* [PATCH 2/2] KVM: x86 emulator: Discard CR2 in x86 emulator
@ 2007-11-15 7:32 Sheng Yang
[not found] ` <200711151532.20558.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
0 siblings, 1 reply; 5+ messages in thread
From: Sheng Yang @ 2007-11-15 7:32 UTC (permalink / raw)
To: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f
[-- Attachment #1: Type: text/plain, Size: 5137 bytes --]
From 9cd9d5cde7341d5e9de41b1070cea7a98e7d8cc9 Mon Sep 17 00:00:00 2001
From: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
Date: Thu, 15 Nov 2007 15:11:58 +0800
Subject: [PATCH 2/2] KVM: x86 emulator: Discard CR2 in x86 emulator
For CR2 is unreliable and unavailable in many condition, this patch
completely decode memory operand instead of using CR2 in x86 emulator.
Signed-off-by: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
---
drivers/kvm/x86.c | 2 +-
drivers/kvm/x86_emulate.c | 33 +++++++++++++++++++++------------
drivers/kvm/x86_emulate.h | 2 +-
3 files changed, 23 insertions(+), 14 deletions(-)
diff --git a/drivers/kvm/x86.c b/drivers/kvm/x86.c
index aa6c3d8..85a0776 100644
--- a/drivers/kvm/x86.c
+++ b/drivers/kvm/x86.c
@@ -1293,7 +1293,7 @@ int emulate_instruction(struct kvm_vcpu *vcpu,
vcpu->emulate_ctxt.vcpu = vcpu;
vcpu->emulate_ctxt.eflags = kvm_x86_ops->get_rflags(vcpu);
- vcpu->emulate_ctxt.cr2 = cr2;
+ vcpu->emulate_ctxt.memop = 0;
vcpu->emulate_ctxt.mode =
(vcpu->emulate_ctxt.eflags & X86_EFLAGS_VM)
? X86EMUL_MODE_REAL : cs_l
diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emulate.c
index c020010..95536a8 100644
--- a/drivers/kvm/x86_emulate.c
+++ b/drivers/kvm/x86_emulate.c
@@ -880,6 +880,8 @@ done_prefixes:
break;
}
c->src.type = OP_MEM;
+ ctxt->memop = insn_fetch(u32, c->src.bytes, c->eip);
+ c->eip -= c->src.bytes; /* keep the page fault ip */
break;
case SrcImm:
c->src.type = OP_IMM;
@@ -918,14 +920,18 @@ done_prefixes:
c->twobyte && (c->b == 0xb6 || c->b == 0xb7));
break;
case DstMem:
+ c->dst.bytes = (c->d & ByteOp) ? 1 : c->op_bytes;
/*
* For instructions with a ModR/M byte, switch to register
* access if Mod = 3.
*/
- if ((c->d & ModRM) && c->modrm_mod == 3)
+ if ((c->d & ModRM) && c->modrm_mod == 3) {
c->dst.type = OP_REG;
- else
- c->dst.type = OP_MEM;
+ break;
+ }
+ c->dst.type = OP_MEM;
+ ctxt->memop = insn_fetch(u32, c->dst.bytes, c->eip);
+ c->eip -= c->dst.bytes; /* keep the page fault ip */
break;
}
@@ -1091,13 +1097,13 @@ static inline int emulate_grp45(struct
x86_emulate_ctxt *ctxt,
static inline int emulate_grp9(struct x86_emulate_ctxt *ctxt,
struct x86_emulate_ops *ops,
- unsigned long cr2)
+ unsigned long memop)
{
struct decode_cache *c = &ctxt->decode;
u64 old, new;
int rc;
- rc = ops->read_emulated(cr2, &old, 8, ctxt->vcpu);
+ rc = ops->read_emulated(memop, &old, 8, ctxt->vcpu);
if (rc != 0)
return rc;
@@ -1112,7 +1118,7 @@ static inline int emulate_grp9(struct x86_emulate_ctxt
*ctxt,
new = ((u64)c->regs[VCPU_REGS_RCX] << 32) |
(u32) c->regs[VCPU_REGS_RBX];
- rc = ops->cmpxchg_emulated(cr2, &old, &new, 8, ctxt->vcpu);
+ rc = ops->cmpxchg_emulated(memop, &old, &new, 8, ctxt->vcpu);
if (rc != 0)
return rc;
ctxt->eflags |= EFLG_ZF;
@@ -1175,7 +1181,7 @@ static inline int writeback(struct x86_emulate_ctxt
*ctxt,
int
x86_emulate_insn(struct x86_emulate_ctxt *ctxt, struct x86_emulate_ops *ops)
{
- unsigned long cr2 = ctxt->cr2;
+ unsigned long memop;
u64 msr_data;
unsigned long saved_eip;
struct decode_cache *c = &ctxt->decode;
@@ -1190,10 +1196,13 @@ x86_emulate_insn(struct x86_emulate_ctxt *ctxt, struct
x86_emulate_ops *ops)
saved_eip = c->eip;
if (((c->d & ModRM) && (c->modrm_mod != 3)) || (c->d & MemAbs))
- cr2 = c->modrm_ea;
+ memop = c->modrm_ea;
+ else if ((c->d & DstMask) != ImplicitOps)
+ memop = ctxt->memop;
+ else memop = 0;
if (c->src.type == OP_MEM) {
- c->src.ptr = (unsigned long *)cr2;
+ c->src.ptr = (unsigned long *)memop;
c->src.val = 0;
rc = ops->read_emulated((unsigned long)c->src.ptr,
&c->src.val,
@@ -1209,7 +1218,7 @@ x86_emulate_insn(struct x86_emulate_ctxt *ctxt, struct
x86_emulate_ops *ops)
if (c->dst.type == OP_MEM) {
- c->dst.ptr = (unsigned long *)cr2;
+ c->dst.ptr = (unsigned long *)memop;
c->dst.bytes = (c->d & ByteOp) ? 1 : c->op_bytes;
c->dst.val = 0;
if (c->d & BitOp) {
@@ -1648,7 +1657,7 @@ twobyte_insn:
&ctxt->eflags);
break;
case 7: /* invlpg*/
- emulate_invlpg(ctxt->vcpu, cr2);
+ emulate_invlpg(ctxt->vcpu, memop);
break;
default:
goto cannot_emulate;
@@ -1819,7 +1828,7 @@ twobyte_special_insn:
break;
}
case 0xc7: /* Grp9 (cmpxchg8b) */
- rc = emulate_grp9(ctxt, ops, cr2);
+ rc = emulate_grp9(ctxt, ops, memop);
if (rc != 0)
goto done;
break;
diff --git a/drivers/kvm/x86_emulate.h b/drivers/kvm/x86_emulate.h
index e34868b..5aacc76 100644
--- a/drivers/kvm/x86_emulate.h
+++ b/drivers/kvm/x86_emulate.h
@@ -149,7 +149,7 @@ struct x86_emulate_ctxt {
/* Linear faulting address (if emulating a page-faulting instruction). */
unsigned long eflags;
- unsigned long cr2;
+ unsigned long memop;
/* Emulated execution mode, represented by an X86EMUL_MODE value. */
int mode;
--
1.5.2
[-- Attachment #2: 0002-KVM-x86-emulator-Discard-CR2-in-x86-emulator.patch --]
[-- Type: text/x-diff, Size: 5127 bytes --]
From 9cd9d5cde7341d5e9de41b1070cea7a98e7d8cc9 Mon Sep 17 00:00:00 2001
From: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
Date: Thu, 15 Nov 2007 15:11:58 +0800
Subject: [PATCH 2/2] KVM: x86 emulator: Discard CR2 in x86 emulator
For CR2 is unreliable and unavailable in many condition, this patch
completely decode memory operand instead of using CR2 in x86 emulator.
Signed-off-by: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
---
drivers/kvm/x86.c | 2 +-
drivers/kvm/x86_emulate.c | 33 +++++++++++++++++++++------------
drivers/kvm/x86_emulate.h | 2 +-
3 files changed, 23 insertions(+), 14 deletions(-)
diff --git a/drivers/kvm/x86.c b/drivers/kvm/x86.c
index aa6c3d8..85a0776 100644
--- a/drivers/kvm/x86.c
+++ b/drivers/kvm/x86.c
@@ -1293,7 +1293,7 @@ int emulate_instruction(struct kvm_vcpu *vcpu,
vcpu->emulate_ctxt.vcpu = vcpu;
vcpu->emulate_ctxt.eflags = kvm_x86_ops->get_rflags(vcpu);
- vcpu->emulate_ctxt.cr2 = cr2;
+ vcpu->emulate_ctxt.memop = 0;
vcpu->emulate_ctxt.mode =
(vcpu->emulate_ctxt.eflags & X86_EFLAGS_VM)
? X86EMUL_MODE_REAL : cs_l
diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emulate.c
index c020010..95536a8 100644
--- a/drivers/kvm/x86_emulate.c
+++ b/drivers/kvm/x86_emulate.c
@@ -880,6 +880,8 @@ done_prefixes:
break;
}
c->src.type = OP_MEM;
+ ctxt->memop = insn_fetch(u32, c->src.bytes, c->eip);
+ c->eip -= c->src.bytes; /* keep the page fault ip */
break;
case SrcImm:
c->src.type = OP_IMM;
@@ -918,14 +920,18 @@ done_prefixes:
c->twobyte && (c->b == 0xb6 || c->b == 0xb7));
break;
case DstMem:
+ c->dst.bytes = (c->d & ByteOp) ? 1 : c->op_bytes;
/*
* For instructions with a ModR/M byte, switch to register
* access if Mod = 3.
*/
- if ((c->d & ModRM) && c->modrm_mod == 3)
+ if ((c->d & ModRM) && c->modrm_mod == 3) {
c->dst.type = OP_REG;
- else
- c->dst.type = OP_MEM;
+ break;
+ }
+ c->dst.type = OP_MEM;
+ ctxt->memop = insn_fetch(u32, c->dst.bytes, c->eip);
+ c->eip -= c->dst.bytes; /* keep the page fault ip */
break;
}
@@ -1091,13 +1097,13 @@ static inline int emulate_grp45(struct x86_emulate_ctxt *ctxt,
static inline int emulate_grp9(struct x86_emulate_ctxt *ctxt,
struct x86_emulate_ops *ops,
- unsigned long cr2)
+ unsigned long memop)
{
struct decode_cache *c = &ctxt->decode;
u64 old, new;
int rc;
- rc = ops->read_emulated(cr2, &old, 8, ctxt->vcpu);
+ rc = ops->read_emulated(memop, &old, 8, ctxt->vcpu);
if (rc != 0)
return rc;
@@ -1112,7 +1118,7 @@ static inline int emulate_grp9(struct x86_emulate_ctxt *ctxt,
new = ((u64)c->regs[VCPU_REGS_RCX] << 32) |
(u32) c->regs[VCPU_REGS_RBX];
- rc = ops->cmpxchg_emulated(cr2, &old, &new, 8, ctxt->vcpu);
+ rc = ops->cmpxchg_emulated(memop, &old, &new, 8, ctxt->vcpu);
if (rc != 0)
return rc;
ctxt->eflags |= EFLG_ZF;
@@ -1175,7 +1181,7 @@ static inline int writeback(struct x86_emulate_ctxt *ctxt,
int
x86_emulate_insn(struct x86_emulate_ctxt *ctxt, struct x86_emulate_ops *ops)
{
- unsigned long cr2 = ctxt->cr2;
+ unsigned long memop;
u64 msr_data;
unsigned long saved_eip;
struct decode_cache *c = &ctxt->decode;
@@ -1190,10 +1196,13 @@ x86_emulate_insn(struct x86_emulate_ctxt *ctxt, struct x86_emulate_ops *ops)
saved_eip = c->eip;
if (((c->d & ModRM) && (c->modrm_mod != 3)) || (c->d & MemAbs))
- cr2 = c->modrm_ea;
+ memop = c->modrm_ea;
+ else if ((c->d & DstMask) != ImplicitOps)
+ memop = ctxt->memop;
+ else memop = 0;
if (c->src.type == OP_MEM) {
- c->src.ptr = (unsigned long *)cr2;
+ c->src.ptr = (unsigned long *)memop;
c->src.val = 0;
rc = ops->read_emulated((unsigned long)c->src.ptr,
&c->src.val,
@@ -1209,7 +1218,7 @@ x86_emulate_insn(struct x86_emulate_ctxt *ctxt, struct x86_emulate_ops *ops)
if (c->dst.type == OP_MEM) {
- c->dst.ptr = (unsigned long *)cr2;
+ c->dst.ptr = (unsigned long *)memop;
c->dst.bytes = (c->d & ByteOp) ? 1 : c->op_bytes;
c->dst.val = 0;
if (c->d & BitOp) {
@@ -1648,7 +1657,7 @@ twobyte_insn:
&ctxt->eflags);
break;
case 7: /* invlpg*/
- emulate_invlpg(ctxt->vcpu, cr2);
+ emulate_invlpg(ctxt->vcpu, memop);
break;
default:
goto cannot_emulate;
@@ -1819,7 +1828,7 @@ twobyte_special_insn:
break;
}
case 0xc7: /* Grp9 (cmpxchg8b) */
- rc = emulate_grp9(ctxt, ops, cr2);
+ rc = emulate_grp9(ctxt, ops, memop);
if (rc != 0)
goto done;
break;
diff --git a/drivers/kvm/x86_emulate.h b/drivers/kvm/x86_emulate.h
index e34868b..5aacc76 100644
--- a/drivers/kvm/x86_emulate.h
+++ b/drivers/kvm/x86_emulate.h
@@ -149,7 +149,7 @@ struct x86_emulate_ctxt {
/* Linear faulting address (if emulating a page-faulting instruction). */
unsigned long eflags;
- unsigned long cr2;
+ unsigned long memop;
/* Emulated execution mode, represented by an X86EMUL_MODE value. */
int mode;
--
1.5.2
[-- Attachment #3: Type: text/plain, Size: 314 bytes --]
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
[-- Attachment #4: Type: text/plain, Size: 186 bytes --]
_______________________________________________
kvm-devel mailing list
kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org
https://lists.sourceforge.net/lists/listinfo/kvm-devel
^ permalink raw reply related [flat|nested] 5+ messages in thread[parent not found: <200711151532.20558.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>]
* Re: [PATCH 2/2] KVM: x86 emulator: Discard CR2 in x86 emulator [not found] ` <200711151532.20558.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> @ 2007-11-15 10:15 ` Avi Kivity [not found] ` <473C1C38.4000700-atKUWr5tajBWk0Htik3J/w@public.gmane.org> 0 siblings, 1 reply; 5+ messages in thread From: Avi Kivity @ 2007-11-15 10:15 UTC (permalink / raw) To: Sheng Yang; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f Sheng Yang wrote: > From 9cd9d5cde7341d5e9de41b1070cea7a98e7d8cc9 Mon Sep 17 00:00:00 2001 > From: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> > Date: Thu, 15 Nov 2007 15:11:58 +0800 > Subject: [PATCH 2/2] KVM: x86 emulator: Discard CR2 in x86 emulator > > For CR2 is unreliable and unavailable in many condition, this patch > completely decode memory operand instead of using CR2 in x86 emulator. > > > One of my innermost wishes... > diff --git a/drivers/kvm/x86.c b/drivers/kvm/x86.c > index aa6c3d8..85a0776 100644 > --- a/drivers/kvm/x86.c > +++ b/drivers/kvm/x86.c > @@ -1293,7 +1293,7 @@ int emulate_instruction(struct kvm_vcpu *vcpu, > > vcpu->emulate_ctxt.vcpu = vcpu; > vcpu->emulate_ctxt.eflags = kvm_x86_ops->get_rflags(vcpu); > - vcpu->emulate_ctxt.cr2 = cr2; > + vcpu->emulate_ctxt.memop = 0; > We have c->modrm_ea which can be used for the memory operand. > diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emulate.c > index c020010..95536a8 100644 > --- a/drivers/kvm/x86_emulate.c > +++ b/drivers/kvm/x86_emulate.c > @@ -880,6 +880,8 @@ done_prefixes: > break; > } > c->src.type = OP_MEM; > + ctxt->memop = insn_fetch(u32, c->src.bytes, c->eip); > + c->eip -= c->src.bytes; /* keep the page fault ip */ > I don't understand this. In the cases where the memory operand address is encoded in the instruction, we fetch it explicity. When it isn't, this is broken. > break; > case SrcImm: > c->src.type = OP_IMM; > @@ -918,14 +920,18 @@ done_prefixes: > c->twobyte && (c->b == 0xb6 || c->b == 0xb7)); > break; > case DstMem: > + c->dst.bytes = (c->d & ByteOp) ? 1 : c->op_bytes; > This seems unrelated; needs a separate patch. Please check that movzx and movsx aren't affected by this. > /* > * For instructions with a ModR/M byte, switch to register > * access if Mod = 3. > */ > - if ((c->d & ModRM) && c->modrm_mod == 3) > + if ((c->d & ModRM) && c->modrm_mod == 3) { > c->dst.type = OP_REG; > - else > - c->dst.type = OP_MEM; > + break; > + } > + c->dst.type = OP_MEM; > + ctxt->memop = insn_fetch(u32, c->dst.bytes, c->eip); > + c->eip -= c->dst.bytes; /* keep the page fault ip */ > Ditto. -- error compiling committee.c: too many arguments to function ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/ ^ permalink raw reply [flat|nested] 5+ messages in thread
[parent not found: <473C1C38.4000700-atKUWr5tajBWk0Htik3J/w@public.gmane.org>]
* Re: [PATCH 2/2] KVM: x86 emulator: Discard CR2 in x86 emulator [not found] ` <473C1C38.4000700-atKUWr5tajBWk0Htik3J/w@public.gmane.org> @ 2007-11-16 2:28 ` Sheng Yang [not found] ` <200711161028.09501.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 0 siblings, 1 reply; 5+ messages in thread From: Sheng Yang @ 2007-11-16 2:28 UTC (permalink / raw) To: Avi Kivity; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f On Thursday 15 November 2007 18:15:20 Avi Kivity wrote: > Sheng Yang wrote: > > From 9cd9d5cde7341d5e9de41b1070cea7a98e7d8cc9 Mon Sep 17 00:00:00 2001 > > From: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> > > Date: Thu, 15 Nov 2007 15:11:58 +0800 > > Subject: [PATCH 2/2] KVM: x86 emulator: Discard CR2 in x86 emulator > > > > For CR2 is unreliable and unavailable in many condition, this patch > > completely decode memory operand instead of using CR2 in x86 emulator. > > One of my innermost wishes... > > > diff --git a/drivers/kvm/x86.c b/drivers/kvm/x86.c > > index aa6c3d8..85a0776 100644 > > --- a/drivers/kvm/x86.c > > +++ b/drivers/kvm/x86.c > > @@ -1293,7 +1293,7 @@ int emulate_instruction(struct kvm_vcpu *vcpu, > > > > vcpu->emulate_ctxt.vcpu = vcpu; > > vcpu->emulate_ctxt.eflags = kvm_x86_ops->get_rflags(vcpu); > > - vcpu->emulate_ctxt.cr2 = cr2; > > + vcpu->emulate_ctxt.memop = 0; > > We have c->modrm_ea which can be used for the memory operand. I don't think using the name modrm_ea is good for explicit encoding, so I add this. But I am think of is it better to be in decode_cache? > > > diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emulate.c > > index c020010..95536a8 100644 > > --- a/drivers/kvm/x86_emulate.c > > +++ b/drivers/kvm/x86_emulate.c > > @@ -880,6 +880,8 @@ done_prefixes: > > break; > > } > > c->src.type = OP_MEM; > > + ctxt->memop = insn_fetch(u32, c->src.bytes, c->eip); > > + c->eip -= c->src.bytes; /* keep the page fault ip */ > > I don't understand this. In the cases where the memory operand address > is encoded in the instruction, we fetch it explicity. When it isn't, > this is broken. But we mark implicit encoding instructions as "ImplicitOps", so only explicit ones should get here. And my former patch deal with the implicit ones, and modrm_ea has priority to memop, so I think it's OK. Maybe add a judgment of modrm_ea here is better. > > > break; > > case SrcImm: > > c->src.type = OP_IMM; > > @@ -918,14 +920,18 @@ done_prefixes: > > c->twobyte && (c->b == 0xb6 || c->b == 0xb7)); > > break; > > case DstMem: > > + c->dst.bytes = (c->d & ByteOp) ? 1 : c->op_bytes; > > This seems unrelated; needs a separate patch. Please check that movzx > and movsx aren't affected by this. I need this for following insn_fetch(). And movzx/movsx is marked as DstReg, so they won't get here. > > > /* > > * For instructions with a ModR/M byte, switch to register > > * access if Mod = 3. > > */ > > - if ((c->d & ModRM) && c->modrm_mod == 3) > > + if ((c->d & ModRM) && c->modrm_mod == 3) { > > c->dst.type = OP_REG; > > - else > > - c->dst.type = OP_MEM; > > + break; > > + } > > + c->dst.type = OP_MEM; > > + ctxt->memop = insn_fetch(u32, c->dst.bytes, c->eip); > > + c->eip -= c->dst.bytes; /* keep the page fault ip */ > > Ditto. -- Thanks Yang, Sheng ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2005. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/ ^ permalink raw reply [flat|nested] 5+ messages in thread
[parent not found: <200711161028.09501.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>]
* Re: [PATCH 2/2] KVM: x86 emulator: Discard CR2 in x86 emulator [not found] ` <200711161028.09501.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> @ 2007-11-16 6:41 ` Avi Kivity [not found] ` <473D3BAE.1050207-atKUWr5tajBWk0Htik3J/w@public.gmane.org> 0 siblings, 1 reply; 5+ messages in thread From: Avi Kivity @ 2007-11-16 6:41 UTC (permalink / raw) To: Sheng Yang; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f Sheng Yang wrote: > On Thursday 15 November 2007 18:15:20 Avi Kivity wrote: > >> Sheng Yang wrote: >> >>> From 9cd9d5cde7341d5e9de41b1070cea7a98e7d8cc9 Mon Sep 17 00:00:00 2001 >>> From: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> >>> Date: Thu, 15 Nov 2007 15:11:58 +0800 >>> Subject: [PATCH 2/2] KVM: x86 emulator: Discard CR2 in x86 emulator >>> >>> For CR2 is unreliable and unavailable in many condition, this patch >>> completely decode memory operand instead of using CR2 in x86 emulator. >>> >> One of my innermost wishes... >> >> >>> diff --git a/drivers/kvm/x86.c b/drivers/kvm/x86.c >>> index aa6c3d8..85a0776 100644 >>> --- a/drivers/kvm/x86.c >>> +++ b/drivers/kvm/x86.c >>> @@ -1293,7 +1293,7 @@ int emulate_instruction(struct kvm_vcpu *vcpu, >>> >>> vcpu->emulate_ctxt.vcpu = vcpu; >>> vcpu->emulate_ctxt.eflags = kvm_x86_ops->get_rflags(vcpu); >>> - vcpu->emulate_ctxt.cr2 = cr2; >>> + vcpu->emulate_ctxt.memop = 0; >>> >> We have c->modrm_ea which can be used for the memory operand. >> > > I don't think using the name modrm_ea is good for explicit encoding, so I add > this. I agree the name isn't good (we already use it for MemAbs decoding, too). We can rename it later. > thBut I am think of is it better to be in decode_cache? > > c-> is the decode cache. Maybe I misunderstood you? >>> diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emulate.c >>> index c020010..95536a8 100644 >>> --- a/drivers/kvm/x86_emulate.c >>> +++ b/drivers/kvm/x86_emulate.c >>> @@ -880,6 +880,8 @@ done_prefixes: >>> break; >>> } >>> c->src.type = OP_MEM; >>> + ctxt->memop = insn_fetch(u32, c->src.bytes, c->eip); >>> + c->eip -= c->src.bytes; /* keep the page fault ip */ >>> >> I don't understand this. In the cases where the memory operand address >> is encoded in the instruction, we fetch it explicity. When it isn't, >> this is broken. >> > > But we mark implicit encoding instructions as "ImplicitOps", so only explicit > ones should get here. And my former patch deal with the implicit ones, and > modrm_ea has priority to memop, so I think it's OK. > I still don't understand. Which instruction benefits from this change? And shouldn't the be marked MemAbs instead? -- Any sufficiently difficult bug is indistinguishable from a feature. ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2005. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/ ^ permalink raw reply [flat|nested] 5+ messages in thread
[parent not found: <473D3BAE.1050207-atKUWr5tajBWk0Htik3J/w@public.gmane.org>]
* Re: [PATCH 2/2] KVM: x86 emulator: Discard CR2 in x86 emulator [not found] ` <473D3BAE.1050207-atKUWr5tajBWk0Htik3J/w@public.gmane.org> @ 2007-11-16 7:37 ` Sheng Yang 0 siblings, 0 replies; 5+ messages in thread From: Sheng Yang @ 2007-11-16 7:37 UTC (permalink / raw) To: Avi Kivity; +Cc: kvm-devel-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f On Friday 16 November 2007 14:41:50 Avi Kivity wrote: > Sheng Yang wrote: > > On Thursday 15 November 2007 18:15:20 Avi Kivity wrote: > >> Sheng Yang wrote: > >>> From 9cd9d5cde7341d5e9de41b1070cea7a98e7d8cc9 Mon Sep 17 00:00:00 2001 > >>> From: Sheng Yang <sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> > >>> Date: Thu, 15 Nov 2007 15:11:58 +0800 > >>> Subject: [PATCH 2/2] KVM: x86 emulator: Discard CR2 in x86 emulator > >>> > >>> For CR2 is unreliable and unavailable in many condition, this patch > >>> completely decode memory operand instead of using CR2 in x86 emulator. > >> > >> One of my innermost wishes... > >> > >>> diff --git a/drivers/kvm/x86.c b/drivers/kvm/x86.c > >>> index aa6c3d8..85a0776 100644 > >>> --- a/drivers/kvm/x86.c > >>> +++ b/drivers/kvm/x86.c > >>> @@ -1293,7 +1293,7 @@ int emulate_instruction(struct kvm_vcpu *vcpu, > >>> > >>> vcpu->emulate_ctxt.vcpu = vcpu; > >>> vcpu->emulate_ctxt.eflags = kvm_x86_ops->get_rflags(vcpu); > >>> - vcpu->emulate_ctxt.cr2 = cr2; > >>> + vcpu->emulate_ctxt.memop = 0; > >> > >> We have c->modrm_ea which can be used for the memory operand. > > > > I don't think using the name modrm_ea is good for explicit encoding, so I > > add this. > > I agree the name isn't good (we already use it for MemAbs decoding, > too). We can rename it later. > > > thBut I am think of is it better to be in decode_cache? > > c-> is the decode cache. Maybe I misunderstood you? > > >>> diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emulate.c > >>> index c020010..95536a8 100644 > >>> --- a/drivers/kvm/x86_emulate.c > >>> +++ b/drivers/kvm/x86_emulate.c > >>> @@ -880,6 +880,8 @@ done_prefixes: > >>> break; > >>> } > >>> c->src.type = OP_MEM; > >>> + ctxt->memop = insn_fetch(u32, c->src.bytes, c->eip); > >>> + c->eip -= c->src.bytes; /* keep the page fault ip */ > >> > >> I don't understand this. In the cases where the memory operand address > >> is encoded in the instruction, we fetch it explicity. When it isn't, > >> this is broken. > > > > But we mark implicit encoding instructions as "ImplicitOps", so only > > explicit ones should get here. And my former patch deal with the implicit > > ones, and modrm_ea has priority to memop, so I think it's OK. > > I still don't understand. Which instruction benefits from this change? > And shouldn't the be marked MemAbs instead? Yes, your are right. I found I made a wrong assumption. I will send the modified patch later, thx. -- Thanks Yang, Sheng ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2005. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/ ^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2007-11-16 7:37 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-11-15 7:32 [PATCH 2/2] KVM: x86 emulator: Discard CR2 in x86 emulator Sheng Yang
[not found] ` <200711151532.20558.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2007-11-15 10:15 ` Avi Kivity
[not found] ` <473C1C38.4000700-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-11-16 2:28 ` Sheng Yang
[not found] ` <200711161028.09501.sheng.yang-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2007-11-16 6:41 ` Avi Kivity
[not found] ` <473D3BAE.1050207-atKUWr5tajBWk0Htik3J/w@public.gmane.org>
2007-11-16 7:37 ` Sheng Yang
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox