All of lore.kernel.org
 help / color / mirror / Atom feed
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Jan Beulich <JBeulich@suse.com>,
	xen-devel <xen-devel@lists.xenproject.org>
Cc: George Dunlap <George.Dunlap@eu.citrix.com>
Subject: Re: [PATCH v3 21/25] x86emul: add read-modify-write hook
Date: Fri, 2 Feb 2018 16:13:05 +0000	[thread overview]
Message-ID: <ac8627d4-84b1-3785-dda8-b40e48426ee2@citrix.com> (raw)
In-Reply-To: <5A295B3D020000780019598B@prv-mh.provo.novell.com>

On 07/12/17 14:16, Jan Beulich wrote:
> In order to correctly emulate read-modify-write insns, especially
> LOCKed ones, we should not issue reads and writes separately. Use a
> new hook to combine both, and don't uniformly read the memory
> destination anymore. Instead, DstMem opcodes without Mov now need to
> have done so in their respective case blocks.
>
> Also strip bogus _ prefixes from macro parameters when this only affects
> lines which are being changed anyway.
>
> In the test harness, besides some re-ordering to facilitate running a
> few tests twice (one without and a second time with the .rmw hook in
> place), tighten a few EFLAGS checks and add a test for NOT with memory
> operand (in particular to verify EFLAGS don't get altered there).
>
> For now make use of the hook optional for callers; eventually we may
> want to consider making this mandatory.
>
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> ---
> v3: New.
> ---
> TBD: Do we want to also support non-lockable RMW insns in the new hook
>      and helper (SHL & friends, SHLD, SHRD)?

What would this achieve?  I suppose it would avoid a double pagewalk.

>
>
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
> @@ -3356,35 +3388,83 @@ x86_emulate(
>          unsigned int i, n;
>          unsigned long dummy;
>  
> -    case 0x00 ... 0x05: add: /* add */
> -        emulate_2op_SrcV("add", src, dst, _regs.eflags);
> +    case 0x00: case 0x01: add: /* add reg,mem */
> +        if ( ops->rmw && dst.type == OP_MEM )
> +            state->rmw = rmw_add;
> +        else
> +        {
> +    case 0x02 ... 0x05: /* add */

I think it would help to identify reg,reg specifically in these comments.

> +            emulate_2op_SrcV("add", src, dst, _regs.eflags);
> +        }
>          break;
>  
> -    case 0x08 ... 0x0d: or:  /* or */
> -        emulate_2op_SrcV("or", src, dst, _regs.eflags);
> +    case 0x08: case 0x09: or: /* or reg,mem */
> +        if ( ops->rmw && dst.type == OP_MEM )
> +            state->rmw = rmw_or;
> +        else
> +        {
> +    case 0x0a ... 0x0d: /* or */
> +            emulate_2op_SrcV("or", src, dst, _regs.eflags);
> +        }
>          break;
>  
> -    case 0x10 ... 0x15: adc: /* adc */
> -        emulate_2op_SrcV("adc", src, dst, _regs.eflags);
> +    case 0x10: case 0x11: adc: /* adc reg,mem */
> +        if ( ops->rmw && dst.type == OP_MEM )
> +            state->rmw = rmw_adc;
> +        else
> +        {
> +    case 0x12 ... 0x15: /* adc */
> +            emulate_2op_SrcV("adc", src, dst, _regs.eflags);
> +        }
>          break;
>  
> -    case 0x18 ... 0x1d: sbb: /* sbb */
> -        emulate_2op_SrcV("sbb", src, dst, _regs.eflags);
> +    case 0x18: case 0x19: sbb: /* sbb reg,mem */
> +        if ( ops->rmw && dst.type == OP_MEM )
> +            state->rmw = rmw_sbb;
> +        else
> +        {
> +    case 0x1a ... 0x1d: /* sbb */
> +            emulate_2op_SrcV("sbb", src, dst, _regs.eflags);
> +        }
>          break;
>  
> -    case 0x20 ... 0x25: and: /* and */
> -        emulate_2op_SrcV("and", src, dst, _regs.eflags);
> +    case 0x20: case 0x21: and: /* and reg,mem */
> +        if ( ops->rmw && dst.type == OP_MEM )
> +            state->rmw = rmw_and;
> +        else
> +        {
> +    case 0x22 ... 0x25: /* and */
> +            emulate_2op_SrcV("and", src, dst, _regs.eflags);
> +        }
>          break;
>  
> -    case 0x28 ... 0x2d: sub: /* sub */
> -        emulate_2op_SrcV("sub", src, dst, _regs.eflags);
> +    case 0x28: case 0x29: sub: /* sub reg,mem */
> +        if ( ops->rmw && dst.type == OP_MEM )
> +            state->rmw = rmw_sub;
> +        else
> +        {
> +    case 0x2a ... 0x2d: /* sub */
> +            emulate_2op_SrcV("sub", src, dst, _regs.eflags);
> +        }
>          break;
>  
> -    case 0x30 ... 0x35: xor: /* xor */
> -        emulate_2op_SrcV("xor", src, dst, _regs.eflags);
> +    case 0x30: case 0x31: xor: /* xor reg,mem */
> +        if ( ops->rmw && dst.type == OP_MEM )
> +            state->rmw = rmw_xor;
> +        else
> +        {
> +    case 0x32 ... 0x35: /* xor */
> +            emulate_2op_SrcV("xor", src, dst, _regs.eflags);
> +        }
>          break;
>  
> -    case 0x38 ... 0x3d: cmp: /* cmp */
> +    case 0x38: case 0x39: cmp: /* cmp reg,mem */
> +        if ( ops->rmw && dst.type == OP_MEM &&
> +             (rc = read_ulong(dst.mem.seg, dst.mem.off, &dst.val,
> +                              dst.bytes, ctxt, ops)) != X86EMUL_OKAY )

Why does rmw matter here? cmp doesn't write to its operands.

> +            goto done;
> +        /* fall through */
> +    case 0x3a ... 0x3d: /* cmp */
>          generate_exception_if(lock_prefix, EXC_UD);
>          emulate_2op_SrcV("cmp", src, dst, _regs.eflags);
>          dst.type = OP_NONE;
> @@ -3700,6 +3780,13 @@ x86_emulate(
>          break;
>  
>      case 0x86 ... 0x87: xchg: /* xchg */
> +        /* The lock prefix is implied for this insn. */
> +        lock_prefix = 1;

Only for memory.  I.e. this should probably be inside an OP_MEM check.

~Andrew

> +        if ( ops->rmw && dst.type == OP_MEM )
> +        {
> +            state->rmw = rmw_xchg;
> +            break;
> +        }
>          /* Write back the register source. */
>          switch ( dst.bytes )
>          {


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

  reply	other threads:[~2018-02-02 16:21 UTC|newest]

Thread overview: 85+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-12-07 13:49 [PATCH v3 00/25] x86: emulator enhancements Jan Beulich
2017-12-07 13:58 ` [PATCH v3 01/25] x86emul: make decode_register() return unsigned long * Jan Beulich
2017-12-07 18:32   ` Andrew Cooper
2017-12-08  7:44     ` Jan Beulich
2017-12-07 13:59 ` [PATCH v3 02/25] x86emul: build SIMD tests with -Os Jan Beulich
2017-12-07 18:32   ` Andrew Cooper
2017-12-07 14:00 ` [PATCH v3 03/25] x86emul: support F16C insns Jan Beulich
2018-01-31 18:58   ` Andrew Cooper
2017-12-07 14:01 ` [PATCH v3 04/25] x86emul: support FMA4 insns Jan Beulich
2018-01-31 19:51   ` Andrew Cooper
2017-12-07 14:02 ` [PATCH v3 05/25] x86emul: support FMA insns Jan Beulich
2018-02-01 16:15   ` Andrew Cooper
2017-12-07 14:03 ` [PATCH v3 06/25] x86emul: support most remaining AVX2 insns Jan Beulich
2018-02-01 19:45   ` Andrew Cooper
2018-02-02  9:29     ` Jan Beulich
2017-12-07 14:03 ` [PATCH v3 07/25] x86emul: support AVX2 gather insns Jan Beulich
2018-02-01 20:53   ` Andrew Cooper
2018-02-02  9:44     ` Jan Beulich
2017-12-07 14:04 ` [PATCH v3 08/25] x86emul: add tables for XOP 08 and 09 extension spaces Jan Beulich
2018-02-02 11:43   ` Andrew Cooper
2018-02-02 15:15     ` Jan Beulich
2018-02-02 16:02       ` Andrew Cooper
2017-12-07 14:04 ` [PATCH v3 09/25] x86emul: support XOP insns Jan Beulich
2018-02-02 12:03   ` Andrew Cooper
2018-02-02 15:17     ` Jan Beulich
2018-02-05 13:01       ` Andrew Cooper
2017-12-07 14:05 ` [PATCH v3 10/25] x86emul: support 3DNow! insns Jan Beulich
2018-02-02 13:02   ` Andrew Cooper
2018-02-02 15:22     ` Jan Beulich
2018-02-02 16:04       ` Andrew Cooper
2017-12-07 14:06 ` [PATCH v3 11/25] x86emul: place test blobs in executable section Jan Beulich
2018-02-02 13:03   ` Andrew Cooper
2018-02-02 15:27     ` Jan Beulich
2018-02-05 13:11       ` Andrew Cooper
2018-02-05 13:55         ` Jan Beulich
2017-12-07 14:07 ` [PATCH v3 12/25] x86emul: abstract out XCRn accesses Jan Beulich
2018-02-02 13:29   ` Andrew Cooper
2018-02-02 17:05     ` Jan Beulich
2017-12-07 14:08 ` [PATCH v3 13/25] x86emul: adjust_bnd() should check XCR0 Jan Beulich
2018-02-02 13:30   ` Andrew Cooper
2018-02-02 16:19     ` Jan Beulich
2018-02-02 16:28       ` Andrew Cooper
2017-12-07 14:09 ` [PATCH v3 14/25] x86emul: make all FPU emulation use the stub Jan Beulich
2018-02-02 13:37   ` Andrew Cooper
2017-12-07 14:10 ` [PATCH v3 15/25] x86/HVM: eliminate custom #MF/#XM handling Jan Beulich
2018-02-02 13:38   ` Andrew Cooper
2017-12-07 14:11 ` [PATCH v3 16/25] x86emul: support SWAPGS Jan Beulich
2018-02-02 13:41   ` Andrew Cooper
2018-02-02 16:24     ` Jan Beulich
2017-12-07 14:11 ` [PATCH v3 17/25] x86emul: emulate {MONITOR, MWAIT}{, X} as no-op Jan Beulich
2018-02-02 14:05   ` Andrew Cooper
2017-12-07 14:12 ` [PATCH v3 18/25] x86emul: add missing suffixes in test harness Jan Beulich
2018-02-02 14:13   ` Andrew Cooper
2017-12-07 14:14 ` [PATCH v3 19/25] x86emul: tell cmpxchg hook whether LOCK is in effect Jan Beulich
2017-12-08 10:58   ` Paul Durrant
2018-02-02 14:13   ` Andrew Cooper
2017-12-07 14:15 ` [PATCH v3 20/25] x86emul: correctly handle CMPXCHG* comparison failures Jan Beulich
2018-02-02 14:49   ` Andrew Cooper
2018-02-05  8:07     ` Jan Beulich
2018-02-05 13:38       ` Andrew Cooper
2017-12-07 14:16 ` [PATCH v3 21/25] x86emul: add read-modify-write hook Jan Beulich
2018-02-02 16:13   ` Andrew Cooper [this message]
2018-02-05  8:22     ` Jan Beulich
2018-02-05 14:21       ` Andrew Cooper
2018-02-05 14:56         ` Jan Beulich
2017-12-07 14:16 ` [PATCH v3 22/25] x86/HVM: do actual CMPXCHG in hvmemul_cmpxchg() Jan Beulich
2017-12-07 14:38   ` Razvan Cojocaru
2017-12-08 10:38   ` Paul Durrant
2018-02-02 16:36   ` Andrew Cooper
2018-02-05  8:32     ` Jan Beulich
2018-02-05 16:09       ` Andrew Cooper
2018-02-05 16:49         ` Jan Beulich
2018-02-05 16:57           ` Andrew Cooper
2018-02-05 17:05             ` Jan Beulich
2017-12-07 14:17 ` [PATCH v3 23/25] x86/HVM: make use of new read-modify-write emulator hook Jan Beulich
2017-12-08 10:41   ` Paul Durrant
2018-02-02 16:37   ` Andrew Cooper
2018-02-05  8:34     ` Jan Beulich
2018-02-05 16:15       ` Andrew Cooper
2017-12-07 14:18 ` [PATCH v3 24/25] x86/shadow: fully move unmap-dest into common code Jan Beulich
2018-02-02 16:46   ` Andrew Cooper
2017-12-07 14:19 ` [PATCH v3 25/25] x86/shadow: fold sh_x86_emulate_{write, cmpxchg}() into their only callers Jan Beulich
2018-02-02 16:52   ` Andrew Cooper
2018-02-05  8:42     ` Jan Beulich
2018-02-05 12:16       ` Tim Deegan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=ac8627d4-84b1-3785-dda8-b40e48426ee2@citrix.com \
    --to=andrew.cooper3@citrix.com \
    --cc=George.Dunlap@eu.citrix.com \
    --cc=JBeulich@suse.com \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.