> -----Original Message----- > From: Jim Mattson <jmattson@xxxxxxxxxx> > Sent: Thursday, September 29, 2022 3:52 PM > To: kvm@xxxxxxxxxxxxxxx; pbonzini@xxxxxxxxxx; Christopherson,, Sean > <seanjc@xxxxxxxxxx> > Cc: Jim Mattson <jmattson@xxxxxxxxxx> > Subject: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H > > KVM_GET_SUPPORTED_CPUID should only enumerate features that KVM > actually supports. CPUID.80000006H:EDX[17:16] are reserved bits and should > be masked off. > > Fixes: 43d05de2bee7 ("KVM: pass through CPUID(0x80000006)") > Signed-off-by: Jim Mattson <jmattson@xxxxxxxxxx> > --- > arch/x86/kvm/cpuid.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index > ea4e213bcbfb..90f9c295825d 100644 > --- a/arch/x86/kvm/cpuid.c > +++ b/arch/x86/kvm/cpuid.c > @@ -1125,6 +1125,7 @@ static inline int __do_cpuid_func(struct > kvm_cpuid_array *array, u32 function) > break; > case 0x80000006: > /* L2 cache and TLB: pass through host info. */ > + entry->edx &= ~GENMASK(17, 16); SDM of Intel CPU says the edx is reserved=0. I must miss something. BTW, for those reserved bits, their meaning is not defined, and the VMM should not depend on them IMO. What is the problem if hypervisor returns none-zero value? Thanks Eddie > break; > case 0x80000007: /* Advanced power management */ > /* invariant TSC is CPUID.80000007H:EDX[8] */ > -- > 2.38.0.rc1.362.ged0d419d3c-goog