VirtualBox

source: vbox/trunk/src/VBox/VMM/VMMRC/CSAMRC.cpp@ 49966

Last change on this file since 49966 was 45620, checked in by vboxsync, 12 years ago

CSAM,PATM: Don't bother initializing anything if HMIsEnabled(). Also, don't allow the components to be enabled.

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id Revision
File size: 5.3 KB
Line 
1/* $Id: CSAMRC.cpp 45620 2013-04-18 20:07:14Z vboxsync $ */
2/** @file
3 * CSAM - Guest OS Code Scanning and Analysis Manager - Any Context
4 */
5
6/*
7 * Copyright (C) 2006-2013 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17
18
19/*******************************************************************************
20* Header Files *
21*******************************************************************************/
22#define LOG_GROUP LOG_GROUP_CSAM
23#include <VBox/vmm/cpum.h>
24#include <VBox/vmm/stam.h>
25#include <VBox/vmm/patm.h>
26#include <VBox/vmm/csam.h>
27#include <VBox/vmm/pgm.h>
28#include <VBox/vmm/mm.h>
29#include <VBox/sup.h>
30#include <VBox/vmm/mm.h>
31#ifdef VBOX_WITH_REM
32# include <VBox/vmm/rem.h>
33#endif
34#include <VBox/param.h>
35#include <iprt/avl.h>
36#include "CSAMInternal.h"
37#include <VBox/vmm/vm.h>
38#include <VBox/dbg.h>
39#include <VBox/err.h>
40#include <VBox/log.h>
41#include <iprt/assert.h>
42#include <VBox/dis.h>
43#include <VBox/disopcode.h>
44#include <iprt/asm.h>
45#include <iprt/asm-amd64-x86.h>
46#include <iprt/string.h>
47
48/**
49 * \#PF Handler callback for virtual access handler ranges. (CSAM self-modifying
50 * code monitor)
51 *
52 * Important to realize that a physical page in a range can have aliases, and
53 * for ALL and WRITE handlers these will also trigger.
54 *
55 * @returns VBox status code (appropriate for GC return).
56 * @param pVM Pointer to the VM.
57 * @param uErrorCode CPU Error code.
58 * @param pRegFrame Trap register frame.
59 * @param pvFault The fault address (cr2).
60 * @param pvRange The base address of the handled virtual range.
61 * @param offRange The offset of the access into this range.
62 * (If it's a EIP range this is the EIP, if not it's pvFault.)
63 */
64VMMRCDECL(int) CSAMGCCodePageWriteHandler(PVM pVM, RTGCUINT uErrorCode, PCPUMCTXCORE pRegFrame, RTGCPTR pvFault, RTGCPTR pvRange, uintptr_t offRange)
65{
66 PPATMGCSTATE pPATMGCState;
67 bool fPatchCode = PATMIsPatchGCAddr(pVM, pRegFrame->eip);
68 int rc;
69 PVMCPU pVCpu = VMMGetCpu0(pVM);
70 NOREF(uErrorCode);
71
72 Assert(pVM->csam.s.cDirtyPages < CSAM_MAX_DIRTY_PAGES);
73
74#ifdef VBOX_WITH_REM
75 /* Flush the recompilers translation block cache as the guest seems to be modifying instructions. */
76 REMFlushTBs(pVM);
77#endif
78
79 pPATMGCState = PATMGetGCState(pVM);
80 Assert(pPATMGCState);
81
82 Assert(pPATMGCState->fPIF || fPatchCode);
83 /** When patch code is executing instructions that must complete, then we must *never* interrupt it. */
84 if (!pPATMGCState->fPIF && fPatchCode)
85 {
86 Log(("CSAMGCCodePageWriteHandler: fPIF=0 -> stack fault in patch generated code at %08RX32!\n", pRegFrame->eip));
87 /** @note there are cases when pages previously used for code are now used for stack; patch generated code will fault (pushf))
88 * Just make the page r/w and continue.
89 */
90 /*
91 * Make this particular page R/W.
92 */
93 rc = PGMShwMakePageWritable(pVCpu, pvFault, PGM_MK_PG_IS_WRITE_FAULT);
94 AssertMsgRC(rc, ("PGMShwModifyPage -> rc=%Rrc\n", rc));
95 ASMInvalidatePage((void *)(uintptr_t)pvFault);
96 return VINF_SUCCESS;
97 }
98
99 uint32_t cpl;
100
101 if (pRegFrame->eflags.Bits.u1VM)
102 cpl = 3;
103 else
104 cpl = (pRegFrame->ss.Sel & X86_SEL_RPL);
105
106 Log(("CSAMGCCodePageWriteHandler: code page write at %RGv original address %RGv (cpl=%d)\n", pvFault, (RTGCUINTPTR)pvRange + offRange, cpl));
107
108 /* If user code is modifying one of our monitored pages, then we can safely make it r/w as it's no longer being used for supervisor code. */
109 if (cpl != 3)
110 {
111 rc = PATMRCHandleWriteToPatchPage(pVM, pRegFrame, (RTRCPTR)((RTRCUINTPTR)pvRange + offRange), 4 /** @todo */);
112 if (rc == VINF_SUCCESS)
113 return rc;
114 if (rc == VINF_EM_RAW_EMULATE_INSTR)
115 {
116 STAM_COUNTER_INC(&pVM->csam.s.StatDangerousWrite);
117 return VINF_EM_RAW_EMULATE_INSTR;
118 }
119 Assert(rc == VERR_PATCH_NOT_FOUND);
120 }
121
122 VMCPU_FF_SET(pVCpu, VMCPU_FF_CSAM_PENDING_ACTION);
123
124 /* Note that pvFault might be a different address in case of aliases. So use pvRange + offset instead!. */
125 pVM->csam.s.pvDirtyBasePage[pVM->csam.s.cDirtyPages] = (RTRCPTR)((RTRCUINTPTR)pvRange + offRange);
126 pVM->csam.s.pvDirtyFaultPage[pVM->csam.s.cDirtyPages] = (RTRCPTR)((RTRCUINTPTR)pvRange + offRange);
127 if (++pVM->csam.s.cDirtyPages == CSAM_MAX_DIRTY_PAGES)
128 return VINF_CSAM_PENDING_ACTION;
129
130 /*
131 * Make this particular page R/W. The VM_FF_CSAM_FLUSH_DIRTY_PAGE handler will reset it to readonly again.
132 */
133 Log(("CSAMGCCodePageWriteHandler: enabled r/w for page %RGv\n", pvFault));
134 rc = PGMShwMakePageWritable(pVCpu, pvFault, PGM_MK_PG_IS_WRITE_FAULT);
135 AssertMsgRC(rc, ("PGMShwModifyPage -> rc=%Rrc\n", rc));
136 ASMInvalidatePage((void *)(uintptr_t)pvFault);
137
138 STAM_COUNTER_INC(&pVM->csam.s.StatCodePageModified);
139 return VINF_SUCCESS;
140}
141
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette