WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] [RFC][PATCH] Emulate instructions in vm86 mode

To: Keir Fraser <Keir.Fraser@xxxxxxxxxxxx>
Subject: Re: [Xen-devel] [RFC][PATCH] Emulate instructions in vm86 mode
From: Bastian Blank <bastian@xxxxxxxxxxxx>
Date: Thu, 7 Sep 2006 15:59:51 +0200
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Thu, 07 Sep 2006 07:00:26 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <C125DC21.1016%Keir.Fraser@xxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <20060907130908.GA6165@xxxxxxxxxxxxxxxxxxxxxxx> <C125DC21.1016%Keir.Fraser@xxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Mutt/1.5.12-2006-07-14
On Thu, Sep 07, 2006 at 02:24:33PM +0100, Keir Fraser wrote:
> On 7/9/06 14:09, "Bastian Blank" <bastian@xxxxxxxxxxxx> wrote:
> >> (INS/OUTS). What happens if you just bail to the guest's GPF handler if in
> >> vm86 mode?
> > I don't know how to do that.
> Just add 'if (vm86_mode(regs)) goto fail' to the top of
> emulate_privileged_op(). This will cause Xen to fall back to propagating the
> fault to the guest's GPF handler.

Seems to work partialy. The i810 driver can init the hardware but I get
weird artefacts. It seems that some of the memory which is used for the
cursor is overwriten by the real video output or so. Therefor I think
that one of the segment registers which the bios uses is overwriten
somewhere in this gpf handling.

Hmm, the trap bounce code clears ds and es.

Bastian

-- 
Schshschshchsch.
                -- The Gorn, "Arena", stardate 3046.2

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel