diff options
author | Sean Christopherson <seanjc@google.com> | 2023-10-27 11:21:50 -0700 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2023-11-13 05:30:41 -0500 |
commit | bb58b90b1a8f753b582055adaf448214a8e22c31 (patch) | |
tree | 2bbab991e28e400059c13d9946ef846fb749a8b6 /arch/csky | |
parent | f128cf8cfbecccf95e891ae90d9c917df5117c7a (diff) | |
download | linux-stable-bb58b90b1a8f753b582055adaf448214a8e22c31.tar.gz linux-stable-bb58b90b1a8f753b582055adaf448214a8e22c31.tar.bz2 linux-stable-bb58b90b1a8f753b582055adaf448214a8e22c31.zip |
KVM: Introduce KVM_SET_USER_MEMORY_REGION2
Introduce a "version 2" of KVM_SET_USER_MEMORY_REGION so that additional
information can be supplied without setting userspace up to fail. The
padding in the new kvm_userspace_memory_region2 structure will be used to
pass a file descriptor in addition to the userspace_addr, i.e. allow
userspace to point at a file descriptor and map memory into a guest that
is NOT mapped into host userspace.
Alternatively, KVM could simply add "struct kvm_userspace_memory_region2"
without a new ioctl(), but as Paolo pointed out, adding a new ioctl()
makes detection of bad flags a bit more robust, e.g. if the new fd field
is guarded only by a flag and not a new ioctl(), then a userspace bug
(setting a "bad" flag) would generate out-of-bounds access instead of an
-EINVAL error.
Cc: Jarkko Sakkinen <jarkko@kernel.org>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Reviewed-by: Xiaoyao Li <xiaoyao.li@intel.com>
Signed-off-by: Sean Christopherson <seanjc@google.com>
Reviewed-by: Fuad Tabba <tabba@google.com>
Tested-by: Fuad Tabba <tabba@google.com>
Message-Id: <20231027182217.3615211-9-seanjc@google.com>
Acked-by: Kai Huang <kai.huang@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/csky')
0 files changed, 0 insertions, 0 deletions