VirtualBox

source: vbox/trunk/src/VBox/VMM/PATM/VMMGC/CSAMGC.cpp@ 29888

Last change on this file since 29888 was 29250, checked in by vboxsync, 15 years ago

iprt/asm*.h: split out asm-math.h, don't include asm-*.h from asm.h, don't include asm.h from sup.h. Fixed a couple file headers.

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
File size: 5.2 KB
Line 
1/* $Id: CSAMGC.cpp 29250 2010-05-09 17:53:58Z vboxsync $ */
2/** @file
3 * CSAM - Guest OS Code Scanning and Analysis Manager - Any Context
4 */
5
6/*
7 * Copyright (C) 2006-2007 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17
18
19/*******************************************************************************
20* Header Files *
21*******************************************************************************/
22#define LOG_GROUP LOG_GROUP_CSAM
23#include <VBox/cpum.h>
24#include <VBox/stam.h>
25#include <VBox/patm.h>
26#include <VBox/csam.h>
27#include <VBox/pgm.h>
28#include <VBox/mm.h>
29#include <VBox/sup.h>
30#include <VBox/mm.h>
31#include <VBox/rem.h>
32#include <VBox/param.h>
33#include <iprt/avl.h>
34#include "CSAMInternal.h"
35#include <VBox/vm.h>
36#include <VBox/dbg.h>
37#include <VBox/err.h>
38#include <VBox/log.h>
39#include <iprt/assert.h>
40#include <VBox/dis.h>
41#include <VBox/disopcode.h>
42#include <iprt/asm.h>
43#include <iprt/asm-amd64-x86.h>
44#include <iprt/string.h>
45
46/**
47 * \#PF Handler callback for virtual access handler ranges. (CSAM self-modifying
48 * code monitor)
49 *
50 * Important to realize that a physical page in a range can have aliases, and
51 * for ALL and WRITE handlers these will also trigger.
52 *
53 * @returns VBox status code (appropriate for GC return).
54 * @param pVM VM Handle.
55 * @param uErrorCode CPU Error code.
56 * @param pRegFrame Trap register frame.
57 * @param pvFault The fault address (cr2).
58 * @param pvRange The base address of the handled virtual range.
59 * @param offRange The offset of the access into this range.
60 * (If it's a EIP range this's the EIP, if not it's pvFault.)
61 */
62VMMRCDECL(int) CSAMGCCodePageWriteHandler(PVM pVM, RTGCUINT uErrorCode, PCPUMCTXCORE pRegFrame, RTGCPTR pvFault, RTGCPTR pvRange, uintptr_t offRange)
63{
64 PPATMGCSTATE pPATMGCState;
65 bool fPatchCode = PATMIsPatchGCAddr(pVM, pRegFrame->eip);
66 int rc;
67 PVMCPU pVCpu = VMMGetCpu0(pVM);
68
69 Assert(pVM->csam.s.cDirtyPages < CSAM_MAX_DIRTY_PAGES);
70
71 /* Flush the recompilers translation block cache as the guest seems to be modifying instructions. */
72 REMFlushTBs(pVM);
73
74 pPATMGCState = PATMQueryGCState(pVM);
75 Assert(pPATMGCState);
76
77 Assert(pPATMGCState->fPIF || fPatchCode);
78 /** When patch code is executing instructions that must complete, then we must *never* interrupt it. */
79 if (!pPATMGCState->fPIF && fPatchCode)
80 {
81 Log(("CSAMGCCodePageWriteHandler: fPIF=0 -> stack fault in patch generated code at %08RX32!\n", pRegFrame->eip));
82 /** @note there are cases when pages previously used for code are now used for stack; patch generated code will fault (pushf))
83 * Just make the page r/w and continue.
84 */
85 /*
86 * Make this particular page R/W.
87 */
88 rc = PGMShwModifyPage(pVCpu, pvFault, 1, X86_PTE_RW, ~(uint64_t)X86_PTE_RW);
89 AssertMsgRC(rc, ("PGMShwModifyPage -> rc=%Rrc\n", rc));
90 ASMInvalidatePage((void *)(uintptr_t)pvFault);
91 return VINF_SUCCESS;
92 }
93
94 uint32_t cpl;
95
96 if (pRegFrame->eflags.Bits.u1VM)
97 cpl = 3;
98 else
99 cpl = (pRegFrame->ss & X86_SEL_RPL);
100
101 Log(("CSAMGCCodePageWriteHandler: code page write at %RGv original address %RGv (cpl=%d)\n", pvFault, (RTGCUINTPTR)pvRange + offRange, cpl));
102
103 /* If user code is modifying one of our monitored pages, then we can safely make it r/w as it's no longer being used for supervisor code. */
104 if (cpl != 3)
105 {
106 rc = PATMGCHandleWriteToPatchPage(pVM, pRegFrame, (RTRCPTR)((RTRCUINTPTR)pvRange + offRange), 4 /** @todo */);
107 if (rc == VINF_SUCCESS)
108 return rc;
109 if (rc == VINF_EM_RAW_EMULATE_INSTR)
110 {
111 STAM_COUNTER_INC(&pVM->csam.s.StatDangerousWrite);
112 return VINF_EM_RAW_EMULATE_INSTR;
113 }
114 Assert(rc == VERR_PATCH_NOT_FOUND);
115 }
116
117 VMCPU_FF_SET(pVCpu, VMCPU_FF_CSAM_PENDING_ACTION);
118
119 /* Note that pvFault might be a different address in case of aliases. So use pvRange + offset instead!. */
120 pVM->csam.s.pvDirtyBasePage[pVM->csam.s.cDirtyPages] = (RTRCPTR)((RTRCUINTPTR)pvRange + offRange);
121 pVM->csam.s.pvDirtyFaultPage[pVM->csam.s.cDirtyPages] = (RTRCPTR)((RTRCUINTPTR)pvRange + offRange);
122 if (++pVM->csam.s.cDirtyPages == CSAM_MAX_DIRTY_PAGES)
123 return VINF_CSAM_PENDING_ACTION;
124
125 /*
126 * Make this particular page R/W. The VM_FF_CSAM_FLUSH_DIRTY_PAGE handler will reset it to readonly again.
127 */
128 Log(("CSAMGCCodePageWriteHandler: enabled r/w for page %RGv\n", pvFault));
129 rc = PGMShwModifyPage(pVCpu, pvFault, 1, X86_PTE_RW, ~(uint64_t)X86_PTE_RW);
130 AssertMsgRC(rc, ("PGMShwModifyPage -> rc=%Rrc\n", rc));
131 ASMInvalidatePage((void *)(uintptr_t)pvFault);
132
133 STAM_COUNTER_INC(&pVM->csam.s.StatCodePageModified);
134 return VINF_SUCCESS;
135}
136
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette