* buggy emulate_int_real
@ 2011-04-08 21:09 Serge E. Hallyn
2011-04-10 8:30 ` Avi Kivity
0 siblings, 1 reply; 17+ messages in thread
From: Serge E. Hallyn @ 2011-04-08 21:09 UTC (permalink / raw)
To: KVM mailing list
Hi,
at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was
found that emulate_int_real() sometimes pushes the wrong eip when doing a
int. Whereas with non-kvm qemu we push the next instruction after the
int, with kvm we push the addr of the instruction itself.
I thought it'd be simple to fix (bump the value being pushed :), but my
attempts at that have failed. Well, the right value seemed to get pushed,
but kvm started to act rather funky. So I just removed commits
a92601bb707f6f49fd5563ef3d09928e70cc222e
KVM: VMX: Emulated real mode interrupt injection
63995653ade16deacaea5b49ceaf6376314593ac
KVM: Add kvm_inject_realmode_interrupt() wrapper
6e154e56b4d7a6a28c54f0984e13d3f8defc4755
KVM: x86 emulator: Add into, int, and int3 instructions (opcodes 0xcc-0xce)
and now it behaves as I'd expect. There were a few commits tweaking these
functions, and I have not checked whether reverting some of those helps.
Anyone happen to know what exactly is going on?
thanks,
-serge
^ permalink raw reply [flat|nested] 17+ messages in thread* Re: buggy emulate_int_real 2011-04-08 21:09 buggy emulate_int_real Serge E. Hallyn @ 2011-04-10 8:30 ` Avi Kivity 2011-04-12 7:53 ` Serge E. Hallyn 0 siblings, 1 reply; 17+ messages in thread From: Avi Kivity @ 2011-04-10 8:30 UTC (permalink / raw) To: Serge E. Hallyn; +Cc: KVM mailing list On 04/09/2011 12:09 AM, Serge E. Hallyn wrote: > Hi, > > at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was > found that emulate_int_real() sometimes pushes the wrong eip when doing a > int. Whereas with non-kvm qemu we push the next instruction after the > int, with kvm we push the addr of the instruction itself. > The code says: c->src.val = c->eip; emulate_push(ctxt, ops); rc = writeback(ctxt, ops); if (rc != X86EMUL_CONTINUE) return rc; which appears to be the address of the next instruction from my reading of the code (see how insn_fetch() increments c->eip). -- error compiling committee.c: too many arguments to function ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-10 8:30 ` Avi Kivity @ 2011-04-12 7:53 ` Serge E. Hallyn 2011-04-12 8:02 ` Avi Kivity 0 siblings, 1 reply; 17+ messages in thread From: Serge E. Hallyn @ 2011-04-12 7:53 UTC (permalink / raw) To: Avi Kivity; +Cc: KVM mailing list Quoting Avi Kivity (avi@redhat.com): > On 04/09/2011 12:09 AM, Serge E. Hallyn wrote: > >Hi, > > > >at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was > >found that emulate_int_real() sometimes pushes the wrong eip when doing a > >int. Whereas with non-kvm qemu we push the next instruction after the > >int, with kvm we push the addr of the instruction itself. > > > > > The code says: > > c->src.val = c->eip; > emulate_push(ctxt, ops); > rc = writeback(ctxt, ops); > if (rc != X86EMUL_CONTINUE) > return rc; > > which appears to be the address of the next instruction from my > reading of the code (see how insn_fetch() increments c->eip). Nevertheless removing commits a92601bb707f6f49fd5563ef3d09928e70cc222e 63995653ade16deacaea5b49ceaf6376314593ac 6e154e56b4d7a6a28c54f0984e13d3f8defc4755 changes the eip value being pushed. If you look at a92601bb707f6f49fd5563ef3d09928e70cc222e, you see: if (vmx->rmode.vm86_active) { - vmx->rmode.irq.pending = true; - vmx->rmode.irq.vector = nr; - vmx->rmode.irq.rip = kvm_rip_read(vcpu); - if (kvm_exception_is_soft(nr)) - vmx->rmode.irq.rip += - vmx->vcpu.arch.event_exit_inst_len; - intr_info |= INTR_TYPE_SOFT_INTR; - vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr_info); - vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1); - kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1); + if (kvm_inject_realmode_interrupt(vcpu, nr) != EMULATE_DONE) + kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); return; } but kvm_inject_realmode_interrupt() does not appear to increment vmx->rmode.irq.rip anywhere, as the code being replaced does. -serge ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-12 7:53 ` Serge E. Hallyn @ 2011-04-12 8:02 ` Avi Kivity 2011-04-12 13:57 ` Serge E. Hallyn 2011-04-12 14:12 ` Serge E. Hallyn 0 siblings, 2 replies; 17+ messages in thread From: Avi Kivity @ 2011-04-12 8:02 UTC (permalink / raw) To: Serge E. Hallyn; +Cc: KVM mailing list On 04/12/2011 10:53 AM, Serge E. Hallyn wrote: > Quoting Avi Kivity (avi@redhat.com): > > On 04/09/2011 12:09 AM, Serge E. Hallyn wrote: > > >Hi, > > > > > >at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was > > >found that emulate_int_real() sometimes pushes the wrong eip when doing a > > >int. Whereas with non-kvm qemu we push the next instruction after the > > >int, with kvm we push the addr of the instruction itself. > > > > > > > > > The code says: > > > > c->src.val = c->eip; > > emulate_push(ctxt, ops); > > rc = writeback(ctxt, ops); > > if (rc != X86EMUL_CONTINUE) > > return rc; > > > > which appears to be the address of the next instruction from my > > reading of the code (see how insn_fetch() increments c->eip). > > Nevertheless removing commits > > a92601bb707f6f49fd5563ef3d09928e70cc222e > 63995653ade16deacaea5b49ceaf6376314593ac > 6e154e56b4d7a6a28c54f0984e13d3f8defc4755 > > changes the eip value being pushed. If you look at > a92601bb707f6f49fd5563ef3d09928e70cc222e, you see: > > if (vmx->rmode.vm86_active) { > - vmx->rmode.irq.pending = true; > - vmx->rmode.irq.vector = nr; > - vmx->rmode.irq.rip = kvm_rip_read(vcpu); > - if (kvm_exception_is_soft(nr)) > - vmx->rmode.irq.rip += > - vmx->vcpu.arch.event_exit_inst_len; > - intr_info |= INTR_TYPE_SOFT_INTR; > - vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr_info); > - vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1); > - kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1); > + if (kvm_inject_realmode_interrupt(vcpu, nr) != EMULATE_DONE) > + kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); > return; > } > > but kvm_inject_realmode_interrupt() does not appear to increment > vmx->rmode.irq.rip anywhere, as the code being replaced does. Ah, I see now. There are two cases, hard interrupt and soft interrupts. I guess hard interrupts are handled fine, and the failing case is guest executes INTn instruction in guest mode vmx intercepts a page fault (say due to access to the IDT or the stack) kvm notes that a soft interrupt was in progress (vmx_complete_interrupts) kvm handles the exception reinject the interrupt while reentering the guest so we do need something like if (soft) vcpu->arch.emulate_ctxt.eip += inst_len; in kvm_inject_realmode_interrupt(). -- error compiling committee.c: too many arguments to function ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-12 8:02 ` Avi Kivity @ 2011-04-12 13:57 ` Serge E. Hallyn 2011-04-12 14:14 ` Avi Kivity 2011-04-12 14:12 ` Serge E. Hallyn 1 sibling, 1 reply; 17+ messages in thread From: Serge E. Hallyn @ 2011-04-12 13:57 UTC (permalink / raw) To: Avi Kivity; +Cc: KVM mailing list Quoting Avi Kivity (avi@redhat.com): > On 04/12/2011 10:53 AM, Serge E. Hallyn wrote: > >Quoting Avi Kivity (avi@redhat.com): > >> On 04/09/2011 12:09 AM, Serge E. Hallyn wrote: > >> >Hi, > >> > > >> >at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was > >> >found that emulate_int_real() sometimes pushes the wrong eip when doing a > >> >int. Whereas with non-kvm qemu we push the next instruction after the > >> >int, with kvm we push the addr of the instruction itself. > >> > > >> > >> > >> The code says: > >> > >> c->src.val = c->eip; > >> emulate_push(ctxt, ops); > >> rc = writeback(ctxt, ops); > >> if (rc != X86EMUL_CONTINUE) > >> return rc; > >> > >> which appears to be the address of the next instruction from my > >> reading of the code (see how insn_fetch() increments c->eip). > > > >Nevertheless removing commits > > > > a92601bb707f6f49fd5563ef3d09928e70cc222e > > 63995653ade16deacaea5b49ceaf6376314593ac > > 6e154e56b4d7a6a28c54f0984e13d3f8defc4755 > > > >changes the eip value being pushed. If you look at > >a92601bb707f6f49fd5563ef3d09928e70cc222e, you see: > > > > if (vmx->rmode.vm86_active) { > >- vmx->rmode.irq.pending = true; > >- vmx->rmode.irq.vector = nr; > >- vmx->rmode.irq.rip = kvm_rip_read(vcpu); > >- if (kvm_exception_is_soft(nr)) > >- vmx->rmode.irq.rip += > >- vmx->vcpu.arch.event_exit_inst_len; > >- intr_info |= INTR_TYPE_SOFT_INTR; > >- vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr_info); > >- vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1); > >- kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1); > >+ if (kvm_inject_realmode_interrupt(vcpu, nr) != EMULATE_DONE) > >+ kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); > > return; > > } > > > >but kvm_inject_realmode_interrupt() does not appear to increment > >vmx->rmode.irq.rip anywhere, as the code being replaced does. > > Ah, I see now. There are two cases, hard interrupt and soft > interrupts. I guess hard interrupts are handled fine, and the > failing case is > > guest executes INTn instruction in guest mode > vmx intercepts a page fault (say due to access to the IDT or the stack) > kvm notes that a soft interrupt was in progress (vmx_complete_interrupts) > kvm handles the exception > reinject the interrupt while reentering the guest > > so we do need something like > > if (soft) > vcpu->arch.emulate_ctxt.eip += inst_len; > > in kvm_inject_realmode_interrupt(). But not always, so perhaps it would be better to still do this at the callers? For instance vmx_inject_nmi() didn't do it at all, and the other two callers only did it for a soft interrupt. -serge ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-12 13:57 ` Serge E. Hallyn @ 2011-04-12 14:14 ` Avi Kivity 0 siblings, 0 replies; 17+ messages in thread From: Avi Kivity @ 2011-04-12 14:14 UTC (permalink / raw) To: Serge E. Hallyn; +Cc: KVM mailing list On 04/12/2011 04:57 PM, Serge E. Hallyn wrote: > Quoting Avi Kivity (avi@redhat.com): > > On 04/12/2011 10:53 AM, Serge E. Hallyn wrote: > > >Quoting Avi Kivity (avi@redhat.com): > > >> On 04/09/2011 12:09 AM, Serge E. Hallyn wrote: > > >> >Hi, > > >> > > > >> >at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was > > >> >found that emulate_int_real() sometimes pushes the wrong eip when doing a > > >> >int. Whereas with non-kvm qemu we push the next instruction after the > > >> >int, with kvm we push the addr of the instruction itself. > > >> > > > >> > > >> > > >> The code says: > > >> > > >> c->src.val = c->eip; > > >> emulate_push(ctxt, ops); > > >> rc = writeback(ctxt, ops); > > >> if (rc != X86EMUL_CONTINUE) > > >> return rc; > > >> > > >> which appears to be the address of the next instruction from my > > >> reading of the code (see how insn_fetch() increments c->eip). > > > > > >Nevertheless removing commits > > > > > > a92601bb707f6f49fd5563ef3d09928e70cc222e > > > 63995653ade16deacaea5b49ceaf6376314593ac > > > 6e154e56b4d7a6a28c54f0984e13d3f8defc4755 > > > > > >changes the eip value being pushed. If you look at > > >a92601bb707f6f49fd5563ef3d09928e70cc222e, you see: > > > > > > if (vmx->rmode.vm86_active) { > > >- vmx->rmode.irq.pending = true; > > >- vmx->rmode.irq.vector = nr; > > >- vmx->rmode.irq.rip = kvm_rip_read(vcpu); > > >- if (kvm_exception_is_soft(nr)) > > >- vmx->rmode.irq.rip += > > >- vmx->vcpu.arch.event_exit_inst_len; > > >- intr_info |= INTR_TYPE_SOFT_INTR; > > >- vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr_info); > > >- vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1); > > >- kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1); > > >+ if (kvm_inject_realmode_interrupt(vcpu, nr) != EMULATE_DONE) > > >+ kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); > > > return; > > > } > > > > > >but kvm_inject_realmode_interrupt() does not appear to increment > > >vmx->rmode.irq.rip anywhere, as the code being replaced does. > > > > Ah, I see now. There are two cases, hard interrupt and soft > > interrupts. I guess hard interrupts are handled fine, and the > > failing case is > > > > guest executes INTn instruction in guest mode > > vmx intercepts a page fault (say due to access to the IDT or the stack) > > kvm notes that a soft interrupt was in progress (vmx_complete_interrupts) > > kvm handles the exception > > reinject the interrupt while reentering the guest > > > > so we do need something like > > > > if (soft) > > vcpu->arch.emulate_ctxt.eip += inst_len; > > > > in kvm_inject_realmode_interrupt(). > > But not always, so perhaps it would be better to still do this at > the callers? Possibly. > For instance vmx_inject_nmi() didn't do it at all, > and the other two callers only did it for a soft interrupt. NMIs are always hard. Perhaps have a new helper for this. -- error compiling committee.c: too many arguments to function ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-12 8:02 ` Avi Kivity 2011-04-12 13:57 ` Serge E. Hallyn @ 2011-04-12 14:12 ` Serge E. Hallyn 2011-04-12 14:16 ` Avi Kivity 1 sibling, 1 reply; 17+ messages in thread From: Serge E. Hallyn @ 2011-04-12 14:12 UTC (permalink / raw) To: Avi Kivity; +Cc: KVM mailing list Quoting Avi Kivity (avi@redhat.com): > On 04/12/2011 10:53 AM, Serge E. Hallyn wrote: > >Quoting Avi Kivity (avi@redhat.com): > >> On 04/09/2011 12:09 AM, Serge E. Hallyn wrote: > >> >Hi, > >> > > >> >at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was > >> >found that emulate_int_real() sometimes pushes the wrong eip when doing a > >> >int. Whereas with non-kvm qemu we push the next instruction after the > >> >int, with kvm we push the addr of the instruction itself. > >> > > >> > >> > >> The code says: > >> > >> c->src.val = c->eip; > >> emulate_push(ctxt, ops); > >> rc = writeback(ctxt, ops); > >> if (rc != X86EMUL_CONTINUE) > >> return rc; > >> > >> which appears to be the address of the next instruction from my > >> reading of the code (see how insn_fetch() increments c->eip). > > > >Nevertheless removing commits > > > > a92601bb707f6f49fd5563ef3d09928e70cc222e > > 63995653ade16deacaea5b49ceaf6376314593ac > > 6e154e56b4d7a6a28c54f0984e13d3f8defc4755 > > > >changes the eip value being pushed. If you look at > >a92601bb707f6f49fd5563ef3d09928e70cc222e, you see: > > > > if (vmx->rmode.vm86_active) { > >- vmx->rmode.irq.pending = true; > >- vmx->rmode.irq.vector = nr; > >- vmx->rmode.irq.rip = kvm_rip_read(vcpu); > >- if (kvm_exception_is_soft(nr)) > >- vmx->rmode.irq.rip += > >- vmx->vcpu.arch.event_exit_inst_len; > >- intr_info |= INTR_TYPE_SOFT_INTR; > >- vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr_info); > >- vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1); > >- kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1); > >+ if (kvm_inject_realmode_interrupt(vcpu, nr) != EMULATE_DONE) > >+ kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); > > return; > > } > > > >but kvm_inject_realmode_interrupt() does not appear to increment > >vmx->rmode.irq.rip anywhere, as the code being replaced does. > > Ah, I see now. There are two cases, hard interrupt and soft > interrupts. I guess hard interrupts are handled fine, and the > failing case is > > guest executes INTn instruction in guest mode > vmx intercepts a page fault (say due to access to the IDT or the stack) > kvm notes that a soft interrupt was in progress (vmx_complete_interrupts) > kvm handles the exception > reinject the interrupt while reentering the guest > > so we do need something like > > if (soft) > vcpu->arch.emulate_ctxt.eip += inst_len; > > in kvm_inject_realmode_interrupt(). Oops, right. Disregard last email pls :) So is 'kvm_exception_is_soft(irq)' a reliable check? (building a test kernel right now) thanks, -serge ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-12 14:12 ` Serge E. Hallyn @ 2011-04-12 14:16 ` Avi Kivity 2011-04-12 15:42 ` Jan Kiszka 0 siblings, 1 reply; 17+ messages in thread From: Avi Kivity @ 2011-04-12 14:16 UTC (permalink / raw) To: Serge E. Hallyn; +Cc: KVM mailing list, Jan Kiszka On 04/12/2011 05:12 PM, Serge E. Hallyn wrote: > Quoting Avi Kivity (avi@redhat.com): > > On 04/12/2011 10:53 AM, Serge E. Hallyn wrote: > > >Quoting Avi Kivity (avi@redhat.com): > > >> On 04/09/2011 12:09 AM, Serge E. Hallyn wrote: > > >> >Hi, > > >> > > > >> >at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was > > >> >found that emulate_int_real() sometimes pushes the wrong eip when doing a > > >> >int. Whereas with non-kvm qemu we push the next instruction after the > > >> >int, with kvm we push the addr of the instruction itself. > > >> > > > >> > > >> > > >> The code says: > > >> > > >> c->src.val = c->eip; > > >> emulate_push(ctxt, ops); > > >> rc = writeback(ctxt, ops); > > >> if (rc != X86EMUL_CONTINUE) > > >> return rc; > > >> > > >> which appears to be the address of the next instruction from my > > >> reading of the code (see how insn_fetch() increments c->eip). > > > > > >Nevertheless removing commits > > > > > > a92601bb707f6f49fd5563ef3d09928e70cc222e > > > 63995653ade16deacaea5b49ceaf6376314593ac > > > 6e154e56b4d7a6a28c54f0984e13d3f8defc4755 > > > > > >changes the eip value being pushed. If you look at > > >a92601bb707f6f49fd5563ef3d09928e70cc222e, you see: > > > > > > if (vmx->rmode.vm86_active) { > > >- vmx->rmode.irq.pending = true; > > >- vmx->rmode.irq.vector = nr; > > >- vmx->rmode.irq.rip = kvm_rip_read(vcpu); > > >- if (kvm_exception_is_soft(nr)) > > >- vmx->rmode.irq.rip += > > >- vmx->vcpu.arch.event_exit_inst_len; > > >- intr_info |= INTR_TYPE_SOFT_INTR; > > >- vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr_info); > > >- vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1); > > >- kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1); > > >+ if (kvm_inject_realmode_interrupt(vcpu, nr) != EMULATE_DONE) > > >+ kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); > > > return; > > > } > > > > > >but kvm_inject_realmode_interrupt() does not appear to increment > > >vmx->rmode.irq.rip anywhere, as the code being replaced does. > > > > Ah, I see now. There are two cases, hard interrupt and soft > > interrupts. I guess hard interrupts are handled fine, and the > > failing case is > > > > guest executes INTn instruction in guest mode > > vmx intercepts a page fault (say due to access to the IDT or the stack) > > kvm notes that a soft interrupt was in progress (vmx_complete_interrupts) > > kvm handles the exception > > reinject the interrupt while reentering the guest > > > > so we do need something like > > > > if (soft) > > vcpu->arch.emulate_ctxt.eip += inst_len; > > > > in kvm_inject_realmode_interrupt(). > > Oops, right. Disregard last email pls :) > > So is 'kvm_exception_is_soft(irq)' a reliable check? > No, need to check vcpu->arch.interrupt.soft instead. Not sure about kvm_exception_is_soft(). Jan? -- error compiling committee.c: too many arguments to function ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-12 14:16 ` Avi Kivity @ 2011-04-12 15:42 ` Jan Kiszka 2011-04-12 18:31 ` Serge E. Hallyn 0 siblings, 1 reply; 17+ messages in thread From: Jan Kiszka @ 2011-04-12 15:42 UTC (permalink / raw) To: Avi Kivity; +Cc: Serge E. Hallyn, KVM mailing list On 2011-04-12 16:16, Avi Kivity wrote: > On 04/12/2011 05:12 PM, Serge E. Hallyn wrote: >> Quoting Avi Kivity (avi@redhat.com): >>> On 04/12/2011 10:53 AM, Serge E. Hallyn wrote: >>> >Quoting Avi Kivity (avi@redhat.com): >>> >> On 04/09/2011 12:09 AM, Serge E. Hallyn wrote: >>> >> >Hi, >>> >> > >>> >> >at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was >>> >> >found that emulate_int_real() sometimes pushes the wrong eip when doing a >>> >> >int. Whereas with non-kvm qemu we push the next instruction after the >>> >> >int, with kvm we push the addr of the instruction itself. >>> >> > >>> >> >>> >> >>> >> The code says: >>> >> >>> >> c->src.val = c->eip; >>> >> emulate_push(ctxt, ops); >>> >> rc = writeback(ctxt, ops); >>> >> if (rc != X86EMUL_CONTINUE) >>> >> return rc; >>> >> >>> >> which appears to be the address of the next instruction from my >>> >> reading of the code (see how insn_fetch() increments c->eip). >>> > >>> >Nevertheless removing commits >>> > >>> > a92601bb707f6f49fd5563ef3d09928e70cc222e >>> > 63995653ade16deacaea5b49ceaf6376314593ac >>> > 6e154e56b4d7a6a28c54f0984e13d3f8defc4755 >>> > >>> >changes the eip value being pushed. If you look at >>> >a92601bb707f6f49fd5563ef3d09928e70cc222e, you see: >>> > >>> > if (vmx->rmode.vm86_active) { >>> >- vmx->rmode.irq.pending = true; >>> >- vmx->rmode.irq.vector = nr; >>> >- vmx->rmode.irq.rip = kvm_rip_read(vcpu); >>> >- if (kvm_exception_is_soft(nr)) >>> >- vmx->rmode.irq.rip += >>> >- vmx->vcpu.arch.event_exit_inst_len; >>> >- intr_info |= INTR_TYPE_SOFT_INTR; >>> >- vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr_info); >>> >- vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1); >>> >- kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1); >>> >+ if (kvm_inject_realmode_interrupt(vcpu, nr) != EMULATE_DONE) >>> >+ kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); >>> > return; >>> > } >>> > >>> >but kvm_inject_realmode_interrupt() does not appear to increment >>> >vmx->rmode.irq.rip anywhere, as the code being replaced does. >>> >>> Ah, I see now. There are two cases, hard interrupt and soft >>> interrupts. I guess hard interrupts are handled fine, and the >>> failing case is >>> >>> guest executes INTn instruction in guest mode >>> vmx intercepts a page fault (say due to access to the IDT or the stack) >>> kvm notes that a soft interrupt was in progress (vmx_complete_interrupts) >>> kvm handles the exception >>> reinject the interrupt while reentering the guest >>> >>> so we do need something like >>> >>> if (soft) >>> vcpu->arch.emulate_ctxt.eip += inst_len; >>> >>> in kvm_inject_realmode_interrupt(). >> >> Oops, right. Disregard last email pls :) >> >> So is 'kvm_exception_is_soft(irq)' a reliable check? >> > > No, need to check vcpu->arch.interrupt.soft instead. Not sure about > kvm_exception_is_soft(). Jan? Jumping late on this, I don't understand the question. Reliable /wrt what? Jan -- Siemens AG, Corporate Technology, CT T DE IT 1 Corporate Competence Center Embedded Linux ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-12 15:42 ` Jan Kiszka @ 2011-04-12 18:31 ` Serge E. Hallyn 2011-04-12 20:51 ` Jan Kiszka 0 siblings, 1 reply; 17+ messages in thread From: Serge E. Hallyn @ 2011-04-12 18:31 UTC (permalink / raw) To: Jan Kiszka; +Cc: Avi Kivity, KVM mailing list Quoting Jan Kiszka (jan.kiszka@siemens.com): > On 2011-04-12 16:16, Avi Kivity wrote: > > On 04/12/2011 05:12 PM, Serge E. Hallyn wrote: > >> Quoting Avi Kivity (avi@redhat.com): > >>> On 04/12/2011 10:53 AM, Serge E. Hallyn wrote: > >>> >Quoting Avi Kivity (avi@redhat.com): > >>> >> On 04/09/2011 12:09 AM, Serge E. Hallyn wrote: > >>> >> >Hi, > >>> >> > > >>> >> >at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was > >>> >> >found that emulate_int_real() sometimes pushes the wrong eip when doing a > >>> >> >int. Whereas with non-kvm qemu we push the next instruction after the > >>> >> >int, with kvm we push the addr of the instruction itself. > >>> >> > > >>> >> > >>> >> > >>> >> The code says: > >>> >> > >>> >> c->src.val = c->eip; > >>> >> emulate_push(ctxt, ops); > >>> >> rc = writeback(ctxt, ops); > >>> >> if (rc != X86EMUL_CONTINUE) > >>> >> return rc; > >>> >> > >>> >> which appears to be the address of the next instruction from my > >>> >> reading of the code (see how insn_fetch() increments c->eip). > >>> > > >>> >Nevertheless removing commits > >>> > > >>> > a92601bb707f6f49fd5563ef3d09928e70cc222e > >>> > 63995653ade16deacaea5b49ceaf6376314593ac > >>> > 6e154e56b4d7a6a28c54f0984e13d3f8defc4755 > >>> > > >>> >changes the eip value being pushed. If you look at > >>> >a92601bb707f6f49fd5563ef3d09928e70cc222e, you see: > >>> > > >>> > if (vmx->rmode.vm86_active) { > >>> >- vmx->rmode.irq.pending = true; > >>> >- vmx->rmode.irq.vector = nr; > >>> >- vmx->rmode.irq.rip = kvm_rip_read(vcpu); > >>> >- if (kvm_exception_is_soft(nr)) > >>> >- vmx->rmode.irq.rip += > >>> >- vmx->vcpu.arch.event_exit_inst_len; > >>> >- intr_info |= INTR_TYPE_SOFT_INTR; > >>> >- vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr_info); > >>> >- vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1); > >>> >- kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1); > >>> >+ if (kvm_inject_realmode_interrupt(vcpu, nr) != EMULATE_DONE) > >>> >+ kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); > >>> > return; > >>> > } > >>> > > >>> >but kvm_inject_realmode_interrupt() does not appear to increment > >>> >vmx->rmode.irq.rip anywhere, as the code being replaced does. > >>> > >>> Ah, I see now. There are two cases, hard interrupt and soft > >>> interrupts. I guess hard interrupts are handled fine, and the > >>> failing case is > >>> > >>> guest executes INTn instruction in guest mode > >>> vmx intercepts a page fault (say due to access to the IDT or the stack) > >>> kvm notes that a soft interrupt was in progress (vmx_complete_interrupts) > >>> kvm handles the exception > >>> reinject the interrupt while reentering the guest > >>> > >>> so we do need something like > >>> > >>> if (soft) > >>> vcpu->arch.emulate_ctxt.eip += inst_len; > >>> > >>> in kvm_inject_realmode_interrupt(). > >> > >> Oops, right. Disregard last email pls :) > >> > >> So is 'kvm_exception_is_soft(irq)' a reliable check? > >> > > > > No, need to check vcpu->arch.interrupt.soft instead. Not sure about > > kvm_exception_is_soft(). Jan? > > Jumping late on this, I don't understand the question. Reliable /wrt what? As to whether we are supposed to increment eip or not. thanks, -serge ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-12 18:31 ` Serge E. Hallyn @ 2011-04-12 20:51 ` Jan Kiszka 2011-04-12 21:25 ` Serge E. Hallyn 0 siblings, 1 reply; 17+ messages in thread From: Jan Kiszka @ 2011-04-12 20:51 UTC (permalink / raw) To: Serge E. Hallyn; +Cc: Avi Kivity, KVM mailing list [-- Attachment #1: Type: text/plain, Size: 4000 bytes --] On 2011-04-12 20:31, Serge E. Hallyn wrote: > Quoting Jan Kiszka (jan.kiszka@siemens.com): >> On 2011-04-12 16:16, Avi Kivity wrote: >>> On 04/12/2011 05:12 PM, Serge E. Hallyn wrote: >>>> Quoting Avi Kivity (avi@redhat.com): >>>>> On 04/12/2011 10:53 AM, Serge E. Hallyn wrote: >>>>> >Quoting Avi Kivity (avi@redhat.com): >>>>> >> On 04/09/2011 12:09 AM, Serge E. Hallyn wrote: >>>>> >> >Hi, >>>>> >> > >>>>> >> >at https://bugs.launchpad.net/ubuntu/+source/qemu-kvm/+bug/747090, it was >>>>> >> >found that emulate_int_real() sometimes pushes the wrong eip when doing a >>>>> >> >int. Whereas with non-kvm qemu we push the next instruction after the >>>>> >> >int, with kvm we push the addr of the instruction itself. >>>>> >> > >>>>> >> >>>>> >> >>>>> >> The code says: >>>>> >> >>>>> >> c->src.val = c->eip; >>>>> >> emulate_push(ctxt, ops); >>>>> >> rc = writeback(ctxt, ops); >>>>> >> if (rc != X86EMUL_CONTINUE) >>>>> >> return rc; >>>>> >> >>>>> >> which appears to be the address of the next instruction from my >>>>> >> reading of the code (see how insn_fetch() increments c->eip). >>>>> > >>>>> >Nevertheless removing commits >>>>> > >>>>> > a92601bb707f6f49fd5563ef3d09928e70cc222e >>>>> > 63995653ade16deacaea5b49ceaf6376314593ac >>>>> > 6e154e56b4d7a6a28c54f0984e13d3f8defc4755 >>>>> > >>>>> >changes the eip value being pushed. If you look at >>>>> >a92601bb707f6f49fd5563ef3d09928e70cc222e, you see: >>>>> > >>>>> > if (vmx->rmode.vm86_active) { >>>>> >- vmx->rmode.irq.pending = true; >>>>> >- vmx->rmode.irq.vector = nr; >>>>> >- vmx->rmode.irq.rip = kvm_rip_read(vcpu); >>>>> >- if (kvm_exception_is_soft(nr)) >>>>> >- vmx->rmode.irq.rip += >>>>> >- vmx->vcpu.arch.event_exit_inst_len; >>>>> >- intr_info |= INTR_TYPE_SOFT_INTR; >>>>> >- vmcs_write32(VM_ENTRY_INTR_INFO_FIELD, intr_info); >>>>> >- vmcs_write32(VM_ENTRY_INSTRUCTION_LEN, 1); >>>>> >- kvm_rip_write(vcpu, vmx->rmode.irq.rip - 1); >>>>> >+ if (kvm_inject_realmode_interrupt(vcpu, nr) != EMULATE_DONE) >>>>> >+ kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); >>>>> > return; >>>>> > } >>>>> > >>>>> >but kvm_inject_realmode_interrupt() does not appear to increment >>>>> >vmx->rmode.irq.rip anywhere, as the code being replaced does. >>>>> >>>>> Ah, I see now. There are two cases, hard interrupt and soft >>>>> interrupts. I guess hard interrupts are handled fine, and the >>>>> failing case is >>>>> >>>>> guest executes INTn instruction in guest mode >>>>> vmx intercepts a page fault (say due to access to the IDT or the stack) >>>>> kvm notes that a soft interrupt was in progress (vmx_complete_interrupts) >>>>> kvm handles the exception >>>>> reinject the interrupt while reentering the guest >>>>> >>>>> so we do need something like >>>>> >>>>> if (soft) >>>>> vcpu->arch.emulate_ctxt.eip += inst_len; >>>>> >>>>> in kvm_inject_realmode_interrupt(). >>>> >>>> Oops, right. Disregard last email pls :) >>>> >>>> So is 'kvm_exception_is_soft(irq)' a reliable check? >>>> >>> >>> No, need to check vcpu->arch.interrupt.soft instead. Not sure about >>> kvm_exception_is_soft(). Jan? >> >> Jumping late on this, I don't understand the question. Reliable /wrt what? > > As to whether we are supposed to increment eip or not. From a brief refresh-reading, I would say if (interrupt.soft || kvm_exception_is_soft(nr)) increment_eip_by_inst_len but only for those interrupts/exceptions which were raised by the triggering instructions, _not_ for exceptions raise while processing them (e.g. a page fault while accessing the IDT). Jan [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 259 bytes --] ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-12 20:51 ` Jan Kiszka @ 2011-04-12 21:25 ` Serge E. Hallyn 2011-04-12 22:39 ` Serge E. Hallyn 0 siblings, 1 reply; 17+ messages in thread From: Serge E. Hallyn @ 2011-04-12 21:25 UTC (permalink / raw) To: Jan Kiszka; +Cc: Avi Kivity, KVM mailing list Quoting Jan Kiszka (jan.kiszka@web.de): > From a brief refresh-reading, I would say > > if (interrupt.soft || kvm_exception_is_soft(nr)) > increment_eip_by_inst_len > > but only for those interrupts/exceptions which were raised by the > triggering instructions, _not_ for exceptions raise while processing > them (e.g. a page fault while accessing the IDT). > > Jan Ok, thanks guys. I'm currently trying a compile of the following. >From a3c4d5b67eb6d91ef772bc0e04adcd7d9711275f Mon Sep 17 00:00:00 2001 From: Serge E. Hallyn <serge.hallyn@canonical.com> Date: Tue, 12 Apr 2011 22:18:40 +0100 Subject: [PATCH 1/1] kvm: fix push of wrong eip when doing softint When doing a soft int, we need to bump eip before pushing it to the stack. Otherwise we'll do the int a second time. Signed-off-by: Serge E. Hallyn <serge.hallyn@ubuntu.com> --- arch/x86/kvm/vmx.c | 12 +++++++++--- arch/x86/kvm/x86.c | 3 ++- arch/x86/kvm/x86.h | 2 +- 3 files changed, 12 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index bf89ec2..6761464 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -1053,7 +1053,10 @@ static void vmx_queue_exception(struct kvm_vcpu *vcpu, unsigned nr, } if (vmx->rmode.vm86_active) { - if (kvm_inject_realmode_interrupt(vcpu, nr) != EMULATE_DONE) + int inc_eip = 0; + if (kvm_exception_is_soft(nr)) + inc_eip = vcpu.arch.event_exit_inst_len; + if (kvm_inject_realmode_interrupt(vcpu, nr, inc_eip) != EMULATE_DONE) kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); return; } @@ -2871,7 +2874,10 @@ static void vmx_inject_irq(struct kvm_vcpu *vcpu) ++vcpu->stat.irq_injections; if (vmx->rmode.vm86_active) { - if (kvm_inject_realmode_interrupt(vcpu, irq) != EMULATE_DONE) + int inc_eip = 0; + if (vcpu->arch.interrupt.soft) + inc_eip = vcpu.arch.event_exit_inst_len; + if (kvm_inject_realmode_interrupt(vcpu, irq, inc_eip) != EMULATE_DONE) kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); return; } @@ -2905,7 +2911,7 @@ static void vmx_inject_nmi(struct kvm_vcpu *vcpu) ++vcpu->stat.nmi_injections; if (vmx->rmode.vm86_active) { - if (kvm_inject_realmode_interrupt(vcpu, NMI_VECTOR) != EMULATE_DONE) + if (kvm_inject_realmode_interrupt(vcpu, NMI_VECTOR, 0) != EMULATE_DONE) kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); return; } diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index bcc0efc..8911622 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -4293,7 +4293,7 @@ static void init_emulate_ctxt(struct kvm_vcpu *vcpu) memcpy(c->regs, vcpu->arch.regs, sizeof c->regs); } -int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq) +int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq, int inc_eip) { struct decode_cache *c = &vcpu->arch.emulate_ctxt.decode; int ret; @@ -4303,6 +4303,7 @@ int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq) vcpu->arch.emulate_ctxt.decode.op_bytes = 2; vcpu->arch.emulate_ctxt.decode.ad_bytes = 2; vcpu->arch.emulate_ctxt.decode.eip = vcpu->arch.emulate_ctxt.eip; + vcpu->arch.emulate_ctxt.decode.eip += inc_eip; ret = emulate_int_real(&vcpu->arch.emulate_ctxt, &emulate_ops, irq); if (ret != X86EMUL_CONTINUE) diff --git a/arch/x86/kvm/x86.h b/arch/x86/kvm/x86.h index c600da8..e407ed3 100644 --- a/arch/x86/kvm/x86.h +++ b/arch/x86/kvm/x86.h @@ -77,7 +77,7 @@ static inline u32 bit(int bitno) void kvm_before_handle_nmi(struct kvm_vcpu *vcpu); void kvm_after_handle_nmi(struct kvm_vcpu *vcpu); -int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq); +int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq, int inc_eip); void kvm_write_tsc(struct kvm_vcpu *vcpu, u64 data); -- 1.7.0.4 ^ permalink raw reply related [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-12 21:25 ` Serge E. Hallyn @ 2011-04-12 22:39 ` Serge E. Hallyn 2011-04-12 23:31 ` Jan Kiszka 0 siblings, 1 reply; 17+ messages in thread From: Serge E. Hallyn @ 2011-04-12 22:39 UTC (permalink / raw) To: Jan Kiszka; +Cc: Avi Kivity, KVM mailing list Quoting Serge E. Hallyn (serge@hallyn.com): > Quoting Jan Kiszka (jan.kiszka@web.de): > > From a brief refresh-reading, I would say > > > > if (interrupt.soft || kvm_exception_is_soft(nr)) > > increment_eip_by_inst_len > > > > but only for those interrupts/exceptions which were raised by the > > triggering instructions, _not_ for exceptions raise while processing > > them (e.g. a page fault while accessing the IDT). > > > > Jan > > Ok, thanks guys. I'm currently trying a compile of the following. With the obvious fixes, that turns into the below, which seems to be working for me: >From 555696f355ec2db9f4919f5e363355a2671b15a5 Mon Sep 17 00:00:00 2001 From: Serge E. Hallyn <serge.hallyn@canonical.com> Date: Tue, 12 Apr 2011 22:18:40 +0100 Subject: [PATCH 1/1] kvm: fix push of wrong eip when doing softint When doing a soft int, we need to bump eip before pushing it to the stack. Otherwise we'll do the int a second time. Signed-off-by: Serge E. Hallyn <serge.hallyn@ubuntu.com> --- arch/x86/kvm/vmx.c | 12 +++++++++--- arch/x86/kvm/x86.c | 3 ++- arch/x86/kvm/x86.h | 2 +- 3 files changed, 12 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index bf89ec2..3aad96c 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -1053,7 +1053,10 @@ static void vmx_queue_exception(struct kvm_vcpu *vcpu, unsigned nr, } if (vmx->rmode.vm86_active) { - if (kvm_inject_realmode_interrupt(vcpu, nr) != EMULATE_DONE) + int inc_eip = 0; + if (kvm_exception_is_soft(nr)) + inc_eip = vcpu->arch.event_exit_inst_len; + if (kvm_inject_realmode_interrupt(vcpu, nr, inc_eip) != EMULATE_DONE) kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); return; } @@ -2871,7 +2874,10 @@ static void vmx_inject_irq(struct kvm_vcpu *vcpu) ++vcpu->stat.irq_injections; if (vmx->rmode.vm86_active) { - if (kvm_inject_realmode_interrupt(vcpu, irq) != EMULATE_DONE) + int inc_eip = 0; + if (vcpu->arch.interrupt.soft) + inc_eip = vcpu->arch.event_exit_inst_len; + if (kvm_inject_realmode_interrupt(vcpu, irq, inc_eip) != EMULATE_DONE) kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); return; } @@ -2905,7 +2911,7 @@ static void vmx_inject_nmi(struct kvm_vcpu *vcpu) ++vcpu->stat.nmi_injections; if (vmx->rmode.vm86_active) { - if (kvm_inject_realmode_interrupt(vcpu, NMI_VECTOR) != EMULATE_DONE) + if (kvm_inject_realmode_interrupt(vcpu, NMI_VECTOR, 0) != EMULATE_DONE) kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); return; } diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index bcc0efc..8911622 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -4293,7 +4293,7 @@ static void init_emulate_ctxt(struct kvm_vcpu *vcpu) memcpy(c->regs, vcpu->arch.regs, sizeof c->regs); } -int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq) +int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq, int inc_eip) { struct decode_cache *c = &vcpu->arch.emulate_ctxt.decode; int ret; @@ -4303,6 +4303,7 @@ int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq) vcpu->arch.emulate_ctxt.decode.op_bytes = 2; vcpu->arch.emulate_ctxt.decode.ad_bytes = 2; vcpu->arch.emulate_ctxt.decode.eip = vcpu->arch.emulate_ctxt.eip; + vcpu->arch.emulate_ctxt.decode.eip += inc_eip; ret = emulate_int_real(&vcpu->arch.emulate_ctxt, &emulate_ops, irq); if (ret != X86EMUL_CONTINUE) diff --git a/arch/x86/kvm/x86.h b/arch/x86/kvm/x86.h index c600da8..e407ed3 100644 --- a/arch/x86/kvm/x86.h +++ b/arch/x86/kvm/x86.h @@ -77,7 +77,7 @@ static inline u32 bit(int bitno) void kvm_before_handle_nmi(struct kvm_vcpu *vcpu); void kvm_after_handle_nmi(struct kvm_vcpu *vcpu); -int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq); +int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq, int inc_eip); void kvm_write_tsc(struct kvm_vcpu *vcpu, u64 data); -- 1.7.0.4 ^ permalink raw reply related [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-12 22:39 ` Serge E. Hallyn @ 2011-04-12 23:31 ` Jan Kiszka 2011-04-13 13:24 ` Serge E. Hallyn 0 siblings, 1 reply; 17+ messages in thread From: Jan Kiszka @ 2011-04-12 23:31 UTC (permalink / raw) To: Serge E. Hallyn; +Cc: Avi Kivity, KVM mailing list [-- Attachment #1: Type: text/plain, Size: 4312 bytes --] On 2011-04-13 00:39, Serge E. Hallyn wrote: > Quoting Serge E. Hallyn (serge@hallyn.com): >> Quoting Jan Kiszka (jan.kiszka@web.de): >>> From a brief refresh-reading, I would say >>> >>> if (interrupt.soft || kvm_exception_is_soft(nr)) >>> increment_eip_by_inst_len >>> >>> but only for those interrupts/exceptions which were raised by the >>> triggering instructions, _not_ for exceptions raise while processing >>> them (e.g. a page fault while accessing the IDT). >>> >>> Jan >> >> Ok, thanks guys. I'm currently trying a compile of the following. > > With the obvious fixes, that turns into the below, which seems to be > working for me: > > From 555696f355ec2db9f4919f5e363355a2671b15a5 Mon Sep 17 00:00:00 2001 > From: Serge E. Hallyn <serge.hallyn@canonical.com> > Date: Tue, 12 Apr 2011 22:18:40 +0100 > Subject: [PATCH 1/1] kvm: fix push of wrong eip when doing softint > > When doing a soft int, we need to bump eip before pushing it to > the stack. Otherwise we'll do the int a second time. > > Signed-off-by: Serge E. Hallyn <serge.hallyn@ubuntu.com> > --- > arch/x86/kvm/vmx.c | 12 +++++++++--- > arch/x86/kvm/x86.c | 3 ++- > arch/x86/kvm/x86.h | 2 +- > 3 files changed, 12 insertions(+), 5 deletions(-) > > diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c > index bf89ec2..3aad96c 100644 > --- a/arch/x86/kvm/vmx.c > +++ b/arch/x86/kvm/vmx.c > @@ -1053,7 +1053,10 @@ static void vmx_queue_exception(struct kvm_vcpu *vcpu, unsigned nr, > } > > if (vmx->rmode.vm86_active) { > - if (kvm_inject_realmode_interrupt(vcpu, nr) != EMULATE_DONE) > + int inc_eip = 0; > + if (kvm_exception_is_soft(nr)) > + inc_eip = vcpu->arch.event_exit_inst_len; > + if (kvm_inject_realmode_interrupt(vcpu, nr, inc_eip) != EMULATE_DONE) > kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); > return; > } > @@ -2871,7 +2874,10 @@ static void vmx_inject_irq(struct kvm_vcpu *vcpu) > > ++vcpu->stat.irq_injections; > if (vmx->rmode.vm86_active) { > - if (kvm_inject_realmode_interrupt(vcpu, irq) != EMULATE_DONE) > + int inc_eip = 0; > + if (vcpu->arch.interrupt.soft) > + inc_eip = vcpu->arch.event_exit_inst_len; > + if (kvm_inject_realmode_interrupt(vcpu, irq, inc_eip) != EMULATE_DONE) > kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); > return; > } > @@ -2905,7 +2911,7 @@ static void vmx_inject_nmi(struct kvm_vcpu *vcpu) > > ++vcpu->stat.nmi_injections; > if (vmx->rmode.vm86_active) { > - if (kvm_inject_realmode_interrupt(vcpu, NMI_VECTOR) != EMULATE_DONE) > + if (kvm_inject_realmode_interrupt(vcpu, NMI_VECTOR, 0) != EMULATE_DONE) > kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu); > return; > } > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > index bcc0efc..8911622 100644 > --- a/arch/x86/kvm/x86.c > +++ b/arch/x86/kvm/x86.c > @@ -4293,7 +4293,7 @@ static void init_emulate_ctxt(struct kvm_vcpu *vcpu) > memcpy(c->regs, vcpu->arch.regs, sizeof c->regs); > } > > -int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq) > +int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq, int inc_eip) > { > struct decode_cache *c = &vcpu->arch.emulate_ctxt.decode; > int ret; > @@ -4303,6 +4303,7 @@ int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq) > vcpu->arch.emulate_ctxt.decode.op_bytes = 2; > vcpu->arch.emulate_ctxt.decode.ad_bytes = 2; > vcpu->arch.emulate_ctxt.decode.eip = vcpu->arch.emulate_ctxt.eip; > + vcpu->arch.emulate_ctxt.decode.eip += inc_eip; I would fold this into the previous line. > ret = emulate_int_real(&vcpu->arch.emulate_ctxt, &emulate_ops, irq); > > if (ret != X86EMUL_CONTINUE) > diff --git a/arch/x86/kvm/x86.h b/arch/x86/kvm/x86.h > index c600da8..e407ed3 100644 > --- a/arch/x86/kvm/x86.h > +++ b/arch/x86/kvm/x86.h > @@ -77,7 +77,7 @@ static inline u32 bit(int bitno) > > void kvm_before_handle_nmi(struct kvm_vcpu *vcpu); > void kvm_after_handle_nmi(struct kvm_vcpu *vcpu); > -int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq); > +int kvm_inject_realmode_interrupt(struct kvm_vcpu *vcpu, int irq, int inc_eip); > > void kvm_write_tsc(struct kvm_vcpu *vcpu, u64 data); > Looks consistent to me. Jan [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 259 bytes --] ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-12 23:31 ` Jan Kiszka @ 2011-04-13 13:24 ` Serge E. Hallyn 2011-04-13 13:29 ` Avi Kivity 0 siblings, 1 reply; 17+ messages in thread From: Serge E. Hallyn @ 2011-04-13 13:24 UTC (permalink / raw) To: Jan Kiszka; +Cc: Avi Kivity, KVM mailing list Quoting Jan Kiszka (jan.kiszka@web.de): > Looks consistent to me. It's working for me, so if there are no further comments I'll improve the changelog and send to lkml. thanks, -serge ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-13 13:24 ` Serge E. Hallyn @ 2011-04-13 13:29 ` Avi Kivity 2011-04-13 13:52 ` Serge E. Hallyn 0 siblings, 1 reply; 17+ messages in thread From: Avi Kivity @ 2011-04-13 13:29 UTC (permalink / raw) To: Serge E. Hallyn; +Cc: Jan Kiszka, KVM mailing list On 04/13/2011 04:24 PM, Serge E. Hallyn wrote: > Quoting Jan Kiszka (jan.kiszka@web.de): > > Looks consistent to me. > > It's working for me, so if there are no further comments Looks good to me too. > I'll improve > the changelog and send to lkml. > kvm@, surely. -- error compiling committee.c: too many arguments to function ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: buggy emulate_int_real 2011-04-13 13:29 ` Avi Kivity @ 2011-04-13 13:52 ` Serge E. Hallyn 0 siblings, 0 replies; 17+ messages in thread From: Serge E. Hallyn @ 2011-04-13 13:52 UTC (permalink / raw) To: Avi Kivity; +Cc: Jan Kiszka, KVM mailing list Quoting Avi Kivity (avi@redhat.com): > On 04/13/2011 04:24 PM, Serge E. Hallyn wrote: > >Quoting Jan Kiszka (jan.kiszka@web.de): > >> Looks consistent to me. > > > >It's working for me, so if there are no further comments > > Looks good to me too. > > >I'll improve > >the changelog and send to lkml. > > > > kvm@, surely. Oh? Didn't realize that was the proper path - absolutely. thanks, -serge ^ permalink raw reply [flat|nested] 17+ messages in thread
end of thread, other threads:[~2011-04-13 13:52 UTC | newest] Thread overview: 17+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2011-04-08 21:09 buggy emulate_int_real Serge E. Hallyn 2011-04-10 8:30 ` Avi Kivity 2011-04-12 7:53 ` Serge E. Hallyn 2011-04-12 8:02 ` Avi Kivity 2011-04-12 13:57 ` Serge E. Hallyn 2011-04-12 14:14 ` Avi Kivity 2011-04-12 14:12 ` Serge E. Hallyn 2011-04-12 14:16 ` Avi Kivity 2011-04-12 15:42 ` Jan Kiszka 2011-04-12 18:31 ` Serge E. Hallyn 2011-04-12 20:51 ` Jan Kiszka 2011-04-12 21:25 ` Serge E. Hallyn 2011-04-12 22:39 ` Serge E. Hallyn 2011-04-12 23:31 ` Jan Kiszka 2011-04-13 13:24 ` Serge E. Hallyn 2011-04-13 13:29 ` Avi Kivity 2011-04-13 13:52 ` Serge E. Hallyn
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox