From: Binbin Wu <binbin.wu@linux.intel.com>
To: kvm@vger.kernel.org
Cc: pbonzini@redhat.com, seanjc@google.com,
rick.p.edgecombe@intel.com, xiaoyao.li@intel.com,
chao.gao@intel.com, kai.huang@intel.com,
binbin.wu@linux.intel.com
Subject: [RFC PATCH 05/27] KVM: x86: Extend kvm_cpu_cap_{set/clear}() to configure overlays
Date: Fri, 17 Apr 2026 15:35:48 +0800 [thread overview]
Message-ID: <20260417073610.3246316-6-binbin.wu@linux.intel.com> (raw)
In-Reply-To: <20260417073610.3246316-1-binbin.wu@linux.intel.com>
Extend kvm_cpu_cap_{set/clear}() for preparation to set/clear a CPU
feature bit for different overlays.
All callers use F_CPUID_DEFAULT to set/clear a capability for both
VMX and SVM overlays.
The effective overlay used is still CPUID_OL_DEFAULT (VMX overlay) for
all VM types.
No functional change intended.
Signed-off-by: Binbin Wu <binbin.wu@linux.intel.com>
---
arch/x86/kvm/cpuid.c | 36 ++++++++++++++++++------------------
arch/x86/kvm/cpuid.h | 18 ++++++++++++------
arch/x86/kvm/svm/sev.c | 6 +++---
arch/x86/kvm/svm/svm.c | 38 +++++++++++++++++++-------------------
arch/x86/kvm/vmx/vmx.c | 38 +++++++++++++++++++-------------------
arch/x86/kvm/x86.c | 4 ++--
6 files changed, 73 insertions(+), 67 deletions(-)
diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c
index d3f3e9f0d493..767c007ab5f0 100644
--- a/arch/x86/kvm/cpuid.c
+++ b/arch/x86/kvm/cpuid.c
@@ -992,7 +992,7 @@ void kvm_initialize_cpu_caps(void)
* to be set on the host. Clear it if that is not the case
*/
if (!tdp_enabled || !boot_cpu_has(X86_FEATURE_OSPKE))
- kvm_cpu_cap_clear(X86_FEATURE_PKU);
+ kvm_cpu_cap_clear(X86_FEATURE_PKU, F_CPUID_DEFAULT);
/*
* Shadow Stacks aren't implemented in the Shadow MMU. Shadow Stack
@@ -1000,7 +1000,7 @@ void kvm_initialize_cpu_caps(void)
* doesn't know how to emulate or map.
*/
if (!tdp_enabled)
- kvm_cpu_cap_clear(X86_FEATURE_SHSTK);
+ kvm_cpu_cap_clear(X86_FEATURE_SHSTK, F_CPUID_DEFAULT);
kvm_cpu_cap_init(CPUID_7_EDX,
/* Reserved, SGX_KEYS */
@@ -1036,18 +1036,18 @@ void kvm_initialize_cpu_caps(void)
* SHSTK, nor does KVM handle Shadow Stack #PFs (see above).
*/
if (allow_smaller_maxphyaddr) {
- kvm_cpu_cap_clear(X86_FEATURE_SHSTK);
- kvm_cpu_cap_clear(X86_FEATURE_IBT);
+ kvm_cpu_cap_clear(X86_FEATURE_SHSTK, F_CPUID_DEFAULT);
+ kvm_cpu_cap_clear(X86_FEATURE_IBT, F_CPUID_DEFAULT);
}
if (boot_cpu_has(X86_FEATURE_AMD_IBPB_RET) &&
boot_cpu_has(X86_FEATURE_AMD_IBPB) &&
boot_cpu_has(X86_FEATURE_AMD_IBRS))
- kvm_cpu_cap_set(X86_FEATURE_SPEC_CTRL);
+ kvm_cpu_cap_set(X86_FEATURE_SPEC_CTRL, F_CPUID_DEFAULT);
if (boot_cpu_has(X86_FEATURE_STIBP))
- kvm_cpu_cap_set(X86_FEATURE_INTEL_STIBP);
+ kvm_cpu_cap_set(X86_FEATURE_INTEL_STIBP, F_CPUID_DEFAULT);
if (boot_cpu_has(X86_FEATURE_AMD_SSBD))
- kvm_cpu_cap_set(X86_FEATURE_SPEC_CTRL_SSBD);
+ kvm_cpu_cap_set(X86_FEATURE_SPEC_CTRL_SSBD, F_CPUID_DEFAULT);
kvm_cpu_cap_init(CPUID_7_1_EAX,
F(SHA512, F_CPUID_DEFAULT),
@@ -1179,7 +1179,7 @@ void kvm_initialize_cpu_caps(void)
);
if (!tdp_enabled && IS_ENABLED(CONFIG_X86_64))
- kvm_cpu_cap_set(X86_FEATURE_GBPAGES);
+ kvm_cpu_cap_set(X86_FEATURE_GBPAGES, F_CPUID_DEFAULT);
kvm_cpu_cap_init(CPUID_8000_0007_EDX,
SCATTERED_F(CONSTANT_TSC, F_CPUID_DEFAULT),
@@ -1208,26 +1208,26 @@ void kvm_initialize_cpu_caps(void)
* record that in cpufeatures so use them.
*/
if (boot_cpu_has(X86_FEATURE_IBPB)) {
- kvm_cpu_cap_set(X86_FEATURE_AMD_IBPB);
+ kvm_cpu_cap_set(X86_FEATURE_AMD_IBPB, F_CPUID_DEFAULT);
if (boot_cpu_has(X86_FEATURE_SPEC_CTRL) &&
!boot_cpu_has_bug(X86_BUG_EIBRS_PBRSB))
- kvm_cpu_cap_set(X86_FEATURE_AMD_IBPB_RET);
+ kvm_cpu_cap_set(X86_FEATURE_AMD_IBPB_RET, F_CPUID_DEFAULT);
}
if (boot_cpu_has(X86_FEATURE_IBRS))
- kvm_cpu_cap_set(X86_FEATURE_AMD_IBRS);
+ kvm_cpu_cap_set(X86_FEATURE_AMD_IBRS, F_CPUID_DEFAULT);
if (boot_cpu_has(X86_FEATURE_STIBP))
- kvm_cpu_cap_set(X86_FEATURE_AMD_STIBP);
+ kvm_cpu_cap_set(X86_FEATURE_AMD_STIBP, F_CPUID_DEFAULT);
if (boot_cpu_has(X86_FEATURE_SPEC_CTRL_SSBD))
- kvm_cpu_cap_set(X86_FEATURE_AMD_SSBD);
+ kvm_cpu_cap_set(X86_FEATURE_AMD_SSBD, F_CPUID_DEFAULT);
if (!boot_cpu_has_bug(X86_BUG_SPEC_STORE_BYPASS))
- kvm_cpu_cap_set(X86_FEATURE_AMD_SSB_NO);
+ kvm_cpu_cap_set(X86_FEATURE_AMD_SSB_NO, F_CPUID_DEFAULT);
/*
* The preference is to use SPEC CTRL MSR instead of the
* VIRT_SPEC MSR.
*/
if (boot_cpu_has(X86_FEATURE_LS_CFG_SSBD) &&
!boot_cpu_has(X86_FEATURE_AMD_SSBD))
- kvm_cpu_cap_set(X86_FEATURE_VIRT_SSBD);
+ kvm_cpu_cap_set(X86_FEATURE_VIRT_SSBD, F_CPUID_DEFAULT);
/* All SVM features required additional vendor module enabling. */
kvm_cpu_cap_init(CPUID_8000_000A_EDX,
@@ -1296,7 +1296,7 @@ void kvm_initialize_cpu_caps(void)
);
if (!static_cpu_has_bug(X86_BUG_NULL_SEG))
- kvm_cpu_cap_set(X86_FEATURE_NULL_SEL_CLR_BASE);
+ kvm_cpu_cap_set(X86_FEATURE_NULL_SEL_CLR_BASE, F_CPUID_DEFAULT);
kvm_cpu_cap_init(CPUID_C000_0001_EDX,
F(XSTORE, F_CPUID_DEFAULT),
@@ -1322,8 +1322,8 @@ void kvm_initialize_cpu_caps(void)
if (WARN_ON((kvm_cpu_cap_has(X86_FEATURE_RDTSCP) ||
kvm_cpu_cap_has(X86_FEATURE_RDPID)) &&
!kvm_is_supported_user_return_msr(MSR_TSC_AUX))) {
- kvm_cpu_cap_clear(X86_FEATURE_RDTSCP);
- kvm_cpu_cap_clear(X86_FEATURE_RDPID);
+ kvm_cpu_cap_clear(X86_FEATURE_RDTSCP, F_CPUID_DEFAULT);
+ kvm_cpu_cap_clear(X86_FEATURE_RDPID, F_CPUID_DEFAULT);
}
}
EXPORT_SYMBOL_FOR_KVM_INTERNAL(kvm_initialize_cpu_caps);
diff --git a/arch/x86/kvm/cpuid.h b/arch/x86/kvm/cpuid.h
index e87adecacd03..4b1274f055e5 100644
--- a/arch/x86/kvm/cpuid.h
+++ b/arch/x86/kvm/cpuid.h
@@ -219,20 +219,26 @@ static inline bool cpuid_fault_enabled(struct kvm_vcpu *vcpu)
MSR_MISC_FEATURES_ENABLES_CPUID_FAULT;
}
-static __always_inline void kvm_cpu_cap_clear(unsigned int x86_feature)
+static __always_inline void kvm_cpu_cap_clear(unsigned int x86_feature, u32 overlay_mask)
{
unsigned int x86_leaf = __feature_leaf(x86_feature);
WARN_ON_ONCE(!kvm_is_configuring_cpu_caps);
- kvm_cpu_caps[CPUID_OL_DEFAULT][x86_leaf] &= ~__feature_bit(x86_feature);
+ for (int i = 0; i < NR_CPUID_OL; i++) {
+ if (overlay_mask & BIT(i))
+ kvm_cpu_caps[i][x86_leaf] &= ~__feature_bit(x86_feature);
+ }
}
-static __always_inline void kvm_cpu_cap_set(unsigned int x86_feature)
+static __always_inline void kvm_cpu_cap_set(unsigned int x86_feature, u32 overlay_mask)
{
unsigned int x86_leaf = __feature_leaf(x86_feature);
WARN_ON_ONCE(!kvm_is_configuring_cpu_caps);
- kvm_cpu_caps[CPUID_OL_DEFAULT][x86_leaf] |= __feature_bit(x86_feature);
+ for (int i = 0; i < NR_CPUID_OL; i++) {
+ if (overlay_mask & BIT(i))
+ kvm_cpu_caps[i][x86_leaf] |= __feature_bit(x86_feature);
+ }
}
static __always_inline u32 kvm_cpu_cap_get(unsigned int x86_feature)
@@ -247,10 +253,10 @@ static __always_inline bool kvm_cpu_cap_has(unsigned int x86_feature)
return !!kvm_cpu_cap_get(x86_feature);
}
-static __always_inline void kvm_cpu_cap_check_and_set(unsigned int x86_feature)
+static __always_inline void kvm_cpu_cap_check_and_set(unsigned int x86_feature, u32 overlay_mask)
{
if (boot_cpu_has(x86_feature))
- kvm_cpu_cap_set(x86_feature);
+ kvm_cpu_cap_set(x86_feature, overlay_mask);
}
static __always_inline bool guest_pv_has(struct kvm_vcpu *vcpu,
diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c
index c2126b3c3072..6ec9c806e1fb 100644
--- a/arch/x86/kvm/svm/sev.c
+++ b/arch/x86/kvm/svm/sev.c
@@ -3014,15 +3014,15 @@ void sev_vm_destroy(struct kvm *kvm)
void __init sev_set_cpu_caps(void)
{
if (sev_enabled) {
- kvm_cpu_cap_set(X86_FEATURE_SEV);
+ kvm_cpu_cap_set(X86_FEATURE_SEV, F_CPUID_DEFAULT);
kvm_caps.supported_vm_types |= BIT(KVM_X86_SEV_VM);
}
if (sev_es_enabled) {
- kvm_cpu_cap_set(X86_FEATURE_SEV_ES);
+ kvm_cpu_cap_set(X86_FEATURE_SEV_ES, F_CPUID_DEFAULT);
kvm_caps.supported_vm_types |= BIT(KVM_X86_SEV_ES_VM);
}
if (sev_snp_enabled) {
- kvm_cpu_cap_set(X86_FEATURE_SEV_SNP);
+ kvm_cpu_cap_set(X86_FEATURE_SEV_SNP, F_CPUID_DEFAULT);
kvm_caps.supported_vm_types |= BIT(KVM_X86_SNP_VM);
}
}
diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c
index e7fdd7a9c280..7d1289f34f9f 100644
--- a/arch/x86/kvm/svm/svm.c
+++ b/arch/x86/kvm/svm/svm.c
@@ -5445,48 +5445,48 @@ static __init void svm_set_cpu_caps(void)
kvm_caps.supported_perf_cap = 0;
- kvm_cpu_cap_clear(X86_FEATURE_IBT);
+ kvm_cpu_cap_clear(X86_FEATURE_IBT, F_CPUID_DEFAULT);
/* CPUID 0x80000001 and 0x8000000A (SVM features) */
if (nested) {
- kvm_cpu_cap_set(X86_FEATURE_SVM);
- kvm_cpu_cap_set(X86_FEATURE_VMCBCLEAN);
+ kvm_cpu_cap_set(X86_FEATURE_SVM, F_CPUID_DEFAULT);
+ kvm_cpu_cap_set(X86_FEATURE_VMCBCLEAN, F_CPUID_DEFAULT);
/*
* KVM currently flushes TLBs on *every* nested SVM transition,
* and so for all intents and purposes KVM supports flushing by
* ASID, i.e. KVM is guaranteed to honor every L1 ASID flush.
*/
- kvm_cpu_cap_set(X86_FEATURE_FLUSHBYASID);
+ kvm_cpu_cap_set(X86_FEATURE_FLUSHBYASID, F_CPUID_DEFAULT);
if (nrips)
- kvm_cpu_cap_set(X86_FEATURE_NRIPS);
+ kvm_cpu_cap_set(X86_FEATURE_NRIPS, F_CPUID_DEFAULT);
if (npt_enabled)
- kvm_cpu_cap_set(X86_FEATURE_NPT);
+ kvm_cpu_cap_set(X86_FEATURE_NPT, F_CPUID_DEFAULT);
if (tsc_scaling)
- kvm_cpu_cap_set(X86_FEATURE_TSCRATEMSR);
+ kvm_cpu_cap_set(X86_FEATURE_TSCRATEMSR, F_CPUID_DEFAULT);
if (vls)
- kvm_cpu_cap_set(X86_FEATURE_V_VMSAVE_VMLOAD);
+ kvm_cpu_cap_set(X86_FEATURE_V_VMSAVE_VMLOAD, F_CPUID_DEFAULT);
if (lbrv)
- kvm_cpu_cap_set(X86_FEATURE_LBRV);
+ kvm_cpu_cap_set(X86_FEATURE_LBRV, F_CPUID_DEFAULT);
if (boot_cpu_has(X86_FEATURE_PAUSEFILTER))
- kvm_cpu_cap_set(X86_FEATURE_PAUSEFILTER);
+ kvm_cpu_cap_set(X86_FEATURE_PAUSEFILTER, F_CPUID_DEFAULT);
if (boot_cpu_has(X86_FEATURE_PFTHRESHOLD))
- kvm_cpu_cap_set(X86_FEATURE_PFTHRESHOLD);
+ kvm_cpu_cap_set(X86_FEATURE_PFTHRESHOLD, F_CPUID_DEFAULT);
if (vgif)
- kvm_cpu_cap_set(X86_FEATURE_VGIF);
+ kvm_cpu_cap_set(X86_FEATURE_VGIF, F_CPUID_DEFAULT);
if (vnmi)
- kvm_cpu_cap_set(X86_FEATURE_VNMI);
+ kvm_cpu_cap_set(X86_FEATURE_VNMI, F_CPUID_DEFAULT);
/* Nested VM can receive #VMEXIT instead of triggering #GP */
- kvm_cpu_cap_set(X86_FEATURE_SVME_ADDR_CHK);
+ kvm_cpu_cap_set(X86_FEATURE_SVME_ADDR_CHK, F_CPUID_DEFAULT);
}
if (cpu_feature_enabled(X86_FEATURE_BUS_LOCK_THRESHOLD))
@@ -5495,7 +5495,7 @@ static __init void svm_set_cpu_caps(void)
/* CPUID 0x80000008 */
if (boot_cpu_has(X86_FEATURE_LS_CFG_SSBD) ||
boot_cpu_has(X86_FEATURE_AMD_SSBD))
- kvm_cpu_cap_set(X86_FEATURE_VIRT_SSBD);
+ kvm_cpu_cap_set(X86_FEATURE_VIRT_SSBD, F_CPUID_DEFAULT);
if (enable_pmu) {
/*
@@ -5507,11 +5507,11 @@ static __init void svm_set_cpu_caps(void)
kvm_pmu_cap.num_counters_gp = min(AMD64_NUM_COUNTERS,
kvm_pmu_cap.num_counters_gp);
else
- kvm_cpu_cap_check_and_set(X86_FEATURE_PERFCTR_CORE);
+ kvm_cpu_cap_check_and_set(X86_FEATURE_PERFCTR_CORE, F_CPUID_DEFAULT);
if (kvm_pmu_cap.version != 2 ||
!kvm_cpu_cap_has(X86_FEATURE_PERFCTR_CORE))
- kvm_cpu_cap_clear(X86_FEATURE_PERFMON_V2);
+ kvm_cpu_cap_clear(X86_FEATURE_PERFMON_V2, F_CPUID_DEFAULT);
}
/* CPUID 0x8000001F (SME/SEV features) */
@@ -5521,8 +5521,8 @@ static __init void svm_set_cpu_caps(void)
* Clear capabilities that are automatically configured by common code,
* but that require explicit SVM support (that isn't yet implemented).
*/
- kvm_cpu_cap_clear(X86_FEATURE_BUS_LOCK_DETECT);
- kvm_cpu_cap_clear(X86_FEATURE_MSR_IMM);
+ kvm_cpu_cap_clear(X86_FEATURE_BUS_LOCK_DETECT, F_CPUID_DEFAULT);
+ kvm_cpu_cap_clear(X86_FEATURE_MSR_IMM, F_CPUID_DEFAULT);
kvm_setup_xss_caps();
kvm_finalize_cpu_caps();
diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
index a29896a9ef14..7879a8a532c4 100644
--- a/arch/x86/kvm/vmx/vmx.c
+++ b/arch/x86/kvm/vmx/vmx.c
@@ -8083,47 +8083,47 @@ static __init void vmx_set_cpu_caps(void)
/* CPUID 0x1 */
if (nested)
- kvm_cpu_cap_set(X86_FEATURE_VMX);
+ kvm_cpu_cap_set(X86_FEATURE_VMX, F_CPUID_DEFAULT);
/* CPUID 0x7 */
if (kvm_mpx_supported())
- kvm_cpu_cap_check_and_set(X86_FEATURE_MPX);
+ kvm_cpu_cap_check_and_set(X86_FEATURE_MPX, F_CPUID_DEFAULT);
if (!cpu_has_vmx_invpcid())
- kvm_cpu_cap_clear(X86_FEATURE_INVPCID);
+ kvm_cpu_cap_clear(X86_FEATURE_INVPCID, F_CPUID_DEFAULT);
if (vmx_pt_mode_is_host_guest())
- kvm_cpu_cap_check_and_set(X86_FEATURE_INTEL_PT);
+ kvm_cpu_cap_check_and_set(X86_FEATURE_INTEL_PT, F_CPUID_DEFAULT);
if (vmx_pebs_supported()) {
- kvm_cpu_cap_check_and_set(X86_FEATURE_DS);
- kvm_cpu_cap_check_and_set(X86_FEATURE_DTES64);
+ kvm_cpu_cap_check_and_set(X86_FEATURE_DS, F_CPUID_DEFAULT);
+ kvm_cpu_cap_check_and_set(X86_FEATURE_DTES64, F_CPUID_DEFAULT);
}
if (!enable_pmu)
- kvm_cpu_cap_clear(X86_FEATURE_PDCM);
+ kvm_cpu_cap_clear(X86_FEATURE_PDCM, F_CPUID_DEFAULT);
kvm_caps.supported_perf_cap = vmx_get_perf_capabilities();
if (!enable_sgx) {
- kvm_cpu_cap_clear(X86_FEATURE_SGX);
- kvm_cpu_cap_clear(X86_FEATURE_SGX_LC);
- kvm_cpu_cap_clear(X86_FEATURE_SGX1);
- kvm_cpu_cap_clear(X86_FEATURE_SGX2);
- kvm_cpu_cap_clear(X86_FEATURE_SGX_EDECCSSA);
+ kvm_cpu_cap_clear(X86_FEATURE_SGX, F_CPUID_DEFAULT);
+ kvm_cpu_cap_clear(X86_FEATURE_SGX_LC, F_CPUID_DEFAULT);
+ kvm_cpu_cap_clear(X86_FEATURE_SGX1, F_CPUID_DEFAULT);
+ kvm_cpu_cap_clear(X86_FEATURE_SGX2, F_CPUID_DEFAULT);
+ kvm_cpu_cap_clear(X86_FEATURE_SGX_EDECCSSA, F_CPUID_DEFAULT);
}
if (vmx_umip_emulated())
- kvm_cpu_cap_set(X86_FEATURE_UMIP);
+ kvm_cpu_cap_set(X86_FEATURE_UMIP, F_CPUID_DEFAULT);
/* CPUID 0xD.1 */
if (!cpu_has_vmx_xsaves())
- kvm_cpu_cap_clear(X86_FEATURE_XSAVES);
+ kvm_cpu_cap_clear(X86_FEATURE_XSAVES, F_CPUID_DEFAULT);
/* CPUID 0x80000001 and 0x7 (RDPID) */
if (!cpu_has_vmx_rdtscp()) {
- kvm_cpu_cap_clear(X86_FEATURE_RDTSCP);
- kvm_cpu_cap_clear(X86_FEATURE_RDPID);
+ kvm_cpu_cap_clear(X86_FEATURE_RDTSCP, F_CPUID_DEFAULT);
+ kvm_cpu_cap_clear(X86_FEATURE_RDPID, F_CPUID_DEFAULT);
}
if (cpu_has_vmx_waitpkg())
- kvm_cpu_cap_check_and_set(X86_FEATURE_WAITPKG);
+ kvm_cpu_cap_check_and_set(X86_FEATURE_WAITPKG, F_CPUID_DEFAULT);
/*
* Disable CET if unrestricted_guest is unsupported as KVM doesn't
@@ -8133,8 +8133,8 @@ static __init void vmx_set_cpu_caps(void)
*/
if (!cpu_has_load_cet_ctrl() || !enable_unrestricted_guest ||
!cpu_has_vmx_basic_no_hw_errcode_cc()) {
- kvm_cpu_cap_clear(X86_FEATURE_SHSTK);
- kvm_cpu_cap_clear(X86_FEATURE_IBT);
+ kvm_cpu_cap_clear(X86_FEATURE_SHSTK, F_CPUID_DEFAULT);
+ kvm_cpu_cap_clear(X86_FEATURE_IBT, F_CPUID_DEFAULT);
}
kvm_setup_xss_caps();
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 0a1b63c63d1a..5b830997e693 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -10024,8 +10024,8 @@ void kvm_setup_xss_caps(void)
kvm_caps.supported_xss &= ~XFEATURE_MASK_CET_ALL;
if ((kvm_caps.supported_xss & XFEATURE_MASK_CET_ALL) != XFEATURE_MASK_CET_ALL) {
- kvm_cpu_cap_clear(X86_FEATURE_SHSTK);
- kvm_cpu_cap_clear(X86_FEATURE_IBT);
+ kvm_cpu_cap_clear(X86_FEATURE_SHSTK, F_CPUID_DEFAULT);
+ kvm_cpu_cap_clear(X86_FEATURE_IBT, F_CPUID_DEFAULT);
kvm_caps.supported_xss &= ~XFEATURE_MASK_CET_ALL;
}
}
--
2.46.0
next prev parent reply other threads:[~2026-04-17 7:32 UTC|newest]
Thread overview: 28+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-17 7:35 [RFC PATCH 00/27] KVM: x86: Add a paranoid mode for CPUID verification Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 01/27] KVM: x86: Fix emulated CPUID features being applied to wrong sub-leaf Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 02/27] KVM: x86: Reorder the features for CPUID 7 Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 03/27] KVM: x86: Add definitions for CPUID overlays Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 04/27] KVM: x86: Extend F() and its variants " Binbin Wu
2026-04-17 7:35 ` Binbin Wu [this message]
2026-04-17 7:35 ` [RFC PATCH 06/27] KVM: x86: Populate TDX CPUID overlay with supported feature bits Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 07/27] KVM: x86: Support KVM_GET_{SUPPORTED,EMULATED}_CPUID as VM scope ioctls Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 08/27] KVM: x86: Thread @kvm to KVM CPU capability helpers Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 09/27] KVM: x86: Use overlays of KVM CPU capabilities Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 10/27] KVM: x86: Use vendor-specific overlay flags instead of F_CPUID_DEFAULT Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 11/27] KVM: SVM: Drop unnecessary clears of unsupported common x86 features Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 12/27] KVM: x86: Split KVM CPU cap leafs into two parts Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 13/27] KVM: x86: Add a helper to initialize CPUID multi-bit fields Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 14/27] KVM: x86: Add a helper to init multiple feature bits based on raw CPUID Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 15/27] KVM: x86: Add infrastructure to track CPUID entries ignored in paranoid mode Binbin Wu
2026-04-17 7:35 ` [RFC PATCH 16/27] KVM: x86: Init allowed masks for basic CPUID range " Binbin Wu
2026-04-17 7:36 ` [RFC PATCH 17/27] KVM: x86: Init allowed masks for extended " Binbin Wu
2026-04-17 7:36 ` [RFC PATCH 18/27] KVM: x86: Handle Centaur CPUID leafs " Binbin Wu
2026-04-17 7:36 ` [RFC PATCH 19/27] KVM: x86: Track KVM PV CPUID features for " Binbin Wu
2026-04-17 7:36 ` [RFC PATCH 20/27] KVM: x86: Add per-VM flag to track CPUID " Binbin Wu
2026-04-17 7:36 ` [RFC PATCH 21/27] KVM: x86: Make kvm_vcpu_after_set_cpuid() return an error code Binbin Wu
2026-04-17 7:36 ` [RFC PATCH 22/27] KVM: x86: Verify userspace CPUID inputs in paranoid mode Binbin Wu
2026-04-17 7:36 ` [RFC PATCH 23/27] KVM: x86: Account for runtime CPUID features " Binbin Wu
2026-04-17 7:36 ` [RFC PATCH 24/27] KVM: x86: Skip paranoid CPUID check for KVM PV leafs when base is relocated Binbin Wu
2026-04-17 7:36 ` [RFC PATCH 25/27] KVM: x86: Add new KVM_CAP_X86_CPUID_PARANOID Binbin Wu
2026-04-17 7:36 ` [RFC PATCH 26/27] KVM: x86: Add a helper to query the allowed CPUID mask Binbin Wu
2026-04-17 7:36 ` [RFC PATCH 27/27] KVM: TDX: Replace hardcoded CPUID filtering with the allowed mask Binbin Wu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260417073610.3246316-6-binbin.wu@linux.intel.com \
--to=binbin.wu@linux.intel.com \
--cc=chao.gao@intel.com \
--cc=kai.huang@intel.com \
--cc=kvm@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=rick.p.edgecombe@intel.com \
--cc=seanjc@google.com \
--cc=xiaoyao.li@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox