From patchwork Tue Apr 1 22:21:18 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Denis Mukhin X-Patchwork-Id: 14035379 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 9B49FC3601A for ; Tue, 1 Apr 2025 22:21:54 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.934829.1336415 (Exim 4.92) (envelope-from ) id 1tzjzB-0008V8-Gh; Tue, 01 Apr 2025 22:21:33 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 934829.1336415; Tue, 01 Apr 2025 22:21:33 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tzjzB-0008V1-CC; Tue, 01 Apr 2025 22:21:33 +0000 Received: by outflank-mailman (input) for mailman id 934829; Tue, 01 Apr 2025 22:21:31 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tzjz9-0008FS-QA for xen-devel@lists.xenproject.org; Tue, 01 Apr 2025 22:21:31 +0000 Received: from mail-10631.protonmail.ch (mail-10631.protonmail.ch [79.135.106.31]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id a796039a-0f47-11f0-9ffb-bf95429c2676; Wed, 02 Apr 2025 00:21:27 +0200 (CEST) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: a796039a-0f47-11f0-9ffb-bf95429c2676 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=proton.me; s=protonmail; t=1743546086; x=1743805286; bh=wGLFy3lg3JRviggNqBY/N5aBkD4idjuoatHTIpS+RQo=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector:List-Unsubscribe:List-Unsubscribe-Post; b=GDXBPipNoQ3DJ0l0y+eatHGuY1CMsFINkj5MTVjVbbNM5sSrJgtQqPgsdLqtV/CF/ PCbqHgRjsudI7ldhGc3VeqtmZgaO82sTWDOFgPY6wRA8WicgeQ+SyHLMujFijYVacp CFI+1ONO3PjnExVAvcCPxswgvGzCWqX7rYKNfuPEPvLNA9RocpJp3a9EJm82+uJNxC JC3GK2qADIwmJ3Ef9/jY2paE002sEmtJCz96q0gE5jyK5HFQTFSnDVngYhYF7laTD1 8BfnwYZlUDlVEU9Ma8u7CtAwh/QbG3Oe9FNGINPXyHmW1P6AVC26orGQZT4PVQcs06 Mrge/8C5uzxYw== Date: Tue, 01 Apr 2025 22:21:18 +0000 To: xen-devel@lists.xenproject.org From: dmkhn@proton.me Cc: andrew.cooper3@citrix.com, anthony.perard@vates.tech, jbeulich@suse.com, julien@xen.org, michal.orzel@amd.com, roger.pau@citrix.com, sstabellini@kernel.org, dmukhin@ford.com Subject: [PATCH v1 1/5] x86/vmx: remove HAVE_AS_VMX Message-ID: <20250401222105.79309-2-dmukhin@ford.com> In-Reply-To: <20250401222105.79309-1-dmukhin@ford.com> References: <20250401222105.79309-1-dmukhin@ford.com> Feedback-ID: 123220910:user:proton X-Pm-Message-ID: 26fd564dcd77ad467d9ca23f9d6e27142ff338c9 MIME-Version: 1.0 From: Denis Mukhin Remove the workaround under HAVE_AS_VMX for older compilers, as the minimally required GCC 5.1 / Binutils 2.25, and Clang 11 natively support the VMX instructions used in the hypervisor code. Signed-off-by: Denis Mukhin --- xen/arch/x86/arch.mk | 3 +-- xen/arch/x86/include/asm/hvm/vmx/vmx.h | 37 -------------------------- 2 files changed, 1 insertion(+), 39 deletions(-) diff --git a/xen/arch/x86/arch.mk b/xen/arch/x86/arch.mk index cb47d72991..6e23d3c27c 100644 --- a/xen/arch/x86/arch.mk +++ b/xen/arch/x86/arch.mk @@ -10,7 +10,6 @@ CFLAGS += -msoft-float $(call cc-options-add,CFLAGS,CC,$(EMBEDDED_EXTRA_CFLAGS)) $(call cc-option-add,CFLAGS,CC,-Wnested-externs) -$(call as-option-add,CFLAGS,CC,"vmcall",-DHAVE_AS_VMX) $(call as-option-add,CFLAGS,CC,"crc32 %eax$(comma)%eax",-DHAVE_AS_SSE4_2) $(call as-option-add,CFLAGS,CC,"invept (%rax)$(comma)%rax",-DHAVE_AS_EPT) $(call as-option-add,CFLAGS,CC,"rdrand %eax",-DHAVE_AS_RDRAND) @@ -24,7 +23,7 @@ $(call as-option-add,CFLAGS,CC,"invpcid (%rax)$(comma)%rax",-DHAVE_AS_INVPCID) $(call as-option-add,CFLAGS,CC,"movdiri %rax$(comma)(%rax)",-DHAVE_AS_MOVDIR) $(call as-option-add,CFLAGS,CC,"enqcmd (%rax)$(comma)%rax",-DHAVE_AS_ENQCMD) -# Check to see whether the assmbler supports the .nop directive. +# Check to see whether the assembler supports the .nop directive. $(call as-option-add,CFLAGS,CC,\ ".L1: .L2: .nops (.L2 - .L1)$(comma)9",-DHAVE_AS_NOPS_DIRECTIVE) diff --git a/xen/arch/x86/include/asm/hvm/vmx/vmx.h b/xen/arch/x86/include/asm/hvm/vmx/vmx.h index 843f8591b9..cfa04aa5a4 100644 --- a/xen/arch/x86/include/asm/hvm/vmx/vmx.h +++ b/xen/arch/x86/include/asm/hvm/vmx/vmx.h @@ -310,30 +310,18 @@ extern uint8_t posted_intr_vector; #define INVVPID_ALL_CONTEXT 2 #define INVVPID_SINGLE_CONTEXT_RETAINING_GLOBAL 3 -#ifdef HAVE_AS_VMX # define GAS_VMX_OP(yes, no) yes -#else -# define GAS_VMX_OP(yes, no) no -#endif static always_inline void __vmptrld(u64 addr) { asm volatile ( -#ifdef HAVE_AS_VMX "vmptrld %0\n" -#else - VMPTRLD_OPCODE MODRM_EAX_06 -#endif /* CF==1 or ZF==1 --> BUG() */ UNLIKELY_START(be, vmptrld) _ASM_BUGFRAME_TEXT(0) UNLIKELY_END_SECTION : -#ifdef HAVE_AS_VMX : "m" (addr), -#else - : "a" (&addr), -#endif _ASM_BUGFRAME_INFO(BUGFRAME_bug, __LINE__, __FILE__, 0) : "memory"); } @@ -341,21 +329,13 @@ static always_inline void __vmptrld(u64 addr) static always_inline void __vmpclear(u64 addr) { asm volatile ( -#ifdef HAVE_AS_VMX "vmclear %0\n" -#else - VMCLEAR_OPCODE MODRM_EAX_06 -#endif /* CF==1 or ZF==1 --> BUG() */ UNLIKELY_START(be, vmclear) _ASM_BUGFRAME_TEXT(0) UNLIKELY_END_SECTION : -#ifdef HAVE_AS_VMX : "m" (addr), -#else - : "a" (&addr), -#endif _ASM_BUGFRAME_INFO(BUGFRAME_bug, __LINE__, __FILE__, 0) : "memory"); } @@ -363,22 +343,13 @@ static always_inline void __vmpclear(u64 addr) static always_inline void __vmread(unsigned long field, unsigned long *value) { asm volatile ( -#ifdef HAVE_AS_VMX "vmread %1, %0\n\t" -#else - VMREAD_OPCODE MODRM_EAX_ECX -#endif /* CF==1 or ZF==1 --> BUG() */ UNLIKELY_START(be, vmread) _ASM_BUGFRAME_TEXT(0) UNLIKELY_END_SECTION -#ifdef HAVE_AS_VMX : "=rm" (*value) : "r" (field), -#else - : "=c" (*value) - : "a" (field), -#endif _ASM_BUGFRAME_INFO(BUGFRAME_bug, __LINE__, __FILE__, 0) ); } @@ -386,21 +357,13 @@ static always_inline void __vmread(unsigned long field, unsigned long *value) static always_inline void __vmwrite(unsigned long field, unsigned long value) { asm volatile ( -#ifdef HAVE_AS_VMX "vmwrite %1, %0\n" -#else - VMWRITE_OPCODE MODRM_EAX_ECX -#endif /* CF==1 or ZF==1 --> BUG() */ UNLIKELY_START(be, vmwrite) _ASM_BUGFRAME_TEXT(0) UNLIKELY_END_SECTION : -#ifdef HAVE_AS_VMX : "r" (field) , "rm" (value), -#else - : "a" (field) , "c" (value), -#endif _ASM_BUGFRAME_INFO(BUGFRAME_bug, __LINE__, __FILE__, 0) ); } From patchwork Tue Apr 1 22:21:26 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Denis Mukhin X-Patchwork-Id: 14035376 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 15890C36017 for ; Tue, 1 Apr 2025 22:21:47 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.934828.1336405 (Exim 4.92) (envelope-from ) id 1tzjzA-0008Gf-7u; Tue, 01 Apr 2025 22:21:32 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 934828.1336405; Tue, 01 Apr 2025 22:21:32 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tzjzA-0008GW-4v; Tue, 01 Apr 2025 22:21:32 +0000 Received: by outflank-mailman (input) for mailman id 934828; Tue, 01 Apr 2025 22:21:31 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tzjz8-00080l-WE for xen-devel@lists.xenproject.org; Tue, 01 Apr 2025 22:21:31 +0000 Received: from mail-24417.protonmail.ch (mail-24417.protonmail.ch [109.224.244.17]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id a8fbe079-0f47-11f0-9ea7-5ba50f476ded; Wed, 02 Apr 2025 00:21:30 +0200 (CEST) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: a8fbe079-0f47-11f0-9ea7-5ba50f476ded DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=proton.me; s=protonmail; t=1743546089; x=1743805289; bh=jgn0pg/G4Jnk8NK6PjgRLwbiLA6Q/DQnSJBc+iI7+6w=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector:List-Unsubscribe:List-Unsubscribe-Post; b=Kj4GfBplEZBgaOzQLjYljiB8dTx12lkeNHPHrWY80W8Z3UwfIBKUlxwnVd6+cFEla 76eLuoZRr+NXhjxs9P01u4N+unraBRSmalODrnPb4syAebK/IYCv36ujLmaN5DwV2k zjhvn2qLL1siRIXmq9o+ez9wcgeX0KxDLK0cA9ZnG+gnmX/SfKcBkw6DXZyRjPbm3E 6VGJ2eL0P2XZTtxIuiDWtjsrFNe/zVPgCoPBVgAHShYz1kgsyeCVV1PkMDSffdj6cm d72f3KMDfh97t0RY4fB+s8biiKSdl48VaFvFF/JPLMyu/HGRAsqrGv+Vqq0xnVIsBi /Fm2BQVGb2pOg== Date: Tue, 01 Apr 2025 22:21:26 +0000 To: xen-devel@lists.xenproject.org From: dmkhn@proton.me Cc: andrew.cooper3@citrix.com, anthony.perard@vates.tech, jbeulich@suse.com, julien@xen.org, michal.orzel@amd.com, roger.pau@citrix.com, sstabellini@kernel.org, dmukhin@ford.com Subject: [PATCH v1 2/5] x86/vmx: remove HAVE_AS_EPT Message-ID: <20250401222105.79309-3-dmukhin@ford.com> In-Reply-To: <20250401222105.79309-1-dmukhin@ford.com> References: <20250401222105.79309-1-dmukhin@ford.com> Feedback-ID: 123220910:user:proton X-Pm-Message-ID: 3d61b9bcd8c35dfb3a62007efbaea7de840bbdce MIME-Version: 1.0 From: Denis Mukhin Remove the workaround under HAVE_AS_EPT for older compilers, as the minimally required GCC 5.1 / Binutils 2.25, and Clang 11 natively support the VMX instructions used in the hypervisor code. Signed-off-by: Denis Mukhin --- xen/arch/x86/arch.mk | 1 - xen/arch/x86/include/asm/hvm/vmx/vmx.h | 16 ---------------- 2 files changed, 17 deletions(-) diff --git a/xen/arch/x86/arch.mk b/xen/arch/x86/arch.mk index 6e23d3c27c..42c3aa73da 100644 --- a/xen/arch/x86/arch.mk +++ b/xen/arch/x86/arch.mk @@ -11,7 +11,6 @@ CFLAGS += -msoft-float $(call cc-options-add,CFLAGS,CC,$(EMBEDDED_EXTRA_CFLAGS)) $(call cc-option-add,CFLAGS,CC,-Wnested-externs) $(call as-option-add,CFLAGS,CC,"crc32 %eax$(comma)%eax",-DHAVE_AS_SSE4_2) -$(call as-option-add,CFLAGS,CC,"invept (%rax)$(comma)%rax",-DHAVE_AS_EPT) $(call as-option-add,CFLAGS,CC,"rdrand %eax",-DHAVE_AS_RDRAND) $(call as-option-add,CFLAGS,CC,"rdfsbase %rax",-DHAVE_AS_FSGSBASE) $(call as-option-add,CFLAGS,CC,"xsaveopt (%rax)",-DHAVE_AS_XSAVEOPT) diff --git a/xen/arch/x86/include/asm/hvm/vmx/vmx.h b/xen/arch/x86/include/asm/hvm/vmx/vmx.h index cfa04aa5a4..ce3c067a88 100644 --- a/xen/arch/x86/include/asm/hvm/vmx/vmx.h +++ b/xen/arch/x86/include/asm/hvm/vmx/vmx.h @@ -429,21 +429,13 @@ static always_inline void __invept(unsigned long type, uint64_t eptp) type = INVEPT_ALL_CONTEXT; asm volatile ( -#ifdef HAVE_AS_EPT "invept %0, %1\n" -#else - INVEPT_OPCODE MODRM_EAX_08 -#endif /* CF==1 or ZF==1 --> BUG() */ UNLIKELY_START(be, invept) _ASM_BUGFRAME_TEXT(0) UNLIKELY_END_SECTION : -#ifdef HAVE_AS_EPT : "m" (operand), "r" (type), -#else - : "a" (&operand), "c" (type), -#endif _ASM_BUGFRAME_INFO(BUGFRAME_bug, __LINE__, __FILE__, 0) : "memory" ); } @@ -458,11 +450,7 @@ static always_inline void __invvpid(unsigned long type, u16 vpid, u64 gva) /* Fix up #UD exceptions which occur when TLBs are flushed before VMXON. */ asm volatile ( "1: " -#ifdef HAVE_AS_EPT "invvpid %0, %1\n" -#else - INVVPID_OPCODE MODRM_EAX_08 -#endif /* CF==1 or ZF==1 --> BUG() */ UNLIKELY_START(be, invvpid) _ASM_BUGFRAME_TEXT(0) @@ -470,11 +458,7 @@ static always_inline void __invvpid(unsigned long type, u16 vpid, u64 gva) "2:" _ASM_EXTABLE(1b, 2b) : -#ifdef HAVE_AS_EPT : "m" (operand), "r" (type), -#else - : "a" (&operand), "c" (type), -#endif _ASM_BUGFRAME_INFO(BUGFRAME_bug, __LINE__, __FILE__, 0) : "memory" ); } From patchwork Tue Apr 1 22:21:29 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Denis Mukhin X-Patchwork-Id: 14035377 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 10E9DC36010 for ; Tue, 1 Apr 2025 22:21:47 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.934830.1336425 (Exim 4.92) (envelope-from ) id 1tzjzF-0000Mf-PW; Tue, 01 Apr 2025 22:21:37 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 934830.1336425; Tue, 01 Apr 2025 22:21:37 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tzjzF-0000MY-Kt; Tue, 01 Apr 2025 22:21:37 +0000 Received: by outflank-mailman (input) for mailman id 934830; Tue, 01 Apr 2025 22:21:37 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tzjzE-00080l-W8 for xen-devel@lists.xenproject.org; Tue, 01 Apr 2025 22:21:37 +0000 Received: from mail-4322.protonmail.ch (mail-4322.protonmail.ch [185.70.43.22]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id aca3420c-0f47-11f0-9ea7-5ba50f476ded; Wed, 02 Apr 2025 00:21:36 +0200 (CEST) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: aca3420c-0f47-11f0-9ea7-5ba50f476ded DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=proton.me; s=protonmail; t=1743546095; x=1743805295; bh=N/Gegk4Sj66N/FlyNAXDC53HkooQoIGeUm3rbRAPDd0=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector:List-Unsubscribe:List-Unsubscribe-Post; b=TWrWiogpGw6G6z4iMaY3LJEJ4HO+DMLO0IVvcadrquh764VMRSj3LiI3UkiBRRSbS 7i2+DlfLprIP4770aaDvkLEnBVmJacbyQA1fEtxoEZUsUpUPW1QVPTIWxKnPSYKhZs gFkWs/EdrAPxRqs0nFxc/GGsnLzyL8G7heLmL9JWaHPcYsNpmn35fueoNqt95BQNcC gT2vkPUCKHeuMGdtO7N3KliEovOZm+OxaQJFq9Kb168EjFu2mPOMOOJPYWPtu6YTU5 nNrxZdPm1nTdyx4UJ8SGyIZexauF5lSFlXUhfNVEZBlSj2QOxD4K8De+eQu7lA9X21 6N3j5+4rQ+eUA== Date: Tue, 01 Apr 2025 22:21:29 +0000 To: xen-devel@lists.xenproject.org From: dmkhn@proton.me Cc: andrew.cooper3@citrix.com, anthony.perard@vates.tech, jbeulich@suse.com, julien@xen.org, michal.orzel@amd.com, roger.pau@citrix.com, sstabellini@kernel.org, dmukhin@ford.com Subject: [PATCH v1 3/5] x86/vmx: remove GAS_VMX_OP() Message-ID: <20250401222105.79309-4-dmukhin@ford.com> In-Reply-To: <20250401222105.79309-1-dmukhin@ford.com> References: <20250401222105.79309-1-dmukhin@ford.com> Feedback-ID: 123220910:user:proton X-Pm-Message-ID: 93b235a7f48c66273ddf9670081b1e765a1b9a5e MIME-Version: 1.0 From: Denis Mukhin Remove unneeded GAS_VMX_OP() macro, now that all used VMX instuctions are natively supported by the baseline compiler. Signed-off-by: Denis Mukhin --- xen/arch/x86/include/asm/hvm/vmx/vmx.h | 16 ++++++---------- 1 file changed, 6 insertions(+), 10 deletions(-) diff --git a/xen/arch/x86/include/asm/hvm/vmx/vmx.h b/xen/arch/x86/include/asm/hvm/vmx/vmx.h index ce3c067a88..10c0619108 100644 --- a/xen/arch/x86/include/asm/hvm/vmx/vmx.h +++ b/xen/arch/x86/include/asm/hvm/vmx/vmx.h @@ -310,8 +310,6 @@ extern uint8_t posted_intr_vector; #define INVVPID_ALL_CONTEXT 2 #define INVVPID_SINGLE_CONTEXT_RETAINING_GLOBAL 3 -# define GAS_VMX_OP(yes, no) yes - static always_inline void __vmptrld(u64 addr) { asm volatile ( @@ -374,14 +372,13 @@ static inline enum vmx_insn_errno vmread_safe(unsigned long field, unsigned long ret = VMX_INSN_SUCCEED; bool fail_invalid, fail_valid; - asm volatile ( GAS_VMX_OP("vmread %[field], %[value]\n\t", - VMREAD_OPCODE MODRM_EAX_ECX) + asm volatile ( "vmread %[field], %[value]\n\t" ASM_FLAG_OUT(, "setc %[invalid]\n\t") ASM_FLAG_OUT(, "setz %[valid]\n\t") : ASM_FLAG_OUT("=@ccc", [invalid] "=rm") (fail_invalid), ASM_FLAG_OUT("=@ccz", [valid] "=rm") (fail_valid), - [value] GAS_VMX_OP("=rm", "=c") (*value) - : [field] GAS_VMX_OP("r", "a") (field)); + [value] "=rm" (*value) + : [field] "r" (field)); if ( unlikely(fail_invalid) ) ret = VMX_INSN_FAIL_INVALID; @@ -397,14 +394,13 @@ static inline enum vmx_insn_errno vmwrite_safe(unsigned long field, unsigned long ret = VMX_INSN_SUCCEED; bool fail_invalid, fail_valid; - asm volatile ( GAS_VMX_OP("vmwrite %[value], %[field]\n\t", - VMWRITE_OPCODE MODRM_EAX_ECX) + asm volatile ( "vmwrite %[value], %[field]\n\t" ASM_FLAG_OUT(, "setc %[invalid]\n\t") ASM_FLAG_OUT(, "setz %[valid]\n\t") : ASM_FLAG_OUT("=@ccc", [invalid] "=rm") (fail_invalid), ASM_FLAG_OUT("=@ccz", [valid] "=rm") (fail_valid) - : [field] GAS_VMX_OP("r", "a") (field), - [value] GAS_VMX_OP("rm", "c") (value)); + : [field] "r" (field), + [value] "rm" (value)); if ( unlikely(fail_invalid) ) ret = VMX_INSN_FAIL_INVALID; From patchwork Tue Apr 1 22:21:34 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Denis Mukhin X-Patchwork-Id: 14035381 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 8CDA9C36010 for ; Tue, 1 Apr 2025 22:22:01 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.934832.1336435 (Exim 4.92) (envelope-from ) id 1tzjzL-0000kA-0e; Tue, 01 Apr 2025 22:21:43 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 934832.1336435; Tue, 01 Apr 2025 22:21:42 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tzjzK-0000k1-TX; Tue, 01 Apr 2025 22:21:42 +0000 Received: by outflank-mailman (input) for mailman id 934832; Tue, 01 Apr 2025 22:21:42 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tzjzK-0008FS-10 for xen-devel@lists.xenproject.org; Tue, 01 Apr 2025 22:21:42 +0000 Received: from mail-10631.protonmail.ch (mail-10631.protonmail.ch [79.135.106.31]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id af2da4f7-0f47-11f0-9ffb-bf95429c2676; Wed, 02 Apr 2025 00:21:40 +0200 (CEST) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: af2da4f7-0f47-11f0-9ffb-bf95429c2676 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=proton.me; s=protonmail; t=1743546099; x=1743805299; bh=ACi96G57+RpQp/2aY30Q6dbZ1Kg2jsTyScAUQdNS6S8=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector:List-Unsubscribe:List-Unsubscribe-Post; b=UNRyWTskDvaSWQUDN6iEwtcQEWqV1uQrQMEJTfC+oaLCO/0CJtOLhD1G6XV0R2pZ+ ribt3Q2B5B/6s2eQ0QVZfP8zgB0/FdSrNNE9SaUVodbdOeeHsPXLNLHD5NWsAgvtBD 4EEXyUhOgDfuquVs1g4G/4k/Nvm2Jt7doATALJ74GIn0evs/34H2cL7awHbPZNaxrg E0exOpP55rLABvY5z8v7w5veaFzB6z8kXJrQtTvCeOCF0DlTtlhgPbZAdb/GUDwOtW V148eXSvwm7yw9QEQeFmHlo6bDicUusIq/65OHOe3Y3wQ/yHWdhPu0qVFqhSo3usya role6lyRYHCEg== Date: Tue, 01 Apr 2025 22:21:34 +0000 To: xen-devel@lists.xenproject.org From: dmkhn@proton.me Cc: andrew.cooper3@citrix.com, anthony.perard@vates.tech, jbeulich@suse.com, julien@xen.org, michal.orzel@amd.com, roger.pau@citrix.com, sstabellini@kernel.org, dmukhin@ford.com Subject: [PATCH v1 4/5] x86/vmx: remove *_OPCODE Message-ID: <20250401222105.79309-5-dmukhin@ford.com> In-Reply-To: <20250401222105.79309-1-dmukhin@ford.com> References: <20250401222105.79309-1-dmukhin@ford.com> Feedback-ID: 123220910:user:proton X-Pm-Message-ID: a105727e2157e3c7085f480a753c9f41cb30c15e MIME-Version: 1.0 From: Denis Mukhin Remove all *_OPCODE definitions from vmx.h now that all used VMX instructions are natively supported by the baseline compiler. Use vmxon and vmxoff instructions directly. Update __vmxon() to account for vmxon use. Resolves: https://gitlab.com/xen-project/xen/-/work_items/202 Signed-off-by: Denis Mukhin --- xen/arch/x86/include/asm/hvm/vmx/vmx.h | 34 ++++++-------------------- 1 file changed, 8 insertions(+), 26 deletions(-) diff --git a/xen/arch/x86/include/asm/hvm/vmx/vmx.h b/xen/arch/x86/include/asm/hvm/vmx/vmx.h index 10c0619108..1d63e49288 100644 --- a/xen/arch/x86/include/asm/hvm/vmx/vmx.h +++ b/xen/arch/x86/include/asm/hvm/vmx/vmx.h @@ -257,24 +257,6 @@ typedef union cr_access_qual { #define X86_SEG_AR_GRANULARITY (1u << 15) /* 15, granularity */ #define X86_SEG_AR_SEG_UNUSABLE (1u << 16) /* 16, segment unusable */ -#define VMCALL_OPCODE ".byte 0x0f,0x01,0xc1\n" -#define VMCLEAR_OPCODE ".byte 0x66,0x0f,0xc7\n" /* reg/opcode: /6 */ -#define VMLAUNCH_OPCODE ".byte 0x0f,0x01,0xc2\n" -#define VMPTRLD_OPCODE ".byte 0x0f,0xc7\n" /* reg/opcode: /6 */ -#define VMPTRST_OPCODE ".byte 0x0f,0xc7\n" /* reg/opcode: /7 */ -#define VMREAD_OPCODE ".byte 0x0f,0x78\n" -#define VMRESUME_OPCODE ".byte 0x0f,0x01,0xc3\n" -#define VMWRITE_OPCODE ".byte 0x0f,0x79\n" -#define INVEPT_OPCODE ".byte 0x66,0x0f,0x38,0x80\n" /* m128,r64/32 */ -#define INVVPID_OPCODE ".byte 0x66,0x0f,0x38,0x81\n" /* m128,r64/32 */ -#define VMXOFF_OPCODE ".byte 0x0f,0x01,0xc4\n" -#define VMXON_OPCODE ".byte 0xf3,0x0f,0xc7\n" - -#define MODRM_EAX_08 ".byte 0x08\n" /* ECX, [EAX] */ -#define MODRM_EAX_06 ".byte 0x30\n" /* [EAX], with reg/opcode: /6 */ -#define MODRM_EAX_07 ".byte 0x38\n" /* [EAX], with reg/opcode: /7 */ -#define MODRM_EAX_ECX ".byte 0xc1\n" /* EAX, ECX */ - extern uint8_t posted_intr_vector; #define cpu_has_vmx_ept_exec_only_supported \ @@ -497,9 +479,7 @@ static inline void vpid_sync_all(void) static inline void __vmxoff(void) { - asm volatile ( - VMXOFF_OPCODE - : : : "memory" ); + asm volatile ("vmxoff" : : : "memory"); } static inline int __vmxon(u64 addr) @@ -507,15 +487,17 @@ static inline int __vmxon(u64 addr) int rc; asm volatile ( - "1: " VMXON_OPCODE MODRM_EAX_06 "\n" - " setna %b0 ; neg %0\n" /* CF==1 or ZF==1 --> rc = -1 */ + "1: vmxon (%[addr])\n" + " setna %b[rc]\n" + " neg %[rc]\n" /* CF==1 or ZF==1 --> rc = -1 */ "2:\n" ".section .fixup,\"ax\"\n" - "3: sub $2,%0 ; jmp 2b\n" /* #UD or #GP --> rc = -2 */ + "3: mov $-2, %[rc]\n" + " jmp 2b\n" /* #UD or #GP --> rc = -2 */ ".previous\n" _ASM_EXTABLE(1b, 3b) - : "=q" (rc) - : "0" (0), "a" (&addr) + : [rc] "=q" (rc) + : "0" (0), [addr] "r" (&addr) : "memory"); return rc; From patchwork Tue Apr 1 22:21:38 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Denis Mukhin X-Patchwork-Id: 14035378 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id A8F32C36010 for ; Tue, 1 Apr 2025 22:21:53 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.934837.1336444 (Exim 4.92) (envelope-from ) id 1tzjzN-00015B-DX; Tue, 01 Apr 2025 22:21:45 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 934837.1336444; Tue, 01 Apr 2025 22:21:45 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tzjzN-00014a-8f; Tue, 01 Apr 2025 22:21:45 +0000 Received: by outflank-mailman (input) for mailman id 934837; Tue, 01 Apr 2025 22:21:44 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tzjzL-00080l-Uw for xen-devel@lists.xenproject.org; Tue, 01 Apr 2025 22:21:43 +0000 Received: from mail-24418.protonmail.ch (mail-24418.protonmail.ch [109.224.244.18]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id afce6837-0f47-11f0-9ea7-5ba50f476ded; Wed, 02 Apr 2025 00:21:41 +0200 (CEST) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: afce6837-0f47-11f0-9ea7-5ba50f476ded DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=proton.me; s=protonmail; t=1743546101; x=1743805301; bh=EqD5rWQIMtrh3DD6wy+ihv9SumDjFLVceAqq134Fgcw=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector:List-Unsubscribe:List-Unsubscribe-Post; b=OFCp6JWZLsruZQqZYzQG685sVK8Y1W7vbv5HWkQsvdRcj7HcPKBBSMAG+UB/Rq6cp lOhJ3QFex6rxWc7XrLMb5QhzEYJ7eoHFb0LHngGZ3jHs9t14Bxts91jqF06x0TpRBz 408E2pilYM55IJ4yLItxCO+1k+FTihNQPRF2zkUcVgxfMBVgRH7yWzvIXfCtXL8d15 OMOljfHZYtkMN0dGDg1NI7RbjZ+K+991HEiuop6ivv0ijks5HVGEziNESEm4bNz6/K avfKtSlZSZEl/DLa5tH6PS8vmFbBwwD6AfHN779PsEuLiLl1PaeazkKInUu2H0IVVZ NrD0S8xywK4pA== Date: Tue, 01 Apr 2025 22:21:38 +0000 To: xen-devel@lists.xenproject.org From: dmkhn@proton.me Cc: andrew.cooper3@citrix.com, anthony.perard@vates.tech, jbeulich@suse.com, julien@xen.org, michal.orzel@amd.com, roger.pau@citrix.com, sstabellini@kernel.org, dmukhin@ford.com Subject: [PATCH v1 5/5] x86/asm: remove HAVE_AS_CLAC_STAC Message-ID: <20250401222105.79309-6-dmukhin@ford.com> In-Reply-To: <20250401222105.79309-1-dmukhin@ford.com> References: <20250401222105.79309-1-dmukhin@ford.com> Feedback-ID: 123220910:user:proton X-Pm-Message-ID: 607f19b039f6ff96dca31464c000dad0932e593e MIME-Version: 1.0 From: Denis Mukhin The new toolchain baseline knows the STAC/CLAC instructions, no need to carry the workaround in the code. Resolves: https://gitlab.com/xen-project/xen/-/work_items/203 Signed-off-by: Denis Mukhin Reviewed-by: Andrew Cooper --- xen/arch/x86/arch.mk | 1 - xen/arch/x86/include/asm/asm-defns.h | 10 ---------- 2 files changed, 11 deletions(-) diff --git a/xen/arch/x86/arch.mk b/xen/arch/x86/arch.mk index 42c3aa73da..e9fa1c92d7 100644 --- a/xen/arch/x86/arch.mk +++ b/xen/arch/x86/arch.mk @@ -15,7 +15,6 @@ $(call as-option-add,CFLAGS,CC,"rdrand %eax",-DHAVE_AS_RDRAND) $(call as-option-add,CFLAGS,CC,"rdfsbase %rax",-DHAVE_AS_FSGSBASE) $(call as-option-add,CFLAGS,CC,"xsaveopt (%rax)",-DHAVE_AS_XSAVEOPT) $(call as-option-add,CFLAGS,CC,"rdseed %eax",-DHAVE_AS_RDSEED) -$(call as-option-add,CFLAGS,CC,"clac",-DHAVE_AS_CLAC_STAC) $(call as-option-add,CFLAGS,CC,"clwb (%rax)",-DHAVE_AS_CLWB) $(call as-option-add,CFLAGS,CC,".equ \"x\"$(comma)1",-DHAVE_AS_QUOTED_SYM) $(call as-option-add,CFLAGS,CC,"invpcid (%rax)$(comma)%rax",-DHAVE_AS_INVPCID) diff --git a/xen/arch/x86/include/asm/asm-defns.h b/xen/arch/x86/include/asm/asm-defns.h index 32d6b44910..ab653f3218 100644 --- a/xen/arch/x86/include/asm/asm-defns.h +++ b/xen/arch/x86/include/asm/asm-defns.h @@ -1,15 +1,5 @@ #include -#ifndef HAVE_AS_CLAC_STAC -.macro clac - .byte 0x0f, 0x01, 0xca -.endm - -.macro stac - .byte 0x0f, 0x01, 0xcb -.endm -#endif - .macro vmrun .byte 0x0f, 0x01, 0xd8 .endm