Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1106378imm; Fri, 22 Jun 2018 10:24:57 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLw4F4w6FsXrsgGLpV1wP+UfmHz6UB5JuCmC9E48u02osxMcMaiH5LGpfGFGMcFtFcmI5sc X-Received: by 2002:a65:4042:: with SMTP id h2-v6mr2183743pgp.78.1529688297033; Fri, 22 Jun 2018 10:24:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529688297; cv=none; d=google.com; s=arc-20160816; b=KJj9dXurTwNMgBq2BG6qzRxJTp/tv6QGaspHkZGj82MTmslZqIHB1Xekm+yJOpm+do vqeqP4i6Xqb50Eu8fKdPbM7HcynlocaYnMAGbQfW2qWV1BH96ZmgGS0cxyRIf0L/Ty2a uDn0RQgOCoLh2eU4V7XQ+rKVQhWSi347YMJcq6Tg+z0pKLECtoR4nnEugT9vX3DavKyR shjAOmGWgJb0Ch0iP7u8YA8Q41PN/E0dpTZM8+93v1K1BjyC5pPH6gLGOFIGxMtaTl+I mHZmcgFpsZ29i5gwrVceKhKw0j+/KTyD9lLAyGxCUWyd1+7WQTAtVu2rU97z9SEgYS3+ 9hCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:arc-authentication-results; bh=OtCC8Ui/CVZbS90GnN+V21rbAxeT7QHg6DaXkljpxlM=; b=RkEA+cWZtP92xjB8B0M6U5jH6bKcJ2QJQgIhwPr3YFhYNe2V9fh5qEgg7D1HZKofQt WFGLP6hQqm2CIRUH+97SaDdDwNycx/l+8cn6TV/nRnQqG0aoNAzGk1IB+cMKB0fY6LuJ sXcQo3JkN9B/hrDFHD13w1jf+GZQXaof0rZuPfH16zaha+YpnRzEsJwuCwo5PfnO3OYa HZf4qNX6EzXljYmBXj1xh5MFwbh1Q+1VTSVluVwqkzXCIKZnoRapkGd8n8atRCjAOD6U xs1nDeTOPFPJwRHbUcfMhU1Vkv8d2QZ7Gp5QgrLlnROHEHPEoJMAGqBRUaovBM33ryfV RDcQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f8-v6si8594416plb.381.2018.06.22.10.24.42; Fri, 22 Jun 2018 10:24:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=vmware.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934079AbeFVRXY (ORCPT + 99 others); Fri, 22 Jun 2018 13:23:24 -0400 Received: from ex13-edg-ou-001.vmware.com ([208.91.0.189]:17636 "EHLO EX13-EDG-OU-001.vmware.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932918AbeFVRWp (ORCPT ); Fri, 22 Jun 2018 13:22:45 -0400 Received: from sc9-mailhost3.vmware.com (10.113.161.73) by EX13-EDG-OU-001.vmware.com (10.113.208.155) with Microsoft SMTP Server id 15.0.1156.6; Fri, 22 Jun 2018 10:22:05 -0700 Received: from sc2-haas01-esx0118.eng.vmware.com (sc2-haas01-esx0118.eng.vmware.com [10.172.44.118]) by sc9-mailhost3.vmware.com (Postfix) with ESMTP id 313DC4062E; Fri, 22 Jun 2018 10:22:42 -0700 (PDT) From: Nadav Amit To: , CC: Nadav Amit , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Greg Kroah-Hartman , Kate Stewart , Philippe Ombredanne Subject: [PATCH v6 9/9] x86: jump-labels: use macros instead of inline assembly Date: Fri, 22 Jun 2018 10:22:12 -0700 Message-ID: <20180622172212.199633-10-namit@vmware.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180622172212.199633-1-namit@vmware.com> References: <20180622172212.199633-1-namit@vmware.com> MIME-Version: 1.0 Content-Type: text/plain Received-SPF: None (EX13-EDG-OU-001.vmware.com: namit@vmware.com does not designate permitted sender hosts) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Use assembly macros for jump-labels and call them from inline assembly. This not only makes the code more readable, but also improves compilation decision, specifically inline decisions which GCC base on the number of new lines in inline assembly. As a result the code size is slightly increased. text data bss dec hex filename 18163528 10226300 2957312 31347140 1de51c4 ./vmlinux before 18163608 10227348 2957312 31348268 1de562c ./vmlinux after (+1128) And functions such as intel_pstate_adjust_policy_max(), kvm_cpu_accept_dm_intr(), kvm_register_readl() are inlined. Cc: Thomas Gleixner Cc: Ingo Molnar Cc: "H. Peter Anvin" Cc: x86@kernel.org Cc: Greg Kroah-Hartman Cc: Kate Stewart Cc: Philippe Ombredanne Acked-by: Peter Zijlstra (Intel) Signed-off-by: Nadav Amit --- arch/x86/entry/calling.h | 2 +- arch/x86/include/asm/jump_label.h | 77 +++++++++++-------------------- arch/x86/kernel/macros.S | 1 + 3 files changed, 30 insertions(+), 50 deletions(-) diff --git a/arch/x86/entry/calling.h b/arch/x86/entry/calling.h index 352e70cd33e8..f9a8ad007131 100644 --- a/arch/x86/entry/calling.h +++ b/arch/x86/entry/calling.h @@ -338,7 +338,7 @@ For 32-bit we have the following conventions - kernel is built with .macro CALL_enter_from_user_mode #ifdef CONFIG_CONTEXT_TRACKING #ifdef HAVE_JUMP_LABEL - STATIC_JUMP_IF_FALSE .Lafter_call_\@, context_tracking_enabled, def=0 + STATIC_BRANCH_JMP l_yes=.Lafter_call_\@, key=context_tracking_enabled, branch=0 #endif call enter_from_user_mode .Lafter_call_\@: diff --git a/arch/x86/include/asm/jump_label.h b/arch/x86/include/asm/jump_label.h index 8c0de4282659..4606a7101f97 100644 --- a/arch/x86/include/asm/jump_label.h +++ b/arch/x86/include/asm/jump_label.h @@ -2,19 +2,6 @@ #ifndef _ASM_X86_JUMP_LABEL_H #define _ASM_X86_JUMP_LABEL_H -#ifndef HAVE_JUMP_LABEL -/* - * For better or for worse, if jump labels (the gcc extension) are missing, - * then the entire static branch patching infrastructure is compiled out. - * If that happens, the code in here will malfunction. Raise a compiler - * error instead. - * - * In theory, jump labels and the static branch patching infrastructure - * could be decoupled to fix this. - */ -#error asm/jump_label.h included on a non-jump-label kernel -#endif - #define JUMP_LABEL_NOP_SIZE 5 #ifdef CONFIG_X86_64 @@ -28,18 +15,27 @@ #ifndef __ASSEMBLY__ +#ifndef HAVE_JUMP_LABEL +/* + * For better or for worse, if jump labels (the gcc extension) are missing, + * then the entire static branch patching infrastructure is compiled out. + * If that happens, the code in here will malfunction. Raise a compiler + * error instead. + * + * In theory, jump labels and the static branch patching infrastructure + * could be decoupled to fix this. + */ +#error asm/jump_label.h included on a non-jump-label kernel +#endif + #include #include static __always_inline bool arch_static_branch(struct static_key *key, bool branch) { - asm_volatile_goto("1:" - ".byte " __stringify(STATIC_KEY_INIT_NOP) "\n\t" - ".pushsection __jump_table, \"aw\" \n\t" - _ASM_ALIGN "\n\t" - _ASM_PTR "1b, %l[l_yes], %c0 + %c1 \n\t" - ".popsection \n\t" - : : "i" (key), "i" (branch) : : l_yes); + asm_volatile_goto("STATIC_BRANCH_NOP l_yes=\"%l[l_yes]\" key=\"%c0\" " + "branch=\"%c1\"" + : : "i" (key), "i" (branch) : : l_yes); return false; l_yes: @@ -48,13 +44,8 @@ static __always_inline bool arch_static_branch(struct static_key *key, bool bran static __always_inline bool arch_static_branch_jump(struct static_key *key, bool branch) { - asm_volatile_goto("1:" - ".byte 0xe9\n\t .long %l[l_yes] - 2f\n\t" - "2:\n\t" - ".pushsection __jump_table, \"aw\" \n\t" - _ASM_ALIGN "\n\t" - _ASM_PTR "1b, %l[l_yes], %c0 + %c1 \n\t" - ".popsection \n\t" + asm_volatile_goto("STATIC_BRANCH_JMP l_yes=\"%l[l_yes]\" key=\"%c0\" " + "branch=\"%c1\"" : : "i" (key), "i" (branch) : : l_yes); return false; @@ -76,35 +67,23 @@ struct jump_entry { #else /* __ASSEMBLY__ */ -.macro STATIC_JUMP_IF_TRUE target, key, def -.Lstatic_jump_\@: - .if \def - /* Equivalent to "jmp.d32 \target" */ - .byte 0xe9 - .long \target - .Lstatic_jump_after_\@ -.Lstatic_jump_after_\@: - .else - .byte STATIC_KEY_INIT_NOP - .endif +.macro STATIC_BRANCH_NOP l_yes:req key:req branch:req +1: + .byte STATIC_KEY_INIT_NOP .pushsection __jump_table, "aw" _ASM_ALIGN - _ASM_PTR .Lstatic_jump_\@, \target, \key + _ASM_PTR 1b, \l_yes, \key + \branch .popsection .endm -.macro STATIC_JUMP_IF_FALSE target, key, def -.Lstatic_jump_\@: - .if \def - .byte STATIC_KEY_INIT_NOP - .else - /* Equivalent to "jmp.d32 \target" */ - .byte 0xe9 - .long \target - .Lstatic_jump_after_\@ -.Lstatic_jump_after_\@: - .endif +.macro STATIC_BRANCH_JMP l_yes:req key:req branch:req +1: + .byte 0xe9 + .long \l_yes - 2f +2: .pushsection __jump_table, "aw" _ASM_ALIGN - _ASM_PTR .Lstatic_jump_\@, \target, \key + 1 + _ASM_PTR 1b, \l_yes, \key + \branch .popsection .endm diff --git a/arch/x86/kernel/macros.S b/arch/x86/kernel/macros.S index bf8b9c93e255..161c95059044 100644 --- a/arch/x86/kernel/macros.S +++ b/arch/x86/kernel/macros.S @@ -13,3 +13,4 @@ #include #include #include +#include -- 2.17.1