diff options
Diffstat (limited to 'src/VBox/VMM/VMMAll/DBGFAllBp.cpp')
-rw-r--r-- | src/VBox/VMM/VMMAll/DBGFAllBp.cpp | 604 |
1 files changed, 604 insertions, 0 deletions
diff --git a/src/VBox/VMM/VMMAll/DBGFAllBp.cpp b/src/VBox/VMM/VMMAll/DBGFAllBp.cpp new file mode 100644 index 00000000..b6bb2669 --- /dev/null +++ b/src/VBox/VMM/VMMAll/DBGFAllBp.cpp @@ -0,0 +1,604 @@ +/* $Id: DBGFAllBp.cpp $ */ +/** @file + * DBGF - Debugger Facility, All Context breakpoint management part. + */ + +/* + * Copyright (C) 2006-2023 Oracle and/or its affiliates. + * + * This file is part of VirtualBox base platform packages, as + * available from https://www.virtualbox.org. + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation, in version 3 of the + * License. + * + * This program is distributed in the hope that it will be useful, but + * WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, see <https://www.gnu.org/licenses>. + * + * SPDX-License-Identifier: GPL-3.0-only + */ + + +/********************************************************************************************************************************* +* Header Files * +*********************************************************************************************************************************/ +#define LOG_GROUP LOG_GROUP_DBGF +#define VMCPU_INCL_CPUM_GST_CTX +#include <VBox/vmm/dbgf.h> +#include <VBox/vmm/iem.h> +#include <VBox/vmm/pgm.h> +#include <VBox/vmm/selm.h> +#include <VBox/log.h> +#include "DBGFInternal.h" +#include <VBox/vmm/vmcc.h> +#include <VBox/err.h> +#include <iprt/assert.h> + +#include "DBGFInline.h" + + +#ifdef IN_RC +# error "You lucky person have the pleasure to implement the raw mode part for this!" +#endif + + +/** + * Returns the internal breakpoint state for the given handle. + * + * @returns Pointer to the internal breakpoint state or NULL if the handle is invalid. + * @param pVM The ring-0 VM structure pointer. + * @param hBp The breakpoint handle to resolve. + * @param ppBpR0 Where to store the pointer to the ring-0 only part of the breakpoint + * on success, optional. + */ +#ifdef IN_RING0 +DECLINLINE(PDBGFBPINT) dbgfBpGetByHnd(PVMCC pVM, DBGFBP hBp, PDBGFBPINTR0 *ppBpR0) +#else +DECLINLINE(PDBGFBPINT) dbgfBpGetByHnd(PVMCC pVM, DBGFBP hBp) +#endif +{ + uint32_t idChunk = DBGF_BP_HND_GET_CHUNK_ID(hBp); + uint32_t idxEntry = DBGF_BP_HND_GET_ENTRY(hBp); + + AssertReturn(idChunk < DBGF_BP_CHUNK_COUNT, NULL); + AssertReturn(idxEntry < DBGF_BP_COUNT_PER_CHUNK, NULL); + +#ifdef IN_RING0 + PDBGFBPCHUNKR0 pBpChunk = &pVM->dbgfr0.s.aBpChunks[idChunk]; + AssertPtrReturn(pBpChunk->CTX_SUFF(paBpBaseShared), NULL); + + if (ppBpR0) + *ppBpR0 = &pBpChunk->paBpBaseR0Only[idxEntry]; + return &pBpChunk->CTX_SUFF(paBpBaseShared)[idxEntry]; + +#elif defined(IN_RING3) + PUVM pUVM = pVM->pUVM; + PDBGFBPCHUNKR3 pBpChunk = &pUVM->dbgf.s.aBpChunks[idChunk]; + AssertPtrReturn(pBpChunk->CTX_SUFF(pBpBase), NULL); + + return &pBpChunk->CTX_SUFF(pBpBase)[idxEntry]; + +#else +# error "Unsupported context" +#endif +} + + +/** + * Returns the pointer to the L2 table entry from the given index. + * + * @returns Current context pointer to the L2 table entry or NULL if the provided index value is invalid. + * @param pVM The cross context VM structure. + * @param idxL2 The L2 table index to resolve. + * + * @note The content of the resolved L2 table entry is not validated!. + */ +DECLINLINE(PCDBGFBPL2ENTRY) dbgfBpL2GetByIdx(PVMCC pVM, uint32_t idxL2) +{ + uint32_t idChunk = DBGF_BP_L2_IDX_GET_CHUNK_ID(idxL2); + uint32_t idxEntry = DBGF_BP_L2_IDX_GET_ENTRY(idxL2); + + AssertReturn(idChunk < DBGF_BP_L2_TBL_CHUNK_COUNT, NULL); + AssertReturn(idxEntry < DBGF_BP_L2_TBL_ENTRIES_PER_CHUNK, NULL); + +#ifdef IN_RING0 + PDBGFBPL2TBLCHUNKR0 pL2Chunk = &pVM->dbgfr0.s.aBpL2TblChunks[idChunk]; + AssertPtrReturn(pL2Chunk->CTX_SUFF(paBpL2TblBaseShared), NULL); + + return &pL2Chunk->CTX_SUFF(paBpL2TblBaseShared)[idxEntry]; +#elif defined(IN_RING3) + PUVM pUVM = pVM->pUVM; + PDBGFBPL2TBLCHUNKR3 pL2Chunk = &pUVM->dbgf.s.aBpL2TblChunks[idChunk]; + AssertPtrReturn(pL2Chunk->pbmAlloc, NULL); + AssertReturn(ASMBitTest(pL2Chunk->pbmAlloc, idxEntry), NULL); + + return &pL2Chunk->CTX_SUFF(pL2Base)[idxEntry]; +#endif +} + + +#ifdef IN_RING0 +/** + * Returns the internal breakpoint owner state for the given handle. + * + * @returns Pointer to the internal ring-0 breakpoint owner state or NULL if the handle is invalid. + * @param pVM The cross context VM structure. + * @param hBpOwner The breakpoint owner handle to resolve. + */ +DECLINLINE(PCDBGFBPOWNERINTR0) dbgfR0BpOwnerGetByHnd(PVMCC pVM, DBGFBPOWNER hBpOwner) +{ + if (hBpOwner == NIL_DBGFBPOWNER) + return NULL; + + AssertReturn(hBpOwner < DBGF_BP_OWNER_COUNT_MAX, NULL); + + PCDBGFBPOWNERINTR0 pBpOwnerR0 = &pVM->dbgfr0.s.paBpOwnersR0[hBpOwner]; + AssertReturn(pBpOwnerR0->cRefs > 1, NULL); + + return pBpOwnerR0; +} +#endif + + +/** + * Executes the actions associated with the given breakpoint. + * + * @returns VBox status code. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + * @param pCtx Pointer to the register context for the CPU. + * @param hBp The breakpoint handle which hit. + * @param pBp The shared breakpoint state. + * @param pBpR0 The ring-0 only breakpoint state. + */ +#ifdef IN_RING0 +DECLINLINE(int) dbgfBpHit(PVMCC pVM, PVMCPUCC pVCpu, PCPUMCTX pCtx, DBGFBP hBp, PDBGFBPINT pBp, PDBGFBPINTR0 pBpR0) +#else +DECLINLINE(int) dbgfBpHit(PVMCC pVM, PVMCPUCC pVCpu, PCPUMCTX pCtx, DBGFBP hBp, PDBGFBPINT pBp) +#endif +{ + uint64_t cHits = ASMAtomicIncU64(&pBp->Pub.cHits); RT_NOREF(cHits); + + RT_NOREF(pCtx); + LogFlow(("dbgfBpHit: hit breakpoint %u at %04x:%RGv cHits=0x%RX64\n", hBp, pCtx->cs.Sel, pCtx->rip, cHits)); + + int rc = VINF_EM_DBG_BREAKPOINT; +#ifdef IN_RING0 + PCDBGFBPOWNERINTR0 pBpOwnerR0 = dbgfR0BpOwnerGetByHnd(pVM, + pBpR0->fInUse + ? pBpR0->hOwner + : NIL_DBGFBPOWNER); + if (pBpOwnerR0) + { + AssertReturn(pBpOwnerR0->pfnBpIoHitR0, VERR_DBGF_BP_IPE_1); + + VBOXSTRICTRC rcStrict = VINF_SUCCESS; + + if (DBGF_BP_PUB_IS_EXEC_BEFORE(&pBp->Pub)) + rcStrict = pBpOwnerR0->pfnBpHitR0(pVM, pVCpu->idCpu, pBpR0->pvUserR0, hBp, &pBp->Pub, DBGF_BP_F_HIT_EXEC_BEFORE); + if (rcStrict == VINF_SUCCESS) + { + uint8_t abInstr[DBGF_BP_INSN_MAX]; + RTGCPTR const GCPtrInstr = pVCpu->cpum.GstCtx.rip + pVCpu->cpum.GstCtx.cs.u64Base; + rc = PGMPhysSimpleReadGCPtr(pVCpu, &abInstr[0], GCPtrInstr, sizeof(abInstr)); + AssertRC(rc); + if (RT_SUCCESS(rc)) + { + /* Replace the int3 with the original instruction byte. */ + abInstr[0] = pBp->Pub.u.Int3.bOrg; + rcStrict = IEMExecOneWithPrefetchedByPC(pVCpu, GCPtrInstr, &abInstr[0], sizeof(abInstr)); + if ( rcStrict == VINF_SUCCESS + && DBGF_BP_PUB_IS_EXEC_AFTER(&pBp->Pub)) + { + rcStrict = pBpOwnerR0->pfnBpHitR0(pVM, pVCpu->idCpu, pBpR0->pvUserR0, hBp, &pBp->Pub, DBGF_BP_F_HIT_EXEC_AFTER); + if (rcStrict == VINF_SUCCESS) + rc = VINF_SUCCESS; + else if ( rcStrict == VINF_DBGF_BP_HALT + || rcStrict == VINF_DBGF_R3_BP_OWNER_DEFER) + { + pVCpu->dbgf.s.hBpActive = hBp; + if (rcStrict == VINF_DBGF_R3_BP_OWNER_DEFER) + pVCpu->dbgf.s.fBpInvokeOwnerCallback = true; + else + pVCpu->dbgf.s.fBpInvokeOwnerCallback = false; + } + else /* Guru meditation. */ + rc = VERR_DBGF_BP_OWNER_CALLBACK_WRONG_STATUS; + } + else + rc = VBOXSTRICTRC_VAL(rcStrict); + } + } + else if ( rcStrict == VINF_DBGF_BP_HALT + || rcStrict == VINF_DBGF_R3_BP_OWNER_DEFER) + { + pVCpu->dbgf.s.hBpActive = hBp; + if (rcStrict == VINF_DBGF_R3_BP_OWNER_DEFER) + pVCpu->dbgf.s.fBpInvokeOwnerCallback = true; + else + pVCpu->dbgf.s.fBpInvokeOwnerCallback = false; + } + else /* Guru meditation. */ + rc = VERR_DBGF_BP_OWNER_CALLBACK_WRONG_STATUS; + } + else + { + pVCpu->dbgf.s.fBpInvokeOwnerCallback = true; /* Need to check this for ring-3 only owners. */ + pVCpu->dbgf.s.hBpActive = hBp; + } +#else + RT_NOREF(pVM); + pVCpu->dbgf.s.fBpInvokeOwnerCallback = true; + pVCpu->dbgf.s.hBpActive = hBp; +#endif + + return rc; +} + + +/** + * Executes the actions associated with the given port I/O breakpoint. + * + * @returns VBox status code. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + * @param fBefore Flag whether the check is done before the access is carried out, + * false if it is done after the access. + * @param fAccess Access flags, see DBGFBPIOACCESS_XXX. + * @param uAddr The address of the access, for port I/O this will hold the port number. + * @param uValue The value read or written (the value for reads is only valid when DBGF_BP_F_HIT_EXEC_AFTER is set). + * @param hBp The breakpoint handle which hit. + * @param pBp The shared breakpoint state. + * @param pBpR0 The ring-0 only breakpoint state. + */ +#ifdef IN_RING0 +DECLINLINE(VBOXSTRICTRC) dbgfBpPortIoHit(PVMCC pVM, PVMCPU pVCpu, bool fBefore, uint32_t fAccess, uint64_t uAddr, uint64_t uValue, + DBGFBP hBp, PDBGFBPINT pBp, PDBGFBPINTR0 pBpR0) +#else +DECLINLINE(VBOXSTRICTRC) dbgfBpPortIoHit(PVMCC pVM, PVMCPU pVCpu, bool fBefore, uint32_t fAccess, uint64_t uAddr, uint64_t uValue, + DBGFBP hBp, PDBGFBPINT pBp) +#endif +{ + ASMAtomicIncU64(&pBp->Pub.cHits); + + VBOXSTRICTRC rcStrict = VINF_EM_DBG_BREAKPOINT; +#ifdef IN_RING0 + PCDBGFBPOWNERINTR0 pBpOwnerR0 = dbgfR0BpOwnerGetByHnd(pVM, + pBpR0->fInUse + ? pBpR0->hOwner + : NIL_DBGFBPOWNER); + if (pBpOwnerR0) + { + AssertReturn(pBpOwnerR0->pfnBpIoHitR0, VERR_DBGF_BP_IPE_1); + rcStrict = pBpOwnerR0->pfnBpIoHitR0(pVM, pVCpu->idCpuUnsafe, pBpR0->pvUserR0, hBp, &pBp->Pub, + fBefore + ? DBGF_BP_F_HIT_EXEC_BEFORE + : DBGF_BP_F_HIT_EXEC_AFTER, + fAccess, uAddr, uValue); + } + else + { + pVCpu->dbgf.s.fBpInvokeOwnerCallback = true; /* Need to check this for ring-3 only owners. */ + pVCpu->dbgf.s.hBpActive = hBp; + pVCpu->dbgf.s.fBpIoActive = true; + pVCpu->dbgf.s.fBpIoBefore = fBefore; + pVCpu->dbgf.s.uBpIoAddress = uAddr; + pVCpu->dbgf.s.fBpIoAccess = fAccess; + pVCpu->dbgf.s.uBpIoValue = uValue; + } +#else + /* Resolve owner (can be NIL_DBGFBPOWNER) and invoke callback if there is one. */ + if (pBp->Pub.hOwner != NIL_DBGFBPOWNER) + { + PCDBGFBPOWNERINT pBpOwner = dbgfR3BpOwnerGetByHnd(pVM->pUVM, pBp->Pub.hOwner); + if (pBpOwner) + { + AssertReturn(pBpOwner->pfnBpIoHitR3, VERR_DBGF_BP_IPE_1); + rcStrict = pBpOwner->pfnBpIoHitR3(pVM, pVCpu->idCpu, pBp->pvUserR3, hBp, &pBp->Pub, + fBefore + ? DBGF_BP_F_HIT_EXEC_BEFORE + : DBGF_BP_F_HIT_EXEC_AFTER, + fAccess, uAddr, uValue); + } + } +#endif + if ( rcStrict == VINF_DBGF_BP_HALT + || rcStrict == VINF_DBGF_R3_BP_OWNER_DEFER) + { + pVCpu->dbgf.s.hBpActive = hBp; + if (rcStrict == VINF_DBGF_R3_BP_OWNER_DEFER) + pVCpu->dbgf.s.fBpInvokeOwnerCallback = true; + else + pVCpu->dbgf.s.fBpInvokeOwnerCallback = false; + rcStrict = VINF_EM_DBG_BREAKPOINT; + } + else if ( rcStrict != VINF_SUCCESS + && rcStrict != VINF_EM_DBG_BREAKPOINT) + rcStrict = VERR_DBGF_BP_OWNER_CALLBACK_WRONG_STATUS; /* Guru meditation. */ + + return rcStrict; +} + + +/** + * Walks the L2 table starting at the given root index searching for the given key. + * + * @returns VBox status code. + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + * @param pCtx Pointer to the register context for the CPU. + * @param idxL2Root L2 table index of the table root. + * @param GCPtrKey The key to search for. + */ +static int dbgfBpL2Walk(PVMCC pVM, PVMCPUCC pVCpu, PCPUMCTX pCtx, uint32_t idxL2Root, RTGCUINTPTR GCPtrKey) +{ + /** @todo We don't use the depth right now but abort the walking after a fixed amount of levels. */ + uint8_t iDepth = 32; + PCDBGFBPL2ENTRY pL2Entry = dbgfBpL2GetByIdx(pVM, idxL2Root); + + while (RT_LIKELY( iDepth-- > 0 + && pL2Entry)) + { + /* Make a copy of the entry before verification. */ + DBGFBPL2ENTRY L2Entry; + L2Entry.u64GCPtrKeyAndBpHnd1 = ASMAtomicReadU64((volatile uint64_t *)&pL2Entry->u64GCPtrKeyAndBpHnd1); + L2Entry.u64LeftRightIdxDepthBpHnd2 = ASMAtomicReadU64((volatile uint64_t *)&pL2Entry->u64LeftRightIdxDepthBpHnd2); + + RTGCUINTPTR GCPtrL2Entry = DBGF_BP_L2_ENTRY_GET_GCPTR(L2Entry.u64GCPtrKeyAndBpHnd1); + if (GCPtrKey == GCPtrL2Entry) + { + DBGFBP hBp = DBGF_BP_L2_ENTRY_GET_BP_HND(L2Entry.u64GCPtrKeyAndBpHnd1, L2Entry.u64LeftRightIdxDepthBpHnd2); + + /* Query the internal breakpoint state from the handle. */ +#ifdef IN_RING3 + PDBGFBPINT pBp = dbgfBpGetByHnd(pVM, hBp); +#else + PDBGFBPINTR0 pBpR0 = NULL; + PDBGFBPINT pBp = dbgfBpGetByHnd(pVM, hBp, &pBpR0); +#endif + if ( pBp + && DBGF_BP_PUB_GET_TYPE(&pBp->Pub) == DBGFBPTYPE_INT3) +#ifdef IN_RING3 + return dbgfBpHit(pVM, pVCpu, pCtx, hBp, pBp); +#else + return dbgfBpHit(pVM, pVCpu, pCtx, hBp, pBp, pBpR0); +#endif + + /* The entry got corrupted, just abort. */ + return VERR_DBGF_BP_L2_LOOKUP_FAILED; + } + + /* Not found, get to the next level. */ + uint32_t idxL2Next = (GCPtrKey < GCPtrL2Entry) + ? DBGF_BP_L2_ENTRY_GET_IDX_LEFT(L2Entry.u64LeftRightIdxDepthBpHnd2) + : DBGF_BP_L2_ENTRY_GET_IDX_RIGHT(L2Entry.u64LeftRightIdxDepthBpHnd2); + /* It is genuine guest trap or we hit some assertion if we are at the end. */ + if (idxL2Next == DBGF_BP_L2_ENTRY_IDX_END) + return VINF_EM_RAW_GUEST_TRAP; + + pL2Entry = dbgfBpL2GetByIdx(pVM, idxL2Next); + } + + return VERR_DBGF_BP_L2_LOOKUP_FAILED; +} + + +/** + * Checks whether there is a port I/O breakpoint for the given range and access size. + * + * @returns VBox status code. + * @retval VINF_EM_DBG_BREAKPOINT means there is a breakpoint pending. + * @retval VINF_SUCCESS means everything is fine to continue. + * @retval anything else means a fatal error causing a guru meditation. + * + * @param pVM The current context VM structure. + * @param pVCpu The cross context virtual CPU structure. + * @param uIoPort The I/O port being accessed. + * @param fAccess Appropriate DBGFBPIOACCESS_XXX. + * @param uValue The value being written to or read from the device + * (The value is only valid for a read when the + * call is made after the access, writes are always valid). + * @param fBefore Flag whether the check is done before the access is carried out, + * false if it is done after the access. + */ +VMM_INT_DECL(VBOXSTRICTRC) DBGFBpCheckPortIo(PVMCC pVM, PVMCPU pVCpu, RTIOPORT uIoPort, + uint32_t fAccess, uint32_t uValue, bool fBefore) +{ + RT_NOREF(uValue); /** @todo Trigger only on specific values. */ + + /* Don't trigger in single stepping mode. */ + if (pVCpu->dbgf.s.fSingleSteppingRaw) + return VINF_SUCCESS; + +#if defined(IN_RING0) + uint32_t volatile *paBpLocPortIo = pVM->dbgfr0.s.CTX_SUFF(paBpLocPortIo); +#elif defined(IN_RING3) + PUVM pUVM = pVM->pUVM; + uint32_t volatile *paBpLocPortIo = pUVM->dbgf.s.CTX_SUFF(paBpLocPortIo); +#else +# error "Unsupported host context" +#endif + if (paBpLocPortIo) + { + const uint32_t u32Entry = ASMAtomicReadU32(&paBpLocPortIo[uIoPort]); + if (u32Entry != DBGF_BP_INT3_L1_ENTRY_TYPE_NULL) + { + uint8_t u8Type = DBGF_BP_INT3_L1_ENTRY_GET_TYPE(u32Entry); + if (RT_LIKELY(u8Type == DBGF_BP_INT3_L1_ENTRY_TYPE_BP_HND)) + { + DBGFBP hBp = DBGF_BP_INT3_L1_ENTRY_GET_BP_HND(u32Entry); + + /* Query the internal breakpoint state from the handle. */ +#ifdef IN_RING3 + PDBGFBPINT pBp = dbgfBpGetByHnd(pVM, hBp); +#else + PDBGFBPINTR0 pBpR0 = NULL; + PDBGFBPINT pBp = dbgfBpGetByHnd(pVM, hBp, &pBpR0); +#endif + if ( pBp + && DBGF_BP_PUB_GET_TYPE(&pBp->Pub) == DBGFBPTYPE_PORT_IO) + { + if ( uIoPort >= pBp->Pub.u.PortIo.uPort + && uIoPort < pBp->Pub.u.PortIo.uPort + pBp->Pub.u.PortIo.cPorts + && pBp->Pub.u.PortIo.fAccess & fAccess + && ( ( fBefore + && DBGF_BP_PUB_IS_EXEC_BEFORE(&pBp->Pub)) + || ( !fBefore + && DBGF_BP_PUB_IS_EXEC_AFTER(&pBp->Pub)))) +#ifdef IN_RING3 + return dbgfBpPortIoHit(pVM, pVCpu, fBefore, fAccess, uIoPort, uValue, hBp, pBp); +#else + return dbgfBpPortIoHit(pVM, pVCpu, fBefore, fAccess, uIoPort, uValue, hBp, pBp, pBpR0); +#endif + /* else: No matching port I/O breakpoint. */ + } + else /* Invalid breakpoint handle or not an port I/O breakpoint. */ + return VERR_DBGF_BP_L1_LOOKUP_FAILED; + } + else /* Some invalid type. */ + return VERR_DBGF_BP_L1_LOOKUP_FAILED; + } + } + + return VINF_SUCCESS; +} + + +/** + * \#DB (Debug event) handler. + * + * @returns VBox status code. + * VINF_SUCCESS means we completely handled this trap, + * other codes are passed execution to host context. + * + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + * @param pCtx Pointer to the register context for the CPU. + * @param uDr6 The DR6 hypervisor register value. + * @param fAltStepping Alternative stepping indicator. + */ +VMM_INT_DECL(int) DBGFTrap01Handler(PVM pVM, PVMCPU pVCpu, PCPUMCTX pCtx, RTGCUINTREG uDr6, bool fAltStepping) +{ + /** @todo Intel docs say that X86_DR6_BS has the highest priority... */ + RT_NOREF(pCtx); + + /* + * A breakpoint? + */ + AssertCompile(X86_DR6_B0 == 1 && X86_DR6_B1 == 2 && X86_DR6_B2 == 4 && X86_DR6_B3 == 8); + if ( (uDr6 & (X86_DR6_B0 | X86_DR6_B1 | X86_DR6_B2 | X86_DR6_B3)) + && pVM->dbgf.s.cEnabledHwBreakpoints > 0) + { + for (unsigned iBp = 0; iBp < RT_ELEMENTS(pVM->dbgf.s.aHwBreakpoints); iBp++) + if ( ((uint32_t)uDr6 & RT_BIT_32(iBp)) + && pVM->dbgf.s.aHwBreakpoints[iBp].hBp != NIL_DBGFBP) + { + pVCpu->dbgf.s.hBpActive = pVM->dbgf.s.aHwBreakpoints[iBp].hBp; + pVCpu->dbgf.s.fSingleSteppingRaw = false; + LogFlow(("DBGFRZTrap03Handler: hit hw breakpoint %x at %04x:%RGv\n", + pVM->dbgf.s.aHwBreakpoints[iBp].hBp, pCtx->cs.Sel, pCtx->rip)); + + return VINF_EM_DBG_BREAKPOINT; + } + } + + /* + * Single step? + * Are we single stepping or is it the guest? + */ + if ( (uDr6 & X86_DR6_BS) + && (pVCpu->dbgf.s.fSingleSteppingRaw || fAltStepping)) + { + pVCpu->dbgf.s.fSingleSteppingRaw = false; + LogFlow(("DBGFRZTrap01Handler: single step at %04x:%RGv\n", pCtx->cs.Sel, pCtx->rip)); + return VINF_EM_DBG_STEPPED; + } + + LogFlow(("DBGFRZTrap01Handler: guest debug event %#x at %04x:%RGv!\n", (uint32_t)uDr6, pCtx->cs.Sel, pCtx->rip)); + return VINF_EM_RAW_GUEST_TRAP; +} + + +/** + * \#BP (Breakpoint) handler. + * + * @returns VBox status code. + * VINF_SUCCESS means we completely handled this trap, + * other codes are passed execution to host context. + * + * @param pVM The cross context VM structure. + * @param pVCpu The cross context virtual CPU structure. + * @param pCtx Pointer to the register context for the CPU. + */ +VMM_INT_DECL(VBOXSTRICTRC) DBGFTrap03Handler(PVMCC pVM, PVMCPUCC pVCpu, PCPUMCTX pCtx) +{ +#if defined(IN_RING0) + uint32_t volatile *paBpLocL1 = pVM->dbgfr0.s.CTX_SUFF(paBpLocL1); +#elif defined(IN_RING3) + PUVM pUVM = pVM->pUVM; + uint32_t volatile *paBpLocL1 = pUVM->dbgf.s.CTX_SUFF(paBpLocL1); +#else +# error "Unsupported host context" +#endif + if (paBpLocL1) + { + RTGCPTR GCPtrBp; + int rc = SELMValidateAndConvertCSAddr(pVCpu, pCtx->eflags.u, pCtx->ss.Sel, pCtx->cs.Sel, &pCtx->cs, + pCtx->rip /* no -1 outside non-rawmode */, &GCPtrBp); + AssertRCReturn(rc, rc); + + const uint16_t idxL1 = DBGF_BP_INT3_L1_IDX_EXTRACT_FROM_ADDR(GCPtrBp); + const uint32_t u32L1Entry = ASMAtomicReadU32(&paBpLocL1[idxL1]); + + LogFlowFunc(("GCPtrBp=%RGv idxL1=%u u32L1Entry=%#x\n", GCPtrBp, idxL1, u32L1Entry)); + if (u32L1Entry != DBGF_BP_INT3_L1_ENTRY_TYPE_NULL) + { + uint8_t u8Type = DBGF_BP_INT3_L1_ENTRY_GET_TYPE(u32L1Entry); + if (u8Type == DBGF_BP_INT3_L1_ENTRY_TYPE_BP_HND) + { + DBGFBP hBp = DBGF_BP_INT3_L1_ENTRY_GET_BP_HND(u32L1Entry); + + /* Query the internal breakpoint state from the handle. */ +#ifdef IN_RING3 + PDBGFBPINT pBp = dbgfBpGetByHnd(pVM, hBp); +#else + PDBGFBPINTR0 pBpR0 = NULL; + PDBGFBPINT pBp = dbgfBpGetByHnd(pVM, hBp, &pBpR0); +#endif + if ( pBp + && DBGF_BP_PUB_GET_TYPE(&pBp->Pub) == DBGFBPTYPE_INT3) + { + if (pBp->Pub.u.Int3.GCPtr == (RTGCUINTPTR)GCPtrBp) +#ifdef IN_RING3 + rc = dbgfBpHit(pVM, pVCpu, pCtx, hBp, pBp); +#else + rc = dbgfBpHit(pVM, pVCpu, pCtx, hBp, pBp, pBpR0); +#endif + else + rc = VINF_EM_RAW_GUEST_TRAP; /* Genuine guest trap. */ + } + else /* Invalid breakpoint handle or not an int3 breakpoint. */ + rc = VERR_DBGF_BP_L1_LOOKUP_FAILED; + } + else if (u8Type == DBGF_BP_INT3_L1_ENTRY_TYPE_L2_IDX) + rc = dbgfBpL2Walk(pVM, pVCpu, pCtx, DBGF_BP_INT3_L1_ENTRY_GET_L2_IDX(u32L1Entry), + DBGF_BP_INT3_L2_KEY_EXTRACT_FROM_ADDR((RTGCUINTPTR)GCPtrBp)); + else /* Some invalid type. */ + rc = VERR_DBGF_BP_L1_LOOKUP_FAILED; + } + else + rc = VINF_EM_RAW_GUEST_TRAP; /* Genuine guest trap. */ + + return rc; + } + + return VINF_EM_RAW_GUEST_TRAP; +} + |