From patchwork Fri Jan 25 22:06:04 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Eduardo Habkost X-Patchwork-Id: 10782081 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 40EA61399 for ; Fri, 25 Jan 2019 22:06:12 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 2B49F3083D for ; Fri, 25 Jan 2019 22:06:12 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 1B6BF308F7; Fri, 25 Jan 2019 22:06:12 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.9 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 103B63083D for ; Fri, 25 Jan 2019 22:06:11 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726589AbfAYWGJ (ORCPT ); Fri, 25 Jan 2019 17:06:09 -0500 Received: from mx1.redhat.com ([209.132.183.28]:60768 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726218AbfAYWGJ (ORCPT ); Fri, 25 Jan 2019 17:06:09 -0500 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 347637266E; Fri, 25 Jan 2019 22:06:09 +0000 (UTC) Received: from localhost (ovpn-116-63.gru2.redhat.com [10.97.116.63]) by smtp.corp.redhat.com (Postfix) with ESMTP id 9B657101E5A5; Fri, 25 Jan 2019 22:06:08 +0000 (UTC) From: Eduardo Habkost To: qemu-devel@nongnu.org Cc: Paolo Bonzini , =?utf-8?b?UmFkaW0gS3LEjW3DocWZ?= , kvm@vger.kernel.org, Eduardo Habkost , Robert Hoo , Richard Henderson , Marcelo Tosatti , Tao Xu Subject: [PATCH 0/2] i386: arch_capabilities fixes + migratability Date: Fri, 25 Jan 2019 20:06:04 -0200 Message-Id: <20190125220606.4864-1-ehabkost@redhat.com> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Fri, 25 Jan 2019 22:06:09 +0000 (UTC) Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP This series works around KVM bugs that affect the arch_capabilities feature. One bug made the feature be enabled incorrect on AMD hosts, and another one made the feature unsafe to enable on most Intel hosts. With the work around, we can finally make arch_capabilities a migratable feature. Unfortunately, the work around has the side effect of making arch_capabilities unavailable on hosts without hardware support for the feature until one of the KVM bugs is fixed. Eduardo Habkost (2): i386: kvm: Disable arch_capabilities if MSR can't be set i386: Make arch_capabilities migratable target/i386/cpu.c | 1 - target/i386/kvm.c | 9 +++++++++ 2 files changed, 9 insertions(+), 1 deletion(-)