PutStruct(PSSMHANDLE pSSM, const void *pvStruct, PCSSMFIELD paFields) { /* begin marker. */ int rc = SSMR3PutU32(pSSM, SSMR3STRUCT_BEGIN); if (VBOX_FAILURE(rc)) return rc; /* put the fields */ for (PCSSMFIELD pCur = paFields; pCur->cb != UINT32_MAX && pCur->off != UINT32_MAX; pCur++) { rc = ssmr3Write(pSSM, (uint8_t *)pvStruct + pCur->off, pCur->cb); if (VBOX_FAILURE(rc)) return rc; } /* end marker */ return SSMR3PutU32(pSSM, SSMR3STRUCT_END); } /** * Saves a boolean item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param fBool Item to save. */ SSMR3DECL(int) SSMR3PutBool(PSSMHANDLE pSSM, bool fBool) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) { uint8_t u8 = fBool; /* enforce 1 byte size */ return ssmr3Write(pSSM, &u8, sizeof(u8)); } AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a 8-bit unsigned integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param u8 Item to save. */ SSMR3DECL(int) SSMR3PutU8(PSSMHANDLE pSSM, uint8_t u8) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &u8, sizeof(u8)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a 8-bit signed integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param i8 Item to save. */ SSMR3DECL(int) SSMR3PutS8(PSSMHANDLE pSSM, int8_t i8) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &i8, sizeof(i8)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a 16-bit unsigned integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param u16 Item to save. */ SSMR3DECL(int) SSMR3PutU16(PSSMHANDLE pSSM, uint16_t u16) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &u16, sizeof(u16)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a 16-bit signed integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param i16 Item to save. */ SSMR3DECL(int) SSMR3PutS16(PSSMHANDLE pSSM, int16_t i16) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &i16, sizeof(i16)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a 32-bit unsigned integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param u32 Item to save. */ SSMR3DECL(int) SSMR3PutU32(PSSMHANDLE pSSM, uint32_t u32) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &u32, sizeof(u32)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a 32-bit signed integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param i32 Item to save. */ SSMR3DECL(int) SSMR3PutS32(PSSMHANDLE pSSM, int32_t i32) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &i32, sizeof(i32)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a 64-bit unsigned integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param u64 Item to save. */ SSMR3DECL(int) SSMR3PutU64(PSSMHANDLE pSSM, uint64_t u64) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &u64, sizeof(u64)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a 64-bit signed integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param i64 Item to save. */ SSMR3DECL(int) SSMR3PutS64(PSSMHANDLE pSSM, int64_t i64) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &i64, sizeof(i64)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a 128-bit unsigned integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param u128 Item to save. */ SSMR3DECL(int) SSMR3PutU128(PSSMHANDLE pSSM, uint128_t u128) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &u128, sizeof(u128)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a 128-bit signed integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param i128 Item to save. */ SSMR3DECL(int) SSMR3PutS128(PSSMHANDLE pSSM, int128_t i128) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &i128, sizeof(i128)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a VBox unsigned integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param u Item to save. */ SSMR3DECL(int) SSMR3PutUInt(PSSMHANDLE pSSM, RTUINT u) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &u, sizeof(u)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a VBox signed integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param i Item to save. */ SSMR3DECL(int) SSMR3PutSInt(PSSMHANDLE pSSM, RTINT i) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &i, sizeof(i)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a GC natural unsigned integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param u Item to save. */ SSMR3DECL(int) SSMR3PutGCUInt(PSSMHANDLE pSSM, RTGCUINT u) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &u, sizeof(u)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a GC natural signed integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param i Item to save. */ SSMR3DECL(int) SSMR3PutGCSInt(PSSMHANDLE pSSM, RTGCINT i) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &i, sizeof(i)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a 32 bits GC physical address item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param GCPhys The item to save */ SSMR3DECL(int) SSMR3PutGCPhys32(PSSMHANDLE pSSM, RTGCPHYS32 GCPhys) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &GCPhys, sizeof(GCPhys)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a 64 bits GC physical address item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param GCPhys The item to save */ SSMR3DECL(int) SSMR3PutGCPhys64(PSSMHANDLE pSSM, RTGCPHYS64 GCPhys) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &GCPhys, sizeof(GCPhys)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a GC physical address item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param GCPhys The item to save */ SSMR3DECL(int) SSMR3PutGCPhys(PSSMHANDLE pSSM, RTGCPHYS GCPhys) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &GCPhys, sizeof(GCPhys)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a GC virtual address item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param GCPtr The item to save. */ SSMR3DECL(int) SSMR3PutGCPtr(PSSMHANDLE pSSM, RTGCPTR GCPtr) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &GCPtr, sizeof(GCPtr)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a GC virtual address (represented as an unsigned integer) item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param GCPtr The item to save. */ SSMR3DECL(int) SSMR3PutGCUIntPtr(PSSMHANDLE pSSM, RTGCUINTPTR GCPtr) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &GCPtr, sizeof(GCPtr)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a HC natural unsigned integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param u Item to save. */ SSMR3DECL(int) SSMR3PutHCUInt(PSSMHANDLE pSSM, RTHCUINT u) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &u, sizeof(u)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a HC natural signed integer item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param i Item to save. */ SSMR3DECL(int) SSMR3PutHCSInt(PSSMHANDLE pSSM, RTHCINT i) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &i, sizeof(i)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a I/O port address item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param IOPort The item to save. */ SSMR3DECL(int) SSMR3PutIOPort(PSSMHANDLE pSSM, RTIOPORT IOPort) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &IOPort, sizeof(IOPort)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a selector item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param Sel The item to save. */ SSMR3DECL(int) SSMR3PutSel(PSSMHANDLE pSSM, RTSEL Sel) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, &Sel, sizeof(Sel)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a memory item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pv Item to save. * @param cb Size of the item. */ SSMR3DECL(int) SSMR3PutMem(PSSMHANDLE pSSM, const void *pv, size_t cb) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) return ssmr3Write(pSSM, pv, cb); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Saves a zero terminated string item to the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param psz Item to save. */ SSMR3DECL(int) SSMR3PutStrZ(PSSMHANDLE pSSM, const char *psz) { if (pSSM->enmOp == SSMSTATE_SAVE_EXEC) { size_t cch = strlen(psz); if (cch > 1024*1024) { AssertMsgFailed(("a %d byte long string, what's this!?!\n")); return VERR_TOO_MUCH_DATA; } uint32_t u32 = (uint32_t)cch; int rc = ssmr3Write(pSSM, &u32, sizeof(u32)); if (rc) return rc; return ssmr3Write(pSSM, psz, cch); } AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Closes the decompressor of a data unit. * * @param pSSM SSM operation handle. */ static void ssmr3ReadFinish(PSSMHANDLE pSSM) { int rc = RTZipDecompDestroy(pSSM->pZipDecomp); AssertRC(rc); pSSM->pZipDecomp = NULL; } /** * Internal read worker. * * @param pSSM SSM operation handle. * @param pvBuf Where to store the read data. * @param cbBuf Number of bytes to read. */ static int ssmr3Read(PSSMHANDLE pSSM, void *pvBuf, size_t cbBuf) { /* * Check that everything is fine. */ if (VBOX_SUCCESS(pSSM->rc)) { /* * Open the decompressor on the first read. */ if (!pSSM->pZipDecomp) { pSSM->rc = RTZipDecompCreate(&pSSM->pZipDecomp, pSSM, ssmr3ReadIn); if (VBOX_FAILURE(pSSM->rc)) return pSSM->rc; } /* * Do the requested read. * Use 32kb chunks to work the progress indicator. */ pSSM->rc = RTZipDecompress(pSSM->pZipDecomp, pvBuf, cbBuf, NULL); if (VBOX_SUCCESS(pSSM->rc)) Log2(("ssmr3Read: pvBuf=%p cbBuf=%#x %.*Vhxs%s\n", pvBuf, cbBuf, RT_MIN(cbBuf, 128), pvBuf, cbBuf > 128 ? "..." : "")); else AssertMsgFailed(("rc=%Vrc cbBuf=%#x\n", pSSM->rc, cbBuf)); } return pSSM->rc; } /** * Callback for reading compressed data into the input buffer of the * decompressor. * * @returns VBox status code. * @param pvSSM The SSM handle. * @param pvBuf Where to store the compressed data. * @param cbBuf Size of the buffer. * @param pcbRead Number of bytes actually stored in the buffer. */ static DECLCALLBACK(int) ssmr3ReadIn(void *pvSSM, void *pvBuf, size_t cbBuf, size_t *pcbRead) { PSSMHANDLE pSSM = (PSSMHANDLE)pvSSM; size_t cbRead = cbBuf; if (pSSM->cbUnitLeft < cbBuf) cbRead = (size_t)pSSM->cbUnitLeft; if (cbRead) { //Log2(("ssmr3ReadIn: %#010llx cbBug=%#x cbRead=%#x\n", RTFileTell(pSSM->File), cbBuf, cbRead)); int rc = RTFileRead(pSSM->File, pvBuf, cbRead, NULL); if (VBOX_SUCCESS(rc)) { pSSM->cbUnitLeft -= cbRead; if (pcbRead) *pcbRead = cbRead; ssmR3Progress(pSSM, cbRead); return VINF_SUCCESS; } Log(("ssmr3ReadIn: RTFileRead(,,%d) -> %d\n", cbRead, rc)); return rc; } /** @todo weed out lazy saving */ if (pSSM->enmAfter != SSMAFTER_DEBUG_IT) AssertMsgFailed(("SSM: attempted reading more than the unit!\n")); return VERR_SSM_LOADED_TOO_MUCH; } /** * Gets a structure. * * @returns VBox status code. * @param pSSM The saved state handle. * @param pvStruct The structure address. * @param paFields The array of structure fields descriptions. * The array must be terminated by a SSMFIELD_ENTRY_TERM(). */ SSMR3DECL(int) SSMR3GetStruct(PSSMHANDLE pSSM, void *pvStruct, PCSSMFIELD paFields) { /* begin marker. */ uint32_t u32Magic; int rc = SSMR3GetU32(pSSM, &u32Magic); if (VBOX_FAILURE(rc)) return rc; if (u32Magic != SSMR3STRUCT_BEGIN) AssertMsgFailedReturn(("u32Magic=%#RX32\n", u32Magic), VERR_SSM_STRUCTURE_MAGIC); /* put the fields */ for (PCSSMFIELD pCur = paFields; pCur->cb != UINT32_MAX && pCur->off != UINT32_MAX; pCur++) { rc = ssmr3Read(pSSM, (uint8_t *)pvStruct + pCur->off, pCur->cb); if (VBOX_FAILURE(rc)) return rc; } /* end marker */ rc = SSMR3GetU32(pSSM, &u32Magic); if (VBOX_FAILURE(rc)) return rc; if (u32Magic != SSMR3STRUCT_END) AssertMsgFailedReturn(("u32Magic=%#RX32\n", u32Magic), VERR_SSM_STRUCTURE_MAGIC); return rc; } /** * Loads a boolean item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pfBool Where to store the item. */ SSMR3DECL(int) SSMR3GetBool(PSSMHANDLE pSSM, bool *pfBool) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) { uint8_t u8; /* see SSMR3PutBool */ int rc = ssmr3Read(pSSM, &u8, sizeof(u8)); if (VBOX_SUCCESS(rc)) { Assert(u8 <= 1); *pfBool = !!u8; } return rc; } AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a 8-bit unsigned integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pu8 Where to store the item. */ SSMR3DECL(int) SSMR3GetU8(PSSMHANDLE pSSM, uint8_t *pu8) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pu8, sizeof(*pu8)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a 8-bit signed integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pi8 Where to store the item. */ SSMR3DECL(int) SSMR3GetS8(PSSMHANDLE pSSM, int8_t *pi8) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pi8, sizeof(*pi8)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a 16-bit unsigned integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pu16 Where to store the item. */ SSMR3DECL(int) SSMR3GetU16(PSSMHANDLE pSSM, uint16_t *pu16) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pu16, sizeof(*pu16)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a 16-bit signed integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pi16 Where to store the item. */ SSMR3DECL(int) SSMR3GetS16(PSSMHANDLE pSSM, int16_t *pi16) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pi16, sizeof(*pi16)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a 32-bit unsigned integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pu32 Where to store the item. */ SSMR3DECL(int) SSMR3GetU32(PSSMHANDLE pSSM, uint32_t *pu32) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pu32, sizeof(*pu32)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a 32-bit signed integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pi32 Where to store the item. */ SSMR3DECL(int) SSMR3GetS32(PSSMHANDLE pSSM, int32_t *pi32) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pi32, sizeof(*pi32)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a 64-bit unsigned integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pu64 Where to store the item. */ SSMR3DECL(int) SSMR3GetU64(PSSMHANDLE pSSM, uint64_t *pu64) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pu64, sizeof(*pu64)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a 64-bit signed integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pi64 Where to store the item. */ SSMR3DECL(int) SSMR3GetS64(PSSMHANDLE pSSM, int64_t *pi64) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pi64, sizeof(*pi64)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a 128-bit unsigned integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pu128 Where to store the item. */ SSMR3DECL(int) SSMR3GetU128(PSSMHANDLE pSSM, uint128_t *pu128) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pu128, sizeof(*pu128)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a 128-bit signed integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pi128 Where to store the item. */ SSMR3DECL(int) SSMR3GetS128(PSSMHANDLE pSSM, int128_t *pi128) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pi128, sizeof(*pi128)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a VBox unsigned integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pu Where to store the integer. */ SSMR3DECL(int) SSMR3GetUInt(PSSMHANDLE pSSM, PRTUINT pu) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pu, sizeof(*pu)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a VBox signed integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pi Where to store the integer. */ SSMR3DECL(int) SSMR3GetSInt(PSSMHANDLE pSSM, PRTINT pi) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pi, sizeof(*pi)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a GC natural unsigned integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pu Where to store the integer. */ SSMR3DECL(int) SSMR3GetGCUInt(PSSMHANDLE pSSM, PRTGCUINT pu) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pu, sizeof(*pu)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a GC natural signed integer item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pi Where to store the integer. */ SSMR3DECL(int) SSMR3GetGCSInt(PSSMHANDLE pSSM, PRTGCINT pi) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pi, sizeof(*pi)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a 32 bits GC physical address item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pGCPhys Where to store the GC physical address. */ SSMR3DECL(int) SSMR3GetGCPhys32(PSSMHANDLE pSSM, PRTGCPHYS32 pGCPhys) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pGCPhys, sizeof(*pGCPhys)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a 64 bits GC physical address item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pGCPhys Where to store the GC physical address. */ SSMR3DECL(int) SSMR3GetGCPhys64(PSSMHANDLE pSSM, PRTGCPHYS64 pGCPhys) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pGCPhys, sizeof(*pGCPhys)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a GC physical address item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pGCPhys Where to store the GC physical address. */ SSMR3DECL(int) SSMR3GetGCPhys(PSSMHANDLE pSSM, PRTGCPHYS pGCPhys) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pGCPhys, sizeof(*pGCPhys)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a GC virtual address item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pGCPtr Where to store the GC virtual address. */ SSMR3DECL(int) SSMR3GetGCPtr(PSSMHANDLE pSSM, PRTGCPTR pGCPtr) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pGCPtr, sizeof(*pGCPtr)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a GC virtual address (represented as unsigned integer) item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pGCPtr Where to store the GC virtual address. */ SSMR3DECL(int) SSMR3GetGCUIntPtr(PSSMHANDLE pSSM, PRTGCUINTPTR pGCPtr) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pGCPtr, sizeof(*pGCPtr)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a I/O port address item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pIOPort Where to store the I/O port address. */ SSMR3DECL(int) SSMR3GetIOPort(PSSMHANDLE pSSM, PRTIOPORT pIOPort) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pIOPort, sizeof(*pIOPort)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a selector item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pSel Where to store the selector. */ SSMR3DECL(int) SSMR3GetSel(PSSMHANDLE pSSM, PRTSEL pSel) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pSel, sizeof(*pSel)); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a memory item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param pv Where to store the item. * @param cb Size of the item. */ SSMR3DECL(int) SSMR3GetMem(PSSMHANDLE pSSM, void *pv, size_t cb) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) return ssmr3Read(pSSM, pv, cb); AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Loads a string item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param psz Where to store the item. * @param cbMax Max size of the item (including '\\0'). */ SSMR3DECL(int) SSMR3GetStrZ(PSSMHANDLE pSSM, char *psz, size_t cbMax) { return SSMR3GetStrZEx(pSSM, psz, cbMax, NULL); } /** * Loads a string item from the current data unit. * * @returns VBox status. * @param pSSM SSM operation handle. * @param psz Where to store the item. * @param cbMax Max size of the item (including '\\0'). * @param pcbStr The length of the loaded string excluding the '\\0'. (optional) */ SSMR3DECL(int) SSMR3GetStrZEx(PSSMHANDLE pSSM, char *psz, size_t cbMax, size_t *pcbStr) { if (pSSM->enmOp == SSMSTATE_LOAD_EXEC || pSSM->enmOp == SSMSTATE_OPEN_READ) { /* read size prefix. */ uint32_t u32; int rc = SSMR3GetU32(pSSM, &u32); if (VBOX_SUCCESS(rc)) { if (pcbStr) *pcbStr = u32; if (u32 < cbMax) { /* terminate and read string content. */ psz[u32] = '\0'; return ssmr3Read(pSSM, psz, u32); } return VERR_TOO_MUCH_DATA; } return rc; } AssertMsgFailed(("Invalid state %d\n", pSSM->enmOp)); return VERR_SSM_INVALID_STATE; } /** * Query what the VBox status code of the operation is. * * This can be used for putting and getting a batch of values * without bother checking the result till all the calls have * been made. * * @returns SSMAFTER enum value. * @param pSSM SSM operation handle. */ SSMR3DECL(int) SSMR3HandleGetStatus(PSSMHANDLE pSSM) { return pSSM->rc; } /** * Fail the load operation. * * This is mainly intended for sub item loaders (like timers) which * return code isn't necessarily heeded by the caller but is important * to SSM. * * @returns SSMAFTER enum value. * @param pSSM SSM operation handle. * @param iStatus Failure status code. This MUST be a VERR_*. */ SSMR3DECL(int) SSMR3HandleSetStatus(PSSMHANDLE pSSM, int iStatus) { if (VBOX_FAILURE(iStatus)) { if (VBOX_SUCCESS(pSSM->rc)) pSSM->rc = iStatus; return pSSM->rc = iStatus; } AssertMsgFailed(("iStatus=%d %Vrc\n", iStatus, iStatus)); return VERR_INVALID_PARAMETER; } /** * Query what to do after this operation. * * @returns SSMAFTER enum value. * @param pSSM SSM operation handle. */ SSMR3DECL(SSMAFTER) SSMR3HandleGetAfter(PSSMHANDLE pSSM) { return pSSM->enmAfter; }