VirtualBox

source: vbox/trunk/src/VBox/VMM/VMMAll/PGMAllShw.h@ 14128

Last change on this file since 14128 was 14093, checked in by vboxsync, 16 years ago

#1865: shadow pae, the first bit.

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
File size: 13.2 KB
Line 
1/* $Id: PGMAllShw.h 14093 2008-11-11 16:37:08Z vboxsync $ */
2/** @file
3 * VBox - Page Manager, Shadow Paging Template - All context code.
4 */
5
6/*
7 * Copyright (C) 2006-2007 Sun Microsystems, Inc.
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 *
17 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa
18 * Clara, CA 95054 USA or visit http://www.sun.com if you need
19 * additional information or have any questions.
20 */
21
22/*******************************************************************************
23* Defined Constants And Macros *
24*******************************************************************************/
25#undef SHWPT
26#undef PSHWPT
27#undef SHWPTE
28#undef PSHWPTE
29#undef SHWPD
30#undef PSHWPD
31#undef SHWPDE
32#undef PSHWPDE
33#undef SHW_PDE_PG_MASK
34#undef SHW_PD_SHIFT
35#undef SHW_PD_MASK
36#undef SHW_PTE_PG_MASK
37#undef SHW_PT_SHIFT
38#undef SHW_PT_MASK
39#undef SHW_TOTAL_PD_ENTRIES
40#undef SHW_PDPT_SHIFT
41#undef SHW_PDPT_MASK
42#undef SHW_PDPE_PG_MASK
43#undef SHW_POOL_ROOT_IDX
44
45#if PGM_SHW_TYPE == PGM_TYPE_32BIT
46# define SHWPT X86PT
47# define PSHWPT PX86PT
48# define SHWPTE X86PTE
49# define PSHWPTE PX86PTE
50# define SHWPD X86PD
51# define PSHWPD PX86PD
52# define SHWPDE X86PDE
53# define PSHWPDE PX86PDE
54# define SHW_PDE_PG_MASK X86_PDE_PG_MASK
55# define SHW_PD_SHIFT X86_PD_SHIFT
56# define SHW_PD_MASK X86_PD_MASK
57# define SHW_TOTAL_PD_ENTRIES X86_PG_ENTRIES
58# define SHW_PTE_PG_MASK X86_PTE_PG_MASK
59# define SHW_PT_SHIFT X86_PT_SHIFT
60# define SHW_PT_MASK X86_PT_MASK
61# define SHW_POOL_ROOT_IDX PGMPOOL_IDX_PD
62
63#elif PGM_SHW_TYPE == PGM_TYPE_EPT
64# define SHWPT EPTPT
65# define PSHWPT PEPTPT
66# define SHWPTE EPTPTE
67# define PSHWPTE PEPTPTE
68# define SHWPD EPTPD
69# define PSHWPD PEPTPD
70# define SHWPDE EPTPDE
71# define PSHWPDE PEPTPDE
72# define SHW_PDE_PG_MASK EPT_PDE_PG_MASK
73# define SHW_PD_SHIFT EPT_PD_SHIFT
74# define SHW_PD_MASK EPT_PD_MASK
75# define SHW_PTE_PG_MASK EPT_PTE_PG_MASK
76# define SHW_PT_SHIFT EPT_PT_SHIFT
77# define SHW_PT_MASK EPT_PT_MASK
78# define SHW_PDPT_SHIFT EPT_PDPT_SHIFT
79# define SHW_PDPT_MASK EPT_PDPT_MASK
80# define SHW_PDPE_PG_MASK EPT_PDPE_PG_MASK
81# define SHW_TOTAL_PD_ENTRIES (EPT_PG_AMD64_ENTRIES*EPT_PG_AMD64_PDPE_ENTRIES)
82# define SHW_POOL_ROOT_IDX PGMPOOL_IDX_NESTED_ROOT /* do not use! exception is real mode & protected mode without paging. */
83
84#else
85# define SHWPT X86PTPAE
86# define PSHWPT PX86PTPAE
87# define SHWPTE X86PTEPAE
88# define PSHWPTE PX86PTEPAE
89# define SHWPD X86PDPAE
90# define PSHWPD PX86PDPAE
91# define SHWPDE X86PDEPAE
92# define PSHWPDE PX86PDEPAE
93# define SHW_PDE_PG_MASK X86_PDE_PAE_PG_MASK
94# define SHW_PD_SHIFT X86_PD_PAE_SHIFT
95# define SHW_PD_MASK X86_PD_PAE_MASK
96# define SHW_PTE_PG_MASK X86_PTE_PAE_PG_MASK
97# define SHW_PT_SHIFT X86_PT_PAE_SHIFT
98# define SHW_PT_MASK X86_PT_PAE_MASK
99# if PGM_SHW_TYPE == PGM_TYPE_AMD64
100# define SHW_PDPT_SHIFT X86_PDPT_SHIFT
101# define SHW_PDPT_MASK X86_PDPT_MASK_AMD64
102# define SHW_PDPE_PG_MASK X86_PDPE_PG_MASK
103# define SHW_TOTAL_PD_ENTRIES (X86_PG_AMD64_ENTRIES*X86_PG_AMD64_PDPE_ENTRIES)
104# define SHW_POOL_ROOT_IDX PGMPOOL_IDX_PAE_PD /* do not use! exception is real mode & protected mode without paging. */
105# else /* 32 bits PAE mode */
106# define SHW_PDPT_SHIFT X86_PDPT_SHIFT
107# define SHW_PDPT_MASK X86_PDPT_MASK_PAE
108# define SHW_PDPE_PG_MASK X86_PDPE_PG_MASK
109# define SHW_TOTAL_PD_ENTRIES (X86_PG_PAE_ENTRIES*X86_PG_PAE_PDPE_ENTRIES)
110# define SHW_POOL_ROOT_IDX PGMPOOL_IDX_PAE_PD
111# endif
112#endif
113
114
115
116/*******************************************************************************
117* Internal Functions *
118*******************************************************************************/
119__BEGIN_DECLS
120PGM_SHW_DECL(int, GetPage)(PVM pVM, RTGCUINTPTR GCPtr, uint64_t *pfFlags, PRTHCPHYS pHCPhys);
121PGM_SHW_DECL(int, ModifyPage)(PVM pVM, RTGCUINTPTR GCPtr, size_t cbPages, uint64_t fFlags, uint64_t fMask);
122__END_DECLS
123
124
125
126/**
127 * Gets effective page information (from the VMM page directory).
128 *
129 * @returns VBox status.
130 * @param pVM VM Handle.
131 * @param GCPtr Guest Context virtual address of the page.
132 * @param pfFlags Where to store the flags. These are X86_PTE_*.
133 * @param pHCPhys Where to store the HC physical address of the page.
134 * This is page aligned.
135 * @remark You should use PGMMapGetPage() for pages in a mapping.
136 */
137PGM_SHW_DECL(int, GetPage)(PVM pVM, RTGCUINTPTR GCPtr, uint64_t *pfFlags, PRTHCPHYS pHCPhys)
138{
139#if PGM_SHW_TYPE == PGM_TYPE_NESTED
140 return VERR_PAGE_TABLE_NOT_PRESENT;
141
142#else /* PGM_SHW_TYPE != PGM_TYPE_NESTED && PGM_SHW_TYPE != PGM_TYPE_EPT */
143 /*
144 * Get the PDE.
145 */
146# if PGM_SHW_TYPE == PGM_TYPE_AMD64
147 bool fNoExecuteBitValid = !!(CPUMGetGuestEFER(pVM) & MSR_K6_EFER_NXE);
148 X86PDEPAE Pde;
149
150 /* PML4 */
151 X86PML4E Pml4e;
152 Pml4e.u = pgmShwGetLongModePML4E(&pVM->pgm.s, GCPtr);
153 if (!Pml4e.n.u1Present)
154 return VERR_PAGE_TABLE_NOT_PRESENT;
155
156 /* PDPT */
157 PX86PDPT pPDPT;
158 int rc = PGM_HCPHYS_2_PTR(pVM, Pml4e.u & X86_PML4E_PG_MASK, &pPDPT);
159 if (RT_FAILURE(rc))
160 return rc;
161 const unsigned iPDPT = (GCPtr >> SHW_PDPT_SHIFT) & SHW_PDPT_MASK;
162 X86PDPE Pdpe = pPDPT->a[iPDPT];
163 if (!Pdpe.n.u1Present)
164 return VERR_PAGE_TABLE_NOT_PRESENT;
165
166 /* PD */
167 PX86PDPAE pPd;
168 rc = PGM_HCPHYS_2_PTR(pVM, Pdpe.u & X86_PDPE_PG_MASK, &pPd);
169 if (RT_FAILURE(rc))
170 return rc;
171 const unsigned iPd = (GCPtr >> SHW_PD_SHIFT) & SHW_PD_MASK;
172 Pde = pPd->a[iPd];
173
174 /* Merge accessed, write, user and no-execute bits into the PDE. */
175 Pde.n.u1Accessed &= Pml4e.n.u1Accessed & Pdpe.lm.u1Accessed;
176 Pde.n.u1Write &= Pml4e.n.u1Write & Pdpe.lm.u1Write;
177 Pde.n.u1User &= Pml4e.n.u1User & Pdpe.lm.u1User;
178 Pde.n.u1NoExecute &= Pml4e.n.u1NoExecute & Pdpe.lm.u1NoExecute;
179
180# elif PGM_SHW_TYPE == PGM_TYPE_PAE
181 bool fNoExecuteBitValid = !!(CPUMGetGuestEFER(pVM) & MSR_K6_EFER_NXE);
182 X86PDEPAE Pde;
183 Pde.u = pgmShwGetPaePDE(&pVM->pgm.s, GCPtr);
184
185# elif PGM_SHW_TYPE == PGM_TYPE_EPT
186 const unsigned iPd = ((GCPtr >> SHW_PD_SHIFT) & SHW_PD_MASK);
187 PEPTPD pPDDst;
188 EPTPDE Pde;
189
190 int rc = pgmShwGetEPTPDPtr(pVM, GCPtr, NULL, &pPDDst);
191 if (rc != VINF_SUCCESS) /** @todo this function isn't expected to return informational status codes. Check callers / fix. */
192 {
193 AssertRC(rc);
194 return rc;
195 }
196 Assert(pPDDst);
197 Pde = pPDDst->a[iPd];
198
199# else /* PGM_TYPE_32BIT */
200 const unsigned iPd = (GCPtr >> X86_PD_SHIFT) & X86_PD_MASK;
201 X86PDE Pde = CTXMID(pVM->pgm.s.p,32BitPD)->a[iPd];
202# endif
203 if (!Pde.n.u1Present)
204 return VERR_PAGE_TABLE_NOT_PRESENT;
205
206 Assert(!Pde.b.u1Size);
207
208 /*
209 * Get PT entry.
210 */
211 PSHWPT pPT;
212 if (!(Pde.u & PGM_PDFLAGS_MAPPING))
213 {
214 int rc = PGM_HCPHYS_2_PTR(pVM, Pde.u & SHW_PDE_PG_MASK, &pPT);
215 if (RT_FAILURE(rc))
216 return rc;
217 }
218 else /* mapping: */
219 {
220# if PGM_SHW_TYPE == PGM_TYPE_AMD64 \
221 || PGM_SHW_TYPE == PGM_TYPE_EPT
222 AssertFailed(); /* can't happen */
223# else
224 Assert(pgmMapAreMappingsEnabled(&pVM->pgm.s));
225
226 PPGMMAPPING pMap = pgmGetMapping(pVM, (RTGCPTR)GCPtr);
227 AssertMsgReturn(pMap, ("GCPtr=%RGv\n", GCPtr), VERR_INTERNAL_ERROR);
228# if PGM_SHW_TYPE == PGM_TYPE_32BIT
229 pPT = pMap->aPTs[(GCPtr - pMap->GCPtr) >> X86_PD_SHIFT].CTX_SUFF(pPT);
230# else /* PAE */
231 pPT = pMap->aPTs[(GCPtr - pMap->GCPtr) >> X86_PD_SHIFT].CTX_SUFF(paPaePTs);
232# endif
233# endif
234 }
235 const unsigned iPt = (GCPtr >> SHW_PT_SHIFT) & SHW_PT_MASK;
236 SHWPTE Pte = pPT->a[iPt];
237 if (!Pte.n.u1Present)
238 return VERR_PAGE_NOT_PRESENT;
239
240 /*
241 * Store the results.
242 * RW and US flags depend on the entire page translation hierarchy - except for
243 * legacy PAE which has a simplified PDPE.
244 */
245 if (pfFlags)
246 {
247 *pfFlags = (Pte.u & ~SHW_PTE_PG_MASK)
248 & ((Pde.u & (X86_PTE_RW | X86_PTE_US)) | ~(uint64_t)(X86_PTE_RW | X86_PTE_US));
249# if PGM_WITH_NX(PGM_SHW_TYPE, PGM_SHW_TYPE)
250 /* The NX bit is determined by a bitwise OR between the PT and PD */
251 if (fNoExecuteBitValid)
252 *pfFlags |= (Pte.u & Pde.u & X86_PTE_PAE_NX);
253# endif
254 }
255
256 if (pHCPhys)
257 *pHCPhys = Pte.u & SHW_PTE_PG_MASK;
258
259 return VINF_SUCCESS;
260#endif /* PGM_SHW_TYPE != PGM_TYPE_NESTED */
261}
262
263
264/**
265 * Modify page flags for a range of pages in the shadow context.
266 *
267 * The existing flags are ANDed with the fMask and ORed with the fFlags.
268 *
269 * @returns VBox status code.
270 * @param pVM VM handle.
271 * @param GCPtr Virtual address of the first page in the range. Page aligned!
272 * @param cb Size (in bytes) of the range to apply the modification to. Page aligned!
273 * @param fFlags The OR mask - page flags X86_PTE_*, excluding the page mask of course.
274 * @param fMask The AND mask - page flags X86_PTE_*.
275 * Be extremely CAREFUL with ~'ing values because they can be 32-bit!
276 * @remark You must use PGMMapModifyPage() for pages in a mapping.
277 */
278PGM_SHW_DECL(int, ModifyPage)(PVM pVM, RTGCUINTPTR GCPtr, size_t cb, uint64_t fFlags, uint64_t fMask)
279{
280# if PGM_SHW_TYPE == PGM_TYPE_NESTED
281 return VERR_PAGE_TABLE_NOT_PRESENT;
282
283# else /* PGM_SHW_TYPE != PGM_TYPE_NESTED && PGM_SHW_TYPE != PGM_TYPE_EPT */
284 int rc;
285
286 /*
287 * Walk page tables and pages till we're done.
288 */
289 for (;;)
290 {
291 /*
292 * Get the PDE.
293 */
294# if PGM_SHW_TYPE == PGM_TYPE_AMD64
295 X86PDEPAE Pde;
296 /* PML4 */
297 X86PML4E Pml4e;
298 Pml4e.u = pgmShwGetLongModePML4E(&pVM->pgm.s, GCPtr);
299 if (!Pml4e.n.u1Present)
300 return VERR_PAGE_TABLE_NOT_PRESENT;
301
302 /* PDPT */
303 PX86PDPT pPDPT;
304 rc = PGM_HCPHYS_2_PTR(pVM, Pml4e.u & X86_PML4E_PG_MASK, &pPDPT);
305 if (RT_FAILURE(rc))
306 return rc;
307 const unsigned iPDPT = (GCPtr >> SHW_PDPT_SHIFT) & SHW_PDPT_MASK;
308 X86PDPE Pdpe = pPDPT->a[iPDPT];
309 if (!Pdpe.n.u1Present)
310 return VERR_PAGE_TABLE_NOT_PRESENT;
311
312 /* PD */
313 PX86PDPAE pPd;
314 rc = PGM_HCPHYS_2_PTR(pVM, Pdpe.u & X86_PDPE_PG_MASK, &pPd);
315 if (RT_FAILURE(rc))
316 return rc;
317 const unsigned iPd = (GCPtr >> SHW_PD_SHIFT) & SHW_PD_MASK;
318 Pde = pPd->a[iPd];
319
320# elif PGM_SHW_TYPE == PGM_TYPE_PAE
321 X86PDEPAE Pde;
322 Pde.u = pgmShwGetPaePDE(&pVM->pgm.s, GCPtr);
323
324# elif PGM_SHW_TYPE == PGM_TYPE_EPT
325 const unsigned iPd = ((GCPtr >> SHW_PD_SHIFT) & SHW_PD_MASK);
326 PEPTPD pPDDst;
327 EPTPDE Pde;
328
329 rc = pgmShwGetEPTPDPtr(pVM, GCPtr, NULL, &pPDDst);
330 if (rc != VINF_SUCCESS)
331 {
332 AssertRC(rc);
333 return rc;
334 }
335 Assert(pPDDst);
336 Pde = pPDDst->a[iPd];
337
338# else /* PGM_TYPE_32BIT */
339 const unsigned iPd = (GCPtr >> X86_PD_SHIFT) & X86_PD_MASK;
340 X86PDE Pde = CTXMID(pVM->pgm.s.p,32BitPD)->a[iPd];
341# endif
342 if (!Pde.n.u1Present)
343 return VERR_PAGE_TABLE_NOT_PRESENT;
344
345 /*
346 * Map the page table.
347 */
348 PSHWPT pPT;
349 rc = PGM_HCPHYS_2_PTR(pVM, Pde.u & SHW_PDE_PG_MASK, &pPT);
350 if (RT_FAILURE(rc))
351 return rc;
352
353 unsigned iPTE = (GCPtr >> SHW_PT_SHIFT) & SHW_PT_MASK;
354 while (iPTE < RT_ELEMENTS(pPT->a))
355 {
356 if (pPT->a[iPTE].n.u1Present)
357 {
358 pPT->a[iPTE].u = (pPT->a[iPTE].u & (fMask | SHW_PTE_PG_MASK)) | (fFlags & ~SHW_PTE_PG_MASK);
359/** @todo r=bird: I think this may break assumptions in page pool GCPhys
360 * tracking, and I seems to recall putting it here to prevent API users from
361 * making anything !P. The assertion is kind of useless now, as it
362 * won't hit anything any longer... */
363 Assert(pPT->a[iPTE].n.u1Present || !(fMask & X86_PTE_P));
364# if PGM_SHW_TYPE == PGM_TYPE_EPT
365 HWACCMInvalidatePhysPage(pVM, (RTGCPHYS)GCPtr);
366# else
367 PGM_INVL_PG(GCPtr);
368# endif
369 }
370
371 /* next page */
372 cb -= PAGE_SIZE;
373 if (!cb)
374 return VINF_SUCCESS;
375 GCPtr += PAGE_SIZE;
376 iPTE++;
377 }
378 }
379# endif /* PGM_SHW_TYPE != PGM_TYPE_NESTED */
380}
381
Note: See TracBrowser for help on using the repository browser.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette