1 | /* $Id: TRPMRC.cpp 44528 2013-02-04 14:27:54Z vboxsync $ */
|
---|
2 | /** @file
|
---|
3 | * TRPM - The Trap Monitor, Guest Context
|
---|
4 | */
|
---|
5 |
|
---|
6 | /*
|
---|
7 | * Copyright (C) 2006-2012 Oracle Corporation
|
---|
8 | *
|
---|
9 | * This file is part of VirtualBox Open Source Edition (OSE), as
|
---|
10 | * available from http://www.virtualbox.org. This file is free software;
|
---|
11 | * you can redistribute it and/or modify it under the terms of the GNU
|
---|
12 | * General Public License (GPL) as published by the Free Software
|
---|
13 | * Foundation, in version 2 as it comes in the "COPYING" file of the
|
---|
14 | * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
|
---|
15 | * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
|
---|
16 | */
|
---|
17 |
|
---|
18 |
|
---|
19 | /*******************************************************************************
|
---|
20 | * Header Files *
|
---|
21 | *******************************************************************************/
|
---|
22 | #define LOG_GROUP LOG_GROUP_TRPM
|
---|
23 | #include <VBox/vmm/trpm.h>
|
---|
24 | #include <VBox/vmm/cpum.h>
|
---|
25 | #include <VBox/vmm/em.h>
|
---|
26 | #include <VBox/vmm/vmm.h>
|
---|
27 | #include "TRPMInternal.h"
|
---|
28 | #include <VBox/vmm/vm.h>
|
---|
29 |
|
---|
30 | #include <VBox/err.h>
|
---|
31 | #include <iprt/assert.h>
|
---|
32 | #include <iprt/asm.h>
|
---|
33 | #include <iprt/x86.h>
|
---|
34 | #include <VBox/log.h>
|
---|
35 | #include <VBox/vmm/selm.h>
|
---|
36 |
|
---|
37 |
|
---|
38 |
|
---|
39 | /**
|
---|
40 | * Arms a temporary trap handler for traps in Hypervisor code.
|
---|
41 | *
|
---|
42 | * The operation is similar to a System V signal handler. I.e. when the handler
|
---|
43 | * is called it is first set to default action. So, if you need to handler more
|
---|
44 | * than one trap, you must reinstall the handler.
|
---|
45 | *
|
---|
46 | * To uninstall the temporary handler, call this function with pfnHandler set to NULL.
|
---|
47 | *
|
---|
48 | * @returns VBox status.
|
---|
49 | * @param pVM Pointer to the VM.
|
---|
50 | * @param iTrap Trap number to install handler [0..255].
|
---|
51 | * @param pfnHandler Pointer to the handler. Use NULL for uninstalling the handler.
|
---|
52 | */
|
---|
53 | VMMRCDECL(int) TRPMGCSetTempHandler(PVM pVM, unsigned iTrap, PFNTRPMGCTRAPHANDLER pfnHandler)
|
---|
54 | {
|
---|
55 | /*
|
---|
56 | * Validate input.
|
---|
57 | */
|
---|
58 | if (iTrap >= RT_ELEMENTS(pVM->trpm.s.aTmpTrapHandlers))
|
---|
59 | {
|
---|
60 | AssertMsgFailed(("Trap handler iTrap=%u is out of range!\n", iTrap));
|
---|
61 | return VERR_INVALID_PARAMETER;
|
---|
62 | }
|
---|
63 |
|
---|
64 | /*
|
---|
65 | * Install handler.
|
---|
66 | */
|
---|
67 | pVM->trpm.s.aTmpTrapHandlers[iTrap] = (RTRCPTR)(uintptr_t)pfnHandler;
|
---|
68 | return VINF_SUCCESS;
|
---|
69 | }
|
---|
70 |
|
---|
71 |
|
---|
72 | /**
|
---|
73 | * Return to host context from a hypervisor trap handler.
|
---|
74 | *
|
---|
75 | * This function will *never* return.
|
---|
76 | * It will also reset any traps that are pending.
|
---|
77 | *
|
---|
78 | * @param pVM Pointer to the VM.
|
---|
79 | * @param rc The return code for host context.
|
---|
80 | */
|
---|
81 | VMMRCDECL(void) TRPMGCHyperReturnToHost(PVM pVM, int rc)
|
---|
82 | {
|
---|
83 | PVMCPU pVCpu = VMMGetCpu0(pVM);
|
---|
84 |
|
---|
85 | LogFlow(("TRPMGCHyperReturnToHost: rc=%Rrc\n", rc));
|
---|
86 | TRPMResetTrap(pVCpu);
|
---|
87 | VMMGCGuestToHost(pVM, rc);
|
---|
88 | AssertReleaseFailed();
|
---|
89 | }
|
---|
90 |
|
---|
91 |
|
---|
92 | /**
|
---|
93 | * \#PF Virtual Handler callback for Guest write access to the Guest's own current IDT.
|
---|
94 | *
|
---|
95 | * @returns VBox status code (appropriate for trap handling and GC return).
|
---|
96 | * @param pVM Pointer to the VM.
|
---|
97 | * @param uErrorCode CPU Error code.
|
---|
98 | * @param pRegFrame Trap register frame.
|
---|
99 | * @param pvFault The fault address (cr2).
|
---|
100 | * @param pvRange The base address of the handled virtual range.
|
---|
101 | * @param offRange The offset of the access into this range.
|
---|
102 | * (If it's a EIP range this is the EIP, if not it's pvFault.)
|
---|
103 | */
|
---|
104 | VMMRCDECL(int) trpmRCGuestIDTWriteHandler(PVM pVM, RTGCUINT uErrorCode, PCPUMCTXCORE pRegFrame, RTGCPTR pvFault, RTGCPTR pvRange, uintptr_t offRange)
|
---|
105 | {
|
---|
106 | PVMCPU pVCpu = VMMGetCpu0(pVM);
|
---|
107 | uint16_t cbIDT;
|
---|
108 | RTGCPTR GCPtrIDT = (RTGCPTR)CPUMGetGuestIDTR(pVCpu, &cbIDT);
|
---|
109 | #ifdef VBOX_STRICT
|
---|
110 | RTGCPTR GCPtrIDTEnd = (RTGCPTR)((RTGCUINTPTR)GCPtrIDT + cbIDT + 1);
|
---|
111 | #endif
|
---|
112 | uint32_t iGate = ((RTGCUINTPTR)pvFault - (RTGCUINTPTR)GCPtrIDT)/sizeof(VBOXIDTE);
|
---|
113 |
|
---|
114 | AssertMsg(offRange < (uint32_t)cbIDT+1, ("pvFault=%RGv GCPtrIDT=%RGv-%RGv pvRange=%RGv\n", pvFault, GCPtrIDT, GCPtrIDTEnd, pvRange));
|
---|
115 | Assert((RTGCPTR)(RTRCUINTPTR)pvRange == GCPtrIDT);
|
---|
116 | NOREF(uErrorCode);
|
---|
117 |
|
---|
118 | #if 0
|
---|
119 | /* Note! this causes problems in Windows XP as instructions following the update can be dangerous (str eax has been seen) */
|
---|
120 | /* Note! not going back to ring 3 could make the code scanner miss them. */
|
---|
121 | /* Check if we can handle the write here. */
|
---|
122 | if ( iGate != 3 /* Gate 3 is handled differently; could do it here as well, but let ring 3 handle this case for now. */
|
---|
123 | && !ASMBitTest(&pVM->trpm.s.au32IdtPatched[0], iGate)) /* Passthru gates need special attention too. */
|
---|
124 | {
|
---|
125 | uint32_t cb;
|
---|
126 | int rc = EMInterpretInstructionEx(pVM, pVCpu, pRegFrame, pvFault, &cb);
|
---|
127 | if (RT_SUCCESS(rc) && cb)
|
---|
128 | {
|
---|
129 | uint32_t iGate1 = (offRange + cb - 1)/sizeof(VBOXIDTE);
|
---|
130 |
|
---|
131 | Log(("trpmRCGuestIDTWriteHandler: write to gate %x (%x) offset %x cb=%d\n", iGate, iGate1, offRange, cb));
|
---|
132 |
|
---|
133 | trpmClearGuestTrapHandler(pVM, iGate);
|
---|
134 | if (iGate != iGate1)
|
---|
135 | trpmClearGuestTrapHandler(pVM, iGate1);
|
---|
136 |
|
---|
137 | STAM_COUNTER_INC(&pVM->trpm.s.StatRCWriteGuestIDTHandled);
|
---|
138 | return VINF_SUCCESS;
|
---|
139 | }
|
---|
140 | }
|
---|
141 | #else
|
---|
142 | NOREF(iGate);
|
---|
143 | #endif
|
---|
144 |
|
---|
145 | Log(("trpmRCGuestIDTWriteHandler: eip=%RGv write to gate %x offset %x\n", pRegFrame->eip, iGate, offRange));
|
---|
146 |
|
---|
147 | /** @todo Check which IDT entry and keep the update cost low in TRPMR3SyncIDT() and CSAMCheckGates(). */
|
---|
148 | VMCPU_FF_SET(pVCpu, VMCPU_FF_TRPM_SYNC_IDT);
|
---|
149 |
|
---|
150 | STAM_COUNTER_INC(&pVM->trpm.s.StatRCWriteGuestIDTFault);
|
---|
151 | return VINF_EM_RAW_EMULATE_INSTR_IDT_FAULT;
|
---|
152 | }
|
---|
153 |
|
---|
154 |
|
---|
155 | /**
|
---|
156 | * \#PF Virtual Handler callback for Guest write access to the VBox shadow IDT.
|
---|
157 | *
|
---|
158 | * @returns VBox status code (appropriate for trap handling and GC return).
|
---|
159 | * @param pVM Pointer to the VM.
|
---|
160 | * @param uErrorCode CPU Error code.
|
---|
161 | * @param pRegFrame Trap register frame.
|
---|
162 | * @param pvFault The fault address (cr2).
|
---|
163 | * @param pvRange The base address of the handled virtual range.
|
---|
164 | * @param offRange The offset of the access into this range.
|
---|
165 | * (If it's a EIP range this is the EIP, if not it's pvFault.)
|
---|
166 | */
|
---|
167 | VMMRCDECL(int) trpmRCShadowIDTWriteHandler(PVM pVM, RTGCUINT uErrorCode, PCPUMCTXCORE pRegFrame, RTGCPTR pvFault, RTGCPTR pvRange, uintptr_t offRange)
|
---|
168 | {
|
---|
169 | PVMCPU pVCpu = VMMGetCpu0(pVM);
|
---|
170 | LogRel(("FATAL ERROR: trpmRCShadowIDTWriteHandler: eip=%08X pvFault=%RGv pvRange=%08RGv\r\n", pRegFrame->eip, pvFault, pvRange));
|
---|
171 | NOREF(uErrorCode); NOREF(offRange);
|
---|
172 |
|
---|
173 | /*
|
---|
174 | * If we ever get here, then the guest has *probably* executed an SIDT
|
---|
175 | * instruction that we failed to patch. In theory this could be very bad,
|
---|
176 | * but there are nasty applications out there that install device drivers
|
---|
177 | * that mess with the guest's IDT. In those cases, it's quite ok to simply
|
---|
178 | * ignore the writes and pretend success.
|
---|
179 | *
|
---|
180 | * Another posibility is that the guest is touching some page memory and
|
---|
181 | * it having nothing to do with our IDT or anything like that, just a
|
---|
182 | * potential conflict that we didn't discover in time.
|
---|
183 | */
|
---|
184 | DISSTATE Dis;
|
---|
185 | int rc = EMInterpretDisasCurrent(pVM, pVCpu, &Dis, NULL);
|
---|
186 | if (rc == VINF_SUCCESS)
|
---|
187 | {
|
---|
188 | /* Just ignore the write. */
|
---|
189 | pRegFrame->eip += Dis.cbInstr;
|
---|
190 | return VINF_SUCCESS;
|
---|
191 | }
|
---|
192 |
|
---|
193 | return VERR_TRPM_SHADOW_IDT_WRITE;
|
---|
194 | }
|
---|
195 |
|
---|