From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-dy1-f169.google.com (mail-dy1-f169.google.com [74.125.82.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5B1093EFD0C for ; Wed, 13 May 2026 09:36:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=74.125.82.169 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778665017; cv=none; b=aoohUrXwE4YYfv4nVW1k2CGTGPkFCJ37K6OE1LL5tG2qK96SRwGsMtflXCaxIkwihMMZ2cAw5rQJ0NyAMOuXj6DuZFaFP7j+ub0Vu6OSHny+zmfbGnxdReziPst8bkRJBPAedQ675dRd0coT5cvMW83CoG1T6YZwIkVToxco/70= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778665017; c=relaxed/simple; bh=msb6kSwfYjtLrK6yh4A/4jW6Efwpn03Z7DhCQJ9v1j8=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=GzvVV7mtHwghib4XxJ9nxe7WVOMnJW63oS4yD89HF+hYLi9Zme2ILYZTYsYjyoX/bdYB/CFlnaNRreaS+0vkcZ/3+lDFIrwLJbOVgtSp1R6ea83YP9VtolO6XNRaT7XK4f3nAfr4U9VLt0CcDbNwZeszIPj+2wGTaoCvVFRP9Vg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=mJF15GFs; arc=none smtp.client-ip=74.125.82.169 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="mJF15GFs" Received: by mail-dy1-f169.google.com with SMTP id 5a478bee46e88-2f03d6cf77bso7376557eec.0 for ; Wed, 13 May 2026 02:36:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778665015; x=1779269815; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=Yuxzue6n4LxKbQsyok/03Qurt5Jav9jZzMMI1LVz9Kw=; b=mJF15GFsjYuSijZ+XJsWbgGd/MZH3IyCGS0HfmuzdD20DuQhJ+y3dzsa7ZcSGb0OuU r/sMmIhsqIFu/RvMMXTZRpHaZKLQG5rPZnc2mxDLAUaz4tqZvRGpauW0CbZDxir5QgLH XGdf0vF1L3phAhrJNNLFSpVfhwSyhStS2RPmxFHMnpo5P97bgyq7pqPSiQyliqWyFtbW J8zH3AMqoUfi9j/LTenNp3fzJx4Pih3wALS6tcPeJJ0cdBwCJNM90eUtuiW0DLC1I6ij 6o/4qyZneRqZ1PKuPrG7lO9eUdsSEUY8OT4zrNEyUgbLcRfnJu3SmP+J0o4fyQO2tS7Y QTvg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778665015; x=1779269815; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=Yuxzue6n4LxKbQsyok/03Qurt5Jav9jZzMMI1LVz9Kw=; b=ni9kQ2JnJ9J/AoYA0iZ+lvLjbdurca0ynKydCI/sfWTX+z7Z60wF8SbmrAeh6JHohS d4WlliUKetquI6LP3ITlYOsgZjwHaNqQxa9J0itSDrQnoGW6yuk/Jlt0JpS4u2nIdpYe QQjtZTvrtzcHA26Ll5v77vPGg+jsrz8j3U/xQdzr3BPvxWGGS7pOiOf7pNUxC9t70HHZ TkU7R51bXiQOUZqc167QpkKNXFavHDRYfPj652O8R7zv3cWn3rE2PvYUsjLx+9NK748s 5Xb6p/JKXcaQ5dhtzXbZutAQ1DysSHXjBt20WBBseNJKmwjZbsLPta1k9XwNBlkUgXj9 aTXQ== X-Forwarded-Encrypted: i=1; AFNElJ843vfGxjXxU4wi63N6a7Ww5U1f+DgJ8WjppZXR2lqWZXdGwgpnNjRaT3b24LCCq+gbHXVdvt3KODNaGIw=@vger.kernel.org X-Gm-Message-State: AOJu0Yx5Dhc5tkaZZ02doJoaJfyl2uNURSUCXu95oZ4WuQV4CrV5HwZe MxUfPnhMxdsBGvYU0ne9ksBRWr2agHwiW5aLHtgYFiXozXEengFbNd8k X-Gm-Gg: Acq92OGfPhrJaqZmiuCKoCeuRisHA925W+97DKWoV7ZpP7VUJav2QwAni+I3+z8v40/ oAIpIK1+9AbwuxJqSLZuJN3x/aY603JIMDzWbBvP5SU0nPrDzrGyttPIaRc5942sgdRu9/l52t+ 9wgMnaUcKs4R4vmMW//TdKLaSTqTjNA7CGYtvcbRWrlh8RsUrAyJAv2tUXYh3CFYsciNUc+3m02 YHEHBuAIL5B7TyX0WohAOhWC5v51XIE5pE0QBrMoCy8hjdmpl0i40FraGFsw0PF5BvB6Qz71I04 8ihnpo5i1hAkoKTbueI7JuSJNeczqlUQL/eRy7TkuhCm7prknpsgikJBW+dXWQtgwcGX4rj3Bc6 QVZfNLCs8zplW55bpngadkqi8lhloNEGrQ69Onb0g3kLi9srP1GBAWqlRVzBW7A0UX36RQxZgD3 G6kL+iJm6AeWWDWFCkRil6KAZ0cihFOCKkNbb0L0xGdd9H8UG/ljE= X-Received: by 2002:a05:693c:2d96:b0:2c1:7793:7bbb with SMTP id 5a478bee46e88-30119f60607mr1454106eec.27.1778665015458; Wed, 13 May 2026 02:36:55 -0700 (PDT) Received: from ewan-server.zhaoxin.com ([154.26.185.247]) by smtp.gmail.com with ESMTPSA id 5a478bee46e88-2f8859eb4b7sm22100439eec.2.2026.05.13.02.36.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 May 2026 02:36:55 -0700 (PDT) From: Ewan Hai To: seanjc@google.com, pbonzini@redhat.com, tglx@kernel.org, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Cc: cobechen@zhaoxin.com, tonywwang@zhaoxin.com Subject: [PATCH 5/5] KVM: x86: Expose Zhaoxin RSA CPUID feature Date: Wed, 13 May 2026 17:36:33 +0800 Message-Id: <20260513093633.1608334-6-ewandevelop@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20260513093633.1608334-1-ewandevelop@gmail.com> References: <20260513093633.1608334-1-ewandevelop@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Advertise the Zhaoxin big-number arithmetic engine to guests via CPUID 0xC0000001 EDX bits 27 (RSA) and 28 (RSA_EN). The RSA feature provides two user-mode instructions for modular arithmetic on big integers, documented in the Zhaoxin PadLock Instruction Reference, chapter 4 ("Modular Multiplication and Exponentiation Engine"). Both support operand sizes from 256 to 32768 bits (in 128-bit increments): - REP XMODEXP (encoding F3 0F A6 F8, subsection 4.1) computes A^B mod M - REP MONTMUL2 (encoding F3 0F A6 F0, subsection 4.2) computes A*B mod M REP MONTMUL2 is the long-mode replacement of legacy REP MONTMUL, which is restricted to compatibility and 32-bit protected modes. These primitives accelerate RSA and related public-key operations. Both instructions are user-mode and available in all CPU modes, with no associated MSR control. The RSA and RSA_EN bits are redundant by hardware design (set or cleared together) and both serve purely as CPUID-level feature-presence reporting flags requiring no KVM emulation. Both bits are advertised because different software may probe either one when checking for RSA availability. Signed-off-by: Ewan Hai --- arch/x86/kvm/cpuid.c | 2 ++ arch/x86/kvm/reverse_cpuid.h | 2 ++ 2 files changed, 4 insertions(+) diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index 3fb81f7a6107..94ea9abae566 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -1290,6 +1290,8 @@ void kvm_initialize_cpu_caps(void) F(RNG2_EN), F(PHE2), F(PHE2_EN), + F(RSA), + F(RSA_EN), ); /* diff --git a/arch/x86/kvm/reverse_cpuid.h b/arch/x86/kvm/reverse_cpuid.h index f28300c2d5e0..0df96ff9515c 100644 --- a/arch/x86/kvm/reverse_cpuid.h +++ b/arch/x86/kvm/reverse_cpuid.h @@ -85,6 +85,8 @@ #define X86_FEATURE_RNG2_EN KVM_X86_FEATURE(CPUID_C000_0001_EDX, 23) #define X86_FEATURE_PHE2 KVM_X86_FEATURE(CPUID_C000_0001_EDX, 25) #define X86_FEATURE_PHE2_EN KVM_X86_FEATURE(CPUID_C000_0001_EDX, 26) +#define X86_FEATURE_RSA KVM_X86_FEATURE(CPUID_C000_0001_EDX, 27) +#define X86_FEATURE_RSA_EN KVM_X86_FEATURE(CPUID_C000_0001_EDX, 28) struct cpuid_reg { u32 function; -- 2.34.1