Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp1838578ybn; Thu, 26 Sep 2019 03:01:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqx40lPGmXsHRsRKt6+KqhfdefJY7kOEAP6lvJwl/qK2xcOxvBtsYmC5sCq7KKvzsOJHCDp0 X-Received: by 2002:a50:ed82:: with SMTP id h2mr2606029edr.206.1569492111238; Thu, 26 Sep 2019 03:01:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569492111; cv=none; d=google.com; s=arc-20160816; b=Zer2GqpbrnWFwTAt/5BqE/0cViFOTRRwe/xvxyz2Mi/i0lvalCsrjGb6t1Xig9gTkP zlUXAgwJpaKD9qhlSK9m384M1Wz6O/qDVmoKgDeHyK7QLp+qZwKjSoAsPzyPKVFpoXpO OnOFFM2t3hppIZm9ATAI9AbxtYcARSbR1ZkXZVsE+6aaii79tyljfRxBRGq9xFB88jK0 CztUNxkWyNGfVVMBJmw/OFwotSQPhCtME3k3mHqQqCTQqlyBMgEAUWWfjUyL099O7FaY kl6ad9Ocfpk8MsxVcDRplWJA8eN8p+RjYB38ajgMfgIpcF4ISK3VUcAzkF4uE+GlRCFF rj/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=gXoOgphXy5hyh5IptSjjJ24xJlr2aVA7NiHvlRbbim4=; b=AILpqPYpcR9RkqvaByzbEIrlic02bWuRgBJY7Hmkh8CfdJux6P9fJKGHzaVSP/2k98 RRSaDyK2C84UuJwBH4yXdSwHajwof8WyGpnb/lg4IcvK9LQF0+1CB2nqho8rPgnw1E4P 6qlESTDy+cXqaPRsRcPVXYnWcw4paDQwyCZE+Uw+8gbfLwRkPq45KJ21pXfexsOdHP71 tVz6OjpHFsr9UN84swhWZ5n9CJ494lPCy/AZTRiU+1Da2hegxfqq2ZXXdcJszADw26w5 gyIHHyMAFFvKYzj7/d8enTIGuWlZKFU9YEFi9fFZOfJU9QdsNSmwvLGa0xKz77z4ndvy uPoQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b12si705714eja.185.2019.09.26.03.01.27; Thu, 26 Sep 2019 03:01:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728368AbfIYVho (ORCPT + 99 others); Wed, 25 Sep 2019 17:37:44 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:38549 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728023AbfIYVhe (ORCPT ); Wed, 25 Sep 2019 17:37:34 -0400 Received: from localhost ([127.0.0.1] helo=flow.W.breakpoint.cc) by Galois.linutronix.de with esmtp (Exim 4.80) (envelope-from ) id 1iDEyX-0002Dx-3W; Wed, 25 Sep 2019 23:37:29 +0200 From: Sebastian Andrzej Siewior To: kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org, Sebastian Andrzej Siewior Subject: [PATCH 1/2] KVM: x86: svm: Pass XSAVES to guest if available on host Date: Wed, 25 Sep 2019 23:37:20 +0200 Message-Id: <20190925213721.21245-2-bigeasy@linutronix.de> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190925213721.21245-1-bigeasy@linutronix.de> References: <20190925213721.21245-1-bigeasy@linutronix.de> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In commit 55412b2eda2b7 ("kvm: x86: Add kvm_x86_ops hook that enables XSAVES for g= uest") XSAVES was enabled on VMX with a few additional tweaks and was always disabled on SVM. Before ZEN XSAVES was not available so it made no difference. With Zen it is possible to expose it to the guest if it is available on the host. I didn't find anything close to VMX's "VM-Execution Controls" and exposing this flag based on the CPUID flags cause no harm so far. Expose the XSAVES flag to the guest if the host supports it. Signed-off-by: Sebastian Andrzej Siewior --- arch/x86/kvm/svm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index e0368076a1ef9..3878eb766fa39 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c @@ -5992,7 +5992,7 @@ static bool svm_mpx_supported(void) =20 static bool svm_xsaves_supported(void) { - return false; + return boot_cpu_has(X86_FEATURE_XSAVES); } =20 static bool svm_umip_emulated(void) --=20 2.23.0