On Sun, Jun 9, 2013 at 8:49 PM, Gleb Natapov <g...@redhat.com> wrote:
> On Sun, Jun 09, 2013 at 08:44:32PM +0800, 李春奇 <Arthur Chunqi Li> wrote:
>> On Sun, Jun 9, 2013 at 7:07 PM, Gleb Natapov <g...@redhat.com> wrote:
>> > On Fri, Jun 07, 2013 at 10:31:38AM +0800, Arthur Chunqi Li wrote:
>> >> Add a function trap_emulator to run an instruction in emulator.
>> >> Set inregs first (%rax, %rsp, %rbp, %rflags have special usage and
>> >> cannot set in inregs), put instruction codec in alt_insn and call
>> >> func with alt_insn_length. Get results in outregs.
>> >>
>> > Why %rax, %rsp, %rbp, %rflags cannot be set in inregs?
>> >
>> > %rax because trapping instruction uses it? Use one that does not use
>> > register at all: MOV r/m32, imm32
>> I don't know why set %rax before call alt_insn_page can cause error. I
>> use "xchg %%rax, 0+%[save]" before "call *%1" and the %rcx is not set
>> correctly.
> We better find this out :)
I will try to trace it.
>
>> >
>> > %rsp and %rbp because of ret on instruction page? Use the same trick
>> > realmode.c test uses: have the code that sets/saves registers in
>> > insn_page/alt_insn_page itself and copy the instruction you want to test
>> > into the page itself instead of doing call.
>> I don't know how instructions between calling insn_page and
>> alt_insn_page are executed (function install_page and some other
>> instructions before call *%1". If these insns are executed after
>> insn_page is called, changes before the trapping instruction may
>> affect the executing of these instructions.
>>
> Not sure what do you mean here.
Simply, I mean what is the executing sequence in that piece of codes.
Why instruction in alt_insn_page will be emulated?

>
>> >
>> > Not sure what is so special about %rflags.
>> >
>> >> Signed-off-by: Arthur Chunqi Li <yzt...@gmail.com>
>> >> ---
>> >>  x86/emulator.c |   67 
>> >> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++
>> >>  1 file changed, 67 insertions(+)
>> >>  mode change 100644 => 100755 x86/emulator.c
>> >>
>> >> diff --git a/x86/emulator.c b/x86/emulator.c
>> >> old mode 100644
>> >> new mode 100755
>> >> index 96576e5..770e8f7
>> >> --- a/x86/emulator.c
>> >> +++ b/x86/emulator.c
>> >> @@ -11,6 +11,13 @@ int fails, tests;
>> >>
>> >>  static int exceptions;
>> >>
>> >> +struct regs {
>> >> +     u64 rax, rbx, rcx, rdx;
>> >> +     u64 rsi, rdi, rsp, rbp;
>> >> +     u64 rip, rflags;
>> >> +};
>> >> +static struct regs inregs, outregs;
>> >> +
>> >>  void report(const char *name, int result)
>> >>  {
>> >>       ++tests;
>> >> @@ -685,6 +692,66 @@ static void test_shld_shrd(u32 *mem)
>> >>      report("shrd (cl)", *mem == ((0x12345678 >> 3) | (5u << 29)));
>> >>  }
>> >>
>> >> +static void trap_emulator(uint64_t *mem, uint8_t *insn_page,
>> >> +                          uint8_t *alt_insn_page, void *insn_ram,
>> >> +                          uint8_t *alt_insn, int alt_insn_length)
>> >> +{
>> >> +     ulong *cr3 = (ulong *)read_cr3();
>> >> +     int i;
>> >> +     static struct regs save;
>> >> +
>> >> +     // Pad with RET instructions
>> >> +     memset(insn_page, 0xc3, 4096);
>> >> +     memset(alt_insn_page, 0xc3, 4096);
>> >> +
>> >> +     // Place a trapping instruction in the page to trigger a VMEXIT
>> >> +     insn_page[0] = 0x89; // mov %eax, (%rax)
>> >> +     insn_page[1] = 0x00;
>> >> +     insn_page[2] = 0x90; // nop
>> >> +     insn_page[3] = 0xc3; // ret
>> >> +
>> >> +     // Place the instruction we want the hypervisor to see in the 
>> >> alternate page
>> >> +     for (i=0; i<alt_insn_length; i++)
>> >> +             alt_insn_page[i] = alt_insn[i];
>> >> +     save = inregs;
>> >> +
>> >> +     // Load the code TLB with insn_page, but point the page tables at
>> >> +     // alt_insn_page (and keep the data TLB clear, for AMD decode 
>> >> assist).
>> >> +     // This will make the CPU trap on the insn_page instruction but the
>> >> +     // hypervisor will see alt_insn_page.
>> >> +     install_page(cr3, virt_to_phys(insn_page), insn_ram);
>> >> +     invlpg(insn_ram);
>> >> +     // Load code TLB
>> >> +     asm volatile("call *%0" : : "r"(insn_ram + 3));
>> >> +     install_page(cr3, virt_to_phys(alt_insn_page), insn_ram);
>> >> +     // Trap, let hypervisor emulate at alt_insn_page
>> >> +     asm volatile(
>> >> +             "xchg %%rbx, 8+%[save] \n\t"
>> >> +             "xchg %%rcx, 16+%[save] \n\t"
>> >> +             "xchg %%rdx, 24+%[save] \n\t"
>> >> +             "xchg %%rsi, 32+%[save] \n\t"
>> >> +             "xchg %%rdi, 40+%[save] \n\t"
>> >> +
>> >> +             "call *%1\n\t"
>> >> +
>> >> +             "mov %%rax, 0+%[save] \n\t"
>> >> +             "xchg %%rbx, 8+%[save] \n\t"
>> >> +             "xchg %%rcx, 16+%[save] \n\t"
>> >> +             "xchg %%rdx, 24+%[save] \n\t"
>> >> +             "xchg %%rsi, 32+%[save] \n\t"
>> >> +             "xchg %%rdi, 40+%[save] \n\t"
>> >> +             "mov %%rsp, 48+%[save] \n\t"
>> >> +             "mov %%rbp, 56+%[save] \n\t"
>> >> +             /* Save RFLAGS in outregs*/
>> >> +             "pushf \n\t"
>> >> +             "popq 72+%[save] \n\t"
>> >> +             : [save]"+m"(save)
>> >> +             : "r"(insn_ram), "a"(mem)
>> >> +             : "memory", "cc"
>> >> +             );
>> >> +     outregs = save;
>> >> +}
>> >> +
>> >>  static void advance_rip_by_3_and_note_exception(struct ex_regs *regs)
>> >>  {
>> >>      ++exceptions;
>> >> --
>> >> 1.7.9.5
>> >
>> > --
>> >                         Gleb.
>>
>>
>>
>> --
>> Arthur Chunqi Li
>> Department of Computer Science
>> School of EECS
>> Peking University
>> Beijing, China
>
> --
>                         Gleb.



--
Arthur Chunqi Li
Department of Computer Science
School of EECS
Peking University
Beijing, China
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to