VirtualBox

Changeset 33540 in vbox for trunk/src/VBox/VMM/PATM


Ignore:
Timestamp:
Oct 28, 2010 9:27:05 AM (14 years ago)
Author:
vboxsync
svn:sync-xref-src-repo-rev:
67140
Message:

*: spelling fixes, thanks Timeless!

Location:
trunk/src/VBox/VMM/PATM
Files:
11 edited

Legend:

Unmodified
Added
Removed
  • trunk/src/VBox/VMM/PATM/CSAM.cpp

    r32431 r33540  
    230230
    231231    /*
    232      * Register save and load state notificators.
     232     * Register save and load state notifiers.
    233233     */
    234234    rc = SSMR3RegisterInternal(pVM, "CSAM", 0, CSAM_SSM_VERSION, sizeof(pVM->csam.s) + PAGE_SIZE*16,
  • trunk/src/VBox/VMM/PATM/CSAMInternal.h

    r30500 r33540  
    186186    /* Set when the IDT gates have been checked for the first time. */
    187187    bool                fGatesChecked;
    188     bool                Alignment1[HC_ARCH_BITS == 32 ? 6 : 2]; /**< Align the stats on an 8-byte boundrary. */
     188    bool                Alignment1[HC_ARCH_BITS == 32 ? 6 : 2]; /**< Align the stats on an 8-byte boundary. */
    189189
    190190    STAMCOUNTER         StatNrTraps;
  • trunk/src/VBox/VMM/PATM/PATM.cpp

    r31438 r33540  
    168168
    169169    /*
    170      * Register save and load state notificators.
     170     * Register save and load state notifiers.
    171171     */
    172172    rc = SSMR3RegisterInternal(pVM, "PATM", 0, PATM_SSM_VERSION, sizeof(pVM->patm.s) + PATCH_MEMORY_SIZE  + PAGE_SIZE + PATM_STACK_TOTAL_SIZE + PAGE_SIZE,
     
    13071307    else
    13081308    {
    1309         /* No unconditinal jumps or calls without fixed displacements. */
     1309        /* No unconditional jumps or calls without fixed displacements. */
    13101310        if (    (pCpu->pCurInstr->optype & OPTYPE_CONTROLFLOW)
    13111311             && (pCpu->pCurInstr->opcode == OP_JMP || pCpu->pCurInstr->opcode == OP_CALL)
     
    14631463    else
    14641464    {
    1465         // no unconditinal jumps or calls without fixed displacements
     1465        // no unconditional jumps or calls without fixed displacements
    14661466        if (    (pCpu->pCurInstr->optype & OPTYPE_CONTROLFLOW)
    14671467             && (pCpu->pCurInstr->opcode == OP_JMP || pCpu->pCurInstr->opcode == OP_CALL)
     
    55525552{
    55535553    PPATMPATCHREC pPatchRec = (PPATMPATCHREC)RTAvloU32GetBestFit(&pVM->patm.s.PatchLookupTreeHC->PatchTree, pInstrGC, false);
    5554     /* if the patch is enabled, the pointer is not indentical to the privileged patch ptr and it lies within 5 bytes of this priv instr ptr, then we've got a hit! */
     5554    /* if the patch is enabled, the pointer is not identical to the privileged patch ptr and it lies within 5 bytes of this priv instr ptr, then we've got a hit! */
    55555555    if (pPatchRec)
    55565556    {
  • trunk/src/VBox/VMM/PATM/PATMA.asm

    r28800 r33540  
    735735PATMPopf32_Ok:
    736736    ; Note: we don't allow popf instructions to change the current IOPL; we simply ignore such changes (!!!)
    737     ; In this particular patch it's rather unlikely the pushf was included, so we have no way to check if the flags on the stack were correctly synched
     737    ; In this particular patch it's rather unlikely the pushf was included, so we have no way to check if the flags on the stack were correctly synced
    738738    ; PATMPopf32Replacement_NoExit is different, because it's only used in IDT and function patches
    739739    or      dword [ss:PATM_VMFLAGS], X86_EFL_IF
     
    12321232
    12331233; if interrupts are pending, then we must go back to the host context to handle them!
    1234 ; Note: This is very important as pending pic interrupts can be overriden by apic interrupts if we don't check early enough (Fedora 5 boot)
     1234; Note: This is very important as pending pic interrupts can be overridden by apic interrupts if we don't check early enough (Fedora 5 boot)
    12351235; @@todo fix this properly, so we can dispatch pending interrupts in GC
    12361236    test    dword [ss:PATM_VM_FORCEDACTIONS], VMCPU_FF_INTERRUPT_APIC | VMCPU_FF_INTERRUPT_PIC
  • trunk/src/VBox/VMM/PATM/PATMA.h

    r28800 r33540  
    3636#define PATM_CPUID_EXT_PTR                      0xF1ABCD0a
    3737#define PATM_CPUID_DEF_PTR                      0xF1ABCD0b
    38 #define PATM_STACKBASE                          0xF1ABCD0c    /** Stack to store our private patch return addesses */
     38#define PATM_STACKBASE                          0xF1ABCD0c    /** Stack to store our private patch return addresses */
    3939#define PATM_STACKBASE_GUEST                    0xF1ABCD0d    /** Stack to store guest return addresses */
    4040#define PATM_STACKPTR                           0xF1ABCD0e
  • trunk/src/VBox/VMM/PATM/PATMA.mac

    r28800 r33540  
    3535%define PATM_CPUID_EXT_PTR   0xF1ABCD0a
    3636%define PATM_CPUID_DEF_PTR   0xF1ABCD0b
    37 %define PATM_STACKBASE       0xF1ABCD0c    ;/** Stack to store our private patch return addesses */
     37%define PATM_STACKBASE       0xF1ABCD0c    ;/** Stack to store our private patch return addresses */
    3838%define PATM_STACKBASE_GUEST 0xF1ABCD0d    ;/** Stack to store guest return addresses */
    3939%define PATM_STACKPTR        0xF1ABCD0e
  • trunk/src/VBox/VMM/PATM/PATMInternal.h

    r30572 r33540  
    233233    int32_t                     nrCalls;
    234234
    235     /** Last original guest instruction pointer; used for disassmebly log. */
     235    /** Last original guest instruction pointer; used for disassembly log. */
    236236    RTRCPTR                   pLastDisasmInstrGC;
    237237
     
    312312    /* First opcode byte, that's overwritten when a patch is marked dirty. */
    313313    uint8_t         bDirtyOpcode;
    314     uint8_t         Alignment2[7];      /**< Align the structure size on a 8-byte boundrary. */
     314    uint8_t         Alignment2[7];      /**< Align the structure size on a 8-byte boundary. */
    315315} PATCHINFO, *PPATCHINFO;
    316316
     
    454454        RTGCPHYS            GCPhys;
    455455        RTRCPTR             pCachedData;
    456         RTRCPTR             Alignment0; /**< Align the structure size on a 8-byte boundrary. */
     456        RTRCPTR             Alignment0; /**< Align the structure size on a 8-byte boundary. */
    457457    } mmio;
    458458
     
    463463        uint32_t            cPatches;
    464464#if HC_ARCH_BITS == 64
    465         uint32_t            Alignment0; /**< Align the structure size on a 8-byte boundrary. */
     465        uint32_t            Alignment0; /**< Align the structure size on a 8-byte boundary. */
    466466#endif
    467467    } savedstate;
     
    524524    STAMCOUNTER             StatFunctionLookupInsert;
    525525    uint32_t                StatU32FunctionMaxSlotsUsed;
    526     uint32_t                Alignment0; /**< Align the structure size on a 8-byte boundrary. */
     526    uint32_t                Alignment0; /**< Align the structure size on a 8-byte boundary. */
    527527} PATM, *PPATM;
    528528
     
    707707 * #PF Virtual Handler callback for Guest access a page monitored by PATM
    708708 *
    709  * @returns VBox status code (appropritate for trap handling and GC return).
     709 * @returns VBox status code (appropriate for trap handling and GC return).
    710710 * @param   pVM         VM Handle.
    711711 * @param   uErrorCode   CPU Error code.
     
    714714 * @param   pvRange     The base address of the handled virtual range.
    715715 * @param   offRange    The offset of the access into this range.
    716  *                      (If it's a EIP range this's the EIP, if not it's pvFault.)
     716 *                      (If it's a EIP range this is the EIP, if not it's pvFault.)
    717717 */
    718718VMMRCDECL(int) PATMGCMonitorPage(PVM pVM, RTGCUINT uErrorCode, PCPUMCTXCORE pRegFrame, RTGCPTR pvFault, RTGCPTR pvRange, uintptr_t offRange);
  • trunk/src/VBox/VMM/PATM/PATMPatch.cpp

    r28800 r33540  
    214214                    break;
    215215
    216                 case PATM_CALLTARGET:   /* relative to patch address; no fixup requird */
     216                case PATM_CALLTARGET:   /* relative to patch address; no fixup required */
    217217                    Assert(pCallInfo && pAsmRecord->uReloc[i] >= PATM_NO_FIXUP);
    218218
  • trunk/src/VBox/VMM/PATM/VMMAll/PATMAll.cpp

    r28800 r33540  
    4141 *
    4242 * This function is called from CPUMRawEnter(). It doesn't have to update the
    43  * IF and IOPL eflags bits, the caller will enforce those to set and 0 repectively.
     43 * IF and IOPL eflags bits, the caller will enforce those to set and 0 respectively.
    4444 *
    4545 * @param   pVM         VM handle.
     
    289289 *
    290290 * @returns true if it's enabled.
    291  * @returns false if it's diabled.
     291 * @returns false if it's disabled.
    292292 *
    293293 * @param   pVM         The VM handle.
     
    304304 *
    305305 * @returns true if it's enabled.
    306  * @returns false if it's diabled.
     306 * @returns false if it's disabled.
    307307 *
    308308 * @param   pVM         The VM handle.
  • trunk/src/VBox/VMM/PATM/VMMGC/CSAMGC.cpp

    r30326 r33540  
    5858 * @param   pvRange     The base address of the handled virtual range.
    5959 * @param   offRange    The offset of the access into this range.
    60  *                      (If it's a EIP range this's the EIP, if not it's pvFault.)
     60 *                      (If it's a EIP range this is the EIP, if not it's pvFault.)
    6161 */
    6262VMMRCDECL(int) CSAMGCCodePageWriteHandler(PVM pVM, RTGCUINT uErrorCode, PCPUMCTXCORE pRegFrame, RTGCPTR pvFault, RTGCPTR pvRange, uintptr_t offRange)
  • trunk/src/VBox/VMM/PATM/VMMGC/PATMGC.cpp

    r31636 r33540  
    4848 * \#PF Virtual Handler callback for Guest access a page monitored by PATM
    4949 *
    50  * @returns VBox status code (appropritate for trap handling and GC return).
     50 * @returns VBox status code (appropriate for trap handling and GC return).
    5151 * @param   pVM         VM Handle.
    5252 * @param   uErrorCode   CPU Error code.
     
    5555 * @param   pvRange     The base address of the handled virtual range.
    5656 * @param   offRange    The offset of the access into this range.
    57  *                      (If it's a EIP range this's the EIP, if not it's pvFault.)
     57 *                      (If it's a EIP range this is the EIP, if not it's pvFault.)
    5858 */
    5959VMMRCDECL(int) PATMGCMonitorPage(PVM pVM, RTGCUINT uErrorCode, PCPUMCTXCORE pRegFrame, RTGCPTR pvFault, RTGCPTR pvRange, uintptr_t offRange)
Note: See TracChangeset for help on using the changeset viewer.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette