diff options
author | Thomas Gleixner <tglx@linutronix.de> | 2022-01-05 04:35:12 -0800 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2022-01-07 13:33:03 -0500 |
commit | 980fe2fddcff21937c93532b4597c8ea450346c1 (patch) | |
tree | bc14f810c770b0229f35c02cecd9e8bd6ac7a043 /samples/seccomp/bpf-helper.h | |
parent | 96c1a6285568d31a8125c36974a140fccbe548af (diff) | |
download | linux-stable-980fe2fddcff21937c93532b4597c8ea450346c1.tar.gz linux-stable-980fe2fddcff21937c93532b4597c8ea450346c1.tar.bz2 linux-stable-980fe2fddcff21937c93532b4597c8ea450346c1.zip |
x86/fpu: Extend fpu_xstate_prctl() with guest permissions
KVM requires a clear separation of host user space and guest permissions
for dynamic XSTATE components.
Add a guest permissions member to struct fpu and a separate set of prctl()
arguments: ARCH_GET_XCOMP_GUEST_PERM and ARCH_REQ_XCOMP_GUEST_PERM.
The semantics are equivalent to the host user space permission control
except for the following constraints:
1) Permissions have to be requested before the first vCPU is created
2) Permissions are frozen when the first vCPU is created to ensure
consistency. Any attempt to expand permissions via the prctl() after
that point is rejected.
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Jing Liu <jing2.liu@intel.com>
Signed-off-by: Yang Zhong <yang.zhong@intel.com>
Message-Id: <20220105123532.12586-2-yang.zhong@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'samples/seccomp/bpf-helper.h')
0 files changed, 0 insertions, 0 deletions