fbpx
Wikipedia

Virtual 8086 mode

In the 80386 microprocessor and later, virtual 8086 mode (also called virtual real mode, V86-mode, or VM86) allows the execution of real mode applications that are incapable of running directly in protected mode while the processor is running a protected mode operating system. It is a hardware virtualization technique that allowed multiple 8086 processors to be emulated by the 386 chip. It emerged from the painful experiences with the 80286 protected mode, which by itself was not suitable to run concurrent real-mode applications well.[1] John Crawford developed the Virtual Mode bit at the register set, paving the way to this environment.[2]

VM86 mode uses a segmentation scheme identical to that of real mode (for compatibility reasons), which creates 20-bit linear addresses in the same manner as 20-bit physical addresses are created in real mode, but are subject to protected mode's memory paging mechanism.

Overview

The virtual 8086 mode is a mode for a protected-mode task. Consequently, the processor can switch between VM86 and non-VM86 tasks, enabling multitasking legacy (DOS) applications.

To use virtual 8086 mode, an operating system sets up a virtual 8086 mode monitor, which is a program that manages the real-mode program and emulates or filters access to system hardware and software resources. The monitor must run at privilege level 0 and in protected mode. Only the 8086 program runs in VM86 mode and at privilege level 3. When the real-mode program attempts to do things like access certain I/O ports to use hardware devices or access certain regions in its memory space, the CPU traps these events and calls the V86 monitor, which examines what the real mode program is trying to do and either acts as a proxy to interface with the hardware, emulates the intended function the real-mode program was trying to access, or terminates the real-mode program if it is trying to do something that cannot either be allowed or be adequately supported (such as reboot the machine, set a video display into a mode that is not supported by the hardware and is not emulated, or write over operating system code).

The V86 monitor can also deny permission gently by emulating the failure of a requested operation—for example, it can make a disk drive always appear not ready when in fact it has not even checked the drive but simply will not permit the real-mode program to access it. Also, the V86 monitor can do things like map memory pages, intercept calls and interrupts, and preempt the real-mode program, allowing real-mode programs to be multitasked like protected-mode programs. By intercepting the hardware and software I/O of the real-mode program and tracking the state that the V86 program expects, it can allow multiple programs to share the same hardware without interfering with each other.[a] So V86 mode provides a way for real-mode programs designed for a single-tasking environment (like DOS[b]) to run concurrently in a multitasking environment.

Usage

It is used to execute certain DOS programs in FlexOS 386 (since 1987), Concurrent DOS 386 (since 1987), Windows/386 2.10 (since 1987), DESQview 386 (since 1988), Windows 3.x (since 1990), Multiuser DOS (since 1991), Windows for Workgroups 3.1x (since 1992), OS/2 2.x (since 1992), 4690 OS (since 1993), REAL/32 (since 1995) running in 386 Enhanced Mode as well as in Windows 95, 98, 98 SE and ME through virtual DOS machines, in SCO UNIX through Merge, and in Linux through DOSEMU. (Other DOS programs which use protected mode execute using user mode under the emulator.) NTVDM in x86 Windows NT-based operating systems also use VM86 mode,[3] but with very limited direct hardware access. Some boot loaders (e.g. GRUB) use the protected mode, and execute the BIOS interrupt calls in Virtual 8086 mode.[4][5]

Memory addressing and interrupts

The most common problem by running 8086 code from protected mode is memory addressing which is totally different between protected mode and real mode. As mentioned, by working under VM86 mode the segmentation mechanism is reconfigured to work just like under real mode, but the paging mechanism is still active, and it is transparent to the real mode code; thus, memory protection is still applicable, and so is the isolation of the address space.

When interrupts (hardware, software and int instruction) occur, the processor switches off the VM86 mode and returns to work in full protected mode to handle the interrupt. Also, before servicing the interrupt, the DS, ES, FS, and GS registers are pushed on the new stack and zeroed.

Virtual-8086 mode extensions (VME)

The Pentium architecture added a number of enhancements to the virtual 8086 mode. These were however documented by Intel only starting with the subsequent P6 (microarchitecture);[6] their more recent formal name is Virtual-8086 Mode Extensions, abbreviated VME[7] (older documentation may use "Virtual 8086 mode enhancements" as the VME acronym expansion).[6] Some later Intel 486 chips also support it.[8][9] The enhancements address mainly the 8086 virtualization overhead, with a particular focus on (virtual) interrupts.[6][10] Before the extensions were publicly documented in the P6 documentation, the official documentation referred to the famed Appendix H, which was omitted from the public documentation and shared only with selected partners under NDA.

Activating VME is done by setting bit number 0 (0x1 in value) of CR4. Because the VME interrupt speed-up enhancements were found useful for non-VM86 protected tasks, they can also be enabled separately by setting only bit number 1 (0x2 in value), which is called PVI (Protected Mode Virtual Interrupts).[6][9] Detecting whether a processor supports VME (including PVI) is done using the CPUID instruction, with an initial EAX value of 0x1, by testing the value of second bit (bit number 1, 0x2 in value) in EDX register, which is set if VME is supported by the processor.[11][6] In Linux, this latter bit is reported as the vme flag in the /proc/cpuinfo file, under the "flags" section.

In virtual 8086 mode, the basic idea is that when IOPL is less than 3, PUSHF/POPF/STI/CLI/INT/IRET instructions will treat the value of VIF in the real 32-bit EFLAGS register as the value of IF in the simulated 16-bit FLAGS register (32-bit PUSHFD/POPFD continues to GP fault). VIP will cause a GP fault on the setting of simulated IF, directing the OS to process any pending interrupts. PVI is the same idea but only affects CLI/STI instructions.

First generation AMD Ryzen CPUs have been found to feature a broken VME implementation.[12] The second generation Ryzen (2000 series) has fixed this issue.[13]

64-bit and VMX support

Virtual 8086 mode is not available in x86-64 long mode, although it is still present on x86-64 capable processors running in legacy mode.

Intel VT-x brings back the ability to run virtual 8086 mode from x86-64 long mode, but it has to be done by transitioning the (physical) processor to VMX root mode and launching a logical (virtual) processor itself running in virtual 8086 mode.[14]

Westmere and later Intel processors usually[15] can start the virtual processor directly in real mode using the "unrestricted guest" feature (which itself requires Extended Page Tables); this method removes the need to resort to the nested virtual 8086 mode simply to run the legacy BIOS for booting.[16][17]

AMD-V can do virtual 8086 mode in guests, too, but it can also just run the guest in "paged real mode" using the following steps: you create a SVM (Secure Virtual Machine) mode guest with CR0.PE=0, but CR0.PG=1 (that is, with protected mode disabled but paging enabled), which is ordinarily impossible, but is allowed for SVM guests if the host intercepts page faults.[18]

See also

Notes

  1. ^ For example, if one program writes to a display, then another program gets control and writes to the same display, and then the first program gets control back, it will try to use the display as if the second program had not changed it. The V86 monitor can intercept the display writes, keep track of the display state for each program, and switch the real display between them according to which program the user has selected to interact with presently. The V86 monitor emulates independent displays for each program using only one real display.
  2. ^ DOS is mentioned because it was especially the extensive library of existing DOS programs that Intel had in mind when they designed V86 mode.

References

  1. ^ Yager, Tom (November 5, 2004). "Sending software to do hardware's job". InfoWorld. Retrieved January 27, 2014.
  2. ^ Gnomes, Lee; "Behind The Scenes: The Making of the 386", Intel Corporation, Special 32-Bit Issue Solutions, November/December 1985, page 19
  3. ^ "Windows NT 4.0 Workstation Architecture". Microsoft.
  4. ^ Mike Wang. "Grub2 Booting Process". {{cite journal}}: Cite journal requires |journal= (help)
  5. ^ "Virtual 8086 Mode - OSDev Wiki". wiki.osdev.org. Retrieved 2020-12-10.
  6. ^ a b c d e T. Shanley (1998). Pentium Pro and Pentium II System Architecture. Addison-Wesley. pp. 427, 465–480. ISBN 978-0-201-30973-7.
  7. ^ Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 3 (3A, 3B, 3C & 3D): System Programming Guide. Intel. May 2020. p. 2-17.
  8. ^ "Mailing List Archive: Re: 2.6.14: CR4 not needed to be inspected on the 486 anymore?". Gossamer-threads.com. Retrieved 2014-02-20.
  9. ^ a b "Pentium Protected Mode Virtual Interrupts (PVI)". Rcollins.org. Retrieved 2014-02-20.
  10. ^ "Virtual Mode Extensions on the Pentium Processor". Rcollins.org. Retrieved 2014-02-20.
  11. ^ Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 2 (2A, 2B, 2C & 2D): Instruction Set Reference, A-Z. Intel. May 2020. pp. 3–199, 3–221, 3–222.
  12. ^ Michal Necasek (May 12, 2017). "VME Broken on AMD Ryzen". OS/2 Museum.
  13. ^ "Revision Guide for AMD Family 17h Models 00h-0Fh Processors" (PDF). AMD. June 2018.
  14. ^ (PDF). Intel. September 2009. p. 29-1. Archived from the original (PDF) on January 5, 2010. a VM entry is allowed only to guests with paging enabled that are in protected mode or in virtual-8086 mode. Guest execution in other processor operating modes need to be specially handled by the VMM; see also CS 686: Special Topic: Intel EM64T and VT Extensions (Spring 2007), lesson 24 how to do this from Linux (not that the code is pretty dated, so might not work as-is with current kernels) more up-to-date code can be found here. Also beware that this sample code is more complicated than strictly booting the logical processor in virtual 8086 mode; its ultimate goal is make some real-mode BIOS calls.
  15. ^ . Ark.intel.com. Archived from the original on 2014-02-10. Retrieved 2014-02-20. A list of Intel processors that support VT-x but not EPT
  16. ^ "Intel added unrestricted guest mode on Westmere micro-architecture and later Intel CPUs, it uses EPT to translate guest physical address access to host physical address. With this mode, VMEnter without enable paging is allowed."
  17. ^ "If the “unrestricted guest” VM-execution control is 1, the “enable EPT” VM-execution control must also be 1"
  18. ^ "15.19 Paged Real Mode". AMD64 Architecture Programmer's Manual, Volume 2: System Programming (PDF). Rev. 3.38. Advanced Micro Devices. November 2021. pp. 515–516. To facilitate virtualization of real mode, the VMRUN instruction may legally load a guest CR0 value with PE = 0 but PG = 1. Likewise, the RSM instruction is permitted to return to paged real mode. This processor mode behaves in every way like real mode, with the exception that paging is applied. The intent is that the VMM run the guest in paged-real mode at CPL0, and with page faults intercepted. The VMM is responsible for setting up a shadow page table that maps guest physical memory to the appropriate system physical addresses. The behavior of running a guest in paged real mode without intercepting page faults to the VMM is undefined.

virtual, 8086, mode, this, article, needs, additional, citations, verification, please, help, improve, this, article, adding, citations, reliable, sources, unsourced, material, challenged, removed, find, sources, news, newspapers, books, scholar, jstor, decemb. This article needs additional citations for verification Please help improve this article by adding citations to reliable sources Unsourced material may be challenged and removed Find sources Virtual 8086 mode news newspapers books scholar JSTOR December 2009 Learn how and when to remove this template message In the 80386 microprocessor and later virtual 8086 mode also called virtual real mode V86 mode or VM86 allows the execution of real mode applications that are incapable of running directly in protected mode while the processor is running a protected mode operating system It is a hardware virtualization technique that allowed multiple 8086 processors to be emulated by the 386 chip It emerged from the painful experiences with the 80286 protected mode which by itself was not suitable to run concurrent real mode applications well 1 John Crawford developed the Virtual Mode bit at the register set paving the way to this environment 2 VM86 mode uses a segmentation scheme identical to that of real mode for compatibility reasons which creates 20 bit linear addresses in the same manner as 20 bit physical addresses are created in real mode but are subject to protected mode s memory paging mechanism Contents 1 Overview 2 Usage 3 Memory addressing and interrupts 4 Virtual 8086 mode extensions VME 5 64 bit and VMX support 6 See also 7 Notes 8 ReferencesOverview EditThe virtual 8086 mode is a mode for a protected mode task Consequently the processor can switch between VM86 and non VM86 tasks enabling multitasking legacy DOS applications To use virtual 8086 mode an operating system sets up a virtual 8086 mode monitor which is a program that manages the real mode program and emulates or filters access to system hardware and software resources The monitor must run at privilege level 0 and in protected mode Only the 8086 program runs in VM86 mode and at privilege level 3 When the real mode program attempts to do things like access certain I O ports to use hardware devices or access certain regions in its memory space the CPU traps these events and calls the V86 monitor which examines what the real mode program is trying to do and either acts as a proxy to interface with the hardware emulates the intended function the real mode program was trying to access or terminates the real mode program if it is trying to do something that cannot either be allowed or be adequately supported such as reboot the machine set a video display into a mode that is not supported by the hardware and is not emulated or write over operating system code The V86 monitor can also deny permission gently by emulating the failure of a requested operation for example it can make a disk drive always appear not ready when in fact it has not even checked the drive but simply will not permit the real mode program to access it Also the V86 monitor can do things like map memory pages intercept calls and interrupts and preempt the real mode program allowing real mode programs to be multitasked like protected mode programs By intercepting the hardware and software I O of the real mode program and tracking the state that the V86 program expects it can allow multiple programs to share the same hardware without interfering with each other a So V86 mode provides a way for real mode programs designed for a single tasking environment like DOS b to run concurrently in a multitasking environment Usage EditIt is used to execute certain DOS programs in FlexOS 386 since 1987 Concurrent DOS 386 since 1987 Windows 386 2 10 since 1987 DESQview 386 since 1988 Windows 3 x since 1990 Multiuser DOS since 1991 Windows for Workgroups 3 1x since 1992 OS 2 2 x since 1992 4690 OS since 1993 REAL 32 since 1995 running in 386 Enhanced Mode as well as in Windows 95 98 98 SE and ME through virtual DOS machines in SCO UNIX through Merge and in Linux through DOSEMU Other DOS programs which use protected mode execute using user mode under the emulator NTVDM in x86 Windows NT based operating systems also use VM86 mode 3 but with very limited direct hardware access Some boot loaders e g GRUB use the protected mode and execute the BIOS interrupt calls in Virtual 8086 mode 4 5 Memory addressing and interrupts EditThe most common problem by running 8086 code from protected mode is memory addressing which is totally different between protected mode and real mode As mentioned by working under VM86 mode the segmentation mechanism is reconfigured to work just like under real mode but the paging mechanism is still active and it is transparent to the real mode code thus memory protection is still applicable and so is the isolation of the address space When interrupts hardware software and int instruction occur the processor switches off the VM86 mode and returns to work in full protected mode to handle the interrupt Also before servicing the interrupt the DS ES FS and GS registers are pushed on the new stack and zeroed Virtual 8086 mode extensions VME EditThe Pentium architecture added a number of enhancements to the virtual 8086 mode These were however documented by Intel only starting with the subsequent P6 microarchitecture 6 their more recent formal name is Virtual 8086 Mode Extensions abbreviated VME 7 older documentation may use Virtual 8086 mode enhancements as the VME acronym expansion 6 Some later Intel 486 chips also support it 8 9 The enhancements address mainly the 8086 virtualization overhead with a particular focus on virtual interrupts 6 10 Before the extensions were publicly documented in the P6 documentation the official documentation referred to the famed Appendix H which was omitted from the public documentation and shared only with selected partners under NDA Activating VME is done by setting bit number 0 0x1 in value of CR4 Because the VME interrupt speed up enhancements were found useful for non VM86 protected tasks they can also be enabled separately by setting only bit number 1 0x2 in value which is called PVI Protected Mode Virtual Interrupts 6 9 Detecting whether a processor supports VME including PVI is done using the CPUID instruction with an initial EAX value of 0x1 by testing the value of second bit bit number 1 0x2 in value in EDX register which is set if VME is supported by the processor 11 6 In Linux this latter bit is reported as the vme flag in the proc cpuinfo file under the flags section In virtual 8086 mode the basic idea is that when IOPL is less than 3 PUSHF POPF STI CLI INT IRET instructions will treat the value of VIF in the real 32 bit EFLAGS register as the value of IF in the simulated 16 bit FLAGS register 32 bit PUSHFD POPFD continues to GP fault VIP will cause a GP fault on the setting of simulated IF directing the OS to process any pending interrupts PVI is the same idea but only affects CLI STI instructions First generation AMD Ryzen CPUs have been found to feature a broken VME implementation 12 The second generation Ryzen 2000 series has fixed this issue 13 64 bit and VMX support EditVirtual 8086 mode is not available in x86 64 long mode although it is still present on x86 64 capable processors running in legacy mode Intel VT x brings back the ability to run virtual 8086 mode from x86 64 long mode but it has to be done by transitioning the physical processor to VMX root mode and launching a logical virtual processor itself running in virtual 8086 mode 14 Westmere and later Intel processors usually 15 can start the virtual processor directly in real mode using the unrestricted guest feature which itself requires Extended Page Tables this method removes the need to resort to the nested virtual 8086 mode simply to run the legacy BIOS for booting 16 17 AMD V can do virtual 8086 mode in guests too but it can also just run the guest in paged real mode using the following steps you create a SVM Secure Virtual Machine mode guest with CR0 PE 0 but CR0 PG 1 that is with protected mode disabled but paging enabled which is ordinarily impossible but is allowed for SVM guests if the host intercepts page faults 18 See also EditIA 32 x86 assembly languageNotes Edit For example if one program writes to a display then another program gets control and writes to the same display and then the first program gets control back it will try to use the display as if the second program had not changed it The V86 monitor can intercept the display writes keep track of the display state for each program and switch the real display between them according to which program the user has selected to interact with presently The V86 monitor emulates independent displays for each program using only one real display DOS is mentioned because it was especially the extensive library of existing DOS programs that Intel had in mind when they designed V86 mode References Edit Yager Tom November 5 2004 Sending software to do hardware s job InfoWorld Retrieved January 27 2014 Gnomes Lee Behind The Scenes The Making of the 386 Intel Corporation Special 32 Bit Issue Solutions November December 1985 page 19 Windows NT 4 0 Workstation Architecture Microsoft Mike Wang Grub2 Booting Process a href Template Cite journal html title Template Cite journal cite journal a Cite journal requires journal help Virtual 8086 Mode OSDev Wiki wiki osdev org Retrieved 2020 12 10 a b c d e T Shanley 1998 Pentium Pro and Pentium II System Architecture Addison Wesley pp 427 465 480 ISBN 978 0 201 30973 7 Intel 64 and IA 32 Architectures Software Developer s Manual Volume 3 3A 3B 3C amp 3D System Programming Guide Intel May 2020 p 2 17 Mailing List Archive Re 2 6 14 CR4 not needed to be inspected on the 486 anymore Gossamer threads com Retrieved 2014 02 20 a b Pentium Protected Mode Virtual Interrupts PVI Rcollins org Retrieved 2014 02 20 Virtual Mode Extensions on the Pentium Processor Rcollins org Retrieved 2014 02 20 Intel 64 and IA 32 Architectures Software Developer s Manual Volume 2 2A 2B 2C amp 2D Instruction Set Reference A Z Intel May 2020 pp 3 199 3 221 3 222 Michal Necasek May 12 2017 VME Broken on AMD Ryzen OS 2 Museum Revision Guide for AMD Family 17h Models 00h 0Fh Processors PDF AMD June 2018 Intel 64 and IA 32 Architectures Software Developer s Manual Volume 3B System Programming Guide Part 2 PDF Intel September 2009 p 29 1 Archived from the original PDF on January 5 2010 a VM entry is allowed only to guests with paging enabled that are in protected mode or in virtual 8086 mode Guest execution in other processor operating modes need to be specially handled by the VMM see also CS 686 Special Topic Intel EM64T and VT Extensions Spring 2007 lesson 24 how to do this from Linux not that the code is pretty dated so might not work as is with current kernels more up to date code can be found here Also beware that this sample code is more complicated than strictly booting the logical processor in virtual 8086 mode its ultimate goal is make some real mode BIOS calls Intel Virtualization Technology List Ark intel com Archived from the original on 2014 02 10 Retrieved 2014 02 20 A list of Intel processors that support VT x but not EPT Intel added unrestricted guest mode on Westmere micro architecture and later Intel CPUs it uses EPT to translate guest physical address access to host physical address With this mode VMEnter without enable paging is allowed If the unrestricted guest VM execution control is 1 the enable EPT VM execution control must also be 1 15 19 Paged Real Mode AMD64 Architecture Programmer s Manual Volume 2 System Programming PDF Rev 3 38 Advanced Micro Devices November 2021 pp 515 516 To facilitate virtualization of real mode the VMRUN instruction may legally load a guest CR0 value with PE 0 but PG 1 Likewise the RSM instruction is permitted to return to paged real mode This processor mode behaves in every way like real mode with the exception that paging is applied The intent is that the VMM run the guest in paged real mode at CPL0 and with page faults intercepted The VMM is responsible for setting up a shadow page table that maps guest physical memory to the appropriate system physical addresses The behavior of running a guest in paged real mode without intercepting page faults to the VMM is undefined Retrieved from https en wikipedia org w index php title Virtual 8086 mode amp oldid 1147144735 Virtual 8086 mode enhancements 28VME 29, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.