VirtualBox

source: vbox/trunk/src/VBox/VMM/SSM.cpp@ 22309

Last change on this file since 22309 was 22255, checked in by vboxsync, 15 years ago

Fixed bug that broke snapshot loading

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
File size: 214.1 KB
Line 
1/* $Id: SSM.cpp 22255 2009-08-14 12:04:14Z vboxsync $ */
2/** @file
3 * SSM - Saved State Manager.
4 */
5
6/*
7 * Copyright (C) 2006-2007 Sun Microsystems, Inc.
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 *
17 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa
18 * Clara, CA 95054 USA or visit http://www.sun.com if you need
19 * additional information or have any questions.
20 */
21
22
23/** @page pg_ssm SSM - The Saved State Manager
24 *
25 * The Saved State Manager (SSM) implements facilities for saving and loading a
26 * VM state in a structural manner using callbacks for named data units.
27 *
28 * At init time each of the VMM components, Devices, Drivers and one or two
29 * other things will register data units which they need to save and restore.
30 * Each unit have a unique name (ascii), instance number, and a set of callbacks
31 * associated with it. The name will be used to identify the unit during
32 * restore. The callbacks are for the two operations, save and restore. There
33 * are three callbacks for each of the two - a prepare, a execute and a complete
34 * - giving each component ample opportunity to perform actions both before and
35 * afterwards.
36 *
37 * The SSM provides a number of APIs for encoding and decoding the data: @see
38 * grp_ssm
39 *
40 *
41 *
42 * @section sec_ssm_live_snapshots Live Snapshots
43 *
44 * The live snapshots feature (LS) is similar to live migration (LM) and was a
45 * natural first step when implementing LM. The main differences between LS and
46 * LM are that after a live snapshot we will have a saved state file, disk image
47 * snapshots, and the VM will still be running.
48 *
49 * Compared to normal saved stated and snapshots, the difference is in that the
50 * VM is running while we do most of the saving. Prior to LS, there was only
51 * round of callback during saving, after LS there are 1 or more while the VM is
52 * still running and a final one after it has been paused. The runtime stages
53 * is executed on a dedicated thread running at at the same priority as the EMTs
54 * so that the saving doesn't starve or lose in scheduling questions. The final
55 * phase is done on EMT(0).
56 *
57 * There are a couple of common reasons why LS and LM will fail:
58 * - Memory configuration changed (PCI memory mappings).
59 * - Takes too long (LM) / Too much output (LS).
60 *
61 * FIGURE THIS: It is currently unclear who will resume the VM after it has been
62 * paused. The most efficient way to do this is by doing it before returning
63 * from the VMR3Save call and use a callback for reconfiguring the disk images.
64 * (It is more efficient because of fewer thread switches.) The more convenient
65 * way is to have main do it after calling VMR3Save.
66 *
67 *
68 * @section sec_ssm_live_migration Live Migration
69 *
70 * As mentioned in the previous section, the main differences between this and
71 * live snapshots are in where the saved state is written and what state the
72 * local VM is in afterwards - at least from the VMM point of view. The
73 * necessary administrative work - establishing the connection to the remote
74 * machine, cloning the VM config on it and doing lowlevel saved state data
75 * transfer - is taken care of by layer above the VMM (i.e. Main).
76 *
77 * The SSM data format was made streamable for the purpose of live migration
78 * (v1.2 was the last non-streamable version).
79 *
80 *
81 * @section sec_ssm_format Saved State Format
82 *
83 * The stream format starts with a header (SSMFILEHDR) that indicates the
84 * version and such things, it is followed by zero or more saved state units
85 * (name + instance + phase), and the stream concludes with a footer
86 * (SSMFILEFTR) that contains unit counts and optionally a checksum for the
87 * entire file. (In version 1.2 and earlier, the checksum was in the header and
88 * there was no footer. This meant that the header was updated after the entire
89 * file was written.)
90 *
91 * The saved state units each starts with a variable sized header
92 * (SSMFILEUNITHDRV2) that contains the name, instance and phase. The data
93 * follows the header and is encoded as records with a 2-8 byte record header
94 * indicating the type, flags and size. The first byte in the record header
95 * indicates the type and flags:
96 *
97 * - bits 0..3: Record type:
98 * - type 0: Invalid.
99 * - type 1: Terminator with CRC-32 and unit size.
100 * - type 2: Raw data record.
101 * - type 3: Raw data compressed by LZF. The data is prefixed by a 8-bit
102 * field countining the length of the uncompressed data given in
103 * 1KB units.
104 * - type 4: Zero data. The record header is followed by a 8-bit field
105 * counting the length of the zero data given in 1KB units.
106 * - type 5: Named data - length prefixed name followed by the data. This
107 * type is not implemented yet as we're missing the API part, so
108 * the type assignment is tentative.
109 * - types 6 thru 15 are current undefined.
110 * - bit 4: Important (set), can be skipped (clear).
111 * - bit 5: Undefined flag, must be zero.
112 * - bit 6: Undefined flag, must be zero.
113 * - bit 7: "magic" bit, always set.
114 *
115 * Record header byte 2 (optionally thru 7) is the size of the following data
116 * encoded in UTF-8 style. To make buffering simpler and more efficient during
117 * the save operation, the strict checks enforcing optimal encoding has been
118 * relaxed for the 2 and 3 byte encodings.
119 *
120 * (In version 1.2 and earlier the unit data was compressed and not record
121 * based. The unit header contained the compressed size of the data, i.e. it
122 * needed updating after the data was written.)
123 *
124 *
125 * @section sec_ssm_future Future Changes
126 *
127 * There are plans to extend SSM to make it easier to be both backwards and
128 * (somewhat) forwards compatible. One of the new features will be being able
129 * to classify units and data items as unimportant (added to the format in
130 * v2.0). Another suggested feature is naming data items (also added to the
131 * format in v2.0), perhaps by extending the SSMR3PutStruct API. Both features
132 * will require API changes, the naming may possibly require both buffering of
133 * the stream as well as some helper managing them.
134 */
135
136
137/*******************************************************************************
138* Header Files *
139*******************************************************************************/
140#define LOG_GROUP LOG_GROUP_SSM
141#include <VBox/ssm.h>
142#include <VBox/dbgf.h>
143#include <VBox/mm.h>
144#include "SSMInternal.h"
145#include <VBox/vm.h>
146#include <VBox/err.h>
147#include <VBox/log.h>
148#include <VBox/version.h>
149
150#include <iprt/alloc.h>
151#include <iprt/assert.h>
152#include <iprt/crc32.h>
153#include <iprt/file.h>
154#include <iprt/param.h>
155#include <iprt/thread.h>
156#include <iprt/semaphore.h>
157#include <iprt/string.h>
158#include <iprt/uuid.h>
159#include <iprt/zip.h>
160
161
162/*******************************************************************************
163* Defined Constants And Macros *
164*******************************************************************************/
165/** The special value for the final phase. */
166#define SSM_PHASE_FINAL UINT32_MAX
167
168/** The max length of a unit name. */
169#define SSM_MAX_NAME_SIZE 48
170
171/** Saved state file magic base string. */
172#define SSMFILEHDR_MAGIC_BASE "\177VirtualBox SavedState "
173/** Saved state file magic indicating version 1.x. */
174#define SSMFILEHDR_MAGIC_V1_X "\177VirtualBox SavedState V1."
175/** Saved state file v1.1 magic. */
176#define SSMFILEHDR_MAGIC_V1_1 "\177VirtualBox SavedState V1.1\n"
177/** Saved state file v1.2 magic. */
178#define SSMFILEHDR_MAGIC_V1_2 "\177VirtualBox SavedState V1.2\n\0\0\0"
179/** Saved state file v2.0 magic. */
180#define SSMFILEHDR_MAGIC_V2_0 "\177VirtualBox SavedState V2.0\n\0\0\0"
181
182/** @name SSMFILEHDR::fFlags
183 * @{ */
184/** The stream is checkesummed up to the footer using CRC-32. */
185#define SSMFILEHDR_FLAGS_STREAM_CRC32 RT_BIT_32(0)
186/** @} */
187
188/** The directory magic. */
189#define SSMFILEDIR_MAGIC "\nDir\n\0\0"
190
191/** Saved state file v2.0 magic. */
192#define SSMFILEFTR_MAGIC "\nFooter"
193
194/** Data unit magic. */
195#define SSMFILEUNITHDR_MAGIC "\nUnit\n\0"
196/** Data end marker magic. */
197#define SSMFILEUNITHDR_END "\nTheEnd"
198
199
200/** @name Record Types (data unit)
201 * @{ */
202/** The record type mask. */
203#define SSM_REC_TYPE_MASK UINT8_C(0x0f)
204/** Invalid record. */
205#define SSM_REC_TYPE_INVALID 0
206/** Normal termination record, see SSMRECTERM. */
207#define SSM_REC_TYPE_TERM 1
208/** Raw data. The data follows the size field without further ado. */
209#define SSM_REC_TYPE_RAW 2
210/** Raw data compressed by LZF.
211 * The record header is followed by a 8-bit field containing the size of the
212 * uncompressed data in 1KB units. The compressed data is after it. */
213#define SSM_REC_TYPE_RAW_LZF 3
214/** Raw zero data.
215 * The record header is followed by a 8-bit field containing the size of the
216 * zero data in 1KB units. */
217#define SSM_REC_TYPE_RAW_ZERO 4
218/** Named data items.
219 * A length prefix zero terminated string (i.e. max 255) followed by the data. */
220#define SSM_REC_TYPE_NAMED 5
221/** Macro for validating the record type.
222 * This can be used with the flags+type byte, no need to mask out the type first. */
223#define SSM_REC_TYPE_IS_VALID(u8Type) ( ((u8Type) & SSM_REC_TYPE_MASK) > SSM_REC_TYPE_INVALID \
224 && ((u8Type) & SSM_REC_TYPE_MASK) <= SSM_REC_TYPE_NAMED )
225/** @} */
226
227/** The flag mask. */
228#define SSM_REC_FLAGS_MASK UINT8_C(0xf0)
229/** The record is important if this flag is set, if clear it can be omitted. */
230#define SSM_REC_FLAGS_IMPORTANT UINT8_C(0x10)
231/** This flag is always set. */
232#define SSM_REC_FLAGS_FIXED UINT8_C(0x80)
233/** Macro for validating the flags.
234 * No need to mask the flags out of the flags+type byte before invoking this macro. */
235#define SSM_REC_FLAGS_ARE_VALID(fFlags) ( ((fFlags) & UINT8_C(0xe0)) == UINT8_C(0x80) )
236
237/** Macro for validating the type and flags byte in a data record. */
238#define SSM_REC_ARE_TYPE_AND_FLAGS_VALID(u8) ( SSM_REC_FLAGS_ARE_VALID(u8) && SSM_REC_TYPE_IS_VALID(u8) )
239
240/** @name SSMRECTERM::fFlags
241 * @{ */
242/** There is a CRC-32 value for the stream. */
243#define SSMRECTERM_FLAGS_CRC32 UINT16_C(0x0001)
244/** @} */
245
246/** Start structure magic. (Isacc Asimov) */
247#define SSMR3STRUCT_BEGIN 0x19200102
248/** End structure magic. (Isacc Asimov) */
249#define SSMR3STRUCT_END 0x19920406
250
251
252/** Number of bytes to log in Log2 and Log4 statements. */
253#define SSM_LOG_BYTES 16
254
255
256/** Macro for checking the u32CRC field of a structure.
257 * The Msg can assume there are u32ActualCRC and u32CRC in the context. */
258#define SSM_CHECK_CRC32_RET(p, cb, Msg) \
259 do \
260 { \
261 uint32_t u32CRC = (p)->u32CRC; \
262 (p)->u32CRC = 0; \
263 uint32_t u32ActualCRC = RTCrc32((p), (cb)); \
264 (p)->u32CRC = u32CRC; \
265 AssertLogRelMsgReturn(u32ActualCRC == u32CRC, Msg, VERR_SSM_INTEGRITY_CRC); \
266 } while (0)
267
268/** The number of bytes to compress is one block.
269 * Must be a multiple of 1KB. */
270#define SSM_ZIP_BLOCK_SIZE _4K
271AssertCompile(SSM_ZIP_BLOCK_SIZE / _1K * _1K == SSM_ZIP_BLOCK_SIZE);
272
273
274/*******************************************************************************
275* Structures and Typedefs *
276*******************************************************************************/
277/** SSM state. */
278typedef enum SSMSTATE
279{
280 SSMSTATE_INVALID = 0,
281 SSMSTATE_SAVE_PREP,
282 SSMSTATE_SAVE_EXEC,
283 SSMSTATE_SAVE_DONE,
284 SSMSTATE_LOAD_PREP,
285 SSMSTATE_LOAD_EXEC,
286 SSMSTATE_LOAD_DONE,
287 SSMSTATE_OPEN_READ
288} SSMSTATE;
289
290/** Pointer to a SSM stream buffer. */
291typedef struct SSMSTRMBUF *PSSMSTRMBUF;
292/**
293 * A SSM stream buffer.
294 */
295typedef struct SSMSTRMBUF
296{
297 /** The buffer data. */
298 uint8_t abData[_64K];
299
300 /** The stream position of this buffer. */
301 uint64_t offStream;
302 /** The amount of buffered data. */
303 uint32_t cb;
304 /** End of stream indicator (for read streams only). */
305 bool fEndOfStream;
306 /** Pointer to the next buffer in the chain. */
307 PSSMSTRMBUF volatile pNext;
308} SSMSTRMBUF;
309
310/**
311 * SSM stream.
312 *
313 * This is a typical producer / consumer setup with a dedicated I/O thread and
314 * fixed number of buffers for read ahead and write back.
315 */
316typedef struct SSMSTRM
317{
318 /** The file handle. */
319 RTFILE hFile;
320
321 /** Write (set) or read (clear) stream. */
322 bool fWrite;
323 /** Termination indicator. */
324 bool volatile fTerminating;
325 /** Indicates whether it is necessary to seek before the next buffer is
326 * read from the stream. This is used to avoid a seek in ssmR3StrmPeekAt. */
327 bool fNeedSeek;
328 /** Stream error status. */
329 int32_t volatile rc;
330 /** The handle of the I/O thread. This is set to nil when not active. */
331 RTTHREAD hIoThread;
332 /** Where to seek to. */
333 uint64_t offNeedSeekTo;
334
335 /** The head of the consumer queue.
336 * For save the consumer is the I/O thread. For load the I/O thread is the
337 * producer. */
338 PSSMSTRMBUF volatile pHead;
339 /** Chain of free buffers.
340 * The consumer/producer roles are the inverse of pHead. */
341 PSSMSTRMBUF volatile pFree;
342 /** Event that's signalled when pHead is updated. */
343 RTSEMEVENT hEvtHead;
344 /** Event that's signalled when pFree is updated. */
345 RTSEMEVENT hEvtFree;
346
347 /** List of pending buffers that has been dequeued from pHead and reversed. */
348 PSSMSTRMBUF pPending;
349 /** Pointer to the current buffer. */
350 PSSMSTRMBUF pCur;
351 /** The stream offset of the current buffer. */
352 uint64_t offCurStream;
353 /** The current buffer offset. */
354 uint32_t off;
355 /** Whether we're checksumming reads/writes. */
356 bool fChecksummed;
357 /** The stream CRC if fChecksummed is set. */
358 uint32_t u32StreamCRC;
359 /** How far into the buffer u32StreamCRC is up-to-date.
360 * This may lag behind off as it's desirable to checksum as large blocks as
361 * possible. */
362 uint32_t offStreamCRC;
363} SSMSTRM;
364/** Pointer to a SSM stream. */
365typedef SSMSTRM *PSSMSTRM;
366
367
368/**
369 * Handle structure.
370 */
371typedef struct SSMHANDLE
372{
373 /** Stream/buffer manager. */
374 SSMSTRM Strm;
375
376 /** The VM handle. */
377 PVM pVM;
378 /** The current operation. */
379 SSMSTATE enmOp;
380 /** What to do after save completes. (move the enum) */
381 SSMAFTER enmAfter;
382 /** The current rc of the save operation. */
383 int rc;
384 /** Number of compressed bytes left in the current data unit (V1). */
385 uint64_t cbUnitLeftV1;
386 /** The current uncompressed offset into the data unit. */
387 uint64_t offUnit;
388
389 /** Pointer to the progress callback function. */
390 PFNVMPROGRESS pfnProgress;
391 /** User specified arguemnt to the callback function. */
392 void *pvUser;
393 /** Next completion percentage. (corresponds to offEstProgress) */
394 unsigned uPercent;
395 /** The position of the next progress callback in the estimated file. */
396 uint64_t offEstProgress;
397 /** The estimated total byte count.
398 * (Only valid after the prep.) */
399 uint64_t cbEstTotal;
400 /** Current position in the estimated file. */
401 uint64_t offEst;
402 /** End of current unit in the estimated file. */
403 uint64_t offEstUnitEnd;
404 /** the amount of % we reserve for the 'prepare' phase */
405 unsigned uPercentPrepare;
406 /** the amount of % we reserve for the 'done' stage */
407 unsigned uPercentDone;
408
409 union
410 {
411 /** Write data. */
412 struct
413 {
414 /** Offset into the databuffer. */
415 uint32_t offDataBuffer;
416 /** Space for the record header. */
417 uint8_t abRecHdr[1+7];
418 /** Data buffer. */
419 uint8_t abDataBuffer[4096];
420 } Write;
421
422 /** Read data. */
423 struct
424 {
425 /** V1: The decompressor of the current data unit. */
426 PRTZIPDECOMP pZipDecompV1;
427 /** The major format version number. */
428 uint32_t uFmtVerMajor;
429 /** The minor format version number. */
430 uint32_t uFmtVerMinor;
431
432 /** V2: Unread bytes in the current record. */
433 uint32_t cbRecLeft;
434 /** V2: Bytes in the data buffer. */
435 uint32_t cbDataBuffer;
436 /** V2: Current buffer position. */
437 uint32_t offDataBuffer;
438 /** V2: End of data indicator. */
439 bool fEndOfData;
440 /** V2: The type and flags byte fo the current record. */
441 uint8_t u8TypeAndFlags;
442
443 /** RTGCPHYS size in bytes. (Only applicable when loading/reading.) */
444 unsigned cbGCPhys;
445 /** RTGCPTR size in bytes. (Only applicable when loading/reading.) */
446 unsigned cbGCPtr;
447 /** Whether cbGCPtr is fixed or settable. */
448 bool fFixedGCPtrSize;
449
450
451 /** @name Header info (set by ssmR3ValidateFile)
452 * @{ */
453 /** The size of the file header. */
454 size_t cbFileHdr;
455 /** The major version number. */
456 uint16_t u16VerMajor;
457 /** The minor version number. */
458 uint16_t u16VerMinor;
459 /** The build number. */
460 uint32_t u32VerBuild;
461 /** The SVN revision. */
462 uint32_t u32SvnRev;
463 /** 32 or 64 depending on the host. */
464 uint8_t cHostBits;
465 /** The CRC of the loaded file. */
466 uint32_t u32LoadCRC;
467 /** The size of the load file. */
468 uint64_t cbLoadFile;
469 /** @} */
470
471 /** V2: Data buffer.
472 * @remarks Be extremely careful when changing the size of this buffer! */
473 uint8_t abDataBuffer[4096];
474
475 /** V2: Decompression buffer for when we cannot use the stream buffer. */
476 uint8_t abComprBuffer[4096];
477 } Read;
478 } u;
479} SSMHANDLE;
480
481
482/**
483 * Header of the saved state file.
484 *
485 * Added in r5xxxx on 2009-07-2?, VirtualBox v3.0.51.
486 */
487typedef struct SSMFILEHDR
488{
489 /** Magic string which identifies this file as a version of VBox saved state
490 * file format (SSMFILEHDR_MAGIC_V2_0). */
491 char szMagic[32];
492 /** The major version number. */
493 uint16_t u16VerMajor;
494 /** The minor version number. */
495 uint16_t u16VerMinor;
496 /** The build number. */
497 uint32_t u32VerBuild;
498 /** The SVN revision. */
499 uint32_t u32SvnRev;
500 /** 32 or 64 depending on the host. */
501 uint8_t cHostBits;
502 /** The size of RTGCPHYS. */
503 uint8_t cbGCPhys;
504 /** The size of RTGCPTR. */
505 uint8_t cbGCPtr;
506 /** Reserved header space - must be zero. */
507 uint8_t u8Reserved;
508 /** The number of units that (may) have stored data in the file. */
509 uint32_t cUnits;
510 /** Flags, see SSMFILEHDR_FLAGS_XXX. */
511 uint32_t fFlags;
512 /** The maximum size of decompressed data. */
513 uint32_t cbMaxDecompr;
514 /** The checksum of this header.
515 * This field is set to zero when calculating the checksum. */
516 uint32_t u32CRC;
517} SSMFILEHDR;
518AssertCompileSize(SSMFILEHDR, 64);
519AssertCompileMemberOffset(SSMFILEHDR, u32CRC, 60);
520AssertCompileMemberSize(SSMFILEHDR, szMagic, sizeof(SSMFILEHDR_MAGIC_V2_0));
521/** Pointer to a saved state file header. */
522typedef SSMFILEHDR *PSSMFILEHDR;
523/** Pointer to a const saved state file header. */
524typedef SSMFILEHDR const *PCSSMFILEHDR;
525
526
527/**
528 * Header of the saved state file.
529 *
530 * Added in r40980 on 2008-12-15, VirtualBox v2.0.51.
531 *
532 * @remarks This is a superset of SSMFILEHDRV11.
533 */
534typedef struct SSMFILEHDRV12
535{
536 /** Magic string which identifies this file as a version of VBox saved state
537 * file format (SSMFILEHDR_MAGIC_V1_2). */
538 char achMagic[32];
539 /** The size of this file. Used to check
540 * whether the save completed and that things are fine otherwise. */
541 uint64_t cbFile;
542 /** File checksum. The actual calculation skips past the u32CRC field. */
543 uint32_t u32CRC;
544 /** Padding. */
545 uint32_t u32Reserved;
546 /** The machine UUID. (Ignored if NIL.) */
547 RTUUID MachineUuid;
548
549 /** The major version number. */
550 uint16_t u16VerMajor;
551 /** The minor version number. */
552 uint16_t u16VerMinor;
553 /** The build number. */
554 uint32_t u32VerBuild;
555 /** The SVN revision. */
556 uint32_t u32SvnRev;
557
558 /** 32 or 64 depending on the host. */
559 uint8_t cHostBits;
560 /** The size of RTGCPHYS. */
561 uint8_t cbGCPhys;
562 /** The size of RTGCPTR. */
563 uint8_t cbGCPtr;
564 /** Padding. */
565 uint8_t au8Reserved;
566} SSMFILEHDRV12;
567AssertCompileSize(SSMFILEHDRV12, 64+16);
568AssertCompileMemberOffset(SSMFILEHDRV12, u32CRC, 40);
569AssertCompileMemberSize(SSMFILEHDRV12, achMagic, sizeof(SSMFILEHDR_MAGIC_V1_2));
570/** Pointer to a saved state file header. */
571typedef SSMFILEHDRV12 *PSSMFILEHDRV12;
572
573
574/**
575 * Header of the saved state file, version 1.1.
576 *
577 * Added in r23677 on 2007-08-17, VirtualBox v1.4.1.
578 */
579typedef struct SSMFILEHDRV11
580{
581 /** Magic string which identifies this file as a version of VBox saved state
582 * file format (SSMFILEHDR_MAGIC_V1_1). */
583 char achMagic[32];
584 /** The size of this file. Used to check
585 * whether the save completed and that things are fine otherwise. */
586 uint64_t cbFile;
587 /** File checksum. The actual calculation skips past the u32CRC field. */
588 uint32_t u32CRC;
589 /** Padding. */
590 uint32_t u32Reserved;
591 /** The machine UUID. (Ignored if NIL.) */
592 RTUUID MachineUuid;
593} SSMFILEHDRV11;
594AssertCompileSize(SSMFILEHDRV11, 64);
595AssertCompileMemberOffset(SSMFILEHDRV11, u32CRC, 40);
596/** Pointer to a saved state file header. */
597typedef SSMFILEHDRV11 *PSSMFILEHDRV11;
598
599
600/**
601 * Data unit header.
602 */
603typedef struct SSMFILEUNITHDRV2
604{
605 /** Magic (SSMFILEUNITHDR_MAGIC or SSMFILEUNITHDR_END). */
606 char szMagic[8];
607 /** The offset in the saved state stream of the start of this unit.
608 * This is mainly intended for sanity checking. */
609 uint64_t offStream;
610 /** The CRC-in-progress value this unit starts at. */
611 uint32_t u32CurStreamCRC;
612 /** The checksum of this structure, including the whole name.
613 * Calculated with this field set to zero. */
614 uint32_t u32CRC;
615 /** Data version. */
616 uint32_t u32Version;
617 /** Instance number. */
618 uint32_t u32Instance;
619 /** Data phase number. */
620 uint32_t u32Phase;
621 /** Flags reserved for future extensions. Must be zero. */
622 uint32_t fFlags;
623 /** Size of the data unit name including the terminator. (bytes) */
624 uint32_t cbName;
625 /** Data unit name, variable size. */
626 char szName[SSM_MAX_NAME_SIZE];
627} SSMFILEUNITHDRV2;
628AssertCompileMemberOffset(SSMFILEUNITHDRV2, szName, 44);
629AssertCompileMemberSize(SSMFILEUNITHDRV2, szMagic, sizeof(SSMFILEUNITHDR_MAGIC));
630AssertCompileMemberSize(SSMFILEUNITHDRV2, szMagic, sizeof(SSMFILEUNITHDR_END));
631/** Pointer to SSMFILEUNITHDRV2. */
632typedef SSMFILEUNITHDRV2 *PSSMFILEUNITHDRV2;
633
634
635/**
636 * Data unit header.
637 *
638 * This is used by v1.0, v1.1 and v1.2 of the format.
639 */
640typedef struct SSMFILEUNITHDRV1
641{
642 /** Magic (SSMFILEUNITHDR_MAGIC or SSMFILEUNITHDR_END). */
643 char achMagic[8];
644 /** Number of bytes in this data unit including the header. */
645 uint64_t cbUnit;
646 /** Data version. */
647 uint32_t u32Version;
648 /** Instance number. */
649 uint32_t u32Instance;
650 /** Size of the data unit name including the terminator. (bytes) */
651 uint32_t cchName;
652 /** Data unit name. */
653 char szName[1];
654} SSMFILEUNITHDRV1;
655/** Pointer to SSMFILEUNITHDR. */
656typedef SSMFILEUNITHDRV1 *PSSMFILEUNITHDRV1;
657
658
659/**
660 * Termination data record.
661 */
662typedef struct SSMRECTERM
663{
664 uint8_t u8TypeAndFlags;
665 /** The record size (sizeof(SSMRECTERM) - 2). */
666 uint8_t cbRec;
667 /** Flags, see SSMRECTERM_FLAGS_CRC32. */
668 uint16_t fFlags;
669 /** The checksum of the stream up to fFlags (exclusive). */
670 uint32_t u32StreamCRC;
671 /** The length of this data unit in bytes (including this record). */
672 uint64_t cbUnit;
673} SSMRECTERM;
674AssertCompileSize(SSMRECTERM, 16);
675AssertCompileMemberAlignment(SSMRECTERM, cbUnit, 8);
676/** Pointer to a termination record. */
677typedef SSMRECTERM *PSSMRECTERM;
678/** Pointer to a const termination record. */
679typedef SSMRECTERM const *PCSSMRECTERM;
680
681
682/**
683 * Directory entry.
684 */
685typedef struct SSMFILEDIRENTRY
686{
687 /** The offset of the data unit. */
688 uint64_t off;
689 /** The instance number. */
690 uint32_t u32Instance;
691 /** The CRC-32 of the name excluding the terminator. (lazy bird) */
692 uint32_t u32NameCRC;
693} SSMFILEDIRENTRY;
694AssertCompileSize(SSMFILEDIRENTRY, 16);
695/** Pointer to a directory entry. */
696typedef SSMFILEDIRENTRY *PSSMFILEDIRENTRY;
697/** Pointer to a const directory entry. */
698typedef SSMFILEDIRENTRY const *PCSSMFILEDIRENTRY;
699
700/**
701 * Directory for the data units from the final phase.
702 *
703 * This is used to speed up SSMR3Seek (it would have to decompress and parse the
704 * whole stream otherwise).
705 */
706typedef struct SSMFILEDIR
707{
708 /** Magic string (SSMFILEDIR_MAGIC). */
709 char szMagic[8];
710 /** The CRC-32 for the whole directory.
711 * Calculated with this field set to zero. */
712 uint32_t u32CRC;
713 /** The number of directory entries. */
714 uint32_t cEntries;
715 /** The directory entries (variable size). */
716 SSMFILEDIRENTRY aEntries[1];
717} SSMFILEDIR;
718AssertCompileSize(SSMFILEDIR, 32);
719/** Pointer to a directory. */
720typedef SSMFILEDIR *PSSMFILEDIR;
721/** Pointer to a const directory. */
722typedef SSMFILEDIR *PSSMFILEDIR;
723
724
725/**
726 * Footer structure
727 */
728typedef struct SSMFILEFTR
729{
730 /** Magic string (SSMFILEFTR_MAGIC). */
731 char szMagic[8];
732 /** The offset of this record in the stream. */
733 uint64_t offStream;
734 /** The CRC for the stream.
735 * This is set to zero if SSMFILEHDR_FLAGS_STREAM_CRC32 is clear. */
736 uint32_t u32StreamCRC;
737 /** Number directory entries. */
738 uint32_t cDirEntries;
739 /** Reserved footer space - must be zero. */
740 uint32_t u32Reserved;
741 /** The CRC-32 for this structure.
742 * Calculated with this field set to zero. */
743 uint32_t u32CRC;
744} SSMFILEFTR;
745AssertCompileSize(SSMFILEFTR, 32);
746/** Pointer to a footer. */
747typedef SSMFILEFTR *PSSMFILEFTR;
748/** Pointer to a const footer. */
749typedef SSMFILEFTR const *PCSSMFILEFTR;
750
751
752/*******************************************************************************
753* Internal Functions *
754*******************************************************************************/
755static int ssmR3LazyInit(PVM pVM);
756static DECLCALLBACK(int) ssmR3SelfSaveExec(PVM pVM, PSSMHANDLE pSSM);
757static DECLCALLBACK(int) ssmR3SelfLoadExec(PVM pVM, PSSMHANDLE pSSM, uint32_t u32Version);
758static int ssmR3Register(PVM pVM, const char *pszName, uint32_t u32Instance, uint32_t u32Version, size_t cbGuess, const char *pszBefore, PSSMUNIT *ppUnit);
759static int ssmR3StrmWriteBuffers(PSSMSTRM pStrm);
760static int ssmR3StrmReadMore(PSSMSTRM pStrm);
761static int ssmR3CalcChecksum(RTFILE File, uint64_t cbFile, uint32_t *pu32CRC);
762static void ssmR3Progress(PSSMHANDLE pSSM, uint64_t cbAdvance);
763static PSSMUNIT ssmR3Find(PVM pVM, const char *pszName, uint32_t u32Instance);
764static int ssmR3DataWriteFinish(PSSMHANDLE pSSM);
765static void ssmR3DataWriteBegin(PSSMHANDLE pSSM);
766static int ssmR3DataWriteRaw(PSSMHANDLE pSSM, const void *pvBuf, size_t cbBuf);
767static int ssmR3DataFlushBuffer(PSSMHANDLE pSSM);
768static int ssmR3DataWrite(PSSMHANDLE pSSM, const void *pvBuf, size_t cbBuf);
769static void ssmR3DataReadFinishV1(PSSMHANDLE pSSM);
770static void ssmR3DataReadBeginV2(PSSMHANDLE pSSM);
771static void ssmR3DataReadFinishV2(PSSMHANDLE pSSM);
772static int ssmR3DataReadRecHdrV2(PSSMHANDLE pSSM);
773static int ssmR3DataRead(PSSMHANDLE pSSM, void *pvBuf, size_t cbBuf);
774
775
776/**
777 * Performs lazy initialization of the SSM.
778 *
779 * @returns VBox status code.
780 * @param pVM The VM.
781 */
782static int ssmR3LazyInit(PVM pVM)
783{
784 /*
785 * Register a saved state unit which we use to put the VirtualBox version,
786 * revision and similar stuff in.
787 */
788 pVM->ssm.s.fInitialized = true;
789 int rc = SSMR3RegisterInternal(pVM, "SSM", 0 /*u32Instance*/, 1/*u32Version*/, 64 /*cbGuess*/,
790 NULL /*pfnSavePrep*/, ssmR3SelfSaveExec, NULL /*pfnSaveDone*/,
791 NULL /*pfnSavePrep*/, ssmR3SelfLoadExec, NULL /*pfnSaveDone*/);
792 pVM->ssm.s.fInitialized = RT_SUCCESS(rc);
793 return rc;
794}
795
796
797/**
798 * For saving usful things without having to go thru the tedious process of
799 * adding it to the header.
800 *
801 * @returns VBox status code.
802 * @param pVM Pointer to the shared VM structure.
803 * @param pSSM The SSM handle.
804 */
805static DECLCALLBACK(int) ssmR3SelfSaveExec(PVM pVM, PSSMHANDLE pSSM)
806{
807 /*
808 * String table containg pairs of variable and value string.
809 * Terminated by two empty strings.
810 */
811#ifdef VBOX_OSE
812 SSMR3PutStrZ(pSSM, "OSE");
813 SSMR3PutStrZ(pSSM, "true");
814#endif
815
816 /* terminator */
817 SSMR3PutStrZ(pSSM, "");
818 return SSMR3PutStrZ(pSSM, "");
819}
820
821
822/**
823 * For load the version + revision and stuff.
824 *
825 * @returns VBox status code.
826 * @param pVM Pointer to the shared VM structure.
827 * @param pSSM The SSM handle.
828 * @param u32Version The version (1).
829 */
830static DECLCALLBACK(int) ssmR3SelfLoadExec(PVM pVM, PSSMHANDLE pSSM, uint32_t u32Version)
831{
832 AssertLogRelMsgReturn(u32Version == 1, ("%d", u32Version), VERR_SSM_UNSUPPORTED_DATA_UNIT_VERSION);
833
834 /*
835 * String table containg pairs of variable and value string.
836 * Terminated by two empty strings.
837 */
838 for (unsigned i = 0; ; i++)
839 {
840 char szVar[128];
841 char szValue[1024];
842 int rc = SSMR3GetStrZ(pSSM, szVar, sizeof(szVar));
843 AssertRCReturn(rc, rc);
844 rc = SSMR3GetStrZ(pSSM, szValue, sizeof(szValue));
845 AssertRCReturn(rc, rc);
846 if (!szVar[0] && !szValue[0])
847 break;
848 if (i == 0)
849 LogRel(("SSM: Saved state info:\n"));
850 LogRel(("SSM: %s: %s\n", szVar, szValue));
851 }
852 return VINF_SUCCESS;
853}
854
855
856/**
857 * Internal registration worker.
858 *
859 * @returns VBox status code.
860 * @param pVM The VM handle.
861 * @param pszName Data unit name.
862 * @param u32Instance The instance id.
863 * @param u32Version The data unit version.
864 * @param cbGuess The guessed data unit size.
865 * @param pszBefore Name of data unit to be placed in front of.
866 * Optional.
867 * @param ppUnit Where to store the insterted unit node.
868 * Caller must fill in the missing details.
869 */
870static int ssmR3Register(PVM pVM, const char *pszName, uint32_t u32Instance,
871 uint32_t u32Version, size_t cbGuess, const char *pszBefore, PSSMUNIT *ppUnit)
872{
873 /*
874 * Validate input.
875 */
876 AssertPtr(pszName);
877 AssertReturn(*pszName, VERR_INVALID_PARAMETER);
878 size_t cchName = strlen(pszName);
879 AssertMsgReturn(cchName < SSM_MAX_NAME_SIZE, ("%zu >= %u: %s\n", cchName, SSM_MAX_NAME_SIZE, pszName), VERR_OUT_OF_RANGE);
880
881 AssertReturn(!pszBefore || *pszBefore, VERR_INVALID_PARAMETER);
882 size_t cchBefore = pszBefore ? strlen(pszBefore) : 0;
883 AssertMsgReturn(cchBefore < SSM_MAX_NAME_SIZE, ("%zu >= %u: %s\n", cchBefore, SSM_MAX_NAME_SIZE, pszBefore), VERR_OUT_OF_RANGE);
884
885 /*
886 * Lazy init.
887 */
888 if (!pVM->ssm.s.fInitialized)
889 {
890 int rc = ssmR3LazyInit(pVM);
891 AssertRCReturn(rc, rc);
892 }
893
894 /*
895 * Walk to the end of the list checking for duplicates as we go.
896 */
897 PSSMUNIT pUnitBeforePrev = NULL;
898 PSSMUNIT pUnitBefore = NULL;
899 PSSMUNIT pUnitPrev = NULL;
900 PSSMUNIT pUnit = pVM->ssm.s.pHead;
901 while (pUnit)
902 {
903 if ( pUnit->u32Instance == u32Instance
904 && pUnit->cchName == cchName
905 && !memcmp(pUnit->szName, pszName, cchName))
906 {
907 AssertMsgFailed(("Duplicate registration %s\n", pszName));
908 return VERR_SSM_UNIT_EXISTS;
909 }
910 if ( pUnit->cchName == cchBefore
911 && !pUnitBefore
912 && !memcmp(pUnit->szName, pszBefore, cchBefore))
913 {
914 pUnitBeforePrev = pUnitPrev;
915 pUnitBefore = pUnit;
916 }
917
918 /* next */
919 pUnitPrev = pUnit;
920 pUnit = pUnit->pNext;
921 }
922
923 /*
924 * Allocate new node.
925 */
926 pUnit = (PSSMUNIT)MMR3HeapAllocZ(pVM, MM_TAG_SSM, RT_OFFSETOF(SSMUNIT, szName[cchName + 1]));
927 if (!pUnit)
928 return VERR_NO_MEMORY;
929
930 /*
931 * Fill in (some) data. (Stuff is zero'ed.)
932 */
933 pUnit->u32Version = u32Version;
934 pUnit->u32Instance = u32Instance;
935 pUnit->cbGuess = cbGuess;
936 pUnit->cchName = cchName;
937 memcpy(pUnit->szName, pszName, cchName);
938
939 /*
940 * Insert
941 */
942 if (pUnitBefore)
943 {
944 pUnit->pNext = pUnitBefore;
945 if (pUnitBeforePrev)
946 pUnitBeforePrev->pNext = pUnit;
947 else
948 pVM->ssm.s.pHead = pUnit;
949 }
950 else if (pUnitPrev)
951 pUnitPrev->pNext = pUnit;
952 else
953 pVM->ssm.s.pHead = pUnit;
954 pVM->ssm.s.cUnits++;
955
956 *ppUnit = pUnit;
957 return VINF_SUCCESS;
958}
959
960
961/**
962 * Register a PDM Devices data unit.
963 *
964 * @returns VBox status.
965 *
966 * @param pVM The VM handle.
967 * @param pDevIns Device instance.
968 * @param pszName Data unit name.
969 * @param u32Instance The instance identifier of the data unit.
970 * This must together with the name be unique.
971 * @param u32Version Data layout version number.
972 * @param cbGuess The approximate amount of data in the unit.
973 * Only for progress indicators.
974 * @param pszBefore Name of data unit which we should be put in front
975 * of. Optional (NULL).
976 * @param pfnSavePrep Prepare save callback, optional.
977 * @param pfnSaveExec Execute save callback, optional.
978 * @param pfnSaveDone Done save callback, optional.
979 * @param pfnLoadPrep Prepare load callback, optional.
980 * @param pfnLoadExec Execute load callback, optional.
981 * @param pfnLoadDone Done load callback, optional.
982 */
983VMMR3DECL(int) SSMR3RegisterDevice(PVM pVM, PPDMDEVINS pDevIns, const char *pszName, uint32_t u32Instance, uint32_t u32Version, size_t cbGuess, const char *pszBefore,
984 PFNSSMDEVSAVEPREP pfnSavePrep, PFNSSMDEVSAVEEXEC pfnSaveExec, PFNSSMDEVSAVEDONE pfnSaveDone,
985 PFNSSMDEVLOADPREP pfnLoadPrep, PFNSSMDEVLOADEXEC pfnLoadExec, PFNSSMDEVLOADDONE pfnLoadDone)
986{
987 PSSMUNIT pUnit;
988 int rc = ssmR3Register(pVM, pszName, u32Instance, u32Version, cbGuess, pszBefore, &pUnit);
989 if (RT_SUCCESS(rc))
990 {
991 pUnit->enmType = SSMUNITTYPE_DEV;
992 pUnit->u.Dev.pfnSavePrep = pfnSavePrep;
993 pUnit->u.Dev.pfnSaveExec = pfnSaveExec;
994 pUnit->u.Dev.pfnSaveDone = pfnSaveDone;
995 pUnit->u.Dev.pfnLoadPrep = pfnLoadPrep;
996 pUnit->u.Dev.pfnLoadExec = pfnLoadExec;
997 pUnit->u.Dev.pfnLoadDone = pfnLoadDone;
998 pUnit->u.Dev.pDevIns = pDevIns;
999 }
1000 return rc;
1001}
1002
1003
1004/**
1005 * Register a PDM driver data unit.
1006 *
1007 * @returns VBox status.
1008 *
1009 * @param pVM The VM handle.
1010 * @param pDrvIns Driver instance.
1011 * @param pszName Data unit name.
1012 * @param u32Instance The instance identifier of the data unit.
1013 * This must together with the name be unique.
1014 * @param u32Version Data layout version number.
1015 * @param cbGuess The approximate amount of data in the unit.
1016 * Only for progress indicators.
1017 * @param pfnSavePrep Prepare save callback, optional.
1018 * @param pfnSaveExec Execute save callback, optional.
1019 * @param pfnSaveDone Done save callback, optional.
1020 * @param pfnLoadPrep Prepare load callback, optional.
1021 * @param pfnLoadExec Execute load callback, optional.
1022 * @param pfnLoadDone Done load callback, optional.
1023 */
1024VMMR3DECL(int) SSMR3RegisterDriver(PVM pVM, PPDMDRVINS pDrvIns, const char *pszName, uint32_t u32Instance, uint32_t u32Version, size_t cbGuess,
1025 PFNSSMDRVSAVEPREP pfnSavePrep, PFNSSMDRVSAVEEXEC pfnSaveExec, PFNSSMDRVSAVEDONE pfnSaveDone,
1026 PFNSSMDRVLOADPREP pfnLoadPrep, PFNSSMDRVLOADEXEC pfnLoadExec, PFNSSMDRVLOADDONE pfnLoadDone)
1027{
1028 PSSMUNIT pUnit;
1029 int rc = ssmR3Register(pVM, pszName, u32Instance, u32Version, cbGuess, NULL, &pUnit);
1030 if (RT_SUCCESS(rc))
1031 {
1032 pUnit->enmType = SSMUNITTYPE_DRV;
1033 pUnit->u.Drv.pfnSavePrep = pfnSavePrep;
1034 pUnit->u.Drv.pfnSaveExec = pfnSaveExec;
1035 pUnit->u.Drv.pfnSaveDone = pfnSaveDone;
1036 pUnit->u.Drv.pfnLoadPrep = pfnLoadPrep;
1037 pUnit->u.Drv.pfnLoadExec = pfnLoadExec;
1038 pUnit->u.Drv.pfnLoadDone = pfnLoadDone;
1039 pUnit->u.Drv.pDrvIns = pDrvIns;
1040 }
1041 return rc;
1042}
1043
1044
1045/**
1046 * Register a internal data unit.
1047 *
1048 * @returns VBox status.
1049 *
1050 * @param pVM The VM handle.
1051 * @param pszName Data unit name.
1052 * @param u32Instance The instance identifier of the data unit.
1053 * This must together with the name be unique.
1054 * @param u32Version Data layout version number.
1055 * @param cbGuess The approximate amount of data in the unit.
1056 * Only for progress indicators.
1057 * @param pfnSavePrep Prepare save callback, optional.
1058 * @param pfnSaveExec Execute save callback, optional.
1059 * @param pfnSaveDone Done save callback, optional.
1060 * @param pfnLoadPrep Prepare load callback, optional.
1061 * @param pfnLoadExec Execute load callback, optional.
1062 * @param pfnLoadDone Done load callback, optional.
1063 */
1064VMMR3DECL(int) SSMR3RegisterInternal(PVM pVM, const char *pszName, uint32_t u32Instance, uint32_t u32Version, size_t cbGuess,
1065 PFNSSMINTSAVEPREP pfnSavePrep, PFNSSMINTSAVEEXEC pfnSaveExec, PFNSSMINTSAVEDONE pfnSaveDone,
1066 PFNSSMINTLOADPREP pfnLoadPrep, PFNSSMINTLOADEXEC pfnLoadExec, PFNSSMINTLOADDONE pfnLoadDone)
1067{
1068 PSSMUNIT pUnit;
1069 int rc = ssmR3Register(pVM, pszName, u32Instance, u32Version, cbGuess, NULL, &pUnit);
1070 if (RT_SUCCESS(rc))
1071 {
1072 pUnit->enmType = SSMUNITTYPE_INTERNAL;
1073 pUnit->u.Internal.pfnSavePrep = pfnSavePrep;
1074 pUnit->u.Internal.pfnSaveExec = pfnSaveExec;
1075 pUnit->u.Internal.pfnSaveDone = pfnSaveDone;
1076 pUnit->u.Internal.pfnLoadPrep = pfnLoadPrep;
1077 pUnit->u.Internal.pfnLoadExec = pfnLoadExec;
1078 pUnit->u.Internal.pfnLoadDone = pfnLoadDone;
1079 }
1080 return rc;
1081}
1082
1083
1084/**
1085 * Register an external data unit.
1086 *
1087 * @returns VBox status.
1088 *
1089 * @param pVM The VM handle.
1090 * @param pszName Data unit name.
1091 * @param u32Instance The instance identifier of the data unit.
1092 * This must together with the name be unique.
1093 * @param u32Version Data layout version number.
1094 * @param cbGuess The approximate amount of data in the unit.
1095 * Only for progress indicators.
1096 * @param pfnSavePrep Prepare save callback, optional.
1097 * @param pfnSaveExec Execute save callback, optional.
1098 * @param pfnSaveDone Done save callback, optional.
1099 * @param pfnLoadPrep Prepare load callback, optional.
1100 * @param pfnLoadExec Execute load callback, optional.
1101 * @param pfnLoadDone Done load callback, optional.
1102 * @param pvUser User argument.
1103 */
1104VMMR3DECL(int) SSMR3RegisterExternal(PVM pVM, const char *pszName, uint32_t u32Instance, uint32_t u32Version, size_t cbGuess,
1105 PFNSSMEXTSAVEPREP pfnSavePrep, PFNSSMEXTSAVEEXEC pfnSaveExec, PFNSSMEXTSAVEDONE pfnSaveDone,
1106 PFNSSMEXTLOADPREP pfnLoadPrep, PFNSSMEXTLOADEXEC pfnLoadExec, PFNSSMEXTLOADDONE pfnLoadDone, void *pvUser)
1107{
1108 PSSMUNIT pUnit;
1109 int rc = ssmR3Register(pVM, pszName, u32Instance, u32Version, cbGuess, NULL, &pUnit);
1110 if (RT_SUCCESS(rc))
1111 {
1112 pUnit->enmType = SSMUNITTYPE_EXTERNAL;
1113 pUnit->u.External.pfnSavePrep = pfnSavePrep;
1114 pUnit->u.External.pfnSaveExec = pfnSaveExec;
1115 pUnit->u.External.pfnSaveDone = pfnSaveDone;
1116 pUnit->u.External.pfnLoadPrep = pfnLoadPrep;
1117 pUnit->u.External.pfnLoadExec = pfnLoadExec;
1118 pUnit->u.External.pfnLoadDone = pfnLoadDone;
1119 pUnit->u.External.pvUser = pvUser;
1120 }
1121 return rc;
1122}
1123
1124
1125/**
1126 * Deregister one or more PDM Device data units.
1127 *
1128 * @returns VBox status.
1129 *
1130 * @param pVM The VM handle.
1131 * @param pDevIns Device instance.
1132 * @param pszName Data unit name.
1133 * Use NULL to deregister all data units for that device instance.
1134 * @param u32Instance The instance identifier of the data unit.
1135 * This must together with the name be unique.
1136 * @remark Only for dynmaic data units and dynamic unloaded modules.
1137 */
1138VMMR3DECL(int) SSMR3DeregisterDevice(PVM pVM, PPDMDEVINS pDevIns, const char *pszName, uint32_t u32Instance)
1139{
1140 /*
1141 * Validate input.
1142 */
1143 if (!pDevIns)
1144 {
1145 AssertMsgFailed(("pDevIns is NULL!\n"));
1146 return VERR_INVALID_PARAMETER;
1147 }
1148
1149 /*
1150 * Search the list.
1151 */
1152 size_t cchName = pszName ? strlen(pszName) : 0;
1153 int rc = pszName ? VERR_SSM_UNIT_NOT_FOUND : VINF_SUCCESS;
1154 PSSMUNIT pUnitPrev = NULL;
1155 PSSMUNIT pUnit = pVM->ssm.s.pHead;
1156 while (pUnit)
1157 {
1158 if ( pUnit->enmType == SSMUNITTYPE_DEV
1159 && ( !pszName
1160 || ( pUnit->cchName == cchName
1161 && !memcmp(pUnit->szName, pszName, cchName)))
1162 && pUnit->u32Instance == u32Instance
1163 )
1164 {
1165 if (pUnit->u.Dev.pDevIns == pDevIns)
1166 {
1167 /*
1168 * Unlink it, advance pointer, and free the node.
1169 */
1170 PSSMUNIT pFree = pUnit;
1171 pUnit = pUnit->pNext;
1172 if (pUnitPrev)
1173 pUnitPrev->pNext = pUnit;
1174 else
1175 pVM->ssm.s.pHead = pUnit;
1176 pVM->ssm.s.cUnits--;
1177 Log(("SSM: Removed data unit '%s' (pdm dev).\n", pFree->szName));
1178 MMR3HeapFree(pFree);
1179
1180 if (pszName)
1181 return VINF_SUCCESS;
1182 rc = VINF_SUCCESS;
1183 continue;
1184 }
1185 else if (pszName)
1186 {
1187 AssertMsgFailed(("Caller is not owner! Owner=%p Caller=%p %s\n",
1188 pUnit->u.Dev.pDevIns, pDevIns, pszName));
1189 return VERR_SSM_UNIT_NOT_OWNER;
1190 }
1191 }
1192
1193 /* next */
1194 pUnitPrev = pUnit;
1195 pUnit = pUnit->pNext;
1196 }
1197
1198 return rc;
1199}
1200
1201
1202/**
1203 * Deregister one ore more PDM Driver data units.
1204 *
1205 * @returns VBox status.
1206 * @param pVM The VM handle.
1207 * @param pDrvIns Driver instance.
1208 * @param pszName Data unit name.
1209 * Use NULL to deregister all data units for that driver instance.
1210 * @param u32Instance The instance identifier of the data unit.
1211 * This must together with the name be unique. Ignored if pszName is NULL.
1212 * @remark Only for dynmaic data units and dynamic unloaded modules.
1213 */
1214VMMR3DECL(int) SSMR3DeregisterDriver(PVM pVM, PPDMDRVINS pDrvIns, const char *pszName, uint32_t u32Instance)
1215{
1216 /*
1217 * Validate input.
1218 */
1219 if (!pDrvIns)
1220 {
1221 AssertMsgFailed(("pDrvIns is NULL!\n"));
1222 return VERR_INVALID_PARAMETER;
1223 }
1224
1225 /*
1226 * Search the list.
1227 */
1228 size_t cchName = pszName ? strlen(pszName) : 0;
1229 int rc = pszName ? VERR_SSM_UNIT_NOT_FOUND : VINF_SUCCESS;
1230 PSSMUNIT pUnitPrev = NULL;
1231 PSSMUNIT pUnit = pVM->ssm.s.pHead;
1232 while (pUnit)
1233 {
1234 if ( pUnit->enmType == SSMUNITTYPE_DRV
1235 && ( !pszName
1236 || ( pUnit->cchName == cchName
1237 && !memcmp(pUnit->szName, pszName, cchName)
1238 && pUnit->u32Instance == u32Instance))
1239 )
1240 {
1241 if (pUnit->u.Drv.pDrvIns == pDrvIns)
1242 {
1243 /*
1244 * Unlink it, advance pointer, and free the node.
1245 */
1246 PSSMUNIT pFree = pUnit;
1247 pUnit = pUnit->pNext;
1248 if (pUnitPrev)
1249 pUnitPrev->pNext = pUnit;
1250 else
1251 pVM->ssm.s.pHead = pUnit;
1252 pVM->ssm.s.cUnits--;
1253 Log(("SSM: Removed data unit '%s' (pdm drv).\n", pFree->szName));
1254 MMR3HeapFree(pFree);
1255
1256 if (pszName)
1257 return VINF_SUCCESS;
1258 rc = VINF_SUCCESS;
1259 continue;
1260 }
1261 else if (pszName)
1262 {
1263 AssertMsgFailed(("Caller is not owner! Owner=%p Caller=%p %s\n",
1264 pUnit->u.Drv.pDrvIns, pDrvIns, pszName));
1265 return VERR_SSM_UNIT_NOT_OWNER;
1266 }
1267 }
1268
1269 /* next */
1270 pUnitPrev = pUnit;
1271 pUnit = pUnit->pNext;
1272 }
1273
1274 return rc;
1275}
1276
1277
1278/**
1279 * Deregister a data unit.
1280 *
1281 * @returns VBox status.
1282 * @param pVM The VM handle.
1283 * @param enmType Unit type
1284 * @param pszName Data unit name.
1285 * @remark Only for dynmaic data units.
1286 */
1287static int ssmR3DeregisterByNameAndType(PVM pVM, const char *pszName, SSMUNITTYPE enmType)
1288{
1289 /*
1290 * Validate input.
1291 */
1292 if (!pszName)
1293 {
1294 AssertMsgFailed(("pszName is NULL!\n"));
1295 return VERR_INVALID_PARAMETER;
1296 }
1297
1298 /*
1299 * Search the list.
1300 */
1301 size_t cchName = strlen(pszName);
1302 int rc = VERR_SSM_UNIT_NOT_FOUND;
1303 PSSMUNIT pUnitPrev = NULL;
1304 PSSMUNIT pUnit = pVM->ssm.s.pHead;
1305 while (pUnit)
1306 {
1307 if ( pUnit->enmType == enmType
1308 && pUnit->cchName == cchName
1309 && !memcmp(pUnit->szName, pszName, cchName))
1310 {
1311 /*
1312 * Unlink it, advance pointer, and free the node.
1313 */
1314 PSSMUNIT pFree = pUnit;
1315 pUnit = pUnit->pNext;
1316 if (pUnitPrev)
1317 pUnitPrev->pNext = pUnit;
1318 else
1319 pVM->ssm.s.pHead = pUnit;
1320 pVM->ssm.s.cUnits--;
1321 Log(("SSM: Removed data unit '%s' (type=%d).\n", pFree->szName, enmType));
1322 MMR3HeapFree(pFree);
1323 return VINF_SUCCESS;
1324 }
1325
1326 /* next */
1327 pUnitPrev = pUnit;
1328 pUnit = pUnit->pNext;
1329 }
1330
1331 return rc;
1332}
1333
1334
1335/**
1336 * Deregister an internal data unit.
1337 *
1338 * @returns VBox status.
1339 * @param pVM The VM handle.
1340 * @param pszName Data unit name.
1341 * @remark Only for dynmaic data units.
1342 */
1343VMMR3DECL(int) SSMR3DeregisterInternal(PVM pVM, const char *pszName)
1344{
1345 return ssmR3DeregisterByNameAndType(pVM, pszName, SSMUNITTYPE_INTERNAL);
1346}
1347
1348
1349/**
1350 * Deregister an external data unit.
1351 *
1352 * @returns VBox status.
1353 * @param pVM The VM handle.
1354 * @param pszName Data unit name.
1355 * @remark Only for dynmaic data units.
1356 */
1357VMMR3DECL(int) SSMR3DeregisterExternal(PVM pVM, const char *pszName)
1358{
1359 return ssmR3DeregisterByNameAndType(pVM, pszName, SSMUNITTYPE_EXTERNAL);
1360}
1361
1362
1363/**
1364 * Initializes the stream after/before opening the file/whatever.
1365 *
1366 * @returns VINF_SUCCESS or VERR_NO_MEMORY.
1367 * @param pStrm The stream handle.
1368 * @param fChecksummed Whether the stream is to be checksummed while
1369 * written/read.
1370 * @param cBuffers The number of buffers.
1371 */
1372static int ssmR3StrmInit(PSSMSTRM pStrm, bool fChecksummed, uint32_t cBuffers)
1373{
1374 Assert(cBuffers > 0);
1375
1376 /*
1377 * Init the common data members.
1378 */
1379 pStrm->fTerminating = false;
1380 pStrm->fNeedSeek = false;
1381 pStrm->rc = VINF_SUCCESS;
1382 pStrm->hIoThread = NIL_RTTHREAD;
1383 pStrm->offNeedSeekTo= UINT64_MAX;
1384
1385 pStrm->pHead = NULL;
1386 pStrm->pFree = NULL;
1387 pStrm->hEvtHead = NIL_RTSEMEVENT;
1388 pStrm->hEvtFree = NIL_RTSEMEVENT;
1389
1390 pStrm->pPending = NULL;
1391 pStrm->pCur = NULL;
1392 pStrm->offCurStream = 0;
1393 pStrm->off = 0;
1394 pStrm->fChecksummed = fChecksummed;
1395 pStrm->u32StreamCRC = fChecksummed ? RTCrc32Start() : 0;
1396 pStrm->offStreamCRC = 0;
1397
1398 /*
1399 * Allocate the buffers. Page align them in case that makes the kernel
1400 * and/or cpu happier in some way.
1401 */
1402 int rc = VINF_SUCCESS;
1403 for (uint32_t i = 0; i < cBuffers; i++)
1404 {
1405 PSSMSTRMBUF pBuf = (PSSMSTRMBUF)RTMemPageAllocZ(sizeof(*pBuf));
1406 if (!pBuf)
1407 {
1408 if (i > 2)
1409 {
1410 LogRel(("ssmR3StrmAllocBuffer: WARNING: Could only get %d stream buffers.\n", i));
1411 break;
1412 }
1413 LogRel(("ssmR3StrmAllocBuffer: Failed to allocate stream buffers. (i=%d)\n", i));
1414 return VERR_NO_MEMORY;
1415 }
1416
1417 /* link it */
1418 pBuf->pNext = pStrm->pFree;
1419 pStrm->pFree = pBuf;
1420 }
1421
1422 /*
1423 * Create the event semaphores.
1424 */
1425 rc = RTSemEventCreate(&pStrm->hEvtHead);
1426 if (RT_FAILURE(rc))
1427 return rc;
1428 rc = RTSemEventCreate(&pStrm->hEvtFree);
1429 if (RT_FAILURE(rc))
1430 return rc;
1431
1432 return VINF_SUCCESS;
1433}
1434
1435
1436/**
1437 * Destroys a list of buffers.
1438 *
1439 * @param pHead Pointer to the head.
1440 */
1441static void ssmR3StrmDestroyBufList(PSSMSTRMBUF pHead)
1442{
1443 while (pHead)
1444 {
1445 PSSMSTRMBUF pCur = pHead;
1446 pHead = pCur->pNext;
1447 pCur->pNext = NULL;
1448 RTMemPageFree(pCur);
1449 }
1450}
1451
1452
1453/**
1454 * Cleans up a stream after ssmR3StrmInit has been called (regardless of it
1455 * succeeded or not).
1456 *
1457 * @param pStrm The stream handle.
1458 */
1459static void ssmR3StrmDelete(PSSMSTRM pStrm)
1460{
1461 RTMemPageFree(pStrm->pCur);
1462 pStrm->pCur = NULL;
1463 ssmR3StrmDestroyBufList(pStrm->pHead);
1464 pStrm->pHead = NULL;
1465 ssmR3StrmDestroyBufList(pStrm->pPending);
1466 pStrm->pPending = NULL;
1467 ssmR3StrmDestroyBufList(pStrm->pFree);
1468 pStrm->pFree = NULL;
1469
1470 RTSemEventDestroy(pStrm->hEvtHead);
1471 pStrm->hEvtHead = NIL_RTSEMEVENT;
1472
1473 RTSemEventDestroy(pStrm->hEvtFree);
1474 pStrm->hEvtFree = NIL_RTSEMEVENT;
1475}
1476
1477
1478/**
1479 * Opens a file stream.
1480 *
1481 * @returns VBox status code.
1482 * @param pStrm The stream manager structure.
1483 * @param pszFilename The file to open or create.
1484 * @param fWrite Whether to open for writing or reading.
1485 * @param fChecksummed Whether the stream is to be checksummed while
1486 * written/read.
1487 * @param cBuffers The number of buffers.
1488 */
1489static int ssmR3StrmOpenFile(PSSMSTRM pStrm, const char *pszFilename, bool fWrite, bool fChecksummed, uint32_t cBuffers)
1490{
1491 int rc = ssmR3StrmInit(pStrm, fChecksummed, cBuffers);
1492 if (RT_SUCCESS(rc))
1493 {
1494 uint32_t fFlags = fWrite
1495 ? RTFILE_O_READWRITE | RTFILE_O_CREATE_REPLACE | RTFILE_O_DENY_WRITE
1496 : RTFILE_O_READ | RTFILE_O_OPEN | RTFILE_O_DENY_WRITE;
1497 rc = RTFileOpen(&pStrm->hFile, pszFilename, fFlags);
1498 if (RT_SUCCESS(rc))
1499 {
1500 pStrm->fWrite = fWrite;
1501 return VINF_SUCCESS;
1502 }
1503 }
1504
1505 ssmR3StrmDelete(pStrm);
1506 pStrm->rc = rc;
1507 return rc;
1508}
1509
1510
1511/**
1512 * Raise an error condition on the stream.
1513 *
1514 * @returns true if we raised the error condition, false if the stream already
1515 * had an error condition set.
1516 *
1517 * @param pStrm The stream handle.
1518 * @param rc The VBox error status code.
1519 *
1520 * @thread Any.
1521 */
1522DECLINLINE(bool) ssmR3StrmSetError(PSSMSTRM pStrm, int rc)
1523{
1524 Assert(RT_FAILURE_NP(rc));
1525 return ASMAtomicCmpXchgS32(&pStrm->rc, rc, VINF_SUCCESS);
1526}
1527
1528
1529/**
1530 * Puts a buffer into the free list.
1531 *
1532 * @param pStrm The stream handle.
1533 * @param pBuf The buffer.
1534 *
1535 * @thread The consumer.
1536 */
1537static void ssmR3StrmPutFreeBuf(PSSMSTRM pStrm, PSSMSTRMBUF pBuf)
1538{
1539 for (;;)
1540 {
1541 PSSMSTRMBUF pCurFreeHead = (PSSMSTRMBUF)ASMAtomicUoReadPtr((void * volatile *)&pStrm->pFree);
1542 ASMAtomicUoWritePtr((void * volatile *)&pBuf->pNext, pCurFreeHead);
1543 if (ASMAtomicCmpXchgPtr((void * volatile *)&pStrm->pFree, pBuf, pCurFreeHead))
1544 {
1545 int rc = RTSemEventSignal(pStrm->hEvtFree);
1546 AssertRC(rc);
1547 return;
1548 }
1549 }
1550}
1551
1552
1553/**
1554 * Gets a free buffer, waits for one if necessary.
1555 *
1556 * @returns Pointer to the buffer on success. NULL if we're terminating.
1557 * @param pStrm The stream handle.
1558 *
1559 * @thread The producer.
1560 */
1561static PSSMSTRMBUF ssmR3StrmGetFreeBuf(PSSMSTRM pStrm)
1562{
1563 for (;;)
1564 {
1565 PSSMSTRMBUF pMine = (PSSMSTRMBUF)ASMAtomicUoReadPtr((void * volatile *)&pStrm->pFree);
1566 if (!pMine)
1567 {
1568 if (pStrm->fTerminating)
1569 return NULL;
1570 if (RT_FAILURE(pStrm->rc))
1571 return NULL;
1572 if ( pStrm->fWrite
1573 && pStrm->hIoThread == NIL_RTTHREAD)
1574 {
1575 int rc = ssmR3StrmWriteBuffers(pStrm);
1576 if (RT_FAILURE(rc))
1577 return NULL;
1578 }
1579 int rc = RTSemEventWaitNoResume(pStrm->hEvtFree, 30000);
1580 if ( rc == VERR_SEM_DESTROYED
1581 || pStrm->fTerminating)
1582 return NULL;
1583 continue;
1584 }
1585
1586 if (ASMAtomicCmpXchgPtr((void * volatile *)&pStrm->pFree, pMine->pNext, pMine))
1587 {
1588 pMine->offStream = UINT64_MAX;
1589 pMine->cb = 0;
1590 pMine->pNext = NULL;
1591 pMine->fEndOfStream = false;
1592 return pMine;
1593 }
1594 }
1595}
1596
1597
1598/**
1599 * Puts a buffer onto the queue.
1600 *
1601 * @param pBuf The buffer.
1602 *
1603 * @thread The producer.
1604 */
1605static void ssmR3StrmPutBuf(PSSMSTRM pStrm, PSSMSTRMBUF pBuf)
1606{
1607 for (;;)
1608 {
1609 PSSMSTRMBUF pCurHead = (PSSMSTRMBUF)ASMAtomicUoReadPtr((void * volatile *)&pStrm->pHead);
1610 ASMAtomicUoWritePtr((void * volatile *)&pBuf->pNext, pCurHead);
1611 if (ASMAtomicCmpXchgPtr((void * volatile *)&pStrm->pHead, pBuf, pCurHead))
1612 {
1613 int rc = RTSemEventSignal(pStrm->hEvtHead);
1614 AssertRC(rc);
1615 return;
1616 }
1617 }
1618}
1619
1620
1621/**
1622 * Reverses the list.
1623 *
1624 * @returns The head of the reversed list.
1625 * @param pHead The head of the list to reverse.
1626 */
1627static PSSMSTRMBUF ssmR3StrmReverseList(PSSMSTRMBUF pHead)
1628{
1629 PSSMSTRMBUF pRevHead = NULL;
1630 while (pHead)
1631 {
1632 PSSMSTRMBUF pCur = pHead;
1633 pHead = pCur->pNext;
1634 pCur->pNext = pRevHead;
1635 pRevHead = pCur;
1636 }
1637 return pRevHead;
1638}
1639
1640
1641/**
1642 * Gets one buffer from the queue, will wait for one to become ready if
1643 * necessary.
1644 *
1645 * @returns Pointer to the buffer on success. NULL if we're terminating.
1646 * @param pBuf The buffer.
1647 *
1648 * @thread The consumer.
1649 */
1650static PSSMSTRMBUF ssmR3StrmGetBuf(PSSMSTRM pStrm)
1651{
1652 for (;;)
1653 {
1654 PSSMSTRMBUF pMine = pStrm->pPending;
1655 if (pMine)
1656 {
1657 pStrm->pPending = pMine->pNext;
1658 pMine->pNext = NULL;
1659 return pMine;
1660 }
1661
1662 pMine = (PSSMSTRMBUF)ASMAtomicXchgPtr((void * volatile *)&pStrm->pHead, NULL);
1663 if (pMine)
1664 pStrm->pPending = ssmR3StrmReverseList(pMine);
1665 else
1666 {
1667 if (pStrm->fTerminating)
1668 return NULL;
1669 if (RT_FAILURE(pStrm->rc))
1670 return NULL;
1671 if ( !pStrm->fWrite
1672 && pStrm->hIoThread == NIL_RTTHREAD)
1673 {
1674 int rc = ssmR3StrmReadMore(pStrm);
1675 if (RT_FAILURE(rc))
1676 return NULL;
1677 continue;
1678 }
1679
1680 int rc = RTSemEventWaitNoResume(pStrm->hEvtHead, 30000);
1681 if ( rc == VERR_SEM_DESTROYED
1682 || pStrm->fTerminating)
1683 return NULL;
1684 }
1685 }
1686}
1687
1688
1689/**
1690 * Flushes the current buffer (both write and read streams).
1691 *
1692 * @param pStrm The stream handle.
1693 */
1694static void ssmR3StrmFlushCurBuf(PSSMSTRM pStrm)
1695{
1696 if (pStrm->pCur)
1697 {
1698 PSSMSTRMBUF pBuf = pStrm->pCur;
1699 pStrm->pCur = NULL;
1700
1701 if (pStrm->fWrite)
1702 {
1703 uint32_t cb = pStrm->off;
1704 pBuf->cb = cb;
1705 pBuf->offStream = pStrm->offCurStream;
1706 if ( pStrm->fChecksummed
1707 && pStrm->offStreamCRC < cb)
1708 pStrm->u32StreamCRC = RTCrc32Process(pStrm->u32StreamCRC,
1709 &pBuf->abData[pStrm->offStreamCRC],
1710 cb - pStrm->offStreamCRC);
1711 pStrm->offCurStream += cb;
1712 pStrm->off = 0;
1713 pStrm->offStreamCRC = 0;
1714
1715 ssmR3StrmPutBuf(pStrm, pBuf);
1716 }
1717 else
1718 {
1719 uint32_t cb = pBuf->cb;
1720 if ( pStrm->fChecksummed
1721 && pStrm->offStreamCRC < cb)
1722 pStrm->u32StreamCRC = RTCrc32Process(pStrm->u32StreamCRC,
1723 &pBuf->abData[pStrm->offStreamCRC],
1724 cb - pStrm->offStreamCRC);
1725 pStrm->offCurStream += cb;
1726 pStrm->off = 0;
1727 pStrm->offStreamCRC = 0;
1728
1729 ssmR3StrmPutFreeBuf(pStrm, pBuf);
1730 }
1731 }
1732}
1733
1734
1735/**
1736 * Flush buffered data.
1737 *
1738 * @returns VBox status code. Returns VINF_EOF if we encounter a buffer with the
1739 * fEndOfStream indicator set.
1740 * @param pStrm The stream handle.
1741 *
1742 * @thread The producer thread.
1743 */
1744static int ssmR3StrmWriteBuffers(PSSMSTRM pStrm)
1745{
1746 Assert(pStrm->fWrite);
1747
1748 /*
1749 * Just return if the stream has a pending error condition.
1750 */
1751 int rc = pStrm->rc;
1752 if (RT_FAILURE(rc))
1753 return rc;
1754
1755 /*
1756 * Grab the pending list and write it out.
1757 */
1758 PSSMSTRMBUF pHead = (PSSMSTRMBUF)ASMAtomicXchgPtr((void * volatile *)&pStrm->pHead, NULL);
1759 if (!pHead)
1760 return VINF_SUCCESS;
1761 pHead = ssmR3StrmReverseList(pHead);
1762
1763 while (pHead)
1764 {
1765 /* pop */
1766 PSSMSTRMBUF pCur = pHead;
1767 pHead = pCur->pNext;
1768
1769 /* flush */
1770 int rc = RTFileWriteAt(pStrm->hFile, pCur->offStream, &pCur->abData[0], pCur->cb, NULL);
1771 if ( RT_FAILURE(rc)
1772 && ssmR3StrmSetError(pStrm, rc))
1773 LogRel(("ssmR3StrmWriteBuffers: RTFileWriteAt failed with rc=%Rrc at offStream=%#llx\n", rc, pCur->offStream));
1774
1775 /* free */
1776 bool fEndOfStream = pCur->fEndOfStream;
1777 ssmR3StrmPutFreeBuf(pStrm, pCur);
1778 if (fEndOfStream)
1779 {
1780 Assert(!pHead);
1781 return VINF_EOF;
1782 }
1783 }
1784
1785 return pStrm->rc;
1786}
1787
1788
1789/**
1790 * Closes the stream after first flushing any pending write.
1791 *
1792 * @returns VBox status code.
1793 * @param pStrm The stream handle.
1794 */
1795static int ssmR3StrmClose(PSSMSTRM pStrm)
1796{
1797 /*
1798 * Flush, terminate the I/O thread, and close the stream.
1799 */
1800 if (pStrm->fWrite)
1801 {
1802 ssmR3StrmFlushCurBuf(pStrm);
1803 if (pStrm->hIoThread == NIL_RTTHREAD)
1804 ssmR3StrmWriteBuffers(pStrm);
1805 }
1806
1807 if (pStrm->hIoThread != NIL_RTTHREAD)
1808 {
1809 ASMAtomicWriteBool(&pStrm->fTerminating, true);
1810 int rc2 = RTSemEventSignal(pStrm->fWrite ? pStrm->hEvtHead : pStrm->hEvtFree); AssertLogRelRC(rc2);
1811 int rc3 = RTThreadWait(pStrm->hIoThread, RT_INDEFINITE_WAIT, NULL); AssertLogRelRC(rc3);
1812 pStrm->hIoThread = NIL_RTTHREAD;
1813 }
1814
1815 int rc = RTFileClose(pStrm->hFile);
1816 if (RT_FAILURE(rc))
1817 ssmR3StrmSetError(pStrm, rc);
1818 pStrm->hFile = NIL_RTFILE;
1819
1820 rc = pStrm->rc;
1821 ssmR3StrmDelete(pStrm);
1822
1823 return rc;
1824}
1825
1826
1827/**
1828 * Stream output routine.
1829 *
1830 * @returns VBox status code.
1831 * @param pStrm The stream handle.
1832 * @param pvBuf What to write.
1833 * @param cbToWrite How much to write.
1834 *
1835 * @thread The producer in a write stream (never the I/O thread).
1836 */
1837static int ssmR3StrmWrite(PSSMSTRM pStrm, const void *pvBuf, size_t cbToWrite)
1838{
1839 AssertReturn(cbToWrite > 0, VINF_SUCCESS);
1840 Assert(pStrm->fWrite);
1841
1842 /*
1843 * Squeeze as much as possible into the current buffer.
1844 */
1845 PSSMSTRMBUF pBuf = pStrm->pCur;
1846 if (RT_LIKELY(pBuf))
1847 {
1848 uint32_t cbLeft = RT_SIZEOFMEMB(SSMSTRMBUF, abData) - pStrm->off;
1849 if (RT_LIKELY(cbLeft >= cbToWrite))
1850 {
1851 memcpy(&pBuf->abData[pStrm->off], pvBuf, cbToWrite);
1852 pStrm->off += (uint32_t)cbToWrite;
1853 return VINF_SUCCESS;
1854 }
1855
1856 if (cbLeft > 0)
1857 {
1858 memcpy(&pBuf->abData[pStrm->off], pvBuf, cbLeft);
1859 pStrm->off += cbLeft;
1860 cbToWrite -= cbLeft;
1861 pvBuf = (uint8_t const *)pvBuf + cbLeft;
1862 }
1863 Assert(pStrm->off == RT_SIZEOFMEMB(SSMSTRMBUF, abData));
1864 }
1865
1866 /*
1867 * Need one or more new buffers.
1868 */
1869 do
1870 {
1871 /*
1872 * Flush the current buffer and replace it with a new one.
1873 */
1874 ssmR3StrmFlushCurBuf(pStrm);
1875 pBuf = ssmR3StrmGetFreeBuf(pStrm);
1876 if (!pBuf)
1877 break;
1878 pStrm->pCur = pBuf;
1879 Assert(pStrm->off == 0);
1880
1881 /*
1882 * Copy data to the buffer.
1883 */
1884 uint32_t cbCopy = RT_SIZEOFMEMB(SSMSTRMBUF, abData);
1885 if (cbCopy > cbToWrite)
1886 cbCopy = (uint32_t)cbToWrite;
1887 memcpy(&pBuf->abData[0], pvBuf, cbCopy);
1888 pStrm->off = cbCopy;
1889 cbToWrite -= cbCopy;
1890 pvBuf = (uint8_t const *)pvBuf + cbCopy;
1891 } while (cbToWrite > 0);
1892
1893 return pStrm->rc;
1894}
1895
1896
1897/**
1898 * Reserves space in the current buffer so the caller can write directly to the
1899 * buffer instead of doing double buffering.
1900 *
1901 * @returns VBox status code
1902 * @param pStrm The stream handle.
1903 * @param cb The amount of buffer space to reserve.
1904 * @param ppb Where to return the pointer.
1905 */
1906static int ssmR3StrmReserveWriteBufferSpace(PSSMSTRM pStrm, size_t cb, uint8_t **ppb)
1907{
1908 Assert(pStrm->fWrite);
1909 Assert(RT_SIZEOFMEMB(SSMSTRMBUF, abData) / 4 >= cb);
1910
1911 /*
1912 * Check if there is room in the current buffer, it not flush it.
1913 */
1914 PSSMSTRMBUF pBuf = pStrm->pCur;
1915 if (pBuf)
1916 {
1917 uint32_t cbLeft = RT_SIZEOFMEMB(SSMSTRMBUF, abData) - pStrm->off;
1918 if (cbLeft >= cb)
1919 {
1920 *ppb = &pBuf->abData[pStrm->off];
1921 return VINF_SUCCESS;
1922 }
1923
1924 ssmR3StrmFlushCurBuf(pStrm);
1925 }
1926
1927 /*
1928 * Get a fresh buffer and return a pointer into it.
1929 */
1930 pBuf = ssmR3StrmGetFreeBuf(pStrm);
1931 if (pBuf)
1932 {
1933 pStrm->pCur = pBuf;
1934 Assert(pStrm->off == 0);
1935 *ppb = &pBuf->abData[0];
1936 }
1937 else
1938 *ppb = NULL; /* make gcc happy. */
1939 return pStrm->rc;
1940}
1941
1942
1943/**
1944 * Commits buffer space reserved by ssmR3StrmReserveWriteBufferSpace.
1945 *
1946 * @returns VBox status code.
1947 * @param pStrm The stream handle.
1948 * @param cb The amount of buffer space to commit. This can be less
1949 * that what was reserved initially.
1950 */
1951static int ssmR3StrmCommitWriteBufferSpace(PSSMSTRM pStrm, size_t cb)
1952{
1953 Assert(pStrm->pCur);
1954 Assert(pStrm->off + cb <= RT_SIZEOFMEMB(SSMSTRMBUF, abData));
1955 pStrm->off += cb;
1956 return VINF_SUCCESS;
1957}
1958
1959
1960/**
1961 * Marks the end of the stream.
1962 *
1963 * This will cause the I/O thread to quit waiting for more buffers.
1964 *
1965 * @returns VBox status code.
1966 * @param pStrm The stream handle.
1967 */
1968static int ssmR3StrmSetEnd(PSSMSTRM pStrm)
1969{
1970 Assert(pStrm->fWrite);
1971 PSSMSTRMBUF pBuf = pStrm->pCur;
1972 if (RT_UNLIKELY(!pStrm->pCur))
1973 {
1974 pBuf = ssmR3StrmGetFreeBuf(pStrm);
1975 if (!pBuf)
1976 return pStrm->rc;
1977 pStrm->pCur = pBuf;
1978 Assert(pStrm->off == 0);
1979 }
1980 pBuf->fEndOfStream = true;
1981 ssmR3StrmFlushCurBuf(pStrm);
1982 return VINF_SUCCESS;
1983}
1984
1985
1986/**
1987 * Read more from the stream.
1988 *
1989 * @returns VBox status code. VERR_EOF gets translated into VINF_EOF.
1990 * @param pStrm The stream handle.
1991 *
1992 * @thread The I/O thread when we got one, otherwise the stream user.
1993 */
1994static int ssmR3StrmReadMore(PSSMSTRM pStrm)
1995{
1996 int rc;
1997 Log6(("ssmR3StrmReadMore:\n"));
1998
1999 /*
2000 * Undo seek done by ssmR3StrmPeekAt.
2001 */
2002 if (pStrm->fNeedSeek)
2003 {
2004 rc = RTFileSeek(pStrm->hFile, pStrm->offNeedSeekTo, RTFILE_SEEK_BEGIN, NULL);
2005 if (RT_FAILURE(rc))
2006 {
2007 if (ssmR3StrmSetError(pStrm, rc))
2008 LogRel(("ssmR3StrmReadMore: RTFileSeek(,%#llx,) failed with rc=%Rrc\n", pStrm->offNeedSeekTo, rc));
2009 return rc;
2010 }
2011 pStrm->fNeedSeek = false;
2012 pStrm->offNeedSeekTo = UINT64_MAX;
2013 }
2014
2015 /*
2016 * Get a free buffer and try fill it up.
2017 */
2018 PSSMSTRMBUF pBuf = ssmR3StrmGetFreeBuf(pStrm);
2019 if (!pBuf)
2020 return pStrm->rc;
2021
2022 pBuf->offStream = RTFileTell(pStrm->hFile);
2023 size_t cbRead = sizeof(pBuf->abData);
2024 rc = RTFileRead(pStrm->hFile, &pBuf->abData[0], cbRead, &cbRead);
2025 if ( RT_SUCCESS(rc)
2026 && cbRead > 0)
2027 {
2028 pBuf->cb = (uint32_t)cbRead;
2029 pBuf->fEndOfStream = false;
2030 Log6(("ssmR3StrmReadMore: %#010llx %#x\n", pBuf->offStream, pBuf->cb));
2031 ssmR3StrmPutBuf(pStrm, pBuf);
2032 }
2033 else if ( ( RT_SUCCESS_NP(rc)
2034 && cbRead == 0)
2035 || rc == VERR_EOF)
2036 {
2037 pBuf->cb = 0;
2038 pBuf->fEndOfStream = true;
2039 Log6(("ssmR3StrmReadMore: %#010llx 0 EOF!\n", pBuf->offStream));
2040 ssmR3StrmPutBuf(pStrm, pBuf);
2041 rc = VINF_EOF;
2042 }
2043 else
2044 {
2045 Log6(("ssmR3StrmReadMore: %#010llx rc=%Rrc!\n", pBuf->offStream, rc));
2046 if (ssmR3StrmSetError(pStrm, rc))
2047 LogRel(("ssmR3StrmReadMore: RTFileRead(,,%#x,) -> %Rrc at offset %#llx\n",
2048 sizeof(pBuf->abData), rc, pBuf->offStream));
2049 ssmR3StrmPutFreeBuf(pStrm, pBuf);
2050 }
2051 return rc;
2052}
2053
2054
2055/**
2056 * Stream input routine.
2057 *
2058 * @returns VBox status code.
2059 * @param pStrm The stream handle.
2060 * @param pvBuf Where to put what we read.
2061 * @param cbToRead How much to read.
2062 */
2063static int ssmR3StrmRead(PSSMSTRM pStrm, void *pvBuf, size_t cbToRead)
2064{
2065 AssertReturn(cbToRead > 0, VINF_SUCCESS);
2066 Assert(!pStrm->fWrite);
2067
2068 /*
2069 * Read from the current buffer if we got one.
2070 */
2071 PSSMSTRMBUF pBuf = pStrm->pCur;
2072 if (RT_LIKELY(pBuf))
2073 {
2074 Assert(pStrm->off <= pBuf->cb);
2075 uint32_t cbLeft = pBuf->cb - pStrm->off;
2076 if (cbLeft >= cbToRead)
2077 {
2078 memcpy(pvBuf, &pBuf->abData[pStrm->off], cbToRead);
2079 pStrm->off += (uint32_t)cbToRead;
2080 Assert(pStrm->off <= pBuf->cb);
2081 return VINF_SUCCESS;
2082 }
2083 if (cbLeft)
2084 {
2085 memcpy(pvBuf, &pBuf->abData[pStrm->off], cbLeft);
2086 pStrm->off += cbLeft;
2087 cbToRead -= cbLeft;
2088 pvBuf = (uint8_t *)pvBuf + cbLeft;
2089 }
2090 else if (pBuf->fEndOfStream)
2091 return VERR_EOF;
2092 Assert(pStrm->off == pBuf->cb);
2093 }
2094
2095 /*
2096 * Get more buffers from the stream.
2097 */
2098 int rc = VINF_SUCCESS;
2099 do
2100 {
2101 /*
2102 * Check for EOF first - never flush the EOF buffer.
2103 */
2104 if ( pBuf
2105 && pBuf->fEndOfStream)
2106 return VERR_EOF;
2107
2108 /*
2109 * Flush the current buffer and get the next one.
2110 */
2111 ssmR3StrmFlushCurBuf(pStrm);
2112 PSSMSTRMBUF pBuf = ssmR3StrmGetBuf(pStrm);
2113 if (!pBuf)
2114 {
2115 rc = pStrm->rc;
2116 break;
2117 }
2118 pStrm->pCur = pBuf;
2119 Assert(pStrm->off == 0);
2120 Assert(pStrm->offCurStream == pBuf->offStream);
2121 if (!pBuf->cb)
2122 {
2123 Assert(pBuf->fEndOfStream);
2124 return VERR_EOF;
2125 }
2126
2127 /*
2128 * Read data from the buffer.
2129 */
2130 uint32_t cbCopy = pBuf->cb;
2131 if (cbCopy > cbToRead)
2132 cbCopy = (uint32_t)cbToRead;
2133 memcpy(pvBuf, &pBuf->abData[0], cbCopy);
2134 pStrm->off = cbCopy;
2135 cbToRead -= cbCopy;
2136 pvBuf = (uint8_t *)pvBuf + cbCopy;
2137 Assert(!pStrm->pCur || pStrm->off <= pStrm->pCur->cb);
2138 } while (cbToRead > 0);
2139
2140 return rc;
2141}
2142
2143
2144/**
2145 * Reads data from the stream but instead of copying it to some output buffer
2146 * the caller gets a pointer to into the current stream buffer.
2147 *
2148 * The returned pointer becomes invalid after the next stream operation!
2149 *
2150 * @returns Pointer to the read data residing in the stream buffer. NULL is
2151 * returned if the request amount of data isn't available in the
2152 * buffer. The caller must fall back on ssmR3StrmRead when this
2153 * happens.
2154 *
2155 * @param pStrm The stream handle.
2156 * @param cbToRead The number of bytes to tread.
2157 */
2158static uint8_t const *ssmR3StrmReadDirect(PSSMSTRM pStrm, size_t cbToRead)
2159{
2160 AssertReturn(cbToRead > 0, VINF_SUCCESS);
2161 Assert(!pStrm->fWrite);
2162
2163 /*
2164 * Too lazy to fetch more data for the odd case that we're
2165 * exactly at the boundrary between two buffers.
2166 */
2167 PSSMSTRMBUF pBuf = pStrm->pCur;
2168 if (RT_LIKELY(pBuf))
2169 {
2170 Assert(pStrm->off <= pBuf->cb);
2171 uint32_t cbLeft = pBuf->cb - pStrm->off;
2172 if (cbLeft >= cbToRead)
2173 {
2174 uint8_t const *pb = &pBuf->abData[pStrm->off];
2175 pStrm->off += (uint32_t)cbToRead;
2176 Assert(pStrm->off <= pBuf->cb);
2177 return pb;
2178 }
2179 }
2180 return NULL;
2181}
2182
2183
2184/**
2185 * Tell current stream position.
2186 *
2187 * @returns stream position.
2188 * @param pStrm The stream handle.
2189 */
2190static uint64_t ssmR3StrmTell(PSSMSTRM pStrm)
2191{
2192 return pStrm->offCurStream + pStrm->off;
2193}
2194
2195
2196/**
2197 * Gets the intermediate stream CRC up to the current position.
2198 *
2199 * @returns CRC.
2200 * @param pStrm The stream handle.
2201 */
2202static uint32_t ssmR3StrmCurCRC(PSSMSTRM pStrm)
2203{
2204 if (!pStrm->fChecksummed)
2205 return 0;
2206 if (pStrm->offStreamCRC < pStrm->off)
2207 {
2208 PSSMSTRMBUF pBuf = pStrm->pCur; Assert(pBuf);
2209 pStrm->u32StreamCRC = RTCrc32Process(pStrm->u32StreamCRC, &pBuf->abData[pStrm->offStreamCRC], pStrm->off - pStrm->offStreamCRC);
2210//if (pStrm->offStreamCRC == 0 && pStrm->off == 0x40)
2211// LogAlways(("ssmR3StrmCurCRC: %08x\n%.64Rhxd\n", pStrm->u32StreamCRC, pBuf->abData));
2212 pStrm->offStreamCRC = pStrm->off;
2213 }
2214 else
2215 Assert(pStrm->offStreamCRC == pStrm->off);
2216 return pStrm->u32StreamCRC;
2217}
2218
2219
2220/**
2221 * Gets the final stream CRC up to the current position.
2222 *
2223 * @returns CRC.
2224 * @param pStrm The stream handle.
2225 */
2226static uint32_t ssmR3StrmFinalCRC(PSSMSTRM pStrm)
2227{
2228 if (!pStrm->fChecksummed)
2229 return 0;
2230 return RTCrc32Finish(ssmR3StrmCurCRC(pStrm));
2231}
2232
2233
2234/**
2235 * Disables checksumming of the stream.
2236 *
2237 * @param pStrm The stream handle.
2238 */
2239static void ssmR3StrmDisableChecksumming(PSSMSTRM pStrm)
2240{
2241 pStrm->fChecksummed = false;
2242}
2243
2244
2245/**
2246 * Used by SSMR3Seek to position the stream at the new unit.
2247 *
2248 * @returns VBox stutus code.
2249 * @param pStrm The strem handle.
2250 * @param off The seek offset.
2251 * @param uMethod The seek method.
2252 * @param u32CurCRC The current CRC at the seek position.
2253 */
2254static int ssmR3StrmSeek(PSSMSTRM pStrm, int64_t off, uint32_t uMethod, uint32_t u32CurCRC)
2255{
2256 AssertReturn(!pStrm->fWrite, VERR_NOT_SUPPORTED);
2257 AssertReturn(pStrm->hIoThread == NIL_RTTHREAD, VERR_WRONG_ORDER);
2258
2259 uint64_t offStream;
2260 int rc = RTFileSeek(pStrm->hFile, off, uMethod, &offStream);
2261 if (RT_SUCCESS(rc))
2262 {
2263 pStrm->fNeedSeek = false;
2264 pStrm->offNeedSeekTo= UINT64_MAX;
2265 pStrm->offCurStream = offStream;
2266 pStrm->off = 0;
2267 pStrm->offStreamCRC = 0;
2268 if (pStrm->fChecksummed)
2269 pStrm->u32StreamCRC = u32CurCRC;
2270 if (pStrm->pCur)
2271 {
2272 ssmR3StrmPutFreeBuf(pStrm, pStrm->pCur);
2273 pStrm->pCur = NULL;
2274 }
2275 }
2276 return rc;
2277}
2278
2279
2280/**
2281 * Skip some bytes in the stream.
2282 *
2283 * This is only used if someone didn't read all of their data in the V1 format,
2284 * so don't bother making this very efficient yet.
2285 *
2286 * @returns VBox status code.
2287 * @param pStrm The stream handle.
2288 * @param offDst The destination offset.
2289 */
2290static int ssmR3StrmSkipTo(PSSMSTRM pStrm, uint64_t offDst)
2291{
2292 /* dead simple - lazy bird! */
2293 for (;;)
2294 {
2295 uint64_t offCur = ssmR3StrmTell(pStrm);
2296 AssertReturn(offCur <= offDst, VERR_INTERNAL_ERROR_4);
2297 if (offCur == offDst)
2298 return VINF_SUCCESS;
2299
2300 uint8_t abBuf[4096];
2301 size_t cbToRead = RT_MIN(sizeof(abBuf), offDst - offCur);
2302 int rc = ssmR3StrmRead(pStrm, abBuf, cbToRead);
2303 if (RT_FAILURE(rc))
2304 return rc;
2305 }
2306}
2307
2308
2309/**
2310 * Get the size of the file.
2311 *
2312 * This does not work for non-file streams!
2313 *
2314 * @returns The file size, or UINT64_MAX if not a file stream.
2315 * @param pStrm The stream handle.
2316 */
2317static uint64_t ssmR3StrmGetSize(PSSMSTRM pStrm)
2318{
2319 uint64_t cbFile;
2320 int rc = RTFileGetSize(pStrm->hFile, &cbFile);
2321 AssertLogRelRCReturn(rc, UINT64_MAX);
2322 return cbFile;
2323}
2324
2325
2326/***
2327 * Tests if the stream is a file stream or not.
2328 *
2329 * @returns true / false.
2330 * @param pStrm The stream handle.
2331 */
2332static bool ssmR3StrmIsFile(PSSMSTRM pStrm)
2333{
2334 return pStrm->hFile != NIL_RTFILE;
2335}
2336
2337
2338/**
2339 * Peeks at data in a file stream without buffering anything (or upsetting
2340 * the buffering for that matter).
2341 *
2342 * @returns VBox status code.
2343 * @param pStrm The stream handle
2344 * @param off The offset to start peeking at. Use a negative offset to
2345 * peek at something relative to the end of the file.
2346 * @param pvBuf Output buffer.
2347 * @param cbToRead How much to read.
2348 * @param poff Where to optionally store the position. Useful when
2349 * using a negative off.
2350 *
2351 * @remarks Failures occuring while peeking will not be raised on the stream.
2352 */
2353static int ssmR3StrmPeekAt(PSSMSTRM pStrm, RTFOFF off, void *pvBuf, size_t cbToRead, uint64_t *poff)
2354{
2355 AssertReturn(!pStrm->fWrite && pStrm->hFile != NIL_RTFILE, VERR_NOT_SUPPORTED);
2356 AssertReturn(pStrm->hIoThread == NIL_RTTHREAD, VERR_WRONG_ORDER);
2357
2358 if (!pStrm->fNeedSeek)
2359 {
2360 pStrm->fNeedSeek = true;
2361 pStrm->offNeedSeekTo = pStrm->offCurStream + (pStrm->pCur ? pStrm->pCur->cb : 0);
2362 }
2363
2364 int rc = RTFileSeek(pStrm->hFile, off, off >= 0 ? RTFILE_SEEK_BEGIN : RTFILE_SEEK_END, poff);
2365 if (RT_SUCCESS(rc))
2366 rc = RTFileRead(pStrm->hFile, pvBuf, cbToRead, NULL);
2367
2368 return rc;
2369}
2370
2371
2372/**
2373 * The I/O thread.
2374 *
2375 * @returns VINF_SUCCESS (ignored).
2376 * @param hSelf The thread handle.
2377 * @param pvStrm The stream handle.
2378 */
2379static DECLCALLBACK(int) ssmR3StrmIoThread(RTTHREAD hSelf, void *pvStrm)
2380{
2381 PSSMSTRM pStrm = (PSSMSTRM)pvStrm;
2382 ASMAtomicWriteHandle(&pStrm->hIoThread, hSelf); /* paranoia */
2383
2384 Log(("ssmR3StrmIoThread: starts working\n"));
2385 if (pStrm->fWrite)
2386 {
2387 /*
2388 * Write until error or terminated.
2389 */
2390 for (;;)
2391 {
2392 int rc = ssmR3StrmWriteBuffers(pStrm);
2393 if ( RT_FAILURE(rc)
2394 || rc == VINF_EOF)
2395 {
2396 Log(("ssmR3StrmIoThread: quitting writing with rc=%Rrc.\n", rc));
2397 break;
2398 }
2399 if (RT_FAILURE(pStrm->rc))
2400 {
2401 Log(("ssmR3StrmIoThread: quitting writing with stream rc=%Rrc\n", pStrm->rc));
2402 break;
2403 }
2404
2405 if (ASMAtomicReadBool(&pStrm->fTerminating))
2406 {
2407 if (!ASMAtomicReadPtr((void * volatile *)&pStrm->pHead))
2408 {
2409 Log(("ssmR3StrmIoThread: quitting writing because of pending termination.\n"));
2410 break;
2411 }
2412 Log(("ssmR3StrmIoThread: postponing termination because of pending buffers.\n"));
2413 }
2414 else if (!ASMAtomicReadPtr((void * volatile *)&pStrm->pHead))
2415 {
2416 rc = RTSemEventWait(pStrm->hEvtHead, RT_INDEFINITE_WAIT);
2417 AssertLogRelRC(rc);
2418 }
2419 }
2420 }
2421 else
2422 {
2423 /*
2424 * Read until end of file, error or termination.
2425 */
2426 for (;;)
2427 {
2428 if (ASMAtomicReadBool(&pStrm->fTerminating))
2429 {
2430 Log(("ssmR3StrmIoThread: quitting reading because of pending termination.\n"));
2431 break;
2432 }
2433
2434 int rc = ssmR3StrmReadMore(pStrm);
2435 if ( RT_FAILURE(rc)
2436 || rc == VINF_EOF)
2437 {
2438 Log(("ssmR3StrmIoThread: quitting reading with rc=%Rrc\n", rc));
2439 break;
2440 }
2441 if (RT_FAILURE(pStrm->rc))
2442 {
2443 Log(("ssmR3StrmIoThread: quitting reading with stream rc=%Rrc\n", pStrm->rc));
2444 break;
2445 }
2446 }
2447 }
2448
2449 return VINF_SUCCESS;
2450}
2451
2452
2453/**
2454 * Starts the I/O thread for the specified stream.
2455 *
2456 * @param pStrm The stream handle.
2457 */
2458static void ssmR3StrmStartIoThread(PSSMSTRM pStrm)
2459{
2460 Assert(pStrm->hIoThread == NIL_RTTHREAD);
2461
2462 RTTHREAD hThread;
2463 int rc = RTThreadCreate(&hThread, ssmR3StrmIoThread, pStrm, 0, RTTHREADTYPE_IO, RTTHREADFLAGS_WAITABLE, "SSM-IO");
2464 AssertRCReturnVoid(rc);
2465 ASMAtomicWriteHandle(&pStrm->hIoThread, hThread); /* paranoia */
2466}
2467
2468
2469/**
2470 * Works the progress calculation.
2471 *
2472 * @param pSSM The SSM handle.
2473 * @param cbAdvance Number of bytes to advance
2474 */
2475static void ssmR3Progress(PSSMHANDLE pSSM, uint64_t cbAdvance)
2476{
2477 /* Can't advance it beyond the estimated end of the unit. */
2478 uint64_t cbLeft = pSSM->offEstUnitEnd - pSSM->offEst;
2479 if (cbAdvance > cbLeft)
2480 cbAdvance = cbLeft;
2481 pSSM->offEst += cbAdvance;
2482
2483 /* uPercentPrepare% prepare, xx% exec, uPercentDone% done+crc */
2484 while ( pSSM->offEst >= pSSM->offEstProgress
2485 && pSSM->uPercent <= 100-pSSM->uPercentDone)
2486 {
2487 if (pSSM->pfnProgress)
2488 pSSM->pfnProgress(pSSM->pVM, pSSM->uPercent, pSSM->pvUser);
2489 pSSM->uPercent++;
2490 pSSM->offEstProgress = (pSSM->uPercent - pSSM->uPercentPrepare) * pSSM->cbEstTotal
2491 / (100 - pSSM->uPercentDone - pSSM->uPercentPrepare);
2492 }
2493}
2494
2495
2496/**
2497 * Writes the directory.
2498 *
2499 * @returns VBox status code.
2500 * @param pVM The VM handle.
2501 * @param pSSM The SSM handle.
2502 * @param pcEntries Where to return the number of directory entries.
2503 */
2504static int ssmR3WriteDirectory(PVM pVM, PSSMHANDLE pSSM, uint32_t *pcEntries)
2505{
2506 /*
2507 * Grab some temporary memory for the dictionary.
2508 */
2509 size_t cbDir = RT_OFFSETOF(SSMFILEDIR, aEntries[pVM->ssm.s.cUnits]);
2510 PSSMFILEDIR pDir = (PSSMFILEDIR)RTMemTmpAlloc(cbDir);
2511 if (!pDir)
2512 {
2513 LogRel(("ssmR3WriteDirectory: failed to allocate %zu bytes!\n", cbDir));
2514 return VERR_NO_TMP_MEMORY;
2515 }
2516
2517 /*
2518 * Initialize it.
2519 */
2520 memcpy(pDir->szMagic, SSMFILEDIR_MAGIC, sizeof(pDir->szMagic));
2521 pDir->u32CRC = 0;
2522 pDir->cEntries = 0;
2523
2524 for (PSSMUNIT pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext)
2525 if (pUnit->offStream != RTFOFF_MIN)
2526 {
2527 PSSMFILEDIRENTRY pEntry = &pDir->aEntries[pDir->cEntries++];
2528 Assert(pDir->cEntries <= pVM->ssm.s.cUnits);
2529 pEntry->off = pUnit->offStream;
2530 pEntry->u32Instance = pUnit->u32Instance;
2531 pEntry->u32NameCRC = RTCrc32(pUnit->szName, pUnit->cchName);
2532 }
2533
2534 /*
2535 * Calculate the actual size and CRC-32, then write the directory
2536 * out to the stream.
2537 */
2538 *pcEntries = pDir->cEntries;
2539 cbDir = RT_OFFSETOF(SSMFILEDIR, aEntries[pDir->cEntries]);
2540 pDir->u32CRC = RTCrc32(pDir, cbDir);
2541 int rc = ssmR3StrmWrite(&pSSM->Strm, pDir, cbDir);
2542 RTMemTmpFree(pDir);
2543 return rc;
2544}
2545
2546
2547/**
2548 * Start VM save operation.
2549 *
2550 * @returns VBox status.
2551 *
2552 * @param pVM The VM handle.
2553 * @param pszFilename Name of the file to save the state in.
2554 * @param enmAfter What is planned after a successful save operation.
2555 * @param pfnProgress Progress callback. Optional.
2556 * @param pvUser User argument for the progress callback.
2557 *
2558 * @thread EMT
2559 */
2560VMMR3DECL(int) SSMR3Save(PVM pVM, const char *pszFilename, SSMAFTER enmAfter, PFNVMPROGRESS pfnProgress, void *pvUser)
2561{
2562 LogFlow(("SSMR3Save: pszFilename=%p:{%s} enmAfter=%d pfnProgress=%p pvUser=%p\n", pszFilename, pszFilename, enmAfter, pfnProgress, pvUser));
2563 VM_ASSERT_EMT(pVM);
2564
2565 /*
2566 * Validate input.
2567 */
2568 if ( enmAfter != SSMAFTER_DESTROY
2569 && enmAfter != SSMAFTER_CONTINUE)
2570 {
2571 AssertMsgFailed(("Invalid enmAfter=%d!\n", enmAfter));
2572 return VERR_INVALID_PARAMETER;
2573 }
2574
2575 /*
2576 * Create the handle and try open the file.
2577 *
2578 * Note that there might be quite some work to do after executing the saving,
2579 * so we reserve 20% for the 'Done' period. The checksumming and closing of
2580 * the saved state file might take a long time.
2581 */
2582 SSMHANDLE Handle;
2583 RT_ZERO(Handle);
2584 Handle.pVM = pVM;
2585 Handle.enmOp = SSMSTATE_INVALID;
2586 Handle.enmAfter = enmAfter;
2587 Handle.rc = VINF_SUCCESS;
2588 Handle.cbUnitLeftV1 = 0;
2589 Handle.offUnit = UINT64_MAX;
2590 Handle.pfnProgress = pfnProgress;
2591 Handle.pvUser = pvUser;
2592 Handle.uPercent = 0;
2593 Handle.offEstProgress = 0;
2594 Handle.cbEstTotal = 0;
2595 Handle.offEst = 0;
2596 Handle.offEstUnitEnd = 0;
2597 Handle.uPercentPrepare = 20;
2598 Handle.uPercentDone = 2;
2599 Handle.u.Write.offDataBuffer = 0;
2600
2601 int rc = ssmR3StrmOpenFile(&Handle.Strm, pszFilename, true /*fWrite*/, true /*fChecksummed*/, 8 /*cBuffers*/);
2602 if (RT_FAILURE(rc))
2603 {
2604 LogRel(("SSM: Failed to create save state file '%s', rc=%Rrc.\n", pszFilename, rc));
2605 return rc;
2606 }
2607
2608 Log(("SSM: Starting state save to file '%s'...\n", pszFilename));
2609 ssmR3StrmStartIoThread(&Handle.Strm);
2610
2611 /*
2612 * Write header.
2613 */
2614 union
2615 {
2616 SSMFILEHDR FileHdr;
2617 SSMFILEUNITHDRV2 UnitHdr;
2618 SSMFILEFTR Footer;
2619 } u;
2620
2621 memcpy(&u.FileHdr.szMagic, SSMFILEHDR_MAGIC_V2_0, sizeof(u.FileHdr.szMagic));
2622 u.FileHdr.u16VerMajor = VBOX_VERSION_MAJOR;
2623 u.FileHdr.u16VerMinor = VBOX_VERSION_MINOR;
2624 u.FileHdr.u32VerBuild = VBOX_VERSION_BUILD;
2625 u.FileHdr.u32SvnRev = VMMGetSvnRev(),
2626 u.FileHdr.cHostBits = HC_ARCH_BITS;
2627 u.FileHdr.cbGCPhys = sizeof(RTGCPHYS);
2628 u.FileHdr.cbGCPtr = sizeof(RTGCPTR);
2629 u.FileHdr.u8Reserved = 0;
2630 u.FileHdr.cUnits = pVM->ssm.s.cUnits;
2631 u.FileHdr.fFlags = SSMFILEHDR_FLAGS_STREAM_CRC32;
2632 u.FileHdr.cbMaxDecompr = RT_SIZEOFMEMB(SSMHANDLE, u.Read.abDataBuffer);
2633 u.FileHdr.u32CRC = 0;
2634 u.FileHdr.u32CRC = RTCrc32(&u.FileHdr, sizeof(u.FileHdr));
2635 rc = ssmR3StrmWrite(&Handle.Strm, &u.FileHdr, sizeof(u.FileHdr));
2636 if (RT_SUCCESS(rc))
2637 {
2638 /*
2639 * Clear the per unit flags and offsets.
2640 */
2641 PSSMUNIT pUnit;
2642 for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext)
2643 {
2644 pUnit->fCalled = false;
2645 pUnit->offStream = RTFOFF_MIN;
2646 }
2647
2648 /*
2649 * Do the prepare run.
2650 */
2651 Handle.rc = VINF_SUCCESS;
2652 Handle.enmOp = SSMSTATE_SAVE_PREP;
2653 for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext)
2654 {
2655 if (pUnit->u.Common.pfnSavePrep)
2656 {
2657 switch (pUnit->enmType)
2658 {
2659 case SSMUNITTYPE_DEV:
2660 rc = pUnit->u.Dev.pfnSavePrep(pUnit->u.Dev.pDevIns, &Handle);
2661 break;
2662 case SSMUNITTYPE_DRV:
2663 rc = pUnit->u.Drv.pfnSavePrep(pUnit->u.Drv.pDrvIns, &Handle);
2664 break;
2665 case SSMUNITTYPE_INTERNAL:
2666 rc = pUnit->u.Internal.pfnSavePrep(pVM, &Handle);
2667 break;
2668 case SSMUNITTYPE_EXTERNAL:
2669 rc = pUnit->u.External.pfnSavePrep(&Handle, pUnit->u.External.pvUser);
2670 break;
2671 }
2672 pUnit->fCalled = true;
2673 if (RT_FAILURE(rc))
2674 {
2675 LogRel(("SSM: Prepare save failed with rc=%Rrc for data unit '%s.\n", rc, pUnit->szName));
2676 break;
2677 }
2678 }
2679
2680 Handle.cbEstTotal += pUnit->cbGuess;
2681 }
2682
2683 /* Progress. */
2684 if (pfnProgress)
2685 pfnProgress(pVM, Handle.uPercentPrepare-1, pvUser);
2686 Handle.uPercent = Handle.uPercentPrepare;
2687
2688 /*
2689 * Do the execute run.
2690 */
2691 if (RT_SUCCESS(rc))
2692 {
2693 Handle.enmOp = SSMSTATE_SAVE_EXEC;
2694 for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext)
2695 {
2696 /*
2697 * Estimate.
2698 */
2699 ssmR3Progress(&Handle, Handle.offEstUnitEnd - Handle.offEst);
2700 Handle.offEstUnitEnd += pUnit->cbGuess;
2701
2702 /*
2703 * Does this unit have a callback? If, not skip it.
2704 */
2705 if (!pUnit->u.Common.pfnSaveExec)
2706 {
2707 pUnit->fCalled = true;
2708 continue;
2709 }
2710 pUnit->offStream = ssmR3StrmTell(&Handle.Strm);
2711
2712 /*
2713 * Write data unit header
2714 */
2715 memcpy(&u.UnitHdr.szMagic[0], SSMFILEUNITHDR_MAGIC, sizeof(u.UnitHdr.szMagic));
2716 u.UnitHdr.offStream = pUnit->offStream;
2717 u.UnitHdr.u32CurStreamCRC = ssmR3StrmCurCRC(&Handle.Strm);
2718 u.UnitHdr.u32CRC = 0;
2719 u.UnitHdr.u32Version = pUnit->u32Version;
2720 u.UnitHdr.u32Instance = pUnit->u32Instance;
2721 u.UnitHdr.u32Phase = SSM_PHASE_FINAL;
2722 u.UnitHdr.fFlags = 0;
2723 u.UnitHdr.cbName = (uint32_t)pUnit->cchName + 1;
2724 memcpy(&u.UnitHdr.szName[0], &pUnit->szName[0], u.UnitHdr.cbName);
2725 u.UnitHdr.u32CRC = RTCrc32(&u.UnitHdr, RT_OFFSETOF(SSMFILEUNITHDRV2, szName[u.UnitHdr.cbName]));
2726 Log(("SSM: Unit at %#9llx: '%s', instance %u, phase %#x, version %u\n",
2727 u.UnitHdr.offStream, u.UnitHdr.szName, u.UnitHdr.u32Instance, u.UnitHdr.u32Phase, u.UnitHdr.u32Version));
2728 rc = ssmR3StrmWrite(&Handle.Strm, &u.UnitHdr, RT_OFFSETOF(SSMFILEUNITHDRV2, szName[u.UnitHdr.cbName]));
2729 if (RT_SUCCESS(rc))
2730 {
2731 /*
2732 * Call the execute handler.
2733 */
2734 ssmR3DataWriteBegin(&Handle);
2735 switch (pUnit->enmType)
2736 {
2737 case SSMUNITTYPE_DEV:
2738 rc = pUnit->u.Dev.pfnSaveExec(pUnit->u.Dev.pDevIns, &Handle);
2739 break;
2740 case SSMUNITTYPE_DRV:
2741 rc = pUnit->u.Drv.pfnSaveExec(pUnit->u.Drv.pDrvIns, &Handle);
2742 break;
2743 case SSMUNITTYPE_INTERNAL:
2744 rc = pUnit->u.Internal.pfnSaveExec(pVM, &Handle);
2745 break;
2746 case SSMUNITTYPE_EXTERNAL:
2747 pUnit->u.External.pfnSaveExec(&Handle, pUnit->u.External.pvUser);
2748 rc = Handle.rc;
2749 break;
2750 }
2751 pUnit->fCalled = true;
2752 if (RT_SUCCESS(rc))
2753 rc = ssmR3DataFlushBuffer(&Handle); /* will return SSMHANDLE::rc if its set */
2754 if (RT_SUCCESS(rc))
2755 {
2756 /*
2757 * Write the termination record and flush the compression stream.
2758 */
2759 SSMRECTERM TermRec;
2760 TermRec.u8TypeAndFlags = SSM_REC_FLAGS_FIXED | SSM_REC_FLAGS_IMPORTANT | SSM_REC_TYPE_TERM;
2761 TermRec.cbRec = sizeof(TermRec) - 2;
2762 if (Handle.Strm.fChecksummed)
2763 {
2764 TermRec.fFlags = SSMRECTERM_FLAGS_CRC32;
2765 TermRec.u32StreamCRC = RTCrc32Finish(RTCrc32Process(ssmR3StrmCurCRC(&Handle.Strm), &TermRec, 2));
2766 }
2767 else
2768 {
2769 TermRec.fFlags = 0;
2770 TermRec.u32StreamCRC = 0;
2771 }
2772 TermRec.cbUnit = Handle.offUnit + sizeof(TermRec);
2773 rc = ssmR3DataWriteRaw(&Handle, &TermRec, sizeof(TermRec));
2774 if (RT_SUCCESS(rc))
2775 rc = ssmR3DataWriteFinish(&Handle);
2776 if (RT_SUCCESS(rc))
2777 Handle.offUnit = UINT64_MAX;
2778 else
2779 {
2780 LogRel(("SSM: Failed ending compression stream. rc=%Rrc\n", rc));
2781 break;
2782 }
2783 }
2784 else
2785 {
2786 LogRel(("SSM: Execute save failed with rc=%Rrc for data unit '%s.\n", rc, pUnit->szName));
2787 break;
2788 }
2789 }
2790 if (RT_FAILURE(rc))
2791 {
2792 LogRel(("SSM: Failed to write unit header. rc=%Rrc\n", rc));
2793 break;
2794 }
2795 } /* for each unit */
2796
2797 /* finish the progress. */
2798 if (RT_SUCCESS(rc))
2799 ssmR3Progress(&Handle, Handle.offEstUnitEnd - Handle.offEst);
2800 }
2801 /* (progress should be pending 99% now) */
2802 AssertMsg(RT_FAILURE(rc) || Handle.uPercent == (101-Handle.uPercentDone), ("%d\n", Handle.uPercent));
2803
2804 /*
2805 * Finalize the file if successfully saved.
2806 */
2807 if (RT_SUCCESS(rc))
2808 {
2809 /* Write the end unit. */
2810 memcpy(&u.UnitHdr.szMagic[0], SSMFILEUNITHDR_END, sizeof(u.UnitHdr.szMagic));
2811 u.UnitHdr.offStream = ssmR3StrmTell(&Handle.Strm);
2812 u.UnitHdr.u32CurStreamCRC = ssmR3StrmCurCRC(&Handle.Strm);
2813 u.UnitHdr.u32CRC = 0;
2814 u.UnitHdr.u32Version = 0;
2815 u.UnitHdr.u32Instance = 0;
2816 u.UnitHdr.u32Phase = SSM_PHASE_FINAL;
2817 u.UnitHdr.fFlags = 0;
2818 u.UnitHdr.cbName = 0;
2819 u.UnitHdr.u32CRC = RTCrc32(&u.UnitHdr, RT_OFFSETOF(SSMFILEUNITHDRV2, szName[0]));
2820 Log(("SSM: Unit at %#9llx: END UNIT\n", u.UnitHdr.offStream));
2821 rc = ssmR3StrmWrite(&Handle.Strm, &u.UnitHdr, RT_OFFSETOF(SSMFILEUNITHDRV2, szName[0]));
2822 if (RT_SUCCESS(rc))
2823 {
2824 /* Write the directory for the final units and then the footer. */
2825 rc = ssmR3WriteDirectory(pVM, &Handle, &u.Footer.cDirEntries);
2826 if (RT_SUCCESS(rc))
2827 {
2828 memcpy(u.Footer.szMagic, SSMFILEFTR_MAGIC, sizeof(u.Footer.szMagic));
2829 u.Footer.offStream = ssmR3StrmTell(&Handle.Strm);
2830 u.Footer.u32StreamCRC = ssmR3StrmFinalCRC(&Handle.Strm);
2831 u.Footer.u32Reserved = 0;
2832 u.Footer.u32CRC = 0;
2833 u.Footer.u32CRC = RTCrc32(&u.Footer, sizeof(u.Footer));
2834 Log(("SSM: Footer at %#9llx: \n", u.Footer.offStream));
2835 rc = ssmR3StrmWrite(&Handle.Strm, &u.Footer, sizeof(u.Footer));
2836 if (RT_SUCCESS(rc))
2837 rc = ssmR3StrmSetEnd(&Handle.Strm);
2838 }
2839 }
2840 if (RT_FAILURE(rc))
2841 LogRel(("SSM: Failed to finalize state file! rc=%Rrc\n", rc));
2842 }
2843
2844 /*
2845 * Do the done run.
2846 */
2847 Handle.rc = rc;
2848 Handle.enmOp = SSMSTATE_SAVE_DONE;
2849 for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext)
2850 {
2851 if ( pUnit->u.Common.pfnSaveDone
2852 && ( pUnit->fCalled
2853 || (!pUnit->u.Common.pfnSavePrep && !pUnit->u.Common.pfnSaveExec)))
2854 {
2855 switch (pUnit->enmType)
2856 {
2857 case SSMUNITTYPE_DEV:
2858 rc = pUnit->u.Dev.pfnSaveDone(pUnit->u.Dev.pDevIns, &Handle);
2859 break;
2860 case SSMUNITTYPE_DRV:
2861 rc = pUnit->u.Drv.pfnSaveDone(pUnit->u.Drv.pDrvIns, &Handle);
2862 break;
2863 case SSMUNITTYPE_INTERNAL:
2864 rc = pUnit->u.Internal.pfnSaveDone(pVM, &Handle);
2865 break;
2866 case SSMUNITTYPE_EXTERNAL:
2867 rc = pUnit->u.External.pfnSaveDone(&Handle, pUnit->u.External.pvUser);
2868 break;
2869 }
2870 if (RT_FAILURE(rc))
2871 {
2872 LogRel(("SSM: Done save failed with rc=%Rrc for data unit '%s.\n", rc, pUnit->szName));
2873 if (RT_SUCCESS(Handle.rc))
2874 Handle.rc = rc;
2875 }
2876 }
2877 }
2878 rc = Handle.rc;
2879
2880 /*
2881 * Close the file and return if we've succeeded.
2882 */
2883 if (RT_SUCCESS(rc))
2884 rc = ssmR3StrmClose(&Handle.Strm);
2885 if (RT_SUCCESS(rc))
2886 {
2887 if (pfnProgress)
2888 pfnProgress(pVM, 100, pvUser);
2889 LogRel(("SSM: Successfully saved the VM state to '%s'\n"
2890 "SSM: Footer at %#llx (%lld), %u directory entries.\n",
2891 pszFilename, u.Footer.offStream, u.Footer.offStream, u.Footer.cDirEntries));
2892 return VINF_SUCCESS;
2893 }
2894 }
2895
2896 /*
2897 * Delete the file on failure.
2898 */
2899 ssmR3StrmClose(&Handle.Strm);
2900 int rc2 = RTFileDelete(pszFilename);
2901 AssertRC(rc2);
2902
2903 return rc;
2904}
2905
2906
2907/**
2908 * Calculate the checksum of a file portion.
2909 *
2910 * @returns VBox status.
2911 * @param pStrm The stream handle
2912 * @param off Where to start checksumming.
2913 * @param cb How much to checksum.
2914 * @param pu32CRC Where to store the calculated checksum.
2915 */
2916static int ssmR3CalcChecksum(PSSMSTRM pStrm, uint64_t off, uint64_t cb, uint32_t *pu32CRC)
2917{
2918 /*
2919 * Allocate a buffer.
2920 */
2921 const size_t cbBuf = _32K;
2922 void *pvBuf = RTMemTmpAlloc(cbBuf);
2923 if (!pvBuf)
2924 return VERR_NO_TMP_MEMORY;
2925
2926 /*
2927 * Loop reading and calculating CRC32.
2928 */
2929 int rc = VINF_SUCCESS;
2930 uint32_t u32CRC = RTCrc32Start();
2931 while (cb > 0)
2932 {
2933 /* read chunk */
2934 size_t cbToRead = cbBuf;
2935 if (cb < cbBuf)
2936 cbToRead = cb;
2937 rc = ssmR3StrmPeekAt(pStrm, off, pvBuf, cbToRead, NULL);
2938 if (RT_FAILURE(rc))
2939 {
2940 AssertMsgFailed(("Failed with rc=%Rrc while calculating crc.\n", rc));
2941 RTMemTmpFree(pvBuf);
2942 return rc;
2943 }
2944
2945 /* advance */
2946 cb -= cbToRead;
2947 off += cbToRead;
2948
2949 /* calc crc32. */
2950 u32CRC = RTCrc32Process(u32CRC, pvBuf, cbToRead);
2951 }
2952 RTMemTmpFree(pvBuf);
2953
2954 /* store the calculated crc */
2955 u32CRC = RTCrc32Finish(u32CRC);
2956 Log(("SSM: u32CRC=0x%08x\n", u32CRC));
2957 *pu32CRC = u32CRC;
2958
2959 return VINF_SUCCESS;
2960}
2961
2962
2963/**
2964 * Validates the header information stored in the handle.
2965 *
2966 * @returns VBox status code.
2967 *
2968 * @param pSSM The handle.
2969 * @param fHaveHostBits Set if the host bits field is valid.
2970 * @param fHaveVersion Set if we have a version.
2971 */
2972static int ssmR3ValidateHeaderInfo(PSSMHANDLE pSSM, bool fHaveHostBits, bool fHaveVersion)
2973{
2974 Assert(pSSM->u.Read.cbFileHdr < 256 && pSSM->u.Read.cbFileHdr > 32);
2975 Assert(pSSM->u.Read.uFmtVerMajor == 1 || pSSM->u.Read.uFmtVerMajor == 2);
2976 Assert(pSSM->u.Read.uFmtVerMinor <= 2);
2977
2978 if (fHaveVersion)
2979 {
2980 if ( pSSM->u.Read.u16VerMajor == 0
2981 || pSSM->u.Read.u16VerMajor > 1000
2982 || pSSM->u.Read.u16VerMinor > 1000
2983 || pSSM->u.Read.u32VerBuild > _1M
2984 || pSSM->u.Read.u32SvnRev == 0
2985 || pSSM->u.Read.u32SvnRev > 10000000 /*100M*/)
2986 {
2987 LogRel(("SSM: Incorrect version values: %u.%u.%u.r%u\n",
2988 pSSM->u.Read.u16VerMajor, pSSM->u.Read.u16VerMinor, pSSM->u.Read.u32VerBuild, pSSM->u.Read.u32SvnRev));
2989 return VERR_SSM_INTEGRITY_VBOX_VERSION;
2990 }
2991 }
2992 else
2993 AssertLogRelReturn( pSSM->u.Read.u16VerMajor == 0
2994 && pSSM->u.Read.u16VerMinor == 0
2995 && pSSM->u.Read.u32VerBuild == 0
2996 && pSSM->u.Read.u32SvnRev == 0,
2997 VERR_SSM_INTEGRITY_VBOX_VERSION);
2998
2999 if (fHaveHostBits)
3000 {
3001 if ( pSSM->u.Read.cHostBits != 32
3002 && pSSM->u.Read.cHostBits != 64)
3003 {
3004 LogRel(("SSM: Incorrect cHostBits value: %u\n", pSSM->u.Read.cHostBits));
3005 return VERR_SSM_INTEGRITY_HEADER;
3006 }
3007 }
3008 else
3009 AssertLogRelReturn(pSSM->u.Read.cHostBits == 0, VERR_SSM_INTEGRITY_HEADER);
3010
3011 if ( pSSM->u.Read.cbGCPhys != sizeof(uint32_t)
3012 && pSSM->u.Read.cbGCPhys != sizeof(uint64_t))
3013 {
3014 LogRel(("SSM: Incorrect cbGCPhys value: %d\n", pSSM->u.Read.cbGCPhys));
3015 return VERR_SSM_INTEGRITY_HEADER;
3016 }
3017 if ( pSSM->u.Read.cbGCPtr != sizeof(uint32_t)
3018 && pSSM->u.Read.cbGCPtr != sizeof(uint64_t))
3019 {
3020 LogRel(("SSM: Incorrect cbGCPtr value: %d\n", pSSM->u.Read.cbGCPtr));
3021 return VERR_SSM_INTEGRITY_HEADER;
3022 }
3023
3024 return VINF_SUCCESS;
3025}
3026
3027
3028/**
3029 * Reads the header, detects the format version and performs integrity
3030 * validations.
3031 *
3032 * @returns VBox status.
3033 * @param File File to validate.
3034 * The file position is undefined on return.
3035 * @param fChecksumIt Whether to checksum the file or not. This will
3036 * be ignored if it the stream isn't a file.
3037 * @param fChecksumOnRead Whether to validate the checksum while reading
3038 * the stream instead of up front. If not possible,
3039 * verify the checksum up front.
3040 * @param pHdr Where to store the file header.
3041 */
3042static int ssmR3HeaderAndValidate(PSSMHANDLE pSSM, bool fChecksumIt, bool fChecksumOnRead)
3043{
3044 /*
3045 * Read and check the header magic.
3046 */
3047 union
3048 {
3049 SSMFILEHDR v2_0;
3050 SSMFILEHDRV12 v1_2;
3051 SSMFILEHDRV11 v1_1;
3052 } uHdr;
3053 int rc = ssmR3StrmRead(&pSSM->Strm, &uHdr, sizeof(uHdr.v2_0.szMagic));
3054 if (RT_FAILURE(rc))
3055 {
3056 LogRel(("SSM: Failed to read file magic header. rc=%Rrc\n", rc));
3057 return rc;
3058 }
3059 if (memcmp(uHdr.v2_0.szMagic, SSMFILEHDR_MAGIC_BASE, sizeof(SSMFILEHDR_MAGIC_BASE) - 1))
3060 {
3061 Log(("SSM: Not a saved state file. magic=%.*s\n", sizeof(uHdr.v2_0.szMagic) - 1, uHdr.v2_0.szMagic));
3062 return VERR_SSM_INTEGRITY_MAGIC;
3063 }
3064
3065 /*
3066 * Find the header size and read the rest.
3067 */
3068 static const struct
3069 {
3070 char szMagic[sizeof(SSMFILEHDR_MAGIC_V2_0)];
3071 size_t cbHdr;
3072 unsigned uFmtVerMajor;
3073 unsigned uFmtVerMinor;
3074 } s_aVers[] =
3075 {
3076 { SSMFILEHDR_MAGIC_V2_0, sizeof(SSMFILEHDR), 2, 0 },
3077 { SSMFILEHDR_MAGIC_V1_2, sizeof(SSMFILEHDRV12), 1, 2 },
3078 { SSMFILEHDR_MAGIC_V1_1, sizeof(SSMFILEHDRV11), 1, 1 },
3079 };
3080 int iVer = RT_ELEMENTS(s_aVers);
3081 while (iVer-- > 0)
3082 if (!memcmp(uHdr.v2_0.szMagic, s_aVers[iVer].szMagic, sizeof(uHdr.v2_0.szMagic)))
3083 break;
3084 if (iVer < 0)
3085 {
3086 Log(("SSM: Unknown file format version. magic=%.*s\n", sizeof(uHdr.v2_0.szMagic) - 1, uHdr.v2_0.szMagic));
3087 return VERR_SSM_INTEGRITY_VERSION;
3088 }
3089 pSSM->u.Read.uFmtVerMajor = s_aVers[iVer].uFmtVerMajor;
3090 pSSM->u.Read.uFmtVerMinor = s_aVers[iVer].uFmtVerMinor;
3091 pSSM->u.Read.cbFileHdr = s_aVers[iVer].cbHdr;
3092
3093 rc = ssmR3StrmRead(&pSSM->Strm, (uint8_t *)&uHdr + sizeof(uHdr.v2_0.szMagic), pSSM->u.Read.cbFileHdr - sizeof(uHdr.v2_0.szMagic));
3094 if (RT_FAILURE(rc))
3095 {
3096 LogRel(("SSM: Failed to read the file header. rc=%Rrc\n", rc));
3097 return rc;
3098 }
3099
3100 /*
3101 * Make version specific adjustments.
3102 */
3103 if (pSSM->u.Read.uFmtVerMajor >= 2)
3104 {
3105 /*
3106 * Version 2.0 and later.
3107 */
3108 bool fChecksummed;
3109 if (pSSM->u.Read.uFmtVerMinor == 0)
3110 {
3111 /* validate the header. */
3112 SSM_CHECK_CRC32_RET(&uHdr.v2_0, sizeof(uHdr.v2_0), ("Header CRC mismatch: %08x, correct is %08x\n", u32CRC, u32ActualCRC));
3113 if (uHdr.v2_0.u8Reserved)
3114 {
3115 LogRel(("SSM: Reserved header field isn't zero: %02x\n", uHdr.v2_0.u8Reserved));
3116 return VERR_SSM_INTEGRITY;
3117 }
3118 if ((uHdr.v2_0.fFlags & ~SSMFILEHDR_FLAGS_STREAM_CRC32))
3119 {
3120 LogRel(("SSM: Unknown header flags: %08x\n", uHdr.v2_0.fFlags));
3121 return VERR_SSM_INTEGRITY;
3122 }
3123 if ( uHdr.v2_0.cbMaxDecompr > sizeof(pSSM->u.Read.abDataBuffer)
3124 || uHdr.v2_0.cbMaxDecompr < _1K
3125 || (uHdr.v2_0.cbMaxDecompr & 0xff) != 0)
3126 {
3127 LogRel(("SSM: The cbMaxDecompr header field is out of range: %#x\n", uHdr.v2_0.cbMaxDecompr));
3128 return VERR_SSM_INTEGRITY;
3129 }
3130
3131 /* set the header info. */
3132 pSSM->u.Read.cHostBits = uHdr.v2_0.cHostBits;
3133 pSSM->u.Read.u16VerMajor = uHdr.v2_0.u16VerMajor;
3134 pSSM->u.Read.u16VerMinor = uHdr.v2_0.u16VerMinor;
3135 pSSM->u.Read.u32VerBuild = uHdr.v2_0.u32VerBuild;
3136 pSSM->u.Read.u32SvnRev = uHdr.v2_0.u32SvnRev;
3137 pSSM->u.Read.cbGCPhys = uHdr.v2_0.cbGCPhys;
3138 pSSM->u.Read.cbGCPtr = uHdr.v2_0.cbGCPtr;
3139 pSSM->u.Read.fFixedGCPtrSize = true;
3140 fChecksummed = !!(uHdr.v2_0.fFlags & SSMFILEHDR_FLAGS_STREAM_CRC32);
3141 }
3142 else
3143 AssertFailedReturn(VERR_INTERNAL_ERROR);
3144 if (!fChecksummed)
3145 ssmR3StrmDisableChecksumming(&pSSM->Strm);
3146
3147 /*
3148 * Read and validate the footer if it's a file.
3149 */
3150 if (ssmR3StrmIsFile(&pSSM->Strm))
3151 {
3152 SSMFILEFTR Footer;
3153 uint64_t offFooter;
3154 rc = ssmR3StrmPeekAt(&pSSM->Strm, -(RTFOFF)sizeof(SSMFILEFTR), &Footer, sizeof(Footer), &offFooter);
3155 AssertLogRelRCReturn(rc, rc);
3156 if (memcmp(Footer.szMagic, SSMFILEFTR_MAGIC, sizeof(Footer.szMagic)))
3157 {
3158 LogRel(("SSM: Bad footer magic: %.*Rhxs\n", sizeof(Footer.szMagic), &Footer.szMagic[0]));
3159 return VERR_SSM_INTEGRITY_FOOTER;
3160 }
3161 SSM_CHECK_CRC32_RET(&Footer, sizeof(Footer), ("Footer CRC mismatch: %08x, correct is %08x\n", u32CRC, u32ActualCRC));
3162 if (Footer.offStream != offFooter)
3163 {
3164 LogRel(("SSM: SSMFILEFTR::offStream is wrong: %llx, expected %llx\n", Footer.offStream, offFooter));
3165 return VERR_SSM_INTEGRITY_FOOTER;
3166 }
3167 if (Footer.u32Reserved)
3168 {
3169 LogRel(("SSM: Reserved footer field isn't zero: %08x\n", Footer.u32Reserved));
3170 return VERR_SSM_INTEGRITY_FOOTER;
3171 }
3172 if ( !fChecksummed
3173 && Footer.u32StreamCRC)
3174 {
3175 LogRel(("SSM: u32StreamCRC field isn't zero, but header says stream checksumming is disabled.\n"));
3176 return VERR_SSM_INTEGRITY_FOOTER;
3177 }
3178
3179 pSSM->u.Read.cbLoadFile = offFooter + sizeof(Footer);
3180 pSSM->u.Read.u32LoadCRC = Footer.u32StreamCRC;
3181 }
3182 else
3183 {
3184 pSSM->u.Read.cbLoadFile = UINT64_MAX;
3185 pSSM->u.Read.u32LoadCRC = 0;
3186 }
3187
3188 /*
3189 * Validate the header info we've set in the handle.
3190 */
3191 rc = ssmR3ValidateHeaderInfo(pSSM, true /*fHaveHostBits*/, true /*fHaveVersion*/);
3192 if (RT_FAILURE(rc))
3193 return rc;
3194
3195 /*
3196 * Check the checksum if that's called for and possible.
3197 */
3198 if ( fChecksummed
3199 && fChecksumIt
3200 && !fChecksumOnRead
3201 && ssmR3StrmIsFile(&pSSM->Strm))
3202 {
3203 uint32_t u32CRC;
3204 rc = ssmR3CalcChecksum(&pSSM->Strm, 0, pSSM->u.Read.cbLoadFile - sizeof(SSMFILEFTR), &u32CRC);
3205 if (RT_FAILURE(rc))
3206 return rc;
3207 if (u32CRC != pSSM->u.Read.u32LoadCRC)
3208 {
3209 LogRel(("SSM: Invalid CRC! Calculated %#010x, in footer %#010x\n", u32CRC, pSSM->u.Read.u32LoadCRC));
3210 return VERR_SSM_INTEGRITY_CRC;
3211 }
3212 }
3213 }
3214 else
3215 {
3216 /*
3217 * Version 1.x of the format.
3218 */
3219 bool fHaveHostBits = true;
3220 bool fHaveVersion = false;
3221 RTUUID MachineUuidFromHdr;
3222
3223 ssmR3StrmDisableChecksumming(&pSSM->Strm);
3224 if (pSSM->u.Read.uFmtVerMinor == 1)
3225 {
3226 pSSM->u.Read.cHostBits = 0; /* unknown */
3227 pSSM->u.Read.u16VerMajor = 0;
3228 pSSM->u.Read.u16VerMinor = 0;
3229 pSSM->u.Read.u32VerBuild = 0;
3230 pSSM->u.Read.u32SvnRev = 0;
3231 pSSM->u.Read.cbLoadFile = uHdr.v1_1.cbFile;
3232 pSSM->u.Read.u32LoadCRC = uHdr.v1_1.u32CRC;
3233 pSSM->u.Read.cbGCPhys = sizeof(RTGCPHYS);
3234 pSSM->u.Read.cbGCPtr = sizeof(RTGCPTR);
3235 pSSM->u.Read.fFixedGCPtrSize = false; /* settable */
3236
3237 MachineUuidFromHdr = uHdr.v1_1.MachineUuid;
3238 fHaveHostBits = false;
3239 }
3240 else if (pSSM->u.Read.uFmtVerMinor == 2)
3241 {
3242 pSSM->u.Read.cHostBits = uHdr.v1_2.cHostBits;
3243 pSSM->u.Read.u16VerMajor = uHdr.v1_2.u16VerMajor;
3244 pSSM->u.Read.u16VerMinor = uHdr.v1_2.u16VerMinor;
3245 pSSM->u.Read.u32VerBuild = uHdr.v1_2.u32VerBuild;
3246 pSSM->u.Read.u32SvnRev = uHdr.v1_2.u32SvnRev;
3247 pSSM->u.Read.cbLoadFile = uHdr.v1_2.cbFile;
3248 pSSM->u.Read.u32LoadCRC = uHdr.v1_2.u32CRC;
3249 pSSM->u.Read.cbGCPhys = uHdr.v1_2.cbGCPhys;
3250 pSSM->u.Read.cbGCPtr = uHdr.v1_2.cbGCPtr;
3251 pSSM->u.Read.fFixedGCPtrSize = true;
3252
3253 MachineUuidFromHdr = uHdr.v1_2.MachineUuid;
3254 fHaveVersion = true;
3255 }
3256 else
3257 AssertFailedReturn(VERR_INTERNAL_ERROR);
3258
3259 /*
3260 * The MachineUuid must be NULL (was never used).
3261 */
3262 if (!RTUuidIsNull(&MachineUuidFromHdr))
3263 {
3264 LogRel(("SSM: The UUID of the saved state doesn't match the running VM.\n"));
3265 return VERR_SMM_INTEGRITY_MACHINE;
3266 }
3267
3268 /*
3269 * Verify the file size.
3270 */
3271 uint64_t cbFile = ssmR3StrmGetSize(&pSSM->Strm);
3272 if (cbFile != pSSM->u.Read.cbLoadFile)
3273 {
3274 LogRel(("SSM: File size mismatch. hdr.cbFile=%lld actual %lld\n", pSSM->u.Read.cbLoadFile, cbFile));
3275 return VERR_SSM_INTEGRITY_SIZE;
3276 }
3277
3278 /*
3279 * Validate the header info we've set in the handle.
3280 */
3281 rc = ssmR3ValidateHeaderInfo(pSSM, fHaveHostBits, fHaveVersion);
3282 if (RT_FAILURE(rc))
3283 return rc;
3284
3285 /*
3286 * Verify the checksum if requested.
3287 *
3288 * Note! The checksum is not actually generated for the whole file,
3289 * this is of course a bug in the v1.x code that we cannot do
3290 * anything about.
3291 */
3292 if ( fChecksumIt
3293 || fChecksumOnRead)
3294 {
3295 uint32_t u32CRC;
3296 rc = ssmR3CalcChecksum(&pSSM->Strm,
3297 RT_OFFSETOF(SSMFILEHDRV11, u32CRC) + sizeof(uHdr.v1_1.u32CRC),
3298 cbFile - pSSM->u.Read.cbFileHdr,
3299 &u32CRC);
3300 if (RT_FAILURE(rc))
3301 return rc;
3302 if (u32CRC != pSSM->u.Read.u32LoadCRC)
3303 {
3304 LogRel(("SSM: Invalid CRC! Calculated %#010x, in header %#010x\n", u32CRC, pSSM->u.Read.u32LoadCRC));
3305 return VERR_SSM_INTEGRITY_CRC;
3306 }
3307 }
3308 }
3309
3310 return VINF_SUCCESS;
3311}
3312
3313
3314/**
3315 * Open a saved state for reading.
3316 *
3317 * The file will be positioned at the first data unit upon successful return.
3318 *
3319 * @returns VBox status code.
3320 *
3321 * @param pVM The VM handle.
3322 * @param pszFilename The filename.
3323 * @param fChecksumIt Check the checksum for the entire file.
3324 * @param fChecksumOnRead Whether to validate the checksum while reading
3325 * the stream instead of up front. If not possible,
3326 * verify the checksum up front.
3327 * @param pSSM Pointer to the handle structure. This will be
3328 * completely initialized on success.
3329 * @param cBuffers The number of stream buffers.
3330 */
3331static int ssmR3OpenFile(PVM pVM, const char *pszFilename, bool fChecksumIt, bool fChecksumOnRead,
3332 uint32_t cBuffers, PSSMHANDLE pSSM)
3333{
3334 /*
3335 * Initialize the handle.
3336 */
3337 pSSM->pVM = pVM;
3338 pSSM->enmOp = SSMSTATE_INVALID;
3339 pSSM->enmAfter = SSMAFTER_INVALID;
3340 pSSM->rc = VINF_SUCCESS;
3341 pSSM->cbUnitLeftV1 = 0;
3342 pSSM->offUnit = UINT64_MAX;
3343 pSSM->pfnProgress = NULL;
3344 pSSM->pvUser = NULL;
3345 pSSM->uPercent = 0;
3346 pSSM->offEstProgress = 0;
3347 pSSM->cbEstTotal = 0;
3348 pSSM->offEst = 0;
3349 pSSM->offEstUnitEnd = 0;
3350 pSSM->uPercentPrepare = 5;
3351 pSSM->uPercentDone = 2;
3352
3353 pSSM->u.Read.pZipDecompV1 = NULL;
3354 pSSM->u.Read.uFmtVerMajor = UINT32_MAX;
3355 pSSM->u.Read.uFmtVerMinor = UINT32_MAX;
3356 pSSM->u.Read.cbFileHdr = UINT32_MAX;
3357 pSSM->u.Read.cbGCPhys = UINT8_MAX;
3358 pSSM->u.Read.cbGCPtr = UINT8_MAX;
3359 pSSM->u.Read.fFixedGCPtrSize= false;
3360 pSSM->u.Read.u16VerMajor = UINT16_MAX;
3361 pSSM->u.Read.u16VerMinor = UINT16_MAX;
3362 pSSM->u.Read.u32VerBuild = UINT32_MAX;
3363 pSSM->u.Read.u32SvnRev = UINT32_MAX;
3364 pSSM->u.Read.cHostBits = UINT8_MAX;
3365 pSSM->u.Read.cbLoadFile = UINT64_MAX;
3366
3367 pSSM->u.Read.cbRecLeft = 0;
3368 pSSM->u.Read.cbDataBuffer = 0;
3369 pSSM->u.Read.offDataBuffer = 0;
3370 pSSM->u.Read.fEndOfData = 0;
3371 pSSM->u.Read.u8TypeAndFlags = 0;
3372
3373 /*
3374 * Try open and validate the file.
3375 */
3376 int rc = ssmR3StrmOpenFile(&pSSM->Strm, pszFilename, false /*fWrite*/, fChecksumOnRead, cBuffers);
3377 if (RT_SUCCESS(rc))
3378 {
3379 rc = ssmR3HeaderAndValidate(pSSM, fChecksumIt, fChecksumOnRead);
3380 if (RT_SUCCESS(rc))
3381 return rc;
3382
3383 /* failure path */
3384 ssmR3StrmClose(&pSSM->Strm);
3385 }
3386 else
3387 Log(("SSM: Failed to open save state file '%s', rc=%Rrc.\n", pszFilename, rc));
3388 return rc;
3389}
3390
3391
3392/**
3393 * Find a data unit by name.
3394 *
3395 * @returns Pointer to the unit.
3396 * @returns NULL if not found.
3397 *
3398 * @param pVM VM handle.
3399 * @param pszName Data unit name.
3400 * @param u32Instance The data unit instance id.
3401 */
3402static PSSMUNIT ssmR3Find(PVM pVM, const char *pszName, uint32_t u32Instance)
3403{
3404 size_t cchName = strlen(pszName);
3405 PSSMUNIT pUnit = pVM->ssm.s.pHead;
3406 while ( pUnit
3407 && ( pUnit->u32Instance != u32Instance
3408 || pUnit->cchName != cchName
3409 || memcmp(pUnit->szName, pszName, cchName)))
3410 pUnit = pUnit->pNext;
3411 return pUnit;
3412}
3413
3414
3415/**
3416 * Executes the loading of a V1.X file.
3417 *
3418 * @returns VBox status code.
3419 * @param pVM The VM handle.
3420 * @param pSSM The saved state handle.
3421 */
3422static int ssmR3LoadExecV1(PVM pVM, PSSMHANDLE pSSM)
3423{
3424 int rc;
3425 char *pszName = NULL;
3426 size_t cchName = 0;
3427 pSSM->enmOp = SSMSTATE_LOAD_EXEC;
3428 for (;;)
3429 {
3430 /*
3431 * Save the current file position and read the data unit header.
3432 */
3433 uint64_t offUnit = ssmR3StrmTell(&pSSM->Strm);
3434 SSMFILEUNITHDRV1 UnitHdr;
3435 rc = ssmR3StrmRead(&pSSM->Strm, &UnitHdr, RT_OFFSETOF(SSMFILEUNITHDRV1, szName));
3436 if (RT_SUCCESS(rc))
3437 {
3438 /*
3439 * Check the magic and see if it's valid and whether it is a end header or not.
3440 */
3441 if (memcmp(&UnitHdr.achMagic[0], SSMFILEUNITHDR_MAGIC, sizeof(SSMFILEUNITHDR_MAGIC)))
3442 {
3443 if (!memcmp(&UnitHdr.achMagic[0], SSMFILEUNITHDR_END, sizeof(SSMFILEUNITHDR_END)))
3444 {
3445 Log(("SSM: EndOfFile: offset %#9llx size %9d\n", offUnit, UnitHdr.cbUnit));
3446 /* Complete the progress bar (pending 99% afterwards). */
3447 ssmR3Progress(pSSM, pSSM->cbEstTotal - pSSM->offEst);
3448 break;
3449 }
3450 LogRel(("SSM: Invalid unit magic at offset %#llx (%lld), '%.*s'!\n",
3451 offUnit, offUnit, sizeof(UnitHdr.achMagic) - 1, &UnitHdr.achMagic[0]));
3452 rc = VERR_SSM_INTEGRITY_UNIT_MAGIC;
3453 break;
3454 }
3455
3456 /*
3457 * Read the name.
3458 * Adjust the name buffer first.
3459 */
3460 if (cchName < UnitHdr.cchName)
3461 {
3462 if (pszName)
3463 RTMemTmpFree(pszName);
3464 cchName = RT_ALIGN_Z(UnitHdr.cchName, 64);
3465 pszName = (char *)RTMemTmpAlloc(cchName);
3466 }
3467 if (pszName)
3468 {
3469 rc = ssmR3StrmRead(&pSSM->Strm, pszName, UnitHdr.cchName);
3470 if (RT_SUCCESS(rc))
3471 {
3472 if (pszName[UnitHdr.cchName - 1])
3473 {
3474 LogRel(("SSM: Unit name '%.*s' was not properly terminated.\n", UnitHdr.cchName, pszName));
3475 rc = VERR_SSM_INTEGRITY_UNIT;
3476 break;
3477 }
3478 Log(("SSM: Data unit: offset %#9llx size %9lld '%s'\n", offUnit, UnitHdr.cbUnit, pszName));
3479
3480 /*
3481 * Find the data unit in our internal table.
3482 */
3483 PSSMUNIT pUnit = ssmR3Find(pVM, pszName, UnitHdr.u32Instance);
3484 if (pUnit)
3485 {
3486 /*
3487 * Call the execute handler.
3488 */
3489 pSSM->cbUnitLeftV1 = UnitHdr.cbUnit - RT_OFFSETOF(SSMFILEUNITHDRV1, szName[UnitHdr.cchName]);
3490 pSSM->offUnit = 0;
3491 if (!pUnit->u.Common.pfnLoadExec)
3492 {
3493 LogRel(("SSM: No load exec callback for unit '%s'!\n", pszName));
3494 rc = VERR_SSM_NO_LOAD_EXEC;
3495 break;
3496 }
3497 switch (pUnit->enmType)
3498 {
3499 case SSMUNITTYPE_DEV:
3500 rc = pUnit->u.Dev.pfnLoadExec(pUnit->u.Dev.pDevIns, pSSM, UnitHdr.u32Version);
3501 break;
3502 case SSMUNITTYPE_DRV:
3503 rc = pUnit->u.Drv.pfnLoadExec(pUnit->u.Drv.pDrvIns, pSSM, UnitHdr.u32Version);
3504 break;
3505 case SSMUNITTYPE_INTERNAL:
3506 rc = pUnit->u.Internal.pfnLoadExec(pVM, pSSM, UnitHdr.u32Version);
3507 break;
3508 case SSMUNITTYPE_EXTERNAL:
3509 rc = pUnit->u.External.pfnLoadExec(pSSM, pUnit->u.External.pvUser, UnitHdr.u32Version);
3510 break;
3511 }
3512
3513 /*
3514 * Close the reader stream.
3515 */
3516 ssmR3DataReadFinishV1(pSSM);
3517
3518 pUnit->fCalled = true;
3519 if (RT_SUCCESS(rc))
3520 rc = pSSM->rc;
3521 if (RT_SUCCESS(rc))
3522 {
3523 /*
3524 * Now, we'll check the current position to see if all, or
3525 * more than all, the data was read.
3526 *
3527 * Note! Because of buffering / compression we'll only see the
3528 * really bad ones here.
3529 */
3530 uint64_t off = ssmR3StrmTell(&pSSM->Strm);
3531 int64_t i64Diff = off - (offUnit + UnitHdr.cbUnit);
3532 if (i64Diff < 0)
3533 {
3534 Log(("SSM: Unit '%s' left %lld bytes unread!\n", pszName, -i64Diff));
3535 rc = ssmR3StrmSkipTo(&pSSM->Strm, offUnit + UnitHdr.cbUnit);
3536 ssmR3Progress(pSSM, offUnit + UnitHdr.cbUnit - pSSM->offEst);
3537 }
3538 else if (i64Diff > 0)
3539 {
3540 LogRel(("SSM: Unit '%s' read %lld bytes too much!\n", pszName, i64Diff));
3541 rc = VMSetError(pVM, VERR_SSM_LOADED_TOO_MUCH, RT_SRC_POS,
3542 N_("Unit '%s' read %lld bytes too much"), pszName, i64Diff);
3543 break;
3544 }
3545
3546 pSSM->offUnit = UINT64_MAX;
3547 }
3548 else
3549 {
3550 LogRel(("SSM: Load exec failed for '%s' instance #%u ! (version %u)\n",
3551 pszName, UnitHdr.u32Instance, UnitHdr.u32Version));
3552 VMSetError(pVM, rc, RT_SRC_POS, N_("Load exec failed for '%s' instance #%u (version %u)"),
3553 pszName, UnitHdr.u32Instance, UnitHdr.u32Version);
3554 break;
3555 }
3556 }
3557 else
3558 {
3559 /*
3560 * SSM unit wasn't found - ignore this when loading for the debugger.
3561 */
3562 LogRel(("SSM: Found no handler for unit '%s'!\n", pszName));
3563 rc = VERR_SSM_INTEGRITY_UNIT_NOT_FOUND;
3564 if (pSSM->enmAfter != SSMAFTER_DEBUG_IT)
3565 break;
3566 rc = ssmR3StrmSkipTo(&pSSM->Strm, offUnit + UnitHdr.cbUnit);
3567 }
3568 }
3569 }
3570 else
3571 rc = VERR_NO_TMP_MEMORY;
3572 }
3573
3574 /*
3575 * I/O errors ends up here (yea, I know, very nice programming).
3576 */
3577 if (RT_FAILURE(rc))
3578 {
3579 LogRel(("SSM: I/O error. rc=%Rrc\n", rc));
3580 break;
3581 }
3582 }
3583
3584 RTMemTmpFree(pszName);
3585 return rc;
3586}
3587
3588
3589/**
3590 * Executes the loading of a V2.X file.
3591 *
3592 * @returns VBox status code.
3593 * @param pVM The VM handle.
3594 * @param pSSM The saved state handle.
3595 */
3596static int ssmR3LoadExecV2(PVM pVM, PSSMHANDLE pSSM)
3597{
3598 pSSM->enmOp = SSMSTATE_LOAD_EXEC;
3599 for (;;)
3600 {
3601 /*
3602 * Read the unit header and check its integrity.
3603 */
3604 uint64_t offUnit = ssmR3StrmTell(&pSSM->Strm);
3605 uint32_t u32CurStreamCRC = ssmR3StrmCurCRC(&pSSM->Strm);
3606 SSMFILEUNITHDRV2 UnitHdr;
3607 int rc = ssmR3StrmRead(&pSSM->Strm, &UnitHdr, RT_OFFSETOF(SSMFILEUNITHDRV2, szName));
3608 if (RT_FAILURE(rc))
3609 return rc;
3610 if (RT_UNLIKELY( memcmp(&UnitHdr.szMagic[0], SSMFILEUNITHDR_MAGIC, sizeof(UnitHdr.szMagic))
3611 && memcmp(&UnitHdr.szMagic[0], SSMFILEUNITHDR_END, sizeof(UnitHdr.szMagic))))
3612 {
3613 LogRel(("SSM: Unit at %#llx (%lld): Invalid unit magic: %.*Rhxs!\n",
3614 offUnit, offUnit, sizeof(UnitHdr.szMagic) - 1, &UnitHdr.szMagic[0]));
3615 return VMSetError(pVM, VERR_SSM_INTEGRITY_UNIT_MAGIC, RT_SRC_POS,
3616 N_("Unit at %#llx (%lld): Invalid unit magic"), offUnit, offUnit);
3617 }
3618 if (UnitHdr.cbName)
3619 {
3620 AssertLogRelMsgReturn(UnitHdr.cbName <= sizeof(UnitHdr.szName),
3621 ("Unit at %#llx (%lld): UnitHdr.cbName=%u > %u\n",
3622 offUnit, offUnit, UnitHdr.cbName, sizeof(UnitHdr.szName)),
3623 VERR_SSM_INTEGRITY_UNIT);
3624 rc = ssmR3StrmRead(&pSSM->Strm, &UnitHdr.szName[0], UnitHdr.cbName);
3625 if (RT_FAILURE(rc))
3626 return rc;
3627 AssertLogRelMsgReturn(!UnitHdr.szName[UnitHdr.cbName - 1],
3628 ("Unit at %#llx (%lld): Name %.*Rhxs was not properly terminated.\n",
3629 offUnit, offUnit, UnitHdr.cbName, UnitHdr.szName),
3630 VERR_SSM_INTEGRITY_UNIT);
3631 }
3632 SSM_CHECK_CRC32_RET(&UnitHdr, RT_OFFSETOF(SSMFILEUNITHDRV2, szName[UnitHdr.cbName]),
3633 ("Unit at %#llx (%lld): CRC mismatch: %08x, correct is %08x\n", offUnit, offUnit, u32CRC, u32ActualCRC));
3634 AssertLogRelMsgReturn(UnitHdr.offStream == offUnit,
3635 ("Unit at %#llx (%lld): offStream=%#llx, expected %#llx\n", offUnit, offUnit, UnitHdr.offStream, offUnit),
3636 VERR_SSM_INTEGRITY_UNIT);
3637 AssertLogRelMsgReturn(UnitHdr.u32CurStreamCRC == u32CurStreamCRC || !pSSM->Strm.fChecksummed,
3638 ("Unit at %#llx (%lld): Stream CRC mismatch: %08x, correct is %08x\n", offUnit, offUnit, UnitHdr.u32CurStreamCRC, u32CurStreamCRC),
3639 VERR_SSM_INTEGRITY_UNIT);
3640 AssertLogRelMsgReturn(!UnitHdr.fFlags, ("Unit at %#llx (%lld): fFlags=%08x\n", offUnit, offUnit, UnitHdr.fFlags),
3641 VERR_SSM_INTEGRITY_UNIT);
3642 if (!memcmp(&UnitHdr.szMagic[0], SSMFILEUNITHDR_END, sizeof(UnitHdr.szMagic)))
3643 {
3644 AssertLogRelMsgReturn( UnitHdr.cbName == 0
3645 && UnitHdr.u32Instance == 0
3646 && UnitHdr.u32Version == 0
3647 && UnitHdr.u32Phase == SSM_PHASE_FINAL,
3648 ("Unit at %#llx (%lld): Malformed END unit\n", offUnit, offUnit),
3649 VERR_SSM_INTEGRITY_UNIT);
3650
3651 /*
3652 * Complete the progress bar (pending 99% afterwards) and RETURN.
3653 */
3654 Log(("SSM: Unit at %#9llx: END UNIT\n", offUnit));
3655 ssmR3Progress(pSSM, pSSM->cbEstTotal - pSSM->offEst);
3656 return VINF_SUCCESS;
3657 }
3658 AssertLogRelMsgReturn(UnitHdr.cbName > 1, ("Unit at %#llx (%lld): No name\n", offUnit, offUnit), VERR_SSM_INTEGRITY);
3659
3660 Log(("SSM: Unit at %#9llx: '%s', instance %u, phase %#x, version %u\n",
3661 offUnit, UnitHdr.szName, UnitHdr.u32Instance, UnitHdr.u32Phase, UnitHdr.u32Version));
3662
3663 /*
3664 * Find the data unit in our internal table.
3665 */
3666 PSSMUNIT pUnit = ssmR3Find(pVM, UnitHdr.szName, UnitHdr.u32Instance);
3667 if (pUnit)
3668 {
3669 /*
3670 * Call the execute handler.
3671 */
3672 AssertLogRelMsgReturn(pUnit->u.Common.pfnLoadExec,
3673 ("SSM: No load exec callback for unit '%s'!\n", UnitHdr.szName),
3674 VERR_SSM_NO_LOAD_EXEC);
3675 ssmR3DataReadBeginV2(pSSM);
3676 switch (pUnit->enmType)
3677 {
3678 case SSMUNITTYPE_DEV:
3679 rc = pUnit->u.Dev.pfnLoadExec(pUnit->u.Dev.pDevIns, pSSM, UnitHdr.u32Version);
3680 break;
3681 case SSMUNITTYPE_DRV:
3682 rc = pUnit->u.Drv.pfnLoadExec(pUnit->u.Drv.pDrvIns, pSSM, UnitHdr.u32Version);
3683 break;
3684 case SSMUNITTYPE_INTERNAL:
3685 rc = pUnit->u.Internal.pfnLoadExec(pVM, pSSM, UnitHdr.u32Version);
3686 break;
3687 case SSMUNITTYPE_EXTERNAL:
3688 rc = pUnit->u.External.pfnLoadExec(pSSM, pUnit->u.External.pvUser, UnitHdr.u32Version);
3689 break;
3690 }
3691 ssmR3DataReadFinishV2(pSSM);
3692 pUnit->fCalled = true;
3693 if (RT_SUCCESS(rc))
3694 rc = pSSM->rc;
3695 if (RT_SUCCESS(rc))
3696 pSSM->offUnit = UINT64_MAX;
3697 else
3698 {
3699 LogRel(("SSM: LoadExec failed for '%s' instance #%u (version %u, phase %#x): %Rrc\n",
3700 UnitHdr.szName, UnitHdr.u32Instance, UnitHdr.u32Version, UnitHdr.u32Phase, rc));
3701 return VMSetError(pVM, rc, RT_SRC_POS, N_("Failed to load unit '%s'"), UnitHdr.szName);
3702 }
3703 }
3704 else
3705 {
3706 /*
3707 * SSM unit wasn't found - ignore this when loading for the debugger.
3708 */
3709 LogRel(("SSM: Found no handler for unit '%s' instance #%u!\n", UnitHdr.szName, UnitHdr.u32Instance));
3710 if (pSSM->enmAfter != SSMAFTER_DEBUG_IT)
3711 return VMSetError(pVM, VERR_SSM_INTEGRITY_UNIT_NOT_FOUND, RT_SRC_POS,
3712 N_("Found no handler for unit '%s' instance #%u"), UnitHdr.szName, UnitHdr.u32Instance);
3713 SSMR3SkipToEndOfUnit(pSSM);
3714 ssmR3DataReadFinishV2(pSSM);
3715 }
3716 }
3717 /* won't get here */
3718}
3719
3720
3721
3722
3723/**
3724 * Load VM save operation.
3725 *
3726 * @returns VBox status.
3727 *
3728 * @param pVM The VM handle.
3729 * @param pszFilename Name of the file to save the state in.
3730 * @param enmAfter What is planned after a successful load operation.
3731 * Only acceptable values are SSMAFTER_RESUME and SSMAFTER_DEBUG_IT.
3732 * @param pfnProgress Progress callback. Optional.
3733 * @param pvUser User argument for the progress callback.
3734 *
3735 * @thread EMT
3736 */
3737VMMR3DECL(int) SSMR3Load(PVM pVM, const char *pszFilename, SSMAFTER enmAfter, PFNVMPROGRESS pfnProgress, void *pvUser)
3738{
3739 LogFlow(("SSMR3Load: pszFilename=%p:{%s} enmAfter=%d pfnProgress=%p pvUser=%p\n", pszFilename, pszFilename, enmAfter, pfnProgress, pvUser));
3740 VM_ASSERT_EMT(pVM);
3741
3742 /*
3743 * Validate input.
3744 */
3745 if ( enmAfter != SSMAFTER_RESUME
3746 && enmAfter != SSMAFTER_DEBUG_IT)
3747 {
3748 AssertMsgFailed(("Invalid enmAfter=%d!\n", enmAfter));
3749 return VERR_INVALID_PARAMETER;
3750 }
3751
3752 /*
3753 * Create the handle and open the file.
3754 */
3755 SSMHANDLE Handle;
3756 int rc = ssmR3OpenFile(pVM, pszFilename, false /* fChecksumIt */, true /* fChecksumOnRead */, 8 /*cBuffers*/, &Handle);
3757 if (RT_SUCCESS(rc))
3758 {
3759 ssmR3StrmStartIoThread(&Handle.Strm);
3760
3761 Handle.enmAfter = enmAfter;
3762 Handle.pfnProgress = pfnProgress;
3763 Handle.pvUser = pvUser;
3764
3765 if (Handle.u.Read.u16VerMajor)
3766 LogRel(("SSM: File header: Format %u.%u, VirtualBox Version %u.%u.%u r%u, %u-bit host, cbGCPhys=%u, cbGCPtr=%u\n",
3767 Handle.u.Read.uFmtVerMajor, Handle.u.Read.uFmtVerMinor,
3768 Handle.u.Read.u16VerMajor, Handle.u.Read.u16VerMinor, Handle.u.Read.u32VerBuild, Handle.u.Read.u32SvnRev,
3769 Handle.u.Read.cHostBits, Handle.u.Read.cbGCPhys, Handle.u.Read.cbGCPtr));
3770 else
3771 LogRel(("SSM: File header: Format %u.%u, %u-bit host, cbGCPhys=%u, cbGCPtr=%u\n" ,
3772 Handle.u.Read.uFmtVerMajor, Handle.u.Read.uFmtVerMinor,
3773 Handle.u.Read.cHostBits, Handle.u.Read.cbGCPhys, Handle.u.Read.cbGCPtr));
3774
3775 if (pfnProgress)
3776 pfnProgress(pVM, Handle.uPercent, pvUser);
3777
3778 /*
3779 * Clear the per unit flags.
3780 */
3781 PSSMUNIT pUnit;
3782 for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext)
3783 pUnit->fCalled = false;
3784
3785 /*
3786 * Do the prepare run.
3787 */
3788 Handle.rc = VINF_SUCCESS;
3789 Handle.enmOp = SSMSTATE_LOAD_PREP;
3790 for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext)
3791 {
3792 if (pUnit->u.Common.pfnLoadPrep)
3793 {
3794 pUnit->fCalled = true;
3795 switch (pUnit->enmType)
3796 {
3797 case SSMUNITTYPE_DEV:
3798 rc = pUnit->u.Dev.pfnLoadPrep(pUnit->u.Dev.pDevIns, &Handle);
3799 break;
3800 case SSMUNITTYPE_DRV:
3801 rc = pUnit->u.Drv.pfnLoadPrep(pUnit->u.Drv.pDrvIns, &Handle);
3802 break;
3803 case SSMUNITTYPE_INTERNAL:
3804 rc = pUnit->u.Internal.pfnLoadPrep(pVM, &Handle);
3805 break;
3806 case SSMUNITTYPE_EXTERNAL:
3807 rc = pUnit->u.External.pfnLoadPrep(&Handle, pUnit->u.External.pvUser);
3808 break;
3809 }
3810 if (RT_FAILURE(rc))
3811 {
3812 LogRel(("SSM: Prepare load failed with rc=%Rrc for data unit '%s.\n", rc, pUnit->szName));
3813 break;
3814 }
3815 }
3816 }
3817
3818 /* pending 2% */
3819 if (pfnProgress)
3820 pfnProgress(pVM, Handle.uPercentPrepare-1, pvUser);
3821 Handle.uPercent = Handle.uPercentPrepare;
3822 Handle.cbEstTotal = Handle.u.Read.cbLoadFile;
3823 Handle.offEstUnitEnd = Handle.u.Read.cbLoadFile;
3824
3825 /*
3826 * Do the execute run.
3827 */
3828 if (RT_SUCCESS(rc))
3829 {
3830 if (Handle.u.Read.uFmtVerMajor >= 2)
3831 rc = ssmR3LoadExecV2(pVM, &Handle);
3832 else
3833 rc = ssmR3LoadExecV1(pVM, &Handle);
3834 /* (progress should be pending 99% now) */
3835 AssertMsg(RT_FAILURE(rc) || Handle.uPercent == (101-Handle.uPercentDone), ("%d\n", Handle.uPercent));
3836 }
3837
3838 /*
3839 * Do the done run.
3840 */
3841 Handle.rc = rc;
3842 Handle.enmOp = SSMSTATE_LOAD_DONE;
3843 for (pUnit = pVM->ssm.s.pHead; pUnit; pUnit = pUnit->pNext)
3844 {
3845 if ( pUnit->u.Common.pfnLoadDone
3846 && ( pUnit->fCalled
3847 || (!pUnit->u.Common.pfnLoadPrep && !pUnit->u.Common.pfnLoadExec)))
3848 {
3849 rc = VINF_SUCCESS;
3850 switch (pUnit->enmType)
3851 {
3852 case SSMUNITTYPE_DEV:
3853 rc = pUnit->u.Dev.pfnLoadDone(pUnit->u.Dev.pDevIns, &Handle);
3854 break;
3855 case SSMUNITTYPE_DRV:
3856 rc = pUnit->u.Drv.pfnLoadDone(pUnit->u.Drv.pDrvIns, &Handle);
3857 break;
3858 case SSMUNITTYPE_INTERNAL:
3859 rc = pUnit->u.Internal.pfnLoadDone(pVM, &Handle);
3860 break;
3861 case SSMUNITTYPE_EXTERNAL:
3862 rc = pUnit->u.External.pfnLoadDone(&Handle, pUnit->u.External.pvUser);
3863 break;
3864 }
3865 if (RT_FAILURE(rc))
3866 {
3867 LogRel(("SSM: LoadDone failed with rc=%Rrc for data unit '%s' instance #%u.\n",
3868 rc, pUnit->szName, pUnit->u32Instance));
3869 if (RT_SUCCESS(Handle.rc))
3870 Handle.rc = rc;
3871 }
3872 }
3873 }
3874 rc = Handle.rc;
3875
3876 /* progress */
3877 if (pfnProgress)
3878 pfnProgress(pVM, 99, pvUser);
3879
3880 ssmR3StrmClose(&Handle.Strm);
3881 }
3882
3883 /*
3884 * Done
3885 */
3886 if (RT_SUCCESS(rc))
3887 {
3888 /* progress */
3889 if (pfnProgress)
3890 pfnProgress(pVM, 100, pvUser);
3891 Log(("SSM: Load of '%s' completed!\n", pszFilename));
3892 }
3893 return rc;
3894}
3895
3896
3897/**
3898 * Validates a file as a validate SSM saved state.
3899 *
3900 * This will only verify the file format, the format and content of individual
3901 * data units are not inspected.
3902 *
3903 * @returns VINF_SUCCESS if valid.
3904 * @returns VBox status code on other failures.
3905 *
3906 * @param pszFilename The path to the file to validate.
3907 * @param fChecksumIt Whether to checksum the file or not.
3908 *
3909 * @thread Any.
3910 */
3911VMMR3DECL(int) SSMR3ValidateFile(const char *pszFilename, bool fChecksumIt)
3912{
3913 LogFlow(("SSMR3ValidateFile: pszFilename=%p:{%s} fChecksumIt=%RTbool\n", pszFilename, pszFilename, fChecksumIt));
3914
3915 /*
3916 * Try open the file and validate it.
3917 */
3918 SSMHANDLE Handle;
3919 int rc = ssmR3OpenFile(NULL, pszFilename, fChecksumIt, false /*fChecksumOnRead*/, 1 /*cBuffers*/, &Handle);
3920 if (RT_SUCCESS(rc))
3921 ssmR3StrmClose(&Handle.Strm);
3922 else
3923 Log(("SSM: Failed to open saved state file '%s', rc=%Rrc.\n", pszFilename, rc));
3924 return rc;
3925}
3926
3927
3928/**
3929 * Opens a saved state file for reading.
3930 *
3931 * @returns VBox status code.
3932 *
3933 * @param pszFilename The path to the saved state file.
3934 * @param fFlags Open flags. Reserved, must be 0.
3935 * @param ppSSM Where to store the SSM handle.
3936 *
3937 * @thread Any.
3938 */
3939VMMR3DECL(int) SSMR3Open(const char *pszFilename, unsigned fFlags, PSSMHANDLE *ppSSM)
3940{
3941 LogFlow(("SSMR3Open: pszFilename=%p:{%s} fFlags=%#x ppSSM=%p\n", pszFilename, pszFilename, fFlags, ppSSM));
3942
3943 /*
3944 * Validate input.
3945 */
3946 AssertMsgReturn(VALID_PTR(pszFilename), ("%p\n", pszFilename), VERR_INVALID_PARAMETER);
3947 AssertMsgReturn(!fFlags, ("%#x\n", fFlags), VERR_INVALID_PARAMETER);
3948 AssertMsgReturn(VALID_PTR(ppSSM), ("%p\n", ppSSM), VERR_INVALID_PARAMETER);
3949
3950 /*
3951 * Allocate a handle.
3952 */
3953 PSSMHANDLE pSSM = (PSSMHANDLE)RTMemAllocZ(sizeof(*pSSM));
3954 AssertReturn(pSSM, VERR_NO_MEMORY);
3955
3956 /*
3957 * Try open the file and validate it.
3958 */
3959 int rc = ssmR3OpenFile(NULL, pszFilename, false /*fChecksumIt*/, true /*fChecksumOnRead*/, 1 /*cBuffers*/, pSSM);
3960 if (RT_SUCCESS(rc))
3961 {
3962 pSSM->enmAfter = SSMAFTER_OPENED;
3963 pSSM->enmOp = SSMSTATE_OPEN_READ;
3964 *ppSSM = pSSM;
3965 LogFlow(("SSMR3Open: returns VINF_SUCCESS *ppSSM=%p\n", *ppSSM));
3966 return VINF_SUCCESS;
3967 }
3968
3969 Log(("SSMR3Open: Failed to open saved state file '%s', rc=%Rrc.\n", pszFilename, rc));
3970 RTMemFree(pSSM);
3971 return rc;
3972
3973}
3974
3975
3976/**
3977 * Closes a saved state file opened by SSMR3Open().
3978 *
3979 * @returns VBox status code.
3980 *
3981 * @param pSSM The SSM handle returned by SSMR3Open().
3982 *
3983 * @thread Any, but the caller is responsible for serializing calls per handle.
3984 */
3985VMMR3DECL(int) SSMR3Close(PSSMHANDLE pSSM)
3986{
3987 LogFlow(("SSMR3Close: pSSM=%p\n", pSSM));
3988
3989 /*
3990 * Validate input.
3991 */
3992 AssertMsgReturn(VALID_PTR(pSSM), ("%p\n", pSSM), VERR_INVALID_PARAMETER);
3993 AssertMsgReturn(pSSM->enmAfter == SSMAFTER_OPENED, ("%d\n", pSSM->enmAfter),VERR_INVALID_PARAMETER);
3994 AssertMsgReturn(pSSM->enmOp == SSMSTATE_OPEN_READ, ("%d\n", pSSM->enmOp), VERR_INVALID_PARAMETER);
3995
3996 /*
3997 * Close the stream and free the handle.
3998 */
3999 int rc = ssmR3StrmClose(&pSSM->Strm);
4000 if (pSSM->u.Read.pZipDecompV1)
4001 {
4002 RTZipDecompDestroy(pSSM->u.Read.pZipDecompV1);
4003 pSSM->u.Read.pZipDecompV1 = NULL;
4004 }
4005 RTMemFree(pSSM);
4006 return rc;
4007}
4008
4009
4010/**
4011 * Worker for SSMR3Seek that seeks version 1 saved state files.
4012 *
4013 * @returns VBox status code.
4014 * @param pSSM The SSM handle.
4015 * @param pszUnit The unit to seek to.
4016 * @param iInstance The particulart insance we seek.
4017 * @param piVersion Where to store the unit version number.
4018 */
4019static int ssmR3FileSeekV1(PSSMHANDLE pSSM, const char *pszUnit, uint32_t iInstance, uint32_t *piVersion)
4020{
4021 /*
4022 * Walk the data units until we find EOF or a match.
4023 */
4024 size_t cbUnitNm = strlen(pszUnit) + 1;
4025 AssertLogRelReturn(cbUnitNm <= SSM_MAX_NAME_SIZE, VERR_SSM_UNIT_NOT_FOUND);
4026 char szName[SSM_MAX_NAME_SIZE];
4027 SSMFILEUNITHDRV1 UnitHdr;
4028 for (RTFOFF off = pSSM->u.Read.cbFileHdr; ; off += UnitHdr.cbUnit)
4029 {
4030 /*
4031 * Read the unit header and verify it.
4032 */
4033 int rc = ssmR3StrmPeekAt(&pSSM->Strm, off, &UnitHdr, RT_OFFSETOF(SSMFILEUNITHDRV1, szName), NULL);
4034 AssertRCReturn(rc, rc);
4035 if (!memcmp(&UnitHdr.achMagic[0], SSMFILEUNITHDR_MAGIC, sizeof(SSMFILEUNITHDR_MAGIC)))
4036 {
4037 /*
4038 * Does what we've got match, if so read the name.
4039 */
4040 if ( UnitHdr.u32Instance == iInstance
4041 && UnitHdr.cchName == cbUnitNm)
4042 {
4043 rc = ssmR3StrmPeekAt(&pSSM->Strm, off + RT_OFFSETOF(SSMFILEUNITHDRV1, szName), szName, cbUnitNm, NULL);
4044 AssertRCReturn(rc, rc);
4045 AssertLogRelMsgReturn(!szName[UnitHdr.cchName - 1],
4046 (" Unit name '%.*s' was not properly terminated.\n", cbUnitNm, szName),
4047 VERR_SSM_INTEGRITY_UNIT);
4048
4049 /*
4050 * Does the name match?
4051 */
4052 if (!memcmp(szName, pszUnit, cbUnitNm))
4053 {
4054 rc = ssmR3StrmSeek(&pSSM->Strm, off + RT_OFFSETOF(SSMFILEUNITHDRV1, szName) + cbUnitNm, RTFILE_SEEK_BEGIN, 0);
4055 pSSM->cbUnitLeftV1 = UnitHdr.cbUnit - RT_OFFSETOF(SSMFILEUNITHDRV1, szName[cbUnitNm]);
4056 pSSM->offUnit = 0;
4057 if (piVersion)
4058 *piVersion = UnitHdr.u32Version;
4059 return VINF_SUCCESS;
4060 }
4061 }
4062 }
4063 else if (!memcmp(&UnitHdr.achMagic[0], SSMFILEUNITHDR_END, sizeof(SSMFILEUNITHDR_END)))
4064 return VERR_SSM_UNIT_NOT_FOUND;
4065 else
4066 AssertLogRelMsgFailedReturn(("Invalid unit magic at offset %RTfoff, '%.*s'!\n",
4067 off, sizeof(UnitHdr.achMagic) - 1, &UnitHdr.achMagic[0]),
4068 VERR_SSM_INTEGRITY_UNIT_MAGIC);
4069 }
4070 /* won't get here. */
4071}
4072
4073
4074/**
4075 * Worker for ssmR3FileSeekV2 for simplifying memory cleanup.
4076 *
4077 * @returns VBox status code.
4078 * @param pSSM The SSM handle.
4079 * @param pDir The directory buffer.
4080 * @param cbDir The size of the directory.
4081 * @param cDirEntries The number of directory entries.
4082 * @param offDir The directory offset in the file.
4083 * @param pszUnit The unit to seek to.
4084 * @param iInstance The particulart insance we seek.
4085 * @param piVersion Where to store the unit version number.
4086 */
4087static int ssmR3FileSeekSubV2(PSSMHANDLE pSSM, PSSMFILEDIR pDir, size_t cbDir, uint32_t cDirEntries, uint64_t offDir,
4088 const char *pszUnit, uint32_t iInstance, uint32_t *piVersion)
4089{
4090 /*
4091 * Read it.
4092 */
4093 int rc = ssmR3StrmPeekAt(&pSSM->Strm, offDir, pDir, cbDir, NULL);
4094 AssertLogRelRCReturn(rc, rc);
4095 AssertLogRelReturn(!memcmp(pDir->szMagic, SSMFILEDIR_MAGIC, sizeof(pDir->szMagic)), VERR_SSM_INTEGRITY_DIR_MAGIC);
4096 SSM_CHECK_CRC32_RET(pDir, cbDir, ("Bad directory CRC: %08x, actual %08x\n", u32CRC, u32ActualCRC));
4097 AssertLogRelMsgReturn(pDir->cEntries == cDirEntries,
4098 ("Bad directory entry count: %#x, expected %#x (from the footer)\n", pDir->cEntries, cDirEntries),
4099 VERR_SSM_INTEGRITY_DIR);
4100 for (uint32_t i = 0; i < cDirEntries; i++)
4101 AssertLogRelMsgReturn(pDir->aEntries[i].off < offDir,
4102 ("i=%u off=%lld offDir=%lld\n", i, pDir->aEntries[i].off, offDir),
4103 VERR_SSM_INTEGRITY_DIR);
4104
4105 /*
4106 * Search the directory.
4107 */
4108 size_t cbUnitNm = strlen(pszUnit) + 1;
4109 uint32_t const u32NameCRC = RTCrc32(pszUnit, cbUnitNm - 1);
4110 for (uint32_t i = 0; i < cDirEntries; i++)
4111 {
4112 if ( pDir->aEntries[i].u32NameCRC == u32NameCRC
4113 && pDir->aEntries[i].u32Instance == iInstance)
4114 {
4115 /*
4116 * Read and validate the unit header.
4117 */
4118 SSMFILEUNITHDRV2 UnitHdr;
4119 size_t cbToRead = sizeof(UnitHdr);
4120 if (pDir->aEntries[i].off + cbToRead > offDir)
4121 {
4122 cbToRead = offDir - pDir->aEntries[i].off;
4123 RT_ZERO(UnitHdr);
4124 }
4125 rc = ssmR3StrmPeekAt(&pSSM->Strm, pDir->aEntries[i].off, &UnitHdr, cbToRead, NULL);
4126 AssertLogRelRCReturn(rc, rc);
4127
4128 AssertLogRelMsgReturn(!memcmp(UnitHdr.szMagic, SSMFILEUNITHDR_MAGIC, sizeof(UnitHdr.szMagic)),
4129 ("Bad unit header or dictionary offset: i=%u off=%lld\n", i, pDir->aEntries[i].off),
4130 VERR_SSM_INTEGRITY_UNIT);
4131 AssertLogRelMsgReturn(UnitHdr.offStream == pDir->aEntries[i].off,
4132 ("Bad unit header: i=%d off=%lld offStream=%lld\n", i, pDir->aEntries[i].off, UnitHdr.offStream),
4133 VERR_SSM_INTEGRITY_UNIT);
4134 AssertLogRelMsgReturn(UnitHdr.u32Instance == pDir->aEntries[i].u32Instance,
4135 ("Bad unit header: i=%d off=%lld u32Instance=%u Dir.u32Instance=%u\n",
4136 i, pDir->aEntries[i].off, UnitHdr.u32Instance, pDir->aEntries[i].u32Instance),
4137 VERR_SSM_INTEGRITY_UNIT);
4138 uint32_t cbUnitHdr = RT_UOFFSETOF(SSMFILEUNITHDRV2, szName[UnitHdr.cbName]);
4139 AssertLogRelMsgReturn( UnitHdr.cbName > 0
4140 && UnitHdr.cbName < sizeof(UnitHdr)
4141 && cbUnitHdr <= cbToRead,
4142 ("Bad unit header: i=%u off=%lld cbName=%#x cbToRead=%#x\n", i, pDir->aEntries[i].off, UnitHdr.cbName, cbToRead),
4143 VERR_SSM_INTEGRITY_UNIT);
4144 SSM_CHECK_CRC32_RET(&UnitHdr, RT_OFFSETOF(SSMFILEUNITHDRV2, szName[UnitHdr.cbName]),
4145 ("Bad unit header CRC: i=%u off=%lld u32CRC=%#x u32ActualCRC=%#x\n",
4146 i, pDir->aEntries[i].off, u32CRC, u32ActualCRC));
4147
4148 /*
4149 * Ok, it is valid, get on with the comparing now.
4150 */
4151 if ( UnitHdr.cbName == cbUnitNm
4152 && !memcmp(UnitHdr.szName, pszUnit, cbUnitNm))
4153 {
4154 if (piVersion)
4155 *piVersion = UnitHdr.u32Version;
4156 rc = ssmR3StrmSeek(&pSSM->Strm, pDir->aEntries[i].off + cbUnitHdr, RTFILE_SEEK_BEGIN,
4157 RTCrc32Process(UnitHdr.u32CurStreamCRC, &UnitHdr, cbUnitHdr));
4158 AssertLogRelRCReturn(rc, rc);
4159 ssmR3DataReadBeginV2(pSSM);
4160 return VINF_SUCCESS;
4161 }
4162 }
4163 }
4164
4165 return VERR_SSM_UNIT_NOT_FOUND;
4166}
4167
4168
4169/**
4170 * Worker for SSMR3Seek that seeks version 2 saved state files.
4171 *
4172 * @returns VBox status code.
4173 * @param pSSM The SSM handle.
4174 * @param pszUnit The unit to seek to.
4175 * @param iInstance The particulart insance we seek.
4176 * @param piVersion Where to store the unit version number.
4177 */
4178static int ssmR3FileSeekV2(PSSMHANDLE pSSM, const char *pszUnit, uint32_t iInstance, uint32_t *piVersion)
4179{
4180 /*
4181 * Read the footer, allocate a temporary buffer for the dictionary and
4182 * pass it down to a worker to simplify cleanup.
4183 */
4184 uint64_t offFooter;
4185 SSMFILEFTR Footer;
4186 int rc = ssmR3StrmPeekAt(&pSSM->Strm, -(RTFOFF)sizeof(Footer), &Footer, sizeof(Footer), &offFooter);
4187 AssertLogRelRCReturn(rc, rc);
4188 AssertLogRelReturn(!memcmp(Footer.szMagic, SSMFILEFTR_MAGIC, sizeof(Footer.szMagic)), VERR_SSM_INTEGRITY);
4189 SSM_CHECK_CRC32_RET(&Footer, sizeof(Footer), ("Bad footer CRC: %08x, actual %08x\n", u32CRC, u32ActualCRC));
4190
4191 size_t const cbDir = RT_OFFSETOF(SSMFILEDIR, aEntries[Footer.cDirEntries]);
4192 PSSMFILEDIR pDir = (PSSMFILEDIR)RTMemTmpAlloc(cbDir);
4193 if (RT_UNLIKELY(!pDir))
4194 return VERR_NO_TMP_MEMORY;
4195 rc = ssmR3FileSeekSubV2(pSSM, pDir, cbDir, Footer.cDirEntries, offFooter - cbDir,
4196 pszUnit, iInstance, piVersion);
4197 RTMemTmpFree(pDir);
4198
4199 return rc;
4200}
4201
4202
4203
4204/**
4205 * Seeks to a specific data unit.
4206 *
4207 * After seeking it's possible to use the getters to on
4208 * that data unit.
4209 *
4210 * @returns VBox status code.
4211 * @returns VERR_SSM_UNIT_NOT_FOUND if the unit+instance wasn't found.
4212 *
4213 * @param pSSM The SSM handle returned by SSMR3Open().
4214 * @param pszUnit The name of the data unit.
4215 * @param iInstance The instance number.
4216 * @param piVersion Where to store the version number. (Optional)
4217 *
4218 * @thread Any, but the caller is responsible for serializing calls per handle.
4219 */
4220VMMR3DECL(int) SSMR3Seek(PSSMHANDLE pSSM, const char *pszUnit, uint32_t iInstance, uint32_t *piVersion)
4221{
4222 LogFlow(("SSMR3Seek: pSSM=%p pszUnit=%p:{%s} iInstance=%RU32 piVersion=%p\n",
4223 pSSM, pszUnit, pszUnit, iInstance, piVersion));
4224
4225 /*
4226 * Validate input.
4227 */
4228 AssertMsgReturn(VALID_PTR(pSSM), ("%p\n", pSSM), VERR_INVALID_PARAMETER);
4229 AssertMsgReturn(pSSM->enmAfter == SSMAFTER_OPENED, ("%d\n", pSSM->enmAfter),VERR_INVALID_PARAMETER);
4230 AssertMsgReturn(pSSM->enmOp == SSMSTATE_OPEN_READ, ("%d\n", pSSM->enmOp), VERR_INVALID_PARAMETER);
4231 AssertMsgReturn(VALID_PTR(pszUnit), ("%p\n", pszUnit), VERR_INVALID_POINTER);
4232 AssertMsgReturn(!piVersion || VALID_PTR(piVersion), ("%p\n", piVersion), VERR_INVALID_POINTER);
4233
4234 /*
4235 * Reset the state.
4236 */
4237 if (pSSM->u.Read.pZipDecompV1)
4238 {
4239 RTZipDecompDestroy(pSSM->u.Read.pZipDecompV1);
4240 pSSM->u.Read.pZipDecompV1 = NULL;
4241 }
4242 pSSM->cbUnitLeftV1 = 0;
4243 pSSM->offUnit = UINT64_MAX;
4244
4245 /*
4246 * Call the version specific workers.
4247 */
4248 if (pSSM->u.Read.uFmtVerMajor >= 2)
4249 pSSM->rc = ssmR3FileSeekV2(pSSM, pszUnit, iInstance, piVersion);
4250 else
4251 pSSM->rc = ssmR3FileSeekV1(pSSM, pszUnit, iInstance, piVersion);
4252 return pSSM->rc;
4253}
4254
4255
4256/**
4257 * Finishes a data unit.
4258 * All buffers and compressor instances are flushed and destroyed.
4259 *
4260 * @returns VBox status.
4261 * @param pSSM SSM operation handle.
4262 */
4263static int ssmR3DataWriteFinish(PSSMHANDLE pSSM)
4264{
4265 //Log2(("ssmR3DataWriteFinish: %#010llx start\n", ssmR3StrmTell(&pSSM->Strm)));
4266 int rc = ssmR3DataFlushBuffer(pSSM);
4267 if (RT_SUCCESS(rc))
4268 return VINF_SUCCESS;
4269
4270 if (RT_SUCCESS(pSSM->rc))
4271 pSSM->rc = rc;
4272 Log2(("ssmR3DataWriteFinish: failure rc=%Rrc\n", rc));
4273 return rc;
4274}
4275
4276
4277/**
4278 * Begins writing the data of a data unit.
4279 *
4280 * Errors are signalled via pSSM->rc.
4281 *
4282 * @param pSSM The saved state handle.
4283 */
4284static void ssmR3DataWriteBegin(PSSMHANDLE pSSM)
4285{
4286 pSSM->offUnit = 0;
4287}
4288
4289
4290/**
4291 * Writes a record to the current data item in the saved state file.
4292 *
4293 * @returns VBox status code. Sets pSSM->rc on failure.
4294 * @param pSSM The saved state handle.
4295 * @param pvBuf The bits to write.
4296 * @param cbBuf The number of bytes to write.
4297 */
4298static int ssmR3DataWriteRaw(PSSMHANDLE pSSM, const void *pvBuf, size_t cbBuf)
4299{
4300 Log2(("ssmR3DataWriteRaw: %08llx|%08llx: pvBuf=%p cbBuf=%#x %.*Rhxs%s\n",
4301 ssmR3StrmTell(&pSSM->Strm), pSSM->offUnit, pvBuf, cbBuf, RT_MIN(cbBuf, SSM_LOG_BYTES), pvBuf, cbBuf > SSM_LOG_BYTES ? "..." : ""));
4302
4303 /*
4304 * Check that everything is fine.
4305 */
4306 if (RT_FAILURE(pSSM->rc))
4307 return pSSM->rc;
4308
4309 /*
4310 * Write the data item in 1MB chunks for progress indicator reasons.
4311 */
4312 while (cbBuf > 0)
4313 {
4314 size_t cbChunk = RT_MIN(cbBuf, _1M);
4315 int rc = ssmR3StrmWrite(&pSSM->Strm, pvBuf, cbChunk);
4316 if (RT_FAILURE(rc))
4317 return rc;
4318 pSSM->offUnit += cbChunk;
4319 cbBuf -= cbChunk;
4320 pvBuf = (char *)pvBuf + cbChunk;
4321 }
4322
4323 return VINF_SUCCESS;
4324}
4325
4326
4327/**
4328 * Writes a record header for the specified amount of data.
4329 *
4330 * @returns VBox status code. Sets pSSM->rc on failure.
4331 * @param pSSM The saved state handle
4332 * @param cb The amount of data.
4333 * @param u8TypeAndFlags The record type and flags.
4334 */
4335static int ssmR3DataWriteRecHdr(PSSMHANDLE pSSM, size_t cb, uint8_t u8TypeAndFlags)
4336{
4337 size_t cbHdr;
4338 uint8_t abHdr[8];
4339 abHdr[0] = u8TypeAndFlags;
4340 if (cb < 0x80)
4341 {
4342 cbHdr = 2;
4343 abHdr[1] = (uint8_t)cb;
4344 }
4345 else if (cb < 0x00000800)
4346 {
4347 cbHdr = 3;
4348 abHdr[1] = (uint8_t)(0xc0 | (cb >> 6));
4349 abHdr[2] = (uint8_t)(0x80 | (cb & 0x3f));
4350 }
4351 else if (cb < 0x00010000)
4352 {
4353 cbHdr = 4;
4354 abHdr[1] = (uint8_t)(0xe0 | (cb >> 12));
4355 abHdr[2] = (uint8_t)(0x80 | ((cb >> 6) & 0x3f));
4356 abHdr[3] = (uint8_t)(0x80 | (cb & 0x3f));
4357 }
4358 else if (cb < 0x00200000)
4359 {
4360 cbHdr = 5;
4361 abHdr[1] = (uint8_t)(0xf0 | (cb >> 18));
4362 abHdr[2] = (uint8_t)(0x80 | ((cb >> 12) & 0x3f));
4363 abHdr[3] = (uint8_t)(0x80 | ((cb >> 6) & 0x3f));
4364 abHdr[4] = (uint8_t)(0x80 | (cb & 0x3f));
4365 }
4366 else if (cb < 0x04000000)
4367 {
4368 cbHdr = 6;
4369 abHdr[1] = (uint8_t)(0xf8 | (cb >> 24));
4370 abHdr[2] = (uint8_t)(0x80 | ((cb >> 18) & 0x3f));
4371 abHdr[3] = (uint8_t)(0x80 | ((cb >> 12) & 0x3f));
4372 abHdr[4] = (uint8_t)(0x80 | ((cb >> 6) & 0x3f));
4373 abHdr[5] = (uint8_t)(0x80 | (cb & 0x3f));
4374 }
4375 else if (cb <= 0x7fffffff)
4376 {
4377 cbHdr = 7;
4378 abHdr[1] = (uint8_t)(0xfc | (cb >> 30));
4379 abHdr[2] = (uint8_t)(0x80 | ((cb >> 24) & 0x3f));
4380 abHdr[3] = (uint8_t)(0x80 | ((cb >> 18) & 0x3f));
4381 abHdr[4] = (uint8_t)(0x80 | ((cb >> 12) & 0x3f));
4382 abHdr[5] = (uint8_t)(0x80 | ((cb >> 6) & 0x3f));
4383 abHdr[6] = (uint8_t)(0x80 | (cb & 0x3f));
4384 }
4385 else
4386 AssertLogRelMsgFailedReturn(("cb=%#x\n", cb), pSSM->rc = VERR_INTERNAL_ERROR);
4387
4388 Log3(("ssmR3DataWriteRecHdr: %08llx|%08llx/%08x: Type=%02x fImportant=%RTbool cbHdr=%u\n",
4389 ssmR3StrmTell(&pSSM->Strm) + cbHdr, pSSM->offUnit + cbHdr, cb, u8TypeAndFlags & SSM_REC_TYPE_MASK, !!(u8TypeAndFlags & SSM_REC_FLAGS_IMPORTANT), cbHdr));
4390
4391 return ssmR3DataWriteRaw(pSSM, &abHdr[0], cbHdr);
4392}
4393
4394
4395/**
4396 * Worker that flushes the buffered data.
4397 *
4398 * @returns VBox status code. Will set pSSM->rc on error.
4399 * @param pSSM The saved state handle.
4400 */
4401static int ssmR3DataFlushBuffer(PSSMHANDLE pSSM)
4402{
4403 /*
4404 * Check how much there current is in the buffer.
4405 */
4406 uint32_t cb = pSSM->u.Write.offDataBuffer;
4407 if (!cb)
4408 return pSSM->rc;
4409 pSSM->u.Write.offDataBuffer = 0;
4410
4411 /*
4412 * Write a record header and then the data.
4413 * (No need for fancy optimizations here any longer since the stream is
4414 * fully buffered.)
4415 */
4416 int rc = ssmR3DataWriteRecHdr(pSSM, cb, SSM_REC_FLAGS_FIXED | SSM_REC_FLAGS_IMPORTANT | SSM_REC_TYPE_RAW);
4417 if (RT_SUCCESS(rc))
4418 rc = ssmR3DataWriteRaw(pSSM, pSSM->u.Write.abDataBuffer, cb);
4419 ssmR3Progress(pSSM, cb);
4420 return rc;
4421}
4422
4423
4424/**
4425 * ssmR3DataWrite worker that writes big stuff.
4426 *
4427 * @returns VBox status code
4428 * @param pSSM The saved state handle.
4429 * @param pvBuf The bits to write.
4430 * @param cbBuf The number of bytes to write.
4431 */
4432static int ssmR3DataWriteBig(PSSMHANDLE pSSM, const void *pvBuf, size_t cbBuf)
4433{
4434 int rc = ssmR3DataFlushBuffer(pSSM);
4435 if (RT_SUCCESS(rc))
4436 {
4437 /*
4438 * Split it up into compression blocks.
4439 */
4440 for (;;)
4441 {
4442 AssertCompile(SSM_ZIP_BLOCK_SIZE == PAGE_SIZE);
4443 if ( cbBuf >= SSM_ZIP_BLOCK_SIZE
4444 && ( ((uintptr_t)pvBuf & 0xf)
4445 || !ASMMemIsZeroPage(pvBuf))
4446 )
4447 {
4448 /*
4449 * Compress it.
4450 */
4451 AssertCompile(1 + 3 + 1 + SSM_ZIP_BLOCK_SIZE < 0x00010000);
4452 uint8_t *pb;
4453 rc = ssmR3StrmReserveWriteBufferSpace(&pSSM->Strm, 1 + 3 + 1 + SSM_ZIP_BLOCK_SIZE, &pb);
4454 if (RT_FAILURE(rc))
4455 break;
4456 size_t cbRec = SSM_ZIP_BLOCK_SIZE - (SSM_ZIP_BLOCK_SIZE / 16);
4457 rc = RTZipBlockCompress(RTZIPTYPE_LZF, RTZIPLEVEL_FAST, 0 /*fFlags*/,
4458 pvBuf, SSM_ZIP_BLOCK_SIZE,
4459 pb + 1 + 3 + 1, cbRec, &cbRec);
4460 if (RT_SUCCESS(rc))
4461 {
4462 pb[0] = SSM_REC_FLAGS_FIXED | SSM_REC_FLAGS_IMPORTANT | SSM_REC_TYPE_RAW_LZF;
4463 pb[4] = SSM_ZIP_BLOCK_SIZE / _1K;
4464 cbRec += 1;
4465 }
4466 else
4467 {
4468 pb[0] = SSM_REC_FLAGS_FIXED | SSM_REC_FLAGS_IMPORTANT | SSM_REC_TYPE_RAW;
4469 memcpy(&pb[4], pvBuf, SSM_ZIP_BLOCK_SIZE);
4470 cbRec = SSM_ZIP_BLOCK_SIZE;
4471 }
4472 pb[1] = (uint8_t)(0xe0 | ( cbRec >> 12));
4473 pb[2] = (uint8_t)(0x80 | ((cbRec >> 6) & 0x3f));
4474 pb[3] = (uint8_t)(0x80 | ( cbRec & 0x3f));
4475 cbRec += 1 + 3;
4476 rc = ssmR3StrmCommitWriteBufferSpace(&pSSM->Strm, cbRec);
4477 if (RT_FAILURE(rc))
4478 break;
4479
4480 pSSM->offUnit += cbRec;
4481 ssmR3Progress(pSSM, SSM_ZIP_BLOCK_SIZE);
4482
4483 /* advance */
4484 if (cbBuf == SSM_ZIP_BLOCK_SIZE)
4485 return VINF_SUCCESS;
4486 cbBuf -= SSM_ZIP_BLOCK_SIZE;
4487 pvBuf = (uint8_t const*)pvBuf + SSM_ZIP_BLOCK_SIZE;
4488 }
4489 else if (cbBuf >= SSM_ZIP_BLOCK_SIZE)
4490 {
4491 /*
4492 * Zero block.
4493 */
4494 uint8_t abRec[3];
4495 abRec[0] = SSM_REC_FLAGS_FIXED | SSM_REC_FLAGS_IMPORTANT | SSM_REC_TYPE_RAW_ZERO;
4496 abRec[1] = 1;
4497 abRec[2] = SSM_ZIP_BLOCK_SIZE / _1K;
4498 Log3(("ssmR3DataWriteBig: %08llx|%08llx/%08x: ZERO\n", ssmR3StrmTell(&pSSM->Strm) + 2, pSSM->offUnit + 2, 1));
4499 rc = ssmR3DataWriteRaw(pSSM, &abRec[0], sizeof(abRec));
4500 if (RT_FAILURE(rc))
4501 break;
4502
4503 /* advance */
4504 ssmR3Progress(pSSM, SSM_ZIP_BLOCK_SIZE);
4505 if (cbBuf == SSM_ZIP_BLOCK_SIZE)
4506 return VINF_SUCCESS;
4507 cbBuf -= SSM_ZIP_BLOCK_SIZE;
4508 pvBuf = (uint8_t const*)pvBuf + SSM_ZIP_BLOCK_SIZE;
4509 }
4510 else
4511 {
4512 /*
4513 * Less than one block left, store it the simple way.
4514 */
4515 rc = ssmR3DataWriteRecHdr(pSSM, cbBuf, SSM_REC_FLAGS_FIXED | SSM_REC_FLAGS_IMPORTANT | SSM_REC_TYPE_RAW);
4516 if (RT_SUCCESS(rc))
4517 rc = ssmR3DataWriteRaw(pSSM, pvBuf, cbBuf);
4518 ssmR3Progress(pSSM, cbBuf);
4519 break;
4520 }
4521 }
4522 }
4523 return rc;
4524}
4525
4526
4527/**
4528 * ssmR3DataWrite worker that is called when there isn't enough room in the
4529 * buffer for the current chunk of data.
4530 *
4531 * This will first flush the buffer and then add the new bits to it.
4532 *
4533 * @returns VBox status code
4534 * @param pSSM The saved state handle.
4535 * @param pvBuf The bits to write.
4536 * @param cbBuf The number of bytes to write.
4537 */
4538static int ssmR3DataWriteFlushAndBuffer(PSSMHANDLE pSSM, const void *pvBuf, size_t cbBuf)
4539{
4540 int rc = ssmR3DataFlushBuffer(pSSM);
4541 if (RT_SUCCESS(rc))
4542 {
4543 memcpy(&pSSM->u.Write.abDataBuffer[0], pvBuf, cbBuf);
4544 pSSM->u.Write.offDataBuffer = (uint32_t)cbBuf;
4545 }
4546 return rc;
4547}
4548
4549
4550/**
4551 * Writes data to the current data unit.
4552 *
4553 * This is an inlined wrapper that optimizes the small writes that so many of
4554 * the APIs make.
4555 *
4556 * @returns VBox status code
4557 * @param pSSM The saved state handle.
4558 * @param pvBuf The bits to write.
4559 * @param cbBuf The number of bytes to write.
4560 */
4561DECLINLINE(int) ssmR3DataWrite(PSSMHANDLE pSSM, const void *pvBuf, size_t cbBuf)
4562{
4563 if (cbBuf > sizeof(pSSM->u.Write.abDataBuffer) / 8)
4564 return ssmR3DataWriteBig(pSSM, pvBuf, cbBuf);
4565 if (!cbBuf)
4566 return VINF_SUCCESS;
4567
4568 uint32_t off = pSSM->u.Write.offDataBuffer;
4569 if (RT_UNLIKELY(cbBuf + off > sizeof(pSSM->u.Write.abDataBuffer)))
4570 return ssmR3DataWriteFlushAndBuffer(pSSM, pvBuf, cbBuf);
4571
4572 memcpy(&pSSM->u.Write.abDataBuffer[off], pvBuf, cbBuf);
4573 pSSM->u.Write.offDataBuffer = off + (uint32_t)cbBuf;
4574 return VINF_SUCCESS;
4575}
4576
4577
4578/**
4579 * Puts a structure.
4580 *
4581 * @returns VBox status code.
4582 * @param pSSM The saved state handle.
4583 * @param pvStruct The structure address.
4584 * @param paFields The array of structure fields descriptions.
4585 * The array must be terminated by a SSMFIELD_ENTRY_TERM().
4586 */
4587VMMR3DECL(int) SSMR3PutStruct(PSSMHANDLE pSSM, const void *pvStruct, PCSSMFIELD paFields)
4588{
4589 /* begin marker. */
4590 int rc = SSMR3PutU32(pSSM, SSMR3STRUCT_BEGIN);
4591 if (RT_FAILURE(rc))
4592 return rc;
4593
4594 /* put the fields */
4595 for (PCSSMFIELD pCur = paFields;
4596 pCur->cb != UINT32_MAX && pCur->off != UINT32_MAX;
4597 pCur++)
4598 {
4599 rc = ssmR3DataWrite(pSSM, (uint8_t *)pvStruct + pCur->off, pCur->cb);
4600 if (RT_FAILURE(rc))
4601 return rc;
4602 }
4603
4604 /* end marker */
4605 return SSMR3PutU32(pSSM, SSMR3STRUCT_END);
4606}
4607
4608
4609/**
4610 * Saves a boolean item to the current data unit.
4611 *
4612 * @returns VBox status.
4613 * @param pSSM SSM operation handle.
4614 * @param fBool Item to save.
4615 */
4616VMMR3DECL(int) SSMR3PutBool(PSSMHANDLE pSSM, bool fBool)
4617{
4618 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4619 uint8_t u8 = fBool; /* enforce 1 byte size */
4620 return ssmR3DataWrite(pSSM, &u8, sizeof(u8));
4621}
4622
4623
4624/**
4625 * Saves a 8-bit unsigned integer item to the current data unit.
4626 *
4627 * @returns VBox status.
4628 * @param pSSM SSM operation handle.
4629 * @param u8 Item to save.
4630 */
4631VMMR3DECL(int) SSMR3PutU8(PSSMHANDLE pSSM, uint8_t u8)
4632{
4633 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4634 return ssmR3DataWrite(pSSM, &u8, sizeof(u8));
4635}
4636
4637
4638/**
4639 * Saves a 8-bit signed integer item to the current data unit.
4640 *
4641 * @returns VBox status.
4642 * @param pSSM SSM operation handle.
4643 * @param i8 Item to save.
4644 */
4645VMMR3DECL(int) SSMR3PutS8(PSSMHANDLE pSSM, int8_t i8)
4646{
4647 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4648 return ssmR3DataWrite(pSSM, &i8, sizeof(i8));
4649}
4650
4651
4652/**
4653 * Saves a 16-bit unsigned integer item to the current data unit.
4654 *
4655 * @returns VBox status.
4656 * @param pSSM SSM operation handle.
4657 * @param u16 Item to save.
4658 */
4659VMMR3DECL(int) SSMR3PutU16(PSSMHANDLE pSSM, uint16_t u16)
4660{
4661 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4662 return ssmR3DataWrite(pSSM, &u16, sizeof(u16));
4663}
4664
4665
4666/**
4667 * Saves a 16-bit signed integer item to the current data unit.
4668 *
4669 * @returns VBox status.
4670 * @param pSSM SSM operation handle.
4671 * @param i16 Item to save.
4672 */
4673VMMR3DECL(int) SSMR3PutS16(PSSMHANDLE pSSM, int16_t i16)
4674{
4675 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4676 return ssmR3DataWrite(pSSM, &i16, sizeof(i16));
4677}
4678
4679
4680/**
4681 * Saves a 32-bit unsigned integer item to the current data unit.
4682 *
4683 * @returns VBox status.
4684 * @param pSSM SSM operation handle.
4685 * @param u32 Item to save.
4686 */
4687VMMR3DECL(int) SSMR3PutU32(PSSMHANDLE pSSM, uint32_t u32)
4688{
4689 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4690 return ssmR3DataWrite(pSSM, &u32, sizeof(u32));
4691}
4692
4693
4694/**
4695 * Saves a 32-bit signed integer item to the current data unit.
4696 *
4697 * @returns VBox status.
4698 * @param pSSM SSM operation handle.
4699 * @param i32 Item to save.
4700 */
4701VMMR3DECL(int) SSMR3PutS32(PSSMHANDLE pSSM, int32_t i32)
4702{
4703 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4704 return ssmR3DataWrite(pSSM, &i32, sizeof(i32));
4705}
4706
4707
4708/**
4709 * Saves a 64-bit unsigned integer item to the current data unit.
4710 *
4711 * @returns VBox status.
4712 * @param pSSM SSM operation handle.
4713 * @param u64 Item to save.
4714 */
4715VMMR3DECL(int) SSMR3PutU64(PSSMHANDLE pSSM, uint64_t u64)
4716{
4717 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4718 return ssmR3DataWrite(pSSM, &u64, sizeof(u64));
4719}
4720
4721
4722/**
4723 * Saves a 64-bit signed integer item to the current data unit.
4724 *
4725 * @returns VBox status.
4726 * @param pSSM SSM operation handle.
4727 * @param i64 Item to save.
4728 */
4729VMMR3DECL(int) SSMR3PutS64(PSSMHANDLE pSSM, int64_t i64)
4730{
4731 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4732 return ssmR3DataWrite(pSSM, &i64, sizeof(i64));
4733}
4734
4735
4736/**
4737 * Saves a 128-bit unsigned integer item to the current data unit.
4738 *
4739 * @returns VBox status.
4740 * @param pSSM SSM operation handle.
4741 * @param u128 Item to save.
4742 */
4743VMMR3DECL(int) SSMR3PutU128(PSSMHANDLE pSSM, uint128_t u128)
4744{
4745 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4746 return ssmR3DataWrite(pSSM, &u128, sizeof(u128));
4747}
4748
4749
4750/**
4751 * Saves a 128-bit signed integer item to the current data unit.
4752 *
4753 * @returns VBox status.
4754 * @param pSSM SSM operation handle.
4755 * @param i128 Item to save.
4756 */
4757VMMR3DECL(int) SSMR3PutS128(PSSMHANDLE pSSM, int128_t i128)
4758{
4759 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4760 return ssmR3DataWrite(pSSM, &i128, sizeof(i128));
4761}
4762
4763
4764/**
4765 * Saves a VBox unsigned integer item to the current data unit.
4766 *
4767 * @returns VBox status.
4768 * @param pSSM SSM operation handle.
4769 * @param u Item to save.
4770 */
4771VMMR3DECL(int) SSMR3PutUInt(PSSMHANDLE pSSM, RTUINT u)
4772{
4773 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4774 return ssmR3DataWrite(pSSM, &u, sizeof(u));
4775}
4776
4777
4778/**
4779 * Saves a VBox signed integer item to the current data unit.
4780 *
4781 * @returns VBox status.
4782 * @param pSSM SSM operation handle.
4783 * @param i Item to save.
4784 */
4785VMMR3DECL(int) SSMR3PutSInt(PSSMHANDLE pSSM, RTINT i)
4786{
4787 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4788 return ssmR3DataWrite(pSSM, &i, sizeof(i));
4789}
4790
4791
4792/**
4793 * Saves a GC natural unsigned integer item to the current data unit.
4794 *
4795 * @returns VBox status.
4796 * @param pSSM SSM operation handle.
4797 * @param u Item to save.
4798 *
4799 * @deprecated Silly type, don't use it.
4800 */
4801VMMR3DECL(int) SSMR3PutGCUInt(PSSMHANDLE pSSM, RTGCUINT u)
4802{
4803 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4804 return ssmR3DataWrite(pSSM, &u, sizeof(u));
4805}
4806
4807
4808/**
4809 * Saves a GC unsigned integer register item to the current data unit.
4810 *
4811 * @returns VBox status.
4812 * @param pSSM SSM operation handle.
4813 * @param u Item to save.
4814 */
4815VMMR3DECL(int) SSMR3PutGCUIntReg(PSSMHANDLE pSSM, RTGCUINTREG u)
4816{
4817 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4818 return ssmR3DataWrite(pSSM, &u, sizeof(u));
4819}
4820
4821
4822/**
4823 * Saves a 32 bits GC physical address item to the current data unit.
4824 *
4825 * @returns VBox status.
4826 * @param pSSM SSM operation handle.
4827 * @param GCPhys The item to save
4828 */
4829VMMR3DECL(int) SSMR3PutGCPhys32(PSSMHANDLE pSSM, RTGCPHYS32 GCPhys)
4830{
4831 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4832 return ssmR3DataWrite(pSSM, &GCPhys, sizeof(GCPhys));
4833}
4834
4835
4836/**
4837 * Saves a 64 bits GC physical address item to the current data unit.
4838 *
4839 * @returns VBox status.
4840 * @param pSSM SSM operation handle.
4841 * @param GCPhys The item to save
4842 */
4843VMMR3DECL(int) SSMR3PutGCPhys64(PSSMHANDLE pSSM, RTGCPHYS64 GCPhys)
4844{
4845 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4846 return ssmR3DataWrite(pSSM, &GCPhys, sizeof(GCPhys));
4847}
4848
4849
4850/**
4851 * Saves a GC physical address item to the current data unit.
4852 *
4853 * @returns VBox status.
4854 * @param pSSM SSM operation handle.
4855 * @param GCPhys The item to save
4856 */
4857VMMR3DECL(int) SSMR3PutGCPhys(PSSMHANDLE pSSM, RTGCPHYS GCPhys)
4858{
4859 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4860 return ssmR3DataWrite(pSSM, &GCPhys, sizeof(GCPhys));
4861}
4862
4863
4864/**
4865 * Saves a GC virtual address item to the current data unit.
4866 *
4867 * @returns VBox status.
4868 * @param pSSM SSM operation handle.
4869 * @param GCPtr The item to save.
4870 */
4871VMMR3DECL(int) SSMR3PutGCPtr(PSSMHANDLE pSSM, RTGCPTR GCPtr)
4872{
4873 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4874 return ssmR3DataWrite(pSSM, &GCPtr, sizeof(GCPtr));
4875}
4876
4877
4878/**
4879 * Saves an RC virtual address item to the current data unit.
4880 *
4881 * @returns VBox status.
4882 * @param pSSM SSM operation handle.
4883 * @param RCPtr The item to save.
4884 */
4885VMMR3DECL(int) SSMR3PutRCPtr(PSSMHANDLE pSSM, RTRCPTR RCPtr)
4886{
4887 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4888 return ssmR3DataWrite(pSSM, &RCPtr, sizeof(RCPtr));
4889}
4890
4891
4892/**
4893 * Saves a GC virtual address (represented as an unsigned integer) item to the current data unit.
4894 *
4895 * @returns VBox status.
4896 * @param pSSM SSM operation handle.
4897 * @param GCPtr The item to save.
4898 */
4899VMMR3DECL(int) SSMR3PutGCUIntPtr(PSSMHANDLE pSSM, RTGCUINTPTR GCPtr)
4900{
4901 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4902 return ssmR3DataWrite(pSSM, &GCPtr, sizeof(GCPtr));
4903}
4904
4905
4906/**
4907 * Saves a I/O port address item to the current data unit.
4908 *
4909 * @returns VBox status.
4910 * @param pSSM SSM operation handle.
4911 * @param IOPort The item to save.
4912 */
4913VMMR3DECL(int) SSMR3PutIOPort(PSSMHANDLE pSSM, RTIOPORT IOPort)
4914{
4915 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4916 return ssmR3DataWrite(pSSM, &IOPort, sizeof(IOPort));
4917}
4918
4919
4920/**
4921 * Saves a selector item to the current data unit.
4922 *
4923 * @returns VBox status.
4924 * @param pSSM SSM operation handle.
4925 * @param Sel The item to save.
4926 */
4927VMMR3DECL(int) SSMR3PutSel(PSSMHANDLE pSSM, RTSEL Sel)
4928{
4929 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4930 return ssmR3DataWrite(pSSM, &Sel, sizeof(Sel));
4931}
4932
4933
4934/**
4935 * Saves a memory item to the current data unit.
4936 *
4937 * @returns VBox status.
4938 * @param pSSM SSM operation handle.
4939 * @param pv Item to save.
4940 * @param cb Size of the item.
4941 */
4942VMMR3DECL(int) SSMR3PutMem(PSSMHANDLE pSSM, const void *pv, size_t cb)
4943{
4944 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4945 return ssmR3DataWrite(pSSM, pv, cb);
4946}
4947
4948
4949/**
4950 * Saves a zero terminated string item to the current data unit.
4951 *
4952 * @returns VBox status.
4953 * @param pSSM SSM operation handle.
4954 * @param psz Item to save.
4955 */
4956VMMR3DECL(int) SSMR3PutStrZ(PSSMHANDLE pSSM, const char *psz)
4957{
4958 AssertMsgReturn(pSSM->enmOp == SSMSTATE_SAVE_EXEC, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
4959
4960 size_t cch = strlen(psz);
4961 if (cch > _1M)
4962 {
4963 AssertMsgFailed(("a %d byte long string, what's this!?!\n"));
4964 return VERR_TOO_MUCH_DATA;
4965 }
4966 uint32_t u32 = (uint32_t)cch;
4967 int rc = ssmR3DataWrite(pSSM, &u32, sizeof(u32));
4968 if (rc)
4969 return rc;
4970 return ssmR3DataWrite(pSSM, psz, cch);
4971}
4972
4973
4974
4975
4976
4977/**
4978 * Closes the decompressor of a data unit.
4979 *
4980 * @param pSSM SSM operation handle.
4981 */
4982static void ssmR3DataReadFinishV1(PSSMHANDLE pSSM)
4983{
4984 if (pSSM->u.Read.pZipDecompV1)
4985 {
4986 int rc = RTZipDecompDestroy(pSSM->u.Read.pZipDecompV1);
4987 AssertRC(rc);
4988 pSSM->u.Read.pZipDecompV1 = NULL;
4989 }
4990}
4991
4992
4993/**
4994 * Callback for reading compressed data into the input buffer of the
4995 * decompressor, for saved file format version 1.
4996 *
4997 * @returns VBox status code.
4998 * @param pvSSM The SSM handle.
4999 * @param pvBuf Where to store the compressed data.
5000 * @param cbBuf Size of the buffer.
5001 * @param pcbRead Number of bytes actually stored in the buffer.
5002 */
5003static DECLCALLBACK(int) ssmR3ReadInV1(void *pvSSM, void *pvBuf, size_t cbBuf, size_t *pcbRead)
5004{
5005 PSSMHANDLE pSSM = (PSSMHANDLE)pvSSM;
5006 size_t cbRead = cbBuf;
5007 if (pSSM->cbUnitLeftV1 < cbBuf)
5008 cbRead = (size_t)pSSM->cbUnitLeftV1;
5009 if (cbRead)
5010 {
5011 //Log2(("ssmR3ReadInV1: %#010llx cbBug=%#x cbRead=%#x\n", ssmR3StrmTell(&pSSM->Strm), cbBuf, cbRead));
5012 int rc = ssmR3StrmRead(&pSSM->Strm, pvBuf, cbRead);
5013 if (RT_SUCCESS(rc))
5014 {
5015 pSSM->cbUnitLeftV1 -= cbRead;
5016 if (pcbRead)
5017 *pcbRead = cbRead;
5018 ssmR3Progress(pSSM, cbRead);
5019 return VINF_SUCCESS;
5020 }
5021 return rc;
5022 }
5023
5024 if (pSSM->enmAfter != SSMAFTER_DEBUG_IT)
5025 AssertMsgFailed(("SSM: attempted reading more than the unit!\n"));
5026 return VERR_SSM_LOADED_TOO_MUCH;
5027}
5028
5029
5030/**
5031 * Internal read worker for reading data from a version 1 unit.
5032 *
5033 * @param pSSM SSM operation handle.
5034 * @param pvBuf Where to store the read data.
5035 * @param cbBuf Number of bytes to read.
5036 */
5037static int ssmR3DataReadV1(PSSMHANDLE pSSM, void *pvBuf, size_t cbBuf)
5038{
5039 /*
5040 * Open the decompressor on the first read.
5041 */
5042 if (!pSSM->u.Read.pZipDecompV1)
5043 {
5044 pSSM->rc = RTZipDecompCreate(&pSSM->u.Read.pZipDecompV1, pSSM, ssmR3ReadInV1);
5045 if (RT_FAILURE(pSSM->rc))
5046 return pSSM->rc;
5047 }
5048
5049 /*
5050 * Do the requested read.
5051 */
5052 int rc = pSSM->rc = RTZipDecompress(pSSM->u.Read.pZipDecompV1, pvBuf, cbBuf, NULL);
5053 if (RT_SUCCESS(rc))
5054 {
5055 Log2(("ssmR3DataRead: pvBuf=%p cbBuf=%#x offUnit=%#llx %.*Rhxs%s\n", pvBuf, cbBuf, pSSM->offUnit, RT_MIN(cbBuf, SSM_LOG_BYTES), pvBuf, cbBuf > SSM_LOG_BYTES ? "..." : ""));
5056 pSSM->offUnit += cbBuf;
5057 return VINF_SUCCESS;
5058 }
5059 AssertMsgFailed(("rc=%Rrc cbBuf=%#x\n", rc, cbBuf));
5060 return rc;
5061}
5062
5063
5064/**
5065 * Creates the decompressor for the data unit.
5066 *
5067 * pSSM->rc will be set on error.
5068 *
5069 * @param pSSM SSM operation handle.
5070 */
5071static void ssmR3DataReadBeginV2(PSSMHANDLE pSSM)
5072{
5073 Assert(!pSSM->u.Read.cbDataBuffer || pSSM->u.Read.cbDataBuffer == pSSM->u.Read.offDataBuffer);
5074 Assert(!pSSM->u.Read.cbRecLeft);
5075
5076 pSSM->offUnit = 0;
5077 pSSM->u.Read.cbRecLeft = 0;
5078 pSSM->u.Read.cbDataBuffer = 0;
5079 pSSM->u.Read.offDataBuffer = 0;
5080 pSSM->u.Read.fEndOfData = false;
5081 pSSM->u.Read.u8TypeAndFlags = 0;
5082}
5083
5084
5085/**
5086 * Checks for the termination record and closes the decompressor.
5087 *
5088 * pSSM->rc will be set on error.
5089 *
5090 * @param pSSM SSM operation handle.
5091 */
5092static void ssmR3DataReadFinishV2(PSSMHANDLE pSSM)
5093{
5094 /*
5095 * If we haven't encountered the end of the record, it must be the next one.
5096 */
5097 if ( !pSSM->u.Read.fEndOfData
5098 && RT_SUCCESS(pSSM->rc))
5099 {
5100 int rc = ssmR3DataReadRecHdrV2(pSSM);
5101 if ( RT_SUCCESS(rc)
5102 && !pSSM->u.Read.fEndOfData)
5103 {
5104 rc = VERR_SSM_LOADED_TOO_LITTLE;
5105 AssertFailed();
5106 }
5107 pSSM->rc = rc;
5108 }
5109}
5110
5111
5112/**
5113 * Read reader that keep works the progress indicator and unit offset.
5114 *
5115 * Does not set SSM::rc.
5116 *
5117 * @returns VBox status code.
5118 * @param pSSM The saved state handle.
5119 * @param pvBuf Where to put the bits
5120 * @param cbBuf How many bytes to read.
5121 */
5122DECLINLINE(int) ssmR3DataReadV2Raw(PSSMHANDLE pSSM, void *pvBuf, size_t cbToRead)
5123{
5124 int rc = ssmR3StrmRead(&pSSM->Strm, pvBuf, cbToRead);
5125 if (RT_SUCCESS(rc))
5126 {
5127 pSSM->offUnit += cbToRead;
5128 ssmR3Progress(pSSM, cbToRead);
5129 return VINF_SUCCESS;
5130 }
5131
5132 /** @todo weed out lazy saving */
5133 if (pSSM->enmAfter != SSMAFTER_DEBUG_IT)
5134 AssertMsgFailed(("SSM: attempted reading more than the unit!\n"));
5135 return VERR_SSM_LOADED_TOO_MUCH;
5136}
5137
5138
5139/**
5140 * Reads and checks the LZF "header".
5141 *
5142 * @returns VBox status code.
5143 * @param pSSM The saved state handle..
5144 * @param pcbDecompr Where to store the size of the decompressed data.
5145 */
5146DECLINLINE(int) ssmR3DataReadV2RawLzfHdr(PSSMHANDLE pSSM, uint32_t *pcbDecompr)
5147{
5148 *pcbDecompr = 0; /* shuts up gcc. */
5149 AssertLogRelMsgReturn( pSSM->u.Read.cbRecLeft > 1
5150 && pSSM->u.Read.cbRecLeft <= RT_SIZEOFMEMB(SSMHANDLE, u.Read.abComprBuffer) + 2,
5151 ("%#x\n", pSSM->u.Read.cbRecLeft),
5152 VERR_SSM_INTEGRITY_DECOMPRESSION);
5153
5154 uint8_t cKB;
5155 int rc = ssmR3DataReadV2Raw(pSSM, &cKB, 1);
5156 if (RT_FAILURE(rc))
5157 return rc;
5158 pSSM->u.Read.cbRecLeft -= sizeof(cKB);
5159
5160 uint32_t cbDecompr = (uint32_t)cKB * _1K;
5161 AssertLogRelMsgReturn( cbDecompr >= pSSM->u.Read.cbRecLeft
5162 && cbDecompr <= RT_SIZEOFMEMB(SSMHANDLE, u.Read.abDataBuffer),
5163 ("%#x\n", cbDecompr),
5164 VERR_SSM_INTEGRITY_DECOMPRESSION);
5165
5166 *pcbDecompr = cbDecompr;
5167 return VINF_SUCCESS;
5168}
5169
5170
5171/**
5172 * Reads an LZF block from the stream and decompresses into the specified
5173 * buffer.
5174 *
5175 * @returns VBox status code.
5176 * @param SSM The saved state handle.
5177 * @param pvDst Pointer to the output buffer.
5178 * @param cbDecompr The size of the decompressed data.
5179 */
5180static int ssmR3DataReadV2RawLzf(PSSMHANDLE pSSM, void *pvDst, size_t cbDecompr)
5181{
5182 int rc;
5183 uint32_t cbCompr = pSSM->u.Read.cbRecLeft;
5184 pSSM->u.Read.cbRecLeft = 0;
5185
5186 /*
5187 * Try use the stream buffer directly to avoid copying things around.
5188 */
5189 uint8_t const *pb = ssmR3StrmReadDirect(&pSSM->Strm, cbCompr);
5190 if (pb)
5191 {
5192 pSSM->offUnit += cbCompr;
5193 ssmR3Progress(pSSM, cbCompr);
5194 }
5195 else
5196 {
5197 rc = ssmR3DataReadV2Raw(pSSM, &pSSM->u.Read.abComprBuffer[0], cbCompr);
5198 if (RT_FAILURE(rc))
5199 return rc;
5200 pb = &pSSM->u.Read.abComprBuffer[0];
5201 }
5202
5203 /*
5204 * Decompress it.
5205 */
5206 size_t cbDstActual;
5207 rc = RTZipBlockDecompress(RTZIPTYPE_LZF, 0 /*fFlags*/,
5208 pb, cbCompr, NULL /*pcbSrcActual*/,
5209 pvDst, cbDecompr, &cbDstActual);
5210 if (RT_SUCCESS(rc))
5211 {
5212 AssertLogRelMsgReturn(cbDstActual == cbDecompr, ("%#x %#x\n", cbDstActual, cbDecompr), VERR_SSM_INTEGRITY_DECOMPRESSION);
5213 return VINF_SUCCESS;
5214 }
5215
5216 AssertLogRelMsgFailed(("cbCompr=%#x cbDecompr=%#x rc=%Rrc\n", cbCompr, cbDecompr, rc));
5217 return VERR_SSM_INTEGRITY_DECOMPRESSION;
5218}
5219
5220
5221/**
5222 * Reads and checks the raw zero "header".
5223 *
5224 * @returns VBox status code.
5225 * @param pSSM The saved state handle..
5226 * @param pcbDecompr Where to store the size of the zero data.
5227 */
5228DECLINLINE(int) ssmR3DataReadV2RawZeroHdr(PSSMHANDLE pSSM, uint32_t *pcbZero)
5229{
5230 *pcbZero = 0; /* shuts up gcc. */
5231 AssertLogRelMsgReturn(pSSM->u.Read.cbRecLeft == 1, ("%#x\n", pSSM->u.Read.cbRecLeft), VERR_SSM_INTEGRITY_DECOMPRESSION);
5232
5233 uint8_t cKB;
5234 int rc = ssmR3DataReadV2Raw(pSSM, &cKB, 1);
5235 if (RT_FAILURE(rc))
5236 return rc;
5237 pSSM->u.Read.cbRecLeft = 0;
5238
5239 uint32_t cbZero = (uint32_t)cKB * _1K;
5240 AssertLogRelMsgReturn(cbZero <= RT_SIZEOFMEMB(SSMHANDLE, u.Read.abDataBuffer),
5241 ("%#x\n", cbZero), VERR_SSM_INTEGRITY_DECOMPRESSION);
5242
5243 *pcbZero = cbZero;
5244 return VINF_SUCCESS;
5245}
5246
5247
5248/**
5249 * Worker for reading the record header.
5250 *
5251 * It sets pSSM->u.Read.cbRecLeft, pSSM->u.Read.u8TypeAndFlags and
5252 * pSSM->u.Read.fEndOfData. When a termination record is encounter, it will be
5253 * read in full and validated, the fEndOfData indicator is set, and VINF_SUCCESS
5254 * is returned.
5255 *
5256 * @returns VBox status code.
5257 * @param pSSM The saved state handle.
5258 */
5259static int ssmR3DataReadRecHdrV2(PSSMHANDLE pSSM)
5260{
5261 AssertLogRelReturn(!pSSM->u.Read.fEndOfData, VERR_SSM_LOADED_TOO_MUCH);
5262
5263 /*
5264 * Read the two mandatory bytes.
5265 */
5266 uint8_t abHdr[8];
5267 int rc = ssmR3DataReadV2Raw(pSSM, abHdr, 2);
5268 if (RT_FAILURE(rc))
5269 return rc;
5270
5271 /*
5272 * Validate the first byte and check for the termination records.
5273 */
5274 pSSM->u.Read.u8TypeAndFlags = abHdr[0];
5275 AssertLogRelMsgReturn(SSM_REC_ARE_TYPE_AND_FLAGS_VALID(abHdr[0]), ("%#x %#x\n", abHdr[0], abHdr[1]), VERR_SSM_INTEGRITY_REC_HDR);
5276 if ((abHdr[0] & SSM_REC_TYPE_MASK) == SSM_REC_TYPE_TERM)
5277 {
5278 pSSM->u.Read.cbRecLeft = 0;
5279 pSSM->u.Read.fEndOfData = true;
5280 AssertLogRelMsgReturn(abHdr[1] == sizeof(SSMRECTERM) - 2, ("%#x\n", abHdr[1]), VERR_SSM_INTEGRITY_REC_TERM);
5281 AssertLogRelMsgReturn(abHdr[0] & SSM_REC_FLAGS_IMPORTANT, ("%#x\n", abHdr[0]), VERR_SSM_INTEGRITY_REC_TERM);
5282
5283 /* get the rest */
5284 uint32_t u32StreamCRC = ssmR3StrmFinalCRC(&pSSM->Strm);
5285 SSMRECTERM TermRec;
5286 int rc = ssmR3DataReadV2Raw(pSSM, (uint8_t *)&TermRec + 2, sizeof(SSMRECTERM) - 2);
5287 if (RT_FAILURE(rc))
5288 return rc;
5289
5290 /* validate integrity */
5291 AssertLogRelMsgReturn(TermRec.cbUnit == pSSM->offUnit,
5292 ("cbUnit=%#llx offUnit=%#llx\n", TermRec.cbUnit, pSSM->offUnit),
5293 VERR_SSM_INTEGRITY_REC_TERM);
5294 AssertLogRelMsgReturn(!(TermRec.fFlags & ~SSMRECTERM_FLAGS_CRC32), ("%#x\n", TermRec.fFlags), VERR_SSM_INTEGRITY_REC_TERM);
5295 if (!(TermRec.fFlags & SSMRECTERM_FLAGS_CRC32))
5296 AssertLogRelMsgReturn(TermRec.u32StreamCRC == 0, ("%#x\n", TermRec.u32StreamCRC), VERR_SSM_INTEGRITY_REC_TERM);
5297 else if (pSSM->Strm.fChecksummed)
5298 AssertLogRelMsgReturn(TermRec.u32StreamCRC == u32StreamCRC, ("%#x, %#x\n", TermRec.u32StreamCRC, u32StreamCRC),
5299 VERR_SSM_INTEGRITY_REC_TERM_CRC);
5300
5301 Log3(("ssmR3DataReadRecHdrV2: %08llx|%08llx: TERM\n", ssmR3StrmTell(&pSSM->Strm) - sizeof(SSMRECTERM), pSSM->offUnit));
5302 return VINF_SUCCESS;
5303 }
5304
5305 /*
5306 * Figure the size. The 2nd byte is encoded in UTF-8 fashion, so this
5307 * is can be highly enjoyable.
5308 */
5309 uint32_t cbHdr = 2;
5310 uint32_t cb = abHdr[1];
5311 if (!(cb & 0x80))
5312 pSSM->u.Read.cbRecLeft = cb;
5313 else
5314 {
5315 /*
5316 * Need more data. Figure how much and read it.
5317 */
5318 if (!(cb & RT_BIT(5)))
5319 cb = 2;
5320 else if (!(cb & RT_BIT(4)))
5321 cb = 3;
5322 else if (!(cb & RT_BIT(3)))
5323 cb = 4;
5324 else if (!(cb & RT_BIT(2)))
5325 cb = 5;
5326 else if (!(cb & RT_BIT(1)))
5327 cb = 6;
5328 else
5329 AssertLogRelMsgFailedReturn(("Invalid record size byte: %#x\n", cb), VERR_SSM_INTEGRITY_REC_HDR);
5330 cbHdr = cb + 1;
5331
5332 rc = ssmR3DataReadV2Raw(pSSM, &abHdr[2], cb - 1);
5333 if (RT_FAILURE(rc))
5334 return rc;
5335
5336 /*
5337 * Validate what we've read.
5338 */
5339 switch (cb)
5340 {
5341 case 6:
5342 AssertLogRelMsgReturn((abHdr[6] & 0xc0) == 0x80, ("6/%u: %.*Rhxs\n", cb, cb + 1, &abHdr[0]), VERR_SSM_INTEGRITY_REC_HDR);
5343 case 5:
5344 AssertLogRelMsgReturn((abHdr[5] & 0xc0) == 0x80, ("5/%u: %.*Rhxs\n", cb, cb + 1, &abHdr[0]), VERR_SSM_INTEGRITY_REC_HDR);
5345 case 4:
5346 AssertLogRelMsgReturn((abHdr[4] & 0xc0) == 0x80, ("4/%u: %.*Rhxs\n", cb, cb + 1, &abHdr[0]), VERR_SSM_INTEGRITY_REC_HDR);
5347 case 3:
5348 AssertLogRelMsgReturn((abHdr[3] & 0xc0) == 0x80, ("3/%u: %.*Rhxs\n", cb, cb + 1, &abHdr[0]), VERR_SSM_INTEGRITY_REC_HDR);
5349 case 2:
5350 AssertLogRelMsgReturn((abHdr[2] & 0xc0) == 0x80, ("2/%u: %.*Rhxs\n", cb, cb + 1, &abHdr[0]), VERR_SSM_INTEGRITY_REC_HDR);
5351 break;
5352 default:
5353 return VERR_INTERNAL_ERROR;
5354 }
5355
5356 /*
5357 * Decode it and validate the range.
5358 */
5359 switch (cb)
5360 {
5361 case 6:
5362 cb = (abHdr[6] & 0x3f)
5363 | ((uint32_t)(abHdr[5] & 0x3f) << 6)
5364 | ((uint32_t)(abHdr[4] & 0x3f) << 12)
5365 | ((uint32_t)(abHdr[3] & 0x3f) << 18)
5366 | ((uint32_t)(abHdr[2] & 0x3f) << 24)
5367 | ((uint32_t)(abHdr[1] & 0x01) << 30);
5368 AssertLogRelMsgReturn(cb >= 0x04000000 && cb <= 0x7fffffff, ("cb=%#x\n", cb), VERR_SSM_INTEGRITY_REC_HDR);
5369 break;
5370 case 5:
5371 cb = (abHdr[5] & 0x3f)
5372 | ((uint32_t)(abHdr[4] & 0x3f) << 6)
5373 | ((uint32_t)(abHdr[3] & 0x3f) << 12)
5374 | ((uint32_t)(abHdr[2] & 0x3f) << 18)
5375 | ((uint32_t)(abHdr[1] & 0x03) << 24);
5376 AssertLogRelMsgReturn(cb >= 0x00200000 && cb <= 0x03ffffff, ("cb=%#x\n", cb), VERR_SSM_INTEGRITY_REC_HDR);
5377 break;
5378 case 4:
5379 cb = (abHdr[4] & 0x3f)
5380 | ((uint32_t)(abHdr[3] & 0x3f) << 6)
5381 | ((uint32_t)(abHdr[2] & 0x3f) << 12)
5382 | ((uint32_t)(abHdr[1] & 0x07) << 18);
5383 AssertLogRelMsgReturn(cb >= 0x00010000 && cb <= 0x001fffff, ("cb=%#x\n", cb), VERR_SSM_INTEGRITY_REC_HDR);
5384 break;
5385 case 3:
5386 cb = (abHdr[3] & 0x3f)
5387 | ((uint32_t)(abHdr[2] & 0x3f) << 6)
5388 | ((uint32_t)(abHdr[1] & 0x0f) << 12);
5389#if 0 /* disabled to optimize buffering */
5390 AssertLogRelMsgReturn(cb >= 0x00000800 && cb <= 0x0000ffff, ("cb=%#x\n", cb), VERR_SSM_INTEGRITY_REC_HDR);
5391#endif
5392 break;
5393 case 2:
5394 cb = (abHdr[2] & 0x3f)
5395 | ((uint32_t)(abHdr[1] & 0x1f) << 6);
5396#if 0 /* disabled to optimize buffering */
5397 AssertLogRelMsgReturn(cb >= 0x00000080 && cb <= 0x000007ff, ("cb=%#x\n", cb), VERR_SSM_INTEGRITY_REC_HDR);
5398#endif
5399 break;
5400 default:
5401 return VERR_INTERNAL_ERROR;
5402 }
5403
5404 pSSM->u.Read.cbRecLeft = cb;
5405 }
5406
5407 Log3(("ssmR3DataReadRecHdrV2: %08llx|%08llx/%08x: Type=%02x fImportant=%RTbool cbHdr=%u\n",
5408 ssmR3StrmTell(&pSSM->Strm), pSSM->offUnit, pSSM->u.Read.cbRecLeft,
5409 pSSM->u.Read.u8TypeAndFlags & SSM_REC_TYPE_MASK,
5410 !!(pSSM->u.Read.u8TypeAndFlags & SSM_REC_FLAGS_IMPORTANT),
5411 cbHdr
5412 )); NOREF(cbHdr);
5413 return VINF_SUCCESS;
5414}
5415
5416
5417/**
5418 * Buffer miss, do an unbuffered read.
5419 *
5420 * @param pSSM SSM operation handle.
5421 * @param pvBuf Where to store the read data.
5422 * @param cbBuf Number of bytes to read.
5423 */
5424static int ssmR3DataReadUnbufferedV2(PSSMHANDLE pSSM, void *pvBuf, size_t cbBuf)
5425{
5426 void const *pvBufOrg = pvBuf; NOREF(pvBufOrg);
5427 size_t const cbBufOrg = cbBuf; NOREF(cbBufOrg);
5428
5429 /*
5430 * Copy out what we've got in the buffer.
5431 */
5432 uint32_t off = pSSM->u.Read.offDataBuffer;
5433 int32_t cbInBuffer = pSSM->u.Read.cbDataBuffer - off;
5434 Log4(("ssmR3DataReadUnbufferedV2: %08llx|%08llx/%08x/%08x: cbBuf=%#x\n", ssmR3StrmTell(&pSSM->Strm), pSSM->offUnit, pSSM->u.Read.cbRecLeft, cbInBuffer, cbBufOrg));
5435 if (cbInBuffer > 0)
5436 {
5437 uint32_t const cbToCopy = (uint32_t)cbInBuffer;
5438 Assert(cbBuf > cbToCopy);
5439 memcpy(pvBuf, &pSSM->u.Read.abDataBuffer[off], cbToCopy);
5440 pvBuf = (uint8_t *)pvBuf + cbToCopy;
5441 cbBuf -= cbToCopy;
5442 pSSM->u.Read.cbDataBuffer = 0;
5443 pSSM->u.Read.offDataBuffer = 0;
5444 }
5445
5446 /*
5447 * Read data.
5448 */
5449 do
5450 {
5451 /*
5452 * Read the next record header if no more data.
5453 */
5454 if (!pSSM->u.Read.cbRecLeft)
5455 {
5456 int rc = ssmR3DataReadRecHdrV2(pSSM);
5457 if (RT_FAILURE(rc))
5458 return pSSM->rc = rc;
5459 }
5460 AssertLogRelMsgReturn(!pSSM->u.Read.fEndOfData, ("cbBuf=%zu", cbBuf), pSSM->rc = VERR_SSM_LOADED_TOO_MUCH);
5461
5462 /*
5463 * Read data from the current record.
5464 */
5465 uint32_t cbToRead;
5466 switch (pSSM->u.Read.u8TypeAndFlags & SSM_REC_TYPE_MASK)
5467 {
5468 case SSM_REC_TYPE_RAW:
5469 {
5470 cbToRead = (uint32_t)RT_MIN(cbBuf, pSSM->u.Read.cbRecLeft);
5471 int rc = ssmR3DataReadV2Raw(pSSM, pvBuf, cbToRead);
5472 if (RT_FAILURE(rc))
5473 return pSSM->rc = rc;
5474 pSSM->u.Read.cbRecLeft -= cbToRead;
5475 break;
5476 }
5477
5478 case SSM_REC_TYPE_RAW_LZF:
5479 {
5480 int rc = ssmR3DataReadV2RawLzfHdr(pSSM, &cbToRead);
5481 if (RT_FAILURE(rc))
5482 return rc;
5483 if (cbToRead <= cbBuf)
5484 {
5485 rc = ssmR3DataReadV2RawLzf(pSSM, pvBuf, cbToRead);
5486 if (RT_FAILURE(rc))
5487 return rc;
5488 }
5489 else
5490 {
5491 /* The output buffer is too small, use the data buffer. */
5492 rc = ssmR3DataReadV2RawLzf(pSSM, &pSSM->u.Read.abDataBuffer[0], cbToRead);
5493 if (RT_FAILURE(rc))
5494 return rc;
5495 pSSM->u.Read.cbDataBuffer = cbToRead;
5496 cbToRead = (uint32_t)cbBuf;
5497 pSSM->u.Read.offDataBuffer = cbToRead;
5498 memcpy(pvBuf, &pSSM->u.Read.abDataBuffer[0], cbToRead);
5499 }
5500 break;
5501 }
5502
5503 case SSM_REC_TYPE_RAW_ZERO:
5504 {
5505 int rc = ssmR3DataReadV2RawZeroHdr(pSSM, &cbToRead);
5506 if (RT_FAILURE(rc))
5507 return rc;
5508 if (cbToRead > cbBuf)
5509 {
5510 /* Spill the remainer into the data buffer. */
5511 memset(&pSSM->u.Read.abDataBuffer[0], 0, cbToRead - cbBuf);
5512 pSSM->u.Read.cbDataBuffer = cbToRead - cbBuf;
5513 pSSM->u.Read.offDataBuffer = 0;
5514 cbToRead = (uint32_t)cbBuf;
5515 }
5516 memset(pvBuf, 0, cbToRead);
5517 break;
5518 }
5519
5520 default:
5521 AssertMsgFailedReturn(("%x\n", pSSM->u.Read.u8TypeAndFlags), VERR_INTERNAL_ERROR_5);
5522 }
5523
5524 cbBuf -= cbToRead;
5525 pvBuf = (uint8_t *)pvBuf + cbToRead;
5526 } while (cbBuf > 0);
5527
5528 Log4(("ssmR3DataReadUnBufferedV2: %08llx|%08llx/%08x/%08x: cbBuf=%#x %.*Rhxs%s\n",
5529 ssmR3StrmTell(&pSSM->Strm), pSSM->offUnit, pSSM->u.Read.cbRecLeft, 0, cbBufOrg, RT_MIN(SSM_LOG_BYTES, cbBufOrg), pvBufOrg, cbBufOrg > SSM_LOG_BYTES ? "..." : ""));
5530 return VINF_SUCCESS;
5531}
5532
5533
5534/**
5535 * Buffer miss, do a buffered read.
5536 *
5537 * @param pSSM SSM operation handle.
5538 * @param pvBuf Where to store the read data.
5539 * @param cbBuf Number of bytes to read.
5540 */
5541static int ssmR3DataReadBufferedV2(PSSMHANDLE pSSM, void *pvBuf, size_t cbBuf)
5542{
5543 void const *pvBufOrg = pvBuf; NOREF(pvBufOrg);
5544 size_t const cbBufOrg = cbBuf; NOREF(cbBufOrg);
5545
5546 /*
5547 * Copy out what we've got in the buffer.
5548 */
5549 uint32_t off = pSSM->u.Read.offDataBuffer;
5550 int32_t cbInBuffer = pSSM->u.Read.cbDataBuffer - off;
5551 Log4(("ssmR3DataReadBufferedV2: %08llx|%08llx/%08x/%08x: cbBuf=%#x\n", ssmR3StrmTell(&pSSM->Strm), pSSM->offUnit, pSSM->u.Read.cbRecLeft, cbInBuffer, cbBufOrg));
5552 if (cbInBuffer > 0)
5553 {
5554 uint32_t const cbToCopy = (uint32_t)cbInBuffer;
5555 Assert(cbBuf > cbToCopy);
5556 memcpy(pvBuf, &pSSM->u.Read.abDataBuffer[off], cbToCopy);
5557 pvBuf = (uint8_t *)pvBuf + cbToCopy;
5558 cbBuf -= cbToCopy;
5559 pSSM->u.Read.cbDataBuffer = 0;
5560 pSSM->u.Read.offDataBuffer = 0;
5561 }
5562
5563 /*
5564 * Buffer more data.
5565 */
5566 do
5567 {
5568 /*
5569 * Read the next record header if no more data.
5570 */
5571 if (!pSSM->u.Read.cbRecLeft)
5572 {
5573 int rc = ssmR3DataReadRecHdrV2(pSSM);
5574 if (RT_FAILURE(rc))
5575 return pSSM->rc = rc;
5576 }
5577 AssertLogRelMsgReturn(!pSSM->u.Read.fEndOfData, ("cbBuf=%zu", cbBuf), pSSM->rc = VERR_SSM_LOADED_TOO_MUCH);
5578
5579 /*
5580 * Read data from the current record.
5581 * LATER: optimize by reading directly into the output buffer for some cases.
5582 */
5583 uint32_t cbToRead;
5584 switch (pSSM->u.Read.u8TypeAndFlags & SSM_REC_TYPE_MASK)
5585 {
5586 case SSM_REC_TYPE_RAW:
5587 {
5588 cbToRead = RT_MIN(sizeof(pSSM->u.Read.abDataBuffer), pSSM->u.Read.cbRecLeft);
5589 int rc = ssmR3DataReadV2Raw(pSSM, &pSSM->u.Read.abDataBuffer[0], cbToRead);
5590 if (RT_FAILURE(rc))
5591 return pSSM->rc = rc;
5592 pSSM->u.Read.cbRecLeft -= cbToRead;
5593 pSSM->u.Read.cbDataBuffer = cbToRead;
5594 break;
5595 }
5596
5597 case SSM_REC_TYPE_RAW_LZF:
5598 {
5599 int rc = ssmR3DataReadV2RawLzfHdr(pSSM, &cbToRead);
5600 if (RT_FAILURE(rc))
5601 return rc;
5602 rc = ssmR3DataReadV2RawLzf(pSSM, &pSSM->u.Read.abDataBuffer[0], cbToRead);
5603 if (RT_FAILURE(rc))
5604 return rc;
5605 pSSM->u.Read.cbDataBuffer = cbToRead;
5606 break;
5607 }
5608
5609 case SSM_REC_TYPE_RAW_ZERO:
5610 {
5611 int rc = ssmR3DataReadV2RawZeroHdr(pSSM, &cbToRead);
5612 if (RT_FAILURE(rc))
5613 return rc;
5614 memset(&pSSM->u.Read.abDataBuffer[0], 0, cbToRead);
5615 pSSM->u.Read.cbDataBuffer = cbToRead;
5616 break;
5617 }
5618
5619 default:
5620 AssertMsgFailedReturn(("%x\n", pSSM->u.Read.u8TypeAndFlags), VERR_INTERNAL_ERROR_5);
5621 }
5622 /*pSSM->u.Read.offDataBuffer = 0;*/
5623
5624 /*
5625 * Copy data from the buffer.
5626 */
5627 uint32_t cbToCopy = (uint32_t)RT_MIN(cbBuf, cbToRead);
5628 memcpy(pvBuf, &pSSM->u.Read.abDataBuffer[0], cbToCopy);
5629 cbBuf -= cbToCopy;
5630 pvBuf = (uint8_t *)pvBuf + cbToCopy;
5631 pSSM->u.Read.offDataBuffer = cbToCopy;
5632 } while (cbBuf > 0);
5633
5634 Log4(("ssmR3DataReadBufferedV2: %08llx|%08llx/%08x/%08x: cbBuf=%#x %.*Rhxs%s\n",
5635 ssmR3StrmTell(&pSSM->Strm), pSSM->offUnit, pSSM->u.Read.cbRecLeft, pSSM->u.Read.cbDataBuffer - pSSM->u.Read.offDataBuffer,
5636 cbBufOrg, RT_MIN(SSM_LOG_BYTES, cbBufOrg), pvBufOrg, cbBufOrg > SSM_LOG_BYTES ? "..." : ""));
5637 return VINF_SUCCESS;
5638}
5639
5640
5641/**
5642 * Inlined worker that handles format checks and buffered reads.
5643 *
5644 * @param pSSM SSM operation handle.
5645 * @param pvBuf Where to store the read data.
5646 * @param cbBuf Number of bytes to read.
5647 */
5648DECLINLINE(int) ssmR3DataRead(PSSMHANDLE pSSM, void *pvBuf, size_t cbBuf)
5649{
5650 /*
5651 * Fend off previous errors and V1 data units.
5652 */
5653 if (RT_FAILURE(pSSM->rc))
5654 return pSSM->rc;
5655 if (RT_UNLIKELY(pSSM->u.Read.uFmtVerMajor == 1))
5656 return ssmR3DataReadV1(pSSM, pvBuf, cbBuf);
5657
5658 /*
5659 * Check if the requested data is buffered.
5660 */
5661 uint32_t off = pSSM->u.Read.offDataBuffer;
5662 if ( off + cbBuf > pSSM->u.Read.cbDataBuffer
5663 || cbBuf > sizeof(pSSM->u.Read.abDataBuffer))
5664 {
5665 if (cbBuf <= sizeof(pSSM->u.Read.abDataBuffer) / 8)
5666 return ssmR3DataReadBufferedV2(pSSM, pvBuf, cbBuf);
5667 return ssmR3DataReadUnbufferedV2(pSSM, pvBuf, cbBuf);
5668 }
5669
5670 memcpy(pvBuf, &pSSM->u.Read.abDataBuffer[off], cbBuf);
5671 pSSM->u.Read.offDataBuffer = off + (uint32_t)cbBuf;
5672 Log4((cbBuf
5673 ? "ssmR3DataRead: %08llx|%08llx/%08x/%08x: cbBuf=%#x %.*Rhxs%s\n"
5674 : "ssmR3DataRead: %08llx|%08llx/%08x/%08x: cbBuf=%#x\n",
5675 ssmR3StrmTell(&pSSM->Strm), pSSM->offUnit, pSSM->u.Read.cbRecLeft, pSSM->u.Read.cbDataBuffer - pSSM->u.Read.offDataBuffer,
5676 cbBuf, RT_MIN(SSM_LOG_BYTES, cbBuf), pvBuf, cbBuf > SSM_LOG_BYTES ? "..." : ""));
5677
5678 return VINF_SUCCESS;
5679}
5680
5681
5682/**
5683 * Gets a structure.
5684 *
5685 * @returns VBox status code.
5686 * @param pSSM The saved state handle.
5687 * @param pvStruct The structure address.
5688 * @param paFields The array of structure fields descriptions.
5689 * The array must be terminated by a SSMFIELD_ENTRY_TERM().
5690 */
5691VMMR3DECL(int) SSMR3GetStruct(PSSMHANDLE pSSM, void *pvStruct, PCSSMFIELD paFields)
5692{
5693 /* begin marker. */
5694 uint32_t u32Magic;
5695 int rc = SSMR3GetU32(pSSM, &u32Magic);
5696 if (RT_FAILURE(rc))
5697 return rc;
5698 if (u32Magic != SSMR3STRUCT_BEGIN)
5699 AssertMsgFailedReturn(("u32Magic=%#RX32\n", u32Magic), VERR_SSM_STRUCTURE_MAGIC);
5700
5701 /* put the fields */
5702 for (PCSSMFIELD pCur = paFields;
5703 pCur->cb != UINT32_MAX && pCur->off != UINT32_MAX;
5704 pCur++)
5705 {
5706 rc = ssmR3DataRead(pSSM, (uint8_t *)pvStruct + pCur->off, pCur->cb);
5707 if (RT_FAILURE(rc))
5708 return rc;
5709 }
5710
5711 /* end marker */
5712 rc = SSMR3GetU32(pSSM, &u32Magic);
5713 if (RT_FAILURE(rc))
5714 return rc;
5715 if (u32Magic != SSMR3STRUCT_END)
5716 AssertMsgFailedReturn(("u32Magic=%#RX32\n", u32Magic), VERR_SSM_STRUCTURE_MAGIC);
5717 return rc;
5718}
5719
5720
5721/**
5722 * Loads a boolean item from the current data unit.
5723 *
5724 * @returns VBox status.
5725 * @param pSSM SSM operation handle.
5726 * @param pfBool Where to store the item.
5727 */
5728VMMR3DECL(int) SSMR3GetBool(PSSMHANDLE pSSM, bool *pfBool)
5729{
5730 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5731 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5732 uint8_t u8; /* see SSMR3PutBool */
5733 int rc = ssmR3DataRead(pSSM, &u8, sizeof(u8));
5734 if (RT_SUCCESS(rc))
5735 {
5736 Assert(u8 <= 1);
5737 *pfBool = !!u8;
5738 }
5739 return rc;
5740}
5741
5742
5743/**
5744 * Loads a 8-bit unsigned integer item from the current data unit.
5745 *
5746 * @returns VBox status.
5747 * @param pSSM SSM operation handle.
5748 * @param pu8 Where to store the item.
5749 */
5750VMMR3DECL(int) SSMR3GetU8(PSSMHANDLE pSSM, uint8_t *pu8)
5751{
5752 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5753 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5754 return ssmR3DataRead(pSSM, pu8, sizeof(*pu8));
5755}
5756
5757
5758/**
5759 * Loads a 8-bit signed integer item from the current data unit.
5760 *
5761 * @returns VBox status.
5762 * @param pSSM SSM operation handle.
5763 * @param pi8 Where to store the item.
5764 */
5765VMMR3DECL(int) SSMR3GetS8(PSSMHANDLE pSSM, int8_t *pi8)
5766{
5767 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5768 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5769 return ssmR3DataRead(pSSM, pi8, sizeof(*pi8));
5770}
5771
5772
5773/**
5774 * Loads a 16-bit unsigned integer item from the current data unit.
5775 *
5776 * @returns VBox status.
5777 * @param pSSM SSM operation handle.
5778 * @param pu16 Where to store the item.
5779 */
5780VMMR3DECL(int) SSMR3GetU16(PSSMHANDLE pSSM, uint16_t *pu16)
5781{
5782 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5783 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5784 return ssmR3DataRead(pSSM, pu16, sizeof(*pu16));
5785}
5786
5787
5788/**
5789 * Loads a 16-bit signed integer item from the current data unit.
5790 *
5791 * @returns VBox status.
5792 * @param pSSM SSM operation handle.
5793 * @param pi16 Where to store the item.
5794 */
5795VMMR3DECL(int) SSMR3GetS16(PSSMHANDLE pSSM, int16_t *pi16)
5796{
5797 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5798 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5799 return ssmR3DataRead(pSSM, pi16, sizeof(*pi16));
5800}
5801
5802
5803/**
5804 * Loads a 32-bit unsigned integer item from the current data unit.
5805 *
5806 * @returns VBox status.
5807 * @param pSSM SSM operation handle.
5808 * @param pu32 Where to store the item.
5809 */
5810VMMR3DECL(int) SSMR3GetU32(PSSMHANDLE pSSM, uint32_t *pu32)
5811{
5812 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5813 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5814 return ssmR3DataRead(pSSM, pu32, sizeof(*pu32));
5815}
5816
5817
5818/**
5819 * Loads a 32-bit signed integer item from the current data unit.
5820 *
5821 * @returns VBox status.
5822 * @param pSSM SSM operation handle.
5823 * @param pi32 Where to store the item.
5824 */
5825VMMR3DECL(int) SSMR3GetS32(PSSMHANDLE pSSM, int32_t *pi32)
5826{
5827 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5828 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5829 return ssmR3DataRead(pSSM, pi32, sizeof(*pi32));
5830}
5831
5832
5833/**
5834 * Loads a 64-bit unsigned integer item from the current data unit.
5835 *
5836 * @returns VBox status.
5837 * @param pSSM SSM operation handle.
5838 * @param pu64 Where to store the item.
5839 */
5840VMMR3DECL(int) SSMR3GetU64(PSSMHANDLE pSSM, uint64_t *pu64)
5841{
5842 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5843 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5844 return ssmR3DataRead(pSSM, pu64, sizeof(*pu64));
5845}
5846
5847
5848/**
5849 * Loads a 64-bit signed integer item from the current data unit.
5850 *
5851 * @returns VBox status.
5852 * @param pSSM SSM operation handle.
5853 * @param pi64 Where to store the item.
5854 */
5855VMMR3DECL(int) SSMR3GetS64(PSSMHANDLE pSSM, int64_t *pi64)
5856{
5857 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5858 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5859 return ssmR3DataRead(pSSM, pi64, sizeof(*pi64));
5860}
5861
5862
5863/**
5864 * Loads a 128-bit unsigned integer item from the current data unit.
5865 *
5866 * @returns VBox status.
5867 * @param pSSM SSM operation handle.
5868 * @param pu128 Where to store the item.
5869 */
5870VMMR3DECL(int) SSMR3GetU128(PSSMHANDLE pSSM, uint128_t *pu128)
5871{
5872 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5873 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5874 return ssmR3DataRead(pSSM, pu128, sizeof(*pu128));
5875}
5876
5877
5878/**
5879 * Loads a 128-bit signed integer item from the current data unit.
5880 *
5881 * @returns VBox status.
5882 * @param pSSM SSM operation handle.
5883 * @param pi128 Where to store the item.
5884 */
5885VMMR3DECL(int) SSMR3GetS128(PSSMHANDLE pSSM, int128_t *pi128)
5886{
5887 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5888 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5889 return ssmR3DataRead(pSSM, pi128, sizeof(*pi128));
5890}
5891
5892
5893/**
5894 * Loads a VBox unsigned integer item from the current data unit.
5895 *
5896 * @returns VBox status.
5897 * @param pSSM SSM operation handle.
5898 * @param pu Where to store the integer.
5899 */
5900VMMR3DECL(int) SSMR3GetUInt(PSSMHANDLE pSSM, PRTUINT pu)
5901{
5902 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5903 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5904 return ssmR3DataRead(pSSM, pu, sizeof(*pu));
5905}
5906
5907
5908/**
5909 * Loads a VBox signed integer item from the current data unit.
5910 *
5911 * @returns VBox status.
5912 * @param pSSM SSM operation handle.
5913 * @param pi Where to store the integer.
5914 */
5915VMMR3DECL(int) SSMR3GetSInt(PSSMHANDLE pSSM, PRTINT pi)
5916{
5917 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5918 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5919 return ssmR3DataRead(pSSM, pi, sizeof(*pi));
5920}
5921
5922
5923/**
5924 * Loads a GC natural unsigned integer item from the current data unit.
5925 *
5926 * @returns VBox status.
5927 * @param pSSM SSM operation handle.
5928 * @param pu Where to store the integer.
5929 *
5930 * @deprecated Silly type with an incorrect size, don't use it.
5931 */
5932VMMR3DECL(int) SSMR3GetGCUInt(PSSMHANDLE pSSM, PRTGCUINT pu)
5933{
5934 AssertCompile(sizeof(RTGCPTR) == sizeof(*pu));
5935 return SSMR3GetGCPtr(pSSM, (PRTGCPTR)pu);
5936}
5937
5938
5939/**
5940 * Loads a GC unsigned integer register item from the current data unit.
5941 *
5942 * @returns VBox status.
5943 * @param pSSM SSM operation handle.
5944 * @param pu Where to store the integer.
5945 */
5946VMMR3DECL(int) SSMR3GetGCUIntReg(PSSMHANDLE pSSM, PRTGCUINTREG pu)
5947{
5948 AssertCompile(sizeof(RTGCPTR) == sizeof(*pu));
5949 return SSMR3GetGCPtr(pSSM, (PRTGCPTR)pu);
5950}
5951
5952
5953/**
5954 * Loads a 32 bits GC physical address item from the current data unit.
5955 *
5956 * @returns VBox status.
5957 * @param pSSM SSM operation handle.
5958 * @param pGCPhys Where to store the GC physical address.
5959 */
5960VMMR3DECL(int) SSMR3GetGCPhys32(PSSMHANDLE pSSM, PRTGCPHYS32 pGCPhys)
5961{
5962 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5963 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5964 return ssmR3DataRead(pSSM, pGCPhys, sizeof(*pGCPhys));
5965}
5966
5967
5968/**
5969 * Loads a 64 bits GC physical address item from the current data unit.
5970 *
5971 * @returns VBox status.
5972 * @param pSSM SSM operation handle.
5973 * @param pGCPhys Where to store the GC physical address.
5974 */
5975VMMR3DECL(int) SSMR3GetGCPhys64(PSSMHANDLE pSSM, PRTGCPHYS64 pGCPhys)
5976{
5977 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5978 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5979 return ssmR3DataRead(pSSM, pGCPhys, sizeof(*pGCPhys));
5980}
5981
5982
5983/**
5984 * Loads a GC physical address item from the current data unit.
5985 *
5986 * @returns VBox status.
5987 * @param pSSM SSM operation handle.
5988 * @param pGCPhys Where to store the GC physical address.
5989 */
5990VMMR3DECL(int) SSMR3GetGCPhys(PSSMHANDLE pSSM, PRTGCPHYS pGCPhys)
5991{
5992 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
5993 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
5994
5995 /*
5996 * Default size?
5997 */
5998 if (RT_LIKELY(sizeof(*pGCPhys) == pSSM->u.Read.cbGCPhys))
5999 return ssmR3DataRead(pSSM, pGCPhys, sizeof(*pGCPhys));
6000
6001 /*
6002 * Fiddly.
6003 */
6004 Assert(sizeof(*pGCPhys) == sizeof(uint64_t) || sizeof(*pGCPhys) == sizeof(uint32_t));
6005 Assert(pSSM->u.Read.cbGCPhys == sizeof(uint64_t) || pSSM->u.Read.cbGCPhys == sizeof(uint32_t));
6006 if (pSSM->u.Read.cbGCPhys == sizeof(uint64_t))
6007 {
6008 /* 64-bit saved, 32-bit load: try truncate it. */
6009 uint64_t u64;
6010 int rc = ssmR3DataRead(pSSM, &u64, sizeof(uint64_t));
6011 if (RT_FAILURE(rc))
6012 return rc;
6013 if (u64 >= _4G)
6014 return VERR_SSM_GCPHYS_OVERFLOW;
6015 *pGCPhys = (RTGCPHYS)u64;
6016 return rc;
6017 }
6018
6019 /* 32-bit saved, 64-bit load: clear the high part. */
6020 *pGCPhys = 0;
6021 return ssmR3DataRead(pSSM, pGCPhys, sizeof(uint32_t));
6022}
6023
6024
6025/**
6026 * Loads a GC virtual address item from the current data unit.
6027 *
6028 * Only applies to in the 1.1 format:
6029 * - SSMR3GetGCPtr
6030 * - SSMR3GetGCUIntPtr
6031 * - SSMR3GetGCUInt
6032 * - SSMR3GetGCUIntReg
6033 *
6034 * Put functions are not affected.
6035 *
6036 * @returns VBox status.
6037 * @param pSSM SSM operation handle.
6038 * @param cbGCPtr Size of RTGCPTR
6039 *
6040 * @remarks This interface only works with saved state version 1.1, if the
6041 * format isn't 1.1 the call will be ignored.
6042 */
6043VMMR3DECL(int) SSMR3SetGCPtrSize(PSSMHANDLE pSSM, unsigned cbGCPtr)
6044{
6045 Assert(cbGCPtr == sizeof(RTGCPTR32) || cbGCPtr == sizeof(RTGCPTR64));
6046 if (!pSSM->u.Read.fFixedGCPtrSize)
6047 {
6048 Log(("SSMR3SetGCPtrSize: %u -> %u bytes\n", pSSM->u.Read.cbGCPtr, cbGCPtr));
6049 pSSM->u.Read.cbGCPtr = cbGCPtr;
6050 pSSM->u.Read.fFixedGCPtrSize = true;
6051 }
6052 else if ( pSSM->u.Read.cbGCPtr != cbGCPtr
6053 && pSSM->u.Read.uFmtVerMajor == 1
6054 && pSSM->u.Read.uFmtVerMinor == 1)
6055 AssertMsgFailed(("SSMR3SetGCPtrSize: already fixed at %u bytes; requested %u bytes\n", pSSM->u.Read.cbGCPtr, cbGCPtr));
6056
6057 return VINF_SUCCESS;
6058}
6059
6060
6061/**
6062 * Loads a GC virtual address item from the current data unit.
6063 *
6064 * @returns VBox status.
6065 * @param pSSM SSM operation handle.
6066 * @param pGCPtr Where to store the GC virtual address.
6067 */
6068VMMR3DECL(int) SSMR3GetGCPtr(PSSMHANDLE pSSM, PRTGCPTR pGCPtr)
6069{
6070 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
6071 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
6072
6073 /*
6074 * Default size?
6075 */
6076 if (RT_LIKELY(sizeof(*pGCPtr) == pSSM->u.Read.cbGCPtr))
6077 return ssmR3DataRead(pSSM, pGCPtr, sizeof(*pGCPtr));
6078
6079 /*
6080 * Fiddly.
6081 */
6082 Assert(sizeof(*pGCPtr) == sizeof(uint64_t) || sizeof(*pGCPtr) == sizeof(uint32_t));
6083 Assert(pSSM->u.Read.cbGCPtr == sizeof(uint64_t) || pSSM->u.Read.cbGCPtr == sizeof(uint32_t));
6084 if (pSSM->u.Read.cbGCPtr == sizeof(uint64_t))
6085 {
6086 /* 64-bit saved, 32-bit load: try truncate it. */
6087 uint64_t u64;
6088 int rc = ssmR3DataRead(pSSM, &u64, sizeof(uint64_t));
6089 if (RT_FAILURE(rc))
6090 return rc;
6091 if (u64 >= _4G)
6092 return VERR_SSM_GCPTR_OVERFLOW;
6093 *pGCPtr = (RTGCPTR)u64;
6094 return rc;
6095 }
6096
6097 /* 32-bit saved, 64-bit load: clear the high part. */
6098 *pGCPtr = 0;
6099 return ssmR3DataRead(pSSM, pGCPtr, sizeof(uint32_t));
6100}
6101
6102
6103/**
6104 * Loads a GC virtual address (represented as unsigned integer) item from the current data unit.
6105 *
6106 * @returns VBox status.
6107 * @param pSSM SSM operation handle.
6108 * @param pGCPtr Where to store the GC virtual address.
6109 */
6110VMMR3DECL(int) SSMR3GetGCUIntPtr(PSSMHANDLE pSSM, PRTGCUINTPTR pGCPtr)
6111{
6112 AssertCompile(sizeof(RTGCPTR) == sizeof(*pGCPtr));
6113 return SSMR3GetGCPtr(pSSM, (PRTGCPTR)pGCPtr);
6114}
6115
6116
6117/**
6118 * Loads an RC virtual address item from the current data unit.
6119 *
6120 * @returns VBox status.
6121 * @param pSSM SSM operation handle.
6122 * @param pRCPtr Where to store the RC virtual address.
6123 */
6124VMMR3DECL(int) SSMR3GetRCPtr(PSSMHANDLE pSSM, PRTRCPTR pRCPtr)
6125{
6126 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
6127 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
6128 return ssmR3DataRead(pSSM, pRCPtr, sizeof(*pRCPtr));
6129}
6130
6131
6132/**
6133 * Loads a I/O port address item from the current data unit.
6134 *
6135 * @returns VBox status.
6136 * @param pSSM SSM operation handle.
6137 * @param pIOPort Where to store the I/O port address.
6138 */
6139VMMR3DECL(int) SSMR3GetIOPort(PSSMHANDLE pSSM, PRTIOPORT pIOPort)
6140{
6141 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
6142 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
6143 return ssmR3DataRead(pSSM, pIOPort, sizeof(*pIOPort));
6144}
6145
6146
6147/**
6148 * Loads a selector item from the current data unit.
6149 *
6150 * @returns VBox status.
6151 * @param pSSM SSM operation handle.
6152 * @param pSel Where to store the selector.
6153 */
6154VMMR3DECL(int) SSMR3GetSel(PSSMHANDLE pSSM, PRTSEL pSel)
6155{
6156 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
6157 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
6158 return ssmR3DataRead(pSSM, pSel, sizeof(*pSel));
6159}
6160
6161
6162/**
6163 * Loads a memory item from the current data unit.
6164 *
6165 * @returns VBox status.
6166 * @param pSSM SSM operation handle.
6167 * @param pv Where to store the item.
6168 * @param cb Size of the item.
6169 */
6170VMMR3DECL(int) SSMR3GetMem(PSSMHANDLE pSSM, void *pv, size_t cb)
6171{
6172 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
6173 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
6174 return ssmR3DataRead(pSSM, pv, cb);
6175}
6176
6177
6178/**
6179 * Loads a string item from the current data unit.
6180 *
6181 * @returns VBox status.
6182 * @param pSSM SSM operation handle.
6183 * @param psz Where to store the item.
6184 * @param cbMax Max size of the item (including '\\0').
6185 */
6186VMMR3DECL(int) SSMR3GetStrZ(PSSMHANDLE pSSM, char *psz, size_t cbMax)
6187{
6188 return SSMR3GetStrZEx(pSSM, psz, cbMax, NULL);
6189}
6190
6191
6192/**
6193 * Loads a string item from the current data unit.
6194 *
6195 * @returns VBox status.
6196 * @param pSSM SSM operation handle.
6197 * @param psz Where to store the item.
6198 * @param cbMax Max size of the item (including '\\0').
6199 * @param pcbStr The length of the loaded string excluding the '\\0'. (optional)
6200 */
6201VMMR3DECL(int) SSMR3GetStrZEx(PSSMHANDLE pSSM, char *psz, size_t cbMax, size_t *pcbStr)
6202{
6203 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
6204 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
6205
6206 /* read size prefix. */
6207 uint32_t u32;
6208 int rc = SSMR3GetU32(pSSM, &u32);
6209 if (RT_SUCCESS(rc))
6210 {
6211 if (pcbStr)
6212 *pcbStr = u32;
6213 if (u32 < cbMax)
6214 {
6215 /* terminate and read string content. */
6216 psz[u32] = '\0';
6217 return ssmR3DataRead(pSSM, psz, u32);
6218 }
6219 return VERR_TOO_MUCH_DATA;
6220 }
6221 return rc;
6222}
6223
6224
6225/**
6226 * Skips a number of bytes in the current data unit.
6227 *
6228 * @returns VBox status code.
6229 * @param pSSM The SSM handle.
6230 * @param cb The number of bytes to skip.
6231 */
6232VMMR3DECL(int) SSMR3Skip(PSSMHANDLE pSSM, size_t cb)
6233{
6234 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
6235 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
6236 while (cb > 0)
6237 {
6238 uint8_t abBuf[8192];
6239 size_t cbCur = RT_MIN(sizeof(abBuf), cb);
6240 cb -= cbCur;
6241 int rc = ssmR3DataRead(pSSM, abBuf, cbCur);
6242 if (RT_FAILURE(rc))
6243 return rc;
6244 }
6245
6246 return VINF_SUCCESS;
6247}
6248
6249
6250/**
6251 * Skips to the end of the current data unit.
6252 *
6253 * Since version 2 of the format, the load exec callback have to explicitly call
6254 * this API if it wish to be lazy for some reason. This is because there seldom
6255 * is a good reason to not read your entire data unit and it was hiding bugs.
6256 *
6257 * @returns VBox status code.
6258 * @param pSSM The saved state handle.
6259 */
6260VMMR3DECL(int) SSMR3SkipToEndOfUnit(PSSMHANDLE pSSM)
6261{
6262 AssertMsgReturn( pSSM->enmOp == SSMSTATE_LOAD_EXEC
6263 || pSSM->enmOp == SSMSTATE_OPEN_READ, ("Invalid state %d\n", pSSM->enmOp), VERR_SSM_INVALID_STATE);
6264 if (pSSM->u.Read.uFmtVerMajor >= 2)
6265 {
6266 /*
6267 * Read until we the end of data condition is raised.
6268 */
6269 pSSM->u.Read.cbDataBuffer = 0;
6270 pSSM->u.Read.offDataBuffer = 0;
6271 if (!pSSM->u.Read.fEndOfData)
6272 {
6273 do
6274 {
6275 /* read the rest of the current record */
6276 while (pSSM->u.Read.cbRecLeft)
6277 {
6278 uint8_t abBuf[8192];
6279 size_t cbToRead = RT_MIN(pSSM->u.Read.cbRecLeft, sizeof(abBuf));
6280 int rc = ssmR3DataReadV2Raw(pSSM, abBuf, cbToRead);
6281 if (RT_FAILURE(rc))
6282 return pSSM->rc = rc;
6283 pSSM->u.Read.cbRecLeft -= cbToRead;
6284 }
6285
6286 /* read the next header. */
6287 int rc = ssmR3DataReadRecHdrV2(pSSM);
6288 if (RT_FAILURE(rc))
6289 return pSSM->rc = rc;
6290 } while (!pSSM->u.Read.fEndOfData);
6291 }
6292 }
6293 /* else: Doesn't matter for the version 1 loading. */
6294
6295 return VINF_SUCCESS;
6296}
6297
6298
6299/**
6300 * Query what the VBox status code of the operation is.
6301 *
6302 * This can be used for putting and getting a batch of values
6303 * without bother checking the result till all the calls have
6304 * been made.
6305 *
6306 * @returns SSMAFTER enum value.
6307 * @param pSSM SSM operation handle.
6308 */
6309VMMR3DECL(int) SSMR3HandleGetStatus(PSSMHANDLE pSSM)
6310{
6311 return pSSM->rc;
6312}
6313
6314
6315/**
6316 * Fail the load operation.
6317 *
6318 * This is mainly intended for sub item loaders (like timers) which
6319 * return code isn't necessarily heeded by the caller but is important
6320 * to SSM.
6321 *
6322 * @returns SSMAFTER enum value.
6323 * @param pSSM SSM operation handle.
6324 * @param iStatus Failure status code. This MUST be a VERR_*.
6325 */
6326VMMR3DECL(int) SSMR3HandleSetStatus(PSSMHANDLE pSSM, int iStatus)
6327{
6328 if (RT_FAILURE(iStatus))
6329 {
6330 if (RT_SUCCESS(pSSM->rc))
6331 pSSM->rc = iStatus;
6332 return pSSM->rc = iStatus;
6333 }
6334 AssertMsgFailed(("iStatus=%d %Rrc\n", iStatus, iStatus));
6335 return VERR_INVALID_PARAMETER;
6336}
6337
6338
6339/**
6340 * Get what to do after this operation.
6341 *
6342 * @returns SSMAFTER enum value.
6343 * @param pSSM SSM operation handle.
6344 */
6345VMMR3DECL(SSMAFTER) SSMR3HandleGetAfter(PSSMHANDLE pSSM)
6346{
6347 return pSSM->enmAfter;
6348}
6349
6350
6351/**
6352 * Get the current unit byte offset (uncompressed).
6353 *
6354 * @returns The offset. UINT64_MAX if called at a wrong time.
6355 * @param pSSM SSM operation handle.
6356 */
6357VMMR3DECL(uint64_t) SSMR3HandleGetUnitOffset(PSSMHANDLE pSSM)
6358{
6359 AssertMsgFailed(("/** @todo this isn't correct any longer. */"));
6360 return pSSM->offUnit;
6361}
6362
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette