From: Avi Kivity <avi@qumranet.com>
To: Jan Kiszka <jan.kiszka@web.de>
Cc: kvm-devel <kvm@vger.kernel.org>,
Mohammed Gamal <m.gamal005@gmail.com>,
Anthony Liguori <anthony@codemonkey.ws>,
Rik van Riel <riel@surriel.com>
Subject: Re: [PATCH 2/2] VMX: Reinject real mode exception
Date: Sun, 13 Jul 2008 15:06:06 +0300 [thread overview]
Message-ID: <4879EFAE.3080805@qumranet.com> (raw)
In-Reply-To: <4879E9C8.2010208@web.de>
Jan Kiszka wrote:
> As we execute real mode guests in VM86 mode, exception have to be
> reinjected appropriately when the guest triggered them. For this purpose
> the patch adopts the real-mode injection pattern used in vmx_inject_irq
> to vmx_queue_exception, additionally taking care that the IP is set
> correctly for #BP exceptions. Furthermore it extends
> handle_rmode_exception to reinject all those exceptions that can be
> raised in real mode.
>
> This fixes the execution of himem.exe from FreeDOS and also makes its
> debug.com work properly.
>
> Note that guest debugging in real mode is broken now. This has to be
> fixed by the scheduled debugging infrastructure rework (will be done
> once base patches for QEMU have been accepted).
>
> Signed-off-by: Jan Kiszka <jan.kiszka@web.de>
> ---
> arch/x86/kvm/vmx.c | 40 ++++++++++++++++++++++++++++++++++++++--
> include/asm-x86/kvm_host.h | 2 ++
> 2 files changed, 40 insertions(+), 2 deletions(-)
>
> Index: b/arch/x86/kvm/vmx.c
> ===================================================================
> --- a/arch/x86/kvm/vmx.c
> +++ b/arch/x86/kvm/vmx.c
> @@ -735,12 +735,30 @@ static void skip_emulated_instruction(st
> static void vmx_queue_exception(struct kvm_vcpu *vcpu, unsigned nr,
> bool has_error_code, u32 error_code)
> {
> + struct vcpu_vmx *vmx = to_vmx(vcpu);
> +
> + if (has_error_code)
> + vmcs_write32(VM_ENTRY_EXCEPTION_ERROR_CODE, error_code);
> +
> + if (vcpu->arch.rmode.active) {
> + vmx->rmode.irq.pending = true;
> + vmx->rmode.irq.vector = nr;
> + vmx->rmode.irq.rip = kvm_rip_read(vcpu);
> + if (nr == BP_VECTOR)
> + vmx->rmode.irq.rip++;
> + vmcs_write32(VM_ENTRY_INTR_INFO_FIELD,
> + nr | INTR_TYPE_SOFT_INTR
> + | (has_error_code ? INTR_INFO_DELIVER_CODE_MASK : 0)
> + | INTR_INFO_VALID_MASK);
> + vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1);
> + kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1);
> + return;
> + }
> +
>
It's a little sad that this duplicates vmx_inject_irq. But we can live
with it.
> vmcs_write32(VM_ENTRY_INTR_INFO_FIELD,
> nr | INTR_TYPE_EXCEPTION
> | (has_error_code ? INTR_INFO_DELIVER_CODE_MASK : 0)
> | INTR_INFO_VALID_MASK);
> - if (has_error_code)
> - vmcs_write32(VM_ENTRY_EXCEPTION_ERROR_CODE, error_code);
> }
>
> static bool vmx_exception_injected(struct kvm_vcpu *vcpu)
> @@ -2234,6 +2252,24 @@ static int handle_rmode_exception(struct
> if (((vec == GP_VECTOR) || (vec == SS_VECTOR)) && err_code == 0)
> if (emulate_instruction(vcpu, NULL, 0, 0, 0) == EMULATE_DONE)
> return 1;
> + /*
> + * Forward all other exceptions that are valid in real mode.
> + * FIXME: Breaks guest debugging in real mode, need to be fixed with
> + * the required debugging infrastructure rework.
> + */
> + switch (vec) {
> + case DF_VECTOR:
> + case SS_VECTOR:
> + case GP_VECTOR:
> + kvm_queue_exception_e(vcpu, vec, err_code);
>
These don't actually queue an error code in real mode. Compare the
'Real-Address Mode Exceptions' section with the 'Protected Mode
Exceptions' section for most instructions in the Intel manual.
> + return 1;
> + break;
> + case DE_VECTOR ... NM_VECTOR:
>
Please spell out explicitly. Also, NM_VECTOR is used by the host for
managing the guest fpu, so some NM_VECTORs should not be reflected. I
suggest simply dropping NM_VECTOR until this is worked out, as many
real-mode operating systems don't implement lazy fpu switching.
Also, NMI shouldn't be handled here.
> + case MF_VECTOR:
> + case MC_VECTOR:
>
I don't think #MC should be handled here. Machine checks have to be
handled by the host.
> + kvm_queue_exception(vcpu, vec);
> + return 1;
> + }
> return 0;
> }
>
--
error compiling committee.c: too many arguments to function
next prev parent reply other threads:[~2008-07-13 12:06 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-07-13 11:40 [PATCH 2/2] VMX: Reinject real mode exception Jan Kiszka
2008-07-13 12:06 ` Avi Kivity [this message]
2008-07-13 12:27 ` Jan Kiszka
2008-07-13 15:28 ` Avi Kivity
2008-07-13 15:31 ` Avi Kivity
2008-07-13 18:47 ` Nakajima, Jun
2008-07-13 19:22 ` Mohammed Gamal
2008-07-14 10:04 ` Avi Kivity
2008-07-14 10:28 ` Jan Kiszka
2008-07-14 11:30 ` Avi Kivity
2008-07-14 16:00 ` Nakajima, Jun
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4879EFAE.3080805@qumranet.com \
--to=avi@qumranet.com \
--cc=anthony@codemonkey.ws \
--cc=jan.kiszka@web.de \
--cc=kvm@vger.kernel.org \
--cc=m.gamal005@gmail.com \
--cc=riel@surriel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox