2001-10-03 17:10:38 +04:00
|
|
|
/////////////////////////////////////////////////////////////////////////
|
2011-02-25 00:54:04 +03:00
|
|
|
// $Id$
|
2001-10-03 17:10:38 +04:00
|
|
|
/////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
2010-03-26 00:33:07 +03:00
|
|
|
// Copyright (C) 2001-2010 The Bochs Project
|
2001-04-10 05:04:59 +04:00
|
|
|
//
|
|
|
|
// This library is free software; you can redistribute it and/or
|
|
|
|
// modify it under the terms of the GNU Lesser General Public
|
|
|
|
// License as published by the Free Software Foundation; either
|
|
|
|
// version 2 of the License, or (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This library is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
// Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public
|
|
|
|
// License along with this library; if not, write to the Free Software
|
2009-01-16 21:18:59 +03:00
|
|
|
// Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA B 02110-1301 USA
|
2007-11-18 02:28:33 +03:00
|
|
|
/////////////////////////////////////////////////////////////////////////
|
2001-04-10 05:04:59 +04:00
|
|
|
|
2001-05-24 22:46:34 +04:00
|
|
|
#define NEED_CPU_REG_SHORTCUTS 1
|
2001-04-10 05:04:59 +04:00
|
|
|
#include "bochs.h"
|
2006-03-07 01:03:16 +03:00
|
|
|
#include "cpu.h"
|
merge in BRANCH-io-cleanup.
To see the commit logs for this use either cvsweb or
cvs update -r BRANCH-io-cleanup and then 'cvs log' the various files.
In general this provides a generic interface for logging.
logfunctions:: is a class that is inherited by some classes, and also
. allocated as a standalone global called 'genlog'. All logging uses
. one of the ::info(), ::error(), ::ldebug(), ::panic() methods of this
. class through 'BX_INFO(), BX_ERROR(), BX_DEBUG(), BX_PANIC()' macros
. respectively.
.
. An example usage:
. BX_INFO(("Hello, World!\n"));
iofunctions:: is a class that is allocated once by default, and assigned
as the iofunction of each logfunctions instance. It is this class that
maintains the file descriptor and other output related code, at this
point using vfprintf(). At some future point, someone may choose to
write a gui 'console' for bochs to which messages would be redirected
simply by assigning a different iofunction class to the various logfunctions
objects.
More cleanup is coming, but this works for now. If you want to see alot
of debugging output, in main.cc, change onoff[LOGLEV_DEBUG]=0 to =1.
Comments, bugs, flames, to me: todd@fries.net
2001-05-15 18:49:57 +04:00
|
|
|
#define LOG_THIS BX_CPU_THIS_PTR
|
2001-04-10 05:04:59 +04:00
|
|
|
|
|
|
|
// X86 Registers Which Affect Paging:
|
|
|
|
// ==================================
|
|
|
|
//
|
|
|
|
// CR0:
|
|
|
|
// bit 31: PG, Paging (386+)
|
|
|
|
// bit 16: WP, Write Protect (486+)
|
|
|
|
// 0: allow supervisor level writes into user level RO pages
|
|
|
|
// 1: inhibit supervisor level writes into user level RO pages
|
|
|
|
//
|
|
|
|
// CR3:
|
|
|
|
// bit 31..12: PDBR, Page Directory Base Register (386+)
|
|
|
|
// bit 4: PCD, Page level Cache Disable (486+)
|
|
|
|
// Controls caching of current page directory. Affects only the processor's
|
|
|
|
// internal caches (L1 and L2).
|
|
|
|
// This flag ignored if paging disabled (PG=0) or cache disabled (CD=1).
|
|
|
|
// Values:
|
|
|
|
// 0: Page Directory can be cached
|
|
|
|
// 1: Page Directory not cached
|
|
|
|
// bit 3: PWT, Page level Writes Transparent (486+)
|
|
|
|
// Controls write-through or write-back caching policy of current page
|
|
|
|
// directory. Affects only the processor's internal caches (L1 and L2).
|
|
|
|
// This flag ignored if paging disabled (PG=0) or cache disabled (CD=1).
|
|
|
|
// Values:
|
|
|
|
// 0: write-back caching enabled
|
|
|
|
// 1: write-through caching enabled
|
|
|
|
//
|
|
|
|
// CR4:
|
|
|
|
// bit 4: PSE, Page Size Extension (Pentium+)
|
|
|
|
// 0: 4KByte pages (typical)
|
|
|
|
// 1: 4MByte or 2MByte pages
|
|
|
|
// bit 5: PAE, Physical Address Extension (Pentium Pro+)
|
|
|
|
// 0: 32bit physical addresses
|
|
|
|
// 1: 36bit physical addresses
|
|
|
|
// bit 7: PGE, Page Global Enable (Pentium Pro+)
|
|
|
|
// The global page feature allows frequently used or shared pages
|
|
|
|
// to be marked as global (PDE or PTE bit 8). Global pages are
|
|
|
|
// not flushed from TLB on a task switch or write to CR3.
|
|
|
|
// Values:
|
|
|
|
// 0: disables global page feature
|
|
|
|
// 1: enables global page feature
|
|
|
|
//
|
2007-09-20 21:33:35 +04:00
|
|
|
// page size extention and physical address size extention matrix (legacy mode)
|
|
|
|
// ==============================================================================
|
|
|
|
// CR0.PG CR4.PAE CR4.PSE PDPE.PS PDE.PS | page size physical address size
|
|
|
|
// ==============================================================================
|
|
|
|
// 0 X X R X | -- paging disabled
|
|
|
|
// 1 0 0 R X | 4K 32bits
|
|
|
|
// 1 0 1 R 0 | 4K 32bits
|
|
|
|
// 1 0 1 R 1 | 4M 32bits
|
|
|
|
// 1 1 X R 0 | 4K 36bits
|
|
|
|
// 1 1 X R 1 | 2M 36bits
|
|
|
|
|
|
|
|
// page size extention and physical address size extention matrix (long mode)
|
|
|
|
// ==============================================================================
|
|
|
|
// CR0.PG CR4.PAE CR4.PSE PDPE.PS PDE.PS | page size physical address size
|
|
|
|
// ==============================================================================
|
|
|
|
// 1 1 X 0 0 | 4K 52bits
|
|
|
|
// 1 1 X 0 1 | 2M 52bits
|
|
|
|
// 1 1 X 1 - | 1G 52bits
|
2001-04-10 05:04:59 +04:00
|
|
|
|
|
|
|
|
|
|
|
// Page Directory/Table Entry Fields Defined:
|
|
|
|
// ==========================================
|
2004-10-21 22:20:40 +04:00
|
|
|
// NX: No Execute
|
|
|
|
// This bit controls the ability to execute code from all physical
|
|
|
|
// pages mapped by the table entry.
|
|
|
|
// 0: Code can be executed from the mapped physical pages
|
|
|
|
// 1: Code cannot be executed
|
|
|
|
// The NX bit can only be set when the no-execute page-protection
|
2008-02-03 00:46:54 +03:00
|
|
|
// feature is enabled by setting EFER.NXE=1, If EFER.NXE=0, the
|
|
|
|
// NX bit is treated as reserved. In this case, #PF occurs if the
|
2004-10-21 22:20:40 +04:00
|
|
|
// NX bit is not cleared to zero.
|
|
|
|
//
|
2001-04-10 05:04:59 +04:00
|
|
|
// G: Global flag
|
|
|
|
// Indiciates a global page when set. When a page is marked
|
|
|
|
// global and the PGE flag in CR4 is set, the page table or
|
|
|
|
// directory entry for the page is not invalidated in the TLB
|
|
|
|
// when CR3 is loaded or a task switch occurs. Only software
|
|
|
|
// clears and sets this flag. For page directory entries that
|
|
|
|
// point to page tables, this flag is ignored and the global
|
|
|
|
// characteristics of a page are set in the page table entries.
|
|
|
|
//
|
|
|
|
// PS: Page Size flag
|
|
|
|
// Only used in page directory entries. When PS=0, the page
|
|
|
|
// size is 4KBytes and the page directory entry points to a
|
|
|
|
// page table. When PS=1, the page size is 4MBytes for
|
|
|
|
// normal 32-bit addressing and 2MBytes if extended physical
|
2004-10-21 22:20:40 +04:00
|
|
|
// addressing.
|
|
|
|
//
|
|
|
|
// PAT: Page-Attribute Table
|
|
|
|
// This bit is only present in the lowest level of the page
|
2008-02-03 00:46:54 +03:00
|
|
|
// translation hierarchy. The PAT bit is the high-order bit
|
|
|
|
// of a 3-bit index into the PAT register. The other two
|
|
|
|
// bits involved in forming the index are the PCD and PWT
|
2004-10-21 22:20:40 +04:00
|
|
|
// bits.
|
2001-04-10 05:04:59 +04:00
|
|
|
//
|
|
|
|
// D: Dirty bit:
|
|
|
|
// Processor sets the Dirty bit in the 2nd-level page table before a
|
|
|
|
// write operation to an address mapped by that page table entry.
|
|
|
|
// Dirty bit in directory entries is undefined.
|
|
|
|
//
|
|
|
|
// A: Accessed bit:
|
|
|
|
// Processor sets the Accessed bits in both levels of page tables before
|
|
|
|
// a read/write operation to a page.
|
|
|
|
//
|
|
|
|
// PCD: Page level Cache Disable
|
|
|
|
// Controls caching of individual pages or page tables.
|
|
|
|
// This allows a per-page based mechanism to disable caching, for
|
|
|
|
// those pages which contained memory mapped IO, or otherwise
|
|
|
|
// should not be cached. Processor ignores this flag if paging
|
|
|
|
// is not used (CR0.PG=0) or the cache disable bit is set (CR0.CD=1).
|
|
|
|
// Values:
|
|
|
|
// 0: page or page table can be cached
|
|
|
|
// 1: page or page table is not cached (prevented)
|
|
|
|
//
|
|
|
|
// PWT: Page level Write Through
|
|
|
|
// Controls the write-through or write-back caching policy of individual
|
|
|
|
// pages or page tables. Processor ignores this flag if paging
|
|
|
|
// is not used (CR0.PG=0) or the cache disable bit is set (CR0.CD=1).
|
|
|
|
// Values:
|
|
|
|
// 0: write-back caching
|
|
|
|
// 1: write-through caching
|
|
|
|
//
|
|
|
|
// U/S: User/Supervisor level
|
|
|
|
// 0: Supervisor level - for the OS, drivers, etc.
|
|
|
|
// 1: User level - application code and data
|
|
|
|
//
|
|
|
|
// R/W: Read/Write access
|
|
|
|
// 0: read-only access
|
|
|
|
// 1: read/write access
|
|
|
|
//
|
|
|
|
// P: Present
|
|
|
|
// 0: Not present
|
|
|
|
// 1: Present
|
|
|
|
// ==========================================
|
|
|
|
|
|
|
|
// Combined page directory/page table protection:
|
|
|
|
// ==============================================
|
|
|
|
// There is one column for the combined effect on a 386
|
|
|
|
// and one column for the combined effect on a 486+ CPU.
|
|
|
|
//
|
|
|
|
// +----------------+-----------------+----------------+----------------+
|
|
|
|
// | Page Directory| Page Table | Combined 386 | Combined 486+ |
|
|
|
|
// |Privilege Type | Privilege Type | Privilege Type| Privilege Type|
|
|
|
|
// |----------------+-----------------+----------------+----------------|
|
|
|
|
// |User R | User R | User R | User R |
|
|
|
|
// |User R | User RW | User R | User R |
|
|
|
|
// |User RW | User R | User R | User R |
|
|
|
|
// |User RW | User RW | User RW | User RW |
|
|
|
|
// |User R | Supervisor R | User R | Supervisor RW |
|
|
|
|
// |User R | Supervisor RW | User R | Supervisor RW |
|
|
|
|
// |User RW | Supervisor R | User R | Supervisor RW |
|
|
|
|
// |User RW | Supervisor RW | User RW | Supervisor RW |
|
|
|
|
// |Supervisor R | User R | User R | Supervisor RW |
|
|
|
|
// |Supervisor R | User RW | User R | Supervisor RW |
|
|
|
|
// |Supervisor RW | User R | User R | Supervisor RW |
|
|
|
|
// |Supervisor RW | User RW | User RW | Supervisor RW |
|
|
|
|
// |Supervisor R | Supervisor R | Supervisor RW | Supervisor RW |
|
|
|
|
// |Supervisor R | Supervisor RW | Supervisor RW | Supervisor RW |
|
|
|
|
// |Supervisor RW | Supervisor R | Supervisor RW | Supervisor RW |
|
|
|
|
// |Supervisor RW | Supervisor RW | Supervisor RW | Supervisor RW |
|
|
|
|
// +----------------+-----------------+----------------+----------------+
|
|
|
|
|
|
|
|
// Page Fault Error Code Format:
|
|
|
|
// =============================
|
|
|
|
//
|
|
|
|
// bits 31..4: Reserved
|
|
|
|
// bit 3: RSVD (Pentium Pro+)
|
|
|
|
// 0: fault caused by reserved bits set to 1 in a page directory
|
|
|
|
// when the PSE or PAE flags in CR4 are set to 1
|
|
|
|
// 1: fault was not caused by reserved bit violation
|
|
|
|
// bit 2: U/S (386+)
|
|
|
|
// 0: fault originated when in supervior mode
|
|
|
|
// 1: fault originated when in user mode
|
|
|
|
// bit 1: R/W (386+)
|
|
|
|
// 0: access causing the fault was a read
|
|
|
|
// 1: access causing the fault was a write
|
|
|
|
// bit 0: P (386+)
|
|
|
|
// 0: fault caused by a nonpresent page
|
|
|
|
// 1: fault caused by a page level protection violation
|
|
|
|
|
|
|
|
// Some paging related notes:
|
|
|
|
// ==========================
|
|
|
|
//
|
|
|
|
// - When the processor is running in supervisor level, all pages are both
|
|
|
|
// readable and writable (write-protect ignored). When running at user
|
|
|
|
// level, only pages which belong to the user level are accessible;
|
|
|
|
// read/write & read-only are readable, read/write are writable.
|
|
|
|
//
|
|
|
|
// - If the Present bit is 0 in either level of page table, an
|
|
|
|
// access which uses these entries will generate a page fault.
|
|
|
|
//
|
|
|
|
// - (A)ccess bit is used to report read or write access to a page
|
|
|
|
// or 2nd level page table.
|
|
|
|
//
|
|
|
|
// - (D)irty bit is used to report write access to a page.
|
|
|
|
//
|
|
|
|
// - Processor running at CPL=0,1,2 maps to U/S=0
|
|
|
|
// Processor running at CPL=3 maps to U/S=1
|
2007-08-30 20:48:10 +04:00
|
|
|
|
2008-05-30 16:14:00 +04:00
|
|
|
#if BX_SUPPORT_X86_64
|
|
|
|
#define BX_INVALID_TLB_ENTRY BX_CONST64(0xffffffffffffffff)
|
|
|
|
#else
|
|
|
|
#define BX_INVALID_TLB_ENTRY 0xffffffff
|
|
|
|
#endif
|
2002-09-17 00:23:38 +04:00
|
|
|
|
2008-08-15 18:30:50 +04:00
|
|
|
// bit [11] of the TLB lpf used for TLB_HostPtr valid indication
|
|
|
|
#define TLB_LPFOf(laddr) AlignedAccessLPFOf(laddr, 0x7ff)
|
|
|
|
|
2001-04-10 05:04:59 +04:00
|
|
|
#if BX_CPU_LEVEL >= 4
|
|
|
|
# define BX_PRIV_CHECK_SIZE 32
|
|
|
|
#else
|
|
|
|
# define BX_PRIV_CHECK_SIZE 16
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// The 'priv_check' array is used to decide if the current access
|
|
|
|
// has the proper paging permissions. An index is formed, based
|
|
|
|
// on parameters such as the access type and level, the write protect
|
|
|
|
// flag and values cached in the TLB. The format of the index into this
|
|
|
|
// array is:
|
|
|
|
//
|
|
|
|
// |4 |3 |2 |1 |0 |
|
|
|
|
// |wp|us|us|rw|rw|
|
|
|
|
// | | | | |
|
|
|
|
// | | | | +---> r/w of current access
|
|
|
|
// | | +--+------> u/s,r/w combined of page dir & table (cached)
|
|
|
|
// | +------------> u/s of current access
|
2007-07-09 19:16:14 +04:00
|
|
|
// +---------------> Current CR0.WP value
|
2002-09-05 07:09:59 +04:00
|
|
|
|
2010-04-08 19:50:39 +04:00
|
|
|
/* 0xff0bbb0b */
|
|
|
|
static const Bit8u priv_check[BX_PRIV_CHECK_SIZE] =
|
|
|
|
{
|
|
|
|
1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 1, 0, 1, 1,
|
|
|
|
#if BX_CPU_LEVEL >= 4
|
|
|
|
1, 0, 1, 1, 1, 0, 1, 1, 0, 0, 0, 0, 1, 0, 1, 1
|
|
|
|
#endif
|
|
|
|
};
|
2009-09-26 10:05:23 +04:00
|
|
|
|
2009-10-31 22:16:09 +03:00
|
|
|
#define BX_PAGING_PHY_ADDRESS_RESERVED_BITS \
|
|
|
|
(BX_PHY_ADDRESS_RESERVED_BITS & BX_CONST64(0xfffffffffffff))
|
|
|
|
|
2009-05-30 19:09:38 +04:00
|
|
|
#define PAGE_DIRECTORY_NX_BIT (BX_CONST64(0x8000000000000000))
|
2002-09-05 07:09:59 +04:00
|
|
|
|
2010-04-04 13:04:12 +04:00
|
|
|
#define BX_CR3_PAGING_MASK (BX_CONST64(0x000ffffffffff000))
|
|
|
|
|
|
|
|
#define BX_CR3_LEGACY_PAE_PAGING_MASK (0xffffffe0)
|
|
|
|
|
2002-09-05 07:09:59 +04:00
|
|
|
// Each entry in the TLB cache has 3 entries:
|
2007-12-17 00:03:46 +03:00
|
|
|
//
|
2002-09-05 07:09:59 +04:00
|
|
|
// lpf: Linear Page Frame (page aligned linear address of page)
|
2008-08-15 02:26:15 +04:00
|
|
|
// bits 32..12 Linear page frame
|
|
|
|
// bit 11 0: TLB HostPtr access allowed, 1: not allowed
|
|
|
|
// bit 10...0 Invalidate index
|
2007-12-17 00:03:46 +03:00
|
|
|
//
|
2002-09-05 07:09:59 +04:00
|
|
|
// ppf: Physical Page Frame (page aligned phy address of page)
|
2005-06-15 00:55:57 +04:00
|
|
|
//
|
2007-12-17 00:03:46 +03:00
|
|
|
// hostPageAddr:
|
|
|
|
// Host Page Frame address used for direct access to
|
|
|
|
// the mem.vector[] space allocated for the guest physical
|
|
|
|
// memory. If this is zero, it means that a pointer
|
|
|
|
// to the host space could not be generated, likely because
|
|
|
|
// that page of memory is not standard memory (it might
|
|
|
|
// be memory mapped IO, ROM, etc).
|
2005-06-15 00:55:57 +04:00
|
|
|
//
|
2007-12-17 00:03:46 +03:00
|
|
|
// accessBits:
|
|
|
|
//
|
|
|
|
// bit 31: Page is a global page.
|
2001-04-10 05:04:59 +04:00
|
|
|
//
|
2007-12-17 00:03:46 +03:00
|
|
|
// The following bits are used for a very efficient permissions
|
2002-09-05 07:09:59 +04:00
|
|
|
// check. The goal is to be able, using only the current privilege
|
|
|
|
// level and access type, to determine if the page tables allow the
|
|
|
|
// access to occur or at least should rewalk the page tables. On
|
|
|
|
// the first read access, permissions are set to only read, so a
|
|
|
|
// rewalk is necessary when a subsequent write fails the tests.
|
|
|
|
// This allows for the dirty bit to be set properly, but for the
|
|
|
|
// test to be efficient. Note that the CR0.WP flag is not present.
|
|
|
|
// The values in the following flags is based on the current CR0.WP
|
|
|
|
// value, necessitating a TLB flush when CR0.WP changes.
|
2001-04-10 05:04:59 +04:00
|
|
|
//
|
2002-09-05 07:09:59 +04:00
|
|
|
// The test is:
|
2010-03-23 22:58:20 +03:00
|
|
|
// OK = (accessBits & ((E<<2) | (W<<1) | U)) <> 0
|
|
|
|
//
|
|
|
|
// where E:1=Execute, 0=Data;
|
|
|
|
// W:1=Write, 0=Read;
|
|
|
|
// U:1=CPL3, 0=CPL0-2
|
2007-12-17 00:03:46 +03:00
|
|
|
//
|
2008-08-15 02:26:15 +04:00
|
|
|
// Thus for reads, it is:
|
|
|
|
// OK = ( U )
|
2010-03-23 22:58:20 +03:00
|
|
|
// for writes:
|
2008-08-15 02:26:15 +04:00
|
|
|
// OK = 0x2 | ( U )
|
2010-03-23 22:58:20 +03:00
|
|
|
// and for code fetches:
|
|
|
|
// OK = 0x4 | ( U )
|
2001-04-10 05:04:59 +04:00
|
|
|
//
|
2008-08-15 02:26:15 +04:00
|
|
|
// Note, that the TLB should have TLB_HostPtr bit set when direct
|
|
|
|
// access through host pointer is NOT allowed for the page. A memory
|
|
|
|
// operation asking for a direct access through host pointer will
|
|
|
|
// set TLB_HostPtr bit in its lpf field and thus get TLB miss result
|
|
|
|
// when the direct access is not allowed.
|
2005-06-15 00:55:57 +04:00
|
|
|
//
|
|
|
|
|
2008-08-15 02:26:15 +04:00
|
|
|
#define TLB_HostPtr (0x800) /* set this bit when direct access is NOT allowed */
|
2002-09-05 07:09:59 +04:00
|
|
|
|
2008-08-08 02:14:38 +04:00
|
|
|
#define TLB_GlobalPage (0x80000000)
|
2004-12-17 01:21:35 +03:00
|
|
|
|
2010-04-01 16:23:52 +04:00
|
|
|
#define TLB_SysOnly (0x1)
|
|
|
|
#define TLB_ReadOnly (0x2)
|
|
|
|
#define TLB_NoExecute (0x4)
|
|
|
|
|
2002-09-17 00:23:38 +04:00
|
|
|
// === TLB Instrumentation section ==============================
|
|
|
|
|
|
|
|
// Note: this is an approximation of what Peter Tattam had.
|
|
|
|
|
|
|
|
#define InstrumentTLB 0
|
|
|
|
|
|
|
|
#if InstrumentTLB
|
|
|
|
static unsigned tlbLookups=0;
|
|
|
|
static unsigned tlbMisses=0;
|
|
|
|
static unsigned tlbGlobalFlushes=0;
|
|
|
|
static unsigned tlbNonGlobalFlushes=0;
|
|
|
|
|
|
|
|
#define InstrTLB_StatsMask 0xfffff
|
|
|
|
|
|
|
|
#define InstrTLB_Stats() {\
|
|
|
|
if ((tlbLookups & InstrTLB_StatsMask) == 0) { \
|
|
|
|
BX_INFO(("TLB lookup:%8d miss:%8d %6.2f%% flush:%8d %6.2f%%", \
|
|
|
|
tlbLookups, \
|
|
|
|
tlbMisses, \
|
|
|
|
tlbMisses * 100.0 / tlbLookups, \
|
|
|
|
(tlbGlobalFlushes+tlbNonGlobalFlushes), \
|
|
|
|
(tlbGlobalFlushes+tlbNonGlobalFlushes) * 100.0 / tlbLookups \
|
|
|
|
)); \
|
|
|
|
tlbLookups = tlbMisses = tlbGlobalFlushes = tlbNonGlobalFlushes = 0; \
|
|
|
|
} \
|
|
|
|
}
|
|
|
|
#define InstrTLB_Increment(v) (v)++
|
|
|
|
|
|
|
|
#else
|
|
|
|
#define InstrTLB_Stats()
|
|
|
|
#define InstrTLB_Increment(v)
|
|
|
|
#endif
|
|
|
|
|
2008-05-11 23:36:06 +04:00
|
|
|
// ==============================================================
|
2002-09-17 00:23:38 +04:00
|
|
|
|
2008-08-14 01:51:54 +04:00
|
|
|
void BX_CPU_C::TLB_flush(void)
|
2001-04-10 05:04:59 +04:00
|
|
|
{
|
2002-09-17 00:23:38 +04:00
|
|
|
#if InstrumentTLB
|
2008-08-14 01:51:54 +04:00
|
|
|
InstrTLB_Increment(tlbGlobalFlushes);
|
2002-09-06 23:21:55 +04:00
|
|
|
#endif
|
2002-09-06 18:58:56 +04:00
|
|
|
|
2008-08-23 17:55:37 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2008-06-25 06:28:31 +04:00
|
|
|
for (unsigned n=0; n<BX_TLB_SIZE; n++) {
|
2008-08-14 01:51:54 +04:00
|
|
|
BX_CPU_THIS_PTR TLB.entry[n].lpf = BX_INVALID_TLB_ENTRY;
|
|
|
|
}
|
|
|
|
|
2009-06-15 13:30:56 +04:00
|
|
|
#if BX_CPU_LEVEL >= 5
|
2008-12-19 19:03:25 +03:00
|
|
|
BX_CPU_THIS_PTR TLB.split_large = 0; // flush whole TLB
|
|
|
|
#endif
|
|
|
|
|
2008-08-14 01:51:54 +04:00
|
|
|
#if BX_SUPPORT_MONITOR_MWAIT
|
|
|
|
// invalidating of the TLB might change translation for monitored page
|
|
|
|
// and cause subsequent MWAIT instruction to wait forever
|
|
|
|
BX_CPU_THIS_PTR monitor.reset_monitor();
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2009-06-15 13:30:56 +04:00
|
|
|
#if BX_CPU_LEVEL >= 6
|
2008-08-14 01:51:54 +04:00
|
|
|
void BX_CPU_C::TLB_flushNonGlobal(void)
|
|
|
|
{
|
|
|
|
#if InstrumentTLB
|
|
|
|
InstrTLB_Increment(tlbNonGlobalFlushes);
|
2002-09-10 07:52:32 +04:00
|
|
|
#endif
|
2008-08-14 01:51:54 +04:00
|
|
|
|
2008-08-23 17:55:37 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2010-04-07 18:38:53 +04:00
|
|
|
BX_CPU_THIS_PTR TLB.split_large = 0;
|
|
|
|
|
2008-08-14 01:51:54 +04:00
|
|
|
for (unsigned n=0; n<BX_TLB_SIZE; n++) {
|
|
|
|
bx_TLB_entry *tlbEntry = &BX_CPU_THIS_PTR TLB.entry[n];
|
2008-12-19 19:03:25 +03:00
|
|
|
if (!(tlbEntry->accessBits & TLB_GlobalPage)) {
|
2008-08-14 01:51:54 +04:00
|
|
|
tlbEntry->lpf = BX_INVALID_TLB_ENTRY;
|
2008-12-19 19:03:25 +03:00
|
|
|
}
|
2010-04-07 18:38:53 +04:00
|
|
|
else {
|
|
|
|
if (tlbEntry->lpf_mask > 0xfff)
|
|
|
|
BX_CPU_THIS_PTR TLB.split_large = 1;
|
|
|
|
}
|
2005-03-03 23:24:52 +03:00
|
|
|
}
|
2008-04-26 00:08:23 +04:00
|
|
|
|
|
|
|
#if BX_SUPPORT_MONITOR_MWAIT
|
|
|
|
// invalidating of the TLB might change translation for monitored page
|
|
|
|
// and cause subsequent MWAIT instruction to wait forever
|
|
|
|
BX_CPU_THIS_PTR monitor.reset_monitor();
|
|
|
|
#endif
|
2001-04-10 05:04:59 +04:00
|
|
|
}
|
2008-08-14 01:51:54 +04:00
|
|
|
#endif
|
|
|
|
|
2006-03-02 01:32:24 +03:00
|
|
|
void BX_CPU_C::TLB_invlpg(bx_address laddr)
|
|
|
|
{
|
2008-08-23 17:55:37 +04:00
|
|
|
invalidate_prefetch_q();
|
|
|
|
|
2008-05-22 01:38:59 +04:00
|
|
|
BX_DEBUG(("TLB_invlpg(0x"FMT_ADDRX"): invalidate TLB entry", laddr));
|
|
|
|
|
2009-06-15 13:30:56 +04:00
|
|
|
#if BX_CPU_LEVEL >= 5
|
2008-12-19 19:03:25 +03:00
|
|
|
bx_bool large = 0;
|
|
|
|
|
|
|
|
if (BX_CPU_THIS_PTR TLB.split_large) {
|
|
|
|
// make sure INVLPG handles correctly large pages
|
|
|
|
for (unsigned n=0; n<BX_TLB_SIZE; n++) {
|
|
|
|
bx_TLB_entry *tlbEntry = &BX_CPU_THIS_PTR TLB.entry[n];
|
2010-04-07 18:38:53 +04:00
|
|
|
bx_address lpf_mask = tlbEntry->lpf_mask;
|
|
|
|
if ((laddr & ~lpf_mask) == (tlbEntry->lpf & ~lpf_mask)) {
|
2008-12-19 19:03:25 +03:00
|
|
|
tlbEntry->lpf = BX_INVALID_TLB_ENTRY;
|
|
|
|
}
|
2010-04-07 18:38:53 +04:00
|
|
|
else {
|
|
|
|
if (lpf_mask > 0xfff) large = 1;
|
|
|
|
}
|
2008-12-19 19:03:25 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
BX_CPU_THIS_PTR TLB.split_large = large;
|
2008-04-26 00:08:23 +04:00
|
|
|
}
|
2008-12-19 19:03:25 +03:00
|
|
|
else
|
2008-11-29 22:28:10 +03:00
|
|
|
#endif
|
2008-12-19 19:03:25 +03:00
|
|
|
{
|
|
|
|
unsigned TLB_index = BX_TLB_INDEX_OF(laddr, 0);
|
|
|
|
bx_address lpf = LPFOf(laddr);
|
|
|
|
bx_TLB_entry *tlbEntry = &BX_CPU_THIS_PTR TLB.entry[TLB_index];
|
|
|
|
if (TLB_LPFOf(tlbEntry->lpf) == lpf) {
|
|
|
|
tlbEntry->lpf = BX_INVALID_TLB_ENTRY;
|
|
|
|
}
|
|
|
|
}
|
2008-04-26 00:08:23 +04:00
|
|
|
|
|
|
|
#if BX_SUPPORT_MONITOR_MWAIT
|
|
|
|
// invalidating of the TLB entry might change translation for monitored
|
|
|
|
// page and cause subsequent MWAIT instruction to wait forever
|
|
|
|
BX_CPU_THIS_PTR monitor.reset_monitor();
|
|
|
|
#endif
|
2006-03-02 01:32:24 +03:00
|
|
|
}
|
|
|
|
|
2008-03-23 00:29:41 +03:00
|
|
|
void BX_CPP_AttrRegparmN(1) BX_CPU_C::INVLPG(bxInstruction_c* i)
|
2001-04-10 05:04:59 +04:00
|
|
|
{
|
2006-10-04 23:08:40 +04:00
|
|
|
if (!real_mode() && CPL!=0) {
|
|
|
|
BX_ERROR(("INVLPG: priveledge check failed, generate #GP(0)"));
|
2010-03-14 18:51:27 +03:00
|
|
|
exception(BX_GP_EXCEPTION, 0);
|
2006-06-10 02:29:07 +04:00
|
|
|
}
|
2001-04-10 05:04:59 +04:00
|
|
|
|
2008-08-08 13:22:49 +04:00
|
|
|
bx_address eaddr = BX_CPU_CALL_METHODR(i->ResolveModrm, (i));
|
|
|
|
bx_address laddr = get_laddr(i->seg(), eaddr);
|
2008-11-29 22:28:10 +03:00
|
|
|
|
2009-02-04 19:05:47 +03:00
|
|
|
#if BX_SUPPORT_VMX
|
|
|
|
VMexit_INVLPG(i, laddr);
|
|
|
|
#endif
|
|
|
|
|
2008-11-29 22:28:10 +03:00
|
|
|
#if BX_SUPPORT_X86_64
|
2011-02-11 12:56:23 +03:00
|
|
|
if (! IsCanonical(laddr)) return;
|
2008-11-29 22:28:10 +03:00
|
|
|
#endif
|
|
|
|
|
2008-01-17 01:39:55 +03:00
|
|
|
BX_INSTR_TLB_CNTRL(BX_CPU_ID, BX_INSTR_INVLPG, laddr);
|
2006-03-02 01:32:24 +03:00
|
|
|
TLB_invlpg(laddr);
|
2001-04-10 05:04:59 +04:00
|
|
|
}
|
|
|
|
|
2007-08-30 20:48:10 +04:00
|
|
|
// error checking order - page not present, reserved bits, protection
|
|
|
|
#define ERROR_NOT_PRESENT 0x00
|
|
|
|
#define ERROR_PROTECTION 0x01
|
|
|
|
#define ERROR_RESERVED 0x08
|
|
|
|
#define ERROR_CODE_ACCESS 0x10
|
|
|
|
|
2008-12-06 01:34:42 +03:00
|
|
|
void BX_CPU_C::page_fault(unsigned fault, bx_address laddr, unsigned user, unsigned rw)
|
2007-08-30 20:48:10 +04:00
|
|
|
{
|
|
|
|
unsigned error_code = fault;
|
2008-12-06 01:34:42 +03:00
|
|
|
unsigned isWrite = rw & 1;
|
2007-08-30 20:48:10 +04:00
|
|
|
|
2008-12-06 01:34:42 +03:00
|
|
|
error_code |= (user << 2) | (isWrite << 1);
|
2011-05-29 20:28:26 +04:00
|
|
|
|
|
|
|
#if BX_CPU_LEVEL >= 6
|
|
|
|
if (rw == BX_EXECUTE) {
|
|
|
|
if (BX_CPU_THIS_PTR cr4.get_SMEP())
|
|
|
|
error_code |= ERROR_CODE_ACCESS; // I/D = 1
|
2007-08-30 20:48:10 +04:00
|
|
|
#if BX_SUPPORT_X86_64
|
2011-05-29 20:28:26 +04:00
|
|
|
if (BX_CPU_THIS_PTR cr4.get_PAE() && BX_CPU_THIS_PTR efer.get_NXE())
|
|
|
|
error_code |= ERROR_CODE_ACCESS;
|
|
|
|
#endif
|
|
|
|
}
|
2007-08-30 20:48:10 +04:00
|
|
|
#endif
|
2009-01-31 13:43:24 +03:00
|
|
|
|
|
|
|
#if BX_SUPPORT_VMX
|
|
|
|
VMexit_Event(0, BX_HARDWARE_EXCEPTION, BX_PF_EXCEPTION, error_code, 1, laddr); // before the CR2 was modified
|
|
|
|
#endif
|
|
|
|
|
2007-08-30 20:48:10 +04:00
|
|
|
BX_CPU_THIS_PTR cr2 = laddr;
|
|
|
|
|
|
|
|
#if BX_SUPPORT_X86_64
|
|
|
|
BX_DEBUG(("page fault for address %08x%08x @ %08x%08x",
|
|
|
|
GET32H(laddr), GET32L(laddr), GET32H(RIP), GET32L(RIP)));
|
|
|
|
#else
|
|
|
|
BX_DEBUG(("page fault for address %08x @ %08x", laddr, EIP));
|
|
|
|
#endif
|
|
|
|
|
2010-03-14 18:51:27 +03:00
|
|
|
exception(BX_PF_EXCEPTION, error_code);
|
2007-08-30 20:48:10 +04:00
|
|
|
}
|
|
|
|
|
2010-04-03 23:21:07 +04:00
|
|
|
#define BX_LEVEL_PML4 3
|
|
|
|
#define BX_LEVEL_PDPE 2
|
|
|
|
#define BX_LEVEL_PDE 1
|
|
|
|
#define BX_LEVEL_PTE 0
|
|
|
|
|
2011-05-31 00:15:50 +04:00
|
|
|
#if BX_SUPPORT_X86_64 || BX_DEBUGGER
|
2010-05-16 09:23:18 +04:00
|
|
|
static const char *bx_paging_level[4] = { "PTE", "PDE", "PDPE", "PML4" };
|
2011-05-31 00:15:50 +04:00
|
|
|
#endif
|
2010-05-16 09:23:18 +04:00
|
|
|
|
2009-06-15 13:30:56 +04:00
|
|
|
#if BX_CPU_LEVEL >= 6
|
2008-04-26 00:08:23 +04:00
|
|
|
|
2009-05-30 19:09:38 +04:00
|
|
|
int BX_CPU_C::check_entry_PAE(const char *s, Bit64u entry, Bit64u reserved, unsigned rw, bx_bool *nx_fault)
|
|
|
|
{
|
|
|
|
if (!(entry & 0x1)) {
|
|
|
|
BX_DEBUG(("%s: entry not present", s));
|
|
|
|
return ERROR_NOT_PRESENT;
|
|
|
|
}
|
2008-12-12 00:00:01 +03:00
|
|
|
|
2009-05-30 19:09:38 +04:00
|
|
|
if (entry & reserved) {
|
|
|
|
BX_DEBUG(("%s: reserved bit is set %08x:%08x", s, GET32H(entry), GET32L(entry)));
|
|
|
|
return ERROR_RESERVED | ERROR_PROTECTION;
|
|
|
|
}
|
2008-04-26 00:08:23 +04:00
|
|
|
|
2009-05-30 19:09:38 +04:00
|
|
|
#if BX_SUPPORT_X86_64
|
2009-09-26 10:05:23 +04:00
|
|
|
if (! long_mode()) {
|
|
|
|
if (entry & BX_CONST64(0x7ff0000000000000)) {
|
|
|
|
BX_DEBUG(("%s: reserved bit is set %08x:%08x", s, GET32H(entry), GET32L(entry)));
|
|
|
|
return ERROR_RESERVED | ERROR_PROTECTION;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-05-30 19:09:38 +04:00
|
|
|
if (entry & PAGE_DIRECTORY_NX_BIT) {
|
|
|
|
if (! BX_CPU_THIS_PTR efer.get_NXE()) {
|
|
|
|
BX_DEBUG(("%s: NX bit set when EFER.NXE is disabled", s));
|
|
|
|
return ERROR_RESERVED | ERROR_PROTECTION;
|
|
|
|
}
|
|
|
|
if (rw == BX_EXECUTE) {
|
|
|
|
BX_DEBUG(("%s: non-executable page fault occured", s));
|
|
|
|
*nx_fault = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2007-12-17 00:03:46 +03:00
|
|
|
|
2009-05-30 19:09:38 +04:00
|
|
|
return -1;
|
|
|
|
}
|
2008-08-01 17:28:44 +04:00
|
|
|
|
2010-04-01 16:23:52 +04:00
|
|
|
// Format of a Long Mode Non-Leaf Entry
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
// 00 | Present (P)
|
|
|
|
// 01 | R/W
|
|
|
|
// 02 | U/S
|
|
|
|
// 03 | Page-Level Write-Through (PWT)
|
|
|
|
// 04 | Page-Level Cache-Disable (PCD)
|
|
|
|
// 05 | Accessed (A)
|
|
|
|
// 06 | (ignored)
|
|
|
|
// 07 | Page Size (PS), must be 0 if no Large Page on the level
|
|
|
|
// 11-08 | (ignored)
|
|
|
|
// PA-12 | Physical address of 4-KByte aligned page-directory-pointer table
|
|
|
|
// 51-PA | Reserved (must be zero)
|
|
|
|
// 62-52 | (ignored)
|
|
|
|
// 63 | Execute-Disable (XD) (if EFER.NXE=1, reserved otherwise)
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
|
|
|
|
#define PAGING_PAE_RESERVED_BITS (BX_PAGING_PHY_ADDRESS_RESERVED_BITS)
|
|
|
|
|
|
|
|
// Format of a PDPTE that References a 1-GByte Page
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
// 00 | Present (P)
|
|
|
|
// 01 | R/W
|
|
|
|
// 02 | U/S
|
|
|
|
// 03 | Page-Level Write-Through (PWT)
|
|
|
|
// 04 | Page-Level Cache-Disable (PCD)
|
|
|
|
// 05 | Accessed (A)
|
|
|
|
// 06 | (ignored)
|
|
|
|
// 07 | Page Size, must be 1 to indicate a 1-GByte Page
|
|
|
|
// 08 | Global (G) (if CR4.PGE=1, ignored otherwise)
|
|
|
|
// 11-09 | (ignored)
|
|
|
|
// 12 | PAT (if PAT is supported, reserved otherwise)
|
|
|
|
// 29-13 | Reserved (must be zero)
|
|
|
|
// PA-30 | Physical address of the 1-Gbyte Page
|
|
|
|
// 51-PA | Reserved (must be zero)
|
|
|
|
// 62-52 | (ignored)
|
|
|
|
// 63 | Execute-Disable (XD) (if EFER.NXE=1, reserved otherwise)
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
|
|
|
|
#define PAGING_PAE_PDPTE1G_RESERVED_BITS \
|
|
|
|
(BX_PAGING_PHY_ADDRESS_RESERVED_BITS | BX_CONST64(0x3FFFE000))
|
|
|
|
|
|
|
|
// Format of a PAE PDE that Maps a 2-MByte Page
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
// 00 | Present (P)
|
|
|
|
// 01 | R/W
|
|
|
|
// 02 | U/S
|
|
|
|
// 03 | Page-Level Write-Through (PWT)
|
|
|
|
// 04 | Page-Level Cache-Disable (PCD)
|
|
|
|
// 05 | Accessed (A)
|
|
|
|
// 06 | Dirty (D)
|
|
|
|
// 07 | Page Size (PS), must be 1 to indicate a 2-MByte Page
|
|
|
|
// 08 | Global (G) (if CR4.PGE=1, ignored otherwise)
|
|
|
|
// 11-09 | (ignored)
|
|
|
|
// 12 | PAT (if PAT is supported, reserved otherwise)
|
|
|
|
// 20-13 | Reserved (must be zero)
|
|
|
|
// PA-21 | Physical address of the 2-MByte page
|
|
|
|
// 51-PA | Reserved (must be zero)
|
|
|
|
// 62-52 | ignored in long mode, reserved (must be 0) in legacy PAE mode
|
|
|
|
// 63 | Execute-Disable (XD) (if EFER.NXE=1, reserved otherwise)
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
|
|
|
|
#define PAGING_PAE_PDE2M_RESERVED_BITS \
|
|
|
|
(BX_PAGING_PHY_ADDRESS_RESERVED_BITS | BX_CONST64(0x001FE000))
|
|
|
|
|
|
|
|
// Format of a PAE PTE that Maps a 4-KByte Page
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
// 00 | Present (P)
|
|
|
|
// 01 | R/W
|
|
|
|
// 02 | U/S
|
|
|
|
// 03 | Page-Level Write-Through (PWT)
|
|
|
|
// 04 | Page-Level Cache-Disable (PCD)
|
|
|
|
// 05 | Accessed (A)
|
|
|
|
// 06 | Dirty (D)
|
|
|
|
// 07 | PAT (if PAT is supported, reserved otherwise)
|
|
|
|
// 08 | Global (G) (if CR4.PGE=1, ignored otherwise)
|
|
|
|
// 11-09 | (ignored)
|
|
|
|
// PA-12 | Physical address of the 4-KByte page
|
|
|
|
// 51-PA | Reserved (must be zero)
|
|
|
|
// 62-52 | ignored in long mode, reserved (must be 0) in legacy PAE mode
|
|
|
|
// 63 | Execute-Disable (XD) (if EFER.NXE=1, reserved otherwise)
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
|
2010-05-05 00:16:38 +04:00
|
|
|
#if BX_SUPPORT_X86_64
|
|
|
|
|
2009-09-26 10:05:23 +04:00
|
|
|
// Translate a linear address to a physical address in long mode
|
2011-05-29 20:28:26 +04:00
|
|
|
bx_phy_address BX_CPU_C::translate_linear_long_mode(bx_address laddr, Bit32u &lpf_mask, Bit32u &combined_access, unsigned user, unsigned rw)
|
2009-09-26 10:05:23 +04:00
|
|
|
{
|
2010-04-04 13:04:12 +04:00
|
|
|
bx_phy_address entry_addr[4];
|
|
|
|
bx_phy_address ppf = BX_CPU_THIS_PTR cr3 & BX_CR3_PAGING_MASK;
|
2010-04-01 09:26:20 +04:00
|
|
|
Bit64u entry[4];
|
2010-04-01 15:53:22 +04:00
|
|
|
bx_bool nx_fault = 0;
|
2010-04-01 16:23:52 +04:00
|
|
|
int leaf = BX_LEVEL_PTE;
|
2010-04-01 09:26:20 +04:00
|
|
|
combined_access = 0x06;
|
2007-12-17 00:03:46 +03:00
|
|
|
|
2010-04-01 16:23:52 +04:00
|
|
|
for (leaf = BX_LEVEL_PML4;; --leaf) {
|
2010-04-04 13:04:12 +04:00
|
|
|
entry_addr[leaf] = ppf + ((laddr >> (9 + 9*leaf)) & 0xff8);
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
if (BX_CPU_THIS_PTR in_vmx_guest) {
|
|
|
|
if (SECONDARY_VMEXEC_CONTROL(VMX_VM_EXEC_CTRL3_EPT_ENABLE))
|
2011-02-19 11:31:05 +03:00
|
|
|
entry_addr[leaf] = translate_guest_physical(entry_addr[leaf], laddr, 1, 1, BX_READ);
|
2010-04-07 21:12:17 +04:00
|
|
|
}
|
|
|
|
#endif
|
2010-04-01 16:23:52 +04:00
|
|
|
access_read_physical(entry_addr[leaf], 8, &entry[leaf]);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, entry_addr[leaf], 8, (BX_PTE_ACCESS + (leaf<<4)) | BX_READ, (Bit8u*)(&entry[leaf]));
|
2008-05-19 22:10:32 +04:00
|
|
|
|
2010-04-01 16:23:52 +04:00
|
|
|
Bit64u curr_entry = entry[leaf];
|
|
|
|
int fault = check_entry_PAE(bx_paging_level[leaf], curr_entry, PAGING_PAE_RESERVED_BITS, rw, &nx_fault);
|
2010-04-01 15:53:22 +04:00
|
|
|
if (fault >= 0)
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(fault, laddr, user, rw);
|
2010-04-01 09:26:20 +04:00
|
|
|
|
2010-04-01 15:53:22 +04:00
|
|
|
combined_access &= curr_entry & 0x06; // U/S and R/W
|
2010-04-03 20:52:33 +04:00
|
|
|
ppf = curr_entry & BX_CONST64(0x000ffffffffff000);
|
2002-09-17 00:23:38 +04:00
|
|
|
|
2010-04-03 20:52:33 +04:00
|
|
|
if (leaf == BX_LEVEL_PTE) break;
|
2008-12-12 00:00:01 +03:00
|
|
|
|
2010-04-01 15:53:22 +04:00
|
|
|
if (curr_entry & 0x80) {
|
2010-10-07 20:39:31 +04:00
|
|
|
if (leaf > (BX_LEVEL_PDE + !!bx_cpuid_support_1g_paging())) {
|
2011-05-30 00:09:31 +04:00
|
|
|
BX_DEBUG(("%s: PS bit set !", bx_paging_level[leaf]));
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(ERROR_RESERVED | ERROR_PROTECTION, laddr, user, rw);
|
2010-04-01 15:53:22 +04:00
|
|
|
}
|
2008-12-12 00:00:01 +03:00
|
|
|
|
2010-04-01 16:23:52 +04:00
|
|
|
if (leaf == BX_LEVEL_PDPE) {
|
2010-04-01 15:53:22 +04:00
|
|
|
if (curr_entry & PAGING_PAE_PDPTE1G_RESERVED_BITS) {
|
2010-04-01 16:23:52 +04:00
|
|
|
BX_DEBUG(("PAE PDPE1G: reserved bit is set: PDPE=%08x:%08x", GET32H(curr_entry), GET32L(curr_entry)));
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(ERROR_RESERVED | ERROR_PROTECTION, laddr, user, rw);
|
2010-04-01 15:53:22 +04:00
|
|
|
}
|
2010-04-01 09:26:20 +04:00
|
|
|
|
2010-04-01 15:53:22 +04:00
|
|
|
// Make up the physical page frame address.
|
|
|
|
ppf = (bx_phy_address)((curr_entry & BX_CONST64(0x000fffffc0000000)) | (laddr & 0x3ffff000));
|
|
|
|
lpf_mask = 0x3fffffff;
|
|
|
|
break;
|
|
|
|
}
|
2008-12-12 00:00:01 +03:00
|
|
|
|
2010-04-01 16:23:52 +04:00
|
|
|
if (leaf == BX_LEVEL_PDE) {
|
2010-04-01 15:53:22 +04:00
|
|
|
if (curr_entry & PAGING_PAE_PDE2M_RESERVED_BITS) {
|
|
|
|
BX_DEBUG(("PAE PDE2M: reserved bit is set PDE=%08x:%08x", GET32H(curr_entry), GET32L(curr_entry)));
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(ERROR_RESERVED | ERROR_PROTECTION, laddr, user, rw);
|
2010-04-01 15:53:22 +04:00
|
|
|
}
|
2010-04-01 09:26:20 +04:00
|
|
|
|
2010-04-01 15:53:22 +04:00
|
|
|
// Make up the physical page frame address.
|
|
|
|
ppf = (bx_phy_address)((curr_entry & BX_CONST64(0x000fffffffe00000)) | (laddr & 0x001ff000));
|
|
|
|
lpf_mask = 0x1fffff;
|
|
|
|
break;
|
|
|
|
}
|
2008-05-19 22:10:32 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-04-01 15:53:22 +04:00
|
|
|
bx_bool isWrite = (rw & 1); // write or r-m-w
|
2005-03-03 23:24:52 +03:00
|
|
|
|
2010-04-01 15:53:22 +04:00
|
|
|
unsigned priv_index = (BX_CPU_THIS_PTR cr0.get_WP() << 4) | // bit 4
|
2011-05-29 20:28:26 +04:00
|
|
|
(user<<3) | // bit 3
|
2010-04-01 15:53:22 +04:00
|
|
|
(combined_access | isWrite); // bit 2,1,0
|
2002-09-17 00:23:38 +04:00
|
|
|
|
2008-05-19 22:10:32 +04:00
|
|
|
if (!priv_check[priv_index] || nx_fault)
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(ERROR_PROTECTION, laddr, user, rw);
|
|
|
|
|
|
|
|
if (BX_CPU_THIS_PTR cr4.get_SMEP() && rw == BX_EXECUTE && !user) {
|
|
|
|
if (combined_access & 0x4) // User page
|
|
|
|
page_fault(ERROR_PROTECTION, laddr, user, rw);
|
|
|
|
}
|
2002-09-17 00:23:38 +04:00
|
|
|
|
2009-05-30 19:09:38 +04:00
|
|
|
if (BX_CPU_THIS_PTR cr4.get_PGE())
|
2010-04-01 09:26:20 +04:00
|
|
|
combined_access |= (entry[leaf] & 0x100); // G
|
|
|
|
|
|
|
|
// Update A bit if needed.
|
2010-04-01 16:23:52 +04:00
|
|
|
for (int level=BX_LEVEL_PML4; level > leaf; level--) {
|
2010-04-01 09:26:20 +04:00
|
|
|
if (!(entry[level] & 0x20)) {
|
|
|
|
entry[level] |= 0x20;
|
|
|
|
access_write_physical(entry_addr[level], 8, &entry[level]);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, entry_addr[level], 8,
|
|
|
|
(BX_PTE_ACCESS + (level<<4)) | BX_WRITE, (Bit8u*)(&entry[level]));
|
2010-04-01 09:26:20 +04:00
|
|
|
}
|
2009-09-26 10:05:23 +04:00
|
|
|
}
|
|
|
|
|
2010-04-01 15:53:22 +04:00
|
|
|
// Update A/D bits if needed.
|
2010-04-01 09:26:20 +04:00
|
|
|
if (!(entry[leaf] & 0x20) || (isWrite && !(entry[leaf] & 0x40))) {
|
|
|
|
entry[leaf] |= (0x20 | (isWrite<<6)); // Update A and possibly D bits
|
|
|
|
access_write_physical(entry_addr[leaf], 8, &entry[leaf]);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, entry_addr[leaf], 8,
|
|
|
|
(BX_PTE_ACCESS + (leaf<<4)) | BX_WRITE, (Bit8u*)(&entry[leaf]));
|
2009-09-26 10:05:23 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return ppf;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2010-04-01 16:23:52 +04:00
|
|
|
// Format of Legacy PAE PDPTR entry (PDPTE)
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
// 00 | Present (P)
|
|
|
|
// 02-01 | Reserved (must be zero)
|
|
|
|
// 03 | Page-Level Write-Through (PWT) (486+), 0=reserved otherwise
|
|
|
|
// 04 | Page-Level Cache-Disable (PCD) (486+), 0=reserved otherwise
|
|
|
|
// 08-05 | Reserved (must be zero)
|
|
|
|
// 11-09 | (ignored)
|
|
|
|
// PA-12 | Physical address of 4-KByte aligned page directory
|
|
|
|
// 63-PA | Reserved (must be zero)
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
|
|
|
|
#define PAGING_PAE_PDPTE_RESERVED_BITS \
|
|
|
|
(BX_PAGING_PHY_ADDRESS_RESERVED_BITS | BX_CONST64(0xFFF00000000001E6))
|
|
|
|
|
2010-04-07 21:12:17 +04:00
|
|
|
bx_bool BX_CPP_AttrRegparmN(1) BX_CPU_C::CheckPDPTR(bx_phy_address cr3_val)
|
2010-04-01 16:23:52 +04:00
|
|
|
{
|
|
|
|
cr3_val &= 0xffffffe0;
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
if (BX_CPU_THIS_PTR in_vmx_guest) {
|
|
|
|
if (SECONDARY_VMEXEC_CONTROL(VMX_VM_EXEC_CTRL3_EPT_ENABLE))
|
|
|
|
cr3_val = translate_guest_physical(cr3_val, 0, 0, 0, BX_READ);
|
|
|
|
}
|
|
|
|
#endif
|
2010-04-01 16:23:52 +04:00
|
|
|
|
2010-04-03 20:52:33 +04:00
|
|
|
Bit64u pdptr[4];
|
|
|
|
int n;
|
|
|
|
|
|
|
|
for (n=0; n<4; n++) {
|
|
|
|
// read and check PDPTE entries
|
|
|
|
bx_phy_address pdpe_entry_addr = (bx_phy_address) (cr3_val | (n << 3));
|
|
|
|
access_read_physical(pdpe_entry_addr, 8, &(pdptr[n]));
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, pdpe_entry_addr, 8,
|
|
|
|
(BX_PDPTR0_ACCESS + (n<<4)) | BX_READ, (Bit8u*) &(pdptr[n]));
|
|
|
|
|
2010-04-03 20:52:33 +04:00
|
|
|
if (pdptr[n] & 0x1) {
|
2010-04-03 22:00:30 +04:00
|
|
|
if (pdptr[n] & PAGING_PAE_PDPTE_RESERVED_BITS) return 0;
|
2010-04-03 20:52:33 +04:00
|
|
|
}
|
2010-04-01 16:23:52 +04:00
|
|
|
}
|
|
|
|
|
2010-04-03 20:52:33 +04:00
|
|
|
// load new PDPTRs
|
|
|
|
for (n=0; n<4; n++)
|
|
|
|
BX_CPU_THIS_PTR PDPTR_CACHE.entry[n] = pdptr[n];
|
|
|
|
|
2010-04-01 16:23:52 +04:00
|
|
|
BX_CPU_THIS_PTR PDPTR_CACHE.valid = 1;
|
|
|
|
|
|
|
|
return 1; /* PDPTRs are fine */
|
|
|
|
}
|
|
|
|
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
bx_bool BX_CPP_AttrRegparmN(1) BX_CPU_C::CheckPDPTR(Bit64u *pdptr)
|
|
|
|
{
|
|
|
|
for (int n=0; n<4; n++) {
|
|
|
|
if (pdptr[n] & 0x1) {
|
|
|
|
if (pdptr[n] & PAGING_PAE_PDPTE_RESERVED_BITS) return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1; /* PDPTRs are fine */
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2009-09-26 10:05:23 +04:00
|
|
|
// Translate a linear address to a physical address in PAE paging mode
|
2011-05-29 20:28:26 +04:00
|
|
|
bx_phy_address BX_CPU_C::translate_linear_PAE(bx_address laddr, Bit32u &lpf_mask, Bit32u &combined_access, unsigned user, unsigned rw)
|
2009-09-26 10:05:23 +04:00
|
|
|
{
|
2010-04-01 09:26:20 +04:00
|
|
|
bx_phy_address entry_addr[3], ppf;
|
|
|
|
Bit64u entry[3];
|
2010-04-02 00:06:09 +04:00
|
|
|
bx_bool nx_fault = 0;
|
|
|
|
int leaf = BX_LEVEL_PTE;
|
2010-04-01 09:26:20 +04:00
|
|
|
combined_access = 0x06;
|
2009-09-26 10:05:23 +04:00
|
|
|
|
2009-10-03 15:39:29 +04:00
|
|
|
#if BX_SUPPORT_X86_64
|
2009-09-26 17:50:09 +04:00
|
|
|
if (long_mode()) {
|
2011-05-29 20:28:26 +04:00
|
|
|
return translate_linear_long_mode(laddr, lpf_mask, combined_access, user, rw);
|
2009-09-26 17:50:09 +04:00
|
|
|
}
|
2009-10-03 15:39:29 +04:00
|
|
|
#endif
|
2009-09-26 17:50:09 +04:00
|
|
|
|
2010-03-26 01:04:31 +03:00
|
|
|
if (! BX_CPU_THIS_PTR PDPTR_CACHE.valid) {
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_PANIC(("PDPTR_CACHE not valid !"));
|
2010-04-04 13:04:12 +04:00
|
|
|
if (! CheckPDPTR(BX_CPU_THIS_PTR cr3)) {
|
2009-09-26 10:05:23 +04:00
|
|
|
BX_ERROR(("translate_linear_PAE(): PDPTR check failed !"));
|
2010-03-14 18:51:27 +03:00
|
|
|
exception(BX_GP_EXCEPTION, 0);
|
2008-05-19 22:10:32 +04:00
|
|
|
}
|
2009-09-26 10:05:23 +04:00
|
|
|
}
|
2007-09-20 21:33:35 +04:00
|
|
|
|
2010-04-01 09:26:20 +04:00
|
|
|
entry[BX_LEVEL_PDPE] = BX_CPU_THIS_PTR PDPTR_CACHE.entry[(laddr >> 30) & 3];
|
2009-09-26 10:05:23 +04:00
|
|
|
|
2010-04-02 00:06:09 +04:00
|
|
|
int fault = check_entry_PAE("PDPE", entry[BX_LEVEL_PDPE], PAGING_PAE_PDPTE_RESERVED_BITS, rw, &nx_fault);
|
2009-09-26 10:05:23 +04:00
|
|
|
if (fault >= 0)
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(fault, laddr, user, rw);
|
2009-09-26 10:05:23 +04:00
|
|
|
|
2010-04-01 09:26:20 +04:00
|
|
|
entry_addr[BX_LEVEL_PDE] = (bx_phy_address)((entry[BX_LEVEL_PDPE] & BX_CONST64(0x000ffffffffff000))
|
2009-09-26 10:05:23 +04:00
|
|
|
| ((laddr & 0x3fe00000) >> 18));
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
if (BX_CPU_THIS_PTR in_vmx_guest) {
|
|
|
|
if (SECONDARY_VMEXEC_CONTROL(VMX_VM_EXEC_CTRL3_EPT_ENABLE))
|
2011-02-19 11:31:05 +03:00
|
|
|
entry_addr[BX_LEVEL_PDE] = translate_guest_physical(entry_addr[BX_LEVEL_PDE], laddr, 1, 1, BX_READ);
|
2010-04-07 21:12:17 +04:00
|
|
|
}
|
|
|
|
#endif
|
2010-04-01 09:26:20 +04:00
|
|
|
access_read_physical(entry_addr[BX_LEVEL_PDE], 8, &entry[BX_LEVEL_PDE]);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, entry_addr[BX_LEVEL_PDE], 8, BX_PDE_ACCESS | BX_READ, (Bit8u*)(&entry[BX_LEVEL_PDE]));
|
2009-09-26 10:05:23 +04:00
|
|
|
|
2010-04-01 16:23:52 +04:00
|
|
|
fault = check_entry_PAE("PDE", entry[BX_LEVEL_PDE], PAGING_PAE_RESERVED_BITS, rw, &nx_fault);
|
2009-09-26 10:05:23 +04:00
|
|
|
if (fault >= 0)
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(fault, laddr, user, rw);
|
2009-09-26 10:05:23 +04:00
|
|
|
|
2010-04-01 09:26:20 +04:00
|
|
|
combined_access &= entry[BX_LEVEL_PDE] & 0x06; // U/S and R/W
|
|
|
|
|
2009-09-26 10:05:23 +04:00
|
|
|
// Ignore CR4.PSE in PAE mode
|
2010-04-01 09:26:20 +04:00
|
|
|
if (entry[BX_LEVEL_PDE] & 0x80) {
|
|
|
|
if (entry[BX_LEVEL_PDE] & PAGING_PAE_PDE2M_RESERVED_BITS) {
|
|
|
|
BX_DEBUG(("PAE PDE2M: reserved bit is set PDE=%08x:%08x", GET32H(entry[BX_LEVEL_PDE]), GET32L(entry[BX_LEVEL_PDE])));
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(ERROR_RESERVED | ERROR_PROTECTION, laddr, user, rw);
|
2009-05-30 19:09:38 +04:00
|
|
|
}
|
2009-09-26 10:05:23 +04:00
|
|
|
|
2010-04-01 09:26:20 +04:00
|
|
|
ppf = (bx_phy_address)((entry[BX_LEVEL_PDE] & BX_CONST64(0x000fffffffe00000)) | (laddr & 0x001ff000));
|
2009-09-26 10:05:23 +04:00
|
|
|
lpf_mask = 0x1fffff;
|
2010-04-02 00:06:09 +04:00
|
|
|
leaf = BX_LEVEL_PDE;
|
2008-05-19 22:10:32 +04:00
|
|
|
}
|
2010-04-02 00:06:09 +04:00
|
|
|
else {
|
|
|
|
// 4k pages, Get page table entry.
|
|
|
|
entry_addr[BX_LEVEL_PTE] = (bx_phy_address)((entry[BX_LEVEL_PDE] & BX_CONST64(0x000ffffffffff000)) |
|
2009-09-26 10:05:23 +04:00
|
|
|
((laddr & 0x001ff000) >> 9));
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
if (BX_CPU_THIS_PTR in_vmx_guest) {
|
|
|
|
if (SECONDARY_VMEXEC_CONTROL(VMX_VM_EXEC_CTRL3_EPT_ENABLE))
|
2011-02-19 11:31:05 +03:00
|
|
|
entry_addr[BX_LEVEL_PTE] = translate_guest_physical(entry_addr[BX_LEVEL_PTE], laddr, 1, 1, BX_READ);
|
2010-04-07 21:12:17 +04:00
|
|
|
}
|
|
|
|
#endif
|
2010-04-02 00:06:09 +04:00
|
|
|
access_read_physical(entry_addr[BX_LEVEL_PTE], 8, &entry[BX_LEVEL_PTE]);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, entry_addr[BX_LEVEL_PTE], 8, BX_PTE_ACCESS | BX_READ, (Bit8u*)(&entry[BX_LEVEL_PTE]));
|
2009-09-26 10:05:23 +04:00
|
|
|
|
2010-04-02 00:06:09 +04:00
|
|
|
fault = check_entry_PAE("PTE", entry[BX_LEVEL_PTE], PAGING_PAE_RESERVED_BITS, rw, &nx_fault);
|
|
|
|
if (fault >= 0)
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(fault, laddr, user, rw);
|
2009-09-26 10:05:23 +04:00
|
|
|
|
2010-04-02 00:06:09 +04:00
|
|
|
combined_access &= entry[BX_LEVEL_PTE] & 0x06; // U/S and R/W
|
2009-09-26 10:05:23 +04:00
|
|
|
|
2010-04-02 00:06:09 +04:00
|
|
|
// Make up the physical page frame address.
|
|
|
|
ppf = (bx_phy_address)(entry[leaf] & BX_CONST64(0x000ffffffffff000));
|
|
|
|
lpf_mask = 0xfff;
|
|
|
|
}
|
|
|
|
|
|
|
|
bx_bool isWrite = (rw & 1); // write or r-m-w
|
|
|
|
|
|
|
|
unsigned priv_index = (BX_CPU_THIS_PTR cr0.get_WP() << 4) | // bit 4
|
2011-05-29 20:28:26 +04:00
|
|
|
(user<<3) | // bit 3
|
2010-04-02 00:06:09 +04:00
|
|
|
(combined_access | isWrite); // bit 2,1,0
|
2009-09-26 10:05:23 +04:00
|
|
|
|
|
|
|
if (!priv_check[priv_index] || nx_fault)
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(ERROR_PROTECTION, laddr, user, rw);
|
|
|
|
|
|
|
|
if (BX_CPU_THIS_PTR cr4.get_SMEP() && rw == BX_EXECUTE && !user) {
|
|
|
|
if (combined_access & 0x4) // User page
|
|
|
|
page_fault(ERROR_PROTECTION, laddr, user, rw);
|
|
|
|
}
|
2009-09-26 10:05:23 +04:00
|
|
|
|
|
|
|
if (BX_CPU_THIS_PTR cr4.get_PGE())
|
2010-04-02 00:06:09 +04:00
|
|
|
combined_access |= (entry[leaf] & 0x100); // G
|
2002-09-17 00:23:38 +04:00
|
|
|
|
2010-04-02 00:06:09 +04:00
|
|
|
if (leaf == BX_LEVEL_PTE) {
|
|
|
|
// Update PDE A bit if needed.
|
|
|
|
if (!(entry[BX_LEVEL_PDE] & 0x20)) {
|
|
|
|
entry[BX_LEVEL_PDE] |= 0x20;
|
|
|
|
access_write_physical(entry_addr[BX_LEVEL_PDE], 8, &entry[BX_LEVEL_PDE]);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, entry_addr[BX_LEVEL_PDE], 8,
|
|
|
|
(BX_PDE_ACCESS | BX_WRITE), (Bit8u*)(&entry[BX_LEVEL_PDE]));
|
2010-04-02 00:06:09 +04:00
|
|
|
}
|
2008-05-19 22:10:32 +04:00
|
|
|
}
|
2008-04-26 00:08:23 +04:00
|
|
|
|
2010-04-02 00:06:09 +04:00
|
|
|
// Update A/D bits if needed.
|
|
|
|
if (!(entry[leaf] & 0x20) || (isWrite && !(entry[leaf] & 0x40))) {
|
|
|
|
entry[leaf] |= (0x20 | (isWrite<<6)); // Update A and possibly D bits
|
|
|
|
access_write_physical(entry_addr[leaf], 8, &entry[leaf]);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, entry_addr[leaf], 8,
|
|
|
|
(BX_PTE_ACCESS + (leaf<<4)) | BX_WRITE, (Bit8u*)(&entry[leaf]));
|
2008-05-19 22:10:32 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return ppf;
|
|
|
|
}
|
|
|
|
|
2009-06-15 13:30:56 +04:00
|
|
|
#endif
|
2008-08-01 17:28:44 +04:00
|
|
|
|
2010-04-01 16:23:52 +04:00
|
|
|
// Format of a PDE that Maps a 4-MByte Page
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
// 00 | Present (P)
|
|
|
|
// 01 | R/W
|
|
|
|
// 02 | U/S
|
|
|
|
// 03 | Page-Level Write-Through (PWT)
|
|
|
|
// 04 | Page-Level Cache-Disable (PCD)
|
|
|
|
// 05 | Accessed (A)
|
|
|
|
// 06 | Dirty (D)
|
|
|
|
// 07 | Page size, must be 1 to indicate 4-Mbyte page
|
|
|
|
// 08 | Global (G) (if CR4.PGE=1, ignored otherwise)
|
|
|
|
// 11-09 | (ignored)
|
|
|
|
// 12 | PAT (if PAT is supported, reserved otherwise)
|
|
|
|
// PA-13 | Bits PA-32 of physical address of the 4-MByte page
|
|
|
|
// 21-PA | Reserved (must be zero)
|
|
|
|
// 31-22 | Bits 31-22 of physical address of the 4-MByte page
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
|
|
|
|
#define PAGING_PDE4M_RESERVED_BITS \
|
|
|
|
(((1 << (41-BX_PHY_ADDRESS_WIDTH))-1) << (13 + BX_PHY_ADDRESS_WIDTH - 32))
|
|
|
|
|
2008-05-19 22:10:32 +04:00
|
|
|
// Translate a linear address to a physical address
|
2011-05-29 20:28:26 +04:00
|
|
|
bx_phy_address BX_CPU_C::translate_linear(bx_address laddr, unsigned user, unsigned rw)
|
2008-05-19 22:10:32 +04:00
|
|
|
{
|
2010-03-19 20:00:05 +03:00
|
|
|
Bit32u combined_access = 0x06;
|
2010-04-07 18:38:53 +04:00
|
|
|
Bit32u lpf_mask = 0xfff; // 4K pages
|
2008-05-19 22:10:32 +04:00
|
|
|
unsigned priv_index;
|
|
|
|
|
2011-05-29 20:28:26 +04:00
|
|
|
#if BX_SUPPORT_X86_64
|
|
|
|
if (! long_mode()) laddr &= 0xffffffff;
|
|
|
|
#endif
|
|
|
|
|
2008-05-19 22:10:32 +04:00
|
|
|
// note - we assume physical memory < 4gig so for brevity & speed, we'll use
|
|
|
|
// 32 bit entries although cr3 is expanded to 64 bits.
|
|
|
|
bx_phy_address paddress, ppf, poffset = PAGE_OFFSET(laddr);
|
2008-12-08 23:01:26 +03:00
|
|
|
bx_bool isWrite = rw & 1; // write or r-m-w
|
2008-05-19 22:10:32 +04:00
|
|
|
|
|
|
|
InstrTLB_Increment(tlbLookups);
|
|
|
|
InstrTLB_Stats();
|
|
|
|
|
|
|
|
bx_address lpf = LPFOf(laddr);
|
|
|
|
unsigned TLB_index = BX_TLB_INDEX_OF(lpf, 0);
|
|
|
|
bx_TLB_entry *tlbEntry = &BX_CPU_THIS_PTR TLB.entry[TLB_index];
|
|
|
|
|
|
|
|
// already looked up TLB for code access
|
2008-08-15 18:30:50 +04:00
|
|
|
if (TLB_LPFOf(tlbEntry->lpf) == lpf)
|
2008-05-19 22:10:32 +04:00
|
|
|
{
|
2008-08-03 23:53:09 +04:00
|
|
|
paddress = tlbEntry->ppf | poffset;
|
2008-05-19 22:10:32 +04:00
|
|
|
|
2010-03-30 20:56:41 +04:00
|
|
|
bx_bool isExecute = (rw == BX_EXECUTE);
|
2011-05-29 20:28:26 +04:00
|
|
|
if (! (tlbEntry->accessBits & ((isExecute<<2) | (isWrite<<1) | user)))
|
2008-05-19 22:10:32 +04:00
|
|
|
return paddress;
|
|
|
|
|
|
|
|
// The current access does not have permission according to the info
|
|
|
|
// in our TLB cache entry. Re-walk the page tables, in case there is
|
|
|
|
// updated information in the memory image, and let the long path code
|
|
|
|
// generate an exception if one is warranted.
|
|
|
|
}
|
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
if(BX_CPU_THIS_PTR cr0.get_PG())
|
|
|
|
{
|
|
|
|
InstrTLB_Increment(tlbMisses);
|
2008-05-19 22:10:32 +04:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
BX_DEBUG(("page walk for address 0x" FMT_LIN_ADDRX, laddr));
|
2008-05-19 22:10:32 +04:00
|
|
|
|
2009-06-15 13:30:56 +04:00
|
|
|
#if BX_CPU_LEVEL >= 6
|
2010-04-04 23:23:47 +04:00
|
|
|
if (BX_CPU_THIS_PTR cr4.get_PAE()) {
|
2011-05-29 20:28:26 +04:00
|
|
|
ppf = translate_linear_PAE(laddr, lpf_mask, combined_access, user, rw);
|
2010-03-19 20:00:05 +03:00
|
|
|
}
|
|
|
|
else
|
2009-06-15 13:30:56 +04:00
|
|
|
#endif
|
2010-03-19 20:00:05 +03:00
|
|
|
{
|
|
|
|
// CR4.PAE==0 (and EFER.LMA==0)
|
2010-11-23 17:59:36 +03:00
|
|
|
Bit32u pde, pte, cr3_masked = (Bit32u) BX_CPU_THIS_PTR cr3 & BX_CR3_PAGING_MASK;
|
2004-12-14 01:26:36 +03:00
|
|
|
|
2010-04-04 13:04:12 +04:00
|
|
|
bx_phy_address pde_addr = (bx_phy_address) (cr3_masked | ((laddr & 0xffc00000) >> 20));
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
if (BX_CPU_THIS_PTR in_vmx_guest) {
|
|
|
|
if (SECONDARY_VMEXEC_CONTROL(VMX_VM_EXEC_CTRL3_EPT_ENABLE))
|
2011-02-19 11:31:05 +03:00
|
|
|
pde_addr = translate_guest_physical(pde_addr, laddr, 1, 1, BX_READ);
|
2010-04-07 21:12:17 +04:00
|
|
|
}
|
|
|
|
#endif
|
2010-03-19 20:00:05 +03:00
|
|
|
access_read_physical(pde_addr, 4, &pde);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, pde_addr, 4, BX_PDE_ACCESS | BX_READ, (Bit8u*)(&pde));
|
2004-12-14 01:26:36 +03:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
if (!(pde & 0x1)) {
|
|
|
|
BX_DEBUG(("PDE: entry not present"));
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(ERROR_NOT_PRESENT, laddr, user, rw);
|
2010-03-19 20:00:05 +03:00
|
|
|
}
|
2001-04-10 05:04:59 +04:00
|
|
|
|
2009-06-15 13:30:56 +04:00
|
|
|
#if BX_CPU_LEVEL >= 5
|
2010-03-19 20:00:05 +03:00
|
|
|
if ((pde & 0x80) && BX_CPU_THIS_PTR cr4.get_PSE()) {
|
|
|
|
// 4M paging, only if CR4.PSE enabled, ignore PDE.PS otherwise
|
|
|
|
if (pde & PAGING_PDE4M_RESERVED_BITS) {
|
|
|
|
BX_DEBUG(("PSE PDE4M: reserved bit is set: PDE=0x%08x", pde));
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(ERROR_RESERVED | ERROR_PROTECTION, laddr, user, rw);
|
2010-03-19 20:00:05 +03:00
|
|
|
}
|
2008-05-19 22:10:32 +04:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
// Combined access is just access from the pde (no pte involved).
|
|
|
|
combined_access = pde & 0x06; // U/S and R/W
|
2002-09-17 00:23:38 +04:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
priv_index =
|
|
|
|
(BX_CPU_THIS_PTR cr0.get_WP() << 4) | // bit 4
|
2011-05-29 20:28:26 +04:00
|
|
|
(user<<3) | // bit 3
|
2010-03-19 20:00:05 +03:00
|
|
|
(combined_access | isWrite); // bit 2,1,0
|
Integrated patches for:
- Paging code rehash. You must now use --enable-4meg-pages to
use 4Meg pages, with the default of disabled, since we don't well
support 4Meg pages yet. Paging table walks model a real CPU
more closely now, and I fixed some bugs in the old logic.
- Segment check redundancy elimination. After a segment is loaded,
reads and writes are marked when a segment type check succeeds, and
they are skipped thereafter, when possible.
- Repeated IO and memory string copy acceleration. Only some variants
of instructions are available on all platforms, word and dword
variants only on x86 for the moment due to alignment and endian issues.
This is compiled in currently with no option - I should add a configure
option.
- Added a guest linear address to host TLB. Actually, I just stick
the host address (mem.vector[addr] address) in the upper 29 bits
of the field 'combined_access' since they are unused. Convenient
for now. I'm only storing page frame addresses. This was the
simplest for of such a TLB. We can likely enhance this. Also,
I only accelerated the normal read/write routines in access.cc.
Could also modify the read-modify-write versions too. You must
use --enable-guest2host-tlb, to try this out. Currently speeds
up Win95 boot time by about 3.5% for me. More ground to cover...
- Minor mods to CPUI/MOV_CdRd for CMOV.
- Integrated enhancements from Volker to getHostMemAddr() for PCI
being enabled.
2002-09-02 00:12:09 +04:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
if (!priv_check[priv_index])
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(ERROR_PROTECTION, laddr, user, rw);
|
2002-06-19 19:49:07 +04:00
|
|
|
|
2009-06-15 13:30:56 +04:00
|
|
|
#if BX_CPU_LEVEL >= 6
|
2011-05-29 20:28:26 +04:00
|
|
|
if (BX_CPU_THIS_PTR cr4.get_SMEP() && rw == BX_EXECUTE && !user) {
|
|
|
|
if (combined_access & 0x4) // User page
|
|
|
|
page_fault(ERROR_PROTECTION, laddr, user, rw);
|
|
|
|
}
|
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
if (BX_CPU_THIS_PTR cr4.get_PGE())
|
|
|
|
combined_access |= pde & 0x100; // G
|
2009-05-30 19:09:38 +04:00
|
|
|
#endif
|
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
// Update PDE A/D bits if needed.
|
2010-04-01 09:26:20 +04:00
|
|
|
if (!(pde & 0x20) || (isWrite && !(pde & 0x40))) {
|
2010-03-19 20:00:05 +03:00
|
|
|
pde |= (0x20 | (isWrite<<6)); // Update A and possibly D bits
|
|
|
|
access_write_physical(pde_addr, 4, &pde);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, pde_addr, 4, BX_PDE_ACCESS | BX_WRITE, (Bit8u*)(&pde));
|
2010-03-19 20:00:05 +03:00
|
|
|
}
|
2009-06-15 23:05:29 +04:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
// make up the physical frame number
|
|
|
|
ppf = (pde & 0xffc00000) | (laddr & 0x003ff000);
|
2009-10-25 01:00:43 +04:00
|
|
|
#if BX_PHY_ADDRESS_WIDTH > 32
|
2010-03-19 20:00:05 +03:00
|
|
|
ppf |= ((bx_phy_address)(pde & 0x003fe000)) << 19;
|
2009-10-25 01:00:43 +04:00
|
|
|
#endif
|
2010-03-19 20:00:05 +03:00
|
|
|
lpf_mask = 0x3fffff;
|
|
|
|
}
|
|
|
|
else // else normal 4K page...
|
2009-06-15 23:05:29 +04:00
|
|
|
#endif
|
2010-03-19 20:00:05 +03:00
|
|
|
{
|
|
|
|
// Get page table entry
|
|
|
|
bx_phy_address pte_addr = (bx_phy_address)((pde & 0xfffff000) | ((laddr & 0x003ff000) >> 10));
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
if (BX_CPU_THIS_PTR in_vmx_guest) {
|
|
|
|
if (SECONDARY_VMEXEC_CONTROL(VMX_VM_EXEC_CTRL3_EPT_ENABLE))
|
2011-02-19 11:31:05 +03:00
|
|
|
pte_addr = translate_guest_physical(pte_addr, laddr, 1, 1, BX_READ);
|
2010-04-07 21:12:17 +04:00
|
|
|
}
|
|
|
|
#endif
|
2010-03-19 20:00:05 +03:00
|
|
|
access_read_physical(pte_addr, 4, &pte);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, pte_addr, 4, BX_PTE_ACCESS | BX_READ, (Bit8u*)(&pte));
|
2001-04-10 05:04:59 +04:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
if (!(pte & 0x1)) {
|
|
|
|
BX_DEBUG(("PTE: entry not present"));
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(ERROR_NOT_PRESENT, laddr, user, rw);
|
2010-03-19 20:00:05 +03:00
|
|
|
}
|
2005-01-20 22:37:43 +03:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
// 386 and 486+ have different behaviour for combining
|
|
|
|
// privilege from PDE and PTE.
|
2001-04-10 05:04:59 +04:00
|
|
|
#if BX_CPU_LEVEL == 3
|
2010-03-19 20:00:05 +03:00
|
|
|
combined_access = (pde | pte) & 0x04; // U/S
|
|
|
|
combined_access |= (pde & pte) & 0x02; // R/W
|
2001-04-10 05:04:59 +04:00
|
|
|
#else // 486+
|
2010-03-19 20:00:05 +03:00
|
|
|
combined_access = (pde & pte) & 0x06; // U/S and R/W
|
2007-09-20 21:33:35 +04:00
|
|
|
#endif
|
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
priv_index =
|
Integrated patches for:
- Paging code rehash. You must now use --enable-4meg-pages to
use 4Meg pages, with the default of disabled, since we don't well
support 4Meg pages yet. Paging table walks model a real CPU
more closely now, and I fixed some bugs in the old logic.
- Segment check redundancy elimination. After a segment is loaded,
reads and writes are marked when a segment type check succeeds, and
they are skipped thereafter, when possible.
- Repeated IO and memory string copy acceleration. Only some variants
of instructions are available on all platforms, word and dword
variants only on x86 for the moment due to alignment and endian issues.
This is compiled in currently with no option - I should add a configure
option.
- Added a guest linear address to host TLB. Actually, I just stick
the host address (mem.vector[addr] address) in the upper 29 bits
of the field 'combined_access' since they are unused. Convenient
for now. I'm only storing page frame addresses. This was the
simplest for of such a TLB. We can likely enhance this. Also,
I only accelerated the normal read/write routines in access.cc.
Could also modify the read-modify-write versions too. You must
use --enable-guest2host-tlb, to try this out. Currently speeds
up Win95 boot time by about 3.5% for me. More ground to cover...
- Minor mods to CPUI/MOV_CdRd for CMOV.
- Integrated enhancements from Volker to getHostMemAddr() for PCI
being enabled.
2002-09-02 00:12:09 +04:00
|
|
|
#if BX_CPU_LEVEL >= 4
|
2010-03-19 20:00:05 +03:00
|
|
|
(BX_CPU_THIS_PTR cr0.get_WP() << 4) | // bit 4
|
Integrated patches for:
- Paging code rehash. You must now use --enable-4meg-pages to
use 4Meg pages, with the default of disabled, since we don't well
support 4Meg pages yet. Paging table walks model a real CPU
more closely now, and I fixed some bugs in the old logic.
- Segment check redundancy elimination. After a segment is loaded,
reads and writes are marked when a segment type check succeeds, and
they are skipped thereafter, when possible.
- Repeated IO and memory string copy acceleration. Only some variants
of instructions are available on all platforms, word and dword
variants only on x86 for the moment due to alignment and endian issues.
This is compiled in currently with no option - I should add a configure
option.
- Added a guest linear address to host TLB. Actually, I just stick
the host address (mem.vector[addr] address) in the upper 29 bits
of the field 'combined_access' since they are unused. Convenient
for now. I'm only storing page frame addresses. This was the
simplest for of such a TLB. We can likely enhance this. Also,
I only accelerated the normal read/write routines in access.cc.
Could also modify the read-modify-write versions too. You must
use --enable-guest2host-tlb, to try this out. Currently speeds
up Win95 boot time by about 3.5% for me. More ground to cover...
- Minor mods to CPUI/MOV_CdRd for CMOV.
- Integrated enhancements from Volker to getHostMemAddr() for PCI
being enabled.
2002-09-02 00:12:09 +04:00
|
|
|
#endif
|
2011-05-29 20:28:26 +04:00
|
|
|
(user<<3) | // bit 3
|
2010-03-19 20:00:05 +03:00
|
|
|
(combined_access | isWrite); // bit 2,1,0
|
2002-06-19 19:49:07 +04:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
if (!priv_check[priv_index])
|
2011-05-29 20:28:26 +04:00
|
|
|
page_fault(ERROR_PROTECTION, laddr, user, rw);
|
2002-06-19 19:49:07 +04:00
|
|
|
|
2009-06-15 13:30:56 +04:00
|
|
|
#if BX_CPU_LEVEL >= 6
|
2011-05-29 20:28:26 +04:00
|
|
|
if (BX_CPU_THIS_PTR cr4.get_SMEP() && rw == BX_EXECUTE && !user) {
|
|
|
|
if (combined_access & 0x4) // User page
|
|
|
|
page_fault(ERROR_PROTECTION, laddr, user, rw);
|
|
|
|
}
|
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
if (BX_CPU_THIS_PTR cr4.get_PGE())
|
|
|
|
combined_access |= (pte & 0x100); // G
|
2009-05-30 19:09:38 +04:00
|
|
|
#endif
|
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
// Update PDE A bit if needed.
|
|
|
|
if (!(pde & 0x20)) {
|
|
|
|
pde |= 0x20;
|
|
|
|
access_write_physical(pde_addr, 4, &pde);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, pde_addr, 4, BX_PDE_ACCESS | BX_WRITE, (Bit8u*)(&pde));
|
2010-03-19 20:00:05 +03:00
|
|
|
}
|
2002-06-19 19:49:07 +04:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
// Update PTE A/D bits if needed.
|
2010-04-01 09:26:20 +04:00
|
|
|
if (!(pte & 0x20) || (isWrite && !(pte & 0x40))) {
|
2010-03-19 20:00:05 +03:00
|
|
|
pte |= (0x20 | (isWrite<<6)); // Update A and possibly D bits
|
|
|
|
access_write_physical(pte_addr, 4, &pte);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, pte_addr, 4, BX_PTE_ACCESS | BX_WRITE, (Bit8u*)(&pte));
|
2010-03-19 20:00:05 +03:00
|
|
|
}
|
2008-04-26 00:08:23 +04:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
// Make up the physical page frame address.
|
|
|
|
ppf = pte & 0xfffff000;
|
|
|
|
}
|
Integrated patches for:
- Paging code rehash. You must now use --enable-4meg-pages to
use 4Meg pages, with the default of disabled, since we don't well
support 4Meg pages yet. Paging table walks model a real CPU
more closely now, and I fixed some bugs in the old logic.
- Segment check redundancy elimination. After a segment is loaded,
reads and writes are marked when a segment type check succeeds, and
they are skipped thereafter, when possible.
- Repeated IO and memory string copy acceleration. Only some variants
of instructions are available on all platforms, word and dword
variants only on x86 for the moment due to alignment and endian issues.
This is compiled in currently with no option - I should add a configure
option.
- Added a guest linear address to host TLB. Actually, I just stick
the host address (mem.vector[addr] address) in the upper 29 bits
of the field 'combined_access' since they are unused. Convenient
for now. I'm only storing page frame addresses. This was the
simplest for of such a TLB. We can likely enhance this. Also,
I only accelerated the normal read/write routines in access.cc.
Could also modify the read-modify-write versions too. You must
use --enable-guest2host-tlb, to try this out. Currently speeds
up Win95 boot time by about 3.5% for me. More ground to cover...
- Minor mods to CPUI/MOV_CdRd for CMOV.
- Integrated enhancements from Volker to getHostMemAddr() for PCI
being enabled.
2002-09-02 00:12:09 +04:00
|
|
|
}
|
2001-04-10 05:04:59 +04:00
|
|
|
|
2009-06-15 13:30:56 +04:00
|
|
|
#if BX_CPU_LEVEL >= 5
|
2010-03-19 20:00:05 +03:00
|
|
|
if (lpf_mask > 0xfff)
|
|
|
|
BX_CPU_THIS_PTR TLB.split_large = 1;
|
2008-12-19 19:03:25 +03:00
|
|
|
#endif
|
2010-03-19 20:00:05 +03:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
// no paging
|
2010-04-02 00:08:57 +04:00
|
|
|
ppf = (bx_phy_address) lpf;
|
2010-03-19 20:00:05 +03:00
|
|
|
}
|
2008-12-19 19:03:25 +03:00
|
|
|
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
if (BX_CPU_THIS_PTR in_vmx_guest) {
|
|
|
|
if (SECONDARY_VMEXEC_CONTROL(VMX_VM_EXEC_CTRL3_EPT_ENABLE)) {
|
|
|
|
ppf = translate_guest_physical(ppf, laddr, 1, 0, rw);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2010-04-02 00:08:57 +04:00
|
|
|
// Calculate physical memory address and fill in TLB cache entry
|
|
|
|
paddress = ppf | poffset;
|
|
|
|
|
2008-08-15 02:26:15 +04:00
|
|
|
// direct memory access is NOT allowed by default
|
|
|
|
tlbEntry->lpf = lpf | TLB_HostPtr;
|
2010-04-07 18:38:53 +04:00
|
|
|
tlbEntry->lpf_mask = lpf_mask;
|
2008-04-22 00:17:45 +04:00
|
|
|
tlbEntry->ppf = ppf;
|
2008-08-15 02:26:15 +04:00
|
|
|
tlbEntry->accessBits = 0;
|
2008-08-08 02:14:38 +04:00
|
|
|
|
2008-08-11 00:32:00 +04:00
|
|
|
if ((combined_access & 4) == 0) { // System
|
2008-08-15 02:26:15 +04:00
|
|
|
tlbEntry->accessBits |= TLB_SysOnly;
|
2008-08-11 00:32:00 +04:00
|
|
|
if (! isWrite)
|
2008-08-15 02:26:15 +04:00
|
|
|
tlbEntry->accessBits |= TLB_ReadOnly;
|
2008-08-11 00:32:00 +04:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
// Current operation is a read or a page is read only
|
|
|
|
// Not efficient handling of system write to user read only page:
|
|
|
|
// hopefully it is very rare case, optimize later
|
|
|
|
if (! isWrite || (combined_access & 2) == 0) {
|
2008-08-15 02:26:15 +04:00
|
|
|
tlbEntry->accessBits |= TLB_ReadOnly;
|
2008-08-11 00:32:00 +04:00
|
|
|
}
|
|
|
|
}
|
2008-08-08 02:14:38 +04:00
|
|
|
|
2009-06-15 13:30:56 +04:00
|
|
|
#if BX_CPU_LEVEL >= 6
|
2008-05-30 16:14:00 +04:00
|
|
|
if (combined_access & 0x100) // Global bit
|
2008-08-15 02:26:15 +04:00
|
|
|
tlbEntry->accessBits |= TLB_GlobalPage;
|
2002-09-10 07:52:32 +04:00
|
|
|
#endif
|
2007-09-20 21:33:35 +04:00
|
|
|
|
2010-03-23 22:58:20 +03:00
|
|
|
#if BX_SUPPORT_X86_64
|
|
|
|
// EFER.NXE change won't flush TLB
|
|
|
|
if (BX_CPU_THIS_PTR cr4.get_PAE() && rw != BX_EXECUTE)
|
|
|
|
tlbEntry->accessBits |= TLB_NoExecute;
|
|
|
|
#endif
|
|
|
|
|
2004-12-14 01:26:36 +03:00
|
|
|
// Attempt to get a host pointer to this physical page. Put that
|
|
|
|
// pointer in the TLB cache. Note if the request is vetoed, NULL
|
Now, when you compile with --enable-guest2host-tlb, non-paged
mode uses the notion of the guest-to-host TLB. This has the
benefit of allowing more uniform and streamlined acceleration
code in access.cc which does not have to check if CR0.PG
is set, eliminating a few instructions per guest access.
Shaved just a little off execution time, as expected.
Also, access_linear now breaks accesses which span two pages,
into two calls the the physical memory routines, when paging
is off, just like it always has for paging on. Besides
being more uniform, this allows the physical memory access
routines to known the complete data item is contained
within a single physical page, and stop reapplying the
A20ADDR() macro to pointers as it increments them.
Perhaps things can be optimized a little more now there too...
I renamed the routines to {read,write}PhysicalPage() as
a reminder that these routines now operate on data
solely within one page.
I also added a little code so that the paging module is
notified when the A20 line is tweaked, so it can dump
whatever mappings it wants to.
2002-09-05 06:31:24 +04:00
|
|
|
// will be returned, and it's OK to OR zero in anyways.
|
2010-03-16 17:51:20 +03:00
|
|
|
tlbEntry->hostPageAddr = BX_CPU_THIS_PTR getHostMemAddr(ppf, rw);
|
2008-04-22 00:17:45 +04:00
|
|
|
if (tlbEntry->hostPageAddr) {
|
2005-06-15 00:55:57 +04:00
|
|
|
// All access allowed also via direct pointer
|
2008-05-23 21:49:46 +04:00
|
|
|
#if BX_X86_DEBUGGER
|
2011-04-09 09:12:28 +04:00
|
|
|
if (! hwbreakpoint_check(laddr, BX_HWDebugMemW, BX_HWDebugMemRW))
|
2008-05-23 21:49:46 +04:00
|
|
|
#endif
|
2008-08-15 18:30:50 +04:00
|
|
|
tlbEntry->lpf = lpf; // allow direct access with HostPtr
|
2005-06-15 00:55:57 +04:00
|
|
|
}
|
2001-04-10 05:04:59 +04:00
|
|
|
|
2007-09-20 21:33:35 +04:00
|
|
|
return paddress;
|
2001-04-10 05:04:59 +04:00
|
|
|
}
|
|
|
|
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
|
|
|
|
/* EPT access type */
|
|
|
|
#define BX_EPT_READ 0x01
|
|
|
|
#define BX_EPT_WRITE 0x02
|
|
|
|
#define BX_EPT_EXECUTE 0x04
|
|
|
|
|
|
|
|
/* EPT access mask */
|
|
|
|
#define BX_EPT_ENTRY_NOT_PRESENT 0x00
|
|
|
|
#define BX_EPT_ENTRY_READ_ONLY 0x01
|
|
|
|
#define BX_EPT_ENTRY_WRITE_ONLY 0x02
|
|
|
|
#define BX_EPT_ENTRY_READ_WRITE 0x03
|
|
|
|
#define BX_EPT_ENTRY_EXECUTE_ONLY 0x04
|
|
|
|
#define BX_EPT_ENTRY_READ_EXECUTE 0x05
|
|
|
|
#define BX_EPT_ENTRY_WRITE_EXECUTE 0x06
|
|
|
|
#define BX_EPT_ENTRY_READ_WRITE_EXECUTE 0x07
|
|
|
|
|
2010-05-05 00:16:38 +04:00
|
|
|
// Format of a EPT Entry
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
// 00 | Read access
|
|
|
|
// 01 | Write access
|
|
|
|
// 02 | Execute Access
|
|
|
|
// 05-03 | EPT Memory type (for leaf entries, reserved otherwise)
|
|
|
|
// 06 | Ignore PAT memory type (for leaf entries, reserved otherwise)
|
|
|
|
// 07 | Page Size, must be 1 to indicate a Large Page
|
|
|
|
// 11-08 | (ignored)
|
|
|
|
// PA-12 | Physical address
|
|
|
|
// 51-PA | Reserved (must be zero)
|
|
|
|
// 63-52 | (ignored)
|
|
|
|
// -----------------------------------------------------------
|
|
|
|
|
2010-04-07 21:12:17 +04:00
|
|
|
#define PAGING_EPT_RESERVED_BITS (BX_PAGING_PHY_ADDRESS_RESERVED_BITS)
|
|
|
|
|
|
|
|
bx_phy_address BX_CPU_C::translate_guest_physical(bx_phy_address guest_paddr, bx_address guest_laddr, bx_bool guest_laddr_valid, bx_bool is_page_walk, unsigned rw)
|
|
|
|
{
|
|
|
|
VMCS_CACHE *vm = &BX_CPU_THIS_PTR vmcs;
|
|
|
|
bx_phy_address entry_addr[4], ppf = 0, pbase = LPFOf(vm->eptptr);
|
|
|
|
Bit64u entry[4];
|
|
|
|
int leaf = BX_LEVEL_PTE;
|
|
|
|
Bit32u combined_access = 0x7, access_mask = 0;
|
|
|
|
|
|
|
|
BX_DEBUG(("EPT walk for guest paddr 0x" FMT_ADDRX, guest_paddr));
|
|
|
|
|
|
|
|
if (rw == BX_EXECUTE) access_mask |= BX_EPT_EXECUTE;
|
|
|
|
if (rw & 1) access_mask |= BX_EPT_WRITE; // write or r-m-w
|
|
|
|
if (rw == BX_READ) access_mask |= BX_EPT_READ;
|
|
|
|
|
|
|
|
Bit32u vmexit_reason = 0, vmexit_qualification = access_mask;
|
|
|
|
|
|
|
|
for (leaf = BX_LEVEL_PML4;; --leaf) {
|
|
|
|
entry_addr[leaf] = pbase + ((guest_paddr >> (9 + 9*leaf)) & 0xff8);
|
|
|
|
access_read_physical(entry_addr[leaf], 8, &entry[leaf]);
|
2010-04-13 21:56:50 +04:00
|
|
|
BX_DBG_PHY_MEMORY_ACCESS(BX_CPU_ID, entry_addr[leaf], 8,
|
|
|
|
(BX_EPT_PTE_ACCESS + (leaf<<4)) | BX_READ, (Bit8u*)(&entry[leaf]));
|
2010-04-07 21:12:17 +04:00
|
|
|
|
|
|
|
Bit64u curr_entry = entry[leaf];
|
|
|
|
Bit32u curr_access_mask = curr_entry & 0x7;
|
|
|
|
|
|
|
|
combined_access &= curr_access_mask;
|
|
|
|
|
|
|
|
if (curr_access_mask == BX_EPT_ENTRY_NOT_PRESENT) {
|
|
|
|
BX_DEBUG(("EPT %s: not present", bx_paging_level[leaf]));
|
|
|
|
vmexit_reason = VMX_VMEXIT_EPT_VIOLATION;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (curr_access_mask == BX_EPT_ENTRY_WRITE_ONLY || curr_access_mask == BX_EPT_ENTRY_WRITE_EXECUTE) {
|
|
|
|
BX_DEBUG(("EPT %s: EPT misconfiguration mask=%d",
|
|
|
|
bx_paging_level[leaf], curr_access_mask));
|
|
|
|
vmexit_reason = VMX_VMEXIT_EPT_MISCONFIGURATION;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
extern bx_bool isMemTypeValidMTRR(unsigned memtype);
|
|
|
|
if (! isMemTypeValidMTRR((curr_entry >> 3) & 7)) {
|
|
|
|
BX_DEBUG(("EPT %s: EPT misconfiguration memtype=%d", bx_paging_level[leaf], (curr_entry >> 3) & 7));
|
|
|
|
vmexit_reason = VMX_VMEXIT_EPT_MISCONFIGURATION;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (curr_entry & PAGING_EPT_RESERVED_BITS) {
|
|
|
|
BX_DEBUG(("EPT %s: reserved bit is set %08x:%08x",
|
|
|
|
bx_paging_level[leaf], GET32H(curr_entry), GET32L(curr_entry)));
|
|
|
|
vmexit_reason = VMX_VMEXIT_EPT_MISCONFIGURATION;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
pbase = curr_entry & BX_CONST64(0x000ffffffffff000);
|
|
|
|
|
|
|
|
if (leaf == BX_LEVEL_PTE) {
|
|
|
|
// Make up the physical page frame address.
|
|
|
|
ppf = (bx_phy_address)(curr_entry & BX_CONST64(0x000ffffffffff000));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (curr_entry & 0x80) {
|
2010-10-07 20:39:31 +04:00
|
|
|
if (leaf > (BX_LEVEL_PDE + !!bx_cpuid_support_1g_paging())) {
|
2011-05-30 00:09:31 +04:00
|
|
|
BX_DEBUG(("EPT %s: PS bit set !", bx_paging_level[leaf]));
|
2010-04-07 21:12:17 +04:00
|
|
|
vmexit_reason = VMX_VMEXIT_EPT_VIOLATION;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (leaf == BX_LEVEL_PDPE) {
|
|
|
|
if (curr_entry & PAGING_PAE_PDPTE1G_RESERVED_BITS) {
|
|
|
|
BX_DEBUG(("EPT PDPE1G: reserved bit is set: PDPE=%08x:%08x", GET32H(curr_entry), GET32L(curr_entry)));
|
|
|
|
vmexit_reason = VMX_VMEXIT_EPT_VIOLATION;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make up the physical page frame address.
|
|
|
|
ppf = (bx_phy_address)((curr_entry & BX_CONST64(0x000fffffc0000000)) | (guest_paddr & 0x3ffff000));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (leaf == BX_LEVEL_PDE) {
|
|
|
|
if (curr_entry & PAGING_PAE_PDE2M_RESERVED_BITS) {
|
|
|
|
BX_DEBUG(("EPT PDE2M: reserved bit is set PDE=%08x:%08x", GET32H(curr_entry), GET32L(curr_entry)));
|
|
|
|
vmexit_reason = VMX_VMEXIT_EPT_VIOLATION;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Make up the physical page frame address.
|
|
|
|
ppf = (bx_phy_address)((curr_entry & BX_CONST64(0x000fffffffe00000)) | (guest_paddr & 0x001ff000));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((access_mask & combined_access) != access_mask) {
|
|
|
|
vmexit_reason = VMX_VMEXIT_EPT_VIOLATION;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (vmexit_reason) {
|
|
|
|
BX_ERROR(("VMEXIT: EPT %s for guest paddr 0x" FMT_ADDRX " laddr " FMT_ADDRX,
|
|
|
|
(vmexit_reason == VMX_VMEXIT_EPT_VIOLATION) ? "violation" : "misconfig", guest_paddr, guest_laddr));
|
|
|
|
VMwrite64(VMCS_64BIT_GUEST_PHYSICAL_ADDR, guest_paddr);
|
|
|
|
if (guest_laddr_valid) {
|
|
|
|
VMwrite64(VMCS_GUEST_LINEAR_ADDR, guest_laddr);
|
|
|
|
vmexit_qualification |= 0x80;
|
|
|
|
if (is_page_walk) vmexit_qualification |= 0x100;
|
|
|
|
}
|
|
|
|
VMexit(0, vmexit_reason, vmexit_qualification | (combined_access << 3));
|
|
|
|
}
|
|
|
|
|
|
|
|
Bit32u page_offset = PAGE_OFFSET(guest_paddr);
|
|
|
|
return ppf | page_offset;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2002-10-03 08:53:53 +04:00
|
|
|
#if BX_DEBUGGER || BX_DISASM || BX_INSTRUMENTATION || BX_GDBSTUB
|
2001-04-10 05:04:59 +04:00
|
|
|
|
2010-05-05 00:16:38 +04:00
|
|
|
#if BX_DEBUGGER
|
|
|
|
|
2010-05-06 00:10:15 +04:00
|
|
|
void dbg_print_paging_pte(int level, Bit64u entry)
|
2010-05-05 00:16:38 +04:00
|
|
|
{
|
2010-05-06 00:10:15 +04:00
|
|
|
dbg_printf("%4s: 0x%08x%08x", bx_paging_level[level], GET32H(entry), GET32L(entry));
|
2010-05-05 00:16:38 +04:00
|
|
|
|
2010-05-06 00:10:15 +04:00
|
|
|
if (level == BX_LEVEL_PTE) {
|
|
|
|
dbg_printf(" %s %s %s",
|
|
|
|
(entry & 0x0100) ? "G" : "g",
|
|
|
|
(entry & 0x0080) ? "PAT" : "pat",
|
|
|
|
(entry & 0x0040) ? "D" : "d");
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if (entry & 0x80) {
|
|
|
|
dbg_printf(" PS %s %s %s",
|
|
|
|
(entry & 0x0100) ? "G" : "g",
|
|
|
|
(entry & 0x1000) ? "PAT" : "pat",
|
|
|
|
(entry & 0x0040) ? "D" : "d");
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
dbg_printf(" ps ");
|
|
|
|
}
|
|
|
|
}
|
2010-05-05 00:16:38 +04:00
|
|
|
|
2010-05-06 00:10:15 +04:00
|
|
|
dbg_printf(" %s %s %s %s %s %s\n",
|
|
|
|
(entry & 0x20) ? "A" : "a",
|
2010-05-05 00:16:38 +04:00
|
|
|
(entry & 0x10) ? "PCD" : "pcd",
|
|
|
|
(entry & 0x08) ? "PWT" : "pwt",
|
|
|
|
(entry & 0x04) ? "U" : "S",
|
|
|
|
(entry & 0x02) ? "W" : "R",
|
|
|
|
(entry & 0x01) ? "P" : "p");
|
|
|
|
}
|
|
|
|
|
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
void dbg_print_ept_paging_pte(int level, Bit64u entry)
|
|
|
|
{
|
2010-05-06 00:10:15 +04:00
|
|
|
dbg_printf("EPT %4s: 0x%08x%08x", bx_paging_level[level], GET32H(entry), GET32L(entry));
|
2010-05-05 00:16:38 +04:00
|
|
|
|
|
|
|
if (level != BX_LEVEL_PTE && (entry & 0x80))
|
|
|
|
dbg_printf(" PS");
|
|
|
|
else
|
|
|
|
dbg_printf(" ");
|
|
|
|
|
|
|
|
dbg_printf(" %s %s %s\n",
|
|
|
|
(entry & 0x04) ? "E" : "e",
|
|
|
|
(entry & 0x02) ? "W" : "w",
|
|
|
|
(entry & 0x01) ? "R" : "r");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif // BX_DEBUGGER
|
|
|
|
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
2010-05-05 00:16:38 +04:00
|
|
|
bx_bool BX_CPU_C::dbg_translate_guest_physical(bx_phy_address guest_paddr, bx_phy_address *phy, bx_bool verbose)
|
2010-04-07 21:12:17 +04:00
|
|
|
{
|
|
|
|
VMCS_CACHE *vm = &BX_CPU_THIS_PTR vmcs;
|
|
|
|
bx_phy_address pt_address = LPFOf(vm->eptptr);
|
2010-04-08 19:50:39 +04:00
|
|
|
Bit64u offset_mask = BX_CONST64(0x0000ffffffffffff);
|
2010-04-07 21:12:17 +04:00
|
|
|
|
|
|
|
for (int level = 3; level >= 0; --level) {
|
|
|
|
Bit64u pte;
|
|
|
|
pt_address += ((guest_paddr >> (9 + 9*level)) & 0xff8);
|
2010-04-08 19:50:39 +04:00
|
|
|
offset_mask >>= 9;
|
2010-05-05 00:16:38 +04:00
|
|
|
BX_MEM(0)->readPhysicalPage(BX_CPU_THIS, pt_address, 8, &pte);
|
|
|
|
#if BX_DEBUGGER
|
|
|
|
if (verbose)
|
|
|
|
dbg_print_ept_paging_pte(level, pte);
|
|
|
|
#endif
|
2010-04-07 21:12:17 +04:00
|
|
|
switch(pte & 7) {
|
|
|
|
case BX_EPT_ENTRY_NOT_PRESENT:
|
|
|
|
case BX_EPT_ENTRY_WRITE_ONLY:
|
|
|
|
case BX_EPT_ENTRY_WRITE_EXECUTE:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (pte & BX_PAGING_PHY_ADDRESS_RESERVED_BITS)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
pt_address = bx_phy_address(pte & BX_CONST64(0x000ffffffffff000));
|
|
|
|
|
2010-04-13 21:56:50 +04:00
|
|
|
if (level == BX_LEVEL_PTE) break;
|
|
|
|
|
2010-04-07 21:12:17 +04:00
|
|
|
if (pte & 0x80) {
|
2010-10-07 20:39:31 +04:00
|
|
|
if (level > (BX_LEVEL_PDE + !!bx_cpuid_support_1g_paging()))
|
2010-04-13 21:56:50 +04:00
|
|
|
return 0;
|
|
|
|
|
2010-04-07 21:12:17 +04:00
|
|
|
pt_address &= BX_CONST64(0x000fffffffffe000);
|
|
|
|
if (pt_address & offset_mask) return 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
*phy = pt_address + (bx_phy_address)(guest_paddr & offset_mask);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2010-05-05 00:16:38 +04:00
|
|
|
bx_bool BX_CPU_C::dbg_xlate_linear2phy(bx_address laddr, bx_phy_address *phy, bx_bool verbose)
|
2001-04-10 05:04:59 +04:00
|
|
|
{
|
2010-04-07 21:12:17 +04:00
|
|
|
if (! BX_CPU_THIS_PTR cr0.get_PG()) {
|
2007-12-30 20:53:12 +03:00
|
|
|
*phy = (bx_phy_address) laddr;
|
2006-06-17 16:09:55 +04:00
|
|
|
return 1;
|
2004-12-17 01:21:35 +03:00
|
|
|
}
|
2001-04-10 05:04:59 +04:00
|
|
|
|
2007-10-09 00:45:30 +04:00
|
|
|
bx_phy_address paddress;
|
2010-04-04 13:05:21 +04:00
|
|
|
bx_phy_address pt_address = BX_CPU_THIS_PTR cr3 & BX_CR3_PAGING_MASK;
|
2001-04-10 05:04:59 +04:00
|
|
|
|
|
|
|
// see if page is in the TLB first
|
2010-05-05 00:16:38 +04:00
|
|
|
if (! verbose) {
|
|
|
|
bx_address lpf = LPFOf(laddr);
|
|
|
|
unsigned TLB_index = BX_TLB_INDEX_OF(lpf, 0);
|
|
|
|
bx_TLB_entry *tlbEntry = &BX_CPU_THIS_PTR TLB.entry[TLB_index];
|
2005-06-15 00:55:57 +04:00
|
|
|
|
2010-05-05 00:16:38 +04:00
|
|
|
if (TLB_LPFOf(tlbEntry->lpf) == lpf) {
|
|
|
|
paddress = tlbEntry->ppf | PAGE_OFFSET(laddr);
|
|
|
|
*phy = paddress;
|
|
|
|
return 1;
|
|
|
|
}
|
2004-10-21 22:20:40 +04:00
|
|
|
}
|
2001-04-10 05:04:59 +04:00
|
|
|
|
2009-06-15 13:30:56 +04:00
|
|
|
#if BX_CPU_LEVEL >= 6
|
2005-02-16 21:58:48 +03:00
|
|
|
if (BX_CPU_THIS_PTR cr4.get_PAE()) {
|
2010-04-08 19:50:39 +04:00
|
|
|
Bit64u offset_mask = BX_CONST64(0x0000ffffffffffff);
|
2010-04-14 19:41:57 +04:00
|
|
|
|
|
|
|
int level = 3;
|
2010-04-08 19:50:39 +04:00
|
|
|
if (! long_mode()) {
|
2010-04-14 19:41:57 +04:00
|
|
|
if (! BX_CPU_THIS_PTR PDPTR_CACHE.valid)
|
|
|
|
goto page_fault;
|
|
|
|
pt_address = BX_CPU_THIS_PTR PDPTR_CACHE.entry[(laddr >> 30) & 3] & BX_CONST64(0x000ffffffffff000);
|
|
|
|
offset_mask >>= 18;
|
|
|
|
level = 1;
|
2010-04-08 19:50:39 +04:00
|
|
|
}
|
2010-04-14 19:41:57 +04:00
|
|
|
|
|
|
|
for (; level >= 0; --level) {
|
2005-02-16 21:58:48 +03:00
|
|
|
Bit64u pte;
|
2010-04-04 13:04:12 +04:00
|
|
|
pt_address += ((laddr >> (9 + 9*level)) & 0xff8);
|
2010-04-08 19:50:39 +04:00
|
|
|
offset_mask >>= 9;
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
if (BX_CPU_THIS_PTR in_vmx_guest) {
|
|
|
|
if (SECONDARY_VMEXEC_CONTROL(VMX_VM_EXEC_CTRL3_EPT_ENABLE)) {
|
2010-05-05 00:16:38 +04:00
|
|
|
if (! dbg_translate_guest_physical(pt_address, &pt_address, verbose))
|
2010-04-07 21:12:17 +04:00
|
|
|
goto page_fault;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2010-03-31 18:17:51 +04:00
|
|
|
BX_MEM(0)->readPhysicalPage(BX_CPU_THIS, pt_address, 8, &pte);
|
2010-05-05 00:16:38 +04:00
|
|
|
#if BX_DEBUGGER
|
|
|
|
if (verbose)
|
2010-05-06 00:10:15 +04:00
|
|
|
dbg_print_paging_pte(level, pte);
|
2010-05-05 00:16:38 +04:00
|
|
|
#endif
|
2008-05-11 02:11:48 +04:00
|
|
|
if(!(pte & 1))
|
2009-09-26 17:50:09 +04:00
|
|
|
goto page_fault;
|
2009-10-31 22:16:09 +03:00
|
|
|
if (pte & BX_PAGING_PHY_ADDRESS_RESERVED_BITS)
|
2009-09-26 17:50:09 +04:00
|
|
|
goto page_fault;
|
2008-05-11 02:11:48 +04:00
|
|
|
pt_address = bx_phy_address(pte & BX_CONST64(0x000ffffffffff000));
|
2010-04-08 19:50:39 +04:00
|
|
|
if (level == BX_LEVEL_PTE) break;
|
2009-09-26 17:50:09 +04:00
|
|
|
if (pte & 0x80) {
|
2010-04-24 13:36:04 +04:00
|
|
|
// 2M page
|
|
|
|
if (level == BX_LEVEL_PDE) {
|
2010-04-03 20:52:33 +04:00
|
|
|
pt_address &= BX_CONST64(0x000fffffffffe000);
|
2010-04-04 13:04:12 +04:00
|
|
|
if (pt_address & offset_mask)
|
|
|
|
goto page_fault;
|
2009-09-26 17:50:09 +04:00
|
|
|
break;
|
|
|
|
}
|
2010-04-24 13:36:04 +04:00
|
|
|
// 1G page
|
|
|
|
if (bx_cpuid_support_1g_paging() && level == BX_LEVEL_PDPE && long_mode()) {
|
2010-04-03 20:52:33 +04:00
|
|
|
pt_address &= BX_CONST64(0x000fffffffffe000);
|
2010-04-04 13:04:12 +04:00
|
|
|
if (pt_address & offset_mask)
|
|
|
|
goto page_fault;
|
2009-09-26 17:50:09 +04:00
|
|
|
break;
|
|
|
|
}
|
2010-04-08 19:50:39 +04:00
|
|
|
goto page_fault;
|
2005-02-16 21:58:48 +03:00
|
|
|
}
|
|
|
|
}
|
2007-12-23 20:21:28 +03:00
|
|
|
paddress = pt_address + (bx_phy_address)(laddr & offset_mask);
|
2008-02-03 00:46:54 +03:00
|
|
|
}
|
2005-11-17 20:52:00 +03:00
|
|
|
else // not PAE
|
|
|
|
#endif
|
|
|
|
{
|
2010-04-08 19:50:39 +04:00
|
|
|
Bit32u offset_mask = 0xfff;
|
2005-02-16 21:58:48 +03:00
|
|
|
for (int level = 1; level >= 0; --level) {
|
|
|
|
Bit32u pte;
|
2010-04-04 13:04:12 +04:00
|
|
|
pt_address += ((laddr >> (10 + 10*level)) & 0xffc);
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
if (BX_CPU_THIS_PTR in_vmx_guest) {
|
|
|
|
if (SECONDARY_VMEXEC_CONTROL(VMX_VM_EXEC_CTRL3_EPT_ENABLE)) {
|
2010-05-05 00:16:38 +04:00
|
|
|
if (! dbg_translate_guest_physical(pt_address, &pt_address, verbose))
|
2010-04-07 21:12:17 +04:00
|
|
|
goto page_fault;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2010-03-31 18:17:51 +04:00
|
|
|
BX_MEM(0)->readPhysicalPage(BX_CPU_THIS, pt_address, 4, &pte);
|
2010-05-05 00:16:38 +04:00
|
|
|
#if BX_DEBUGGER
|
|
|
|
if (verbose)
|
2010-05-06 00:10:15 +04:00
|
|
|
dbg_print_paging_pte(level, pte);
|
2010-05-05 00:16:38 +04:00
|
|
|
#endif
|
2010-05-04 23:02:51 +04:00
|
|
|
if (!(pte & 1))
|
2010-04-08 19:50:39 +04:00
|
|
|
goto page_fault;
|
2005-02-16 21:58:48 +03:00
|
|
|
pt_address = pte & 0xfffff000;
|
2010-05-25 22:52:01 +04:00
|
|
|
#if BX_CPU_LEVEL >= 6
|
2010-05-04 23:02:51 +04:00
|
|
|
if (level == BX_LEVEL_PDE && (pte & 0x80) != 0 && BX_CPU_THIS_PTR cr4.get_PSE()) {
|
2010-04-08 19:50:39 +04:00
|
|
|
offset_mask = 0x3fffff;
|
2010-05-04 23:02:51 +04:00
|
|
|
pt_address = pte & 0xffc00000;
|
2009-10-25 01:00:43 +04:00
|
|
|
#if BX_PHY_ADDRESS_WIDTH > 32
|
2009-10-27 01:05:00 +03:00
|
|
|
pt_address += ((bx_phy_address)(pte & 0x003fe000)) << 19;
|
2009-10-25 01:00:43 +04:00
|
|
|
#endif
|
2010-04-08 19:50:39 +04:00
|
|
|
break;
|
2005-02-16 21:58:48 +03:00
|
|
|
}
|
2010-05-25 22:52:01 +04:00
|
|
|
#endif
|
2005-02-16 21:58:48 +03:00
|
|
|
}
|
2007-12-23 20:21:28 +03:00
|
|
|
paddress = pt_address + (bx_phy_address)(laddr & offset_mask);
|
2005-01-20 22:37:43 +03:00
|
|
|
}
|
2001-04-10 05:04:59 +04:00
|
|
|
|
2010-04-07 21:12:17 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
|
|
|
if (BX_CPU_THIS_PTR in_vmx_guest) {
|
|
|
|
if (SECONDARY_VMEXEC_CONTROL(VMX_VM_EXEC_CTRL3_EPT_ENABLE)) {
|
2010-05-05 00:16:38 +04:00
|
|
|
if (! dbg_translate_guest_physical(paddress, &paddress, verbose))
|
2010-04-07 21:12:17 +04:00
|
|
|
goto page_fault;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2001-04-10 05:04:59 +04:00
|
|
|
*phy = paddress;
|
2006-06-17 16:09:55 +04:00
|
|
|
return 1;
|
2001-04-10 05:04:59 +04:00
|
|
|
|
|
|
|
page_fault:
|
|
|
|
*phy = 0;
|
2006-06-17 16:09:55 +04:00
|
|
|
return 0;
|
2001-04-10 05:04:59 +04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2008-03-29 21:18:08 +03:00
|
|
|
void BX_CPU_C::access_write_linear(bx_address laddr, unsigned len, unsigned curr_pl, void *data)
|
2001-04-10 05:04:59 +04:00
|
|
|
{
|
|
|
|
#if BX_X86_DEBUGGER
|
2008-03-29 21:18:08 +03:00
|
|
|
hwbreakpoint_match(laddr, len, BX_WRITE);
|
2001-04-10 05:04:59 +04:00
|
|
|
#endif
|
|
|
|
|
2007-12-27 02:07:44 +03:00
|
|
|
Bit32u pageOffset = PAGE_OFFSET(laddr);
|
2001-04-10 05:04:59 +04:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
/* check for reference across multiple pages */
|
|
|
|
if ((pageOffset + len) <= 4096) {
|
|
|
|
// Access within single page.
|
2011-05-29 20:28:26 +04:00
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1 = translate_linear(laddr, (curr_pl==3), BX_WRITE);
|
2010-03-19 20:00:05 +03:00
|
|
|
BX_CPU_THIS_PTR address_xlation.pages = 1;
|
2008-03-29 21:18:08 +03:00
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
BX_INSTR_LIN_ACCESS(BX_CPU_ID, laddr, BX_CPU_THIS_PTR address_xlation.paddress1, len, BX_WRITE);
|
|
|
|
BX_DBG_LIN_MEMORY_ACCESS(BX_CPU_ID, laddr, BX_CPU_THIS_PTR address_xlation.paddress1,
|
2008-04-19 17:21:23 +04:00
|
|
|
len, curr_pl, BX_WRITE, (Bit8u*) data);
|
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
access_write_physical(BX_CPU_THIS_PTR address_xlation.paddress1, len, data);
|
2008-03-29 21:18:08 +03:00
|
|
|
}
|
|
|
|
else {
|
2010-03-19 20:00:05 +03:00
|
|
|
// access across 2 pages
|
2011-05-29 20:28:26 +04:00
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1 = translate_linear(laddr, (curr_pl == 3), BX_WRITE);
|
2010-03-19 20:00:05 +03:00
|
|
|
BX_CPU_THIS_PTR address_xlation.len1 = 4096 - pageOffset;
|
2011-04-24 00:39:27 +04:00
|
|
|
BX_CPU_THIS_PTR address_xlation.len2 = len - BX_CPU_THIS_PTR address_xlation.len1;
|
|
|
|
BX_CPU_THIS_PTR address_xlation.pages = 2;
|
2010-03-19 20:00:05 +03:00
|
|
|
bx_address laddr2 = laddr + BX_CPU_THIS_PTR address_xlation.len1;
|
2011-05-27 12:50:38 +04:00
|
|
|
#if BX_SUPPORT_X86_64
|
|
|
|
if (! long64_mode()) laddr2 &= 0xffffffff; /* handle linear address wrap in legacy mode */
|
|
|
|
#endif
|
2011-05-29 20:28:26 +04:00
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress2 = translate_linear(laddr2, (curr_pl == 3), BX_WRITE);
|
2008-03-29 21:18:08 +03:00
|
|
|
|
|
|
|
#ifdef BX_LITTLE_ENDIAN
|
2010-03-19 20:00:05 +03:00
|
|
|
BX_INSTR_LIN_ACCESS(BX_CPU_ID, laddr,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len1, BX_WRITE);
|
|
|
|
BX_DBG_LIN_MEMORY_ACCESS(BX_CPU_ID, laddr,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len1, curr_pl,
|
|
|
|
BX_WRITE, (Bit8u*) data);
|
|
|
|
access_write_physical(BX_CPU_THIS_PTR address_xlation.paddress1,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len1, data);
|
|
|
|
BX_INSTR_LIN_ACCESS(BX_CPU_ID, laddr2, BX_CPU_THIS_PTR address_xlation.paddress2,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len2, BX_WRITE);
|
|
|
|
BX_DBG_LIN_MEMORY_ACCESS(BX_CPU_ID, laddr2, BX_CPU_THIS_PTR address_xlation.paddress2,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len2, curr_pl,
|
|
|
|
BX_WRITE, ((Bit8u*)data) + BX_CPU_THIS_PTR address_xlation.len1);
|
|
|
|
access_write_physical(BX_CPU_THIS_PTR address_xlation.paddress2,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len2,
|
|
|
|
((Bit8u*)data) + BX_CPU_THIS_PTR address_xlation.len1);
|
2008-03-29 21:18:08 +03:00
|
|
|
#else // BX_BIG_ENDIAN
|
2010-03-19 20:00:05 +03:00
|
|
|
BX_INSTR_LIN_ACCESS(BX_CPU_ID, laddr,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len1, BX_WRITE);
|
|
|
|
BX_DBG_LIN_MEMORY_ACCESS(BX_CPU_ID, laddr,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len1, curr_pl,
|
|
|
|
BX_WRITE, ((Bit8u*)data) + (len - BX_CPU_THIS_PTR address_xlation.len1));
|
|
|
|
access_write_physical(BX_CPU_THIS_PTR address_xlation.paddress1,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len1,
|
|
|
|
((Bit8u*)data) + (len - BX_CPU_THIS_PTR address_xlation.len1));
|
|
|
|
BX_INSTR_LIN_ACCESS(BX_CPU_ID, laddr2, BX_CPU_THIS_PTR address_xlation.paddress2,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len2, BX_WRITE);
|
|
|
|
BX_DBG_LIN_MEMORY_ACCESS(BX_CPU_ID, laddr2, BX_CPU_THIS_PTR address_xlation.paddress2,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len2, curr_pl,
|
|
|
|
BX_WRITE, (Bit8u*) data);
|
|
|
|
access_write_physical(BX_CPU_THIS_PTR address_xlation.paddress2,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len2, data);
|
2008-03-29 21:18:08 +03:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void BX_CPU_C::access_read_linear(bx_address laddr, unsigned len, unsigned curr_pl, unsigned xlate_rw, void *data)
|
|
|
|
{
|
2008-03-30 00:12:11 +03:00
|
|
|
BX_ASSERT(xlate_rw == BX_READ || xlate_rw == BX_RW);
|
|
|
|
|
2008-03-29 21:18:08 +03:00
|
|
|
#if BX_X86_DEBUGGER
|
|
|
|
hwbreakpoint_match(laddr, len, xlate_rw);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
Bit32u pageOffset = PAGE_OFFSET(laddr);
|
|
|
|
|
2010-03-19 20:00:05 +03:00
|
|
|
/* check for reference across multiple pages */
|
|
|
|
if ((pageOffset + len) <= 4096) {
|
|
|
|
// Access within single page.
|
2011-05-29 20:28:26 +04:00
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1 = translate_linear(laddr, (curr_pl == 3), xlate_rw);
|
2010-03-19 20:00:05 +03:00
|
|
|
BX_CPU_THIS_PTR address_xlation.pages = 1;
|
|
|
|
access_read_physical(BX_CPU_THIS_PTR address_xlation.paddress1, len, data);
|
|
|
|
BX_INSTR_LIN_ACCESS(BX_CPU_ID, laddr,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1, len, xlate_rw);
|
|
|
|
BX_DBG_LIN_MEMORY_ACCESS(BX_CPU_ID, laddr,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1, len, curr_pl,
|
|
|
|
BX_READ, (Bit8u*) data);
|
2005-02-16 21:58:48 +03:00
|
|
|
}
|
2001-04-10 05:04:59 +04:00
|
|
|
else {
|
2010-03-19 20:00:05 +03:00
|
|
|
// access across 2 pages
|
2011-05-29 20:28:26 +04:00
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1 = translate_linear(laddr, (curr_pl == 3), xlate_rw);
|
2010-03-19 20:00:05 +03:00
|
|
|
BX_CPU_THIS_PTR address_xlation.len1 = 4096 - pageOffset;
|
2011-04-24 00:39:27 +04:00
|
|
|
BX_CPU_THIS_PTR address_xlation.len2 = len - BX_CPU_THIS_PTR address_xlation.len1;
|
|
|
|
BX_CPU_THIS_PTR address_xlation.pages = 2;
|
2010-03-19 20:00:05 +03:00
|
|
|
bx_address laddr2 = laddr + BX_CPU_THIS_PTR address_xlation.len1;
|
2011-05-27 12:50:38 +04:00
|
|
|
#if BX_SUPPORT_X86_64
|
|
|
|
if (! long64_mode()) laddr2 &= 0xffffffff; /* handle linear address wrap in legacy mode */
|
|
|
|
#endif
|
2011-05-29 20:28:26 +04:00
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress2 = translate_linear(laddr2, (curr_pl == 3), xlate_rw);
|
Now, when you compile with --enable-guest2host-tlb, non-paged
mode uses the notion of the guest-to-host TLB. This has the
benefit of allowing more uniform and streamlined acceleration
code in access.cc which does not have to check if CR0.PG
is set, eliminating a few instructions per guest access.
Shaved just a little off execution time, as expected.
Also, access_linear now breaks accesses which span two pages,
into two calls the the physical memory routines, when paging
is off, just like it always has for paging on. Besides
being more uniform, this allows the physical memory access
routines to known the complete data item is contained
within a single physical page, and stop reapplying the
A20ADDR() macro to pointers as it increments them.
Perhaps things can be optimized a little more now there too...
I renamed the routines to {read,write}PhysicalPage() as
a reminder that these routines now operate on data
solely within one page.
I also added a little code so that the paging module is
notified when the A20 line is tweaked, so it can dump
whatever mappings it wants to.
2002-09-05 06:31:24 +04:00
|
|
|
|
|
|
|
#ifdef BX_LITTLE_ENDIAN
|
2010-03-19 20:00:05 +03:00
|
|
|
access_read_physical(BX_CPU_THIS_PTR address_xlation.paddress1,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len1, data);
|
|
|
|
BX_INSTR_LIN_ACCESS(BX_CPU_ID, laddr,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len1, xlate_rw);
|
|
|
|
BX_DBG_LIN_MEMORY_ACCESS(BX_CPU_ID, laddr,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len1, curr_pl,
|
|
|
|
BX_READ, (Bit8u*) data);
|
|
|
|
access_read_physical(BX_CPU_THIS_PTR address_xlation.paddress2,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len2,
|
|
|
|
((Bit8u*)data) + BX_CPU_THIS_PTR address_xlation.len1);
|
|
|
|
BX_INSTR_LIN_ACCESS(BX_CPU_ID, laddr2, BX_CPU_THIS_PTR address_xlation.paddress2,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len2, xlate_rw);
|
|
|
|
BX_DBG_LIN_MEMORY_ACCESS(BX_CPU_ID, laddr2, BX_CPU_THIS_PTR address_xlation.paddress2,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len2, curr_pl,
|
|
|
|
BX_READ, ((Bit8u*)data) + BX_CPU_THIS_PTR address_xlation.len1);
|
Now, when you compile with --enable-guest2host-tlb, non-paged
mode uses the notion of the guest-to-host TLB. This has the
benefit of allowing more uniform and streamlined acceleration
code in access.cc which does not have to check if CR0.PG
is set, eliminating a few instructions per guest access.
Shaved just a little off execution time, as expected.
Also, access_linear now breaks accesses which span two pages,
into two calls the the physical memory routines, when paging
is off, just like it always has for paging on. Besides
being more uniform, this allows the physical memory access
routines to known the complete data item is contained
within a single physical page, and stop reapplying the
A20ADDR() macro to pointers as it increments them.
Perhaps things can be optimized a little more now there too...
I renamed the routines to {read,write}PhysicalPage() as
a reminder that these routines now operate on data
solely within one page.
I also added a little code so that the paging module is
notified when the A20 line is tweaked, so it can dump
whatever mappings it wants to.
2002-09-05 06:31:24 +04:00
|
|
|
#else // BX_BIG_ENDIAN
|
2010-03-19 20:00:05 +03:00
|
|
|
access_read_physical(BX_CPU_THIS_PTR address_xlation.paddress1,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len1,
|
|
|
|
((Bit8u*)data) + (len - BX_CPU_THIS_PTR address_xlation.len1));
|
|
|
|
BX_INSTR_LIN_ACCESS(BX_CPU_ID, laddr,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len1, xlate_rw);
|
|
|
|
BX_DBG_LIN_MEMORY_ACCESS(BX_CPU_ID, laddr,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.paddress1,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len1, curr_pl,
|
|
|
|
BX_READ, ((Bit8u*)data) + (len - BX_CPU_THIS_PTR address_xlation.len1));
|
|
|
|
access_read_physical(BX_CPU_THIS_PTR address_xlation.paddress2,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len2, data);
|
|
|
|
BX_INSTR_LIN_ACCESS(BX_CPU_ID, laddr2, BX_CPU_THIS_PTR address_xlation.paddress2,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len2, xlate_rw);
|
|
|
|
BX_DBG_LIN_MEMORY_ACCESS(BX_CPU_ID, laddr2, BX_CPU_THIS_PTR address_xlation.paddress2,
|
|
|
|
BX_CPU_THIS_PTR address_xlation.len2, curr_pl,
|
|
|
|
BX_READ, (Bit8u*) data);
|
2005-02-16 21:58:48 +03:00
|
|
|
#endif
|
|
|
|
}
|
2001-04-10 05:04:59 +04:00
|
|
|
}
|
2009-02-17 22:20:47 +03:00
|
|
|
|
|
|
|
void BX_CPU_C::access_write_physical(bx_phy_address paddr, unsigned len, void *data)
|
|
|
|
{
|
2010-04-03 11:30:23 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
2010-03-16 17:51:20 +03:00
|
|
|
if (is_virtual_apic_page(paddr)) {
|
|
|
|
VMX_Virtual_Apic_Write(paddr, len, data);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2009-02-23 20:09:39 +03:00
|
|
|
#if BX_SUPPORT_APIC
|
2009-03-09 00:23:40 +03:00
|
|
|
if (BX_CPU_THIS_PTR lapic.is_selected(paddr)) {
|
|
|
|
BX_CPU_THIS_PTR lapic.write(paddr, data, len);
|
2009-02-17 22:20:47 +03:00
|
|
|
return;
|
|
|
|
}
|
2009-02-23 20:09:39 +03:00
|
|
|
#endif
|
2009-02-17 22:20:47 +03:00
|
|
|
|
|
|
|
BX_MEM(0)->writePhysicalPage(BX_CPU_THIS, paddr, len, data);
|
|
|
|
}
|
|
|
|
|
|
|
|
void BX_CPU_C::access_read_physical(bx_phy_address paddr, unsigned len, void *data)
|
|
|
|
{
|
2010-04-03 11:30:23 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
2010-03-16 17:51:20 +03:00
|
|
|
if (is_virtual_apic_page(paddr)) {
|
|
|
|
VMX_Virtual_Apic_Read(paddr, len, data);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2009-02-23 20:09:39 +03:00
|
|
|
#if BX_SUPPORT_APIC
|
2009-03-09 00:23:40 +03:00
|
|
|
if (BX_CPU_THIS_PTR lapic.is_selected(paddr)) {
|
|
|
|
BX_CPU_THIS_PTR lapic.read(paddr, data, len);
|
2009-02-17 22:20:47 +03:00
|
|
|
return;
|
|
|
|
}
|
2009-02-23 20:09:39 +03:00
|
|
|
#endif
|
2009-02-17 22:20:47 +03:00
|
|
|
|
|
|
|
BX_MEM(0)->readPhysicalPage(BX_CPU_THIS, paddr, len, data);
|
|
|
|
}
|
2010-03-16 17:51:20 +03:00
|
|
|
|
|
|
|
bx_hostpageaddr_t BX_CPU_C::getHostMemAddr(bx_phy_address ppf, unsigned rw)
|
|
|
|
{
|
2010-04-03 11:30:23 +04:00
|
|
|
#if BX_SUPPORT_VMX >= 2
|
2010-03-16 17:51:20 +03:00
|
|
|
if (is_virtual_apic_page(ppf))
|
|
|
|
return 0; // Do not allow direct access to virtual apic page
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if BX_SUPPORT_APIC
|
|
|
|
if (BX_CPU_THIS_PTR lapic.is_selected(ppf))
|
|
|
|
return 0; // Vetoed! APIC address space
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return (bx_hostpageaddr_t) BX_MEM(0)->getHostMemAddr(BX_CPU_THIS, ppf, rw);
|
|
|
|
}
|