diff options
Diffstat (limited to 'src/VBox/VMM/VMMR3/EMRaw.cpp')
-rw-r--r-- | src/VBox/VMM/VMMR3/EMRaw.cpp | 1518 |
1 files changed, 1518 insertions, 0 deletions
diff --git a/src/VBox/VMM/VMMR3/EMRaw.cpp b/src/VBox/VMM/VMMR3/EMRaw.cpp new file mode 100644 index 00000000..749ab20f --- /dev/null +++ b/src/VBox/VMM/VMMR3/EMRaw.cpp @@ -0,0 +1,1518 @@ +/* $Id: EMRaw.cpp $ */ +/** @file + * EM - Execution Monitor / Manager - software virtualization + */ + +/* + * Copyright (C) 2006-2019 Oracle Corporation + * + * This file is part of VirtualBox Open Source Edition (OSE), as + * available from http://www.virtualbox.org. This file is free software; + * you can redistribute it and/or modify it under the terms of the GNU + * General Public License (GPL) as published by the Free Software + * Foundation, in version 2 as it comes in the "COPYING" file of the + * VirtualBox OSE distribution. VirtualBox OSE is distributed in the + * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind. + */ + + +/********************************************************************************************************************************* +* Header Files * +*********************************************************************************************************************************/ +#define LOG_GROUP LOG_GROUP_EM +#define VMCPU_INCL_CPUM_GST_CTX +#include <VBox/vmm/em.h> +#include <VBox/vmm/vmm.h> +#include <VBox/vmm/patm.h> +#include <VBox/vmm/csam.h> +#include <VBox/vmm/selm.h> +#include <VBox/vmm/trpm.h> +#include <VBox/vmm/iem.h> +#include <VBox/vmm/iom.h> +#include <VBox/vmm/dbgf.h> +#include <VBox/vmm/pgm.h> +#ifdef VBOX_WITH_REM +# include <VBox/vmm/rem.h> +#endif +#include <VBox/vmm/tm.h> +#include <VBox/vmm/mm.h> +#include <VBox/vmm/ssm.h> +#include <VBox/vmm/pdmapi.h> +#include <VBox/vmm/pdmcritsect.h> +#include <VBox/vmm/pdmqueue.h> +#include <VBox/vmm/patm.h> +#include "EMInternal.h" +#include <VBox/vmm/vm.h> +#include <VBox/vmm/gim.h> +#include <VBox/vmm/cpumdis.h> +#include <VBox/dis.h> +#include <VBox/disopcode.h> +#include <VBox/vmm/dbgf.h> +#include "VMMTracing.h" + +#include <VBox/err.h> +#include <VBox/log.h> +#include <iprt/asm.h> +#include <iprt/string.h> +#include <iprt/stream.h> + + + +/********************************************************************************************************************************* +* Internal Functions * +*********************************************************************************************************************************/ +static int emR3RawHandleRC(PVM pVM, PVMCPU pVCpu, int rc); +static int emR3RawForcedActions(PVM pVM, PVMCPU pVCpu); +DECLINLINE(int) emR3RawExecuteInstruction(PVM pVM, PVMCPU pVCpu, const char *pszPrefix, int rcGC = VINF_SUCCESS); +static int emR3RawGuestTrap(PVM pVM, PVMCPU pVCpu); +static int emR3RawPatchTrap(PVM pVM, PVMCPU pVCpu, int gcret); +static int emR3RawPrivileged(PVM pVM, PVMCPU pVCpu); +static int emR3RawExecuteIOInstruction(PVM pVM, PVMCPU pVCpu); +static int emR3RawRingSwitch(PVM pVM, PVMCPU pVCpu); +static int emR3RawUpdateForceFlag(PVM pVM, PVMCPU pVCpu, int rc); + +#define EMHANDLERC_WITH_PATM +#define emR3ExecuteInstruction emR3RawExecuteInstruction +#define emR3ExecuteIOInstruction emR3RawExecuteIOInstruction +#include "EMHandleRCTmpl.h" + + + +#ifdef VBOX_WITH_STATISTICS +/** + * Just a braindead function to keep track of cli addresses. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + * @param GCPtrInstr The EIP of the cli instruction. + */ +static void emR3RecordCli(PVM pVM, PVMCPU pVCpu, RTGCPTR GCPtrInstr) +{ + PCLISTAT pRec; + + pRec = (PCLISTAT)RTAvlGCPtrGet(&pVCpu->em.s.pCliStatTree, GCPtrInstr); + if (!pRec) + { + /* New cli instruction; insert into the tree. */ + pRec = (PCLISTAT)MMR3HeapAllocZ(pVM, MM_TAG_EM, sizeof(*pRec)); + Assert(pRec); + if (!pRec) + return; + pRec->Core.Key = GCPtrInstr; + + char szCliStatName[32]; + RTStrPrintf(szCliStatName, sizeof(szCliStatName), "/EM/Cli/0x%RGv", GCPtrInstr); + STAM_REG(pVM, &pRec->Counter, STAMTYPE_COUNTER, szCliStatName, STAMUNIT_OCCURENCES, "Number of times cli was executed."); + + bool fRc = RTAvlGCPtrInsert(&pVCpu->em.s.pCliStatTree, &pRec->Core); + Assert(fRc); NOREF(fRc); + } + STAM_COUNTER_INC(&pRec->Counter); + STAM_COUNTER_INC(&pVCpu->em.s.StatTotalClis); +} +#endif /* VBOX_WITH_STATISTICS */ + + + +/** + * Resumes executing hypervisor after a debug event. + * + * This is kind of special since our current guest state is + * potentially out of sync. + * + * @returns VBox status code. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + */ +int emR3RawResumeHyper(PVM pVM, PVMCPU pVCpu) +{ + int rc; + Assert(pVCpu->em.s.enmState == EMSTATE_DEBUG_HYPER); + Log(("emR3RawResumeHyper: cs:eip=%RTsel:%RGr efl=%RGr\n", pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.eflags)); + + /* + * Resume execution. + */ + CPUMRawEnter(pVCpu); + CPUMSetHyperEFlags(pVCpu, CPUMGetHyperEFlags(pVCpu) | X86_EFL_RF); + rc = VMMR3ResumeHyper(pVM, pVCpu); + Log(("emR3RawResumeHyper: cs:eip=%RTsel:%RGr efl=%RGr - returned from GC with rc=%Rrc\n", pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.eflags, rc)); + rc = CPUMRawLeave(pVCpu, rc); + VMCPU_FF_CLEAR_MASK(pVCpu, VMCPU_FF_RESUME_GUEST_MASK); + + /* + * Deal with the return code. + */ + rc = VBOXSTRICTRC_TODO(emR3HighPriorityPostForcedActions(pVM, pVCpu, rc)); + rc = emR3RawHandleRC(pVM, pVCpu, rc); + rc = emR3RawUpdateForceFlag(pVM, pVCpu, rc); + return rc; +} + + +/** + * Steps rawmode. + * + * @returns VBox status code. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + */ +int emR3RawStep(PVM pVM, PVMCPU pVCpu) +{ + Assert( pVCpu->em.s.enmState == EMSTATE_DEBUG_HYPER + || pVCpu->em.s.enmState == EMSTATE_DEBUG_GUEST_RAW + || pVCpu->em.s.enmState == EMSTATE_DEBUG_GUEST_REM); + int rc; + bool fGuest = pVCpu->em.s.enmState != EMSTATE_DEBUG_HYPER; +#ifndef DEBUG_sander + Log(("emR3RawStep: cs:eip=%RTsel:%RGr efl=%RGr\n", fGuest ? CPUMGetGuestCS(pVCpu) : CPUMGetHyperCS(pVCpu), + fGuest ? CPUMGetGuestEIP(pVCpu) : CPUMGetHyperEIP(pVCpu), fGuest ? CPUMGetGuestEFlags(pVCpu) : CPUMGetHyperEFlags(pVCpu))); +#endif + if (fGuest) + { + /* + * Check vital forced actions, but ignore pending interrupts and timers. + */ + if ( VM_FF_IS_ANY_SET(pVM, VM_FF_HIGH_PRIORITY_PRE_RAW_MASK) + || VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_HIGH_PRIORITY_PRE_RAW_MASK)) + { + rc = emR3RawForcedActions(pVM, pVCpu); + VBOXVMM_EM_FF_RAW_RET(pVCpu, rc); + if (rc != VINF_SUCCESS) + return rc; + } + + /* + * Set flags for single stepping. + */ + CPUMSetGuestEFlags(pVCpu, CPUMGetGuestEFlags(pVCpu) | X86_EFL_TF | X86_EFL_RF); + } + else + CPUMSetHyperEFlags(pVCpu, CPUMGetHyperEFlags(pVCpu) | X86_EFL_TF | X86_EFL_RF); + + /* + * Single step. + * We do not start time or anything, if anything we should just do a few nanoseconds. + */ + CPUMRawEnter(pVCpu); + do + { + if (pVCpu->em.s.enmState == EMSTATE_DEBUG_HYPER) + rc = VMMR3ResumeHyper(pVM, pVCpu); + else + rc = VMMR3RawRunGC(pVM, pVCpu); +#ifndef DEBUG_sander + Log(("emR3RawStep: cs:eip=%RTsel:%RGr efl=%RGr - GC rc %Rrc\n", fGuest ? CPUMGetGuestCS(pVCpu) : CPUMGetHyperCS(pVCpu), + fGuest ? CPUMGetGuestEIP(pVCpu) : CPUMGetHyperEIP(pVCpu), fGuest ? CPUMGetGuestEFlags(pVCpu) : CPUMGetHyperEFlags(pVCpu), rc)); +#endif + } while ( rc == VINF_SUCCESS + || rc == VINF_EM_RAW_INTERRUPT); + rc = CPUMRawLeave(pVCpu, rc); + VMCPU_FF_CLEAR_MASK(pVCpu, VMCPU_FF_RESUME_GUEST_MASK); + + /* + * Make sure the trap flag is cleared. + * (Too bad if the guest is trying to single step too.) + */ + if (fGuest) + CPUMSetGuestEFlags(pVCpu, CPUMGetGuestEFlags(pVCpu) & ~X86_EFL_TF); + else + CPUMSetHyperEFlags(pVCpu, CPUMGetHyperEFlags(pVCpu) & ~X86_EFL_TF); + + /* + * Deal with the return codes. + */ + rc = VBOXSTRICTRC_TODO(emR3HighPriorityPostForcedActions(pVM, pVCpu, rc)); + rc = emR3RawHandleRC(pVM, pVCpu, rc); + rc = emR3RawUpdateForceFlag(pVM, pVCpu, rc); + return rc; +} + + +#ifdef DEBUG + + +int emR3SingleStepExecRaw(PVM pVM, PVMCPU pVCpu, uint32_t cIterations) +{ + int rc = VINF_SUCCESS; + EMSTATE enmOldState = pVCpu->em.s.enmState; + pVCpu->em.s.enmState = EMSTATE_DEBUG_GUEST_RAW; + + Log(("Single step BEGIN:\n")); + for (uint32_t i = 0; i < cIterations; i++) + { + DBGFR3PrgStep(pVCpu); + DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "RSS"); + rc = emR3RawStep(pVM, pVCpu); + if ( rc != VINF_SUCCESS + && rc != VINF_EM_DBG_STEPPED) + break; + } + Log(("Single step END: rc=%Rrc\n", rc)); + CPUMSetGuestEFlags(pVCpu, CPUMGetGuestEFlags(pVCpu) & ~X86_EFL_TF); + pVCpu->em.s.enmState = enmOldState; + return rc; +} + +#endif /* DEBUG */ + + +/** + * Executes one (or perhaps a few more) instruction(s). + * + * @returns VBox status code suitable for EM. + * + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + * @param rcGC GC return code + * @param pszPrefix Disassembly prefix. If not NULL we'll disassemble the + * instruction and prefix the log output with this text. + */ +#if defined(LOG_ENABLED) || defined(DOXYGEN_RUNNING) +static int emR3RawExecuteInstructionWorker(PVM pVM, PVMCPU pVCpu, int rcGC, const char *pszPrefix) +#else +static int emR3RawExecuteInstructionWorker(PVM pVM, PVMCPU pVCpu, int rcGC) +#endif +{ + int rc; + +#ifdef LOG_ENABLED + /* + * Disassemble the instruction if requested. + */ + if (pszPrefix) + { + DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", pszPrefix); + DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, pszPrefix); + } +#endif /* LOG_ENABLED */ + + /* + * PATM is making life more interesting. + * We cannot hand anything to REM which has an EIP inside patch code. So, we'll + * tell PATM there is a trap in this code and have it take the appropriate actions + * to allow us execute the code in REM. + */ + if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip)) + { + Log(("emR3RawExecuteInstruction: In patch block. eip=%RRv\n", (RTRCPTR)pVCpu->cpum.GstCtx.eip)); + + RTGCPTR uNewEip; + rc = PATMR3HandleTrap(pVM, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.eip, &uNewEip); + switch (rc) + { + /* + * It's not very useful to emulate a single instruction and then go back to raw + * mode; just execute the whole block until IF is set again. + */ + case VINF_SUCCESS: + Log(("emR3RawExecuteInstruction: Executing instruction starting at new address %RGv IF=%d VMIF=%x\n", + uNewEip, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pVCpu->em.s.pPatmGCState->uVMFlags)); + pVCpu->cpum.GstCtx.eip = uNewEip; + Assert(pVCpu->cpum.GstCtx.eip); + + if (pVCpu->cpum.GstCtx.eflags.Bits.u1IF) + { + /* + * The last instruction in the patch block needs to be executed!! (sti/sysexit for example) + */ + Log(("PATCH: IF=1 -> emulate last instruction as it can't be interrupted!!\n")); + return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHIR"); + } + else if (rcGC == VINF_PATM_PENDING_IRQ_AFTER_IRET) + { + /* special case: iret, that sets IF, detected a pending irq/event */ + return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHIRET"); + } + return VINF_EM_RESCHEDULE_REM; + + /* + * One instruction. + */ + case VINF_PATCH_EMULATE_INSTR: + Log(("emR3RawExecuteInstruction: Emulate patched instruction at %RGv IF=%d VMIF=%x\n", + uNewEip, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pVCpu->em.s.pPatmGCState->uVMFlags)); + pVCpu->cpum.GstCtx.eip = uNewEip; + return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHIR"); + + /* + * The patch was disabled, hand it to the REM. + */ + case VERR_PATCH_DISABLED: + Log(("emR3RawExecuteInstruction: Disabled patch -> new eip %RGv IF=%d VMIF=%x\n", + uNewEip, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pVCpu->em.s.pPatmGCState->uVMFlags)); + pVCpu->cpum.GstCtx.eip = uNewEip; + if (pVCpu->cpum.GstCtx.eflags.Bits.u1IF) + { + /* + * The last instruction in the patch block needs to be executed!! (sti/sysexit for example) + */ + Log(("PATCH: IF=1 -> emulate last instruction as it can't be interrupted!!\n")); + return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHIR"); + } + return VINF_EM_RESCHEDULE_REM; + + /* Force continued patch exection; usually due to write monitored stack. */ + case VINF_PATCH_CONTINUE: + return VINF_SUCCESS; + + default: + AssertReleaseMsgFailed(("Unknown return code %Rrc from PATMR3HandleTrap\n", rc)); + return VERR_IPE_UNEXPECTED_STATUS; + } + } + + + /* + * Use IEM and fallback on REM if the functionality is missing. + * Once IEM gets mature enough, nothing should ever fall back. + */ +#define VBOX_WITH_FIRST_IEM_STEP_B +#if defined(VBOX_WITH_FIRST_IEM_STEP_B) || !defined(VBOX_WITH_REM) + Log(("EMINS: %04x:%RGv RSP=%RGv\n", pVCpu->cpum.GstCtx.cs.Sel, (RTGCPTR)pVCpu->cpum.GstCtx.rip, (RTGCPTR)pVCpu->cpum.GstCtx.rsp)); + STAM_PROFILE_START(&pVCpu->em.s.StatIEMEmu, a); + rc = VBOXSTRICTRC_TODO(IEMExecOne(pVCpu)); + STAM_PROFILE_STOP(&pVCpu->em.s.StatIEMEmu, a); + if (RT_SUCCESS(rc)) + { + if (rc == VINF_SUCCESS || rc == VINF_EM_RESCHEDULE) + rc = VINF_EM_RESCHEDULE; + } + else if ( rc == VERR_IEM_ASPECT_NOT_IMPLEMENTED + || rc == VERR_IEM_INSTR_NOT_IMPLEMENTED) +#endif + { +#ifdef VBOX_WITH_REM + STAM_PROFILE_START(&pVCpu->em.s.StatREMEmu, b); +# ifndef VBOX_WITH_FIRST_IEM_STEP_B + Log(("EMINS[rem]: %04x:%RGv RSP=%RGv\n", pVCpu->cpum.GstCtx.cs.Sel, (RTGCPTR)pVCpu->cpum.GstCtx.rip, (RTGCPTR)pVCpu->cpum.GstCtx.rsp)); +//# elif defined(DEBUG_bird) +// AssertFailed(); +# endif + EMRemLock(pVM); + /* Flush the recompiler TLB if the VCPU has changed. */ + if (pVM->em.s.idLastRemCpu != pVCpu->idCpu) + CPUMSetChangedFlags(pVCpu, CPUM_CHANGED_ALL); + pVM->em.s.idLastRemCpu = pVCpu->idCpu; + + rc = REMR3EmulateInstruction(pVM, pVCpu); + EMRemUnlock(pVM); + STAM_PROFILE_STOP(&pVCpu->em.s.StatREMEmu, b); +#else /* !VBOX_WITH_REM */ + NOREF(pVM); +#endif /* !VBOX_WITH_REM */ + } + return rc; +} + + +/** + * Executes one (or perhaps a few more) instruction(s). + * This is just a wrapper for discarding pszPrefix in non-logging builds. + * + * @returns VBox status code suitable for EM. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + * @param pszPrefix Disassembly prefix. If not NULL we'll disassemble the + * instruction and prefix the log output with this text. + * @param rcGC GC return code + */ +DECLINLINE(int) emR3RawExecuteInstruction(PVM pVM, PVMCPU pVCpu, const char *pszPrefix, int rcGC) +{ +#ifdef LOG_ENABLED + return emR3RawExecuteInstructionWorker(pVM, pVCpu, rcGC, pszPrefix); +#else + RT_NOREF_PV(pszPrefix); + return emR3RawExecuteInstructionWorker(pVM, pVCpu, rcGC); +#endif +} + +/** + * Executes one (or perhaps a few more) IO instruction(s). + * + * @returns VBox status code suitable for EM. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + */ +static int emR3RawExecuteIOInstruction(PVM pVM, PVMCPU pVCpu) +{ + STAM_PROFILE_START(&pVCpu->em.s.StatIOEmu, a); + RT_NOREF_PV(pVM); + + /* Hand it over to the interpreter. */ + VBOXSTRICTRC rcStrict = IEMExecOne(pVCpu); + LogFlow(("emR3RawExecuteIOInstruction: %Rrc\n", VBOXSTRICTRC_VAL(rcStrict))); + STAM_COUNTER_INC(&pVCpu->em.s.CTX_SUFF(pStats)->StatIoIem); + STAM_PROFILE_STOP(&pVCpu->em.s.StatIOEmu, a); + return VBOXSTRICTRC_TODO(rcStrict); +} + + +/** + * Handle a guest context trap. + * + * @returns VBox status code suitable for EM. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + */ +static int emR3RawGuestTrap(PVM pVM, PVMCPU pVCpu) +{ + /* + * Get the trap info. + */ + uint8_t u8TrapNo; + TRPMEVENT enmType; + RTGCUINT uErrorCode; + RTGCUINTPTR uCR2; + int rc = TRPMQueryTrapAll(pVCpu, &u8TrapNo, &enmType, &uErrorCode, &uCR2, NULL /* pu8InstrLen */); + if (RT_FAILURE(rc)) + { + AssertReleaseMsgFailed(("No trap! (rc=%Rrc)\n", rc)); + return rc; + } + + +#if 1 /* Experimental: Review, disable if it causes trouble. */ + /* + * Handle traps in patch code first. + * + * We catch a few of these cases in RC before returning to R3 (#PF, #GP, #BP) + * but several traps isn't handled specially by TRPM in RC and we end up here + * instead. One example is #DE. + */ + uint32_t uCpl = CPUMGetGuestCPL(pVCpu); + if ( uCpl == 0 + && PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip)) + { + LogFlow(("emR3RawGuestTrap: trap %#x in patch code; eip=%08x\n", u8TrapNo, pVCpu->cpum.GstCtx.eip)); + return emR3RawPatchTrap(pVM, pVCpu, rc); + } +#endif + + /* + * If the guest gate is marked unpatched, then we will check again if we can patch it. + * (This assumes that we've already tried and failed to dispatch the trap in + * RC for the gates that already has been patched. Which is true for most high + * volume traps, because these are handled specially, but not for odd ones like #DE.) + */ + if (TRPMR3GetGuestTrapHandler(pVM, u8TrapNo) == TRPM_INVALID_HANDLER) + { + CSAMR3CheckGates(pVM, u8TrapNo, 1); + Log(("emR3RawHandleRC: recheck gate %x -> valid=%d\n", u8TrapNo, TRPMR3GetGuestTrapHandler(pVM, u8TrapNo) != TRPM_INVALID_HANDLER)); + + /* If it was successful, then we could go back to raw mode. */ + if (TRPMR3GetGuestTrapHandler(pVM, u8TrapNo) != TRPM_INVALID_HANDLER) + { + /* Must check pending forced actions as our IDT or GDT might be out of sync. */ + rc = EMR3CheckRawForcedActions(pVM, pVCpu); + AssertRCReturn(rc, rc); + + TRPMERRORCODE enmError = uErrorCode != ~0U + ? TRPM_TRAP_HAS_ERRORCODE + : TRPM_TRAP_NO_ERRORCODE; + rc = TRPMForwardTrap(pVCpu, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), u8TrapNo, uErrorCode, enmError, TRPM_TRAP, -1); + if (rc == VINF_SUCCESS /* Don't use RT_SUCCESS */) + { + TRPMResetTrap(pVCpu); + return VINF_EM_RESCHEDULE_RAW; + } + AssertMsg(rc == VINF_EM_RAW_GUEST_TRAP, ("%Rrc\n", rc)); + } + } + + /* + * Scan kernel code that traps; we might not get another chance. + */ + /** @todo move this up before the dispatching? */ + if ( (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) <= 1 + && !pVCpu->cpum.GstCtx.eflags.Bits.u1VM) + { + Assert(!PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip)); + CSAMR3CheckCodeEx(pVM, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.eip); + } + + /* + * Trap specific handling. + */ + if (u8TrapNo == 6) /* (#UD) Invalid opcode. */ + { + /* + * If MONITOR & MWAIT are supported, then interpret them here. + */ + DISCPUSTATE cpu; + rc = CPUMR3DisasmInstrCPU(pVM, pVCpu, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.rip, &cpu, "Guest Trap (#UD): "); + if ( RT_SUCCESS(rc) + && (cpu.pCurInstr->uOpcode == OP_MONITOR || cpu.pCurInstr->uOpcode == OP_MWAIT)) + { + uint32_t u32Dummy, u32Features, u32ExtFeatures; + CPUMGetGuestCpuId(pVCpu, 1, 0, &u32Dummy, &u32Dummy, &u32ExtFeatures, &u32Features); + if (u32ExtFeatures & X86_CPUID_FEATURE_ECX_MONITOR) + { + rc = TRPMResetTrap(pVCpu); + AssertRC(rc); + + rc = VBOXSTRICTRC_TODO(EMInterpretInstructionDisasState(pVCpu, &cpu, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), + 0, EMCODETYPE_SUPERVISOR)); + if (RT_SUCCESS(rc)) + return rc; + return emR3RawExecuteInstruction(pVM, pVCpu, "Monitor: "); + } + } + } + else if (u8TrapNo == 13) /* (#GP) Privileged exception */ + { + /* + * Handle I/O bitmap? + */ + /** @todo We're not supposed to be here with a false guest trap concerning + * I/O access. We can easily handle those in RC. */ + DISCPUSTATE cpu; + rc = CPUMR3DisasmInstrCPU(pVM, pVCpu, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.rip, &cpu, "Guest Trap: "); + if ( RT_SUCCESS(rc) + && (cpu.pCurInstr->fOpType & DISOPTYPE_PORTIO)) + { + /* + * We should really check the TSS for the IO bitmap, but it's not like this + * lazy approach really makes things worse. + */ + rc = TRPMResetTrap(pVCpu); + AssertRC(rc); + return emR3RawExecuteInstruction(pVM, pVCpu, "IO Guest Trap: "); + } + } + +#ifdef LOG_ENABLED + DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", "Guest trap"); + DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "Guest trap"); + + /* Get guest page information. */ + uint64_t fFlags = 0; + RTGCPHYS GCPhys = 0; + int rc2 = PGMGstGetPage(pVCpu, uCR2, &fFlags, &GCPhys); + Log(("emR3RawGuestTrap: cs:eip=%04x:%08x: trap=%02x err=%08x cr2=%08x cr0=%08x%s: Phys=%RGp fFlags=%08llx %s %s %s%s rc2=%d\n", + pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, u8TrapNo, uErrorCode, uCR2, (uint32_t)pVCpu->cpum.GstCtx.cr0, + (enmType == TRPM_SOFTWARE_INT) ? " software" : "", GCPhys, fFlags, + fFlags & X86_PTE_P ? "P " : "NP", fFlags & X86_PTE_US ? "U" : "S", + fFlags & X86_PTE_RW ? "RW" : "R0", fFlags & X86_PTE_G ? " G" : "", rc2)); +#endif + + /* + * #PG has CR2. + * (Because of stuff like above we must set CR2 in a delayed fashion.) + */ + if (u8TrapNo == 14 /* #PG */) + pVCpu->cpum.GstCtx.cr2 = uCR2; + + return VINF_EM_RESCHEDULE_REM; +} + + +/** + * Handle a ring switch trap. + * Need to do statistics and to install patches. The result is going to REM. + * + * @returns VBox status code suitable for EM. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + */ +static int emR3RawRingSwitch(PVM pVM, PVMCPU pVCpu) +{ + int rc; + DISCPUSTATE Cpu; + + /* + * sysenter, syscall & callgate + */ + rc = CPUMR3DisasmInstrCPU(pVM, pVCpu, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.rip, &Cpu, "RSWITCH: "); + if (RT_SUCCESS(rc)) + { + if (Cpu.pCurInstr->uOpcode == OP_SYSENTER) + { + if (pVCpu->cpum.GstCtx.SysEnter.cs != 0) + { + rc = PATMR3InstallPatch(pVM, SELMToFlat(pVM, DISSELREG_CS, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), pVCpu->cpum.GstCtx.eip), + CPUMGetGuestCodeBits(pVCpu) == 32 ? PATMFL_CODE32 : 0); + if (RT_SUCCESS(rc)) + { + DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "Patched sysenter instruction"); + return VINF_EM_RESCHEDULE_RAW; + } + } + } + +#ifdef VBOX_WITH_STATISTICS + switch (Cpu.pCurInstr->uOpcode) + { + case OP_SYSENTER: + STAM_COUNTER_INC(&pVCpu->em.s.CTX_SUFF(pStats)->StatSysEnter); + break; + case OP_SYSEXIT: + STAM_COUNTER_INC(&pVCpu->em.s.CTX_SUFF(pStats)->StatSysExit); + break; + case OP_SYSCALL: + STAM_COUNTER_INC(&pVCpu->em.s.CTX_SUFF(pStats)->StatSysCall); + break; + case OP_SYSRET: + STAM_COUNTER_INC(&pVCpu->em.s.CTX_SUFF(pStats)->StatSysRet); + break; + } +#endif + } + else + AssertRC(rc); + + /* go to the REM to emulate a single instruction */ + return emR3RawExecuteInstruction(pVM, pVCpu, "RSWITCH: "); +} + + +/** + * Handle a trap (\#PF or \#GP) in patch code + * + * @returns VBox status code suitable for EM. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + * @param gcret GC return code. + */ +static int emR3RawPatchTrap(PVM pVM, PVMCPU pVCpu, int gcret) +{ + uint8_t u8TrapNo; + int rc; + TRPMEVENT enmType; + RTGCUINT uErrorCode; + RTGCUINTPTR uCR2; + + Assert(PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip)); + + if (gcret == VINF_PATM_PATCH_INT3) + { + u8TrapNo = 3; + uCR2 = 0; + uErrorCode = 0; + } + else if (gcret == VINF_PATM_PATCH_TRAP_GP) + { + /* No active trap in this case. Kind of ugly. */ + u8TrapNo = X86_XCPT_GP; + uCR2 = 0; + uErrorCode = 0; + } + else + { + rc = TRPMQueryTrapAll(pVCpu, &u8TrapNo, &enmType, &uErrorCode, &uCR2, NULL /* pu8InstrLen */); + if (RT_FAILURE(rc)) + { + AssertReleaseMsgFailed(("emR3RawPatchTrap: no trap! (rc=%Rrc) gcret=%Rrc\n", rc, gcret)); + return rc; + } + /* Reset the trap as we'll execute the original instruction again. */ + TRPMResetTrap(pVCpu); + } + + /* + * Deal with traps inside patch code. + * (This code won't run outside GC.) + */ + if (u8TrapNo != 1) + { +#ifdef LOG_ENABLED + DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", "Trap in patch code"); + DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "Patch code"); + + DISCPUSTATE Cpu; + rc = CPUMR3DisasmInstrCPU(pVM, pVCpu, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.eip, &Cpu, "Patch code: "); + if ( RT_SUCCESS(rc) + && Cpu.pCurInstr->uOpcode == OP_IRET) + { + uint32_t eip, selCS, uEFlags; + + /* Iret crashes are bad as we have already changed the flags on the stack */ + rc = PGMPhysSimpleReadGCPtr(pVCpu, &eip, pVCpu->cpum.GstCtx.esp, 4); + rc |= PGMPhysSimpleReadGCPtr(pVCpu, &selCS, pVCpu->cpum.GstCtx.esp+4, 4); + rc |= PGMPhysSimpleReadGCPtr(pVCpu, &uEFlags, pVCpu->cpum.GstCtx.esp+8, 4); + if (rc == VINF_SUCCESS) + { + if ( (uEFlags & X86_EFL_VM) + || (selCS & X86_SEL_RPL) == 3) + { + uint32_t selSS, esp; + + rc |= PGMPhysSimpleReadGCPtr(pVCpu, &esp, pVCpu->cpum.GstCtx.esp + 12, 4); + rc |= PGMPhysSimpleReadGCPtr(pVCpu, &selSS, pVCpu->cpum.GstCtx.esp + 16, 4); + + if (uEFlags & X86_EFL_VM) + { + uint32_t selDS, selES, selFS, selGS; + rc = PGMPhysSimpleReadGCPtr(pVCpu, &selES, pVCpu->cpum.GstCtx.esp + 20, 4); + rc |= PGMPhysSimpleReadGCPtr(pVCpu, &selDS, pVCpu->cpum.GstCtx.esp + 24, 4); + rc |= PGMPhysSimpleReadGCPtr(pVCpu, &selFS, pVCpu->cpum.GstCtx.esp + 28, 4); + rc |= PGMPhysSimpleReadGCPtr(pVCpu, &selGS, pVCpu->cpum.GstCtx.esp + 32, 4); + if (rc == VINF_SUCCESS) + { + Log(("Patch code: IRET->VM stack frame: return address %04X:%08RX32 eflags=%08x ss:esp=%04X:%08RX32\n", selCS, eip, uEFlags, selSS, esp)); + Log(("Patch code: IRET->VM stack frame: DS=%04X ES=%04X FS=%04X GS=%04X\n", selDS, selES, selFS, selGS)); + } + } + else + Log(("Patch code: IRET stack frame: return address %04X:%08RX32 eflags=%08x ss:esp=%04X:%08RX32\n", selCS, eip, uEFlags, selSS, esp)); + } + else + Log(("Patch code: IRET stack frame: return address %04X:%08RX32 eflags=%08x\n", selCS, eip, uEFlags)); + } + } +#endif /* LOG_ENABLED */ + Log(("emR3RawPatchTrap: in patch: eip=%08x: trap=%02x err=%08x cr2=%08x cr0=%08x\n", + pVCpu->cpum.GstCtx.eip, u8TrapNo, uErrorCode, uCR2, (uint32_t)pVCpu->cpum.GstCtx.cr0)); + + RTGCPTR uNewEip; + rc = PATMR3HandleTrap(pVM, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.eip, &uNewEip); + switch (rc) + { + /* + * Execute the faulting instruction. + */ + case VINF_SUCCESS: + { + /** @todo execute a whole block */ + Log(("emR3RawPatchTrap: Executing faulting instruction at new address %RGv\n", uNewEip)); + if (!(pVCpu->em.s.pPatmGCState->uVMFlags & X86_EFL_IF)) + Log(("emR3RawPatchTrap: Virtual IF flag disabled!!\n")); + + pVCpu->cpum.GstCtx.eip = uNewEip; + AssertRelease(pVCpu->cpum.GstCtx.eip); + + if (pVCpu->cpum.GstCtx.eflags.Bits.u1IF) + { + /* Windows XP lets irets fault intentionally and then takes action based on the opcode; an + * int3 patch overwrites it and leads to blue screens. Remove the patch in this case. + */ + if ( u8TrapNo == X86_XCPT_GP + && PATMIsInt3Patch(pVM, pVCpu->cpum.GstCtx.eip, NULL, NULL)) + { + /** @todo move to PATMR3HandleTrap */ + Log(("Possible Windows XP iret fault at %08RX32\n", pVCpu->cpum.GstCtx.eip)); + PATMR3RemovePatch(pVM, pVCpu->cpum.GstCtx.eip); + } + + /** @todo Knoppix 5 regression when returning VINF_SUCCESS here and going back to raw mode. */ + /* Note: possibly because a reschedule is required (e.g. iret to V86 code) */ + + return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHIR"); + /* Interrupts are enabled; just go back to the original instruction. + return VINF_SUCCESS; */ + } + return VINF_EM_RESCHEDULE_REM; + } + + /* + * One instruction. + */ + case VINF_PATCH_EMULATE_INSTR: + Log(("emR3RawPatchTrap: Emulate patched instruction at %RGv IF=%d VMIF=%x\n", + uNewEip, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pVCpu->em.s.pPatmGCState->uVMFlags)); + pVCpu->cpum.GstCtx.eip = uNewEip; + AssertRelease(pVCpu->cpum.GstCtx.eip); + return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHEMUL: "); + + /* + * The patch was disabled, hand it to the REM. + */ + case VERR_PATCH_DISABLED: + if (!(pVCpu->em.s.pPatmGCState->uVMFlags & X86_EFL_IF)) + Log(("emR3RawPatchTrap: Virtual IF flag disabled!!\n")); + pVCpu->cpum.GstCtx.eip = uNewEip; + AssertRelease(pVCpu->cpum.GstCtx.eip); + + if (pVCpu->cpum.GstCtx.eflags.Bits.u1IF) + { + /* + * The last instruction in the patch block needs to be executed!! (sti/sysexit for example) + */ + Log(("PATCH: IF=1 -> emulate last instruction as it can't be interrupted!!\n")); + return emR3RawExecuteInstruction(pVM, pVCpu, "PATCHIR"); + } + return VINF_EM_RESCHEDULE_REM; + + /* Force continued patch exection; usually due to write monitored stack. */ + case VINF_PATCH_CONTINUE: + return VINF_SUCCESS; + + /* + * Anything else is *fatal*. + */ + default: + AssertReleaseMsgFailed(("Unknown return code %Rrc from PATMR3HandleTrap!\n", rc)); + return VERR_IPE_UNEXPECTED_STATUS; + } + } + return VINF_SUCCESS; +} + + +/** + * Handle a privileged instruction. + * + * @returns VBox status code suitable for EM. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + */ +static int emR3RawPrivileged(PVM pVM, PVMCPU pVCpu) +{ + Assert(!pVCpu->cpum.GstCtx.eflags.Bits.u1VM); + + if (PATMIsEnabled(pVM)) + { + /* + * Check if in patch code. + */ + if (PATMR3IsInsidePatchJump(pVM, pVCpu->cpum.GstCtx.eip, NULL)) + { +#ifdef LOG_ENABLED + DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", "PRIV"); +#endif + AssertMsgFailed(("FATAL ERROR: executing random instruction inside generated patch jump %08x\n", pVCpu->cpum.GstCtx.eip)); + return VERR_EM_RAW_PATCH_CONFLICT; + } + if ( (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 0 + && !pVCpu->cpum.GstCtx.eflags.Bits.u1VM + && !PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip)) + { + int rc = PATMR3InstallPatch(pVM, SELMToFlat(pVM, DISSELREG_CS, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), pVCpu->cpum.GstCtx.eip), + CPUMGetGuestCodeBits(pVCpu) == 32 ? PATMFL_CODE32 : 0); + if (RT_SUCCESS(rc)) + { +#ifdef LOG_ENABLED + DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", "PRIV"); +#endif + DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "Patched privileged instruction"); + return VINF_SUCCESS; + } + } + } + +#ifdef LOG_ENABLED + if (!PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip)) + { + DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", "PRIV"); + DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "Privileged instr"); + } +#endif + + /* + * Instruction statistics and logging. + */ + DISCPUSTATE Cpu; + int rc; + + rc = CPUMR3DisasmInstrCPU(pVM, pVCpu, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.rip, &Cpu, "PRIV: "); + if (RT_SUCCESS(rc)) + { +#ifdef VBOX_WITH_STATISTICS + PEMSTATS pStats = pVCpu->em.s.CTX_SUFF(pStats); + switch (Cpu.pCurInstr->uOpcode) + { + case OP_INVLPG: + STAM_COUNTER_INC(&pStats->StatInvlpg); + break; + case OP_IRET: + STAM_COUNTER_INC(&pStats->StatIret); + break; + case OP_CLI: + STAM_COUNTER_INC(&pStats->StatCli); + emR3RecordCli(pVM, pVCpu, pVCpu->cpum.GstCtx.rip); + break; + case OP_STI: + STAM_COUNTER_INC(&pStats->StatSti); + break; + case OP_INSB: + case OP_INSWD: + case OP_IN: + case OP_OUTSB: + case OP_OUTSWD: + case OP_OUT: + AssertMsgFailed(("Unexpected privileged exception due to port IO\n")); + break; + + case OP_MOV_CR: + if (Cpu.Param1.fUse & DISUSE_REG_GEN32) + { + //read + Assert(Cpu.Param2.fUse & DISUSE_REG_CR); + Assert(Cpu.Param2.Base.idxCtrlReg <= DISCREG_CR4); + STAM_COUNTER_INC(&pStats->StatMovReadCR[Cpu.Param2.Base.idxCtrlReg]); + } + else + { + //write + Assert(Cpu.Param1.fUse & DISUSE_REG_CR); + Assert(Cpu.Param1.Base.idxCtrlReg <= DISCREG_CR4); + STAM_COUNTER_INC(&pStats->StatMovWriteCR[Cpu.Param1.Base.idxCtrlReg]); + } + break; + + case OP_MOV_DR: + STAM_COUNTER_INC(&pStats->StatMovDRx); + break; + case OP_LLDT: + STAM_COUNTER_INC(&pStats->StatMovLldt); + break; + case OP_LIDT: + STAM_COUNTER_INC(&pStats->StatMovLidt); + break; + case OP_LGDT: + STAM_COUNTER_INC(&pStats->StatMovLgdt); + break; + case OP_SYSENTER: + STAM_COUNTER_INC(&pStats->StatSysEnter); + break; + case OP_SYSEXIT: + STAM_COUNTER_INC(&pStats->StatSysExit); + break; + case OP_SYSCALL: + STAM_COUNTER_INC(&pStats->StatSysCall); + break; + case OP_SYSRET: + STAM_COUNTER_INC(&pStats->StatSysRet); + break; + case OP_HLT: + STAM_COUNTER_INC(&pStats->StatHlt); + break; + default: + STAM_COUNTER_INC(&pStats->StatMisc); + Log4(("emR3RawPrivileged: opcode=%d\n", Cpu.pCurInstr->uOpcode)); + break; + } +#endif /* VBOX_WITH_STATISTICS */ + if ( (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 0 + && !pVCpu->cpum.GstCtx.eflags.Bits.u1VM + && CPUMGetGuestCodeBits(pVCpu) == 32) + { + STAM_PROFILE_START(&pVCpu->em.s.StatPrivEmu, a); + switch (Cpu.pCurInstr->uOpcode) + { + case OP_CLI: + pVCpu->cpum.GstCtx.eflags.u32 &= ~X86_EFL_IF; + Assert(Cpu.cbInstr == 1); + pVCpu->cpum.GstCtx.rip += Cpu.cbInstr; + STAM_PROFILE_STOP(&pVCpu->em.s.StatPrivEmu, a); + return VINF_EM_RESCHEDULE_REM; /* must go to the recompiler now! */ + + case OP_STI: + pVCpu->cpum.GstCtx.eflags.u32 |= X86_EFL_IF; + EMSetInhibitInterruptsPC(pVCpu, pVCpu->cpum.GstCtx.rip + Cpu.cbInstr); + Assert(Cpu.cbInstr == 1); + pVCpu->cpum.GstCtx.rip += Cpu.cbInstr; + STAM_PROFILE_STOP(&pVCpu->em.s.StatPrivEmu, a); + return VINF_SUCCESS; + + case OP_HLT: + if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip)) + { + PATMTRANSSTATE enmState; + RTGCPTR pOrgInstrGC = PATMR3PatchToGCPtr(pVM, pVCpu->cpum.GstCtx.eip, &enmState); + + if (enmState == PATMTRANS_OVERWRITTEN) + { + rc = PATMR3DetectConflict(pVM, pOrgInstrGC, pOrgInstrGC); + Assert(rc == VERR_PATCH_DISABLED); + /* Conflict detected, patch disabled */ + Log(("emR3RawPrivileged: detected conflict -> disabled patch at %08RX32\n", pVCpu->cpum.GstCtx.eip)); + + enmState = PATMTRANS_SAFE; + } + + /* The translation had better be successful. Otherwise we can't recover. */ + AssertReleaseMsg(pOrgInstrGC && enmState != PATMTRANS_OVERWRITTEN, ("Unable to translate instruction address at %08RX32\n", pVCpu->cpum.GstCtx.eip)); + if (enmState != PATMTRANS_OVERWRITTEN) + pVCpu->cpum.GstCtx.eip = pOrgInstrGC; + } + /* no break; we could just return VINF_EM_HALT here */ + RT_FALL_THRU(); + + case OP_MOV_CR: + case OP_MOV_DR: +#ifdef LOG_ENABLED + if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip)) + { + DBGFR3_INFO_LOG(pVM, pVCpu, "cpumguest", "PRIV"); + DBGFR3_DISAS_INSTR_CUR_LOG(pVCpu, "Privileged instr"); + } +#endif + + rc = VBOXSTRICTRC_TODO(EMInterpretInstructionDisasState(pVCpu, &Cpu, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), + 0, EMCODETYPE_SUPERVISOR)); + if (RT_SUCCESS(rc)) + { + STAM_PROFILE_STOP(&pVCpu->em.s.StatPrivEmu, a); + + if ( Cpu.pCurInstr->uOpcode == OP_MOV_CR + && Cpu.Param1.fUse == DISUSE_REG_CR /* write */ + ) + { + /* Deal with CR0 updates inside patch code that force + * us to go to the recompiler. + */ + if ( PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.rip) + && (pVCpu->cpum.GstCtx.cr0 & (X86_CR0_WP|X86_CR0_PG|X86_CR0_PE)) != (X86_CR0_WP|X86_CR0_PG|X86_CR0_PE)) + { + PATMTRANSSTATE enmState; + RTGCPTR pOrgInstrGC = PATMR3PatchToGCPtr(pVM, pVCpu->cpum.GstCtx.rip, &enmState); + + Log(("Force recompiler switch due to cr0 (%RGp) update rip=%RGv -> %RGv (enmState=%d)\n", pVCpu->cpum.GstCtx.cr0, pVCpu->cpum.GstCtx.rip, pOrgInstrGC, enmState)); + if (enmState == PATMTRANS_OVERWRITTEN) + { + rc = PATMR3DetectConflict(pVM, pOrgInstrGC, pOrgInstrGC); + Assert(rc == VERR_PATCH_DISABLED); + /* Conflict detected, patch disabled */ + Log(("emR3RawPrivileged: detected conflict -> disabled patch at %RGv\n", (RTGCPTR)pVCpu->cpum.GstCtx.rip)); + enmState = PATMTRANS_SAFE; + } + /* The translation had better be successful. Otherwise we can't recover. */ + AssertReleaseMsg(pOrgInstrGC && enmState != PATMTRANS_OVERWRITTEN, ("Unable to translate instruction address at %RGv\n", (RTGCPTR)pVCpu->cpum.GstCtx.rip)); + if (enmState != PATMTRANS_OVERWRITTEN) + pVCpu->cpum.GstCtx.rip = pOrgInstrGC; + } + + /* Reschedule is necessary as the execution/paging mode might have changed. */ + return VINF_EM_RESCHEDULE; + } + return rc; /* can return VINF_EM_HALT as well. */ + } + AssertMsgReturn(rc == VERR_EM_INTERPRETER, ("%Rrc\n", rc), rc); + break; /* fall back to the recompiler */ + } + STAM_PROFILE_STOP(&pVCpu->em.s.StatPrivEmu, a); + } + } + + if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip)) + return emR3RawPatchTrap(pVM, pVCpu, VINF_PATM_PATCH_TRAP_GP); + + return emR3RawExecuteInstruction(pVM, pVCpu, "PRIV"); +} + + +/** + * Update the forced rawmode execution modifier. + * + * This function is called when we're returning from the raw-mode loop(s). If we're + * in patch code, it will set a flag forcing execution to be resumed in raw-mode, + * if not in patch code, the flag will be cleared. + * + * We should never interrupt patch code while it's being executed. Cli patches can + * contain big code blocks, but they are always executed with IF=0. Other patches + * replace single instructions and should be atomic. + * + * @returns Updated rc. + * + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + * @param rc The result code. + */ +static int emR3RawUpdateForceFlag(PVM pVM, PVMCPU pVCpu, int rc) +{ + if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip)) /** @todo check cs selector base/type */ + { + /* ignore reschedule attempts. */ + switch (rc) + { + case VINF_EM_RESCHEDULE: + case VINF_EM_RESCHEDULE_REM: + LogFlow(("emR3RawUpdateForceFlag: patch address -> force raw reschedule\n")); + rc = VINF_SUCCESS; + break; + } + pVCpu->em.s.fForceRAW = true; + } + else + pVCpu->em.s.fForceRAW = false; + return rc; +} + + +/** + * Check for pending raw actions + * + * @returns VBox status code. May return VINF_EM_NO_MEMORY but none of the other + * EM statuses. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + */ +VMMR3_INT_DECL(int) EMR3CheckRawForcedActions(PVM pVM, PVMCPU pVCpu) +{ + int rc = emR3RawForcedActions(pVM, pVCpu); + VBOXVMM_EM_FF_RAW_RET(pVCpu, rc); + return rc; +} + + +/** + * Process raw-mode specific forced actions. + * + * This function is called when any FFs in the VM_FF_HIGH_PRIORITY_PRE_RAW_MASK is pending. + * + * @returns VBox status code. May return VINF_EM_NO_MEMORY but none of the other + * EM statuses. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + */ +static int emR3RawForcedActions(PVM pVM, PVMCPU pVCpu) +{ + /* + * Note that the order is *vitally* important! + * Also note that SELMR3UpdateFromCPUM may trigger VM_FF_SELM_SYNC_TSS. + */ + VBOXVMM_EM_FF_RAW(pVCpu, pVM->fGlobalForcedActions, pVCpu->fLocalForcedActions); + + /* + * Sync selector tables. + */ + if (VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_GDT | VMCPU_FF_SELM_SYNC_LDT)) + { + VBOXSTRICTRC rcStrict = SELMR3UpdateFromCPUM(pVM, pVCpu); + if (rcStrict != VINF_SUCCESS) + return VBOXSTRICTRC_TODO(rcStrict); + } + + /* + * Sync IDT. + * + * The CSAMR3CheckGates call in TRPMR3SyncIDT may call PGMPrefetchPage + * and PGMShwModifyPage, so we're in for trouble if for instance a + * PGMSyncCR3+pgmR3PoolClearAll is pending. + */ + if (VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_TRPM_SYNC_IDT)) + { + if ( VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3) + && EMIsRawRing0Enabled(pVM) + && CSAMIsEnabled(pVM)) + { + int rc = PGMSyncCR3(pVCpu, pVCpu->cpum.GstCtx.cr0, pVCpu->cpum.GstCtx.cr3, pVCpu->cpum.GstCtx.cr4, VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3)); + if (RT_FAILURE(rc)) + return rc; + } + + int rc = TRPMR3SyncIDT(pVM, pVCpu); + if (RT_FAILURE(rc)) + return rc; + } + + /* + * Sync TSS. + */ + if (VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_SELM_SYNC_TSS)) + { + int rc = SELMR3SyncTSS(pVM, pVCpu); + if (RT_FAILURE(rc)) + return rc; + } + + /* + * Sync page directory. + */ + if (VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3 | VMCPU_FF_PGM_SYNC_CR3_NON_GLOBAL)) + { + Assert(pVCpu->em.s.enmState != EMSTATE_WAIT_SIPI); + int rc = PGMSyncCR3(pVCpu, pVCpu->cpum.GstCtx.cr0, pVCpu->cpum.GstCtx.cr3, pVCpu->cpum.GstCtx.cr4, VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3)); + if (RT_FAILURE(rc)) + return rc == VERR_PGM_NO_HYPERVISOR_ADDRESS ? VINF_EM_RESCHEDULE_REM : rc; + + Assert(!VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_GDT | VMCPU_FF_SELM_SYNC_LDT)); + + /* Prefetch pages for EIP and ESP. */ + /** @todo This is rather expensive. Should investigate if it really helps at all. */ + rc = PGMPrefetchPage(pVCpu, SELMToFlat(pVM, DISSELREG_CS, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), pVCpu->cpum.GstCtx.rip)); + if (rc == VINF_SUCCESS) + rc = PGMPrefetchPage(pVCpu, SELMToFlat(pVM, DISSELREG_SS, CPUMCTX2CORE(&pVCpu->cpum.GstCtx), pVCpu->cpum.GstCtx.rsp)); + if (rc != VINF_SUCCESS) + { + if (rc != VINF_PGM_SYNC_CR3) + { + AssertLogRelMsgReturn(RT_FAILURE(rc), ("%Rrc\n", rc), VERR_IPE_UNEXPECTED_INFO_STATUS); + return rc; + } + rc = PGMSyncCR3(pVCpu, pVCpu->cpum.GstCtx.cr0, pVCpu->cpum.GstCtx.cr3, pVCpu->cpum.GstCtx.cr4, VMCPU_FF_IS_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3)); + if (RT_FAILURE(rc)) + return rc; + } + /** @todo maybe prefetch the supervisor stack page as well */ + Assert(!VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_GDT | VMCPU_FF_SELM_SYNC_LDT)); + } + + /* + * Allocate handy pages (just in case the above actions have consumed some pages). + */ + if (VM_FF_IS_PENDING_EXCEPT(pVM, VM_FF_PGM_NEED_HANDY_PAGES, VM_FF_PGM_NO_MEMORY)) + { + int rc = PGMR3PhysAllocateHandyPages(pVM); + if (RT_FAILURE(rc)) + return rc; + } + + /* + * Check whether we're out of memory now. + * + * This may stem from some of the above actions or operations that has been executed + * since we ran FFs. The allocate handy pages must for instance always be followed by + * this check. + */ + if (VM_FF_IS_SET(pVM, VM_FF_PGM_NO_MEMORY)) + return VINF_EM_NO_MEMORY; + + return VINF_SUCCESS; +} + + +/** + * Executes raw code. + * + * This function contains the raw-mode version of the inner + * execution loop (the outer loop being in EMR3ExecuteVM()). + * + * @returns VBox status code. The most important ones are: VINF_EM_RESCHEDULE, + * VINF_EM_RESCHEDULE_REM, VINF_EM_SUSPEND, VINF_EM_RESET and VINF_EM_TERMINATE. + * + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + * @param pfFFDone Where to store an indicator telling whether or not + * FFs were done before returning. + */ +int emR3RawExecute(PVM pVM, PVMCPU pVCpu, bool *pfFFDone) +{ + STAM_REL_PROFILE_ADV_START(&pVCpu->em.s.StatRAWTotal, a); + + int rc = VERR_IPE_UNINITIALIZED_STATUS; + LogFlow(("emR3RawExecute: (cs:eip=%04x:%08x)\n", pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip)); + pVCpu->em.s.fForceRAW = false; + *pfFFDone = false; + + + /* + * + * Spin till we get a forced action or raw mode status code resulting in + * in anything but VINF_SUCCESS or VINF_EM_RESCHEDULE_RAW. + * + */ + for (;;) + { + STAM_PROFILE_ADV_START(&pVCpu->em.s.StatRAWEntry, b); + + /* + * Check various preconditions. + */ +#ifdef VBOX_STRICT + Assert(pVCpu->cpum.GstCtx.eflags.Bits.u1VM || (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 3 || (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 0 + || (EMIsRawRing1Enabled(pVM) && (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 1)); + AssertMsg( (pVCpu->cpum.GstCtx.eflags.u32 & X86_EFL_IF) + || PATMShouldUseRawMode(pVM, (RTGCPTR)pVCpu->cpum.GstCtx.eip), + ("Tried to execute code with IF at EIP=%08x!\n", pVCpu->cpum.GstCtx.eip)); + if ( !VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3 | VMCPU_FF_PGM_SYNC_CR3_NON_GLOBAL) + && PGMMapHasConflicts(pVM)) + { + PGMMapCheck(pVM); + AssertMsgFailed(("We should not get conflicts any longer!!!\n")); + return VERR_EM_UNEXPECTED_MAPPING_CONFLICT; + } +#endif /* VBOX_STRICT */ + + /* + * Process high priority pre-execution raw-mode FFs. + */ + if ( VM_FF_IS_ANY_SET(pVM, VM_FF_HIGH_PRIORITY_PRE_RAW_MASK) + || VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_HIGH_PRIORITY_PRE_RAW_MASK)) + { + rc = emR3RawForcedActions(pVM, pVCpu); + VBOXVMM_EM_FF_RAW_RET(pVCpu, rc); + if (rc != VINF_SUCCESS) + break; + } + + /* + * If we're going to execute ring-0 code, the guest state needs to + * be modified a bit and some of the state components (IF, SS/CS RPL, + * and perhaps EIP) needs to be stored with PATM. + */ + rc = CPUMRawEnter(pVCpu); + if (rc != VINF_SUCCESS) + { + STAM_PROFILE_ADV_STOP(&pVCpu->em.s.StatRAWEntry, b); + break; + } + + /* + * Scan code before executing it. Don't bother with user mode or V86 code + */ + if ( (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) <= 1 + && !pVCpu->cpum.GstCtx.eflags.Bits.u1VM + && !PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip)) + { + STAM_PROFILE_ADV_SUSPEND(&pVCpu->em.s.StatRAWEntry, b); + CSAMR3CheckCodeEx(pVM, &pVCpu->cpum.GstCtx, pVCpu->cpum.GstCtx.eip); + STAM_PROFILE_ADV_RESUME(&pVCpu->em.s.StatRAWEntry, b); + if ( VM_FF_IS_ANY_SET(pVM, VM_FF_HIGH_PRIORITY_PRE_RAW_MASK) + || VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_HIGH_PRIORITY_PRE_RAW_MASK)) + { + rc = emR3RawForcedActions(pVM, pVCpu); + VBOXVMM_EM_FF_RAW_RET(pVCpu, rc); + if (rc != VINF_SUCCESS) + { + rc = CPUMRawLeave(pVCpu, rc); + break; + } + } + } + +#ifdef LOG_ENABLED + /* + * Log important stuff before entering GC. + */ + PPATMGCSTATE pGCState = PATMR3QueryGCStateHC(pVM); + if (pVCpu->cpum.GstCtx.eflags.Bits.u1VM) + Log(("RV86: %04x:%08x IF=%d VMFlags=%x\n", pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pGCState->uVMFlags)); + else if ((pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 1) + Log(("RR0: %x:%08x ESP=%x:%08x EFL=%x IF=%d/%d VMFlags=%x PIF=%d CPL=%d (Scanned=%d)\n", + pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.ss.Sel, pVCpu->cpum.GstCtx.esp, CPUMRawGetEFlags(pVCpu), !!(pGCState->uVMFlags & X86_EFL_IF), pVCpu->cpum.GstCtx.eflags.Bits.u1IF, + pGCState->uVMFlags, pGCState->fPIF, (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL), CSAMIsPageScanned(pVM, (RTGCPTR)pVCpu->cpum.GstCtx.eip))); +# ifdef VBOX_WITH_RAW_RING1 + else if ((pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 2) + Log(("RR1: %x:%08x ESP=%x:%08x IF=%d VMFlags=%x CPL=%x\n", pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.ss.Sel, pVCpu->cpum.GstCtx.esp, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pGCState->uVMFlags, (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL))); +# endif + else if ((pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) == 3) + Log(("RR3: %x:%08x ESP=%x:%08x IF=%d VMFlags=%x\n", pVCpu->cpum.GstCtx.cs.Sel, pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.ss.Sel, pVCpu->cpum.GstCtx.esp, pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pGCState->uVMFlags)); +#endif /* LOG_ENABLED */ + + + + /* + * Execute the code. + */ + STAM_PROFILE_ADV_STOP(&pVCpu->em.s.StatRAWEntry, b); + if (RT_LIKELY(emR3IsExecutionAllowed(pVM, pVCpu))) + { + STAM_PROFILE_START(&pVCpu->em.s.StatRAWExec, c); + VBOXVMM_EM_RAW_RUN_PRE(pVCpu, &pVCpu->cpum.GstCtx); + rc = VMMR3RawRunGC(pVM, pVCpu); + VBOXVMM_EM_RAW_RUN_RET(pVCpu, &pVCpu->cpum.GstCtx, rc); + STAM_PROFILE_STOP(&pVCpu->em.s.StatRAWExec, c); + } + else + { + /* Give up this time slice; virtual time continues */ + STAM_REL_PROFILE_ADV_START(&pVCpu->em.s.StatCapped, u); + RTThreadSleep(5); + STAM_REL_PROFILE_ADV_STOP(&pVCpu->em.s.StatCapped, u); + rc = VINF_SUCCESS; + } + STAM_PROFILE_ADV_START(&pVCpu->em.s.StatRAWTail, d); + + LogFlow(("RR%u-E: %08x ESP=%08x EFL=%x IF=%d/%d VMFlags=%x PIF=%d\n", + (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL), pVCpu->cpum.GstCtx.eip, pVCpu->cpum.GstCtx.esp, CPUMRawGetEFlags(pVCpu), + !!(pGCState->uVMFlags & X86_EFL_IF), pVCpu->cpum.GstCtx.eflags.Bits.u1IF, pGCState->uVMFlags, pGCState->fPIF)); + LogFlow(("VMMR3RawRunGC returned %Rrc\n", rc)); + + + + /* + * Restore the real CPU state and deal with high priority post + * execution FFs before doing anything else. + */ + rc = CPUMRawLeave(pVCpu, rc); + VMCPU_FF_CLEAR_MASK(pVCpu, VMCPU_FF_RESUME_GUEST_MASK); + if ( VM_FF_IS_ANY_SET(pVM, VM_FF_HIGH_PRIORITY_POST_MASK) + || VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_HIGH_PRIORITY_POST_MASK)) + rc = VBOXSTRICTRC_TODO(emR3HighPriorityPostForcedActions(pVM, pVCpu, rc)); + +#ifdef VBOX_STRICT + /* + * Assert TSS consistency & rc vs patch code. + */ + if ( !VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_SELM_SYNC_TSS | VMCPU_FF_SELM_SYNC_GDT) /* GDT implies TSS at the moment. */ + && EMIsRawRing0Enabled(pVM)) + SELMR3CheckTSS(pVM); + switch (rc) + { + case VINF_SUCCESS: + case VINF_EM_RAW_INTERRUPT: + case VINF_PATM_PATCH_TRAP_PF: + case VINF_PATM_PATCH_TRAP_GP: + case VINF_PATM_PATCH_INT3: + case VINF_PATM_CHECK_PATCH_PAGE: + case VINF_EM_RAW_EXCEPTION_PRIVILEGED: + case VINF_EM_RAW_GUEST_TRAP: + case VINF_EM_RESCHEDULE_RAW: + break; + + default: + if (PATMIsPatchGCAddr(pVM, pVCpu->cpum.GstCtx.eip) && !(pVCpu->cpum.GstCtx.eflags.u32 & X86_EFL_TF)) + LogIt(0, LOG_GROUP_PATM, ("Patch code interrupted at %RRv for reason %Rrc\n", (RTRCPTR)CPUMGetGuestEIP(pVCpu), rc)); + break; + } + /* + * Let's go paranoid! + */ + if ( !VMCPU_FF_IS_ANY_SET(pVCpu, VMCPU_FF_PGM_SYNC_CR3 | VMCPU_FF_PGM_SYNC_CR3_NON_GLOBAL) + && PGMMapHasConflicts(pVM)) + { + PGMMapCheck(pVM); + AssertMsgFailed(("We should not get conflicts any longer!!! rc=%Rrc\n", rc)); + return VERR_EM_UNEXPECTED_MAPPING_CONFLICT; + } +#endif /* VBOX_STRICT */ + + /* + * Process the returned status code. + */ + if (rc >= VINF_EM_FIRST && rc <= VINF_EM_LAST) + { + STAM_PROFILE_ADV_STOP(&pVCpu->em.s.StatRAWTail, d); + break; + } + rc = emR3RawHandleRC(pVM, pVCpu, rc); + if (rc != VINF_SUCCESS) + { + rc = emR3RawUpdateForceFlag(pVM, pVCpu, rc); + if (rc != VINF_SUCCESS) + { + STAM_PROFILE_ADV_STOP(&pVCpu->em.s.StatRAWTail, d); + break; + } + } + + /* + * Check and execute forced actions. + */ +#ifdef VBOX_HIGH_RES_TIMERS_HACK + TMTimerPollVoid(pVM, pVCpu); +#endif + STAM_PROFILE_ADV_STOP(&pVCpu->em.s.StatRAWTail, d); + if ( VM_FF_IS_ANY_SET(pVM, ~VM_FF_HIGH_PRIORITY_PRE_RAW_MASK | VM_FF_PGM_NO_MEMORY) + || VMCPU_FF_IS_ANY_SET(pVCpu, ~VMCPU_FF_HIGH_PRIORITY_PRE_RAW_MASK)) + { + Assert(pVCpu->cpum.GstCtx.eflags.Bits.u1VM || (pVCpu->cpum.GstCtx.ss.Sel & X86_SEL_RPL) != (EMIsRawRing1Enabled(pVM) ? 2U : 1U)); + + STAM_REL_PROFILE_ADV_SUSPEND(&pVCpu->em.s.StatRAWTotal, a); + rc = emR3ForcedActions(pVM, pVCpu, rc); + VBOXVMM_EM_FF_ALL_RET(pVCpu, rc); + STAM_REL_PROFILE_ADV_RESUME(&pVCpu->em.s.StatRAWTotal, a); + if ( rc != VINF_SUCCESS + && rc != VINF_EM_RESCHEDULE_RAW) + { + rc = emR3RawUpdateForceFlag(pVM, pVCpu, rc); + if (rc != VINF_SUCCESS) + { + *pfFFDone = true; + break; + } + } + } + } + + /* + * Return to outer loop. + */ +#if defined(LOG_ENABLED) && defined(DEBUG) + RTLogFlush(NULL); +#endif + STAM_REL_PROFILE_ADV_STOP(&pVCpu->em.s.StatRAWTotal, a); + return rc; +} + |