WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Re: [PATCH][RFC] Emulating real mode with x86_emulate

To: "Anthony Liguori" <aliguori@xxxxxxxxxx>
Subject: [Xen-devel] Re: [PATCH][RFC] Emulating real mode with x86_emulate
From: "Kamble, Nitin A" <nitin.a.kamble@xxxxxxxxx>
Date: Wed, 4 Apr 2007 18:24:10 -0700
Cc: "Yu, Wilfred" <wilfred.yu@xxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx, Keir Fraser <keir@xxxxxxxxxxxxx>, "Nakajima, Jun" <jun.nakajima@xxxxxxxxx>
Delivery-date: Wed, 04 Apr 2007 18:23:24 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <46125ECC.2030202@xxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <4607074E.1030807@xxxxxxxxxx> <1175203075.27076.17.camel@xxxxxxxxxxxxxxxxxxxxxxxxxx> <460C4AAE.5020707@xxxxxxxxxx> <1175212362.27076.32.camel@xxxxxxxxxxxxxxxxxxxxxxxxxx> <460C55BD.5050202@xxxxxxxxxx> <1175216381.27076.39.camel@xxxxxxxxxxxxxxxxxxxxxxxxxx> <1175221214.27076.43.camel@xxxxxxxxxxxxxxxxxxxxxxxxxx> <460C8207.8000604@xxxxxxxxxx> <1175280781.32115.13.camel@xxxxxxxxxxxxxxxxxxxxxxxxxx> <460D5E34.2080803@xxxxxxxxxx> <1175288913.32115.20.camel@xxxxxxxxxxxxxxxxxxxxxxxxxx> <1175289886.32115.26.camel@xxxxxxxxxxxxxxxxxxxxxxxxxx> <460D8B1B.6020308@xxxxxxxxxx> <1175539525.9276.5.camel@xxxxxxxxxxxxxxxxxxxxxxxxxx> <4611514D.4090404@xxxxxxxxxx> <1175557945.3593.16.camel@xxxxxxxxxxxxxxxxxxxxxxxxxx> <46125ECC.2030202@xxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: Acd3IRy01aYUfZcnRu+9Xi/xryprZA==
Thread-topic: [PATCH][RFC] Emulating real mode with x86_emulate
Hi Anthony, Keir,
  As per your suggestion I added the SCHEDULE_SOFTIRQ in the set_cr0 path. And now I see the code path going to vmx_do_emulate() for emulation. I added the emulation code for ljmp and it is able to go forward 1 instruction now.

(XEN) HVM2: Loading Cirrus VGABIOS ...                                         
(XEN) HVM2: Loading ACPI ...                                                   
(XEN) HVM2: Loading VMXAssist ... deadbeef                                     
(XEN) HVM2: foo                                                                
(XEN) hvmop_emulate_realmode                                                   
(XEN) guest requests real mode emulation                                       
(XEN) foo 221                                                                  
(XEN) HVM2: Invoking ROMBIOS ...                                               
(XEN) vmx_vmexit_handler called. eip = 0x0                                     
(XEN) vmx_cr_access called eip=0x0                                             
(XEN) mov_to_cr 0 called eip=0x0                                               
(XEN) vmx_set_cr0 called eip=0x0                                               
(XEN) Transfering -- control to x86_emulate eip 0x0                            
(XEN) cr access done: updating eip from eip = 0x0                              
(XEN) updated eip=0x3                                                          
(XEN) arch_vmx_do_resume: starting emulation                                   
(XEN) vmx_do_emulate: hvm_store_cpu_guest_regs                                 
(XEN) vmx_do_emulate: hypercall_preempt_check() = 0                            
(XEN) vmx_do_emulate: cs:eip = 0008:0003                                       
(XEN) x86_emulate realmode: 0008:0003                                          
(XEN) jmp far seg:offset (Xea) handled                                         
(XEN) vmx_do_emulate: cs:eip = 0000:0008                                       
(XEN) x86_emulate realmode: 0000:0008                                          
(XEN) x86_emulate.c:2441:d2 Instr: 8e                                          
(XEN) failed to emulate instruction at eip = 0x8                               
(XEN) domain_crash_sync called from vmcs.c:625                                 
(XEN) Domain 2 (vcpu#0) crashed on cpu#0:                                      
(XEN) ----[ Xen-3.0-unstable  x86_32p  debug=n  Not tainted ]----              
(XEN) CPU:    0                                                                
(XEN) EIP:    0008:[<00000003>]                                                
(XEN) EFLAGS: 00000046   CONTEXT: hvm                                          
(XEN) eax: 00000000   ebx: 00000000   ecx: 00000000   edx: 00000000            
(XEN) esi: 00000000   edi: 00000000   ebp: 00000000   esp: 00000000            
(XEN) cr0: 00000000   cr4: 00000650   cr3: 00000000   cr2: 00000000            
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0010   cs: 0008 

I think getting more instruction emulated will be easy now. I will keep posted about the progress.

Thanks & Regards,
Nitin
Open Source Technology Center, Intel Corporation.
-------------------------------------------------------------------------
The mind is like a parachute; it works much better when it's open.

On Tue, 2007-04-03 at 07:03 -0700, Anthony Liguori wrote:
Kamble, Nitin A wrote:
> On Mon, 2007-04-02 at 11:54 -0700, Anthony Liguori wrote:
>> Before calling x86_emulate, we use hvm_store_cpu_guest_regs() to copy
>> the guest state into a regs struct (which happens to be the vcpu's reg
>> struct).  This reads directly from the VMCS via vmread() so it should be
>> okay.  I don't think a vmx_world_save/restore is actually needed
>> although perhaps I'm missing something?
> It may be ok to use hvm_store_cpu_guest_regs() for 1st few
> instructions, but I think it is not complete enough for emulator use.

What is missing?  x86_emulate() only uses info in the regs (it calls out
to function pointers for special registers).  The GP registers should be
kept up-to-date on vmexit and hvm_store_cpu_guest_regs() should sync the
remainder of the register state.

Is there a specific item you think is missing?

>>
>> > Also the function  arch_vmx_do_resume() is called at the time of vcpu
>> > schedule, so it is not right to call the  vmx_do_emulate() from there.
>>
>> Right, the idea was to have x86_emulate() be called instead of
>> vmentry().  I thought that being in the set_cr0 path would ensure that
>> we go through do_resume() again.  Is this assumption incorrect?
> Yes, This assumption is not right. arch_vmx_do_resume() is assigned to
> schedule tail, so that the vcpu context is saved/restored when another
> vcpu is scheduled on the physical cpu.

Hrm, okay.  Manually invoking the scheduler is probably a reasonable
place to start.  It would be nice to clean things up though so that
wasn't necessary.

>>
>> I didn't want to just stick it in the set_cr0 path because we ought to
>> be able to pull the emulation loop into common code for SVM/VT and the
>> do_resume path seems like the only place where there's common place to
>> hook right now.
> I thought the emulator will be needed only for VMX; why is it needed
> for SVM?

As Keir mentioned, there are some corner cases where emulation is
needed.  Also, there is some opportunity to simplify things by using the
emulator.  For instance, instead of decoding a PIO instruction using the
info in the VMCS/VMCB (none of which is actually common to VT/SVM), we
may find that it is simpler to just call out to x86_emulate() and let it
decode and dispatch the PIO operation.

In fact, a large number of the exits can be handled in this way.  I have
no clue if this would impact performance in a significant way but it
would definitely simplify things.

> Also calling the x86_emulate() to emulate multiple instructions from
> vmx_do_resume() will block the physical cpu from other vcpus.

That's what the hypercall_preempt_check() is for.

> I think we discussed the approach of using the non-root context for
> for emulator within the Xen. Or did I misunderstanding it?

We discussed quite a few approaches :-)  I thought we settled on doing
the emulation within Xen.  I'm not sure what would be gained from a
non-root context other than better security assurances.

Regards,

Anthony Liguori

>> Regards,
>>
>> Anthony Liguori
>>

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel