|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 09/17] SVM: use generic instruction decoding
>>> On 14.09.16 at 19:56, <andrew.cooper3@xxxxxxxxxx> wrote:
> On 08/09/16 14:14, Jan Beulich wrote:
>> int __get_instruction_length_from_list(struct vcpu *v,
>> const enum instruction_index *list, unsigned int list_count)
>> {
>> struct vmcb_struct *vmcb = v->arch.hvm_svm.vmcb;
>> - unsigned int i, j, inst_len = 0;
>> - enum instruction_index instr = 0;
>> - u8 buf[MAX_INST_LEN];
>> - const u8 *opcode = NULL;
>> - unsigned long fetch_addr, fetch_limit;
>> - unsigned int fetch_len, max_len;
>> + struct hvm_emulate_ctxt ctxt;
>> + struct x86_emulate_state *state;
>> + unsigned int inst_len, j, modrm_rm, modrm_reg;
>> + int modrm_mod;
>>
>> +#ifdef NDEBUG
>
> Presumably this is just for your testing?
No, I actually meant it to stay that way. Along the lines of the extra
debugging code we have in map_domain_page().
>> if ( (inst_len = svm_nextrip_insn_length(v)) != 0 )
>> return inst_len;
>>
>> if ( vmcb->exitcode == VMEXIT_IOIO )
>> return vmcb->exitinfo2 - vmcb->rip;
>> +#endif
>>
>> - /* Fetch up to the next page break; we'll fetch from the next page
>> - * later if we have to. */
>> - fetch_addr = svm_rip2pointer(v, &fetch_limit);
>> - if ( vmcb->rip > fetch_limit )
>> - return 0;
>> - max_len = min(fetch_limit - vmcb->rip + 1, MAX_INST_LEN + 0UL);
>> - fetch_len = min_t(unsigned int, max_len,
>> - PAGE_SIZE - (fetch_addr & ~PAGE_MASK));
>> - if ( !fetch(vmcb, buf, fetch_addr, fetch_len) )
>> + ASSERT(v == current);
>> + hvm_emulate_prepare(&ctxt, guest_cpu_user_regs());
>> + hvm_emulate_init(&ctxt, NULL, 0);
>> + state = x86_decode_insn(&ctxt.ctxt, hvmemul_insn_fetch);
>> + if ( IS_ERR_OR_NULL(state) )
>> return 0;
>>
>> - while ( (inst_len < max_len) && is_prefix(buf[inst_len]) )
>> - {
>> - inst_len++;
>> - if ( inst_len >= fetch_len )
>> - {
>> - if ( !fetch(vmcb, buf + fetch_len, fetch_addr + fetch_len,
>> - max_len - fetch_len) )
>> - return 0;
>> - fetch_len = max_len;
>> - }
>> + inst_len = x86_insn_length(state, &ctxt.ctxt);
>> + modrm_mod = x86_insn_modrm(state, &modrm_rm, &modrm_reg);
>> + x86_emulate_free_state(state);
>
> From an API point of view, it is weird to have x86_emulate_free_state()
> without a matching allocation function. Perhaps that is just me.
With x86_decode_insn() returning the state, that to me _is_ the
allocation function.
> However, the x86_insn_modrm() API is definitely more weird. Wouldn't it
> be more natural to take optional pointers for the mod, rm and reg parts
> individually?
I could change it to that, but I did it this way because without mod
at least rm is meaningless. Or said differently, I can't really see there
being a caller not caring about mod.
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -382,7 +382,7 @@ struct operand {
>> } mem;
>> };
>> #ifdef __x86_64__
>> -#define REG_POISON ((unsigned long *) 0x8086000000008086UL) /*
>> non-canonical */
>> +#define REG_POISON ((void *)0x8086000000008086UL) /* non-canonical */
>> #else
>> #define REG_POISON NULL /* 32-bit builds are for user-space, so NULL is OK.
>> */
>> #endif
>
> Given that these are now used for general pointer poisoning, they should
> be renamed. There are only 3 instances.
Okay. I'll make the PTR_POISON then.
>> @@ -1658,6 +1662,11 @@ x86_decode_base(
>>
>> switch ( ctxt->opcode )
>> {
>> + case 0x90: /* nop / pause */
>> + if ( repe_prefix() )
>> + ctxt->opcode |= X86EMUL_OPC_F3(0, 0);
>> + break;
>
> Why is it necessary to special case the rep prefix handling in this case?
Because SVM's pause intercept should not mistakenly also accept a
plain NOP.
>> +unsigned int
>> +x86_insn_length(const struct x86_emulate_state *state,
>> + const struct x86_emulate_ctxt *ctxt)
>> +{
>> + check_state(state);
>> +
>> + return state->eip - ctxt->regs->eip;
>
> Is it worth stashing a starting eip? This calculation will go wrong
> after the emulated state has been committed.
This function (taking a state parameter) can't be called by users of
x86_emulate(), and I don't think we need to cater for callers
committing state themselves - they should clearly use the result of
this function for what to commit in the first place.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |