Message ID | 3008be8e-a5ee-7e90-6ab0-daf44ee71d44@suse.com (mailing list archive) |
---|---|
State | Superseded |
Headers | show |
Series | x86emul: further work | expand |
> -----Original Message----- > From: Jan Beulich <JBeulich@suse.com> > Sent: 01 July 2019 12:57 > To: xen-devel@lists.xenproject.org > Cc: Andrew Cooper <Andrew.Cooper3@citrix.com>; Paul Durrant <Paul.Durrant@citrix.com>; Roger Pau Monne > <roger.pau@citrix.com>; Wei Liu <wl@xen.org> > Subject: [PATCH 2/6] x86emul: support WBNOINVD > > Rev 035 of Intel's ISA extensions document does not state intercept > behavior for the insn (I've been in-officially told that the distinction > is going to be by exit qualification, as I would have assumed > considering that this way it's sufficiently transparent to unaware > software, and using WBINVD in place of WBNOINVD is always correct, just > less efficient), so in the HVM case for now it'll be backed by the same > ->wbinvd_intercept() handlers. > > Use this occasion and also add the two missing table entries for > CLDEMOTE, which doesn't require any further changes to make work. > > Signed-off-by: Jan Beulich <jbeulich@suse.com> Reviewed-by: Paul Durrant <paul.durrant@citrix.com> > --- > v2: Re-base. Convert wbnoinvd() inline function. > > --- a/tools/libxl/libxl_cpuid.c > +++ b/tools/libxl/libxl_cpuid.c > @@ -208,6 +208,7 @@ int libxl_cpuid_parse_config(libxl_cpuid > {"avx512-bitalg",0x00000007, 0, CPUID_REG_ECX, 12, 1}, > {"avx512-vpopcntdq",0x00000007,0,CPUID_REG_ECX, 14, 1}, > {"rdpid", 0x00000007, 0, CPUID_REG_ECX, 22, 1}, > + {"cldemote", 0x00000007, 0, CPUID_REG_ECX, 25, 1}, > > {"avx512-4vnniw",0x00000007, 0, CPUID_REG_EDX, 2, 1}, > {"avx512-4fmaps",0x00000007, 0, CPUID_REG_EDX, 3, 1}, > @@ -256,6 +257,7 @@ int libxl_cpuid_parse_config(libxl_cpuid > > {"invtsc", 0x80000007, NA, CPUID_REG_EDX, 8, 1}, > > + {"wbnoinvd", 0x80000008, NA, CPUID_REG_EBX, 9, 1}, > {"ibpb", 0x80000008, NA, CPUID_REG_EBX, 12, 1}, > {"nc", 0x80000008, NA, CPUID_REG_ECX, 0, 8}, > {"apicidsize", 0x80000008, NA, CPUID_REG_ECX, 12, 4}, > --- a/tools/misc/xen-cpuid.c > +++ b/tools/misc/xen-cpuid.c > @@ -146,6 +146,8 @@ static const char *const str_e8b[32] = > { > [ 0] = "clzero", > > + /* [ 8] */ [ 9] = "wbnoinvd", > + > [12] = "ibpb", > }; > > --- a/xen/arch/x86/hvm/emulate.c > +++ b/xen/arch/x86/hvm/emulate.c > @@ -2202,6 +2202,7 @@ static int hvmemul_cache_op( > /* fall through */ > case x86emul_invd: > case x86emul_wbinvd: > + case x86emul_wbnoinvd: > alternative_vcall(hvm_funcs.wbinvd_intercept); > break; > } > --- a/xen/arch/x86/pv/emul-priv-op.c > +++ b/xen/arch/x86/pv/emul-priv-op.c > @@ -1121,7 +1121,7 @@ static int write_msr(unsigned int reg, u > static int cache_op(enum x86emul_cache_op op, enum x86_segment seg, > unsigned long offset, struct x86_emulate_ctxt *ctxt) > { > - ASSERT(op == x86emul_wbinvd); > + ASSERT(op == x86emul_wbinvd || op == x86emul_wbnoinvd); > > /* Ignore the instruction if unprivileged. */ > if ( !cache_flush_permitted(current->domain) ) > @@ -1130,6 +1130,8 @@ static int cache_op(enum x86emul_cache_o > * newer linux uses this in some start-of-day timing loops. > */ > ; > + else if ( op == x86emul_wbnoinvd && cpu_has_wbnoinvd ) > + wbnoinvd(); > else > wbinvd(); > > --- a/xen/arch/x86/x86_emulate/x86_emulate.c > +++ b/xen/arch/x86/x86_emulate/x86_emulate.c > @@ -1869,6 +1869,7 @@ in_protmode( > #define vcpu_has_fma4() (ctxt->cpuid->extd.fma4) > #define vcpu_has_tbm() (ctxt->cpuid->extd.tbm) > #define vcpu_has_clzero() (ctxt->cpuid->extd.clzero) > +#define vcpu_has_wbnoinvd() (ctxt->cpuid->extd.wbnoinvd) > > #define vcpu_has_bmi1() (ctxt->cpuid->feat.bmi1) > #define vcpu_has_hle() (ctxt->cpuid->feat.hle) > @@ -5931,10 +5932,13 @@ x86_emulate( > break; > > case X86EMUL_OPC(0x0f, 0x08): /* invd */ > - case X86EMUL_OPC(0x0f, 0x09): /* wbinvd */ > + case X86EMUL_OPC(0x0f, 0x09): /* wbinvd / wbnoinvd */ > generate_exception_if(!mode_ring0(), EXC_GP, 0); > fail_if(!ops->cache_op); > - if ( (rc = ops->cache_op(b == 0x09 ? x86emul_wbinvd > + if ( (rc = ops->cache_op(b == 0x09 ? !repe_prefix() || > + !vcpu_has_wbnoinvd() > + ? x86emul_wbinvd > + : x86emul_wbnoinvd > : x86emul_invd, > x86_seg_none, 0, > ctxt)) != X86EMUL_OKAY ) > --- a/xen/arch/x86/x86_emulate/x86_emulate.h > +++ b/xen/arch/x86/x86_emulate/x86_emulate.h > @@ -182,6 +182,7 @@ enum x86emul_cache_op { > x86emul_clwb, > x86emul_invd, > x86emul_wbinvd, > + x86emul_wbnoinvd, > }; > > struct x86_emulate_state; > --- a/xen/include/asm-x86/cpufeature.h > +++ b/xen/include/asm-x86/cpufeature.h > @@ -129,6 +129,9 @@ > #define cpu_has_avx512_4fmaps boot_cpu_has(X86_FEATURE_AVX512_4FMAPS) > #define cpu_has_tsx_force_abort boot_cpu_has(X86_FEATURE_TSX_FORCE_ABORT) > > +/* CPUID level 0x80000008.ebx */ > +#define cpu_has_wbnoinvd boot_cpu_has(X86_FEATURE_WBNOINVD) > + > /* Synthesized. */ > #define cpu_has_arch_perfmon boot_cpu_has(X86_FEATURE_ARCH_PERFMON) > #define cpu_has_cpuid_faulting boot_cpu_has(X86_FEATURE_CPUID_FAULTING) > --- a/xen/include/asm-x86/system.h > +++ b/xen/include/asm-x86/system.h > @@ -16,6 +16,11 @@ static inline void wbinvd(void) > asm volatile ( "wbinvd" ::: "memory" ); > } > > +static inline void wbnoinvd(void) > +{ > + asm volatile ( "repe; wbinvd" : : : "memory" ); > +} > + > static inline void clflush(const void *p) > { > asm volatile ( "clflush %0" :: "m" (*(const char *)p) ); > --- a/xen/include/public/arch-x86/cpufeatureset.h > +++ b/xen/include/public/arch-x86/cpufeatureset.h > @@ -236,6 +236,7 @@ XEN_CPUFEATURE(AVX512_VNNI, 6*32+11) / > XEN_CPUFEATURE(AVX512_BITALG, 6*32+12) /*A Support for VPOPCNT[B,W] and VPSHUFBITQMB */ > XEN_CPUFEATURE(AVX512_VPOPCNTDQ, 6*32+14) /*A POPCNT for vectors of DW/QW */ > XEN_CPUFEATURE(RDPID, 6*32+22) /*A RDPID instruction */ > +XEN_CPUFEATURE(CLDEMOTE, 6*32+25) /*A CLDEMOTE instruction */ > > /* AMD-defined CPU features, CPUID level 0x80000007.edx, word 7 */ > XEN_CPUFEATURE(ITSC, 7*32+ 8) /* Invariant TSC */ > @@ -243,6 +244,7 @@ XEN_CPUFEATURE(EFRO, 7*32+10) / > > /* AMD-defined CPU features, CPUID level 0x80000008.ebx, word 8 */ > XEN_CPUFEATURE(CLZERO, 8*32+ 0) /*A CLZERO instruction */ > +XEN_CPUFEATURE(WBNOINVD, 8*32+ 9) /*A WBNOINVD instruction */ > XEN_CPUFEATURE(IBPB, 8*32+12) /*A IBPB support only (no IBRS, used by AMD) */ > > /* Intel-defined CPU features, CPUID level 0x00000007:0.edx, word 9 */
On 01/07/2019 12:56, Jan Beulich wrote: > Rev 035 of Intel's ISA extensions document does not state intercept > behavior for the insn (I've been in-officially told that the distinction unofficially. > is going to be by exit qualification, as I would have assumed > considering that this way it's sufficiently transparent to unaware > software, and using WBINVD in place of WBNOINVD is always correct, just > less efficient), so in the HVM case for now it'll be backed by the same > ->wbinvd_intercept() handlers. It turns out that AMD reuses the WBINVD vmexit code for WBNOINVD, and provide no distinguishing information. There may or may not be an instruction stream to inspect, depending on other errata. I have a question out with AMD as to what to do here, but in the meantime we have no option but to assume WBINVD. > --- a/xen/arch/x86/pv/emul-priv-op.c > +++ b/xen/arch/x86/pv/emul-priv-op.c > @@ -1121,7 +1121,7 @@ static int write_msr(unsigned int reg, u > @@ -1130,6 +1130,8 @@ static int cache_op(enum x86emul_cache_o > * newer linux uses this in some start-of-day timing loops. > */ > ; > + else if ( op == x86emul_wbnoinvd && cpu_has_wbnoinvd ) > + wbnoinvd(); > else > wbinvd(); The cpu_has_wbnoinvd check isn't necessary. The encoding was chosen because it does get interpreted as wbinvd on older processors. Given this property, I expect kernels to perform a blanked s/wbinvd/wbnoinvd/ transformation in appropriate locations, because it is the lowest overhead option to start using this new feature. > --- a/xen/include/asm-x86/system.h > +++ b/xen/include/asm-x86/system.h > @@ -16,6 +16,11 @@ static inline void wbinvd(void) > asm volatile ( "wbinvd" ::: "memory" ); > } > > +static inline void wbnoinvd(void) > +{ > + asm volatile ( "repe; wbinvd" : : : "memory" ); Semicolon. > +} > + > static inline void clflush(const void *p) > { > asm volatile ( "clflush %0" :: "m" (*(const char *)p) ); > --- a/xen/include/public/arch-x86/cpufeatureset.h > +++ b/xen/include/public/arch-x86/cpufeatureset.h > @@ -243,6 +244,7 @@ XEN_CPUFEATURE(EFRO, 7*32+10) / > > /* AMD-defined CPU features, CPUID level 0x80000008.ebx, word 8 */ > XEN_CPUFEATURE(CLZERO, 8*32+ 0) /*A CLZERO instruction */ > +XEN_CPUFEATURE(WBNOINVD, 8*32+ 9) /*A WBNOINVD instruction */ This is implicitly linked with CPUID.8000001d which we don't expose yet. To get the emulation side of things sorted, I'd be happy with this going in without the A for now, and "exposing WBNOINVD to guests" can be a followup task. ~Andrew
On 27.08.2019 16:47, Andrew Cooper wrote: > On 01/07/2019 12:56, Jan Beulich wrote: >> --- a/xen/arch/x86/pv/emul-priv-op.c >> +++ b/xen/arch/x86/pv/emul-priv-op.c >> @@ -1121,7 +1121,7 @@ static int write_msr(unsigned int reg, u >> @@ -1130,6 +1130,8 @@ static int cache_op(enum x86emul_cache_o >> * newer linux uses this in some start-of-day timing loops. >> */ >> ; >> + else if ( op == x86emul_wbnoinvd && cpu_has_wbnoinvd ) >> + wbnoinvd(); >> else >> wbinvd(); > > The cpu_has_wbnoinvd check isn't necessary. The encoding was chosen > because it does get interpreted as wbinvd on older processors. I agree, but wanted to make the code look complete / consistent. Would you be okay with the && ... being retained, but in a comment? >> --- a/xen/include/asm-x86/system.h >> +++ b/xen/include/asm-x86/system.h >> @@ -16,6 +16,11 @@ static inline void wbinvd(void) >> asm volatile ( "wbinvd" ::: "memory" ); >> } >> >> +static inline void wbnoinvd(void) >> +{ >> + asm volatile ( "repe; wbinvd" : : : "memory" ); > > Semicolon. It has to stay, as gas rejects use of REP on insns it doesn't think permit use of REP. H.J. actually proposes even more strict (or should I say hostile) gas behavior, which would then also reject the above construct: https://sourceware.org/ml/binutils/2019-07/msg00186.html >> --- a/xen/include/public/arch-x86/cpufeatureset.h >> +++ b/xen/include/public/arch-x86/cpufeatureset.h >> @@ -243,6 +244,7 @@ XEN_CPUFEATURE(EFRO, 7*32+10) / >> >> /* AMD-defined CPU features, CPUID level 0x80000008.ebx, word 8 */ >> XEN_CPUFEATURE(CLZERO, 8*32+ 0) /*A CLZERO instruction */ >> +XEN_CPUFEATURE(WBNOINVD, 8*32+ 9) /*A WBNOINVD instruction */ > > This is implicitly linked with CPUID.8000001d which we don't expose yet. On AMD, but not (so far at least, judging from the SDM) on Intel. > To get the emulation side of things sorted, I'd be happy with this going > in without the A for now, and "exposing WBNOINVD to guests" can be a > followup task. I've dropped the A for now, but as per above I'm not entirely certain that's appropriate; it's certainly the more defensive step. My uncertainty is also because people are free to use the WBNOINVD encoding even without the feature flag set, as it won't #UD (as you also suggest elsewhere in your reply). Jan
On 27/08/2019 16:08, Jan Beulich wrote: > On 27.08.2019 16:47, Andrew Cooper wrote: >> On 01/07/2019 12:56, Jan Beulich wrote: >>> --- a/xen/arch/x86/pv/emul-priv-op.c >>> +++ b/xen/arch/x86/pv/emul-priv-op.c >>> @@ -1121,7 +1121,7 @@ static int write_msr(unsigned int reg, u >>> @@ -1130,6 +1130,8 @@ static int cache_op(enum x86emul_cache_o >>> * newer linux uses this in some start-of-day timing loops. >>> */ >>> ; >>> + else if ( op == x86emul_wbnoinvd && cpu_has_wbnoinvd ) >>> + wbnoinvd(); >>> else >>> wbinvd(); >> >> The cpu_has_wbnoinvd check isn't necessary. The encoding was chosen >> because it does get interpreted as wbinvd on older processors. > > I agree, but wanted to make the code look complete / consistent. > Would you be okay with the && ... being retained, but in a > comment? Ok. > >>> --- a/xen/include/asm-x86/system.h >>> +++ b/xen/include/asm-x86/system.h >>> @@ -16,6 +16,11 @@ static inline void wbinvd(void) >>> asm volatile ( "wbinvd" ::: "memory" ); >>> } >>> +static inline void wbnoinvd(void) >>> +{ >>> + asm volatile ( "repe; wbinvd" : : : "memory" ); >> >> Semicolon. > > It has to stay, as gas rejects use of REP on insns it doesn't think > permit use of REP. H.J. actually proposes even more strict (or should > I say hostile) gas behavior, which would then also reject the above > construct: > https://sourceware.org/ml/binutils/2019-07/msg00186.html Oh. That's dull, especially considering the vendors propensity to create new instructions by using prefixes in this way. > >>> --- a/xen/include/public/arch-x86/cpufeatureset.h >>> +++ b/xen/include/public/arch-x86/cpufeatureset.h >>> @@ -243,6 +244,7 @@ XEN_CPUFEATURE(EFRO, 7*32+10) / >>> /* AMD-defined CPU features, CPUID level 0x80000008.ebx, word >>> 8 */ >>> XEN_CPUFEATURE(CLZERO, 8*32+ 0) /*A CLZERO instruction */ >>> +XEN_CPUFEATURE(WBNOINVD, 8*32+ 9) /*A WBNOINVD instruction */ >> >> This is implicitly linked with CPUID.8000001d which we don't expose yet. > > On AMD, but not (so far at least, judging from the SDM) on Intel. Intel have leaf 4 which specifies WBINVD's behaviour on different cache levels. TBH, I'd expect to see an adjustment to the leaf 4 documentation to include WBNOINVD. AMD explicitly doesn't have leaf 4. Their leaf 0x8000001d is similar in behaviour (by having subleafs), and is mostly compatible, but irritatingly doesn't have an identical data layout. I've got another query out with AMD because the documentation for this leaf alone claims that CPUID will #UD with an out-of-range subleaf, and I don't believe this can be true. > >> To get the emulation side of things sorted, I'd be happy with this going >> in without the A for now, and "exposing WBNOINVD to guests" can be a >> followup task. > > I've dropped the A for now, but as per above I'm not entirely > certain that's appropriate; it's certainly the more defensive step. > My uncertainty is also because people are free to use the WBNOINVD > encoding even without the feature flag set, as it won't #UD (as you > also suggest elsewhere in your reply). And the emulate behaviour matches, by falling back to WBINVD. I'd prefer to avoid advertising the feature when we have known work still to do, because otherwise we will inevitably forget to do it. Having functionality in the emulator without the feature being advertised is fine in general, because that still behaves like a pipeline which has had CPUID levelled down. ~Andrew
On 27/08/2019 17:45, Andrew Cooper wrote: > AMD explicitly doesn't have leaf 4. Their leaf 0x8000001d is similar in > behaviour (by having subleafs), and is mostly compatible, but > irritatingly doesn't have an identical data layout. > > I've got another query out with AMD because the documentation for this > leaf alone claims that CPUID will #UD with an out-of-range subleaf, and > I don't believe this can be true. Current feedback is that this looks like a documentation bug, and that CPUs don't actually behave like that. ~Andrew
--- a/tools/libxl/libxl_cpuid.c +++ b/tools/libxl/libxl_cpuid.c @@ -208,6 +208,7 @@ int libxl_cpuid_parse_config(libxl_cpuid {"avx512-bitalg",0x00000007, 0, CPUID_REG_ECX, 12, 1}, {"avx512-vpopcntdq",0x00000007,0,CPUID_REG_ECX, 14, 1}, {"rdpid", 0x00000007, 0, CPUID_REG_ECX, 22, 1}, + {"cldemote", 0x00000007, 0, CPUID_REG_ECX, 25, 1}, {"avx512-4vnniw",0x00000007, 0, CPUID_REG_EDX, 2, 1}, {"avx512-4fmaps",0x00000007, 0, CPUID_REG_EDX, 3, 1}, @@ -256,6 +257,7 @@ int libxl_cpuid_parse_config(libxl_cpuid {"invtsc", 0x80000007, NA, CPUID_REG_EDX, 8, 1}, + {"wbnoinvd", 0x80000008, NA, CPUID_REG_EBX, 9, 1}, {"ibpb", 0x80000008, NA, CPUID_REG_EBX, 12, 1}, {"nc", 0x80000008, NA, CPUID_REG_ECX, 0, 8}, {"apicidsize", 0x80000008, NA, CPUID_REG_ECX, 12, 4}, --- a/tools/misc/xen-cpuid.c +++ b/tools/misc/xen-cpuid.c @@ -146,6 +146,8 @@ static const char *const str_e8b[32] = { [ 0] = "clzero", + /* [ 8] */ [ 9] = "wbnoinvd", + [12] = "ibpb", }; --- a/xen/arch/x86/hvm/emulate.c +++ b/xen/arch/x86/hvm/emulate.c @@ -2202,6 +2202,7 @@ static int hvmemul_cache_op( /* fall through */ case x86emul_invd: case x86emul_wbinvd: + case x86emul_wbnoinvd: alternative_vcall(hvm_funcs.wbinvd_intercept); break; } --- a/xen/arch/x86/pv/emul-priv-op.c +++ b/xen/arch/x86/pv/emul-priv-op.c @@ -1121,7 +1121,7 @@ static int write_msr(unsigned int reg, u static int cache_op(enum x86emul_cache_op op, enum x86_segment seg, unsigned long offset, struct x86_emulate_ctxt *ctxt) { - ASSERT(op == x86emul_wbinvd); + ASSERT(op == x86emul_wbinvd || op == x86emul_wbnoinvd); /* Ignore the instruction if unprivileged. */ if ( !cache_flush_permitted(current->domain) ) @@ -1130,6 +1130,8 @@ static int cache_op(enum x86emul_cache_o * newer linux uses this in some start-of-day timing loops. */ ; + else if ( op == x86emul_wbnoinvd && cpu_has_wbnoinvd ) + wbnoinvd(); else wbinvd(); --- a/xen/arch/x86/x86_emulate/x86_emulate.c +++ b/xen/arch/x86/x86_emulate/x86_emulate.c @@ -1869,6 +1869,7 @@ in_protmode( #define vcpu_has_fma4() (ctxt->cpuid->extd.fma4) #define vcpu_has_tbm() (ctxt->cpuid->extd.tbm) #define vcpu_has_clzero() (ctxt->cpuid->extd.clzero) +#define vcpu_has_wbnoinvd() (ctxt->cpuid->extd.wbnoinvd) #define vcpu_has_bmi1() (ctxt->cpuid->feat.bmi1) #define vcpu_has_hle() (ctxt->cpuid->feat.hle) @@ -5931,10 +5932,13 @@ x86_emulate( break; case X86EMUL_OPC(0x0f, 0x08): /* invd */ - case X86EMUL_OPC(0x0f, 0x09): /* wbinvd */ + case X86EMUL_OPC(0x0f, 0x09): /* wbinvd / wbnoinvd */ generate_exception_if(!mode_ring0(), EXC_GP, 0); fail_if(!ops->cache_op); - if ( (rc = ops->cache_op(b == 0x09 ? x86emul_wbinvd + if ( (rc = ops->cache_op(b == 0x09 ? !repe_prefix() || + !vcpu_has_wbnoinvd() + ? x86emul_wbinvd + : x86emul_wbnoinvd : x86emul_invd, x86_seg_none, 0, ctxt)) != X86EMUL_OKAY ) --- a/xen/arch/x86/x86_emulate/x86_emulate.h +++ b/xen/arch/x86/x86_emulate/x86_emulate.h @@ -182,6 +182,7 @@ enum x86emul_cache_op { x86emul_clwb, x86emul_invd, x86emul_wbinvd, + x86emul_wbnoinvd, }; struct x86_emulate_state; --- a/xen/include/asm-x86/cpufeature.h +++ b/xen/include/asm-x86/cpufeature.h @@ -129,6 +129,9 @@ #define cpu_has_avx512_4fmaps boot_cpu_has(X86_FEATURE_AVX512_4FMAPS) #define cpu_has_tsx_force_abort boot_cpu_has(X86_FEATURE_TSX_FORCE_ABORT) +/* CPUID level 0x80000008.ebx */ +#define cpu_has_wbnoinvd boot_cpu_has(X86_FEATURE_WBNOINVD) + /* Synthesized. */ #define cpu_has_arch_perfmon boot_cpu_has(X86_FEATURE_ARCH_PERFMON) #define cpu_has_cpuid_faulting boot_cpu_has(X86_FEATURE_CPUID_FAULTING) --- a/xen/include/asm-x86/system.h +++ b/xen/include/asm-x86/system.h @@ -16,6 +16,11 @@ static inline void wbinvd(void) asm volatile ( "wbinvd" ::: "memory" ); } +static inline void wbnoinvd(void) +{ + asm volatile ( "repe; wbinvd" : : : "memory" ); +} + static inline void clflush(const void *p) { asm volatile ( "clflush %0" :: "m" (*(const char *)p) ); --- a/xen/include/public/arch-x86/cpufeatureset.h +++ b/xen/include/public/arch-x86/cpufeatureset.h @@ -236,6 +236,7 @@ XEN_CPUFEATURE(AVX512_VNNI, 6*32+11) / XEN_CPUFEATURE(AVX512_BITALG, 6*32+12) /*A Support for VPOPCNT[B,W] and VPSHUFBITQMB */ XEN_CPUFEATURE(AVX512_VPOPCNTDQ, 6*32+14) /*A POPCNT for vectors of DW/QW */ XEN_CPUFEATURE(RDPID, 6*32+22) /*A RDPID instruction */ +XEN_CPUFEATURE(CLDEMOTE, 6*32+25) /*A CLDEMOTE instruction */ /* AMD-defined CPU features, CPUID level 0x80000007.edx, word 7 */ XEN_CPUFEATURE(ITSC, 7*32+ 8) /* Invariant TSC */ @@ -243,6 +244,7 @@ XEN_CPUFEATURE(EFRO, 7*32+10) / /* AMD-defined CPU features, CPUID level 0x80000008.ebx, word 8 */ XEN_CPUFEATURE(CLZERO, 8*32+ 0) /*A CLZERO instruction */ +XEN_CPUFEATURE(WBNOINVD, 8*32+ 9) /*A WBNOINVD instruction */ XEN_CPUFEATURE(IBPB, 8*32+12) /*A IBPB support only (no IBRS, used by AMD) */ /* Intel-defined CPU features, CPUID level 0x00000007:0.edx, word 9 */
Rev 035 of Intel's ISA extensions document does not state intercept behavior for the insn (I've been in-officially told that the distinction is going to be by exit qualification, as I would have assumed considering that this way it's sufficiently transparent to unaware software, and using WBINVD in place of WBNOINVD is always correct, just less efficient), so in the HVM case for now it'll be backed by the same ->wbinvd_intercept() handlers. Use this occasion and also add the two missing table entries for CLDEMOTE, which doesn't require any further changes to make work. Signed-off-by: Jan Beulich <jbeulich@suse.com> --- v2: Re-base. Convert wbnoinvd() inline function.