target/i386: disable/enable breakpoints on vmentry/vmexit
If the required DR7 (either from the VMCB or from the host save area) disables a breakpoint that was enabled prior to vmentry or vmexit, it is left enabled and will trigger EXCP_DEBUG. This causes a spurious #DB on the next crossing of the breakpoint. To disable it, vmentry/vmexit must use cpu_x86_update_dr7 to load DR7. Because cpu_x86_update_dr7 takes a 32-bit argument, check reserved bits prior to calling cpu_x86_update_dr7, and do the same for DR6 as well for consistency. This scenario is tested by the "host_rflags" test in kvm-unit-tests. Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
This commit is contained in:
parent
57f8dbdbe9
commit
8aa76496df
@ -163,6 +163,8 @@ void helper_vmrun(CPUX86State *env, int aflag, int next_eip_addend)
|
|||||||
uint64_t new_cr0;
|
uint64_t new_cr0;
|
||||||
uint64_t new_cr3;
|
uint64_t new_cr3;
|
||||||
uint64_t new_cr4;
|
uint64_t new_cr4;
|
||||||
|
uint64_t new_dr6;
|
||||||
|
uint64_t new_dr7;
|
||||||
|
|
||||||
if (aflag == 2) {
|
if (aflag == 2) {
|
||||||
addr = env->regs[R_EAX];
|
addr = env->regs[R_EAX];
|
||||||
@ -361,20 +363,22 @@ void helper_vmrun(CPUX86State *env, int aflag, int next_eip_addend)
|
|||||||
env->vm_vmcb + offsetof(struct vmcb, save.rsp));
|
env->vm_vmcb + offsetof(struct vmcb, save.rsp));
|
||||||
env->regs[R_EAX] = x86_ldq_phys(cs,
|
env->regs[R_EAX] = x86_ldq_phys(cs,
|
||||||
env->vm_vmcb + offsetof(struct vmcb, save.rax));
|
env->vm_vmcb + offsetof(struct vmcb, save.rax));
|
||||||
env->dr[7] = x86_ldq_phys(cs,
|
|
||||||
env->vm_vmcb + offsetof(struct vmcb, save.dr7));
|
new_dr7 = x86_ldq_phys(cs, env->vm_vmcb + offsetof(struct vmcb, save.dr7));
|
||||||
env->dr[6] = x86_ldq_phys(cs,
|
new_dr6 = x86_ldq_phys(cs, env->vm_vmcb + offsetof(struct vmcb, save.dr6));
|
||||||
env->vm_vmcb + offsetof(struct vmcb, save.dr6));
|
|
||||||
|
|
||||||
#ifdef TARGET_X86_64
|
#ifdef TARGET_X86_64
|
||||||
if (env->dr[6] & DR_RESERVED_MASK) {
|
if (new_dr7 & DR_RESERVED_MASK) {
|
||||||
cpu_vmexit(env, SVM_EXIT_ERR, 0, GETPC());
|
cpu_vmexit(env, SVM_EXIT_ERR, 0, GETPC());
|
||||||
}
|
}
|
||||||
if (env->dr[7] & DR_RESERVED_MASK) {
|
if (new_dr6 & DR_RESERVED_MASK) {
|
||||||
cpu_vmexit(env, SVM_EXIT_ERR, 0, GETPC());
|
cpu_vmexit(env, SVM_EXIT_ERR, 0, GETPC());
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
cpu_x86_update_dr7(env, new_dr7);
|
||||||
|
env->dr[6] = new_dr6;
|
||||||
|
|
||||||
if (is_efer_invalid_state(env)) {
|
if (is_efer_invalid_state(env)) {
|
||||||
cpu_vmexit(env, SVM_EXIT_ERR, 0, GETPC());
|
cpu_vmexit(env, SVM_EXIT_ERR, 0, GETPC());
|
||||||
}
|
}
|
||||||
@ -864,8 +868,11 @@ void do_vmexit(CPUX86State *env)
|
|||||||
|
|
||||||
env->dr[6] = x86_ldq_phys(cs,
|
env->dr[6] = x86_ldq_phys(cs,
|
||||||
env->vm_hsave + offsetof(struct vmcb, save.dr6));
|
env->vm_hsave + offsetof(struct vmcb, save.dr6));
|
||||||
env->dr[7] = x86_ldq_phys(cs,
|
|
||||||
env->vm_hsave + offsetof(struct vmcb, save.dr7));
|
/* Disables all breakpoints in the host DR7 register. */
|
||||||
|
cpu_x86_update_dr7(env,
|
||||||
|
x86_ldq_phys(cs,
|
||||||
|
env->vm_hsave + offsetof(struct vmcb, save.dr7)) & ~0xff);
|
||||||
|
|
||||||
/* other setups */
|
/* other setups */
|
||||||
x86_stl_phys(cs,
|
x86_stl_phys(cs,
|
||||||
@ -891,8 +898,6 @@ void do_vmexit(CPUX86State *env)
|
|||||||
from the page table indicated the host's CR3. If the PDPEs contain
|
from the page table indicated the host's CR3. If the PDPEs contain
|
||||||
illegal state, the processor causes a shutdown. */
|
illegal state, the processor causes a shutdown. */
|
||||||
|
|
||||||
/* Disables all breakpoints in the host DR7 register. */
|
|
||||||
|
|
||||||
/* Checks the reloaded host state for consistency. */
|
/* Checks the reloaded host state for consistency. */
|
||||||
|
|
||||||
/* If the host's rIP reloaded by #VMEXIT is outside the limit of the
|
/* If the host's rIP reloaded by #VMEXIT is outside the limit of the
|
||||||
|
Loading…
Reference in New Issue
Block a user