[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <01c86f82-0c61-94c1-602c-f62d176c9ad7@gnu.org>
Date: Wed, 23 Mar 2022 15:24:16 +0100
From: Paolo Bonzini <bonzini@....org>
To: Thomas Gleixner <tglx@...utronix.de>, dave.hansen@...ux.intel.com
Cc: yang.zhong@...el.com, ravi.v.shankar@...el.com, mingo@...hat.com,
"Chang S. Bae" <chang.seok.bae@...el.com>, bp@...en8.de,
x86@...nel.org, linux-kernel@...r.kernel.org,
KVM list <kvm@...r.kernel.org>
Subject: Re: ping Re: [PATCH v4 0/2] x86: Fix ARCH_REQ_XCOMP_PERM and update
the test
On 3/23/22 13:55, Thomas Gleixner wrote:
> --- a/arch/x86/kernel/fpu/xstate.c
> +++ b/arch/x86/kernel/fpu/xstate.c
> @@ -1625,6 +1625,8 @@ static int __xstate_request_perm(u64 per
>
> /* Calculate the resulting kernel state size */
> mask = permitted | requested;
> + /* Take supervisor states into account */
> + mask |= xfeatures_mask_supervisor();
> ksize = xstate_calculate_size(mask, compacted);
>
This should be only added in for the !guest case.
Paolo
Powered by blists - more mailing lists