summaryrefslogtreecommitdiffstats
path: root/certs/revocation_certificates.S
diff options
context:
space:
mode:
authorThomas Gleixner <tglx@linutronix.de>2022-01-05 04:35:12 -0800
committerPaolo Bonzini <pbonzini@redhat.com>2022-01-07 13:33:03 -0500
commit980fe2fddcff21937c93532b4597c8ea450346c1 (patch)
treebc14f810c770b0229f35c02cecd9e8bd6ac7a043 /certs/revocation_certificates.S
parent96c1a6285568d31a8125c36974a140fccbe548af (diff)
downloadlinux-stable-980fe2fddcff21937c93532b4597c8ea450346c1.tar.gz
linux-stable-980fe2fddcff21937c93532b4597c8ea450346c1.tar.bz2
linux-stable-980fe2fddcff21937c93532b4597c8ea450346c1.zip
x86/fpu: Extend fpu_xstate_prctl() with guest permissions
KVM requires a clear separation of host user space and guest permissions for dynamic XSTATE components. Add a guest permissions member to struct fpu and a separate set of prctl() arguments: ARCH_GET_XCOMP_GUEST_PERM and ARCH_REQ_XCOMP_GUEST_PERM. The semantics are equivalent to the host user space permission control except for the following constraints: 1) Permissions have to be requested before the first vCPU is created 2) Permissions are frozen when the first vCPU is created to ensure consistency. Any attempt to expand permissions via the prctl() after that point is rejected. Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Signed-off-by: Jing Liu <jing2.liu@intel.com> Signed-off-by: Yang Zhong <yang.zhong@intel.com> Message-Id: <20220105123532.12586-2-yang.zhong@intel.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'certs/revocation_certificates.S')
0 files changed, 0 insertions, 0 deletions