From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2C9B9C433EF for ; Wed, 23 Mar 2022 17:07:34 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245690AbiCWRJB (ORCPT ); Wed, 23 Mar 2022 13:09:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57694 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237903AbiCWRJA (ORCPT ); Wed, 23 Mar 2022 13:09:00 -0400 Received: from galois.linutronix.de (Galois.linutronix.de [IPv6:2a0a:51c0:0:12e:550::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B68D876E3D; Wed, 23 Mar 2022 10:07:29 -0700 (PDT) From: Thomas Gleixner DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1648055248; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=o4Lz164WNYxm3inB0nQDx15OPnuCNYaulpad8GE61YQ=; b=lwwfyySfgTNDChQE4BBU1+lpMvW+qzxGwxjrvVHY+ntUQpznYpO+PaZWcBd0jrsv0fPWY7 fej4b5fpMvqXzlPRf+EGWwliU8Ft+InoYQvxoNg1+dXl6BFWCVD/68OZ9/SnVWb4Sv04w1 CBjpew1Z1bCqj40F1JhJ3wIW2hwol00LOCswWRNRmlqcMKYaiDUKRIPDCdbCIg0dUzO3NX 7KdjvplqQ5o4A0SnFXINyY3SGvONMq7pgSlghjukqYIFhjTyWe72+Zq3Fwu6GSTDhLUJfi rKwdREzGhLOKIGMOZTCuseSZ0unWpEyQIpoC8URqTWjJyEyOaAuk46ii8u3yaQ== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1648055248; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=o4Lz164WNYxm3inB0nQDx15OPnuCNYaulpad8GE61YQ=; b=n4J7aE7wXaJxIQ5Tlr1yY7xXwjAuuiBo7p2kwGkL5z2ZDLO3DPV+t+JjWPpgBbKMx+eCWG j7vlcW+9GtFCLbBw== To: Paolo Bonzini , dave.hansen@linux.intel.com Cc: yang.zhong@intel.com, ravi.v.shankar@intel.com, mingo@redhat.com, "Chang S. Bae" , bp@alien8.de, x86@kernel.org, linux-kernel@vger.kernel.org, KVM list Subject: Re: ping Re: [PATCH v4 0/2] x86: Fix ARCH_REQ_XCOMP_PERM and update the test In-Reply-To: <01c86f82-0c61-94c1-602c-f62d176c9ad7@gnu.org> References: <20220129173647.27981-1-chang.seok.bae@intel.com> <87a6dgam7b.ffs@tglx> <877d8kakwg.ffs@tglx> <01c86f82-0c61-94c1-602c-f62d176c9ad7@gnu.org> Date: Wed, 23 Mar 2022 18:07:27 +0100 Message-ID: <87zglg8unk.ffs@tglx> MIME-Version: 1.0 Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 23 2022 at 15:24, Paolo Bonzini wrote: > On 3/23/22 13:55, Thomas Gleixner wrote: >> --- a/arch/x86/kernel/fpu/xstate.c >> +++ b/arch/x86/kernel/fpu/xstate.c >> @@ -1625,6 +1625,8 @@ static int __xstate_request_perm(u64 per >> >> /* Calculate the resulting kernel state size */ >> mask = permitted | requested; >> + /* Take supervisor states into account */ >> + mask |= xfeatures_mask_supervisor(); >> ksize = xstate_calculate_size(mask, compacted); >> > > This should be only added in for the !guest case. Yes, I figured that out already :)