Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp1841129ybn; Thu, 26 Sep 2019 03:03:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqzFCkT2HU6t6OHB981RFXEwkVeVoh7D+zGVD5AD2ErdA1TfjNfQLhifr3qCui/eL/zsDJsl X-Received: by 2002:a17:906:4ec2:: with SMTP id i2mr2289276ejv.83.1569492232189; Thu, 26 Sep 2019 03:03:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569492232; cv=none; d=google.com; s=arc-20160816; b=n9GtKze2w/orCrdPGNh3q8lSaR//zATrkuRkJWZpQSci7HPKPNorA1wUA82sQ18upG izcqvFDQefd2l3QRZ+lLlxWDgaSafRcuJ+oq2MElfLC77K7y8gHhw28HZ4p3CDgUVpQr DaFvNqsKhIHT/PmK4+3hPKNP/SU1XM3knerehftEJv38Ev3NEvNBxsJVQRxtjM7hk9tU RPxpTjmHSGDzxqxJHF8DJFUos4rhkusT0rLhIazVgA/2BwqT2p1IpkzPVCG0wcpFtZxg A0Sz0OEQrph+YpBZ6wXIInUDxoy/maqPczICTKwZn3OTZhGdpAEa5tlca/uXIit7ch9H 6mrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=1H6+HKsJ/OBnV2D/tY8LfUT6kkU6hveLoaRoUU+4SSw=; b=LyQ2whK+AacoUyTrTlv0ifaIxeVpEywiXhK/LGlpbcIV2sPVuR84Zxd01+1yikFdMX ki6COC8HfaVupdl0Ngr/kkpzWT210zzaaCJGLK1lGj3Qend9c7bZw8GToUsq+H5x8eHF I5oAFhiEXTRqnBakUb6+AdqRkdcIl8GoCx71JRdu6dEIdo+cvLcY3NydiLaiWZ7ViaT0 o4wQeu9KzrVlP/iff5FEj44j7/2q/laZaEZO6aeC9zgn25Nt9ZPzAn0I5eZcscwkxZKK 9oCZAS/85o7c5/sTpRhT58HP9M13g1BRFcX7JtL3ASX98PdytQ+ikg8hHmTpIzgVTAA8 B/5A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w12si988042edx.223.2019.09.26.03.03.28; Thu, 26 Sep 2019 03:03:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728205AbfIYVhi (ORCPT + 99 others); Wed, 25 Sep 2019 17:37:38 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:38554 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728016AbfIYVhh (ORCPT ); Wed, 25 Sep 2019 17:37:37 -0400 Received: from localhost ([127.0.0.1] helo=flow.W.breakpoint.cc) by Galois.linutronix.de with esmtp (Exim 4.80) (envelope-from ) id 1iDEyX-0002Dx-FF; Wed, 25 Sep 2019 23:37:29 +0200 From: Sebastian Andrzej Siewior To: kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org, Sebastian Andrzej Siewior Subject: [PATCH 2/2] KVM: x86: Expose CLZERO and XSAVEERPTR to the guest Date: Wed, 25 Sep 2019 23:37:21 +0200 Message-Id: <20190925213721.21245-3-bigeasy@linutronix.de> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190925213721.21245-1-bigeasy@linutronix.de> References: <20190925213721.21245-1-bigeasy@linutronix.de> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org I was surprised to see that the guest reported `fxsave_leak' while the host did not. After digging deeper I noticed that the bits are simply masked out during enumeration. The XSAVEERPTR feature is actually a bug fix on AMD which means the kernel can disable a workaround. While here, I've seen that CLZERO is also masked out. This opcode is unprivilged so exposing it to the guest should not make any difference. Pass CLZERO and XSAVEERPTR to the guest if available on the host. Signed-off-by: Sebastian Andrzej Siewior --- arch/x86/kvm/cpuid.c | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index 22c2720cd948e..0ae9194d0f4d2 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -473,6 +473,7 @@ static inline int __do_cpuid_func(struct kvm_cpuid_entr= y2 *entry, u32 function, =20 /* cpuid 0x80000008.ebx */ const u32 kvm_cpuid_8000_0008_ebx_x86_features =3D + F(CLZERO) | F(XSAVEERPTR) | F(WBNOINVD) | F(AMD_IBPB) | F(AMD_IBRS) | F(AMD_SSBD) | F(VIRT_SSBD) | F(AMD_SSB_NO) | F(AMD_STIBP) | F(AMD_STIBP_ALWAYS_ON); =20 --=20 2.23.0