From nobody Mon Sep 15 22:42:35 2025 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id AA76AC54EBE for ; Tue, 10 Jan 2023 05:57:54 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231639AbjAJF5w (ORCPT ); Tue, 10 Jan 2023 00:57:52 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57830 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235352AbjAJF4a (ORCPT ); Tue, 10 Jan 2023 00:56:30 -0500 Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 25A3A8FC7 for ; Mon, 9 Jan 2023 21:55:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673330157; x=1704866157; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=DmevG4XQSgqRzdAJ2vm+aeGRW8v5LCwWogDmX0SU+vA=; b=L15N3eRSP5w5d6D1GU5JDsei4lL7QZKuY5+NhzFARCZ5DDKyCy2kTda0 6M7wGL5cM6VRIUJCruIUL3Cux+LJOAR3Y0x1B/8+yYBy7t2+as52ncpct FSBpuwdd4Y7w8ZjcuA11E9K4Vy+hBTH9E1rT9+Xsb2ggRUUexnvCYCjBP Xx1YjthaN34HJ1K73vP6Ld63NzwftB1MQeHHEuo0DKTi9Uvkb44F+XAdt vSKY3Re/EozpbdG159Xmpx9Qzb3oM31DvEJUdERGRS+cQao7wVtF1ClLz 3ROblJbMOMSBzolXq00AurSlxVnfxHTlwyg4BfylDRkdneGIp/fdq0NLo Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10585"; a="350289976" X-IronPort-AV: E=Sophos;i="5.96,314,1665471600"; d="scan'208";a="350289976" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Jan 2023 21:55:41 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10585"; a="634483759" X-IronPort-AV: E=Sophos;i="5.96,314,1665471600"; d="scan'208";a="634483759" Received: from oux.sc.intel.com ([10.3.52.57]) by orsmga006-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Jan 2023 21:55:41 -0800 From: Yian Chen To: linux-kernel@vger.kernel.org, x86@kernel.org, Andy Lutomirski , Dave Hansen , Ravi Shankar , Tony Luck , Sohil Mehta , Paul Lai , Yian Chen Subject: [PATCH 7/7] x86/kvm: Expose LASS feature to VM guest Date: Mon, 9 Jan 2023 21:52:04 -0800 Message-Id: <20230110055204.3227669-8-yian.chen@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230110055204.3227669-1-yian.chen@intel.com> References: <20230110055204.3227669-1-yian.chen@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" From: Paul Lai Expose LASS feature which is defined in the CPUID.7.1.EAX bit and enabled via the CR4 bit for VM guest. Signed-off-by: Paul Lai Signed-off-by: Yian Chen Reviewed-by: Tony Luck --- arch/x86/include/asm/kvm_host.h | 3 ++- arch/x86/kvm/cpuid.c | 2 +- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_hos= t.h index f35f1ff4427b..bd39f45e9b5a 100644 --- a/arch/x86/include/asm/kvm_host.h +++ b/arch/x86/include/asm/kvm_host.h @@ -125,7 +125,8 @@ | X86_CR4_PGE | X86_CR4_PCE | X86_CR4_OSFXSR | X86_CR4_PCIDE \ | X86_CR4_OSXSAVE | X86_CR4_SMEP | X86_CR4_FSGSBASE \ | X86_CR4_OSXMMEXCPT | X86_CR4_LA57 | X86_CR4_VMXE \ - | X86_CR4_SMAP | X86_CR4_PKE | X86_CR4_UMIP)) + | X86_CR4_SMAP | X86_CR4_PKE | X86_CR4_UMIP \ + | X86_CR4_LASS)) =20 #define CR8_RESERVED_BITS (~(unsigned long)X86_CR8_TPR) =20 diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index b14653b61470..e0f53f85f5ae 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -664,7 +664,7 @@ void kvm_set_cpu_caps(void) =20 kvm_cpu_cap_mask(CPUID_7_1_EAX, F(AVX_VNNI) | F(AVX512_BF16) | F(CMPCCXADD) | F(AMX_FP16) | - F(AVX_IFMA) + F(AVX_IFMA) | F(LASS) ); =20 kvm_cpu_cap_init_kvm_defined(CPUID_7_1_EDX, --=20 2.34.1