From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753840AbdDJOpT (ORCPT ); Mon, 10 Apr 2017 10:45:19 -0400 Received: from mx1.redhat.com ([209.132.183.28]:41740 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753793AbdDJOpR (ORCPT ); Mon, 10 Apr 2017 10:45:17 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 08C3E7AE80 Authentication-Results: ext-mx01.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx01.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=vkuznets@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com 08C3E7AE80 From: Vitaly Kuznetsov To: Jork Loeser Cc: "devel\@linuxdriverproject.org" , "x86\@kernel.org" , "linux-kernel\@vger.kernel.org" , "KY Srinivasan" , Haiyang Zhang , Stephen Hemminger , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Steven Rostedt Subject: Re: [PATCH 2/7] x86/hyper-v: fast hypercall implementation References: <20170407112701.17157-1-vkuznets@redhat.com> <20170407112701.17157-3-vkuznets@redhat.com> <87vaqc8wbt.fsf@vitty.brq.redhat.com> Date: Mon, 10 Apr 2017 16:45:13 +0200 In-Reply-To: <87vaqc8wbt.fsf@vitty.brq.redhat.com> (Vitaly Kuznetsov's message of "Mon, 10 Apr 2017 11:07:34 +0200") Message-ID: <87mvboqq2u.fsf@vitty.brq.redhat.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Mon, 10 Apr 2017 14:45:17 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Vitaly Kuznetsov writes: > Jork Loeser writes: > [snip] > >>> + } >>> +#else >>> + { >>> + u32 hv_status_hi, hv_status_lo; >>> + >>> + __asm__ __volatile__ ("call *%6" >>> + : "=d"(hv_status_hi), >>> + "=a"(hv_status_lo) : >>> + "d" (control.as_uint32_hi), >>> + "a" (control.as_uint32_lo), >>> + "c" ((u32)input1), >>> + "b" ((u32)(input1 >> 32)), >>> + "m" (hv_hypercall_pg) >>> + : "cc"); >>> + >>> + return hv_status_lo | ((u64)hv_status_hi << 32); >>> + } >>> +#endif >> Please clobber ECX, EDI and ESI for x86. Clobber memory as well? > > ECX is already in listed in inputs (lower part of input1) so it's > automatically clobbered. I'll add EDI and ESI to clobbers here, thanks! Oh, I see what you mean - hypervisor is allowed to write to ecx too, we need to pass it with '+'. Will do, thanks! -- Vitaly