From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-dl1-f47.google.com (mail-dl1-f47.google.com [74.125.82.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AEC0342EED8 for ; Wed, 13 May 2026 12:49:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=74.125.82.47 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778676549; cv=none; b=pvmOCUVCjFWtGp30G7awIT8JdN5oh3coZEhmrrKscENLtp0efosQcfd7blBjRRu0wnZvSapcq+auLGtZTQyBQ98TKvD1rOXBLH6YSCl4S1JBOo9PMqf+LojGc7bD+XysK09+mY+C4JV/oiHh26ZnbG1JfmqyxS2CLTbhPIEZ/XQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778676549; c=relaxed/simple; bh=msb6kSwfYjtLrK6yh4A/4jW6Efwpn03Z7DhCQJ9v1j8=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=qNuV8NVN6So0mJabyZstt4/OuvylSMF+nDoCbvKGrK16+GACc3sFw9GPRf5tdP6u2Z8rJgjPIgHLav1Y2dN1AKOqcoDUlnorf46HP2mfwvQ+tYJf67/dYPkZA0atAygl75taDDakPZti9jcxA/TRX8V7CkpywVLWjFFCJfa4hqY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=Uo9s1RH1; arc=none smtp.client-ip=74.125.82.47 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="Uo9s1RH1" Received: by mail-dl1-f47.google.com with SMTP id a92af1059eb24-12c88e5f4aeso3903054c88.0 for ; Wed, 13 May 2026 05:49:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778676547; x=1779281347; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=Yuxzue6n4LxKbQsyok/03Qurt5Jav9jZzMMI1LVz9Kw=; b=Uo9s1RH1Xd9WvH2CrmzbqCt9I7sYNknx7zujdeOkKh6i90STCYPqXZl5al2mp+FEs5 VHS2lZlbKEC4FAYQTzIzvd0vUxtPNMjJupvF/mWsZKpgtEf3VSWk3hTnwAhUFBcdXr79 7DxezbONgQxnWTZ3ORYWJirkMutiuzNMECOFLJdlndaRcoCzNNEeVEuSNLLxz5F/fEtF tE8RbhjFcR9ihd411xUk74D5725ga8yLPG9UNJy4R9sCI+rmEepz1SMu1dDM/wuK1pv/ QQBgnUz7AsadUD8Xkqj/6JPzi8nUy5FQsjy1dQ/NFQZlVdlV+BP/yEqQVWi/Oi6QGZC1 K6LA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778676547; x=1779281347; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=Yuxzue6n4LxKbQsyok/03Qurt5Jav9jZzMMI1LVz9Kw=; b=koSMjHeN9ic3cDEl3FJFZYh3jcGfskl3tuq885cXaJj/Sw4Dhno2GBn9jqTHkVm9KW ZSfBD0ia9oWhtiSYGUOO4Z/Dh3ldPxqfznZT7/kTvCjMtOCTQuSvkjUfiAVWLNTDHq0E eJMYHd1gSWHlT+M5xSkdEyoi2A6joNphOdOv0tmDkRvfdh9g50b9rKJKRjBP5B3ojYeE 81duKJXN4GfAqOGZ0SkjFRm+ChhHaCPuX9rTFO3v3SKTusVIMJqi/AubF9fCXSAK9Hgd zvMdu6v+VkF3CMzAeMRbAjsoLSAsH/ixmgAu2q2u4gUKxeuB5/9A8ICWoku6gfpsHshy 4aaA== X-Forwarded-Encrypted: i=1; AFNElJ+6Da/QxMN3B+iB53u+Wkt0l+Wl6jZC/6C3GHzXV9ymLtqbuxYA3C4k/QpDBvkbWKH2cF8k82RI5YNX2+Q=@vger.kernel.org X-Gm-Message-State: AOJu0YxZOyYDJ/D96apqbDJyaG3XkFItxEm2134QEQshw8qeBXrDqI1Z fzkOXUP2JIka3sSRW3oZGunw5vqX4v+Up+8F12M3szFj3vT8kaTVoux9hqIWYDUhlI4= X-Gm-Gg: Acq92OFCpA8/yHhUyWIp6+5Otq12jm0HyzmFD+zslQpydmHUjga8aiDbqWRNNaj6pkn fO6jEAVqOMA3ZZbxbCqp/3FKxgQrmiago/lefU/7VwW8Myu08fia96Tgpkjll8N87r+p0QvlVg5 JQyIMeK31wMOpT90MxdhQ1nZ/uFmBtkKW7WZDhmDlXjdpg5ej2TNnq03VBAU2GnSNNiyNQQpEbD koCAtl+77ffcnKWkkizoNW3QN8DeOtbrSLLuzVX6X+SMnIKikACtgpNnvauWwmpGfMbRy5GIv0M JGlH9pWYhGj8Os49Pxhk9r20KqkdPxQv1ZkCRkZvwqiFtSy7956fxJ0unuk16Fe9Pqft+g39idx E7/4FipxdkgCdCpzpK7ayyEaKSxk2rmv69UbgJALYCWUq4JVhcrjPvmDVsbyjRl/7nrZuX6Sqhe /8tGTMX+3VgvEqnozOMmkicPGzMJM9KdRbxh3IDpP2 X-Received: by 2002:a05:701b:2303:b0:134:74a6:7db1 with SMTP id a92af1059eb24-13474a67ecdmr911411c88.20.1778676546790; Wed, 13 May 2026 05:49:06 -0700 (PDT) Received: from ewan-server.zhaoxin.com ([154.26.185.247]) by smtp.gmail.com with ESMTPSA id a92af1059eb24-134b4e153dbsm1066142c88.12.2026.05.13.05.49.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 May 2026 05:49:06 -0700 (PDT) From: Ewan Hai To: seanjc@google.com, pbonzini@redhat.com, tglx@kernel.org, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Cc: cobechen@zhaoxin.com, tonywwang@zhaoxin.com Subject: [PATCH v1 5/5] KVM: x86: Expose Zhaoxin RSA CPUID feature Date: Wed, 13 May 2026 20:48:46 +0800 Message-Id: <20260513124846.1622462-6-ewandevelop@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20260513124846.1622462-1-ewandevelop@gmail.com> References: <20260513124846.1622462-1-ewandevelop@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Advertise the Zhaoxin big-number arithmetic engine to guests via CPUID 0xC0000001 EDX bits 27 (RSA) and 28 (RSA_EN). The RSA feature provides two user-mode instructions for modular arithmetic on big integers, documented in the Zhaoxin PadLock Instruction Reference, chapter 4 ("Modular Multiplication and Exponentiation Engine"). Both support operand sizes from 256 to 32768 bits (in 128-bit increments): - REP XMODEXP (encoding F3 0F A6 F8, subsection 4.1) computes A^B mod M - REP MONTMUL2 (encoding F3 0F A6 F0, subsection 4.2) computes A*B mod M REP MONTMUL2 is the long-mode replacement of legacy REP MONTMUL, which is restricted to compatibility and 32-bit protected modes. These primitives accelerate RSA and related public-key operations. Both instructions are user-mode and available in all CPU modes, with no associated MSR control. The RSA and RSA_EN bits are redundant by hardware design (set or cleared together) and both serve purely as CPUID-level feature-presence reporting flags requiring no KVM emulation. Both bits are advertised because different software may probe either one when checking for RSA availability. Signed-off-by: Ewan Hai --- arch/x86/kvm/cpuid.c | 2 ++ arch/x86/kvm/reverse_cpuid.h | 2 ++ 2 files changed, 4 insertions(+) diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index 3fb81f7a6107..94ea9abae566 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -1290,6 +1290,8 @@ void kvm_initialize_cpu_caps(void) F(RNG2_EN), F(PHE2), F(PHE2_EN), + F(RSA), + F(RSA_EN), ); /* diff --git a/arch/x86/kvm/reverse_cpuid.h b/arch/x86/kvm/reverse_cpuid.h index f28300c2d5e0..0df96ff9515c 100644 --- a/arch/x86/kvm/reverse_cpuid.h +++ b/arch/x86/kvm/reverse_cpuid.h @@ -85,6 +85,8 @@ #define X86_FEATURE_RNG2_EN KVM_X86_FEATURE(CPUID_C000_0001_EDX, 23) #define X86_FEATURE_PHE2 KVM_X86_FEATURE(CPUID_C000_0001_EDX, 25) #define X86_FEATURE_PHE2_EN KVM_X86_FEATURE(CPUID_C000_0001_EDX, 26) +#define X86_FEATURE_RSA KVM_X86_FEATURE(CPUID_C000_0001_EDX, 27) +#define X86_FEATURE_RSA_EN KVM_X86_FEATURE(CPUID_C000_0001_EDX, 28) struct cpuid_reg { u32 function; -- 2.34.1