VirtualBox

source: vbox/trunk/src/VBox/VMM/VMMAll/SELMAll.cpp@ 56034

Last change on this file since 56034 was 56016, checked in by vboxsync, 10 years ago

build fix

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id Revision
File size: 38.7 KB
Line 
1/* $Id: SELMAll.cpp 56016 2015-05-21 17:08:57Z vboxsync $ */
2/** @file
3 * SELM All contexts.
4 */
5
6/*
7 * Copyright (C) 2006-2012 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17
18
19/*******************************************************************************
20* Header Files *
21*******************************************************************************/
22#define LOG_GROUP LOG_GROUP_SELM
23#include <VBox/vmm/selm.h>
24#include <VBox/vmm/stam.h>
25#include <VBox/vmm/em.h>
26#include <VBox/vmm/mm.h>
27#include <VBox/vmm/hm.h>
28#include <VBox/vmm/pgm.h>
29#include <VBox/vmm/hm.h>
30#include "SELMInternal.h"
31#include <VBox/vmm/vm.h>
32#include <VBox/err.h>
33#include <VBox/param.h>
34#include <iprt/assert.h>
35#include <VBox/vmm/vmm.h>
36#include <iprt/x86.h>
37#include <iprt/string.h>
38
39#include "SELMInline.h"
40
41
42/*******************************************************************************
43* Global Variables *
44*******************************************************************************/
45#if defined(LOG_ENABLED) && defined(VBOX_WITH_RAW_MODE_NOT_R0)
46/** Segment register names. */
47static char const g_aszSRegNms[X86_SREG_COUNT][4] = { "ES", "CS", "SS", "DS", "FS", "GS" };
48#endif
49
50
51#ifndef IN_RING0
52
53# ifdef SELM_TRACK_GUEST_GDT_CHANGES
54/**
55 * @callback_method_impl{FNPGMVIRTHANDLER}
56 */
57PGM_ALL_CB2_DECL(VBOXSTRICTRC)
58selmGuestGDTWriteHandler(PVM pVM, PVMCPU pVCpu, RTGCPTR GCPtr, void *pvPtr, void *pvBuf, size_t cbBuf,
59 PGMACCESSTYPE enmAccessType, PGMACCESSORIGIN enmOrigin, void *pvUser)
60{
61 Assert(enmAccessType == PGMACCESSTYPE_WRITE); NOREF(enmAccessType);
62 Log(("selmGuestGDTWriteHandler: write to %RGv size %d\n", GCPtr, cbBuf)); NOREF(GCPtr); NOREF(cbBuf);
63 NOREF(pvPtr); NOREF(pvBuf); NOREF(enmOrigin); NOREF(pvUser);
64
65# ifdef IN_RING3
66 VMCPU_FF_SET(pVCpu, VMCPU_FF_SELM_SYNC_GDT);
67 return VINF_PGM_HANDLER_DO_DEFAULT;
68
69# else /* IN_RC: */
70 /*
71 * Execute the write, doing necessary pre and post shadow GDT checks.
72 */
73 PCPUMCTX pCtx = CPUMQueryGuestCtxPtr(pVCpu);
74 uint32_t offGuestGdt = pCtx->gdtr.pGdt - GCPtr;
75 selmRCGuestGdtPreWriteCheck(pVM, pVCpu, offGuestGdt, cbBuf, pCtx);
76 memcpy(pvBuf, pvPtr, cbBuf);
77 VBOXSTRICTRC rcStrict = selmRCGuestGdtPostWriteCheck(pVM, pVCpu, offGuestGdt, cbBuf, pCtx);
78 if (!VMCPU_FF_IS_PENDING(pVCpu, VMCPU_FF_SELM_SYNC_GDT))
79 STAM_COUNTER_INC(&pVM->selm.s.StatRCWriteGuestGDTHandled);
80 else
81 STAM_COUNTER_INC(&pVM->selm.s.StatRCWriteGuestGDTUnhandled);
82 return rcStrict;
83# endif
84}
85# endif
86
87
88# ifdef SELM_TRACK_GUEST_LDT_CHANGES
89/**
90 * @callback_method_impl{FNPGMVIRTHANDLER}
91 */
92PGM_ALL_CB2_DECL(VBOXSTRICTRC)
93selmGuestLDTWriteHandler(PVM pVM, PVMCPU pVCpu, RTGCPTR GCPtr, void *pvPtr, void *pvBuf, size_t cbBuf,
94 PGMACCESSTYPE enmAccessType, PGMACCESSORIGIN enmOrigin, void *pvUser)
95{
96 Assert(enmAccessType == PGMACCESSTYPE_WRITE); NOREF(enmAccessType);
97 Log(("selmGuestLDTWriteHandler: write to %RGv size %d\n", GCPtr, cbBuf)); NOREF(GCPtr); NOREF(cbBuf);
98 NOREF(pvPtr); NOREF(pvBuf); NOREF(enmOrigin); NOREF(pvUser);
99
100 VMCPU_FF_SET(pVCpu, VMCPU_FF_SELM_SYNC_LDT);
101# ifdef IN_RING3
102 return VINF_PGM_HANDLER_DO_DEFAULT;
103# else
104 STAM_COUNTER_INC(&pVM->selm.s.StatRCWriteGuestLDT);
105 return VINF_EM_RAW_EMULATE_INSTR_LDT_FAULT;
106# endif
107}
108# endif
109
110
111# ifdef SELM_TRACK_GUEST_TSS_CHANGES
112/**
113 * @callback_method_impl{FNPGMVIRTHANDLER}
114 */
115PGM_ALL_CB2_DECL(VBOXSTRICTRC)
116selmGuestTSSWriteHandler(PVM pVM, PVMCPU pVCpu, RTGCPTR GCPtr, void *pvPtr, void *pvBuf, size_t cbBuf,
117 PGMACCESSTYPE enmAccessType, PGMACCESSORIGIN enmOrigin, void *pvUser)
118{
119 Assert(enmAccessType == PGMACCESSTYPE_WRITE); NOREF(enmAccessType);
120 Log(("selmGuestTSSWriteHandler: write %.*Rhxs to %RGv size %d\n", RT_MIN(8, cbBuf), pvBuf, GCPtr, cbBuf));
121 NOREF(pvBuf); NOREF(GCPtr); NOREF(cbBuf); NOREF(enmOrigin); NOREF(pvUser); NOREF(pvPtr);
122
123# ifdef IN_RING3
124 /** @todo This can be optimized by checking for the ESP0 offset and tracking TR
125 * reloads in REM (setting VM_FF_SELM_SYNC_TSS if TR is reloaded). We
126 * should probably also deregister the virtual handler if TR.base/size
127 * changes while we're in REM. May also share
128 * selmRCGuestTssPostWriteCheck code. */
129 VMCPU_FF_SET(pVCpu, VMCPU_FF_SELM_SYNC_TSS);
130 return VINF_PGM_HANDLER_DO_DEFAULT;
131
132# else /* IN_RC */
133 /*
134 * Do the write and check if anything relevant changed.
135 */
136 Assert(pVM->selm.s.GCPtrGuestTss != (uintptr_t)RTRCPTR_MAX);
137 memcpy(pvPtr, pvBuf, cbBuf);
138 return selmRCGuestTssPostWriteCheck(pVM, pVCpu, GCPtr - pVM->selm.s.GCPtrGuestTss, cbBuf);
139# endif
140}
141# endif
142
143#endif /* IN_RING0 */
144
145
146#ifdef VBOX_WITH_RAW_MODE_NOT_R0
147/**
148 * Converts a GC selector based address to a flat address.
149 *
150 * No limit checks are done. Use the SELMToFlat*() or SELMValidate*() functions
151 * for that.
152 *
153 * @returns Flat address.
154 * @param pVM Pointer to the VM.
155 * @param Sel Selector part.
156 * @param Addr Address part.
157 * @remarks Don't use when in long mode.
158 */
159VMMDECL(RTGCPTR) SELMToFlatBySel(PVM pVM, RTSEL Sel, RTGCPTR Addr)
160{
161 Assert(pVM->cCpus == 1 && !CPUMIsGuestInLongMode(VMMGetCpu(pVM))); /* DON'T USE! */
162 Assert(!HMIsEnabled(pVM));
163
164 /** @todo check the limit. */
165 X86DESC Desc;
166 if (!(Sel & X86_SEL_LDT))
167 Desc = pVM->selm.s.CTX_SUFF(paGdt)[Sel >> X86_SEL_SHIFT];
168 else
169 {
170 /** @todo handle LDT pages not present! */
171 PX86DESC paLDT = (PX86DESC)((char *)pVM->selm.s.CTX_SUFF(pvLdt) + pVM->selm.s.offLdtHyper);
172 Desc = paLDT[Sel >> X86_SEL_SHIFT];
173 }
174
175 return (RTGCPTR)(((RTGCUINTPTR)Addr + X86DESC_BASE(&Desc)) & 0xffffffff);
176}
177#endif /* VBOX_WITH_RAW_MODE_NOT_R0 */
178
179
180/**
181 * Converts a GC selector based address to a flat address.
182 *
183 * No limit checks are done. Use the SELMToFlat*() or SELMValidate*() functions
184 * for that.
185 *
186 * @returns Flat address.
187 * @param pVM Pointer to the VM.
188 * @param SelReg Selector register
189 * @param pCtxCore CPU context
190 * @param Addr Address part.
191 */
192VMMDECL(RTGCPTR) SELMToFlat(PVM pVM, DISSELREG SelReg, PCPUMCTXCORE pCtxCore, RTGCPTR Addr)
193{
194 PCPUMSELREG pSReg;
195 PVMCPU pVCpu = VMMGetCpu(pVM);
196
197 int rc = DISFetchRegSegEx(pCtxCore, SelReg, &pSReg); AssertRC(rc);
198
199 /*
200 * Deal with real & v86 mode first.
201 */
202 if ( pCtxCore->eflags.Bits.u1VM
203 || CPUMIsGuestInRealMode(pVCpu))
204 {
205 uint32_t uFlat = (uint32_t)Addr & 0xffff;
206 if (CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, pSReg))
207 uFlat += (uint32_t)pSReg->u64Base;
208 else
209 uFlat += (uint32_t)pSReg->Sel << 4;
210 return (RTGCPTR)uFlat;
211 }
212
213#ifdef VBOX_WITH_RAW_MODE_NOT_R0
214 /** @todo when we're in 16 bits mode, we should cut off the address as well?? */
215 if (!CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, pSReg))
216 CPUMGuestLazyLoadHiddenSelectorReg(pVCpu, pSReg);
217 if (!CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, &pCtxCore->cs))
218 CPUMGuestLazyLoadHiddenSelectorReg(pVCpu, &pCtxCore->cs);
219#else
220 Assert(CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, pSReg));
221 Assert(CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, &pCtxCore->cs));
222#endif
223
224 /* 64 bits mode: CS, DS, ES and SS are treated as if each segment base is 0
225 (Intel® 64 and IA-32 Architectures Software Developer's Manual: 3.4.2.1). */
226 if ( pCtxCore->cs.Attr.n.u1Long
227 && CPUMIsGuestInLongMode(pVCpu))
228 {
229 switch (SelReg)
230 {
231 case DISSELREG_FS:
232 case DISSELREG_GS:
233 return (RTGCPTR)(pSReg->u64Base + Addr);
234
235 default:
236 return Addr; /* base 0 */
237 }
238 }
239
240 /* AMD64 manual: compatibility mode ignores the high 32 bits when calculating an effective address. */
241 Assert(pSReg->u64Base <= 0xffffffff);
242 return (uint32_t)pSReg->u64Base + (uint32_t)Addr;
243}
244
245
246/**
247 * Converts a GC selector based address to a flat address.
248 *
249 * Some basic checking is done, but not all kinds yet.
250 *
251 * @returns VBox status
252 * @param pVCpu Pointer to the VMCPU.
253 * @param SelReg Selector register.
254 * @param pCtxCore CPU context.
255 * @param Addr Address part.
256 * @param fFlags SELMTOFLAT_FLAGS_*
257 * GDT entires are valid.
258 * @param ppvGC Where to store the GC flat address.
259 */
260VMMDECL(int) SELMToFlatEx(PVMCPU pVCpu, DISSELREG SelReg, PCPUMCTXCORE pCtxCore, RTGCPTR Addr, uint32_t fFlags, PRTGCPTR ppvGC)
261{
262 /*
263 * Fetch the selector first.
264 */
265 PCPUMSELREG pSReg;
266 int rc = DISFetchRegSegEx(pCtxCore, SelReg, &pSReg);
267 AssertRCReturn(rc, rc); AssertPtr(pSReg);
268
269 /*
270 * Deal with real & v86 mode first.
271 */
272 if ( pCtxCore->eflags.Bits.u1VM
273 || CPUMIsGuestInRealMode(pVCpu))
274 {
275 if (ppvGC)
276 {
277 uint32_t uFlat = (uint32_t)Addr & 0xffff;
278 if (CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, pSReg))
279 *ppvGC = (uint32_t)pSReg->u64Base + uFlat;
280 else
281 *ppvGC = ((uint32_t)pSReg->Sel << 4) + uFlat;
282 }
283 return VINF_SUCCESS;
284 }
285
286#ifdef VBOX_WITH_RAW_MODE_NOT_R0
287 if (!CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, pSReg))
288 CPUMGuestLazyLoadHiddenSelectorReg(pVCpu, pSReg);
289 if (!CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, &pCtxCore->cs))
290 CPUMGuestLazyLoadHiddenSelectorReg(pVCpu, &pCtxCore->cs);
291#else
292 Assert(CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, pSReg));
293 Assert(CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, &pCtxCore->cs));
294#endif
295
296 /* 64 bits mode: CS, DS, ES and SS are treated as if each segment base is 0
297 (Intel® 64 and IA-32 Architectures Software Developer's Manual: 3.4.2.1). */
298 RTGCPTR pvFlat;
299 bool fCheckLimit = true;
300 if ( pCtxCore->cs.Attr.n.u1Long
301 && CPUMIsGuestInLongMode(pVCpu))
302 {
303 fCheckLimit = false;
304 switch (SelReg)
305 {
306 case DISSELREG_FS:
307 case DISSELREG_GS:
308 pvFlat = pSReg->u64Base + Addr;
309 break;
310
311 default:
312 pvFlat = Addr;
313 break;
314 }
315 }
316 else
317 {
318 /* AMD64 manual: compatibility mode ignores the high 32 bits when calculating an effective address. */
319 Assert(pSReg->u64Base <= UINT32_C(0xffffffff));
320 pvFlat = (uint32_t)pSReg->u64Base + (uint32_t)Addr;
321 Assert(pvFlat <= UINT32_MAX);
322 }
323
324 /*
325 * Check type if present.
326 */
327 if (pSReg->Attr.n.u1Present)
328 {
329 switch (pSReg->Attr.n.u4Type)
330 {
331 /* Read only selector type. */
332 case X86_SEL_TYPE_RO:
333 case X86_SEL_TYPE_RO_ACC:
334 case X86_SEL_TYPE_RW:
335 case X86_SEL_TYPE_RW_ACC:
336 case X86_SEL_TYPE_EO:
337 case X86_SEL_TYPE_EO_ACC:
338 case X86_SEL_TYPE_ER:
339 case X86_SEL_TYPE_ER_ACC:
340 if (!(fFlags & SELMTOFLAT_FLAGS_NO_PL))
341 {
342 /** @todo fix this mess */
343 }
344 /* check limit. */
345 if (fCheckLimit && Addr > pSReg->u32Limit)
346 return VERR_OUT_OF_SELECTOR_BOUNDS;
347 /* ok */
348 if (ppvGC)
349 *ppvGC = pvFlat;
350 return VINF_SUCCESS;
351
352 case X86_SEL_TYPE_EO_CONF:
353 case X86_SEL_TYPE_EO_CONF_ACC:
354 case X86_SEL_TYPE_ER_CONF:
355 case X86_SEL_TYPE_ER_CONF_ACC:
356 if (!(fFlags & SELMTOFLAT_FLAGS_NO_PL))
357 {
358 /** @todo fix this mess */
359 }
360 /* check limit. */
361 if (fCheckLimit && Addr > pSReg->u32Limit)
362 return VERR_OUT_OF_SELECTOR_BOUNDS;
363 /* ok */
364 if (ppvGC)
365 *ppvGC = pvFlat;
366 return VINF_SUCCESS;
367
368 case X86_SEL_TYPE_RO_DOWN:
369 case X86_SEL_TYPE_RO_DOWN_ACC:
370 case X86_SEL_TYPE_RW_DOWN:
371 case X86_SEL_TYPE_RW_DOWN_ACC:
372 if (!(fFlags & SELMTOFLAT_FLAGS_NO_PL))
373 {
374 /** @todo fix this mess */
375 }
376 /* check limit. */
377 if (fCheckLimit)
378 {
379 if (!pSReg->Attr.n.u1Granularity && Addr > UINT32_C(0xffff))
380 return VERR_OUT_OF_SELECTOR_BOUNDS;
381 if (Addr <= pSReg->u32Limit)
382 return VERR_OUT_OF_SELECTOR_BOUNDS;
383 }
384 /* ok */
385 if (ppvGC)
386 *ppvGC = pvFlat;
387 return VINF_SUCCESS;
388
389 default:
390 return VERR_INVALID_SELECTOR;
391
392 }
393 }
394 return VERR_SELECTOR_NOT_PRESENT;
395}
396
397
398#ifdef VBOX_WITH_RAW_MODE_NOT_R0
399/**
400 * Converts a GC selector based address to a flat address.
401 *
402 * Some basic checking is done, but not all kinds yet.
403 *
404 * @returns VBox status
405 * @param pVCpu Pointer to the VMCPU.
406 * @param eflags Current eflags
407 * @param Sel Selector part.
408 * @param Addr Address part.
409 * @param fFlags SELMTOFLAT_FLAGS_*
410 * GDT entires are valid.
411 * @param ppvGC Where to store the GC flat address.
412 * @param pcb Where to store the bytes from *ppvGC which can be accessed according to
413 * the selector. NULL is allowed.
414 * @remarks Don't use when in long mode.
415 */
416VMMDECL(int) SELMToFlatBySelEx(PVMCPU pVCpu, X86EFLAGS eflags, RTSEL Sel, RTGCPTR Addr,
417 uint32_t fFlags, PRTGCPTR ppvGC, uint32_t *pcb)
418{
419 Assert(!CPUMIsGuestInLongMode(pVCpu)); /* DON'T USE! (Accessing shadow GDT/LDT.) */
420 Assert(!HMIsEnabled(pVCpu->CTX_SUFF(pVM)));
421
422 /*
423 * Deal with real & v86 mode first.
424 */
425 if ( eflags.Bits.u1VM
426 || CPUMIsGuestInRealMode(pVCpu))
427 {
428 RTGCUINTPTR uFlat = (RTGCUINTPTR)Addr & 0xffff;
429 if (ppvGC)
430 *ppvGC = ((RTGCUINTPTR)Sel << 4) + uFlat;
431 if (pcb)
432 *pcb = 0x10000 - uFlat;
433 return VINF_SUCCESS;
434 }
435
436 /** @todo when we're in 16 bits mode, we should cut off the address as well?? */
437 X86DESC Desc;
438 PVM pVM = pVCpu->CTX_SUFF(pVM);
439 if (!(Sel & X86_SEL_LDT))
440 {
441 if ( !(fFlags & SELMTOFLAT_FLAGS_HYPER)
442 && (Sel | X86_SEL_RPL_LDT) > pVM->selm.s.GuestGdtr.cbGdt)
443 return VERR_INVALID_SELECTOR;
444 Desc = pVM->selm.s.CTX_SUFF(paGdt)[Sel >> X86_SEL_SHIFT];
445 }
446 else
447 {
448 if ((Sel | X86_SEL_RPL_LDT) > pVM->selm.s.cbLdtLimit)
449 return VERR_INVALID_SELECTOR;
450
451 /** @todo handle LDT page(s) not present! */
452 PX86DESC paLDT = (PX86DESC)((char *)pVM->selm.s.CTX_SUFF(pvLdt) + pVM->selm.s.offLdtHyper);
453 Desc = paLDT[Sel >> X86_SEL_SHIFT];
454 }
455
456 /* calc limit. */
457 uint32_t u32Limit = X86DESC_LIMIT_G(&Desc);
458
459 /* calc address assuming straight stuff. */
460 RTGCPTR pvFlat = Addr + X86DESC_BASE(&Desc);
461
462 /* Cut the address to 32 bits. */
463 Assert(!CPUMIsGuestInLongMode(pVCpu));
464 pvFlat &= 0xffffffff;
465
466 uint8_t u1Present = Desc.Gen.u1Present;
467 uint8_t u1Granularity = Desc.Gen.u1Granularity;
468 uint8_t u1DescType = Desc.Gen.u1DescType;
469 uint8_t u4Type = Desc.Gen.u4Type;
470
471 /*
472 * Check if present.
473 */
474 if (u1Present)
475 {
476 /*
477 * Type check.
478 */
479#define BOTH(a, b) ((a << 16) | b)
480 switch (BOTH(u1DescType, u4Type))
481 {
482
483 /** Read only selector type. */
484 case BOTH(1,X86_SEL_TYPE_RO):
485 case BOTH(1,X86_SEL_TYPE_RO_ACC):
486 case BOTH(1,X86_SEL_TYPE_RW):
487 case BOTH(1,X86_SEL_TYPE_RW_ACC):
488 case BOTH(1,X86_SEL_TYPE_EO):
489 case BOTH(1,X86_SEL_TYPE_EO_ACC):
490 case BOTH(1,X86_SEL_TYPE_ER):
491 case BOTH(1,X86_SEL_TYPE_ER_ACC):
492 if (!(fFlags & SELMTOFLAT_FLAGS_NO_PL))
493 {
494 /** @todo fix this mess */
495 }
496 /* check limit. */
497 if ((RTGCUINTPTR)Addr > u32Limit)
498 return VERR_OUT_OF_SELECTOR_BOUNDS;
499 /* ok */
500 if (ppvGC)
501 *ppvGC = pvFlat;
502 if (pcb)
503 *pcb = u32Limit - (uint32_t)Addr + 1;
504 return VINF_SUCCESS;
505
506 case BOTH(1,X86_SEL_TYPE_EO_CONF):
507 case BOTH(1,X86_SEL_TYPE_EO_CONF_ACC):
508 case BOTH(1,X86_SEL_TYPE_ER_CONF):
509 case BOTH(1,X86_SEL_TYPE_ER_CONF_ACC):
510 if (!(fFlags & SELMTOFLAT_FLAGS_NO_PL))
511 {
512 /** @todo fix this mess */
513 }
514 /* check limit. */
515 if ((RTGCUINTPTR)Addr > u32Limit)
516 return VERR_OUT_OF_SELECTOR_BOUNDS;
517 /* ok */
518 if (ppvGC)
519 *ppvGC = pvFlat;
520 if (pcb)
521 *pcb = u32Limit - (uint32_t)Addr + 1;
522 return VINF_SUCCESS;
523
524 case BOTH(1,X86_SEL_TYPE_RO_DOWN):
525 case BOTH(1,X86_SEL_TYPE_RO_DOWN_ACC):
526 case BOTH(1,X86_SEL_TYPE_RW_DOWN):
527 case BOTH(1,X86_SEL_TYPE_RW_DOWN_ACC):
528 if (!(fFlags & SELMTOFLAT_FLAGS_NO_PL))
529 {
530 /** @todo fix this mess */
531 }
532 /* check limit. */
533 if (!u1Granularity && (RTGCUINTPTR)Addr > (RTGCUINTPTR)0xffff)
534 return VERR_OUT_OF_SELECTOR_BOUNDS;
535 if ((RTGCUINTPTR)Addr <= u32Limit)
536 return VERR_OUT_OF_SELECTOR_BOUNDS;
537
538 /* ok */
539 if (ppvGC)
540 *ppvGC = pvFlat;
541 if (pcb)
542 *pcb = (RTGCUINTPTR)(u1Granularity ? 0xffffffff : 0xffff) - (RTGCUINTPTR)Addr + 1;
543 return VINF_SUCCESS;
544
545 case BOTH(0,X86_SEL_TYPE_SYS_286_TSS_AVAIL):
546 case BOTH(0,X86_SEL_TYPE_SYS_LDT):
547 case BOTH(0,X86_SEL_TYPE_SYS_286_TSS_BUSY):
548 case BOTH(0,X86_SEL_TYPE_SYS_286_CALL_GATE):
549 case BOTH(0,X86_SEL_TYPE_SYS_TASK_GATE):
550 case BOTH(0,X86_SEL_TYPE_SYS_286_INT_GATE):
551 case BOTH(0,X86_SEL_TYPE_SYS_286_TRAP_GATE):
552 case BOTH(0,X86_SEL_TYPE_SYS_386_TSS_AVAIL):
553 case BOTH(0,X86_SEL_TYPE_SYS_386_TSS_BUSY):
554 case BOTH(0,X86_SEL_TYPE_SYS_386_CALL_GATE):
555 case BOTH(0,X86_SEL_TYPE_SYS_386_INT_GATE):
556 case BOTH(0,X86_SEL_TYPE_SYS_386_TRAP_GATE):
557 if (!(fFlags & SELMTOFLAT_FLAGS_NO_PL))
558 {
559 /** @todo fix this mess */
560 }
561 /* check limit. */
562 if ((RTGCUINTPTR)Addr > u32Limit)
563 return VERR_OUT_OF_SELECTOR_BOUNDS;
564 /* ok */
565 if (ppvGC)
566 *ppvGC = pvFlat;
567 if (pcb)
568 *pcb = 0xffffffff - (RTGCUINTPTR)pvFlat + 1; /* Depends on the type.. fixme if we care. */
569 return VINF_SUCCESS;
570
571 default:
572 return VERR_INVALID_SELECTOR;
573
574 }
575#undef BOTH
576 }
577 return VERR_SELECTOR_NOT_PRESENT;
578}
579#endif /* VBOX_WITH_RAW_MODE_NOT_R0 */
580
581
582#ifdef VBOX_WITH_RAW_MODE_NOT_R0
583
584static void selLoadHiddenSelectorRegFromGuestTable(PVMCPU pVCpu, PCCPUMCTX pCtx, PCPUMSELREG pSReg,
585 RTGCPTR GCPtrDesc, RTSEL const Sel, uint32_t const iSReg)
586{
587 Assert(!HMIsEnabled(pVCpu->CTX_SUFF(pVM)));
588
589 /*
590 * Try read the entry.
591 */
592 X86DESC GstDesc;
593 int rc = PGMPhysReadGCPtr(pVCpu, &GstDesc, GCPtrDesc, sizeof(GstDesc), PGMACCESSORIGIN_IOM);
594 if (RT_FAILURE(rc))
595 {
596 Log(("SELMLoadHiddenSelectorReg: Error reading descriptor %s=%#x: %Rrc\n", g_aszSRegNms[iSReg], Sel, rc));
597 STAM_REL_COUNTER_INC(&pVCpu->CTX_SUFF(pVM)->selm.s.StatLoadHidSelReadErrors);
598 return;
599 }
600
601 /*
602 * Validate it and load it.
603 */
604 if (!selmIsGstDescGoodForSReg(pVCpu, pSReg, &GstDesc, iSReg, CPUMGetGuestCPL(pVCpu)))
605 {
606 Log(("SELMLoadHiddenSelectorReg: Guest table entry is no good (%s=%#x): %.8Rhxs\n", g_aszSRegNms[iSReg], Sel, &GstDesc));
607 STAM_REL_COUNTER_INC(&pVCpu->CTX_SUFF(pVM)->selm.s.StatLoadHidSelGstNoGood);
608 return;
609 }
610
611 selmLoadHiddenSRegFromGuestDesc(pVCpu, pSReg, &GstDesc);
612 Log(("SELMLoadHiddenSelectorReg: loaded %s=%#x:{b=%llx, l=%x, a=%x, vs=%x} (gst)\n",
613 g_aszSRegNms[iSReg], Sel, pSReg->u64Base, pSReg->u32Limit, pSReg->Attr.u, pSReg->ValidSel));
614 STAM_COUNTER_INC(&pVCpu->CTX_SUFF(pVM)->selm.s.StatLoadHidSelGst);
615}
616
617
618/**
619 * CPUM helper that loads the hidden selector register from the descriptor table
620 * when executing with raw-mode.
621 *
622 * @remarks This is only used when in legacy protected mode!
623 *
624 * @param pVCpu Pointer to the current virtual CPU.
625 * @param pCtx The guest CPU context.
626 * @param pSReg The selector register.
627 *
628 * @todo Deal 100% correctly with stale selectors. What's more evil is
629 * invalid page table entries, which isn't impossible to imagine for
630 * LDT entries for instance, though unlikely. Currently, we turn a
631 * blind eye to these issues and return the old hidden registers,
632 * though we don't set the valid flag, so that we'll try loading them
633 * over and over again till we succeed loading something.
634 */
635VMM_INT_DECL(void) SELMLoadHiddenSelectorReg(PVMCPU pVCpu, PCCPUMCTX pCtx, PCPUMSELREG pSReg)
636{
637 Assert(pCtx->cr0 & X86_CR0_PE);
638 Assert(!(pCtx->msrEFER & MSR_K6_EFER_LMA));
639
640 PVM pVM = pVCpu->CTX_SUFF(pVM);
641 Assert(pVM->cCpus == 1);
642 Assert(!HMIsEnabled(pVM));
643
644
645 /*
646 * Get the shadow descriptor table entry and validate it.
647 * Should something go amiss, try the guest table.
648 */
649 RTSEL const Sel = pSReg->Sel;
650 uint32_t const iSReg = pSReg - CPUMCTX_FIRST_SREG(pCtx); Assert(iSReg < X86_SREG_COUNT);
651 PCX86DESC pShwDesc;
652 if (!(Sel & X86_SEL_LDT))
653 {
654 /** @todo this shall not happen, we shall check for these things when executing
655 * LGDT */
656 AssertReturnVoid((Sel | X86_SEL_RPL | X86_SEL_LDT) <= pCtx->gdtr.cbGdt);
657
658 pShwDesc = &pVM->selm.s.CTX_SUFF(paGdt)[Sel >> X86_SEL_SHIFT];
659 if ( VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_SELM_SYNC_GDT)
660 || !selmIsShwDescGoodForSReg(pSReg, pShwDesc, iSReg, CPUMGetGuestCPL(pVCpu)))
661 {
662 selLoadHiddenSelectorRegFromGuestTable(pVCpu, pCtx, pSReg, pCtx->gdtr.pGdt + (Sel & X86_SEL_MASK), Sel, iSReg);
663 return;
664 }
665 }
666 else
667 {
668 /** @todo this shall not happen, we shall check for these things when executing
669 * LLDT */
670 AssertReturnVoid((Sel | X86_SEL_RPL | X86_SEL_LDT) <= pCtx->ldtr.u32Limit);
671
672 pShwDesc = (PCX86DESC)((uintptr_t)pVM->selm.s.CTX_SUFF(pvLdt) + pVM->selm.s.offLdtHyper + (Sel & X86_SEL_MASK));
673 if ( VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_SELM_SYNC_LDT)
674 || !selmIsShwDescGoodForSReg(pSReg, pShwDesc, iSReg, CPUMGetGuestCPL(pVCpu)))
675 {
676 selLoadHiddenSelectorRegFromGuestTable(pVCpu, pCtx, pSReg, pCtx->ldtr.u64Base + (Sel & X86_SEL_MASK), Sel, iSReg);
677 return;
678 }
679 }
680
681 /*
682 * All fine, load it.
683 */
684 selmLoadHiddenSRegFromShadowDesc(pSReg, pShwDesc);
685 STAM_COUNTER_INC(&pVCpu->CTX_SUFF(pVM)->selm.s.StatLoadHidSelShw);
686 Log(("SELMLoadHiddenSelectorReg: loaded %s=%#x:{b=%llx, l=%x, a=%x, vs=%x} (shw)\n",
687 g_aszSRegNms[iSReg], Sel, pSReg->u64Base, pSReg->u32Limit, pSReg->Attr.u, pSReg->ValidSel));
688}
689
690#endif /* VBOX_WITH_RAW_MODE_NOT_R0 */
691
692/**
693 * Validates and converts a GC selector based code address to a flat
694 * address when in real or v8086 mode.
695 *
696 * @returns VINF_SUCCESS.
697 * @param pVCpu Pointer to the VMCPU.
698 * @param SelCS Selector part.
699 * @param pHidCS The hidden CS register part. Optional.
700 * @param Addr Address part.
701 * @param ppvFlat Where to store the flat address.
702 */
703DECLINLINE(int) selmValidateAndConvertCSAddrRealMode(PVMCPU pVCpu, RTSEL SelCS, PCCPUMSELREGHID pSReg, RTGCPTR Addr,
704 PRTGCPTR ppvFlat)
705{
706 NOREF(pVCpu);
707 uint32_t uFlat = Addr & 0xffff;
708 if (!pSReg || !CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, pSReg))
709 uFlat += (uint32_t)SelCS << 4;
710 else
711 uFlat += (uint32_t)pSReg->u64Base;
712 *ppvFlat = uFlat;
713 return VINF_SUCCESS;
714}
715
716
717#ifdef VBOX_WITH_RAW_MODE_NOT_R0
718/**
719 * Validates and converts a GC selector based code address to a flat address
720 * when in protected/long mode using the raw-mode algorithm.
721 *
722 * @returns VBox status code.
723 * @param pVM Pointer to the VM.
724 * @param pVCpu Pointer to the VMCPU.
725 * @param SelCPL Current privilege level. Get this from SS - CS might be
726 * conforming! A full selector can be passed, we'll only
727 * use the RPL part.
728 * @param SelCS Selector part.
729 * @param Addr Address part.
730 * @param ppvFlat Where to store the flat address.
731 * @param pcBits Where to store the segment bitness (16/32/64). Optional.
732 */
733DECLINLINE(int) selmValidateAndConvertCSAddrRawMode(PVM pVM, PVMCPU pVCpu, RTSEL SelCPL, RTSEL SelCS, RTGCPTR Addr,
734 PRTGCPTR ppvFlat, uint32_t *pcBits)
735{
736 NOREF(pVCpu);
737 Assert(!HMIsEnabled(pVM));
738
739 /** @todo validate limit! */
740 X86DESC Desc;
741 if (!(SelCS & X86_SEL_LDT))
742 Desc = pVM->selm.s.CTX_SUFF(paGdt)[SelCS >> X86_SEL_SHIFT];
743 else
744 {
745 /** @todo handle LDT page(s) not present! */
746 PX86DESC paLDT = (PX86DESC)((char *)pVM->selm.s.CTX_SUFF(pvLdt) + pVM->selm.s.offLdtHyper);
747 Desc = paLDT[SelCS >> X86_SEL_SHIFT];
748 }
749
750 /*
751 * Check if present.
752 */
753 if (Desc.Gen.u1Present)
754 {
755 /*
756 * Type check.
757 */
758 if ( Desc.Gen.u1DescType == 1
759 && (Desc.Gen.u4Type & X86_SEL_TYPE_CODE))
760 {
761 /*
762 * Check level.
763 */
764 unsigned uLevel = RT_MAX(SelCPL & X86_SEL_RPL, SelCS & X86_SEL_RPL);
765 if ( !(Desc.Gen.u4Type & X86_SEL_TYPE_CONF)
766 ? uLevel <= Desc.Gen.u2Dpl
767 : uLevel >= Desc.Gen.u2Dpl /* hope I got this right now... */
768 )
769 {
770 /*
771 * Limit check.
772 */
773 uint32_t u32Limit = X86DESC_LIMIT_G(&Desc);
774 if ((RTGCUINTPTR)Addr <= u32Limit)
775 {
776 *ppvFlat = (RTGCPTR)((RTGCUINTPTR)Addr + X86DESC_BASE(&Desc));
777 /* Cut the address to 32 bits. */
778 *ppvFlat &= 0xffffffff;
779
780 if (pcBits)
781 *pcBits = Desc.Gen.u1DefBig ? 32 : 16; /** @todo GUEST64 */
782 return VINF_SUCCESS;
783 }
784 return VERR_OUT_OF_SELECTOR_BOUNDS;
785 }
786 return VERR_INVALID_RPL;
787 }
788 return VERR_NOT_CODE_SELECTOR;
789 }
790 return VERR_SELECTOR_NOT_PRESENT;
791}
792#endif /* VBOX_WITH_RAW_MODE_NOT_R0 */
793
794
795/**
796 * Validates and converts a GC selector based code address to a flat address
797 * when in protected/long mode using the standard hidden selector registers
798 *
799 * @returns VBox status code.
800 * @param pVCpu Pointer to the VMCPU.
801 * @param SelCPL Current privilege level. Get this from SS - CS might be
802 * conforming! A full selector can be passed, we'll only
803 * use the RPL part.
804 * @param SelCS Selector part.
805 * @param pSRegCS The full CS selector register.
806 * @param Addr The address (think IP/EIP/RIP).
807 * @param ppvFlat Where to store the flat address upon successful return.
808 */
809DECLINLINE(int) selmValidateAndConvertCSAddrHidden(PVMCPU pVCpu, RTSEL SelCPL, RTSEL SelCS, PCCPUMSELREGHID pSRegCS,
810 RTGCPTR Addr, PRTGCPTR ppvFlat)
811{
812 /*
813 * Check if present.
814 */
815 if (pSRegCS->Attr.n.u1Present)
816 {
817 /*
818 * Type check.
819 */
820 if ( pSRegCS->Attr.n.u1DescType == 1
821 && (pSRegCS->Attr.n.u4Type & X86_SEL_TYPE_CODE))
822 {
823 /* 64 bits mode: CS, DS, ES and SS are treated as if each segment base is 0
824 (Intel® 64 and IA-32 Architectures Software Developer's Manual: 3.4.2.1). */
825 if ( pSRegCS->Attr.n.u1Long
826 && CPUMIsGuestInLongMode(pVCpu))
827 {
828 *ppvFlat = Addr;
829 return VINF_SUCCESS;
830 }
831
832 /*
833 * Limit check. Note that the limit in the hidden register is the
834 * final value. The granularity bit was included in its calculation.
835 */
836 uint32_t u32Limit = pSRegCS->u32Limit;
837 if ((uint32_t)Addr <= u32Limit)
838 {
839 *ppvFlat = (uint32_t)Addr + (uint32_t)pSRegCS->u64Base;
840 return VINF_SUCCESS;
841 }
842
843 return VERR_OUT_OF_SELECTOR_BOUNDS;
844 }
845 return VERR_NOT_CODE_SELECTOR;
846 }
847 return VERR_SELECTOR_NOT_PRESENT;
848}
849
850
851/**
852 * Validates and converts a GC selector based code address to a flat address.
853 *
854 * @returns VBox status code.
855 * @param pVCpu Pointer to the VMCPU.
856 * @param Efl Current EFLAGS.
857 * @param SelCPL Current privilege level. Get this from SS - CS might be
858 * conforming! A full selector can be passed, we'll only
859 * use the RPL part.
860 * @param SelCS Selector part.
861 * @param pSRegCS The full CS selector register.
862 * @param Addr The address (think IP/EIP/RIP).
863 * @param ppvFlat Where to store the flat address upon successful return.
864 */
865VMMDECL(int) SELMValidateAndConvertCSAddr(PVMCPU pVCpu, X86EFLAGS Efl, RTSEL SelCPL, RTSEL SelCS, PCPUMSELREG pSRegCS,
866 RTGCPTR Addr, PRTGCPTR ppvFlat)
867{
868 if ( Efl.Bits.u1VM
869 || CPUMIsGuestInRealMode(pVCpu))
870 return selmValidateAndConvertCSAddrRealMode(pVCpu, SelCS, pSRegCS, Addr, ppvFlat);
871
872#ifdef VBOX_WITH_RAW_MODE_NOT_R0
873 /* Use the hidden registers when possible, updating them if outdate. */
874 if (!pSRegCS)
875 return selmValidateAndConvertCSAddrRawMode(pVCpu->CTX_SUFF(pVM), pVCpu, SelCPL, SelCS, Addr, ppvFlat, NULL);
876
877 if (!CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, pSRegCS))
878 CPUMGuestLazyLoadHiddenSelectorReg(pVCpu, pSRegCS);
879
880 /* Undo ring compression. */
881 if ((SelCPL & X86_SEL_RPL) == 1 && !HMIsEnabled(pVCpu->CTX_SUFF(pVM)))
882 SelCPL &= ~X86_SEL_RPL;
883 Assert(pSRegCS->Sel == SelCS);
884 if ((SelCS & X86_SEL_RPL) == 1 && !HMIsEnabled(pVCpu->CTX_SUFF(pVM)))
885 SelCS &= ~X86_SEL_RPL;
886#else
887 Assert(CPUMSELREG_ARE_HIDDEN_PARTS_VALID(pVCpu, pSRegCS));
888 Assert(pSRegCS->Sel == SelCS);
889#endif
890
891 return selmValidateAndConvertCSAddrHidden(pVCpu, SelCPL, SelCS, pSRegCS, Addr, ppvFlat);
892}
893
894
895/**
896 * Returns Hypervisor's Trap 08 (\#DF) selector.
897 *
898 * @returns Hypervisor's Trap 08 (\#DF) selector.
899 * @param pVM Pointer to the VM.
900 */
901VMMDECL(RTSEL) SELMGetTrap8Selector(PVM pVM)
902{
903 return pVM->selm.s.aHyperSel[SELM_HYPER_SEL_TSS_TRAP08];
904}
905
906
907/**
908 * Sets EIP of Hypervisor's Trap 08 (\#DF) TSS.
909 *
910 * @param pVM Pointer to the VM.
911 * @param u32EIP EIP of Trap 08 handler.
912 */
913VMMDECL(void) SELMSetTrap8EIP(PVM pVM, uint32_t u32EIP)
914{
915 pVM->selm.s.TssTrap08.eip = u32EIP;
916}
917
918
919/**
920 * Sets ss:esp for ring1 in main Hypervisor's TSS.
921 *
922 * @param pVM Pointer to the VM.
923 * @param ss Ring1 SS register value. Pass 0 if invalid.
924 * @param esp Ring1 ESP register value.
925 */
926void selmSetRing1Stack(PVM pVM, uint32_t ss, RTGCPTR32 esp)
927{
928 Assert(!HMIsEnabled(pVM));
929 Assert((ss & 1) || esp == 0);
930 pVM->selm.s.Tss.ss1 = ss;
931 pVM->selm.s.Tss.esp1 = (uint32_t)esp;
932}
933
934
935#ifdef VBOX_WITH_RAW_RING1
936/**
937 * Sets ss:esp for ring1 in main Hypervisor's TSS.
938 *
939 * @param pVM Pointer to the VM.
940 * @param ss Ring2 SS register value. Pass 0 if invalid.
941 * @param esp Ring2 ESP register value.
942 */
943void selmSetRing2Stack(PVM pVM, uint32_t ss, RTGCPTR32 esp)
944{
945 Assert(!HMIsEnabled(pVM));
946 Assert((ss & 3) == 2 || esp == 0);
947 pVM->selm.s.Tss.ss2 = ss;
948 pVM->selm.s.Tss.esp2 = (uint32_t)esp;
949}
950#endif
951
952
953#ifdef VBOX_WITH_RAW_MODE_NOT_R0
954/**
955 * Gets ss:esp for ring1 in main Hypervisor's TSS.
956 *
957 * Returns SS=0 if the ring-1 stack isn't valid.
958 *
959 * @returns VBox status code.
960 * @param pVM Pointer to the VM.
961 * @param pSS Ring1 SS register value.
962 * @param pEsp Ring1 ESP register value.
963 */
964VMMDECL(int) SELMGetRing1Stack(PVM pVM, uint32_t *pSS, PRTGCPTR32 pEsp)
965{
966 Assert(!HMIsEnabled(pVM));
967 Assert(pVM->cCpus == 1);
968 PVMCPU pVCpu = &pVM->aCpus[0];
969
970#ifdef SELM_TRACK_GUEST_TSS_CHANGES
971 if (pVM->selm.s.fSyncTSSRing0Stack)
972 {
973#endif
974 RTGCPTR GCPtrTss = pVM->selm.s.GCPtrGuestTss;
975 int rc;
976 VBOXTSS tss;
977
978 Assert(pVM->selm.s.GCPtrGuestTss && pVM->selm.s.cbMonitoredGuestTss);
979
980# ifdef IN_RC
981 bool fTriedAlready = false;
982
983l_tryagain:
984 PVBOXTSS pTss = (PVBOXTSS)(uintptr_t)GCPtrTss;
985 rc = MMGCRamRead(pVM, &tss.ss0, &pTss->ss0, sizeof(tss.ss0));
986 rc |= MMGCRamRead(pVM, &tss.esp0, &pTss->esp0, sizeof(tss.esp0));
987# ifdef DEBUG
988 rc |= MMGCRamRead(pVM, &tss.offIoBitmap, &pTss->offIoBitmap, sizeof(tss.offIoBitmap));
989# endif
990
991 if (RT_FAILURE(rc))
992 {
993 if (!fTriedAlready)
994 {
995 /* Shadow page might be out of sync. Sync and try again */
996 /** @todo might cross page boundary */
997 fTriedAlready = true;
998 rc = PGMPrefetchPage(pVCpu, (RTGCPTR)GCPtrTss);
999 if (rc != VINF_SUCCESS)
1000 return rc;
1001 goto l_tryagain;
1002 }
1003 AssertMsgFailed(("Unable to read TSS structure at %08X\n", GCPtrTss));
1004 return rc;
1005 }
1006
1007# else /* !IN_RC */
1008 /* Reading too much. Could be cheaper than two separate calls though. */
1009 rc = PGMPhysSimpleReadGCPtr(pVCpu, &tss, GCPtrTss, sizeof(VBOXTSS));
1010 if (RT_FAILURE(rc))
1011 {
1012 AssertReleaseMsgFailed(("Unable to read TSS structure at %08X\n", GCPtrTss));
1013 return rc;
1014 }
1015# endif /* !IN_RC */
1016
1017# ifdef LOG_ENABLED
1018 uint32_t ssr0 = pVM->selm.s.Tss.ss1;
1019 uint32_t espr0 = pVM->selm.s.Tss.esp1;
1020 ssr0 &= ~1;
1021
1022 if (ssr0 != tss.ss0 || espr0 != tss.esp0)
1023 Log(("SELMGetRing1Stack: Updating TSS ring 0 stack to %04X:%08X\n", tss.ss0, tss.esp0));
1024
1025 Log(("offIoBitmap=%#x\n", tss.offIoBitmap));
1026# endif
1027 /* Update our TSS structure for the guest's ring 1 stack */
1028 selmSetRing1Stack(pVM, tss.ss0 | 1, (RTGCPTR32)tss.esp0);
1029 pVM->selm.s.fSyncTSSRing0Stack = false;
1030#ifdef SELM_TRACK_GUEST_TSS_CHANGES
1031 }
1032#endif
1033
1034 *pSS = pVM->selm.s.Tss.ss1;
1035 *pEsp = (RTGCPTR32)pVM->selm.s.Tss.esp1;
1036
1037 return VINF_SUCCESS;
1038}
1039#endif /* VBOX_WITH_RAW_MODE_NOT_R0 */
1040
1041
1042#if defined(VBOX_WITH_RAW_MODE) || (HC_ARCH_BITS != 64 && !defined(VBOX_WITH_HYBRID_32BIT_KERNEL))
1043
1044/**
1045 * Gets the hypervisor code selector (CS).
1046 * @returns CS selector.
1047 * @param pVM Pointer to the VM.
1048 */
1049VMMDECL(RTSEL) SELMGetHyperCS(PVM pVM)
1050{
1051 return pVM->selm.s.aHyperSel[SELM_HYPER_SEL_CS];
1052}
1053
1054
1055/**
1056 * Gets the 64-mode hypervisor code selector (CS64).
1057 * @returns CS selector.
1058 * @param pVM Pointer to the VM.
1059 */
1060VMMDECL(RTSEL) SELMGetHyperCS64(PVM pVM)
1061{
1062 return pVM->selm.s.aHyperSel[SELM_HYPER_SEL_CS64];
1063}
1064
1065
1066/**
1067 * Gets the hypervisor data selector (DS).
1068 * @returns DS selector.
1069 * @param pVM Pointer to the VM.
1070 */
1071VMMDECL(RTSEL) SELMGetHyperDS(PVM pVM)
1072{
1073 return pVM->selm.s.aHyperSel[SELM_HYPER_SEL_DS];
1074}
1075
1076
1077/**
1078 * Gets the hypervisor TSS selector.
1079 * @returns TSS selector.
1080 * @param pVM Pointer to the VM.
1081 */
1082VMMDECL(RTSEL) SELMGetHyperTSS(PVM pVM)
1083{
1084 return pVM->selm.s.aHyperSel[SELM_HYPER_SEL_TSS];
1085}
1086
1087
1088/**
1089 * Gets the hypervisor TSS Trap 8 selector.
1090 * @returns TSS Trap 8 selector.
1091 * @param pVM Pointer to the VM.
1092 */
1093VMMDECL(RTSEL) SELMGetHyperTSSTrap08(PVM pVM)
1094{
1095 return pVM->selm.s.aHyperSel[SELM_HYPER_SEL_TSS_TRAP08];
1096}
1097
1098/**
1099 * Gets the address for the hypervisor GDT.
1100 *
1101 * @returns The GDT address.
1102 * @param pVM Pointer to the VM.
1103 * @remark This is intended only for very special use, like in the world
1104 * switchers. Don't exploit this API!
1105 */
1106VMMDECL(RTRCPTR) SELMGetHyperGDT(PVM pVM)
1107{
1108 /*
1109 * Always convert this from the HC pointer since we can be
1110 * called before the first relocation and have to work correctly
1111 * without having dependencies on the relocation order.
1112 */
1113 return (RTRCPTR)MMHyperR3ToRC(pVM, pVM->selm.s.paGdtR3);
1114}
1115
1116#endif /* defined(VBOX_WITH_RAW_MODE) || (HC_ARCH_BITS != 64 && !defined(VBOX_WITH_HYBRID_32BIT_KERNEL)) */
1117
1118/**
1119 * Gets info about the current TSS.
1120 *
1121 * @returns VBox status code.
1122 * @retval VINF_SUCCESS if we've got a TSS loaded.
1123 * @retval VERR_SELM_NO_TSS if we haven't got a TSS (rather unlikely).
1124 *
1125 * @param pVM Pointer to the VM.
1126 * @param pVCpu Pointer to the VMCPU.
1127 * @param pGCPtrTss Where to store the TSS address.
1128 * @param pcbTss Where to store the TSS size limit.
1129 * @param pfCanHaveIOBitmap Where to store the can-have-I/O-bitmap indicator. (optional)
1130 */
1131VMMDECL(int) SELMGetTSSInfo(PVM pVM, PVMCPU pVCpu, PRTGCUINTPTR pGCPtrTss, PRTGCUINTPTR pcbTss, bool *pfCanHaveIOBitmap)
1132{
1133 NOREF(pVM);
1134
1135 /*
1136 * The TR hidden register is always valid.
1137 */
1138 CPUMSELREGHID trHid;
1139 RTSEL tr = CPUMGetGuestTR(pVCpu, &trHid);
1140 if (!(tr & X86_SEL_MASK_OFF_RPL))
1141 return VERR_SELM_NO_TSS;
1142
1143 *pGCPtrTss = trHid.u64Base;
1144 *pcbTss = trHid.u32Limit + (trHid.u32Limit != UINT32_MAX); /* be careful. */
1145 if (pfCanHaveIOBitmap)
1146 *pfCanHaveIOBitmap = trHid.Attr.n.u4Type == X86_SEL_TYPE_SYS_386_TSS_AVAIL
1147 || trHid.Attr.n.u4Type == X86_SEL_TYPE_SYS_386_TSS_BUSY;
1148 return VINF_SUCCESS;
1149}
1150
1151
1152
1153/**
1154 * Notification callback which is called whenever there is a chance that a CR3
1155 * value might have changed.
1156 * This is called by PGM.
1157 *
1158 * @param pVM Pointer to the VM.
1159 * @param pVCpu Pointer to the VMCPU.
1160 */
1161VMMDECL(void) SELMShadowCR3Changed(PVM pVM, PVMCPU pVCpu)
1162{
1163 /** @todo SMP support!! (64-bit guest scenario, primarily) */
1164 pVM->selm.s.Tss.cr3 = PGMGetHyperCR3(pVCpu);
1165 pVM->selm.s.TssTrap08.cr3 = PGMGetInterRCCR3(pVM, pVCpu);
1166}
1167
Note: See TracBrowser for help on using the repository browser.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette