Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp3999596imm; Mon, 14 May 2018 00:44:03 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpcnCrXblfIsWCpmWbou2jB/ZITT6KC0e+bXcQcNUNNvvG5ZeGSV0JgD85B9e4jLBZSnZJ9 X-Received: by 2002:a65:5288:: with SMTP id y8-v6mr7704377pgp.69.1526283843889; Mon, 14 May 2018 00:44:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526283843; cv=none; d=google.com; s=arc-20160816; b=oX+ffztLgMZtQEVWEL5oBP9WT22mIWIUKu1DKOC0upQ3pS0RK66/rB1sPYh/jm5ZZk DOTRY2DuhYiNrlM4KIst0mmWAD8Zp9xB7ec/CghzVCDEWGue1Dfn9WjwdSyf5YM2wYEE SuhtOtgY8vx0o8+m+lctAe8P9csXw8fHVWpKWeRlRnJRU0BNKpHrEZTcLQwWvaGwI7/e 1I3jV+09q570ERd55Ui+r4SOtZGTb8KY8vAQIgasQ46/w6mykT9rzxNKyt8KNHRfUU2Y W/P3pxJhCB4sMx5VrwMu0X49/ZvPocexjwDVmNCSyU1ABDAc3LE3YGdR+PXpICl+JPy1 hDNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=QFUwpjtnGYATUGIFGIbTtRfRGypHo2p7oYxnzkKWtus=; b=DdbqS7ornEh+hDoWNr0ojgKCCLWJW0a6f971UbxaanSRxlPKrMdxUAmutV49/qTRxq BvTtPBgoTbQnQ2SvzdEJDKGea/wqY+8BpsYhq/kXdwYXzkGDymVBy7OQLcH1DlJ3ERSM bskI0fNgRBVIElJP46bNB0G47lSlvYW3EO6YoLgwaascivSJUh2agm7wmZMd7G/KKW1t txvezKSInDH8D26tNiYBf/sDg928tMaPrYMwkOmphIaKaXip7RFKt/pVT4vBzac9W0/w aeqQEx4sPCNVDymMpwSAnqH8GjoX+afOhTsak1BczCo7xjjF9xSninnGaj3wUdfYUJPV 2EYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XGyd2Ooa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u8-v6si9292254plz.392.2018.05.14.00.43.49; Mon, 14 May 2018 00:44:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XGyd2Ooa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752646AbeENHmm (ORCPT + 99 others); Mon, 14 May 2018 03:42:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:58402 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752543AbeENGvw (ORCPT ); Mon, 14 May 2018 02:51:52 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 28C1521738; Mon, 14 May 2018 06:51:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1526280711; bh=fDhxbAlc5fGFJFtogDePJncdj4UqRQnlvN3cLA4TIws=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XGyd2OoaQnD/CDbEMxkp4N77gm7Tm/rPpUwgPCyayF4KL0ZY8TyO8ZP9/PjW45sor 2efH6pbVXxdRuV3Tbd3yoCyc1He5ogKAE0NHhDiX1TX4MaMlarGZijUBn7nWDd83+h rsE9/Kra7AhAGnqXoBpkbTQJbf5TPd2Am29QnNcs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexander Yarygin , David Hildenbrand , Christian Borntraeger Subject: [PATCH 4.4 03/56] KVM: s390: Enable all facility bits that are known good for passthrough Date: Mon, 14 May 2018 08:48:08 +0200 Message-Id: <20180514064755.186646235@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180514064754.853201981@linuxfoundation.org> References: <20180514064754.853201981@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Alexander Yarygin commit ed8dda0bf74b4fb8e73d8880c78effabd3285fd8 upstream. Some facility bits are in a range that is defined to be "ok for guests without any necessary hypervisor changes". Enable those bits. Signed-off-by: Alexander Yarygin Reviewed-by: David Hildenbrand Signed-off-by: Christian Borntraeger Signed-off-by: Greg Kroah-Hartman --- arch/s390/kvm/kvm-s390.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/arch/s390/kvm/kvm-s390.c +++ b/arch/s390/kvm/kvm-s390.c @@ -118,8 +118,8 @@ struct kvm_stats_debugfs_item debugfs_en /* upper facilities limit for kvm */ unsigned long kvm_s390_fac_list_mask[] = { - 0xffe6fffbfcfdfc40UL, - 0x005e800000000000UL, + 0xffe6ffffffffffffUL, + 0x005effffffffffffUL, }; unsigned long kvm_s390_fac_list_mask_size(void)