From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.3 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4B9A7ECE58D for ; Wed, 9 Oct 2019 21:40:57 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 33E2D20640 for ; Wed, 9 Oct 2019 21:40:57 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732004AbfJIVkx (ORCPT ); Wed, 9 Oct 2019 17:40:53 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:52328 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731553AbfJIVkx (ORCPT ); Wed, 9 Oct 2019 17:40:53 -0400 Received: from bigeasy by Galois.linutronix.de with local (Exim 4.80) (envelope-from ) id 1iIJhQ-0002DT-Cs; Wed, 09 Oct 2019 23:40:48 +0200 Date: Wed, 9 Oct 2019 23:40:48 +0200 From: Sebastian Andrzej Siewior To: Paolo Bonzini Cc: Sasha Levin , linux-kernel@vger.kernel.org, stable@vger.kernel.org, kvm@vger.kernel.org Subject: Re: [PATCH AUTOSEL 5.3 28/68] KVM: x86: Expose XSAVEERPTR to the guest Message-ID: <20191009214048.irolhz4rwfdiqf2e@linutronix.de> References: <20191009170547.32204-1-sashal@kernel.org> <20191009170547.32204-28-sashal@kernel.org> <05acd554-dd0a-d7cd-e17c-90627fa0ec67@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <05acd554-dd0a-d7cd-e17c-90627fa0ec67@redhat.com> User-Agent: NeoMutt/20180716 Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On 2019-10-09 23:15:07 [+0200], Paolo Bonzini wrote: > > --- a/arch/x86/kvm/cpuid.c > > +++ b/arch/x86/kvm/cpuid.c > > @@ -479,6 +479,7 @@ static inline int __do_cpuid_func(struct kvm_cpuid_entry2 *entry, u32 function, > > > > /* cpuid 0x80000008.ebx */ > > const u32 kvm_cpuid_8000_0008_ebx_x86_features = > > + F(XSAVEERPTR) | > > F(WBNOINVD) | F(AMD_IBPB) | F(AMD_IBRS) | F(AMD_SSBD) | F(VIRT_SSBD) | > > F(AMD_SSB_NO) | F(AMD_STIBP) | F(AMD_STIBP_ALWAYS_ON); > > > > > > Yet another example of a patch that shouldn't be stable material (in > this case it's fine, but there can certainly be cases where just adding > a single flag depends on core kernel changes). Also, taking advantage of this feature requires changes which just landed in qemu's master branch. > Paolo Sebastian