Hi Paolo, On Mon, Nov 24, 2014 at 05:43:32PM +0100, Paolo Bonzini wrote: >The first patch ensures that XSAVES is not exposed in the guest until >we emulate MSR_IA32_XSS. The second exports XSAVE data in the correct >format. > >I tested these on a non-XSAVES system so they should not be completely >broken, but I need some help. I am not even sure which XSAVE states >are _not_ enabled, and thus compacted, in Linux. > >Note that these patches do not add support for XSAVES in the guest yet, >since MSR_IA32_XSS is not emulated. > >If they fix the bug Nadav reported, I'll add Reported-by and commit. I test this patchset w/ your "KVM: x86: export get_xsave_addr" patch on Skylake and guest hang during boot. The guest screen show "Probing EDD (edd=off to disable)... ok", and no more dump. Regards, Wanpeng Li > >Thanks, > >Paolo > >v1->v2: also adjust KVM_SET_XSAVE > >Paolo Bonzini (2): > kvm: x86: mask out XSAVES > KVM: x86: support XSAVES usage in the host > > arch/x86/kvm/cpuid.c | 11 ++++++- > arch/x86/kvm/x86.c | 87 +++++++++++++++++++++++++++++++++++++++++++----- > 2 files changed, 90 insertions(+), 8 deletions(-) > >-- >1.8.3.1 -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html