[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [XEN][PATCH] x86/hvm: revise "cpu_has_vmx" usage for !CONFIG_INTEL_VMX case


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
  • Date: Thu, 13 Nov 2025 11:53:38 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=FUsUl6w46Bh78hBSMK/B+3FKBrMR0h9jVX2u5E/VfiA=; b=TjwOMxh5RpC6EjxQNG+YtTLMSixU2ceHXC65104Hm8+dbWLDmYxbu+mTsU5ZRK1FgAAXcFaxm9jZ4nho/81tlKIg7EbEpdglefRS6sjnjRdaxTHvSJSnSPF/tM2EBpj0IsursQulWfDSHVqzx0Y60MSNr/3Is+t308hi/N9X7eb8Fx8KjBBcHSHb76u04g0R6S+s9Pot7Xd382weY3NN/pnDkACQ+CWfzWigkzCWxenn6nkmYbJ4yE9VZs2xRdZn1uDEdVgiNhjeZMZqhcpD/M06TwPHKEA+ZhNLi+xJ426RFJQLDGk9eV5CpwlE/+354bHn0DdJJ6QFO+GHkrKC1g==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=r6vcwsUic/P2OFZnXwlL+EcFJqWIKqCt4Zw/qQxgr8+Oz9Ogkziz5D4SXP6uB/pJmv3s17XfJ5jf7x/6BTrhpU13MtUdPn+jqK7+00mGlgtZDluNRsMpUhUBrOktbDto3mJKVNmmhntuPCNIPf0eBKbB6aXSUnE2pLwfhhmQXLGRlUFBKbFnXzs6thVQlzJqk7sLgsumrTqDGuYWa1rAHhoPMhtvBG3s/4ybCW9wGJRqlc6iJ5E7hlEwJKcL0yfaH+Qt5N6r+WS7SIhiK1vvZy251RVLooCCw4jCBvLNhfHQ5wfvS/bwFUEdz0WMgJ0J6eWcTcduMQklpXpGOnGX5w==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Alejandro Vallejo <alejandro.garciavallejo@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Thu, 13 Nov 2025 09:53:49 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hi Jan,

On 13.11.25 09:31, Jan Beulich wrote:
On 12.11.2025 21:25, Grygorii Strashko wrote:
Could it be merged if no other comments, please?

It's on my list of things to put in. However, since you ask: You do realize that
all your recent postings were while the tree was frozen? That's okay-ish, but
when preparing a release people would preferably focus on the release, not on
what is to come afterwards. This change of yours, like quite a few from others,
will need to wait until the tree is fully open again. It having been progressed
to the point where it can in principle go in was already a courtesy, considering
the timing.


I'm very sorry for disturbing you and being annoying in this regards.


On 24.09.25 13:14, Grygorii Strashko wrote:
From: Grygorii Strashko <grygorii_strashko@xxxxxxxx>

Since commit b99227347230 ("x86: Fix AMD_SVM and INTEL_VMX dependency") the
HVM Intel VT-x support can be disabled, but it still keeps VMX
code partially built-in. Particularly in HVM code there are two places:

1) hvm/dom0_build.c
   dom0_construct_pvh()->pvh_populate_p2m()
      ...
      if ( cpu_has_vmx && paging_mode_hap(d) && !vmx_unrestricted_guest(v) )
      {
          ...
          [unreachable for !cpu_has_vmx case]
          rc = pvh_setup_vmx_realmode_helpers(d);

pvh_setup_vmx_realmode_helpers() allocates memory and configures
   HVM_PARAM_VM86_TSS_SIZED
   HVM_PARAM_IDENT_PT

2) hvm/hvm.c
   hvm_set_param()
      ...
      case HVM_PARAM_IDENT_PT:

          if ( !paging_mode_hap(d) || !cpu_has_vmx )
          {
              d->arch.hvm.params[index] = value;
              break;
          }
          [unreachable for !cpu_has_vmx case]
          ...

Hence HVM_PARAM_IDENT_PT/HVM_PARAM_VM86_TSS_SIZED are used only by VMX code
above code become unreachable in !cpu_has_vmx case and can be optimazed
when !CONFIG_INTEL_VMX.

Replace "cpu_has_vmx" with using_vmx() to account !CONFIG_INTEL_VMX and allow
compiler DCE to optimize code.

Signed-off-by: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
---
add/remove: 0/0 grow/shrink: 0/2 up/down: 0/-604 (-604)
Function                                     old     new   delta
hvm_set_param                               1602    1473    -129
dom0_construct_pvh                          4438    3963    -475
Total: Before=3567191, After=3566587, chg -0.02%

   xen/arch/x86/hvm/dom0_build.c | 2 +-
   xen/arch/x86/hvm/hvm.c        | 2 +-
   2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/hvm/dom0_build.c b/xen/arch/x86/hvm/dom0_build.c
index 5551f9044836..5ac2cf8394d8 100644
--- a/xen/arch/x86/hvm/dom0_build.c
+++ b/xen/arch/x86/hvm/dom0_build.c
@@ -473,7 +473,7 @@ static int __init pvh_populate_p2m(struct domain *d)
           }
       }
- if ( cpu_has_vmx && paging_mode_hap(d) && !vmx_unrestricted_guest(v) )
+    if ( using_vmx() && paging_mode_hap(d) && !vmx_unrestricted_guest(v) )
       {
           /*
            * Since Dom0 cannot be migrated, we will only setup the
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 95a80369b9b8..70331aeec9a0 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -4302,7 +4302,7 @@ static int hvm_set_param(struct domain *d, uint32_t 
index, uint64_t value)
            * Only actually required for VT-x lacking unrestricted_guest
            * capabilities.  Short circuit the pause if possible.
            */
-        if ( !paging_mode_hap(d) || !cpu_has_vmx )
+        if ( !paging_mode_hap(d) || !using_vmx() )
           {
               d->arch.hvm.params[index] = value;
               break;



--
Best regards,
-grygorii




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.