Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 26 Jun 2022 16:31:09 +0200
From:      =?UTF-8?Q?Bojan_Novkovi=C4=87?= <bojan.novkovic@kset.org>
To:        soc-status@freebsd.org
Subject:   [GSoC Weekly Status #2] bhyve debug server enhancements
Message-ID:  <CA%2B=MDrFthxXsw-hnv%2Bo8oZ4JkXhNN6_3C_aHGeS02m=aYMp2tg@mail.gmail.com>

index | next in thread | raw e-mail

[-- Attachment #1 --]
Hello,

I've spent most of this week testing and polishing the VM single-step
functionality for AMD hosts.
Since this functionality relies on the RFLAGS.TF bit, I've settled for a
less complex approach that intercepts and restarts any instructions that
may modify the RFLAGS register (popf/pushf) while making sure that the
guest executes correctly. Most of the testing consisted of stepping through
various interrupts which use popf/pushf.

I also managed to get a head start on implementing hardware watchpoint
support for bhyve's gdb stub [1].

Bojan

[1] https://github.com/bnovkov/freebsd-src/tree/bhyve_watch

[-- Attachment #2 --]
<div dir="ltr"><div>Hello,</div><div><br></div><div>I&#39;ve spent most of this week testing and polishing the VM single-step functionality for AMD hosts.</div><div>Since this functionality relies on the <a href="http://RFLAGS.TF">RFLAGS.TF</a>; bit, I&#39;ve settled for a less complex approach that intercepts and restarts any instructions that may modify the RFLAGS register (popf/pushf) while making sure that the guest executes correctly. Most of the testing consisted of stepping through various interrupts which use popf/pushf.</div><div><br></div><div>I also managed to get a head start on implementing hardware watchpoint support for bhyve&#39;s gdb stub [1].</div><div><br></div><div>Bojan</div><div><br></div><div>[1] <a href="https://github.com/bnovkov/freebsd-src/tree/bhyve_watch">https://github.com/bnovkov/freebsd-src/tree/bhyve_watch</a></div></div>;
home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CA%2B=MDrFthxXsw-hnv%2Bo8oZ4JkXhNN6_3C_aHGeS02m=aYMp2tg>