VirtualBox

source: vbox/trunk/src/VBox/VMM/VMMRC/CSAMRC.cpp@ 56072

Last change on this file since 56072 was 56013, checked in by vboxsync, 9 years ago

PGM: Made the virtual handler callbacks return VBOXSTRICTRC and prepared for RC execution.

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id Revision
File size: 5.6 KB
Line 
1/* $Id: CSAMRC.cpp 56013 2015-05-21 17:04:14Z vboxsync $ */
2/** @file
3 * CSAM - Guest OS Code Scanning and Analysis Manager - Any Context
4 */
5
6/*
7 * Copyright (C) 2006-2013 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17
18
19/*******************************************************************************
20* Header Files *
21*******************************************************************************/
22#define LOG_GROUP LOG_GROUP_CSAM
23#include <VBox/vmm/cpum.h>
24#include <VBox/vmm/stam.h>
25#include <VBox/vmm/patm.h>
26#include <VBox/vmm/csam.h>
27#include <VBox/vmm/pgm.h>
28#include <VBox/vmm/mm.h>
29#include <VBox/sup.h>
30#include <VBox/vmm/mm.h>
31#ifdef VBOX_WITH_REM
32# include <VBox/vmm/rem.h>
33#endif
34#include <VBox/param.h>
35#include <iprt/avl.h>
36#include "CSAMInternal.h"
37#include <VBox/vmm/vm.h>
38#include <VBox/dbg.h>
39#include <VBox/err.h>
40#include <VBox/log.h>
41#include <iprt/assert.h>
42#include <VBox/dis.h>
43#include <VBox/disopcode.h>
44#include <iprt/asm.h>
45#include <iprt/asm-amd64-x86.h>
46#include <iprt/string.h>
47
48
49
50/**
51 * \#PF Handler callback for virtual access handler ranges. (CSAM self-modifying
52 * code monitor)
53 *
54 * Important to realize that a physical page in a range can have aliases, and
55 * for ALL and WRITE handlers these will also trigger.
56 *
57 * @returns VBox status code (appropriate for GC return).
58 * @param pVM Pointer to the VM.
59 * @param pVCpu Pointer to the cross context CPU context for the calling
60 * EMT.
61 * @param uErrorCode CPU Error code.
62 * @param pRegFrame Trap register frame.
63 * @param pvFault The fault address (cr2).
64 * @param pvRange The base address of the handled virtual range.
65 * @param offRange The offset of the access into this range.
66 * (If it's a EIP range this is the EIP, if not it's pvFault.)
67 * @param pvUser Ignored.
68 */
69DECLEXPORT(VBOXSTRICTRC) csamRCCodePageWritePfHandler(PVM pVM, PVMCPU pVCpu, RTGCUINT uErrorCode, PCPUMCTXCORE pRegFrame,
70 RTGCPTR pvFault, RTGCPTR pvRange, uintptr_t offRange, void *pvUser)
71{
72 PPATMGCSTATE pPATMGCState;
73 bool fPatchCode = PATMIsPatchGCAddr(pVM, pRegFrame->eip);
74 NOREF(uErrorCode);
75
76 Assert(pVM->csam.s.cDirtyPages < CSAM_MAX_DIRTY_PAGES);
77
78#ifdef VBOX_WITH_REM
79 /* Flush the recompilers translation block cache as the guest seems to be modifying instructions. */
80 REMFlushTBs(pVM);
81#endif
82
83 pPATMGCState = PATMGetGCState(pVM);
84 Assert(pPATMGCState);
85
86 Assert(pPATMGCState->fPIF || fPatchCode);
87 /* When patch code is executing instructions that must complete, then we must *never* interrupt it. */
88 if (!pPATMGCState->fPIF && fPatchCode)
89 {
90 Log(("csamRCCodePageWriteHandler: fPIF=0 -> stack fault in patch generated code at %08RX32!\n", pRegFrame->eip));
91 /** @note there are cases when pages previously used for code are now used for stack; patch generated code will fault (pushf))
92 * Just make the page r/w and continue.
93 */
94 /*
95 * Make this particular page R/W.
96 */
97 int rc = PGMShwMakePageWritable(pVCpu, pvFault, PGM_MK_PG_IS_WRITE_FAULT);
98 AssertMsgRC(rc, ("PGMShwModifyPage -> rc=%Rrc\n", rc));
99 ASMInvalidatePage((void *)(uintptr_t)pvFault);
100 return VINF_SUCCESS;
101 }
102
103 uint32_t cpl;
104
105 if (pRegFrame->eflags.Bits.u1VM)
106 cpl = 3;
107 else
108 cpl = (pRegFrame->ss.Sel & X86_SEL_RPL);
109
110 Log(("csamRCCodePageWriteHandler: code page write at %RGv original address %RGv (cpl=%d)\n", pvFault, (RTGCUINTPTR)pvRange + offRange, cpl));
111
112 /* If user code is modifying one of our monitored pages, then we can safely make it r/w as it's no longer being used for supervisor code. */
113 if (cpl != 3)
114 {
115 VBOXSTRICTRC rcStrict = PATMRCHandleWriteToPatchPage(pVM, pRegFrame, (RTRCPTR)((RTRCUINTPTR)pvRange + offRange),
116 4 /** @todo */);
117 if (rcStrict == VINF_SUCCESS)
118 return VBOXSTRICTRC_TODO(rcStrict);
119 if (rcStrict == VINF_EM_RAW_EMULATE_INSTR)
120 {
121 STAM_COUNTER_INC(&pVM->csam.s.StatDangerousWrite);
122 return VINF_EM_RAW_EMULATE_INSTR;
123 }
124 Assert(rcStrict == VERR_PATCH_NOT_FOUND);
125 }
126
127 VMCPU_FF_SET(pVCpu, VMCPU_FF_CSAM_PENDING_ACTION);
128
129 /* Note that pvFault might be a different address in case of aliases. So use pvRange + offset instead!. */
130 pVM->csam.s.pvDirtyBasePage[pVM->csam.s.cDirtyPages] = (RTRCPTR)((RTRCUINTPTR)pvRange + offRange);
131 pVM->csam.s.pvDirtyFaultPage[pVM->csam.s.cDirtyPages] = (RTRCPTR)pvFault;
132 if (++pVM->csam.s.cDirtyPages == CSAM_MAX_DIRTY_PAGES)
133 return VINF_CSAM_PENDING_ACTION;
134
135 /*
136 * Make this particular page R/W. The VM_FF_CSAM_FLUSH_DIRTY_PAGE handler will reset it to readonly again.
137 */
138 Log(("csamRCCodePageWriteHandler: enabled r/w for page %RGv\n", pvFault));
139 int rc = PGMShwMakePageWritable(pVCpu, pvFault, PGM_MK_PG_IS_WRITE_FAULT);
140 AssertMsgRC(rc, ("PGMShwModifyPage -> rc=%Rrc\n", rc));
141 ASMInvalidatePage((void *)(uintptr_t)pvFault);
142
143 STAM_COUNTER_INC(&pVM->csam.s.StatCodePageModified);
144 return VINF_SUCCESS;
145}
146
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette