Received: by 2002:ac0:b08d:0:0:0:0:0 with SMTP id l13csp4923480imc; Mon, 25 Feb 2019 13:44:04 -0800 (PST) X-Google-Smtp-Source: AHgI3IZzgDSEQE7c+SOsJYhu+duWxjLmCoGK3VMlW2khKVDnxKUAKT527ziDkbwVoUthF75Vq9OM X-Received: by 2002:a63:d703:: with SMTP id d3mr21202776pgg.167.1551131044277; Mon, 25 Feb 2019 13:44:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551131044; cv=none; d=google.com; s=arc-20160816; b=PDPdcnSd/HWzanCgiAjL4GkUKf2Hy2xhsSsniV0pcG/fspwob0Wv9r4z9FoAVq3PF1 OORWLouMBhsH89V5pIsxIdCu+eWSVyNB9vBfzIDXg16KBndjEXbZlbaEvELvGy2Fgifz xWITl5AOyTlOlrZw0dutXM0vzJxa77pA2AnCpfURGeBWwlnxBSont7XcpTzG+4fXa8qa SoES8YRRMw+kn9F14ojkrbu7aeN2g+LDHdICDFERA3o+GFk6yu6l5JU77+XNk80AK2yW EIuSGdQu1s2gdEf5rFpQ2UlznPHP3e1uG7DEN1GnrwtaDpuPY+DJiJkSTX4Aj9yAO5aF Hiow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=rlsafDIb+F2Zj3pRhykLnhdHAhgTLeDlzMvJoeeGeqw=; b=sSREE0NsIcW3CQA+/+b6cVeEqZAPpP49+QzGdNsgZB8/U0u2IUTlv1RmqXW8t++GfT E3oEinFsgdMnh2lMUesMZFCKZwoqlIxK4fUgLXWVcc8WdtJh8qBJ6UAm3dtMULC5SphJ fudpR5nsdK1pu9Rlw1y4bje2ti5jJyv6qB+VhLN8hwutaDchy29eCRehcSN7HYRZlqhq rKdk3cGm1A0PNysXGsDcdJRiYP6Xhc0fI12ngzNqh6em9R18Rql6bPavRtBRfk2iC+Mt pWdb/K4sNA7GlxRmZxtqpGLbAjLOYD2Tn5Vsb0/xugSqtolU886OzcBMfA6X507QrWdW w38w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jlcP3YkI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k16si7555225pfj.174.2019.02.25.13.43.48; Mon, 25 Feb 2019 13:44:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jlcP3YkI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730034AbfBYVcG (ORCPT + 99 others); Mon, 25 Feb 2019 16:32:06 -0500 Received: from mail.kernel.org ([198.145.29.99]:37586 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729939AbfBYVcC (ORCPT ); Mon, 25 Feb 2019 16:32:02 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2430121841; Mon, 25 Feb 2019 21:32:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1551130321; bh=mt4I40V4RhhcAojjl14RGeniD6Q2Ap4DNRBIsawmMdw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=jlcP3YkIhUwTqlGbng2ICQBXfIXc0tQO2O3N6ipk5QD5ZTGL6ETB6lskv09hVG/o6 5HfyrxOJ/NQ3WdcSMwgMgQQ5zbkbpGsfKYnHabOYmf+gETiLJgJFdGjO5s8G+BpPYz xgE64uF7ptyHUE2CaL1PdJlDdhpEIKQevopoBJZk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Talons Lee , Juergen Gross , Boris Ostrovsky , Sasha Levin Subject: [PATCH 4.20 084/183] always clear the X2APIC_ENABLE bit for PV guest Date: Mon, 25 Feb 2019 22:10:57 +0100 Message-Id: <20190225195108.631680562@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190225195054.748060397@linuxfoundation.org> References: <20190225195054.748060397@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 5268c8f39e0efef81af2aaed160272d9eb507beb ] Commit e657fcc clears cpu capability bit instead of using fake cpuid value, the EXTD should always be off for PV guest without depending on cpuid value. So remove the cpuid check in xen_read_msr_safe() to always clear the X2APIC_ENABLE bit. Signed-off-by: Talons Lee Reviewed-by: Juergen Gross Signed-off-by: Boris Ostrovsky Signed-off-by: Sasha Levin --- arch/x86/xen/enlighten_pv.c | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c index 2f6787fc71066..c54a493e139a7 100644 --- a/arch/x86/xen/enlighten_pv.c +++ b/arch/x86/xen/enlighten_pv.c @@ -898,10 +898,7 @@ static u64 xen_read_msr_safe(unsigned int msr, int *err) val = native_read_msr_safe(msr, err); switch (msr) { case MSR_IA32_APICBASE: -#ifdef CONFIG_X86_X2APIC - if (!(cpuid_ecx(1) & (1 << (X86_FEATURE_X2APIC & 31)))) -#endif - val &= ~X2APIC_ENABLE; + val &= ~X2APIC_ENABLE; break; } return val; -- 2.19.1